Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Series

2010

Discipline
Keyword
Publication

Articles 1 - 30 of 1498

Full-Text Articles in Entire DC Network

Library Annual Report 2010, University Of Wollongong Library Dec 2010

Library Annual Report 2010, University Of Wollongong Library

University of Wollongong Library Annual Reports

No abstract provided.


Learning Design For Online Role Play Versus Simulation, Sandra Wills Dec 2010

Learning Design For Online Role Play Versus Simulation, Sandra Wills

Senior Deputy Vice-Chancellor and Deputy Vice-Chancellor (Education) - Papers

One outcome of Project EnROLE, an ALTC project to encourage uptake of online role play, is a refined learning design for simulation: Simulation Triad. The triad represents design decisions according to emphasis placed on Roles versus Problems versus Rules.


“I Want To Be More Perfect Than Others”: A Case Of Esl Motivation., Olivia Beath Nov 2010

“I Want To Be More Perfect Than Others”: A Case Of Esl Motivation., Olivia Beath

Faculty of Education - Papers (Archive)

Language learning motivation is an important concept in Second Language Acquisition (SLA) research as it has been significantly linked to achievement. Theoretically, the concept of motivation has moved from being viewed as a static learner trait to a complex, dynamic factor that changes over time. This paper reports on a single case study of a female Indonesian language learner; specifically the change in her language learning behaviours and motivation over the course of learning English from adolescence to adulthood and international postgraduate study. This paper will draw on Ryan and Deci‟s (2000) self-determination framework to describe changes in the learner‟s …


Broken Hill Strikes : Postcards, William J. Harris Nov 2010

Broken Hill Strikes : Postcards, William J. Harris

Research Data

The Broken Hill Miners' Strike commenced in 1908. These 24 postcards were written by William J. Harris, working as a police officer in Broken Hill during the strike period. The postcards were written to his family. The image collection comprises photographic and illustrated postcards.

Research Data Australia (ANDS) collection record - here.


A Cultural History Of Cinema-Going In The Illawarra (1900-1950), Nancy Elizabeth Huggett Nov 2010

A Cultural History Of Cinema-Going In The Illawarra (1900-1950), Nancy Elizabeth Huggett

Research Data

This dataset was produced by Nancy Huggett in association with the writing of her doctoral thesis "A cultural history of cinema-going in the Illawarra (1900-1950)" - copy available here: ro.uow.edu.au/theses/246.

Research Data Australia (ANDS) collection record - here.


Australia's Proposed Internet Filtering System : Its Implications For Animation, Comic And Gaming (Acg) And Slash Fan Communities, Mark J. Mclelland Oct 2010

Australia's Proposed Internet Filtering System : Its Implications For Animation, Comic And Gaming (Acg) And Slash Fan Communities, Mark J. Mclelland

Faculty of Arts - Papers (Archive)

This paper investigates the implications of the Australian Government’s proposed Internet filtering system in the light of Australia’s blanket prohibition of ‘child pornography’ (including cartoons, animation, drawings, digitally manipulated photographs, and text) for Australian fan communities of ACG and slash. ACG/slash fan groups in Australia and elsewhere routinely consume, produce and disseminate material containing ‘prohibited content’ (i.e. featuring fictitious ‘under-age’ characters in violent and sexual scenarios). Moreover, a large portion of the fans producing and trading in these images are themselves ‘under age’. Focusing specifically upon the overwhelmingly female fandom surrounding Japanese ‘Boys’ Love’ (BL) manga, the paper argues that …


“Kissing Is A Symbol Of Democracy!” Dating, Democracy And Romance In Occupied Japan 1945-1952, Mark J. Mclelland Sep 2010

“Kissing Is A Symbol Of Democracy!” Dating, Democracy And Romance In Occupied Japan 1945-1952, Mark J. Mclelland

Faculty of Arts - Papers (Archive)

Japan’s defeat at the end of its fifteen years’ war in 1945 saw widespread changes to the family and gender system. Women were given political rights for the first time and were recognised as independent agents at work, in the home and in their romantic relationships. Whereas war-time ideology had brought about the “death of romance” in popular culture, with the relaxation of censorship at the war’s end, there was a sudden proliferation in discussion about the qualities of the “new” or “modern” couple and the popular press saw the rise of an eclectic range of “experts” offering advice on …


Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks Jun 2010

Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks

Faculty of Informatics - Papers (Archive)

RFID technology is currently considered as a key enabler of supply chain transformation. However, very little has been written about the deployment and use of RFID in the dairy industry. Drawing on an extensive literature review and a case example, this exploratory study seeks to present current applications and issues related to RFID’s adoption in the dairy industry and discuss future research directions.


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Faculty of Informatics - Papers (Archive)

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba Jan 2010

Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba

Faculty of Informatics - Papers (Archive)

This study examines the impact of radio-frequency identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a proof of concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To analyze the present mode of operation, procedural documents, semi-structured interviews and a participant observation was conducted. The basis for the proof of concept was a future mode of operation using a quasi-experimental design. Results indicate that in a small-to-medium retail environment, RFID technology could act as a loss prevention mechanism, …


Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey Jan 2010

Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey

Faculty of Informatics - Papers (Archive)

The introduction of computerized information systems into health care practices may cause changes to the way healthcare workers conduct their routine work activities, such as work flow and the time spend on each activity. To date the available work measurement tools are confined to activities in hospitals and do not cover residential aged care facilities (RACFs). There is little evidence about the effects of technology on caregivers' work practices, including the distribution of time on activities in a RACF. This requires the measurement of caregivers' activities using a valid and reliable measurement tool. The contribution of this research is to …


A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu Jan 2010

A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu

Faculty of Informatics - Papers (Archive)

Systematic evaluation of the introduction and impact of health information systems (HIS) is a challenging task. As the implementation is a dynamic process, with diverse issues emerge at various stages of system introduction, it is challenge to weigh the contribution of various factors and differentiate the critical ones. A conceptual framework will be helpful in guiding the evaluation effort; otherwise data collection may not be comprehensive and accurate. This may again lead to inadequate interpretation of the phenomena under study. Based on comprehensive literature research and own practice of evaluating health information systems, the author proposes a multimethod approach that …


Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald Jan 2010

Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald

Faculty of Informatics - Papers (Archive)

The paper discusses critical factors for the successful introduction of information and communication technologies (ICT) into health care organisations. The proven evidence around the world suggests that introducing health ICT is a mutual transformation process that actively involves people, organisation and technology. The key people factors include personal attributes of the change agent, user ownership and positive user attitudes. The organisational facilitators are adequate funding, strong leadership and project management, integration of IT with work practices, managing change and end user expectations, and end user training and support. User friendly and useful systems can be achieved by involving both management …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Jan 2010

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Faculty of Informatics - Papers (Archive)

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang Jan 2010

Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang

Faculty of Informatics - Papers (Archive)

Datasets from remote-sensing platforms and sensor networks are often spatial, temporal, and very large. Processing massive amounts of data to provide current estimates of the (hidden) state from current and past data is challenging, even for the Kalman filter. A large number of spatial locations observed through time can quickly lead to an overwhelmingly high-dimensional statistical model. Dimension reduction without sacrificing complexity is our goal in this article. We demonstrate how a Spatio-Temporal Random Effects (STRE) component of a statistical model reduces the problem to one of fixed dimension with a very fast statistical solution, a methodology we call Fixed …


An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam Jan 2010

An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam

Faculty of Informatics - Papers (Archive)

Cost reduction is one of the main targets in power industry due to economic load dispatch problem and allocating loads to plants for minimum cost. The principal objective in economic dispatch of thermal generators in a power system is to determine the economic loadings of the generators so that the load demand can be met and the loadings are within the feasible operating regions of the generators. This study presents an optimization approach for fuel cost and power loss minimization based on genetic algorithm and particle swarm optimization methods. To demonstrate the global optimization power of the presented techniques, these …


The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu Jan 2010

The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu

Faculty of Informatics - Papers (Archive)

Recently, Dynamic Voltage Restorer (DVR) has become a popular power electronic device as a protection for sensitive loads from voltage sag. Voltage sag widely known as one of the major problem in power quality, it is defined as a short reduction of voltage from the nominal. DVR is a custom power device for voltage sag mitigation which works when the fault occurs in power distribution system. In this paper, the effect of the DVR location is investigated at the low and medium voltage of the distribution system with different loads. To verify the performance of the DVR in mitigating the …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael Jan 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Toward A State Of Überveillance, M G. Michael, Katina Michael Jan 2010

Toward A State Of Überveillance, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke's [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.”


Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu Jan 2010

Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu

Faculty of Informatics - Papers (Archive)

In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …


Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill Jan 2010

Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill

Faculty of Informatics - Papers (Archive)

In band structure calculations commonly used to derive the electronic properties of carbon nanotubes it is generally assumed that all bond lengths are equal. However, hexagonal carbon lattices are often irregular and may contain as many as three distinct bond lengths. A regular $(n,m)$ carbon nanotube will be metallic if p=(n-m)/3 for integer p. Here we analytically derive the generalized condition for metallic irregular carbon nanotubes. This condition is particularly relevant to small radius nanotubes and nanotubes experiencing small applied strains.


Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti Jan 2010

Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti

Faculty of Informatics - Papers (Archive)

Links between the Calkin-Wilif tree and the Stern-Brocot tree are discussed answering the questions: What is the jth vertex in the nth level of the Calkin-Wilf tree? A simple mechanism is described for converting the jth vertex in the nth level of the Calkin-Wilf tree into the jth entry in the nth level of the Stern-Brocot tree. We also provide a simple method for evaluating terms in the hyperbinary sequence thus answering a challenge raised in Quantum in September 1997. We also examine successors and predecessors in both trees.


Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan Jan 2010

Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan

Faculty of Informatics - Papers (Archive)

In this Letter, the authors inve´stigate the interaction of various atoms/ions with a graphene sheet and two parallel graphene sheets using the continuous approximation and the 6–12 Lennard-Jones potential. The authors assume that the carbon atoms are smeared across the surface of the graphene sheet so that the total interaction between the single atom/ion and the graphene sheet can be approximated by a surface integration over the graphene sheet. They determine the equilibrium position for the atom/ion on the surface of the graphene sheet and the minimum intermolecular spacing between two graphene sheets. This minimum spacing is by symmetry twice …


Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver Jan 2010

Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver

Faculty of Informatics - Papers (Archive)

Higher-rank graphs were introduced by Kumjian and Pask to provide models for higher-rank Cuntz– Krieger algebras. In a previous paper, we constructed 2 graphs whose path spaces are rank two subshifts of finite type, and showed that this construction yields aperiodic 2 graphs whose C algebras are simple and are not ordinary graph algebras. Here we show that the construction also gives a family of periodic 2 graphs which we call domino graphs. We investigate the combinatorial structure of domino graphs, finding interesting points of contact with the existing combinatorial literature, and prove a structure theorem for the C algebras …


The D-Completeness Of T->, R K. Meyer, M W. Bunder Jan 2010

The D-Completeness Of T->, R K. Meyer, M W. Bunder

Faculty of Informatics - Papers (Archive)

A Hilbert-style version of an implicational logic can be represented by a set of axiom schemes and modus ponens or by the corresponding axioms, modus ponens and substitution. Certain logics, for example the intuitionistic implicational logic, can also be represented by axioms and the rule of condensed detachment, which combines modus ponens with a minimal form of substitution. Such logics, for example intuitionistic implicational logic (see Hindley [3]), are said to be D-complete. For certain weaker logics, the version based on condensed detachment and axioms (the condensed version of the logic) is weaker than the original. In this paper we …


Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy Jan 2010

Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

The propagation of solitary waves in nematic liquid crystals in the presence of localised nonuniformities is studied. The nonuniformities can be caused by external electric fields, other light beams, or any other mechanism which results in a modified director orientation in a localised region of the liquid-crystal cell. The net effect is that the solitary wave undergoes refraction and trajectory bending. A general modulation theory for this refraction is developed, and particular cases of circular, elliptical and rectangular perturbations are considered. The results are found to be in excellent agreement with numerical solutions.


Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello Jan 2010

Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello

Faculty of Informatics - Papers (Archive)

We consider a family of dynamical systems (A, alpha, L) in which a is an endomorphism of a C*-algebra A and L is a transfer operator for a. We extend Exel's construction of a crossed product to cover non-unital algebras A, and show that the C*-algebra of a locally finite graph can be realised as one of these crossed products. When A is commutative, we find criteria for the simplicity of the crossed product, and analyse the ideal structure of the crossed product.


Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen Jan 2010

Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen

Faculty of Informatics - Papers (Archive)

Fires at industrial composting facilities, such as those storing industrial waste products like municipal solid waste (NSW) and landfills are fairly common. In most cases these are manageable and such incidents are not destructive enough to attract attention beyond these facilities. However, over the years there have been a few notable devastating fires at such facilities.

In each of these industrial processes there is an inherent increase in temperature as a consequence of the biological activity. Indeed such a temperature increase is one of the goals of the composting waste. Elevated temperatures of the order of 70-90 degrees celsius have …


A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2010

A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

The success of wireless mesh networks hinges on their ability to support bandwidth intensive, multi-media applications. A key approach to increasing network capacity is to equip wireless routers with smart antennas. These routers, therefore, are capable of focusing their transmission on specific neighbors whilst causing little interference to other nodes. This, however, assumes there is a link scheduling algorithm that activates links in a way that maximizes network capacity. To this end, we propose a novel link activation algorithm that maximally creates a bipartite graph, which is then used to derive the link activation schedule of each router. We have …