Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 221

Full-Text Articles in Entire DC Network

The Relevance Of Emotional Intelligence For Leadership In A Higher Education Context, Dominique R. Parrish Jan 2015

The Relevance Of Emotional Intelligence For Leadership In A Higher Education Context, Dominique R. Parrish

Faculty of Science, Medicine and Health - Papers: part A

This paper reports on a case-study research investigation that sought to identify the relevance of emotional intelligence for effective higher education academic leadership. Semi-structured interviews were conducted, pre and post a leadership capacity development intervention, to gather broad data on participants' experiences, insights, and engagement in leadership and the utilisation of emotional intelligence in leading. The study found that emotional intelligence is recognised as a highly relevant and important requirement for academic leadership in higher education. Additionally, the investigation ascertained that emotional intelligence traits related to empathy, inspiring and guiding others and responsibly managing oneself were most applicable for academic …


Making Country Good: Stewardship And Environmental Change In Central Australian Pastoral Culture, Nicholas Gill Jan 2014

Making Country Good: Stewardship And Environmental Change In Central Australian Pastoral Culture, Nicholas Gill

Faculty of Social Sciences - Papers (Archive)

Rural stewardship has been a focus of much natural resource management policy in Australia and elsewhere. Despite landowners professing stewardship, some researchers have cast doubt on the utility of the concept due to its vagueness and difficulties of associating attitudes with behaviour. In contrast I argue that stewardship should remain an important concept for understanding rural cultures, landholder practices and the politics of land. Stewardship, however, needs to be understood as emergent, as a 'dwelt achievement', as having temporal depth and as being part of the production of socio-natures. Moreover, as a key vernacular practice, its capacities and vulnerabilities require …


Carbon Dioxide Rebreathing In Respiratory Protective Devices: Influence Of Speech And Work Rate In Full-Face Masks, Carmen L. Smith, Jane L. Whitelaw, Brian Davies Mar 2013

Carbon Dioxide Rebreathing In Respiratory Protective Devices: Influence Of Speech And Work Rate In Full-Face Masks, Carmen L. Smith, Jane L. Whitelaw, Brian Davies

Faculty of Science, Medicine and Health - Papers: part A

Carbon dioxide (CO2) rebreathing has been recognised as a concern regarding respirator use and is related to symptoms of discomfort, fatigue, dizziness, headache, muscular weakness and drowsiness. Previous investigations are limited by small sample size and have not evaluated the relationship between CO2 inhalation and phonic respiration (breathing during speech) in respiratory protective devices (RPDs). A total of 40 workers trained in the use of RPDs performed a graded exercise test on a cycle ergonometer that increased in workload every 5 min. During the third minute of each stage, participants read aloud a prepared text. Measures of mixed expired CO2 …


Are Low-Skill Public Sector Workers Really Overpaid? A Quasi-Differenced Panel Data Analysis, Peter Siminski Jan 2013

Are Low-Skill Public Sector Workers Really Overpaid? A Quasi-Differenced Panel Data Analysis, Peter Siminski

Faculty of Commerce - Papers (Archive)

Public–private sectoral wage differentials have been studied extensively using quantile regression techniques. These typically find large public sector premiums at the bottom of the wage distribution. This may imply that low skill workers are ‘overpaid’, prompting concerns over efficiency. We note several other potential explanations for this result and explicitly test whether the premium varies with skill, using Australian data. We use a quasi-differenced Generalized Method of Moments (GMM) panel data model which has not been previously applied to this topic, internationally. Unlike other available methods, this technique identifies sectoral differences in returns to unobserved skill. It also facilitates a …


'Reel Love' Across Ethnic Boundaries? The Extent And Significance Of Inter-Ethnic Intimacy In Australian Cinema, Natascha Klocker, Elyse Stanes Jan 2013

'Reel Love' Across Ethnic Boundaries? The Extent And Significance Of Inter-Ethnic Intimacy In Australian Cinema, Natascha Klocker, Elyse Stanes

Faculty of Science, Medicine and Health - Papers: part A

National cinemas play an important role in the construction of national identities, representing the 'self' to both domestic and international audiences. Evidence of the material impacts of media representations on individuals and society, and the pervasiveness of movie-watching as a cultural activity, underscore the importance of scholarly inquiry into film. Here, we are concerned with how ethnic diversity has been negotiated within the Australian national cinema - specifically at the scale of intimate interpersonal relationships. Our analysis of twenty-five recent Australian films considers how cinema alerts audiences to the possibilities and limitations of love within and across ethnic boundaries. We …


Computerisation Of Perinatal Data Entry: Is The Data Accurate?, Alison Craswell, Lorna Moxham, Marc Broadbent Jan 2013

Computerisation Of Perinatal Data Entry: Is The Data Accurate?, Alison Craswell, Lorna Moxham, Marc Broadbent

Faculty of Science, Medicine and Health - Papers: part A

Perinatal data (PD) is collected for mothers and babies Australia wide as mandated at a federal level. The data is used to monitor patterns in midwifery, obstetric and neonatal practice and health outcomes and is also used for research purposes, funding allocation and the education of midwives and medical officers. Accuracy in PD is most often reported via quantitative validation studies of PD collections both internationally and within Australia [1]. These studies report varying levels of accuracy in PD collection and suggest researchers need to be more aware of the quality of data they use. This paper presents findings from …


Computer Gaming And Adhd: Potential Positive Influences On Behavior, Stuart Johnstone Jan 2013

Computer Gaming And Adhd: Potential Positive Influences On Behavior, Stuart Johnstone

Faculty of Social Sciences - Papers (Archive)

Parents often express concerns about that technology, particularly video has on their children. Indeed, have been associated with problems social isolation and a drop-off in academic achievement, and games containing violence shown to increase aggressive thoughts and. Frequent interaction with video games been associated with subsequent problems functions such as attention and impulse-control However, it is important to note that technology and video games can also be used to improve behavior. During my 15 years of research examining the brain electrical activity and behavior of children with Attention Deficit Hyperactivity Disorder (ADHD), there has been an increase in the use …


Alcohol Advertising During Televised Australian Football Finals, Sandra C. Jones, Lance Barrie, Michael Chapman, Nicholas J. Corr, Sondra Davoren Jan 2013

Alcohol Advertising During Televised Australian Football Finals, Sandra C. Jones, Lance Barrie, Michael Chapman, Nicholas J. Corr, Sondra Davoren

Faculty of Social Sciences - Papers (Archive)

Alcohol marketing during sport, and alcohol industry sponsorship of sporting events, is highly lucrative; however, concerns have been raised over the impact on child and adolescent viewers of repeated exposure to alcohol marketing messages. The aim of this research project was to investigate the amount and type of alcohol marketing during two major sporting events in 2012 - the semi-finals and grand final of the AFL and NRL. The broadcasts of these six games were audited for alcohol advertisements and other advertising communications. Almost one-fifth of the screen time included alcohol marketing. Policy and practice implications of these findings are …


Faith-Based Substance Abuse Programs, Geoffrey C. B Lyons, Frank P. Deane, Peter J. Kelly Jan 2013

Faith-Based Substance Abuse Programs, Geoffrey C. B Lyons, Frank P. Deane, Peter J. Kelly

Faculty of Social Sciences - Papers (Archive)

Faith-based programs are one of the primary treatment options for individuals with substance use disorders. However, there is ambiguity regarding what faith-based programs are, how they differ from secular programs, and how they incorporate religion or spirituality into treatment. Furthermore, though evidence suggests faith-based programs can be as effective as other secular treatments, it is unclear how the utilization of religion or spirituality in the treatment process influences recovery outcomes. Preliminary research suggests that the exploration and cultivation of spirituality may operate on recovery by improving a client's psychological well-being, social support systems, and the ability to cope with distress.


Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu Jan 2013

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do …


Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou Jan 2013

Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity. This strengthened notion makes threshold ring signature schemes more suitable in real life. Finally, we provide efficient schemes that outperform …


Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison Jan 2013

Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison

Faculty of Engineering and Information Sciences - Papers: Part A

The Productivity Commission report 'Disability Care and Support' recommends tort liability be replaced by a compulsory, government-run, no-fault scheme. But theory and evidence indicate moving to a no-fault scheme will increase the accident rate. Even a move from non-risk-rated third-party insurance to non-risk-rated first-party insurance reduces incentives for care. A no-fault scheme is not superior to current policies; genuine reform will need to be informed by law and economics literature.


The Role Of Public Procurement In Improving Accessibility To Ict, Gunela Astbrink, William Tibben Jan 2013

The Role Of Public Procurement In Improving Accessibility To Ict, Gunela Astbrink, William Tibben

Faculty of Engineering and Information Sciences - Papers: Part A

Government bodies use public procurement policies and mechanisms to purchase ICT products and services. Some governments in OECD countries apply accessibility criteria when procuring ICT to improve access to their services and employment opportunities for people with disabilities. This may have a flow-on effect of greater availability of affordable and accessible ICT thus improving digital inclusion. This paper outlines research on comparative analysis of the situation in Australia with current policy in OECD countries. The research resulted in recommendations for a consumer-oriented plan to work with Australian governments on the introduction of accessibility criteria in ICT public procurement.


Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun Jan 2013

Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun

Faculty of Engineering and Information Sciences - Papers: Part A

Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and …


Noise Robust Keyword Spotting For User Generated Video Blogs, M S. Barakat, C H. Ritz, D A. Stirling Jan 2013

Noise Robust Keyword Spotting For User Generated Video Blogs, M S. Barakat, C H. Ritz, D A. Stirling

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a template-based system for speaker independent key word spotting (KWS) in continuous speech that can help in automatic analysis, indexing, search and retrieval of user generated videos by content. Extensive experiments on clean speech confirm that the proposed approach is superior to a HMM approach when applied to noisy speech with different signal-to-noise ratio (SNR) levels. Experiments conducted to detect swear words, personal names and product names within a set of online user generated video blogs shows significantly better recall and precision results compared to a traditional ASR-based approach.


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Jan 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Faculty of Engineering and Information Sciences - Papers: Part A

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad Jan 2013

The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile Visual Search (MVS) is an emerging area of research given the explosion of smart and powerful mobile devices. Typically, the performance of MVS applications is influenced by the implemented image processing algorithms as well as various distortions that occur when capturing images by the mobile camera. This paper examines the joint effect of two common distortions, namely the illumination changes and image blurring on image matching accuracy for print media when using four state-of-the art local feature algorithms. Results obtained for a database of real camera images captured by two different camera models show that the illumination changes have …


Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin Jan 2013

Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Broadcast is a fundamental operation in wireless networks and is well supported by the wireless channel. However, the interference resulting from a node's transmission pose a key challenge to the design of any broadcast algorithms/protocols. In particular, it is well known that a node's interference range is much larger than its transmission range and thus limits the number of transmitting and receiving nodes, which inevitably prolong broadcast. To this end, a number of past studies have designed broadcast algorithms that account for this interference range with the goal of deriving a broadcast schedule that minimizes latency. However, these works have …


Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari Jan 2013

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a novel approach for optimal key characteristics-based sensor distribution in a multi-station assembly process, for the purpose of diagnosing variation sources responsible for product quality defects in a timely manner. Current approaches for sensor distribution are based on the assumption that measurement points can be allocated at arbitrary locations on the part or subassembly. This not only presents challenges in the implementation of these approaches but additionally does not allow required product assurance and quality control standards to be integrated with them, due to lack of explicit relations between measured features and geometric dimensioning and tolerancing (GD&T). …


Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au Jan 2013

Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au

Faculty of Engineering and Information Sciences - Papers: Part A

The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data are usually encrypted prior to being outsourced. Nevertheless, effective data utilization remains a challenging task and there is a clear need for a secure and efficient searching mechanism over the encrypted data in the cloud, to increase the us-ability of the secure cloud environment. Unfortunately, existing work in the area of …


Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung Jan 2013

Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung

Faculty of Engineering and Information Sciences - Papers: Part A

This paper addresses the problem of combining multiple radar images of the same scene to produce a more informative composite image. The proposed approach for probabilistic fuzzy logic-based image fusion automatically forms fuzzy membership functions using the Gaussian-Rayleigh mixture distribution. It fuses the input pixel values directly without requiring fuzzification and defuzzification, thereby removing the subjective nature of the existing fuzzy logic methods. In this paper, the proposed approach is applied to through-the-wall radar imaging in urban sensing and evaluated on real multiview and polarimetric data. Experimental results show that the proposed approach yields improved image contrast and enhances target …


Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan Jan 2013

Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan

Faculty of Engineering and Information Sciences - Papers: Part A

This paper provides a tangible methodology to deal with the liner ship fleet deployment problem aiming at minimizing the total cost while maintaining a service level under uncertain container demand. The problem is first formulated as a joint chance constrained programming model, and the sample average approximation method and mixed-integer programming are used to deal with it. Finally, a numerical example of a liner shipping network is carried out to verify the applicability of the proposed model and solution algorithm. It is found that the service level has significant effect on the total cost.


Child, Family And Environmental Correlates Of Children's Motor Skill Proficiency, Lisa M. Barnett, Trina Hinkley, Anthony D. Okely, Jo Salmon Jan 2013

Child, Family And Environmental Correlates Of Children's Motor Skill Proficiency, Lisa M. Barnett, Trina Hinkley, Anthony D. Okely, Jo Salmon

Faculty of Social Sciences - Papers (Archive)

To identify factors associated with children's motor skills. Cross-sectional. Australian preschool-aged children were recruited in 2009 as part of a larger study. Parent proxy-report of child factors (age, sex, parent perception of child skill, participation in unstructured and structured activity), self-report of parent factors (confidence in their own skills to support child's activity, parent-child physical activity interaction, parent physical activity) and perceived environmental factors (play space visits, equipment at home) were collected. Moderate to vigorous physical activity (MVPA) (ActiGraph GT1M accelerometer) and motor skills (Test of Gross Motor Development-2) were also assessed. After age adjustment, variables were checked for association …


Even With Cruise Control You Still Have To Steer: Defining Trolling To Get Things Done, Andrew M. Whelan Jan 2013

Even With Cruise Control You Still Have To Steer: Defining Trolling To Get Things Done, Andrew M. Whelan

Faculty of Social Sciences - Papers (Archive)

'Trolling' is not a pre-given aspect of a discursive environment, which we enter into and then identify as such. This paper demonstrates that trolling is contextually mobilised as an occasioned aspect of interaction through an example: a news segment aired on the Australian network television news program Seven News in 2012. This segment is interpreted initially with reference to existing frameworks, so as to make a case about how trolling is conventionally understood, and this interpretation is then respecified through a membership categorisation analysis of the segment in question. By attending to the methods with which trolls are produced and …


The Alpha Band Of The Resting Electroencephalogram Under Pulsed And Continuous Radio Frequency Exposures, Nick Perentos, Rodney Croft, Raymond J. Mckenzie, Irena Cosic Jan 2013

The Alpha Band Of The Resting Electroencephalogram Under Pulsed And Continuous Radio Frequency Exposures, Nick Perentos, Rodney Croft, Raymond J. Mckenzie, Irena Cosic

Faculty of Social Sciences - Papers (Archive)

The effect of GSM-like electromagnetic fields with the resting electroencephalogram (EEG) alpha band activity was investigated in a double-blind cross-over experimental paradigm, testing the hypothesis that pulsed but not continuous radio frequency (RF) exposure would affect alpha activity, and the hypothesis that GSM-like pulsed low frequency fields would affect alpha. Seventy-two healthy volunteers attended a single recording session where the eyes open resting EEG activity was recorded. Four exposure intervals were presented (sham, pulsed modulated RF, continuous RF, and pulsed low frequency) in a counterbalanced order where each exposure lasted for 20 min. Compared to sham, a suppression of the …


The Nutrition And Enjoyable Activity For Teen Girls Study: A Cluster Randomized Controlled Trial, Deborah L. Dewar, Philip J. Morgan, Ronald C. Plotnikoff, Anthony D. Okely, Clare E. Collins, Marijka Batterham, Robin Callister, David R. Lubans Jan 2013

The Nutrition And Enjoyable Activity For Teen Girls Study: A Cluster Randomized Controlled Trial, Deborah L. Dewar, Philip J. Morgan, Ronald C. Plotnikoff, Anthony D. Okely, Clare E. Collins, Marijka Batterham, Robin Callister, David R. Lubans

Faculty of Social Sciences - Papers (Archive)

Background Obesity prevention among youth of low SES is a public health priority given the higher prevalence of youth obesity in this population subgroup. Purpose To evaluate the 24-month impact of a school-based obesity prevention program among adolescent girls living in low-income communities. Design The study was a school-based group RCT, the Nutrition and Enjoyable Activity for Teen Girls (NEAT Girls) intervention. Setting/participants The study involved 12 secondary schools located in low-income communities in New South Wales, Australia. Participants were 357 adolescent girls (aged 13.2±0.5 years). Intervention The 12-month multicomponent intervention was guided by social cognitive theory and involved strategies …


Preliminaries To Haptic-Integrated Pronunciation Instruction, William Acton, Amanda Ann Baker, Michael Burri, Brian Teaman Jan 2013

Preliminaries To Haptic-Integrated Pronunciation Instruction, William Acton, Amanda Ann Baker, Michael Burri, Brian Teaman

Faculty of Social Sciences - Papers (Archive)

This paper reports on aspects of a haptic (movement plus touch) integrated system for classroom pronunciation instruction. It is based, in part, on established pedagogical practice in the use of somatic/kinesthetic techniques such as gesture in language instruction (Acton, 1984, 2012; Celce-Murcia, Brinton, Goodwin & Briner, 2010; McCafferty, 2004), and management of vocal resonance in singing and voice training (Lessac, 1997). The pedagogical method is designed for use by relatively untrained instructors and is generally best delivered through video with classroom follow up. Relatively recent research and development in haptics, especially in the areas of gaming, prosthetics and robotics, provides …


Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson Jan 2013

Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson

Faculty of Engineering and Information Sciences - Papers: Part A

Gestural Interface Technology (GIT) has changed the way technology is adopted in classrooms for all ages. The accessibility of control through touch means that technology such as Apple's iPad can be used in early childhood education. In this paper, we introduce a framework for fully-engaged communication, developed from educational pedagogy and critical engagement in information systems. The intersection of these dimensions creates a view of a GIT lifeworld approach which allows it to be used to understand multiple layers of engagement that exist within an early childhood education environment.


Myriad Mirrors: Doppelgangers And Doubling In The Vampire Diaries, Kimberley Mcmahon-Coleman Jan 2013

Myriad Mirrors: Doppelgangers And Doubling In The Vampire Diaries, Kimberley Mcmahon-Coleman

Senior Deputy Vice-Chancellor and Deputy Vice-Chancellor (Education) - Papers

As Samantha George notes in Chapter 4 above, mirroring is of fundamental importance in Gothic literature and film. It is also a prevalent trope in the CW network teen drama, The Vampire Diaries. The television series is itself a ‘doubling’ in that it is an adaptation of a series of novels by L. J. Smith, creating a situation wherein the same central characters inhabit the parallel townships of the novels’ Fells Church and television’s Mystic Falls, and consequently have histories which are, at times, contradictory.2 The television version also explicitly explores the concept of the doppelgänger, and thus the idea …


Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry Jan 2013

Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry

Faculty of Engineering and Information Sciences - Papers: Part A

Amicable orthogonal designs have renewed interest because of their use in mobile communications. We show the existence of strong amicable orthogonal designs, AOD(n: 1, n - 1; 1, n - 1), for n = pr + 1, p ≡ 3 (mod 4) a prime and for n = 2r, n a non-negative integer in a form more suitable for communications. Unfortunately the existence of amicable Hadamard matrices is not enough to demonstrate the existence of strong amicable orthogonal designs.