Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Physical Sciences and Mathematics

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


Application Of Structured Light Imaging For High Resolution Mapping Of Underwater Archaeological Sites, Chris Roman, Gabrielle Inglis, James Rutter Dec 2012

Application Of Structured Light Imaging For High Resolution Mapping Of Underwater Archaeological Sites, Chris Roman, Gabrielle Inglis, James Rutter

Christopher N. Roman

This paper presents results from recent work using structured light laser profile imaging to create high resolution bathymetric maps of underwater archaeological sites. Documenting the texture and structure of submerged sites is a difficult task and many applicable acoustic and photographic mapping techniques have recently emerged. This effort was completed to evaluate laser profile imaging in comparison to stereo imaging and high frequency multibeam mapping. A ROV mounted camera and inclined 532 nm sheet laser were used to create profiles of the bottom that were then merged into maps using platform navigation data. These initial results show very promising resolution …


Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray Dec 2012

Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray

Associate Professor Neil Gray

Developers of distributed Java systems can now choose among Java-RMI, CORBA, and Web-Service (JAXRPC) middleware technologies. Performance is one factor that has to be considered in choosing the appropriate technology for a particular application. The results presented in this paper show that the nature of response data has a greater impact on relative performance than has been allowed for in most previous studies. Relative performances of the technologies as measured on simple requests and responses are not representative of the behaviour that can be expected in practical applications.


Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et …


Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. We propose an efficient and secure proxy signature scheme with multiple original signers. Our scheme is suitable for wireless electronic commerce applications, since the overheads of computation and communication are low. As an example, we present an electronic air ticket booking scheme for wireless customers.


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam Oct 2012

Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …


Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic Oct 2012

Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic

Rahul Mangharam

Embedded wireless networks have largely focused on open loop sensing and monitoring. To address actuation in closed loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), a …


Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam Oct 2012

Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …


Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr Sep 2012

Technical Assistance, Knowledge Gatekeeping And Indigenous Knowledge: Re-Thinking The International Development Practice, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper presents results from a multi-disciplinary conceptual analysis of development theory and practice. It reviews issues raised and proposes a shift in the epistemology of possession towards an epistemology of practice which is guided by the following aspects (1) The consideration of the learning culture of parties involved, (2) the ability and willingness for decontextualisation of the knowledge by the source and (3) the ability to embedded it by recipients (embededness ), (4) the importance that is attached to knowledge of the host country as reflected through (5) Similarity in culture, values, understanding of context and knowledge bases; (6) …


Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er. Jul 2012

Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.

Radhey Shyam Meena

Switchyard Provides the facilities for switching ,protection & Control of electric power. To handle high Voltage power with proper Safety measures. To isolate the noises coming from the grid with true 50Hz power SWITCH YARD IS IMPORTANT PART IN THERMAL PLANT. IN KALISINDH THERMAL 400KV AND 220KV SWITCH YARD LOCATED.


Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh Jul 2012

Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh

Magdalini Eirinaki

The proliferation of blogs and social networks presents a new set of challenges and opportunities in the way information is searched and retrieved. Even though facts still play a very important role when information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in blogs and social networks are playing an important role influencing everything from the products people buy to the presidential candidate they support. Thus, there is a need for a new type of search engine which will not only retrieve facts, but will also enable the retrieval of opinions. Such a search …


Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub May 2012

Multi-Tier Exploration Concept Demonstration Mission, Jeremy Straub

Jeremy Straub

A multi-tier, multi-craft mission architecture has been proposed but, despite its apparent promise, limited use and testing of the architecture has been conducted. This paper proposes and details a mission concept and its implementation for testing this architecture in the terrestrial environment. It is expected that this testing will allow significant refinement of the proposed architecture as well as providing data on its suitability for use in both terrestrial and extra-terrestrial applications. Logistical and technical challenges with this testing are discussed.


Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr May 2012

Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr

Dr Deogratias Harorimana

With corporate strategy becoming more and more dependent on speed,focus, innovation and strategy, what can MIS do? and what should be MIS role ? what is the relationship between Corporate Strategy KPI and MIS? These questions are answered in an MBA Management Information Systems at USP. This programme is delivered across the entire Pacific region through the Graduate School of Business. It is my privilege to post here few questions that students who attended one of the course in Nadi, at Tanoa International Hotel had to answer in one of the Quiz test.


Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr Apr 2012

Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper discusses mining and mineral operations in the two countries Papua New Guinea and Solomon Islands with regards to its contribution to the overall Gross domestic Product and the economic development of each country.

Our finding shows that mining is an excellent contributor to economic growth and development as in the case of Papua New Guinea.Tax revenue from PNG Mining industries contributions to the PNG fiscal basket remains strong and growing steadily. The mining and minerals tax revenue remains an important contributor to the government fiscal budget over the last 10 years. This has been a strong contributor to …


Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr Apr 2012

Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr

Dr Deogratias Harorimana

No abstract provided.


Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr Apr 2012

Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr

Dr Deogratias Harorimana

The principal objective of this paper is to review the current Tuna Fisheries Policies in the Solomon Islands with a view to proposing strategies that will maximize Job creation while at the same time address the issues that currently exist in this sector. Although the Tuna Industry’s contribution to GDP is quite significant, the Solomon Island Government (SIG) gets little or close to nothing out of it in the form of revenue and Job creation with the majority of vessels being foreign owned and fishing license fees amongst the lowest in the Pacific. SOLTAI which is partly owned by the …


Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes Apr 2012

Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes

C. Jason Woodard

Agents in a peer-to-peer system typically have incentives to influence its network structure, either to reduce their costs or increase their ability to capture value. The problem is compounded when agents can join and leave the system dynamically. This paper proposes three economic mechanisms that offset the incentives for strategic behavior and facilitate the formation of networks with desirable global properties.


Modeling Product Development As A System Design Game, C. Jason Woodard Apr 2012

Modeling Product Development As A System Design Game, C. Jason Woodard

C. Jason Woodard

A system design game is a model of a situation in which agents’ actions determine the structure of a system, which in turn affects the system’s value and the share of value that each agent may capture through bargaining or market competition. This paper describes a class of games in which agents design interdependent products, for example software programs, which may be complements or substitutes for each other. These relationships are epresented by an object called a design structure network (DSN). Depending on the modeler’s choice of allocation rules, agents may benefit from owning critical nodes in the DSN, corresponding …


Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr Apr 2012

Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Solomon Islands is a nation with vast resources with huge potential to excel economically if proper business atmosphere is provided for both private sector development and small and medium enterprises entrepreneurship. Conducive policies that, not only, a mere statement but is broken down to workable strategies with quantitative expected outcome with a strong mentoring mechanism is very important. Previous governments have continuously ignored the importance of having small business policies until lately when NCRA government came up with a set of policies that strategically addresses the significance of small and medium businesses. However, notwithstanding foreign investment is very important in …


Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas Mar 2012

Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas

George J. Pappas

We consider deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Three classes of problems are discussed in detail: coverage control problems, spatial partitioning problems, and dynamic vehicle routing problems. Moreover, we assume that the event distribution is a priori unknown, and can only be progressively inferred from the observation of the location of the actual event occurrences. For each problem we present distributed stochastic gradient algorithms that optimize the performance objective. The stochastic …


Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas Mar 2012

Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas

George J. Pappas

We consider deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Three classes of problems are discussed in detail: coverage control problems, spatial partitioning problems, and dynamic vehicle routing problems. Moreover, we assume that the event distribution is a priori unknown, and can only be progressively inferred from the observation of the location of the actual event occurrences. For each problem we present distributed stochastic gradient algorithms that optimize the performance objective. The stochastic …


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …


Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas Mar 2012

Adaptive Algorithms For Coverage Control And Space Partitioning In Mobile Robotic Networks, Jerome Le Ny, George J. Pappas

George J. Pappas

We consider deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Three classes of problems are discussed in detail: coverage control problems, spatial partitioning problems, and dynamic vehicle routing problems. Moreover, we assume that the event distribution is a priori unknown, and can only be progressively inferred from the observation of the location of the actual event occurrences. For each problem we present distributed stochastic gradient algorithms that optimize the performance objective. The stochastic …


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …


Polaris: Getting Accurate Indoor Orientations For Mobile Devices Using Ubiquitous Visual Patterns On Ceilings, Zheng Sun Feb 2012

Polaris: Getting Accurate Indoor Orientations For Mobile Devices Using Ubiquitous Visual Patterns On Ceilings, Zheng Sun

Zheng Sun

Ubiquitous computing applications commonly use digital compass sensors to obtain orientation of a device relative to the magnetic north of the earth. However, these compass readings are always prone to significant errors in indoor environments due to presence of metallic objects in close proximity. Such errors can adversely affect the performance and quality of user experience of the applications utilizing digital compass sensors.

In this paper, we propose Polaris, a novel approach to provide reliable orientation information for mobile devices in indoor environments. Polaris achieves this by aggregating pictures of the ceiling of an indoor environment and applies computer vision …


Understanding User Generated Content Characteristics : A Hot-Event Perspective, Miao Wang, Guodong Li, Jie Feng, Lisong Xu, Byrav Ramamurthy, Wei Li, Xiaohong Guan Feb 2012

Understanding User Generated Content Characteristics : A Hot-Event Perspective, Miao Wang, Guodong Li, Jie Feng, Lisong Xu, Byrav Ramamurthy, Wei Li, Xiaohong Guan

Miao Wang

Nowadays, millions of Internet users watch and upload a large number of videos on User Generated Content (UGC) sites (e.g., Youtube) everyday. Moreover, online videos about hot events, such as breaking news and Olympic games, attract lots of users. In this paper, we study the characteristics of hot-event videos by collecting video traces of the largest UGC site in China for 28 days. We first empirically study statistical properties of such videos and find that hot-event videos contribute a large number of views, even though the total number of hotevent videos is relatively small. In addition, there exist extremely active …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr Jan 2012

Using The Case Study Methodology In Teaching, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This paper reviews the Why, How, to use the Case Study Methods in MBA teaching. The Presentation was prepared for and delivered as part of MBA students induction Programme in the Graduate School of Business.