Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 222

Full-Text Articles in Entire DC Network

Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael Dec 2006

Lend Me Your Arms: The Use And Implications Of Humancentric Rfid, Amelia Masters, Katina Michael

Faculty of Informatics - Papers (Archive)

Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. By employing usability context analyses in control, convenience and care-related application areas, we begin to piece together a cohesive view of the current development state of humancentric RFID, as detached from predictive conjecture. This is supplemented by an understanding of the market-based, social and ethical concerns which plague ...


The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael Dec 2006

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise ...


Homo Electricus And The Continued Speciation Of Humans, Katina Michael Dec 2006

Homo Electricus And The Continued Speciation Of Humans, Katina Michael

Faculty of Informatics - Papers (Archive)

Michael, K. (2007). Homo Electricus and the continued speciation of humans. In M. Quigley (Eds.), Encyclopaedia of Information Ethics and Security (pp. 312-318). United States of America: IGI Global. http://www.igi-global.com/chapter/homo-electricus-continued-speciation-humans/13490


Analysis Of Business Process Integration In Web Service Context, J. Shen, G. Grossmann, Y. Yang, M. Stumptner, M. Schrefl, T. Reiter Dec 2006

Analysis Of Business Process Integration In Web Service Context, J. Shen, G. Grossmann, Y. Yang, M. Stumptner, M. Schrefl, T. Reiter

Faculty of Informatics - Papers (Archive)

The integration of Web services is a recent outgrowth of the Business Process integration field that will require powerful meta-schema matching mechanisms supported by higher level abstractions, such as UML meta-models. Currently, there are many XML-based workflow process specification languages (e.g. XPDL, BPEL) which can be used to define business processes in the Web services and Grid Computing world. However, with limited capability to describe the relationships (schemas or ontologies) between process objects, the dominant use of XML as a meta-data markup language makes the semantics of the processes ambiguous. OWL-S (Ontology Web Language for Services) exploits the semantic ...


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2006

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Faculty of Informatics - Papers (Archive)

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to ...


Knowledge Sharing And Organizational Change In A Leading Telecommunications Equipment Vendor: A Case Study On Southern Networks, Katina Michael Dec 2006

Knowledge Sharing And Organizational Change In A Leading Telecommunications Equipment Vendor: A Case Study On Southern Networks, Katina Michael

Faculty of Informatics - Papers (Archive)

In 1999 Southern Networks deployed the Open Text Livelink knowledge management system (KMS). Livelink allowed for the centralization of key corporate applications and associated content at a global, regional, line-of-business, departmental and personal level. Prior to the implementation of Livelink on an enterprise scale, the corporation’s 94,500 employees relied on fragmented departmental web pages which were scattered across eleven different Web servers making the task of finding information very difficult. This paper describes how the process of knowledge transfer at Southern Networks changed with the deployment of Livelink and how it enabled the automation of workflows through the ...


Modeling Evaluation Of Continuous Queries On Sliding Windows, Anita Dani, Janusz Getta Dec 2006

Modeling Evaluation Of Continuous Queries On Sliding Windows, Anita Dani, Janusz Getta

Faculty of Informatics - Papers (Archive)

One of the distinguishing characteristics of a data stream system is 'a continuous query operating on dynamic data' as opposed to 'static data processed by instantaneous query' in DBMS. Due to potentially infinite size of the stream a query is evaluated after forming finite subsets of the data stream. The sliding window model is the most suitable model for processing finite subsets of a data stream where only recent data items qualify. In this paper, we propose a mathematical model to express a continuous query on sliding windows. This model expresses a window as an ordered set. Its sliding mechanism ...


Fringe Calibration Using Neural Network Signal Mapping For Structured Light Profilometers, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo Dec 2006

Fringe Calibration Using Neural Network Signal Mapping For Structured Light Profilometers, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

We present a novel neural network signal calibration technique to improve the performance of triangulation based structured light profilometers. The performance of such profilometers is often hindered by the capture of noisy and aberrated pattern intensity distributions. We address this problem by employing neural networks and a spatial digital filter in a signal mapping approach. The performance of the calibration technique is gauged through both simulation and experimentation, with simulation results indicating that accuracy can be improved by more than 80%.


Phase Unwrapping Of Self-Mixing Signals Observed In Optical Feedback Interferometry For Displacement Measurement, Lu Wei, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Dec 2006

Phase Unwrapping Of Self-Mixing Signals Observed In Optical Feedback Interferometry For Displacement Measurement, Lu Wei, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

With an Optical feedback interferometry (OFI), a self-mixing signal (SMS) can be observed and employed to determine parameters of the semiconductor laser and metrological quantities of an object. In the cases of the measurement of the movement trace of an external target, phase unwrapping of the SMS must be performed, which remains a challenging issue. We report a technique for achieving phase unwrapping of the SMS signals as follows. Firstly, the behaviour of the phase equation of the OFI is studied, based on which general laws for laser phase change with respect to external target movement is extracted. Secondly, the ...


Optimal Filtering Based Shift Estimation For Fringe Pattern Profilometry By Generalized Analysis Model, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang Dec 2006

Optimal Filtering Based Shift Estimation For Fringe Pattern Profilometry By Generalized Analysis Model, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang

Faculty of Informatics - Papers (Archive)

This paper presents a new algorithm for fringe pattern parofilometry by utilizing generalized analysis model, called optimal filtering based shift estimation (OFSE) method, which provides much lower complexity compared with traditional methods. Meanwhile, as OFSE is derived based on the generalized analysis model, the reconstruction results will not be influenced by the nonlinearity of fringe pattern projection and acquisition system. The efficiency of the proposed OFSE method is confirmed by simulation results, which show that the accuracy of three-dimensional reconstruction using digital fringe pattern profilometry technique can be much improved and the computational complexity can be significantly reduced.


Improving The Measurement Accuracy Of Fbg Sensor Using Adaptive Filters, Xingyuan Xu, Jiangtao Xi, Joe F. Chicharo Dec 2006

Improving The Measurement Accuracy Of Fbg Sensor Using Adaptive Filters, Xingyuan Xu, Jiangtao Xi, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

Adaptive filters are presented for improving the wavelength detection accuracy of FBG sensors within a sensing system which use tunable laser source. Simulation results demonstrated that by using this technique the Bragg wavelengths of the FBG sensors can be accurately detected. In addition, the filter with NMLS-OCF adaptive algorithm performs faster convergence than the other algorithms.


Improving The Performance Of Iwdm Fbg Sensing System Using Tabu-Gradient Search Algorithm, Xingyuan Xu, Joe F. Chicharo, Jiangtao Xi Dec 2006

Improving The Performance Of Iwdm Fbg Sensing System Using Tabu-Gradient Search Algorithm, Xingyuan Xu, Joe F. Chicharo, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

A Tabu-gradient search algorithm is presented for improving the performance of FBG sensors in an intensity and wavelength-division multiplexed sensing system. Simulation results demonstrated that by using this technique the Bragg wavelengths of the FBG sensors can be accurately and quickly detect even when the original spectrums of FBG sensors can not be pre-determined.


Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper Dec 2006

Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper

Faculty of Informatics - Papers (Archive)

This paper describes an inexpensive, robust method for tracking the head position and orientation of the user by using a single low-cost USB camera and infrared light emitting diodes concealed within spectacle frames worn by the user. Unlike gaze and head-pose tracking systems which rely on high-resolution stereo cameras and complex image processing hardware and software to find and track facial features on the user, the proposed system is able to efficiently locate and track the head's orientation and distance relative to the camera with little processing. Due to the infrared light emitting diodes having fixed geometry, the system ...


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael Dec 2006

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques ...


Extending Semantic Web Service Description By Service Assumption, Zheng Lu, Shiyan Li, Aditya K. Ghose, Peter Hyland Dec 2006

Extending Semantic Web Service Description By Service Assumption, Zheng Lu, Shiyan Li, Aditya K. Ghose, Peter Hyland

Faculty of Informatics - Papers (Archive)

Unlike a traditional software module, which runs within a predictable domain, Web Services are autonomous software agents running in a heterogeneous execution environment. Because of distributed responsibilities, ownership and control, it is often not feasible to acquire all information needed for the service composition. These characteristics of autonomy and heterogeneity are fundamental to service oriented computing but make it inherently difficult to avoid service conflicts. To reason about and adapt to a changing environment, in this work, we will extend current OWL-S by introducing the concept of service assumptions which allow reasoning with incomplete information. Furthermore, together with the proposed ...


Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu Dec 2006

Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Faculty of Informatics - Papers (Archive)

A key impediment to the widespread adoption of web services is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to varying degrees. In ...


Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose Dec 2006

Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Agent-Oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the CASO language. In addition, we suggest a hybrid modelling, or co-evolution, approach in which i* models and CASO agent programs are concurrently maintained and updated, while retaining some modicum of loose consistency between the two. This allows us to benefit from the complementary ...


Facilitating Universal Multimedia Adaptation (Uma) In A Heterogeneous Peer-To-Peer Network, L. Rong, I. Burnett Dec 2006

Facilitating Universal Multimedia Adaptation (Uma) In A Heterogeneous Peer-To-Peer Network, L. Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper proposes a P2P architecture which uses MPEG-21 as a standard based technique to dynamically adapt resources according to various usage environment attributes such as terminal capabilities and user preferences. In the architecture, a super peer based approach is used to cluster peers, store peer information, perform searches and instruct peers to adapt/send resources. Pull and push-based adaptation methods are introduced to adapt search results and resources in an intelligent manner based on the usage environment attributes. Simulation results show that the proposed architecture reduces download time while increasing resource availabilities and download speed in the network when ...


Enhancing Interoperability Via Generic Multimedia Syntax Translation, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz Dec 2006

Enhancing Interoperability Via Generic Multimedia Syntax Translation, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz

Faculty of Informatics - Papers (Archive)

The Bitstream Binding Language (BBL) is a new technology developed by the authors and being standardized by MPEG, which describes how multimedia content and metadata can be mapped onto streaming formats. This paper describes how BBL can be used to enhance the interoperability of multimedia content by providing a generic mechanism for the translation of content between formats. As new content formats are developed, BBL can be used to describe how to translate the content into a form that existing devices are able to render. This consequently simplifies the adoption of new multimedia content forms because existing devices are able ...


Detecting Policy Violations Through Traffic Analysis, J. Horton, R. Safavi-Naini Dec 2006

Detecting Policy Violations Through Traffic Analysis, J. Horton, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, a permitted protocol can be used as a carrier for another protocol not otherwise permitted. However, if the observable behaviour of the protocol exhibits differences between permitted and non-permitted uses, it is possible to detect inappropriate use. We consider SSH, the Secure Shell protocol. This is an encrypted protocol with several uses. We attempt firstly to classify SSH sessions according to some different types of traffic for which the sessions have been used ...


Adopting Default Reasoning In Service Composition Context, Zheng Lu, Aditya K. Ghose, Peter Hyland Dec 2006

Adopting Default Reasoning In Service Composition Context, Zheng Lu, Aditya K. Ghose, Peter Hyland

Faculty of Informatics - Papers (Archive)

Web Service composition is the ability of one business to provide value-added services to its customers through the composition of basic Web services, possibly offered by different companies [12]. Because of distributed responsibilities, ownership and control, it is often not feasible to acquire all information needed for service composition. These characteristics are fundamental to service oriented computing but make it inherently difficult to avoid service conflicts. To reason about and adapt to a changing environment, in this work, we will extend current OWL-S by introducing the concept of service assumptions which allow reasoning with incomplete information. Furthermore, together with the ...


Scalable Multiresolution Image Segmentation And Its Application In Video Object Extraction Algorithm, F. Akhlaghian Tab, G. Naghdy, Alfred Mertins Nov 2006

Scalable Multiresolution Image Segmentation And Its Application In Video Object Extraction Algorithm, F. Akhlaghian Tab, G. Naghdy, Alfred Mertins

Faculty of Informatics - Papers (Archive)

This paper presents a novel multiresolution image segmentation method based on the discrete wavelet transform and Markov Random Field (MRF) modelling. A major contribution of this work is to add spatial scalability to the segmentation algorithm producing the same segmentation pattern at different resolutions. This property makes it suitable for the scalable object-based wavelet coding. The correlation between different resolutions of pyramid is considered by a multiresolution analysis which is incorporated into the objective function of the MRF segmentation algorithm. Allowing for smoothness terms in the objective function at different resolutions improves border smoothness and creates visually more pleasing objects ...


Sector Driven Variations On E-Commerce Adoption Barriers In Regional Small Businesses: An Australian Study, Robert Macgregor, L. Vrazalic Nov 2006

Sector Driven Variations On E-Commerce Adoption Barriers In Regional Small Businesses: An Australian Study, Robert Macgregor, L. Vrazalic

Faculty of Informatics - Papers (Archive)

Despite being a described as a "business enabling technology", e-commerce has not been embraced by the small businesses sector to the extent that it has in larger organisations. This situation has arisen due to a number of e-commerce barriers faced by small businesses. A number of studies have examined these barriers, however, our understanding of their role in e-commerce adoption remains somewhat superficial. This paper presents the results of a large study of Australian small businesses located in a regional area which explored the relationship between business sectors (industrial, retail and service) and e-commerce barriers. The results indicate that service ...


An Examination Of The Driving Forces Behind Ict Adoption In Australian Rural And Regional Medical Practices, Robert Macgregor, P. N. Hyland, Charles Harvie, B. C. Lee Nov 2006

An Examination Of The Driving Forces Behind Ict Adoption In Australian Rural And Regional Medical Practices, Robert Macgregor, P. N. Hyland, Charles Harvie, B. C. Lee

Faculty of Informatics - Papers (Archive)

The use of information and communication technology (ICT) within the Australian general practice sector has been widely researched and is well documented. This paper adds to the knowledge by using data collected from 122 regional medical practitioners to show that the driving forces behind the adoption and use of ICTs can be grouped according to three factors: improvement to business and medical care, external pressure exerted by other practices, patients and medical authorities and the need to communicate with other businesses as well as medical groups.


Texture Classification Using Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Nov 2006

Texture Classification Using Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

In this paper, we propose a convolutional neural network (CoNN) for texture classification. This network has the ability to perform feature extraction and classification within the same architecture, whilst preserving the two-dimensional spatial structure of the input image. Feature extraction is performed using shunting inhibitory neurons, whereas the final classification decision is performed using sigmoid neurons. Tested on images from the Brodatz texture database, the proposed network achieves similar or better classification performance as some of the most popular texture classification approaches, namely Gabor filters, wavelets, quadratic mirror filters (QMF) and co-occurrence matrix methods. Furthermore, The CoNN classifier outperforms these ...


Application Of Mml To Motor Skills Acquisition, Chao Sun, Fazel Naghdy, David A. Stirling Nov 2006

Application Of Mml To Motor Skills Acquisition, Chao Sun, Fazel Naghdy, David A. Stirling

Faculty of Informatics - Papers (Archive)

Study on modeling human psychomotor behaviour based on tracked motion data is reported. The motion data is acquired through various integrated inertial sensors, and represented as Euler angles and accelerations. The Minimum Message Length (MML) algorithm is used to identify frames of intrinsic segmentations and to acquire a classification basis for unsupervised machine learning. The classification model can ultimately be deployed in recognizing certain skilled behaviors. The prior results are analyzed as FSMs' (Finite State Machines) to extract the potential rules underlying behaviors. The progress made so far and plan for further work is reported.


Communications Breakdown: Revisiting The Question Of Information And Its Significance For Community Informatics Projects, William Tibben Nov 2006

Communications Breakdown: Revisiting The Question Of Information And Its Significance For Community Informatics Projects, William Tibben

Faculty of Informatics - Papers (Archive)

The gap between those who understand the complexities of community requirements and the information technologists who can build the technologies represents a central focus of concern with Community Informatics (CI) research. This paper explores how different assumptions about the utility of information leads to poor communication between researchers and practitioners. Braman’s four-part hierarchy is a useful vehicle to investigate this as she seeks to include a range of actors such as policy makers, technologists and community members. A number of case study examples are explored to illustrate the value of Braman’s work for CI.


A Prototype Of Autonomous Intelligent Surveillance Cameras, Wanqing Li, Igor Kharitonenko, S. Lichman, C. Weerasinghe Nov 2006

A Prototype Of Autonomous Intelligent Surveillance Cameras, Wanqing Li, Igor Kharitonenko, S. Lichman, C. Weerasinghe

Faculty of Informatics - Papers (Archive)

This paper presents an architecture and an FPGAbased prototype of an autonomous intelligent video surveillance camera. The camera takes the advantage of high resolution of CMOS image sensors and enables instantly automatic pan, tilt and zoom adjustment based upon motion activity. It performs automated scene analysis and provides immediate response to suspicious events by optimizing camera capturing parameters. The video output of the camera can be optimized to any region of interest while the camera continues to monitor the entire scene. Field trials of the prototyped camera have verified the proposed architecture.


Performance Of Impulse-Train-Modulated Ultra-Wideband Systems, Xiaojing Huang, Y. Li Nov 2006

Performance Of Impulse-Train-Modulated Ultra-Wideband Systems, Xiaojing Huang, Y. Li

Faculty of Informatics - Papers (Archive)

The performance of impulse-train-modulated ultra-wideband (UWB) systems for the ideal additive white Gaussian noise channel is analyzed in this letter. The derived formulae are also used to optimize the modulation parameter of a Gaussian monocycle UWB impulse radio.