Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 871 - 900 of 2013

Full-Text Articles in Physical Sciences and Mathematics

The Largest Eigenvalue Characteristic Of Correlated Complex Wishart Matrices And Its Application To Mimo Mrc Systems, Xianyi Rui, Ronghong Jin, Junping Geng, Xiaojing Huang Jan 2007

The Largest Eigenvalue Characteristic Of Correlated Complex Wishart Matrices And Its Application To Mimo Mrc Systems, Xianyi Rui, Ronghong Jin, Junping Geng, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

In this paper, we analyze statistical properties of the largest eigenvalue of correlated complex Wishart matrices. The results provide an analytical tool for the study of multiple-input multiple-output (MIMO) maximal ratio combining (MRC) systems in the presence of spatial fading correlation at the transmitter or receiver. Based on them, the exact closed-form expressions for the cumulative distribution function and the probability density function of the output signal-to-noise ratio are presented. The analytical results are validated by Monte Carlo simulations.


Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola Jan 2007

Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola

Faculty of Informatics - Papers (Archive)

This paper presents a novel radio frequency identification (RFID) based vehicle immobilizer system, which features low hacking probability while preserving the safety of the passengers of the hijacked vehicle. The immobilizer uses the active RFID technology where the tag is generated with comparatively large character sets. The receiving unit is intelligently integrated into three control circuits in the vehicle, namely, ignition circuit, power control unit, and automatic gear changing system, enabling it to bring the vehicle speed down to zero in a safe step by step manner. The anti-theft auto security system proposed here was tested under different weather conditions …


Anisotropic Matern Correlation And Spatial Prediction Using Reml, K A. Haskard, Brian R. Cullis, A P. Verbyla Jan 2007

Anisotropic Matern Correlation And Spatial Prediction Using Reml, K A. Haskard, Brian R. Cullis, A P. Verbyla

Faculty of Informatics - Papers (Archive)

The Mat´ern correlation function provides great flexibility for modeling spatially correlated random processes in two dimensions, in particular via a smoothness parameter, whose estimation allows data to determine the degree of smoothness of a spatial process. The extension to include anisotropy provides a very general and flexible class of spatial covariance functions that can be used in a model-based approach to geostatistics, in which parameter estimation is achieved via REML and prediction is within the E-BLUP framework. In this article we develop a general class of linear mixed models using an anisotropic Mat´ern class with an extended metric. The approach …


Perceived Similarity And Visual Descriptions In Content-Based Image Retrieval, Yuan Zhong, Lei Ye, Wanqing Li, Philip Ogunbona Jan 2007

Perceived Similarity And Visual Descriptions In Content-Based Image Retrieval, Yuan Zhong, Lei Ye, Wanqing Li, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

The use of low-level feature descriptors is pervasive in content-based image retrieval tasks and the answer to the question of how well these features describe users’ intention is inconclusive. In this paper we devise experiments to gauge the degree of alignment between the description of target images by humans and that implicitly provided by low-level image feature descriptors. Data was collected on how humans perceive similarity in images. Using images judged by humans to be similar, as ground truth, the performance of some MPEG-7 visual feature descriptors were evaluated. It is found that various descriptors play different roles in different …


A Discussion About The Importance Of Laws And Policies For Data Sharing For Public Health In The People's Republic Of China, Xiue Fan, Ping Yu Jan 2007

A Discussion About The Importance Of Laws And Policies For Data Sharing For Public Health In The People's Republic Of China, Xiue Fan, Ping Yu

Faculty of Informatics - Papers (Archive)

This paper introduces the current status of data sharing in the People's Republic of China. It discusses barriers to data sharing and proposes three key solutions to overcome these barriers in China. The establishment of national laws and policies for data sharing is considered the key prerequisite to ensuring the successful implementation of resource sharing activities in public health. Driven by established laws and policies, the relevant operational models should be developed. It is also important to have strategies in place to ensure the established laws and policies are implemented by various organizations in different jurisdictions. These discussions are supported …


The Acceptance Of A Clinical It Innovation By The Care Givers In Residential Aged Care 11-Weeks After The Software Implementation In Australia, Ping Yu, Hui Yu, Yi Mu Jan 2007

The Acceptance Of A Clinical It Innovation By The Care Givers In Residential Aged Care 11-Weeks After The Software Implementation In Australia, Ping Yu, Hui Yu, Yi Mu

Faculty of Informatics - Papers (Archive)

End user acceptance and satisfaction with a new IT innovation is the pre-requisite for the successful introduction of this IT solutino into an organization. More than 70 per cent of health IT projects have failed to a certain extent because of its failure to satisfy the functional or non-functional requirements of the end users and thus were not accepted by them. To date, there is no sound evidence to suggest that clinical IT solutions will bring in benefits for a residential aged care facility. This is a real concern for aged care management in investment in clinical IT solutions in …


Automated Software Testing And Analysis: Techniques, Practices And Tools, Z. Q. Zhou, B. Scholz, G. Denaro Jan 2007

Automated Software Testing And Analysis: Techniques, Practices And Tools, Z. Q. Zhou, B. Scholz, G. Denaro

Faculty of Informatics - Papers (Archive)

As computer systems are permeating our society in daily life and are performing an increasing number of critical tasks, research in software testing and analysis has become of paramount importance. Although we are currently not able to prove program correctness for real-world applications, rigorous software development processes in combination with testing provides us with confidence in the quality of software. Software testing and analysis, however, is a very involved task. As the size and complexity of software continue to grow, manual testing becomes very tedious. Automation of software testing and tool support for testing, therefore, have been emerging as a …


Sampling Within Households In Household Surveys, Robert Graham Clark, David G. Steel Jan 2007

Sampling Within Households In Household Surveys, Robert Graham Clark, David G. Steel

Faculty of Informatics - Papers (Archive)

The number of people to select within selected households has significant consequences for the conduct and output of household surveys. The operational and data quality implications of this choice are carefully considered in many surveys, but the impact on statistical efficiency is not well understood. The usual approach is to select all people in each selected household, where operational and data quality concerns make this feasible. If not, one person is usually selected from each selected household. We find that this strategy is not always justified, and develop intermediate designs between these two extremes. Current practices were developed when household …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose Jan 2007

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Faculty of Informatics - Papers (Archive)

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


Relating Business Process Models To Goal-Oriented Requirements Models In Kaos, George Koliadis, Aditya K. Ghose Jan 2007

Relating Business Process Models To Goal-Oriented Requirements Models In Kaos, George Koliadis, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Business Process Management (BPM) has many anticipated benefits including accelerated process improvement, at the operational level, with the use of highly configurable and adaptive “process aware” information systems [1] [2]. The facility for improved agility fosters the need for continual measurement and control of business processes to assess and manage their effective evolution, in-line with organizational objectives. This paper proposes the GoalBPM methodology for relating business process models (modeled using BPMN) to high-level stakeholder goals (modeled using KAOS). We propose informal (manual) techniques (with likely future formalism) for establishing and verifying this relationship, even in dynamic environments where essential alterations …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose Jan 2007

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis Jan 2007

Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially non-compliant, in a manner that accommodates the structural and semantic dimensions of parsimoniously annotated process models. We also provide a heuristic approach to compliance resolution using a notion of compliance patterns. This allows us to partially automate compliance resolution, leading to reduced levels of analyst involvement …


Actor Eco-Systems: From High-Level Agent Models To Executable Processes Via Semantic Annotations, Aditya K. Ghose, George Koliadis Jan 2007

Actor Eco-Systems: From High-Level Agent Models To Executable Processes Via Semantic Annotations, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

We introduce the notion of an actor eco-system a framework that addresses the design-time requirements of building multi-actor (multi-agent) systems such as supply chains, business networks, virtual organizations etc. We describe how semantic annotation of abstract models of actor ecosystems can be used to derive executable process models that realize such systems. We outline a potentially powerful toolkit for model to code transformations in complex agentoriented settings.


Combining I* And Bpmn For Business Process Model Lifecycle Management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose Jan 2007

Combining I* And Bpmn For Business Process Model Lifecycle Management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

The premise behind ‘third wave’ Business Process Management (BPM1) is effective support for change at levels. Business Process Modeling (BPM2) notations such as BPMN are used to effectively conceptualize and communicate process configurations to relevant stakeholders. In this paper we argue that the management of change throughout the business process model lifecycle requires greater conceptual support achieved via a combination of complementary notations. As such the focus in this paper is on the co-evolution of operational (BPMN) and organizational (i*) models. Our intent is to provide a way of expressing changes, which arise in one model, effectively in the other …


Temporal Authorizations Scheme For Xml Documents, Jing Wu, Jennifer Seberry, Y. Mu Jan 2007

Temporal Authorizations Scheme For Xml Documents, Jing Wu, Jennifer Seberry, Y. Mu

Faculty of Informatics - Papers (Archive)

In a large system, XML documents associated with it can be large and complicated. To manage access control in such a large and complicated system is very difficult. Recently, Access Policy Sheet (APS) [6] was introduced to provide a solution to access control for large XML systems. In this paper, we proposed a temporal access control scheme in APS where the propagation of authorization rights is assumed. The authorization policies can be automatically revoked when the associated time expires. We also provide conflict resolutions for our temporal authorization system.


The Power And Influence In Some Youden Squares And Secret Sharing, Lakoa Fitina, Kenneth G. Russell, Jennifer Seberry Jan 2007

The Power And Influence In Some Youden Squares And Secret Sharing, Lakoa Fitina, Kenneth G. Russell, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We investigate subsets of critical sets of some Youden squares in the context of secret sharing schemes. A subset C of a Youden square is called a critical set, if C can be uniquely completed to a Youden square but any subset of C cannot does not have a unique completion to a Youden square. That part of a Youden square Y which is inaccessible to subsets of a critical set C of Y, called the strongbox of C, may be thought to contain secret information. We study the size of the secret. Seberry and Street have shown how strongboxes …


Generalized Bhaskar Rao Designs With Block Size 3 Over Finite Abelian Groups, G. Ge, M. Grieg, Jennifer Seberry, R. Seberry Jan 2007

Generalized Bhaskar Rao Designs With Block Size 3 Over Finite Abelian Groups, G. Ge, M. Grieg, Jennifer Seberry, R. Seberry

Faculty of Informatics - Papers (Archive)

We show that if G is a finite Abelian group and the block size is 3, then the necessary conditions for the existence of a (v; 3; λ;G) GBRD are sufficient. These necessary conditions include the usual necessary conditions for the existence of the associated (v; 3; λ) BIBD plus λ ≡ 0 (mod |G|), plus some extra conditions when |G| is even, namely that the number of blocks be divisible by 4 and, if v = 3 and the Sylow 2-subgroup of G is cyclic, then also λ ≡ 0 (mod 2|G|).


Nested Boron Nitride And Carbon-Boron Nitride Nanocones, D. Baowan, James M. Hill Jan 2007

Nested Boron Nitride And Carbon-Boron Nitride Nanocones, D. Baowan, James M. Hill

Faculty of Informatics - Papers (Archive)

In this letter we extend previously established results for nested carbon nanocones to both nested boron nitride and carbon-boron nitride nanocones. Based purely on mechanical principles and classical mathematical modelling techniques, we determine the energetically favourable structures for nested boron nitride and carbon-boron nitride nanocones. While only three apex angles for boron nitride tend to occur, we also consider the other two angles corresponding to the equivalent carbon nanocones. Two nanocones are assumed to be located co-axially in a vacuum environment. The Lennard-Jones parameters for boron nitride and carbon-boron nitride systems are calculated using the standard mixing rule. For the …


Force Application During Cochlear Implant Insertion: An Analysis For Improvement Of Surgeon Technique, C. Todd, F. Naghdy, M. J. Svehla Jan 2007

Force Application During Cochlear Implant Insertion: An Analysis For Improvement Of Surgeon Technique, C. Todd, F. Naghdy, M. J. Svehla

Faculty of Informatics - Papers (Archive)

Highly invasive surgical procedures, such as the implantation of a prosthetic device, require correct force delivery to achieve desirable outcomes and minimize trauma induced during the operation. Improvement in surgeon technique can reduce the chances of excessive force application and lead to optimal placement of the electrode array. The fundamental factors that affect the degree of success for cochlear implant recipients are identified through empirical methods. Insertion studies are performed to assess force administration and electrode trajectories during implantations of the Nucleusreg 24 Contourtrade and Nucleusreg 24 Contour Advancetrade electrodes into a synthetic model of the human Scala …


A Maximum Likelihood Watermark Decoding Scheme, Wenming Lu, Wanqing Li, Rei Safavi-Naini, Philip Ogunbona Jan 2007

A Maximum Likelihood Watermark Decoding Scheme, Wenming Lu, Wanqing Li, Rei Safavi-Naini, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Based on the observation that an attack applied on a watermarked image, from a decoding point of view, modifies the distribution of the detection values away from the ideal distribution (without attack) for corresponding watermarking scheme, we propose a generic maximum likelihood decoding scheme by approximating the distribution with a finite Gaussian mixture model. The parameters of the model are estimated using expectation-maximization algorithm. The scheme allows the decoding to be automatically adapted to attacks that the watermarked images have undergone and, in consequence, to improve the decoding accuracy. Experiments on a QIM based watermarking system have clearly verified the …


On Separating Route Control And Data Flows In Multi-Radio Multi-Hop Ad Hoc Network, Jerry Chun-Ping Wang, Mehran Abolhasan, D. Franklin, Farzad Safaei, Justin Lipman Jan 2007

On Separating Route Control And Data Flows In Multi-Radio Multi-Hop Ad Hoc Network, Jerry Chun-Ping Wang, Mehran Abolhasan, D. Franklin, Farzad Safaei, Justin Lipman

Faculty of Informatics - Papers (Archive)

Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the network becomes more heavily congested, there is an increased probability that these critical packets are lost, resulting in obsolete control information being used to make important decisions. This would further compound the problem of network congestion and lead to a very rapid loss of connectivity and throughput. Given this, we argue the solutions to these problems should not rely on putting extra bandwidth on a …


Distributed Server Delivery Of Immersive Voip Service: Balancing Between Voice Latency And Access Upload Cost, Ying Peng Que, Farzad Safaei, P. Boustead Jan 2007

Distributed Server Delivery Of Immersive Voip Service: Balancing Between Voice Latency And Access Upload Cost, Ying Peng Que, Farzad Safaei, P. Boustead

Faculty of Informatics - Papers (Archive)

As a future communication tool to the Distributed Virtual Environment, the Immersive VoIP service delivers to each user a real-time mix of nearby user voices which are all rendered according to their respective virtual world positions. In this work, we conjecture that the voice latency constraints between Immersive VolP users would vary according to their virtual world distance of separation. As verified in our subjective listening tests, this conjecture is more realistic than fixed latency constraint, in terms of user perceptual experience and network feasibility. Empowered by the Bandwidth Reduced server assignment algorithm, the proposed two-hop distributed server architecture achieves …


A Survey On Control Separation Techniques In Multi-Radio Multi-Channel Mac Protocols, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei, D. Franklin Jan 2007

A Survey On Control Separation Techniques In Multi-Radio Multi-Channel Mac Protocols, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei, D. Franklin

Faculty of Informatics - Papers (Archive)

The rapid diminishing in the cost of commodity wireless hardware in recent years has prompted the use of multiple radios to improve the capacity of wireless networks. However, the research has shown that the improvement obtained from using multiple radios does not solely depend on the number of radios, but primarily on how these radios can be integrated in a constructive manner. A common way of integration multiple radios is to use a dedicated radio for control. To date, a number of multi-radio MAC protocol are employing a dedicated radio to control and coordinate the other radios, though the approaches …


A Multi-Method Approach To Assessing Health Information Systems End Users' Training Needs, Yiyu Qiu, Ping Yu, P. Hyland Jan 2007

A Multi-Method Approach To Assessing Health Information Systems End Users' Training Needs, Yiyu Qiu, Ping Yu, P. Hyland

Faculty of Informatics - Papers (Archive)

In order to guarantee acceptance and effective usage of health information system (HIS), its end users must be appro-priately trained. However many existing training programs did not adequately satisfy its user’s needs and the training objectives. This is because they did not envisage the problems that users might encounter when performing specific tasks. Therefore it is essential for developing a good training pro-gram to precisely assess end users’ training needs. However, applying traditional approaches for Training Needs Assess-ment (TNA) such as interviews or surveys alone is insufficient. These methods are limited in their capacity to understand the cognitive processes a …


"Kernalized" Self-Organizing Maps For Structured Data, F. Aiolli, G. Da San Martino, A. Sperduti, M. Hagenbuchner Jan 2007

"Kernalized" Self-Organizing Maps For Structured Data, F. Aiolli, G. Da San Martino, A. Sperduti, M. Hagenbuchner

Faculty of Informatics - Papers (Archive)

The suitability of the well known kernels for trees, and the lesser known Self- Organizing Map for Structures for categorization tasks on structured data is investigated in this paper. It is shown that a suitable combination of the two approaches, by defining new kernels on the activation map of a Self-Organizing Map for Structures, can result in a system that is significantly more accurate for categorization tasks on structured data. The effectiveness of the proposed approach is demonstrated experimentally on a relatively large corpus of XML formatted data.


Implementing Trusted Terminals With A Tpm And Sitdrm, S. Stamm, N. P. Sheppard, R. Safavi-Naini Jan 2007

Implementing Trusted Terminals With A Tpm And Sitdrm, S. Stamm, N. P. Sheppard, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

In the SITDRM Enterprise system [1], private customer data is protected under customer-provided license policies. When employees of an organization want to use these customers’ data, they must be forced to abide by the policies provided. Some sort of hardened terminal must be used to ensure that not only the hardware and software will cooperate, but that the user of the terminal will too. We use the Trusted Computing Group’s specifications for a trusted platform upon which to build a SITDRM data user terminal that can be proved to implement proper license-enforcing behavior. A Trusted Platform Module (TPM) chip and …


Research Into Navigation With Ctfm Ultrasonic Sensors, Phillip J. Mckerrow Jan 2007

Research Into Navigation With Ctfm Ultrasonic Sensors, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

Our goal is to develop a navigation system for a mobile robot that mimics human navigation. To achieve this goal the robot has to perceive sufficient information about its environment to determine where there are safe paths to travel. Blind humans using ultrasonic mobility aids have achieved excellent navigation. First, we look at the quality of ultrasonic sensing and its suitability for navigation. Then we describe examples from our research into navigation. The paper finishes with a description of current work on corridor following.


Developing Real-Time Systems In Java On Macintosh, Phillip J. Mckerrow Jan 2007

Developing Real-Time Systems In Java On Macintosh, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

In this paper, we examine the advantage of writing real-time applications and operating systems in typesafe languages, such as Java. In this context, we look at the issues of using Java in real-time systems and the development tools available on Macintosh computers. Finally, we explore the potential of the Sun SPOT system: a credit-card sized Java computer with input/output, and a wireless network, that runs the Squawk JVM. It is planned to be released in Australia in the third quarter of 2007.


Embedding Distributed Learning Algorithms In Wireless Ad-Hoc Control Networks, A. Desmet, F. Naghdy, M. Ros Jan 2007

Embedding Distributed Learning Algorithms In Wireless Ad-Hoc Control Networks, A. Desmet, F. Naghdy, M. Ros

Faculty of Informatics - Papers (Archive)

With the advances in soft computing techniques and agent technologies, the concept of home ambient intelligence is becoming more and more realistic. Living in a building that adapts itself to the users and assists them in reducing their energy consumption is now within reach. The main technical barrier comes from hardware: servers and industrial control networks do not fit in a house. With the availability of dedicated wireless solutions and low-cost small computation units, the platform to implement task distribution in a control network is now feasible and cost efficient. This paper explores the possibilities of fitting a distributed learning …


Software Development Of Embedded Systems On Macintosh, Phillip J. Mckerrow Jan 2007

Software Development Of Embedded Systems On Macintosh, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

The development of embedded systems on Macintosh has been constrained by a lack of software tools. In this paper, we look at a number of tools for developing embedded software on a Macintosh host. Also, we examine the advantage of writing embedded applications in high-level, type-safe languages. In this context, we discuss programming PIC micro-controllers in C, Basic Stamps in PBasic and TINI micro-controller in Java.