Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 4651 - 4680 of 6758

Full-Text Articles in Physical Sciences and Mathematics

Research On Bandwidth Reservation In Ieee 802.16 (Wimax) Networks, Yi Sun, Yilin Song, Jinglin Shi, Eryk Dutkiewicz Jan 2007

Research On Bandwidth Reservation In Ieee 802.16 (Wimax) Networks, Yi Sun, Yilin Song, Jinglin Shi, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

According to the characteristics and QoS requirements of different types of service flows, this paper proposes a dynamic, prediction-based, multi-class, adaptive bandwidth reservation scheme for IEEE 802.16 (WiMAX) networks. The scheme adopts different bandwidth reservation and admission control policies to different types of service flows and therefore guarantees that the real-time sessions have higher priorities than non real-time sessions and that handover sessions have higher priorities than new sessions. In addition, a bandwidth reservation adaptation algorithm is also proposed. The algorithm adjusts the amount of bandwidth reserved for handover sessions according to the current network conditions thus creating a balance …


Modeling And Solving Semiring Constraint Satisfaction Problems By Transformation To Weighted Semiring Max-Sat, Louise Leenen, Anbulagan Anbulagan, Thomas Meyer, Aditya K. Ghose Jan 2007

Modeling And Solving Semiring Constraint Satisfaction Problems By Transformation To Weighted Semiring Max-Sat, Louise Leenen, Anbulagan Anbulagan, Thomas Meyer, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

We present a variant of the Weighted Maximum Satisfiability Problem(Weighted Max-SAT), which is a modeling of the Semiring Con- straint Satisfaction framework. We show how to encode a Semiring Con- straint Satisfaction Problem (SCSP) into an instance of a propositional Weighted Max-SAT, and call the encoding Weighted Semiring Max-SAT (WS-Max-SAT). The clauses in our encoding are highly structured and we exploit this feature to develop two algorithms for solving WS-Max- SAT: an incomplete algorithm based on the well-known GSAT algorithm for Max-SAT, and a branch-and-bound algorithm which is complete. Our preliminary experiments show that the translation of SCSP into WS- …


Analyzing The Key Variables In The Adoption Process Of Hl7, Alejandro E. Flores Zuniga, Khin Than Win Jan 2007

Analyzing The Key Variables In The Adoption Process Of Hl7, Alejandro E. Flores Zuniga, Khin Than Win

Faculty of Informatics - Papers (Archive)

The intention of this paper is to provide an analysis of variables that could affect the adoption of HL7 message standard. Based on the review of 33 cases where HL7 was successfully implemented the authors present relevant evidence related to inherent limitation of HL7. The result from this study indicates that it is necessary to enhance the standard to overcome particular limitations and facilitate the implementation of inter-institutional software interfaces based on HL7.


A Wireless Sensor Node Architecture Using Remote Power Charging, For Interaction Applications, Matthew D'Souza, Konstanty Bialkowski, Adam Postula, Montserrat B. Ros Jan 2007

A Wireless Sensor Node Architecture Using Remote Power Charging, For Interaction Applications, Matthew D'Souza, Konstanty Bialkowski, Adam Postula, Montserrat B. Ros

Faculty of Informatics - Papers (Archive)

The wireless sensor node architecture proposed inthis paper is optimized for use in a wireless interactivepoint, listen and see system. In particular, we focus ondeveloping a wireless sensor node that can beremotely charged by harvesting microwave energy.The current system implementation allows a user toaccess information from a remote sensor via theirmobile computing device. These sensors are limited incomplexity due to the limited power available, and arecumbersome since manual intervention is required toreplace its batteries. We propose a system wherebattery powered wireless sensor nodes can berecharged by harvesting energy from a microwaveRadio Frequency (RF) signal source. The remotepower charging module of …


The Benefits & Concerns Of Public Data Availability In Australia: A Survey Of Security Experts, Roba Abbas Jan 2007

The Benefits & Concerns Of Public Data Availability In Australia: A Survey Of Security Experts, Roba Abbas

Faculty of Informatics - Papers (Archive)

This paper gauges the attitudes of security experts in Australia with regards to public data availability on critical infrastructure protection (CIP). A qualitative survey was distributed to a individuals considered experts in CIP-related research in Australia, in order to address the censorship versus open access debate concerning public data. The intention of the study was to gain an insight into the perceived benefits and threats of public data availability by security experts, and to provide the basis for a security solution to be utilised by the Australian Government sector (at all levels). The findings however can also be applied to …


Ber-Delay Characteristics Analysis Of Ieee 802.15.4 Wireless Sensor Networks With Cooperative Mimo, Mohd Riduan Bin Ahmad, Eryk Dutkiewicz, Xiaojing Huang Jan 2007

Ber-Delay Characteristics Analysis Of Ieee 802.15.4 Wireless Sensor Networks With Cooperative Mimo, Mohd Riduan Bin Ahmad, Eryk Dutkiewicz, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

This paper presents a study of the impact of transmission delay differences between co-operating nodes on bit error rate performance and energy consumption of wireless sensor networks. We consider a wireless sensor network using an Alamouti virtual MIMO (multiple-input multiple-output) configuration between collaborating nodes operating in quasi-static Rayleigh flat-fading channels. Our results show that above certain delay difference (in the range above 0.75Tb), the traditional non-cooperative approach is more energy-efficient than the cooperative strategy and that the transmission delay difference has the most significant on the transmission energy consumption in the delay range of below 0.75Tb.


Performance Improvement And Dynamical Behaviour Analysis Of A Cascade Of Two Cstrs, Harvinder S. Sidhu, Simon D. Watt, Mark I. Nelson, Ajay K. Ray Jan 2007

Performance Improvement And Dynamical Behaviour Analysis Of A Cascade Of Two Cstrs, Harvinder S. Sidhu, Simon D. Watt, Mark I. Nelson, Ajay K. Ray

Faculty of Informatics - Papers (Archive)

We revisit the analysis of a reactor network consisting of two coupled continuous stirred tank reactors (CSTRs) arranged in series (Chem. Eng. J. 59 (1995) 169). The main idea proposed in this earlier work is to improve process conversion by generating periodic behaviour in the first reactor (by appropriate choice of design and operational parameters) which then ‘forces’ the second reactor. The performance of this cascade system was shown to be greatly enhanced using the above strategy. In this paper we show some conceptual errors in the analysis in the original paper. We also show that by employing a systematic …


Becoming Multiliterate: Digital Video News Construction Within A Technology-Supported Learning Environment, Lori Lockyer, Ian M. Brown, David Blackall, Barry M. Harper, Phillip J. Mckerrow Jan 2007

Becoming Multiliterate: Digital Video News Construction Within A Technology-Supported Learning Environment, Lori Lockyer, Ian M. Brown, David Blackall, Barry M. Harper, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

Twenty-first century literacies imply multiliteracies – going beyond language literacy and numeracy to, among others, information, visual, media and technological literacies. An education that develops capabilities across a range of literacies equips young people with the skills necessary to participate in a complex, globalized workplace and community. A key step toward realizing such national and state education agendas is specific curriculum interventions that are translated to the classroom level. This paper reports on a case study that explored both the process and outcomes of the implementation of an education program which was designed to incorporate multiliteracies.


System Architecture And Mobility Management For Mobile Immersive Communications, Mehran Dowlatshahi, Farzad Safaei Jan 2007

System Architecture And Mobility Management For Mobile Immersive Communications, Mehran Dowlatshahi, Farzad Safaei

Faculty of Informatics - Papers (Archive)

We propose a system design for delivery of immersive communications to mobile wireless devices based on a distributed proxy model. It is demonstrated that this architecture addresses key technical challenges for the delivery of these services, that is, constraints on link capacity and power consumption in mobile devices. However, additional complexity is introduced with respect to application layer mobility management. The paper proposes three possible methods for updating proxy assignments in response to mobility management and compares the performance of these methods.


Modelling Mas-Specific Security Features, Ghassan Beydoun, Graham C. Low, Haralambos Mouratidis, Brian Henderson-Sellers Jan 2007

Modelling Mas-Specific Security Features, Ghassan Beydoun, Graham C. Low, Haralambos Mouratidis, Brian Henderson-Sellers

Faculty of Informatics - Papers (Archive)

In this paper, we pursue a modelling approach to address security requirements for multi-agent systems (MAS). This will allow developers to account for both the system and agent-specific security requirements of a MAS during the requirements phase and throughout the whole Software Development Lifecycle of the system. We focus on autonomy, mobility and cooperation of individual agents and how these create additional security vulnerabilities to the system. In proposing a set of generic modelling primitives for these engendered requirements in the analysis of the MAS, we extend our recently proposed MAS metamodel.


Scalability Of Manet Routing Protocols For Heterogeneous And Homogenous Networks, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki Jan 2007

Scalability Of Manet Routing Protocols For Heterogeneous And Homogenous Networks, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previous researches in MANET routing have focused on developing strategies, which suit one specific networking scenario. Therefore, there is no existing protocol that can work well in all different networking scenarios. This paper reviews characteristics of each different classes of routing protocols. Moreover, most of current routing protocols assume homogeneous networking conditions where all nodes have the same capabilities and resources. Although homogenous networks are easy to model and analysis, they exhibits poor scalability …


Do Suppliers Of Third Party Logistics Understand Their Customers?, Tim Coltman, Byron W. Keating, Anton Kriz Jan 2007

Do Suppliers Of Third Party Logistics Understand Their Customers?, Tim Coltman, Byron W. Keating, Anton Kriz

Faculty of Informatics - Papers (Archive)

Supply chain management (SCM) research has tended to focus on the planning and management of a broad range of activities involved in sourcing and procurement, conversion, and management of logistics. However, the domain is increasingly recognising the importance of coordination and collaboration between channel partners. As such, there is a need to better understand how channel partners make decisions; and in particular, whether there is an alignment in the expectations of these partners. In this study we use a form of discrete choice analyses to explore the relative importance of various supply chain components for buyers of a third party …


Group Extensions And The Primitive Ideal Spaces Of Toeplitz Algebras, Sriwulan Adji, Iain F. Raeburn, Rizky Rosjanuardi Jan 2007

Group Extensions And The Primitive Ideal Spaces Of Toeplitz Algebras, Sriwulan Adji, Iain F. Raeburn, Rizky Rosjanuardi

Faculty of Informatics - Papers (Archive)

Let Γ be a totally ordered abelian group and I an order ideal in Γ. We prove a theorem which relates the structure of the Toeplitz algebra T(Γ) to the structure of the Toeplitz algebras T(I) and T(Γ/I). We then describe the primitive ideal space of the Toeplitz algebra T(Γ) when the set Σ(Γ) of order ideals in Γ is well-ordered, and use this together with our structure theorem to deduce information about the ideal structure of T(Γ) when 0→ I→ Γ→ Γ/I→ 0 is a non-trivial group …


Something Smart Going On: The Apocalyptic Aesthetics Of Surveillance, Marcus O'Donnell Jan 2007

Something Smart Going On: The Apocalyptic Aesthetics Of Surveillance, Marcus O'Donnell

Faculty of Informatics - Papers (Archive)

This paper analyses surveillance as an integral element in contemporary discourses of the apocalyptic. It outlines a model of the apocalyptic that has its roots in the western religious tradition particularly the last book of the Christian bible: The Book of Revelation. It explores the intersecting narratives of surveillance, the apocalyptic and the forensic as a way of contextualising contemporary political, pop cultural and technological events. Each of these narratives play themselves out through a dialectical logic: surveillance is seen as bringing both intrusion and protection; the apocalypse is harbinger of both destruction and a new world; while the forensic …


The Largest Eigenvalue Characteristic Of Correlated Complex Wishart Matrices And Its Application To Mimo Mrc Systems, Xianyi Rui, Ronghong Jin, Junping Geng, Xiaojing Huang Jan 2007

The Largest Eigenvalue Characteristic Of Correlated Complex Wishart Matrices And Its Application To Mimo Mrc Systems, Xianyi Rui, Ronghong Jin, Junping Geng, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

In this paper, we analyze statistical properties of the largest eigenvalue of correlated complex Wishart matrices. The results provide an analytical tool for the study of multiple-input multiple-output (MIMO) maximal ratio combining (MRC) systems in the presence of spatial fading correlation at the transmitter or receiver. Based on them, the exact closed-form expressions for the cumulative distribution function and the probability density function of the output signal-to-noise ratio are presented. The analytical results are validated by Monte Carlo simulations.


Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola Jan 2007

Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola

Faculty of Informatics - Papers (Archive)

This paper presents a novel radio frequency identification (RFID) based vehicle immobilizer system, which features low hacking probability while preserving the safety of the passengers of the hijacked vehicle. The immobilizer uses the active RFID technology where the tag is generated with comparatively large character sets. The receiving unit is intelligently integrated into three control circuits in the vehicle, namely, ignition circuit, power control unit, and automatic gear changing system, enabling it to bring the vehicle speed down to zero in a safe step by step manner. The anti-theft auto security system proposed here was tested under different weather conditions …


Anisotropic Matern Correlation And Spatial Prediction Using Reml, K A. Haskard, Brian R. Cullis, A P. Verbyla Jan 2007

Anisotropic Matern Correlation And Spatial Prediction Using Reml, K A. Haskard, Brian R. Cullis, A P. Verbyla

Faculty of Informatics - Papers (Archive)

The Mat´ern correlation function provides great flexibility for modeling spatially correlated random processes in two dimensions, in particular via a smoothness parameter, whose estimation allows data to determine the degree of smoothness of a spatial process. The extension to include anisotropy provides a very general and flexible class of spatial covariance functions that can be used in a model-based approach to geostatistics, in which parameter estimation is achieved via REML and prediction is within the E-BLUP framework. In this article we develop a general class of linear mixed models using an anisotropic Mat´ern class with an extended metric. The approach …


Perceived Similarity And Visual Descriptions In Content-Based Image Retrieval, Yuan Zhong, Lei Ye, Wanqing Li, Philip Ogunbona Jan 2007

Perceived Similarity And Visual Descriptions In Content-Based Image Retrieval, Yuan Zhong, Lei Ye, Wanqing Li, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

The use of low-level feature descriptors is pervasive in content-based image retrieval tasks and the answer to the question of how well these features describe users’ intention is inconclusive. In this paper we devise experiments to gauge the degree of alignment between the description of target images by humans and that implicitly provided by low-level image feature descriptors. Data was collected on how humans perceive similarity in images. Using images judged by humans to be similar, as ground truth, the performance of some MPEG-7 visual feature descriptors were evaluated. It is found that various descriptors play different roles in different …


A Discussion About The Importance Of Laws And Policies For Data Sharing For Public Health In The People's Republic Of China, Xiue Fan, Ping Yu Jan 2007

A Discussion About The Importance Of Laws And Policies For Data Sharing For Public Health In The People's Republic Of China, Xiue Fan, Ping Yu

Faculty of Informatics - Papers (Archive)

This paper introduces the current status of data sharing in the People's Republic of China. It discusses barriers to data sharing and proposes three key solutions to overcome these barriers in China. The establishment of national laws and policies for data sharing is considered the key prerequisite to ensuring the successful implementation of resource sharing activities in public health. Driven by established laws and policies, the relevant operational models should be developed. It is also important to have strategies in place to ensure the established laws and policies are implemented by various organizations in different jurisdictions. These discussions are supported …


The Acceptance Of A Clinical It Innovation By The Care Givers In Residential Aged Care 11-Weeks After The Software Implementation In Australia, Ping Yu, Hui Yu, Yi Mu Jan 2007

The Acceptance Of A Clinical It Innovation By The Care Givers In Residential Aged Care 11-Weeks After The Software Implementation In Australia, Ping Yu, Hui Yu, Yi Mu

Faculty of Informatics - Papers (Archive)

End user acceptance and satisfaction with a new IT innovation is the pre-requisite for the successful introduction of this IT solutino into an organization. More than 70 per cent of health IT projects have failed to a certain extent because of its failure to satisfy the functional or non-functional requirements of the end users and thus were not accepted by them. To date, there is no sound evidence to suggest that clinical IT solutions will bring in benefits for a residential aged care facility. This is a real concern for aged care management in investment in clinical IT solutions in …


Automated Software Testing And Analysis: Techniques, Practices And Tools, Z. Q. Zhou, B. Scholz, G. Denaro Jan 2007

Automated Software Testing And Analysis: Techniques, Practices And Tools, Z. Q. Zhou, B. Scholz, G. Denaro

Faculty of Informatics - Papers (Archive)

As computer systems are permeating our society in daily life and are performing an increasing number of critical tasks, research in software testing and analysis has become of paramount importance. Although we are currently not able to prove program correctness for real-world applications, rigorous software development processes in combination with testing provides us with confidence in the quality of software. Software testing and analysis, however, is a very involved task. As the size and complexity of software continue to grow, manual testing becomes very tedious. Automation of software testing and tool support for testing, therefore, have been emerging as a …


Sampling Within Households In Household Surveys, Robert Graham Clark, David G. Steel Jan 2007

Sampling Within Households In Household Surveys, Robert Graham Clark, David G. Steel

Faculty of Informatics - Papers (Archive)

The number of people to select within selected households has significant consequences for the conduct and output of household surveys. The operational and data quality implications of this choice are carefully considered in many surveys, but the impact on statistical efficiency is not well understood. The usual approach is to select all people in each selected household, where operational and data quality concerns make this feasible. If not, one person is usually selected from each selected household. We find that this strategy is not always justified, and develop intermediate designs between these two extremes. Current practices were developed when household …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose Jan 2007

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Faculty of Informatics - Papers (Archive)

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


Relating Business Process Models To Goal-Oriented Requirements Models In Kaos, George Koliadis, Aditya K. Ghose Jan 2007

Relating Business Process Models To Goal-Oriented Requirements Models In Kaos, George Koliadis, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Business Process Management (BPM) has many anticipated benefits including accelerated process improvement, at the operational level, with the use of highly configurable and adaptive “process aware” information systems [1] [2]. The facility for improved agility fosters the need for continual measurement and control of business processes to assess and manage their effective evolution, in-line with organizational objectives. This paper proposes the GoalBPM methodology for relating business process models (modeled using BPMN) to high-level stakeholder goals (modeled using KAOS). We propose informal (manual) techniques (with likely future formalism) for establishing and verifying this relationship, even in dynamic environments where essential alterations …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose Jan 2007

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis Jan 2007

Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially non-compliant, in a manner that accommodates the structural and semantic dimensions of parsimoniously annotated process models. We also provide a heuristic approach to compliance resolution using a notion of compliance patterns. This allows us to partially automate compliance resolution, leading to reduced levels of analyst involvement …


Actor Eco-Systems: From High-Level Agent Models To Executable Processes Via Semantic Annotations, Aditya K. Ghose, George Koliadis Jan 2007

Actor Eco-Systems: From High-Level Agent Models To Executable Processes Via Semantic Annotations, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

We introduce the notion of an actor eco-system a framework that addresses the design-time requirements of building multi-actor (multi-agent) systems such as supply chains, business networks, virtual organizations etc. We describe how semantic annotation of abstract models of actor ecosystems can be used to derive executable process models that realize such systems. We outline a potentially powerful toolkit for model to code transformations in complex agentoriented settings.


Combining I* And Bpmn For Business Process Model Lifecycle Management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose Jan 2007

Combining I* And Bpmn For Business Process Model Lifecycle Management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

The premise behind ‘third wave’ Business Process Management (BPM1) is effective support for change at levels. Business Process Modeling (BPM2) notations such as BPMN are used to effectively conceptualize and communicate process configurations to relevant stakeholders. In this paper we argue that the management of change throughout the business process model lifecycle requires greater conceptual support achieved via a combination of complementary notations. As such the focus in this paper is on the co-evolution of operational (BPMN) and organizational (i*) models. Our intent is to provide a way of expressing changes, which arise in one model, effectively in the other …


Temporal Authorizations Scheme For Xml Documents, Jing Wu, Jennifer Seberry, Y. Mu Jan 2007

Temporal Authorizations Scheme For Xml Documents, Jing Wu, Jennifer Seberry, Y. Mu

Faculty of Informatics - Papers (Archive)

In a large system, XML documents associated with it can be large and complicated. To manage access control in such a large and complicated system is very difficult. Recently, Access Policy Sheet (APS) [6] was introduced to provide a solution to access control for large XML systems. In this paper, we proposed a temporal access control scheme in APS where the propagation of authorization rights is assumed. The authorization policies can be automatically revoked when the associated time expires. We also provide conflict resolutions for our temporal authorization system.


The Power And Influence In Some Youden Squares And Secret Sharing, Lakoa Fitina, Kenneth G. Russell, Jennifer Seberry Jan 2007

The Power And Influence In Some Youden Squares And Secret Sharing, Lakoa Fitina, Kenneth G. Russell, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We investigate subsets of critical sets of some Youden squares in the context of secret sharing schemes. A subset C of a Youden square is called a critical set, if C can be uniquely completed to a Youden square but any subset of C cannot does not have a unique completion to a Youden square. That part of a Youden square Y which is inaccessible to subsets of a critical set C of Y, called the strongbox of C, may be thought to contain secret information. We study the size of the secret. Seberry and Street have shown how strongboxes …