Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 541 - 570 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Strategies For Implementing A Converged Ict Regulator In Indonesia, Yudhistra Nughara, William Tibben Jan 2009

Strategies For Implementing A Converged Ict Regulator In Indonesia, Yudhistra Nughara, William Tibben

Faculty of Informatics - Papers (Archive)

This paper draws on a six month study that aimed to broadly clarify strategies for the IndonesianGovernment to address the issue of convergence. This paper reports on one aspect of this study thatmaps stakeholder policymaker opinions about a future converged regulator in Indonesia.Convergence refers to a trend in regulation that seeks to define a single regulatory structure fortelecommunications, broadcasting and information technology. In particular, the specific aims ofthis study were to examine regulatory structures with regard to two parameters derived from theInternational Telecommunications Union (ITU): the level of independence, and institutional design.Using benchmarking as a method, three case studies of …


The Development Of Taiwanese Electronic Medical Record Systems Evaluation Instrument, Y.Y. Su, Khin Than Win, Herng-Chia Chiu Jan 2009

The Development Of Taiwanese Electronic Medical Record Systems Evaluation Instrument, Y.Y. Su, Khin Than Win, Herng-Chia Chiu

Faculty of Informatics - Papers (Archive)

This study used Item Analysis, Exploratory Factor Analysis (EFA) and Reliability Analysis (Cronbach’s α value) to exam the Questions which selected by the Delphi method based on the issue of “Socio-technical system (STS)” and user-centered perspective. A structure questionnaire with seventy-four questions which could be categorized into nine dimensions (healthcare environment, organization behaviour, system quality, medical data quality, service quality, safety quality, user usage, user satisfaction, and organization net benefits) was provided to evaluate EMR of the Taiwanese healthcare environment.


Ant Inspired Scalable Peer Selection In Ontology-Based Service Composition, Shuai Yuan, Jun Shen, Aneesh Krishna Jan 2009

Ant Inspired Scalable Peer Selection In Ontology-Based Service Composition, Shuai Yuan, Jun Shen, Aneesh Krishna

Faculty of Informatics - Papers (Archive)

This work focuses on proposing a method of effectively dealing with P2P-based service selection and composition, especially when handling a large number of peers along with their diverse qualities. The QoS-aware peer selection is one of the major challenges faced in order to guarantee the success and enhance performance of distributed computing. Since many peer candidates provide overlapping or identical functionalities, though with different QoS evaluations, selections need to be rapidly conducted to determine which peers are suitable to join in the requested composite service. The main contribution of this paper is proposing a P2P-based service selection model, in which …


Proper Actions Which Are Not Saturated, Damian Marelli, Iain F. Raeburn Jan 2009

Proper Actions Which Are Not Saturated, Damian Marelli, Iain F. Raeburn

Faculty of Informatics - Papers (Archive)

If a locally compact group G acts properly on a locally compact space X, then the induced action on C0(X) is proper in the sense of Rieffel, with generalised fixed-point algebra C0(G\X). Rieffel’s theory then gives a Morita equivalence between C0(G\X) and an ideal I in the crossed product C0(X) × G; we identify I by describing the primitive ideals which contain it, and we deduce that I = C0(X)×G if and only if G acts freely. We show that if a discrete group G acts on a directed graph E and every vertex of E has a finite stabiliser, …


Ontology-Based Collaborative Inter-Organizational Knowledge Management Network, Nelson K. Y. Leung, Seung Hwan Kang, S. Lau, Joshua P. Fan Jan 2009

Ontology-Based Collaborative Inter-Organizational Knowledge Management Network, Nelson K. Y. Leung, Seung Hwan Kang, S. Lau, Joshua P. Fan

Faculty of Informatics - Papers (Archive)

Knowledge management encourages organizations to create and use knowledge continuously to gain competitive advantage. Some knowledge management approaches are industry specific, theoretical and procedure-wise without consideration of system interoperation. The lack of interoperability means heterogeneous systems from different organizations are unable to communicate, cooperate, exchange, and reuse knowledge with one another. Thus a collaborative interorganizational network is necessary. In this paper, we propose the use of ontology for organizations to access and retrieve inter-organizational knowledge in a similar domain. The incorporation of ontology and its mediation methods in the network allows organizations to reuse the interorganizational knowledge to support individual …


Ranking Method For Optimizing Precision/Recall Of Content-Based Image Retrieval, Jun Zhang, Lei Ye Jan 2009

Ranking Method For Optimizing Precision/Recall Of Content-Based Image Retrieval, Jun Zhang, Lei Ye

Faculty of Informatics - Papers (Archive)

The ranking method is a key element of content-based image retrieval (CBIR) system, which can affect the final retrieval performance. In the literature, previous ranking methods based on either distance or probability do not explicitly relate to precision and recall, which are normally used to evaluate the performance of CBIR systems. In this paper, a novel ranking method based on relative density is proposed to improve the probability based approach by ranking images in the class. The proposed method can achieve optimal precision and recall. The experiments conducted on a large photographic collection show significant improvements of retrieval performance.


Long-Term Liming Regime Increases Prime Lamb Production On Acid Soils, G Chen, G D. Li, M K. Conyers, B R. Cullis Jan 2009

Long-Term Liming Regime Increases Prime Lamb Production On Acid Soils, G Chen, G D. Li, M K. Conyers, B R. Cullis

Faculty of Informatics - Papers (Archive)

Prime lamb live weight response to lime application on pasture was measured in a grazing experiment in the high rainfall zone of the southwestern slopes of New South Wales, Australia. The pastures were limed every 6 years over 15 years. First cross South African Meat Merino lambs were used as test animals. Preand post-grazing pasture dry matter (DM) yield, botanical composition, feed quality and lamb live weight were monitored over 12 weeks in 2007. Results showed that liming significantly increased pastureDMyield of high quality species and improved overall pasture quality due to increased digestibility and metabolic energy content. As a …


Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael Dec 2008

Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper presents the impact of RFID technology on the picking and shipping processes of one RFID-enabled warehouse in the 3PL industry. The findings from our study confirm initial results from many studies where RFID implementation has been shown to enable business process redesign, improve data quality, real-time data collection and synchronization and enhance system integration. In this study we show that the full potential of RFID technology is dependent upon the involvement of all supply chain members involved in implementation. Moreover, firms considering implementing RFID technology need to take into account their investment in complementary assets such as employee …


Developing Real Time Applications With Java Based Sun Spot, L. Chen, Phillip J. Mckerrow, Q. Lu Dec 2008

Developing Real Time Applications With Java Based Sun Spot, L. Chen, Phillip J. Mckerrow, Q. Lu

Faculty of Informatics - Papers (Archive)

Most researchers develop real-time applications with C, including programming hardware with C and using a Real Time Operating System (RTOS) that is written in C to manage the task environment. In this paper, we research a different approach by using Java to develop a real-time application. We implement an example real-time project, onboard computation of a coaxial helicopter Lama, with a Java based Sun SPOT to control the hardware and a Java RTOS (JARTOS) running on top of the Sun SPOT to manage the processes. This project enables us to answer several questions regarding to real-time system development with the …


Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward Dec 2008

Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

Intelligent interfaces that make use of the user's head pose or facial features in order to interpret the user's identity or point of attention, are finding increasing application in numerous fields. Although various techniques exist to passively track the user's gaze or head pose using monocular or stereo cameras, these systems generally cannot perceive in detail the characteristic three-dimensional (3D) profile of the user's head or face. Time-of-flight cameras, such as the Swiss Ranger SR-3000, are a recent innovation capable of providing three-dimensional image data from a single sensor. The advent of such sensors opens up new possibilities in the …


An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael Oct 2008

An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael

Faculty of Informatics - Papers (Archive)

RFID technology is defined as a wireless automatic identification and data capture (AIDC) technology and is considered as “the next big thing” in the management and “the next revolution in supply chain”. Recently, the topic has attracted the interest of the industrial community as well as the scientific community. Following this tendency, this paper applies an Information Systems Design Theory (ISDT) for an RFID-based University Laboratory. For practitioners, the paper provides some insights into the set-up and use of RFID laboratory in university settings, and at the same time, it offers a set of hypotheses that can be empirically tested.


Acoustic Flow, Phillip J. Mckerrow Sep 2008

Acoustic Flow, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

As an echolocating sensor moves through an environment the pattern of echoes reflected by objects to that sensor changes continuously, creating acoustic flow. Acoustic flow has been observed in both bats and humans. In this paper, we develop a theory of acoustic flow, and discuss measuring it with a Continuous Transmission Frequency Modulated (CTFM) ultrasonic sensor.


A Software Architecture For Mobile Robot Navigation, Phillip J. Mckerrow, Sherine M. Antoun Sep 2008

A Software Architecture For Mobile Robot Navigation, Phillip J. Mckerrow, Sherine M. Antoun

Faculty of Informatics - Papers (Archive)

Directed sensing poses the problem of sensing in specific directions in synchronisation with robot motion while avoiding collisions with objects in other directions. The rebuild of an outdoor mobile robot, with the goal of mimicking a blind person navigating with echolocation, has provided the opportunity to experiment with a state machine based software architecture for landmark navigation. In this paper, we discuss the rebuild of the robot, the software architecture and an initial experiment in collision avoidance.


Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid Jul 2008

Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid

Faculty of Informatics - Papers (Archive)

This paper examines the case of one supply chain in the electricity sector where RFID technology integrated with firm’s information systems acts as an enabler of process optimization. Using a business process approach and laboratory simulation, we explain how the implementation of RFID technology can increase the visibility of information at various layers of the supply chain, allowing members to gather precise information on real demand and improve replenishment processes. On the other hand, while RFID technology has the potential to automate some processes, human intervention is still required. Therefore, use case scenarios and sensitivity analysis should be carefully considered …


Outbound Tourism From China: Literature Review And Research Agenda, Byron W. Keating, A. Kriz Jul 2008

Outbound Tourism From China: Literature Review And Research Agenda, Byron W. Keating, A. Kriz

Faculty of Informatics - Papers (Archive)

The rapid growth of China's outbound tourism market has attracted a great deal of attention in recent years. However, the academic literature is still sparse in this area. Using a theoretical framework that synthesises the key processes related to destination choice, the authors undertake a systematic review of the academic literature on outbound tourism from China. Stemming from this review, the article provides some direction for future empirical research on this important topic. The authors also suggest that a new model for travel planning could be developed, suggesting that traditional destination choice models may inadequately capture the nuances of destination …


The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael Jun 2008

The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

Radio frequency identification (RFID) chip implants for humans are no longer the tales of science fiction. Already preliminary findings have shown that the number of people willing to get chipped has increased since the technology’s commercial arrival in 2002, despite the fact that adoption rates have been very low. This investigation presents three case studies of the main users/ innovators of humancentric chip implants. The first case is of a British researcher in an academic institution who has conducted several implant experiments; the second case, is of a hobbyist and entrepreneur who has focused on the use of RFID implants …


Amal Graafstra- The Do-It-Yourselfer Rfid Implantee: The Culture, Values And Ethics Of Hobbyist Implantees: A Case Study, R. Ip, Katina Michael, M G. Michael Jun 2008

Amal Graafstra- The Do-It-Yourselfer Rfid Implantee: The Culture, Values And Ethics Of Hobbyist Implantees: A Case Study, R. Ip, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper provides insights into the culture, values and ethics of do-it-yourself microchip implantees. Microchip implantees are people who have opted to bear a radio-frequency identification (RFID) device beneath their skin for particular electronic applications. This paper uses a single case study of the most prominent hobbyist microchip implantee, Mr Amal Graafstra of the United States, to explore the preliminary motivations for being implanted, the actual chip experience, and the subsequent repercussions of being an implantee. The data for this paper was collected using two main techniques, a primary interview with the case subject, complemented by secondary documentary evidence available …


The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael Jun 2008

The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael

Faculty of Informatics - Papers (Archive)

Radio Frequency Identification (RFID) has the potential to revolutionize the retail industry, yet the linking of this automatic identification (auto-ID) technology to consumer goods has resulted in widespread concern over the potential privacy threats, primarily due to the aspect of traceability it could impose on consumers. As a consequence, privacy has come to be perceived as a barrier stopping RFID adoption in retail in its tracks. When investigating other complex information and communication technologies (ICT), it becomes apparent that consumers often sacrifice privacy in order to take advantage of some form of value afforded by the technology. This interplay between …


Advanced Location-Based Services, Miguel A. Labrador, Katina Michael, Axel Kuepper Apr 2008

Advanced Location-Based Services, Miguel A. Labrador, Katina Michael, Axel Kuepper

Faculty of Informatics - Papers (Archive)

This special issue of Computer Communications presents state-of-the-art research and applications in the area of location-based services (LBS). Initial location-based services entered the market around the turn of the millennium and for the greater part appeared in the form of restaurant finders and tourist guides, which never gained widespread user acceptance. The reasons for this were numerous and ranged from inaccurate localization mechanisms like Cell-ID, little creativity in the design and functions of such services, to a generally low acceptance of data services. However, in recent years, there has been an increasing market penetration of GPS-capable mobile phones and devices, …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip Apr 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Faculty of Informatics - Papers (Archive)

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael Apr 2008

A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Advanced location-based services (A-LBS) for humancentric tracking and monitoring are now emerging as operators and service providers begin to leverage their existing infrastructure and invest in new technologies, toward increasingly innovative location application solutions. We can now point to humancentric tracking and monitoring services where the person (i.e. subject) has become an active node in the network. For example, in health applications through the use of embedded technologies such as radio-frequency identification (RFID) or in campus applications through the use of electronic monitoring techniques in the form of global positioning systems (GPS). These technologies, for the greater part, have been …


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael Apr 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


The Rfid-Enabled Dairy Farm: Towards Total Farm Management, Adam Trevarthen, Katina Michael Apr 2008

The Rfid-Enabled Dairy Farm: Towards Total Farm Management, Adam Trevarthen, Katina Michael

Faculty of Informatics - Papers (Archive)

Radio-frequency identification (RFID) is currently being deployed in government mandated livestock identification schemes across the world. RFID in its basic function can help authorities identify animals, especially when traceability becomes paramount during disease outbreaks across regions. This paper provides a view of how an RFID-enabled dairy farm can leverage mobile network infrastructure towards achieving total farm management. The data for the study was collected from two case studies, both NLIS (national livestock identification system) compliant dairy farms on the South Coast of New South Wales in Australia. The Cochrane and Strong Farms were used as models to illustrate the core …


Rfid And Supply Chain Management: Introduction To The Special Issue, Tim Coltman, R. Gadh, K. Michael Apr 2008

Rfid And Supply Chain Management: Introduction To The Special Issue, Tim Coltman, R. Gadh, K. Michael

Faculty of Informatics - Papers (Archive)

Much of the received wisdom emanating from modern corporations indicates that business competition is being fought “supply chain versus supply chain” rather than “firm versus firm”. The ability to deliver goods and services in full, on time and error free to customers is therefore of increasing strategic importance to any organization, independent of size or sector. From demand forecasting, to the sourcing of raw materials, right through to manufacture and dispatch- visibility in the supply chain is becoming an important facet of any modern operation. How to leverage emerging information technologies, such as radio frequency identification (RFID) to create innovative …


Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Apr 2008

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Faculty of Informatics - Papers (Archive)

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.


Social And Organizational Aspects Of Information Security Management, Katina Michael Apr 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


The Inhabitation Problem For Intersection Types, M. W. Bunder Jan 2008

The Inhabitation Problem For Intersection Types, M. W. Bunder

Faculty of Informatics - Papers (Archive)

In the system lambda ^ of intersection types, without w, the problem as to whether an arbitrary type has an inhabitant, has been shown to be undecidable by Urzyczyn in [9]. For one subsystem of lambda ^, that lacks the ^- introduction rule, the inhabitation problem has been shown to be decidable in Kurata and Takahashi [9]. The natural question that arises is: What other subsystems of lambda ^, have a decidable inhabitation problem? The work in [2], which classifies distinct and inhabitation-distinct subsystems of lambda ^, leads to the extension of the undecidability result to lambda ^ without the …


Modeling Dynamic Controls On Ice Streams: A Bayesian Statistical Approach, L Mark Berliner, Kenneth Jezek, Noel Cressie, Yongku Kim, Calvin Lam, Cornelis Van Der Veen Jan 2008

Modeling Dynamic Controls On Ice Streams: A Bayesian Statistical Approach, L Mark Berliner, Kenneth Jezek, Noel Cressie, Yongku Kim, Calvin Lam, Cornelis Van Der Veen

Faculty of Informatics - Papers (Archive)

Our main goal is to exemplify the study of ice-stream dynamics via Bayesian statistical analysis incorporating physical, though imperfectly known, models using data that are both incomplete and noisy. The physical-statistical models we propose account for these uncertainties in a coherent, hierarchical manner. The initial modeling assumption estimates basal shear stress as equal to driving stress, but subsequently includes a random corrector process to account for model error. The resulting stochastic equation is incorporated into a simple model for surface velocities. Use of Bayes' theorem allows us to make inferences on all unknowns given basal elevation, surface elevation and surface …


Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain Jan 2008

Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain

Faculty of Informatics - Papers (Archive)

Vulnerability assessment in power systems is important so as to determine how vulnerable a power system in case of any unforeseen catastrophic events. This paper presents the application of Radial Basis Function Neural Network (RBFNN) for vulnerability assessment of power system incorporating a new proposed feature extraction method named as the Neural Network Weight Extraction (NNWE) for dimensionality reduction of input data. The performance of the RBFNN is compared with the Multi Layer Perceptron Neural Network (MLPNN) so as to evaluate the effectiveness of the RBFNN in assessing the vulnerability of a power system based on the indices, power system …


Some Diagnostics For Markov Random Fields, Noel A. Cressie, Prasenjit Kapat Jan 2008

Some Diagnostics For Markov Random Fields, Noel A. Cressie, Prasenjit Kapat

Faculty of Informatics - Papers (Archive)

The development of diagnostics to check the fit of a proposed Markov random field (MRP) to data is a very important problem in spatial statistics. In this article, the consequences of fitting a given MRF to spatial data are visualized using diagnostic plots. The Gaussian MRF known as the conditional autoregressive model is featured. Various types of departures of the data from the fitted MRF model are calculated, allowing locally influential observations to be highlighted using the MRF-Neighborhoods plot. Through a global summary statistic and the Model-Comparison plot, we compare MRF models that differ both in terms of the neighborhood …