Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty Jan 2009

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty

Faculty of Informatics - Papers (Archive)

The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …


Uberveillance: Microchipping People And The Assault On Privacy, M. G. Michael, Katina Michael Jan 2009

Uberveillance: Microchipping People And The Assault On Privacy, M. G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

Uberveillance is above and beyond, an exaggerated, and omnipresent 24/7 electronic surveillance. It is a surveillance that is not only always on but always with you. It is ever-present because the technology that facilitates it, in its ultimate implementation, is embedded within the human body. The inherent problem with this kind of bodily pervasive surveillance is that omnipresence will not always equate with omniscience. Infallibility and ambient context will be for the greater part absent. For as Marcus Wigan has pithily put it, “context is all.” Hence the real concern for misinformation, misinterpretation, and information manipulation of citizens’ data.


Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward Dec 2008

Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

Intelligent interfaces that make use of the user's head pose or facial features in order to interpret the user's identity or point of attention, are finding increasing application in numerous fields. Although various techniques exist to passively track the user's gaze or head pose using monocular or stereo cameras, these systems generally cannot perceive in detail the characteristic three-dimensional (3D) profile of the user's head or face. Time-of-flight cameras, such as the Swiss Ranger SR-3000, are a recent innovation capable of providing three-dimensional image data from a single sensor. The advent of such sensors opens up new possibilities in the …


Efficient Supervised Learning With Reduced Training Exemplars, Giang H. Nguyen, A. Bouzerdoum, Son Lam Phung Jan 2008

Efficient Supervised Learning With Reduced Training Exemplars, Giang H. Nguyen, A. Bouzerdoum, Son Lam Phung

Faculty of Informatics - Papers (Archive)

In this article, we propose a new supervised learning approach for pattern classification applications involving large or imbalanced data sets. In this approach, a clustering technique is employed to reduce the original training set into a smaller set of representative training exemplars, represented by weighted cluster centers and their target outputs. Based on the proposed learning approach, two training algorithms are derived for feed-forward neural networks. These algorithms are implemented and tested on two pattern classification applications - skin detection and image classification. Experimental results show that with the proposed learning approach, it is possible to design networks in a …


A Biologically Inspired Visual Pedestrian Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Jan 2008

A Biologically Inspired Visual Pedestrian Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

In this paper, we present a biologically inspired method for detecting pedestrians in images. The method is based on a convolutional neural network architecture, which combines feature extraction and classification. The proposed network architecture is much simpler and easier to train than earlier versions. It differs from its predecessors in that the first processing layer consists of a set of pre-defined nonlinear derivative filters for computing gradient information. The subsequent processing layer has trainable shunting inhibitory feature detectors, which are used as inputs to a pattern classifier. The proposed pedestrian detection system is evaluated on the DaimlerChrysler pedestrian classification benchmark …


Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, S. Meers, Koren Ward, I. Piper Jan 2008

Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, S. Meers, Koren Ward, I. Piper

Faculty of Informatics - Papers (Archive)

This paper describes an inexpensive, robust method for tracking the head position and orientation of the user by using a single low-cost USB camera and infrared light emitting diodes concealed within spectacle frames worn by the user. Unlike gaze and head-pose tracking systems which rely on high-resolution stereo cameras and complex image processing hardware and software to find and track facial features on the user, the proposed system is able to efficiently locate and track the head's orientation and distance relative to the camera with little processing. Due to the infrared light emitting diodes having fixed geometry, the system does …


Implementing Trusted Terminals With A Tpm And Sitdrm, S. Stamm, N. P. Sheppard, R. Safavi-Naini Jan 2007

Implementing Trusted Terminals With A Tpm And Sitdrm, S. Stamm, N. P. Sheppard, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

In the SITDRM Enterprise system [1], private customer data is protected under customer-provided license policies. When employees of an organization want to use these customers’ data, they must be forced to abide by the policies provided. Some sort of hardened terminal must be used to ensure that not only the hardware and software will cooperate, but that the user of the terminal will too. We use the Trusted Computing Group’s specifications for a trusted platform upon which to build a SITDRM data user terminal that can be proved to implement proper license-enforcing behavior. A Trusted Platform Module (TPM) chip and …


The Adoption Of E-Commerce By Microbusinesses, Katina Michael Jan 2003

The Adoption Of E-Commerce By Microbusinesses, Katina Michael

Faculty of Informatics - Papers (Archive)

In Australia, about 89 per cent of businesses have less than five employees. This equates to 1035 000 microbusinesses. What is important to note is that 637300 of these are non-employing businesses (i.e. sole proprietors) according to the Australian Bureau of Statistics (ABS). By studying these figures it becomes increasingly apparent what a challenging task the majority of business operators have in adopting and successfully integrating electronic commerce into their business. They only have their own resources and experiences to draw on and face a multitude of constraints such as time, money, lack of expertise and access to limited amounts …


The Automatic Identification Trajectory, Katina Michael Jan 2003

The Automatic Identification Trajectory, Katina Michael

Faculty of Informatics - Papers (Archive)

The top-secret ENIAC project, at the Moore School of Engineering at the University of Pennsylvania, was first made known to the public in February 1946. Reporters used 'anthropomorphic' and 'awesome characterisations' to describe the computer. In an article entitled 'The myth of the awesome thinking machine', Martin stated that the ENIAC was referred to in headlines as 'a child, a Frankenstein, a whiz kid, a predictor and controller of weather, and a wizard'.


Integrating Islands Of Information Through Crm, Katina Michael Jan 2003

Integrating Islands Of Information Through Crm, Katina Michael

Faculty of Informatics - Papers (Archive)

It was not so long ago that one would pull up into a service station and be greeted by an attendant who would customarily ask whether or not to fill up the car with petrol. Of course, today things have changed. Petrol station attendants have been replaced by something called 'self-service'. The customer is empowered and has the responsibility to fill up their own car with as much petrol as they want. A little extra effort perhaps but no one seems to mind, apart from the countless number of people who lost their jobs as attendants. What is noticeable, however, …


The Battle Against Security Attacks, Katina Michael Jan 2003

The Battle Against Security Attacks, Katina Michael

Faculty of Informatics - Papers (Archive)

Medium-to-large-sized companies are increasingly using their intranets to broadcast company-wide messages and store valuable information. Employees can choose to view multimedia- based messages from company executives, link to the latest product success stories, download the most recent technical specifications or refer to the most up-to-date pricing figures. Whatever the requirement, organisations have become very reliant upon electronic intra- and intercommunication methods. Whether it is sending an email with an attachment to a client, downloading information from the knowledge management system (KMS) or placing files in one another's public folders, employees now expect the technological capabilities to be available all the …


Barunga Music Online, A. Toshack, Katina Michael Jan 2003

Barunga Music Online, A. Toshack, Katina Michael

Faculty of Informatics - Papers (Archive)

Barunga Music is a fictitious company, used for the sole purpose of creating this case study:
Barunga Music is an organisation that records, markets and sells Aboriginal compositions. Barunga is a small business that operates a physical store based in Melbourne. The organisation was established in 1994 by Stephen Clark and business partner Daniel Stone. The company employs 10 staff members, including a part-time IT professional.


The Online Privacy Frontier, Katina Michael Jan 2003

The Online Privacy Frontier, Katina Michael

Faculty of Informatics - Papers (Archive)

Many web sites pride themselves on offering personalised customer service, but that really depends on the amount of information the online shopper is willing to give the online merchant. In most cases, unless a purchase is made or some other form of transaction is enacted, the online shopper will not declare their identity. How personalised can an experience be online if one entity decides to remain anonymous? The online merchant has little, if any, information to go on apart from perhaps a cookie that tells them that the visitor is a repeat visitor to that web site. The seller does …


Global Telerobotics: Exploring Effective Internet Access To Robots, Simon Hartfiel, Susan Hartfiel, Leone Dunn Jan 1996

Global Telerobotics: Exploring Effective Internet Access To Robots, Simon Hartfiel, Susan Hartfiel, Leone Dunn

Faculty of Informatics - Papers (Archive)

This paper describes an Industrial Automation research project at the University of Wollongong, Australia. The project aims to develop a telerobotic planning and control architecture and human robot interface that can be used for intervention robots which require task level programming. In order to investigate global telerobotic principles, the workspace will be made accessible across the Internet via the World Wide Web. The paper describes the experimental setup and implementation of this project, focussing on a discussion of human robot interaction issues, such as interface design problems and the use of a World Wide Web browser for user interaction.


Ff-Pade Method Of Model Reduction In Frequency Domain, H. Xiheng Jan 1987

Ff-Pade Method Of Model Reduction In Frequency Domain, H. Xiheng

Faculty of Informatics - Papers (Archive)

In this note the FF-Pade method based upon some new concepts in model reduction is presented. The new method will overcome the chief drawbacks of the current methods. Some typical examples are used to show convincingly that one has to break free from the conventional approaches in order to obtain better results in model reduction.