Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 4351 - 4380 of 5573

Full-Text Articles in Physical Sciences and Mathematics

Environmental Issues In Latin America And The Caribbean - Preface, Aldemaro Romero Jr., Sarah E. West Jan 2005

Environmental Issues In Latin America And The Caribbean - Preface, Aldemaro Romero Jr., Sarah E. West

Publications and Research

No abstract provided.


Revising And Unifying The Use Case Textual And Graphical Worlds, Pierre Metz Jan 2005

Revising And Unifying The Use Case Textual And Graphical Worlds, Pierre Metz

Theses

This thesis traces the evolution of use cases and use case relationships from the initial suggestion by Jacobson et al. in OOSE until today. This tracing reveals that there are two distinct streams of development, as referred in this thesis to as the “textual world” and the “graphical world”: the textual world being literature concentrating on textual use case properties, i.e. use case writing techniques and use case templates. The second stream that has been developed in parallel with the use case template progression is UML, i.e. Unified Modeling Language, which defines the standard for the use case diagram notation …


To Develop A Process For The Fabrication Of Thin Film Copper Rf Coils On Glass By Sputter Deposition., Eleanor Maria Baldwin Jan 2005

To Develop A Process For The Fabrication Of Thin Film Copper Rf Coils On Glass By Sputter Deposition., Eleanor Maria Baldwin

Theses

A fabrication process was developed to produce thin film probe coils for use in high resolution NMR spectroscopy. Sputter deposited thin film copper coils in the micron range were investigated as a potential replacement for the traditional 1mm diameter copper wire coils currently used.

In NMR spectroscopy higher resolution may be achieved by employing higher field strength magnets which increases the intensity of the inherently weak NMR signal. A reduction in the mass of the copper probe coil through thin film deposition was anticipated to reduce the disturbance to the homogeneity of the magnetic field at higher field strengths. This …


Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed Jan 2005

Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed

Electronic Theses and Dissertations

In this dissertation, we present vision based scene interpretation methods for monitoring of people and vehicles, in real-time, within a busy environment using a forest of co-operative electro-optical (EO) sensors. We have developed novel video understanding algorithms with learning capability, to detect and categorize people and vehicles, track them with in a camera and hand-off this information across multiple networked cameras for multi-camera tracking. The ability to learn prevents the need for extensive manual intervention, site models and camera calibration, and provides adaptability to changing environmental conditions. For object detection and categorization in the video stream, a two step detection …


Simulation Studies Of Self-Assembly And Phase Diagram Of Amphiphilic Molecules, Geuorgui Kostadinov Bourov Jan 2005

Simulation Studies Of Self-Assembly And Phase Diagram Of Amphiphilic Molecules, Geuorgui Kostadinov Bourov

Electronic Theses and Dissertations

The aim of this dissertation is to investigate self-assembled structures and the phase diagram of amphiphilic molecules of diverse geometric shapes using a number of different computer simulation methods. The semi-realistic coarse-grained model, used extensively for simulation of polymers and surfactant molecules, is adopted in an off-lattice approach to study how the geometric structure of amphiphiles affects the aggregation properties. The results of simulations show that the model system behavior is consistent with theoretical predictions, experiments and lattice simulation models. We demonstrate that by modifying the geometry of the molecules, self-assembled aggregates are altered in a way close to theoretical …


Adaptive Decision Support For Academic Course Scheduling Using Intelligent Software Agents, Prithviraj Dasgupta, Deepak Khazanchi Jan 2005

Adaptive Decision Support For Academic Course Scheduling Using Intelligent Software Agents, Prithviraj Dasgupta, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Academic course scheduling is a complex operation that requires the interaction between different users including instructors and course schedulers to satisfy conflicting constraints in an optimal manner. Traditionally, this problem has been addressed as a constraint satisfaction problem where the constraints are stationary over time. In this paper, we address academic course scheduling as a dynamic decision support problem using an agent-enabled adaptive decision support system. In this paper, we describe the Intelligent Agent Enabled Decision Support (IAEDS) system, which employs software agents to assist humans in making strategic decisions under dynamic and uncertain conditions. The IAEDS system has a …


Assessment And In Vitro Repair Of Damaged Dna Templates From Forensic Stains, Ashley Hall Jan 2005

Assessment And In Vitro Repair Of Damaged Dna Templates From Forensic Stains, Ashley Hall

Electronic Theses and Dissertations

DNA extracted from biological stains is often intractable to analysis. This may due to a number of factors including a low copy number (LCN) of starting molecules, the presence of soluble inhibitors or damaged DNA templates. Remedies may be available to the forensic scientist to deal with LCN templates and soluble inhibitors but none presently exist for damaged DNA. In fact, only recently has the biochemical nature, the extent of DNA damage in physiological stains and the point at which the damage inflicted upon a particular sample precludes the ability to obtain a genetic profile for purposes of identification been …


Spin-Dependent Transport In Fe And Fe/Au Multilayers, Theodore L. Monchesky, Axel Enders, R. Urban, Kenneth Myrtle, Brett Heinrich, X.-G. Zhang, William H. Butler, J. Kirschner Jan 2005

Spin-Dependent Transport In Fe And Fe/Au Multilayers, Theodore L. Monchesky, Axel Enders, R. Urban, Kenneth Myrtle, Brett Heinrich, X.-G. Zhang, William H. Butler, J. Kirschner

Axel Enders Publications

In situ resistance measurements of epitaxial Fe layers and Au/Fe bilayers were used to quantify the scattering in giant magnetoresistance (GMR) spin valve structures. The semiclassical Boltzmann transport equation, incorporating first-principles local density functional calculations, fitted the thickness dependence of the conductivity. Fits to the data indicate that Fe has a large spin asymmetry with bulk relaxation times τ↓=3.0 × 10−14 s and τ↑=2.5 × 10−15 s. These give a conductivity equal to that of bulk Fe. The interface scattering from the Fe/GaAs, the Fe/vacuum, and the Au/vacuum interfaces is purely diffuse. This is in contrast to the …


Dynamics Of Filament Formation In A Kerr Medium (With Erratum), Martin Centurion, Ye Pu, Mankei Tsang, Demetri Psaltis Jan 2005

Dynamics Of Filament Formation In A Kerr Medium (With Erratum), Martin Centurion, Ye Pu, Mankei Tsang, Demetri Psaltis

Martin Centurion Publications

We have studied the large-scale beam breakup and filamentation of femtosecond pulses in a Kerr medium. We have experimentally monitored the formation of stable light filaments, conical emission, and interactions between filaments. Three major stages lead to the formation of stable light filaments: First the beam breaks up into a pattern of connected lines (constellation), then filaments form on the constellations, and finally the filaments release a fraction of their energy through conical emission. We observed a phase transition to a faster filamentation rate at the onset of conical emission. We attribute this to the interaction of conical emissions with …


Using Process Modelling To Capture Requirements For A Digital Library, Michael Johnstone Jan 2005

Using Process Modelling To Capture Requirements For A Digital Library, Michael Johnstone

Research outputs pre 2011

This paper describes the results of an action research study which explored how IT professionals used process modelling to capture requirements and design artefacts concerning a digital library system. The intention was to produce a web-based, non-relational (XML) database system to store publications of various types and to allow public domain access to the system. Traditionally, such systems are constructed with a data-oriented design, with little attention being paid to process concerns. In this study, process, described by business rules, was defined first which provides advantages as many business systems (including library systems) are often process-oriented. The team involved in …


An Ant Colony Optimization Approach To Test Sequence Generation For State-Based Software Testing, Huaizhong Li, Chiou Peng Lam Jan 2005

An Ant Colony Optimization Approach To Test Sequence Generation For State-Based Software Testing, Huaizhong Li, Chiou Peng Lam

Research outputs pre 2011

Properly generated test suites may not only locate the defects in software systems, but also help in reducing the high cost associated with software testing, ft is often desired that test sequences in a test suite can be automatically generated to achieve required test coverage. However, automatic test sequence generation remains a major problem in software testing. This paper proposes an ant colony optimization approach to automatic test sequence generation for state-based software testing. The proposed approach can directly use UML artifacts to automatically generate test sequences to achieve required test coverage.


Using Adaptive Agents To Automatically Generate Test Scenarios From The Uml Activity Diagrams, Dong Xu, Huaizhong Li, Chiou Peng Lam Jan 2005

Using Adaptive Agents To Automatically Generate Test Scenarios From The Uml Activity Diagrams, Dong Xu, Huaizhong Li, Chiou Peng Lam

Research outputs pre 2011

Test case generation is one of the most important issues in software testing research and industrial practice. Test scenarios are frequently used to derive test cases for scenario-based software testing. However, the generation of the test scenarios is usually a manual and labor-intensive task. It is desired that test scenarios can be automatically generated. In this paper, we propose an automated approach using adaptive agents to directly generate test scenarios from the UML activity diagrams.


Storybook: Extending A Personalised Interactive Learning Environment To Children With Severe Learning Disabilities, Michael Collins, Sundrakanthi Singh Jan 2005

Storybook: Extending A Personalised Interactive Learning Environment To Children With Severe Learning Disabilities, Michael Collins, Sundrakanthi Singh

Research outputs pre 2011

Not all recipients of eLearning map well for measurement by such as the Kirkpatrick model, especially young students with severe learning disabilities. StoryBook is a tool specifically designed to aid teachers to create and include a simple, enjoyable, tailored interactive computer-based audio/visual learning environment as part of a custom curriculum for such students. In it, stories are currently gathered into libraries suitable for unique individuals or more common content, on a local, classroom basis. We describe prototype software for eLearning for such students, already trialled in a special educational unit in Perth, Western Australia. We then outline plans for a …


A Uk And Australian Study Of Hard Disk Disposal, Craig Valli, Andrew Jones Jan 2005

A Uk And Australian Study Of Hard Disk Disposal, Craig Valli, Andrew Jones

Research outputs pre 2011

Recent studies in Australia and the United Kingdom indicate that a broad cross-section of organisations are failing to adequately protect or erase confidential data stored on hard disk drives before subsequent disposal. Over 90% of hard disks that were examined as a result of the two Independent studies were in an easily recoverable state with some drives simply requiring a boot. This paper will give an overview and comparison of the two studies conducted. Then an examination of possible factors responsible for the inadequate erasure of hard disk devices will be undertaken. Furthermore, possible future research directions will also be …


After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli Jan 2005

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …


Analysis Of Channel Estimation Error Of Ofdm Systems In Rayleigh Fading, Bin Jiao, Jitian Xiao, Jinlin Wang Jan 2005

Analysis Of Channel Estimation Error Of Ofdm Systems In Rayleigh Fading, Bin Jiao, Jitian Xiao, Jinlin Wang

Research outputs pre 2011

In wireless OFDM applications, since the radio channel is frequency selective and time-varying, a dynamic estimation of channel must be achieved before the demodulation of the transmitted OFDM signals. As an effective approach for solving the channel estimation problems, the pilot-assisted channel estimation technique has received considerable attention in recent years. In this paper, we investigate the channel estimation error in the existing pilot-assisted channel estimation approaches in detail, a new effective channel estimation approach with lower estimation error is proposed as well.


A Bipartite Graph Approach To Generate Optimal Test Sequences For Protocol Conformance Testing Using The Wp-Method, Jun Wang, Jitian Xiao, Chiou Peng Lam, Huaizhong Li Jan 2005

A Bipartite Graph Approach To Generate Optimal Test Sequences For Protocol Conformance Testing Using The Wp-Method, Jun Wang, Jitian Xiao, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

Conformance testing using test sequences is used to ensure that a protocol implementation conforms to its specification. A commonly used technique to generate test sequences for specifications described by the finite state machines is the Wp-method with the Reset technique, which frequently results in long test sequences. In this paper, we propose a bipartite graph approach to generate optimal test sequences for protocol conformance testing. Our approach significantly reduces the length of the test sequences required for conformance testing while maintaining the same fault detection capability.


Using In-Depth Interviewing To Evaluate Deep Learning In Students Who Use Online Curriculum: A Literature Review, Maria Woodhouse Jan 2005

Using In-Depth Interviewing To Evaluate Deep Learning In Students Who Use Online Curriculum: A Literature Review, Maria Woodhouse

Research outputs pre 2011

There are numerous difficulties associated with evaluating student experience of online curriculum, not least of which is the fact that different research methods elicit different types of information. The usefulness of choosing either quantitative or qualitative methods depends on their power to bear upon the research questions. This concept paper presents the learning experience as a qualitative event and argues that the in-depth interview is an apt tool for discovering to what extent students experience deep-learning in studying online subjects. To this end, this concept paper will consider the literature surrounding the in-depth interview as a research method. It will …


Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong Jan 2005

Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong

Research outputs pre 2011

Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-enable smartphones, leading to severe data breaches. This paper gives an insight on potential security vulnerabilities in Bluetooth-enabled smartphones and how these vulnerabilities may affect smartphone users. This paper is discussed from the viewpoint of Bluetooth weaknesses and implementation flaws, which includes pairing, weak key storage, key disclosure, key …


Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins Jan 2005

Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins

Research outputs pre 2011

A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fabrication has been focused on the unlawful or the malicious use of created identities. Admittedly, the primary intention of a falsified identity is to usually gain a financial benefit however, instances such as long-term witness protection would provide a legitimate need …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson Jan 2005

A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson

Research outputs pre 2011

The Internet provides a wealth of resources and opportunities for enhancing professional education. In professional education courses for archivists and records managers, students can shape their own learning and develop professional skills through authentic assessment strategies which require them to find, analyse and evaluate policy documents and best practice standards published by leading archival organizations. Use of online discussion facilities provided by the ECU School of Computer and Information Science's eCourse system allows students to engage in professional discussion just as they would in the workplace while developing communication and information literacy skills. Student evaluations of this form of assessment …


Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li Jan 2005

Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

Although attention has been given to the use of UML (Unified Modelling Language) activity diagrams in the generation of scenarios, thin-threads and test-cases, the processes described in the literature rely heavily on manual intervention either in the information extraction process or in the process of transforming them to an alternate structure. This paper introduces an approach that capture, store and output usage scenarios derived automatically from UML activity diagrams.


From Smorgasbord To Satisfying Meal: An Holistic Approach To Information Literacy And Lifelong Learning, Barbara Combes Jan 2005

From Smorgasbord To Satisfying Meal: An Holistic Approach To Information Literacy And Lifelong Learning, Barbara Combes

Research outputs pre 2011

Educators have long recognised the potential offered by technology as a tool for learning. However, there have been few attempts to provide teachers in the classroom with a framework that assist them to embed technology into curriculum programs in a pedagogically sound manner. This paper details the development and implementation of a module of online curriculum developed for Year Eleven Food Technology (sixteen years of age) students. The module was developed using a framework (CLEO - Curriculum Learning and Education Online) that embeds learning technologies, utilises industry partnerships, has cross curriculum outcomes, scaffolds information literacy skills development and was the …


Enumerating Knight's Tours Using An Ant Colony Algorithm, Philip Hingston, Graham Kendall Jan 2005

Enumerating Knight's Tours Using An Ant Colony Algorithm, Philip Hingston, Graham Kendall

Research outputs pre 2011

In this paper, we show how an ant colony optimisation algorithm may be used to enumerate knight's tours for variously sized chessboards. We have used the algorithm to enumerate all tours on 5×5 and 6×6 boards, and, while the number of tours on an 8×8 board is too large for a full enumeration, our experiments suggest that the algorithm is able to uniformly sample tours at a constant, fast rate for as long as is desired.


Designing Comminution Circuits With A Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, Richard Bearman Jan 2005

Designing Comminution Circuits With A Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, Richard Bearman

Research outputs pre 2011

Mining is an important industry in Australia, contributing billions of dollars to the economy. The performance of a processing plant has a large impact on the profitability of a mining operation, yet plant design decisions are typically guided more by intuition and experience than by analysis. In this paper, we motivate the use of an evolutionary algorithm to aid in the design of such plants. We formalise plant design in terms suitable for application in a multi-objective evolutionary algorithm and create a simulation to assess the performance of candidate solutions. Results show the effectiveness of this approach with our algorithm …


Information Security: A Misnomer, William Hutchinson Jan 2005

Information Security: A Misnomer, William Hutchinson

Research outputs pre 2011

This paper argues that the definition of 'information' is crucial to the understanding of 'information security'. At present, information security concentrates on the technological aspects of data, computer and network security. This computer-centric approach ignores the fact that the majority of information within an organisation is derived from other sources than computer stored data. The implications for security are that much data can be leaked from an organisation even if the computer and network systems are secured.


Architecture For Self-Estimation Of Security Level In Ad Hoc Network Nodes, Reijo Savola Jan 2005

Architecture For Self-Estimation Of Security Level In Ad Hoc Network Nodes, Reijo Savola

Research outputs pre 2011

Inherent freedom due to a lack of central authority of self-organised mobile ad hoc networks introduces challenges to security and trust management. In these kinds of scenarios, the nodes themselves are naturally responsible for their own security – or they could trust certain known nodes, called “micro-operators”. We propose an architecture for security management in self-organising mobile ad hoc networks that is based on the nodes’ own responsibility and node-level security monitoring. The aim is to predict, as well as to monitor the security level concentrating on the principal effects contributing to it.


Understanding Transition Towards Information Security Culture Change, Leanne Ngo, Wanlei Zhou, Matthew Warren Jan 2005

Understanding Transition Towards Information Security Culture Change, Leanne Ngo, Wanlei Zhou, Matthew Warren

Research outputs pre 2011

Transitioning towards an information security culture for organisations has not been adequately explored in the current security and management literature. Many authors have proposed how information security culture can be created, fostered and managed within organisations, but have failed to adequately address the transition process towards information security culture change, particularly for small medium enterprises (SMEs). This paper aims to (1) recapitulate key developments and trends within information security culture literature; (2) explore in detail the transition process towards organisational change; (3) adapt the transition process with respects to the key players involved in transition and propose a transition model …


An Investigation Into The Paradox Of Organisational Flexibility Versus Security: A Research Project, Rosanna Fanciulli Jan 2005

An Investigation Into The Paradox Of Organisational Flexibility Versus Security: A Research Project, Rosanna Fanciulli

Research outputs pre 2011

The trend towards utilising geographically and temporally dispersed personnel has grown quickly over the past decade; enabled by swift advances in computing, telecommunications, and networking technologies. The impact of these developments on corporate strategies and forms has manifested itself in a move to de-legitimise the rigid structure of a traditional bureaucracy and move towards one that is more flexible. These new technologies and organisational structures, however, also bring with them Information Security threats and risks. It is critical that managers become informed and equipped to deal with these issues. This paper presents an ongoing study designed to determine the major …