Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 931 - 960 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Time Delay Estimation Of Reverberant Meeting Speech: On The Use Of Multichannel Linear Prediction, Eva Cheng, I. Burnett, Christian Ritz Jan 2007

Time Delay Estimation Of Reverberant Meeting Speech: On The Use Of Multichannel Linear Prediction, Eva Cheng, I. Burnett, Christian Ritz

Faculty of Informatics - Papers (Archive)

Effective and efficient access to multiparty meeting recordings requires techniques for meeting analysis and indexing. Since meeting participants are generally stationary, speaker location information may be used to identify meeting events e.g., detect speaker changes. Time-delay estimation (TDE) utilizing cross-correlation of multichannel speech recordings is a common approach for deriving speech source location information. Research improved TDE by calculating TDE from linear prediction (LP) residual signals obtained from LP analysis on each individual speech channel. This paper investigates the use of LP residuals for speech TDE, where the residuals are obtained from jointly modeling the multiple speech channels. Experiments conducted …


Comparative Analysis Of Resource Reservation Cost For Different Rsvp Extension Schemes In Mobile Environments, Yilin Song, Yi Sun, Min Liu, E. Dutkiewicz Jan 2007

Comparative Analysis Of Resource Reservation Cost For Different Rsvp Extension Schemes In Mobile Environments, Yilin Song, Yi Sun, Min Liu, E. Dutkiewicz

Faculty of Informatics - Papers (Archive)

In wireless networks, advanced resource reservation becomes a necessary requirement for fast handover with QoS guarantee because of the mobility of nodes. However, advanced resource reservation would unavoidably lead to system resource wasting. In this paper, taking the representative RSVP extension schemes with mobility support, MRSVP, Multicast RSVP and Fast RSVP as examples, we analyze factors affecting resource reservation costs and present formalized expressions of reservation costs for these different resource reservation schemes. On this basis, we quantify and compare the reservation costs for different resource reservation schemes, and then give recommendations on resource reservation schemes design for mobile environments.


Re-Conceptualizing The Digital Divide: A Knowledge-Based Approach, William Tibben Jan 2007

Re-Conceptualizing The Digital Divide: A Knowledge-Based Approach, William Tibben

Faculty of Informatics - Papers (Archive)

Determining a robust conceptualization of the digital divide has proved to be a difficult challenge for scholars. This paper argues that a knowledge-based approach provides an effective means to understand and develop responses to various forms of disadvantage related to access and use of Information and Communication Technologies (ICTs). In developing this idea one area of social network analysis is used to make the claim that social networks are used by people to configure an ontology to negotiate the uncertainty of their day-to-day existence. It follows then that digital divide factors can be understood in terms of ICT facilitated knowledge …


Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung Jan 2007

Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung

Faculty of Informatics - Papers (Archive)

Modeling is an important and time consuming part of the Business Process Management life-cycle. An analyst reviews existing documentation and queries relevant domain experts to construct both mental and concrete models of the domain. To aid this exercise, we propose the Rapid Business Process Discovery (R-BPD) framework and prototype tool that can query heterogeneous information resources (e.g. corporate documentation, web-content, code e.t.c.) and rapidly construct proto-models to be incrementally adjusted to correctness by an analyst. This constitutes a departure from building and constructing models toward just editing them. We believe this rapid mixed-initiative modeling will increase analyst productivity by significant …


Person-Level And Household-Level Regression Estimation In Household Surveys, David G. Steel, Robert Graham Clark Jan 2007

Person-Level And Household-Level Regression Estimation In Household Surveys, David G. Steel, Robert Graham Clark

Faculty of Informatics - Papers (Archive)

A common class of survey designs involves selecting all people within selected households. Generalized regressionestimators can be calculated at either the person or household level. Implementing the estimator at the household level has the convenience of equal estimation weights for people within households. In this article the two approaches are compared theoretically and empirically for the case of simple random sampling of households and selection of all persons in each selected household. We find that the household level approach is theoretically more efficient in large samples and any empirical inefficiency in small samples is limited.


E-Government Service Delivery Capabilities: An Analysis Of The Arab Countries In Africa & The Middle East, Akemi T. Chatfield, Omar Alhujran Jan 2007

E-Government Service Delivery Capabilities: An Analysis Of The Arab Countries In Africa & The Middle East, Akemi T. Chatfield, Omar Alhujran

Faculty of Informatics - Papers (Archive)

Much of the existing empirical research focused on e-govemments in developed countries in the Western world. In consequence, very little is known about egovemment development efforts and current progress in the Arab countries. This research attempts to bridge the knowledge gap by conducting a qualitative analysis of the current practices of leading e-govemment Arab countries vis-a-vis those who lag behind them in their e-govemment maturity. The analysis results show a wide digital divide within the sixteen Arab e-govemment developments in terms of e-govemment service delivery capabilities.


Homo Electricus And The Continued Speciation Of Humans, Katina Michael Dec 2006

Homo Electricus And The Continued Speciation Of Humans, Katina Michael

Faculty of Informatics - Papers (Archive)

Michael, K. (2007). Homo Electricus and the continued speciation of humans. In M. Quigley (Eds.), Encyclopaedia of Information Ethics and Security (pp. 312-318). United States of America: IGI Global. http://www.igi-global.com/chapter/homo-electricus-continued-speciation-humans/13490


Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael Dec 2006

Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael

Faculty of Informatics - Papers (Archive)

Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. By employing usability context analyses in control, convenience and care-related application areas, we begin to piece together a cohesive view of the current development state of humancentric RFID, as detached from predictive conjecture. This is supplemented by an understanding of the market-based, social and ethical concerns which plague …


Analysis Of Business Process Integration In Web Service Context, J. Shen, G. Grossmann, Y. Yang, M. Stumptner, M. Schrefl, T. Reiter Dec 2006

Analysis Of Business Process Integration In Web Service Context, J. Shen, G. Grossmann, Y. Yang, M. Stumptner, M. Schrefl, T. Reiter

Faculty of Informatics - Papers (Archive)

The integration of Web services is a recent outgrowth of the Business Process integration field that will require powerful meta-schema matching mechanisms supported by higher level abstractions, such as UML meta-models. Currently, there are many XML-based workflow process specification languages (e.g. XPDL, BPEL) which can be used to define business processes in the Web services and Grid Computing world. However, with limited capability to describe the relationships (schemas or ontologies) between process objects, the dominant use of XML as a meta-data markup language makes the semantics of the processes ambiguous. OWL-S (Ontology Web Language for Services) exploits the semantic description …


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2006

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Faculty of Informatics - Papers (Archive)

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to …


Knowledge Sharing And Organizational Change In A Leading Telecommunications Equipment Vendor: A Case Study On Southern Networks, Katina Michael Dec 2006

Knowledge Sharing And Organizational Change In A Leading Telecommunications Equipment Vendor: A Case Study On Southern Networks, Katina Michael

Faculty of Informatics - Papers (Archive)

In 1999 Southern Networks deployed the Open Text Livelink knowledge management system (KMS). Livelink allowed for the centralization of key corporate applications and associated content at a global, regional, line-of-business, departmental and personal level. Prior to the implementation of Livelink on an enterprise scale, the corporation’s 94,500 employees relied on fragmented departmental web pages which were scattered across eleven different Web servers making the task of finding information very difficult. This paper describes how the process of knowledge transfer at Southern Networks changed with the deployment of Livelink and how it enabled the automation of workflows through the company’s Web-based …


The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael Dec 2006

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …


Modeling Evaluation Of Continuous Queries On Sliding Windows, Anita Dani, Janusz Getta Dec 2006

Modeling Evaluation Of Continuous Queries On Sliding Windows, Anita Dani, Janusz Getta

Faculty of Informatics - Papers (Archive)

One of the distinguishing characteristics of a data stream system is 'a continuous query operating on dynamic data' as opposed to 'static data processed by instantaneous query' in DBMS. Due to potentially infinite size of the stream a query is evaluated after forming finite subsets of the data stream. The sliding window model is the most suitable model for processing finite subsets of a data stream where only recent data items qualify. In this paper, we propose a mathematical model to express a continuous query on sliding windows. This model expresses a window as an ordered set. Its sliding mechanism …


Phase Unwrapping Of Self-Mixing Signals Observed In Optical Feedback Interferometry For Displacement Measurement, Lu Wei, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Dec 2006

Phase Unwrapping Of Self-Mixing Signals Observed In Optical Feedback Interferometry For Displacement Measurement, Lu Wei, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

With an Optical feedback interferometry (OFI), a self-mixing signal (SMS) can be observed and employed to determine parameters of the semiconductor laser and metrological quantities of an object. In the cases of the measurement of the movement trace of an external target, phase unwrapping of the SMS must be performed, which remains a challenging issue. We report a technique for achieving phase unwrapping of the SMS signals as follows. Firstly, the behaviour of the phase equation of the OFI is studied, based on which general laws for laser phase change with respect to external target movement is extracted. Secondly, the …


Improving The Measurement Accuracy Of Fbg Sensor Using Adaptive Filters, Xingyuan Xu, Jiangtao Xi, Joe F. Chicharo Dec 2006

Improving The Measurement Accuracy Of Fbg Sensor Using Adaptive Filters, Xingyuan Xu, Jiangtao Xi, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

Adaptive filters are presented for improving the wavelength detection accuracy of FBG sensors within a sensing system which use tunable laser source. Simulation results demonstrated that by using this technique the Bragg wavelengths of the FBG sensors can be accurately detected. In addition, the filter with NMLS-OCF adaptive algorithm performs faster convergence than the other algorithms.


Improving The Performance Of Iwdm Fbg Sensing System Using Tabu-Gradient Search Algorithm, Xingyuan Xu, Joe F. Chicharo, Jiangtao Xi Dec 2006

Improving The Performance Of Iwdm Fbg Sensing System Using Tabu-Gradient Search Algorithm, Xingyuan Xu, Joe F. Chicharo, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

A Tabu-gradient search algorithm is presented for improving the performance of FBG sensors in an intensity and wavelength-division multiplexed sensing system. Simulation results demonstrated that by using this technique the Bragg wavelengths of the FBG sensors can be accurately and quickly detect even when the original spectrums of FBG sensors can not be pre-determined.


Fringe Calibration Using Neural Network Signal Mapping For Structured Light Profilometers, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo Dec 2006

Fringe Calibration Using Neural Network Signal Mapping For Structured Light Profilometers, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

We present a novel neural network signal calibration technique to improve the performance of triangulation based structured light profilometers. The performance of such profilometers is often hindered by the capture of noisy and aberrated pattern intensity distributions. We address this problem by employing neural networks and a spatial digital filter in a signal mapping approach. The performance of the calibration technique is gauged through both simulation and experimentation, with simulation results indicating that accuracy can be improved by more than 80%.


Optimal Filtering Based Shift Estimation For Fringe Pattern Profilometry By Generalized Analysis Model, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang Dec 2006

Optimal Filtering Based Shift Estimation For Fringe Pattern Profilometry By Generalized Analysis Model, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang

Faculty of Informatics - Papers (Archive)

This paper presents a new algorithm for fringe pattern parofilometry by utilizing generalized analysis model, called optimal filtering based shift estimation (OFSE) method, which provides much lower complexity compared with traditional methods. Meanwhile, as OFSE is derived based on the generalized analysis model, the reconstruction results will not be influenced by the nonlinearity of fringe pattern projection and acquisition system. The efficiency of the proposed OFSE method is confirmed by simulation results, which show that the accuracy of three-dimensional reconstruction using digital fringe pattern profilometry technique can be much improved and the computational complexity can be significantly reduced.


Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper Dec 2006

Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper

Faculty of Informatics - Papers (Archive)

This paper describes an inexpensive, robust method for tracking the head position and orientation of the user by using a single low-cost USB camera and infrared light emitting diodes concealed within spectacle frames worn by the user. Unlike gaze and head-pose tracking systems which rely on high-resolution stereo cameras and complex image processing hardware and software to find and track facial features on the user, the proposed system is able to efficiently locate and track the head's orientation and distance relative to the camera with little processing. Due to the infrared light emitting diodes having fixed geometry, the system does …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael Dec 2006

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu Dec 2006

Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Faculty of Informatics - Papers (Archive)

A key impediment to the widespread adoption of web services is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to varying degrees. In …


Facilitating Universal Multimedia Adaptation (Uma) In A Heterogeneous Peer-To-Peer Network, L. Rong, I. Burnett Dec 2006

Facilitating Universal Multimedia Adaptation (Uma) In A Heterogeneous Peer-To-Peer Network, L. Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper proposes a P2P architecture which uses MPEG-21 as a standard based technique to dynamically adapt resources according to various usage environment attributes such as terminal capabilities and user preferences. In the architecture, a super peer based approach is used to cluster peers, store peer information, perform searches and instruct peers to adapt/send resources. Pull and push-based adaptation methods are introduced to adapt search results and resources in an intelligent manner based on the usage environment attributes. Simulation results show that the proposed architecture reduces download time while increasing resource availabilities and download speed in the network when compared …


Enhancing Interoperability Via Generic Multimedia Syntax Translation, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz Dec 2006

Enhancing Interoperability Via Generic Multimedia Syntax Translation, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz

Faculty of Informatics - Papers (Archive)

The Bitstream Binding Language (BBL) is a new technology developed by the authors and being standardized by MPEG, which describes how multimedia content and metadata can be mapped onto streaming formats. This paper describes how BBL can be used to enhance the interoperability of multimedia content by providing a generic mechanism for the translation of content between formats. As new content formats are developed, BBL can be used to describe how to translate the content into a form that existing devices are able to render. This consequently simplifies the adoption of new multimedia content forms because existing devices are able …


Adopting Default Reasoning In Service Composition Context, Zheng Lu, Aditya K. Ghose, Peter Hyland Dec 2006

Adopting Default Reasoning In Service Composition Context, Zheng Lu, Aditya K. Ghose, Peter Hyland

Faculty of Informatics - Papers (Archive)

Web Service composition is the ability of one business to provide value-added services to its customers through the composition of basic Web services, possibly offered by different companies [12]. Because of distributed responsibilities, ownership and control, it is often not feasible to acquire all information needed for service composition. These characteristics are fundamental to service oriented computing but make it inherently difficult to avoid service conflicts. To reason about and adapt to a changing environment, in this work, we will extend current OWL-S by introducing the concept of service assumptions which allow reasoning with incomplete information. Furthermore, together with the …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Extending Semantic Web Service Description By Service Assumption, Zheng Lu, Shiyan Li, Aditya K. Ghose, Peter Hyland Dec 2006

Extending Semantic Web Service Description By Service Assumption, Zheng Lu, Shiyan Li, Aditya K. Ghose, Peter Hyland

Faculty of Informatics - Papers (Archive)

Unlike a traditional software module, which runs within a predictable domain, Web Services are autonomous software agents running in a heterogeneous execution environment. Because of distributed responsibilities, ownership and control, it is often not feasible to acquire all information needed for the service composition. These characteristics of autonomy and heterogeneity are fundamental to service oriented computing but make it inherently difficult to avoid service conflicts. To reason about and adapt to a changing environment, in this work, we will extend current OWL-S by introducing the concept of service assumptions which allow reasoning with incomplete information. Furthermore, together with the proposed …


Detecting Policy Violations Through Traffic Analysis, J. Horton, R. Safavi-Naini Dec 2006

Detecting Policy Violations Through Traffic Analysis, J. Horton, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, a permitted protocol can be used as a carrier for another protocol not otherwise permitted. However, if the observable behaviour of the protocol exhibits differences between permitted and non-permitted uses, it is possible to detect inappropriate use. We consider SSH, the Secure Shell protocol. This is an encrypted protocol with several uses. We attempt firstly to classify SSH sessions according to some different types of traffic for which the sessions have been used, …


Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose Dec 2006

Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Agent-Oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the CASO language. In addition, we suggest a hybrid modelling, or co-evolution, approach in which i* models and CASO agent programs are concurrently maintained and updated, while retaining some modicum of loose consistency between the two. This allows us to benefit from the complementary …


Sector Driven Variations On E-Commerce Adoption Barriers In Regional Small Businesses: An Australian Study, Robert Macgregor, L. Vrazalic Nov 2006

Sector Driven Variations On E-Commerce Adoption Barriers In Regional Small Businesses: An Australian Study, Robert Macgregor, L. Vrazalic

Faculty of Informatics - Papers (Archive)

Despite being a described as a "business enabling technology", e-commerce has not been embraced by the small businesses sector to the extent that it has in larger organisations. This situation has arisen due to a number of e-commerce barriers faced by small businesses. A number of studies have examined these barriers, however, our understanding of their role in e-commerce adoption remains somewhat superficial. This paper presents the results of a large study of Australian small businesses located in a regional area which explored the relationship between business sectors (industrial, retail and service) and e-commerce barriers. The results indicate that service …


An Examination Of The Driving Forces Behind Ict Adoption In Australian Rural And Regional Medical Practices, Robert Macgregor, P. N. Hyland, Charles Harvie, B. C. Lee Nov 2006

An Examination Of The Driving Forces Behind Ict Adoption In Australian Rural And Regional Medical Practices, Robert Macgregor, P. N. Hyland, Charles Harvie, B. C. Lee

Faculty of Informatics - Papers (Archive)

The use of information and communication technology (ICT) within the Australian general practice sector has been widely researched and is well documented. This paper adds to the knowledge by using data collected from 122 regional medical practitioners to show that the driving forces behind the adoption and use of ICTs can be grouped according to three factors: improvement to business and medical care, external pressure exerted by other practices, patients and medical authorities and the need to communicate with other businesses as well as medical groups.