Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 221

Full-Text Articles in Social and Behavioral Sciences

The Relevance Of Emotional Intelligence For Leadership In A Higher Education Context, Dominique R. Parrish Jan 2015

The Relevance Of Emotional Intelligence For Leadership In A Higher Education Context, Dominique R. Parrish

Faculty of Science, Medicine and Health - Papers: part A

This paper reports on a case-study research investigation that sought to identify the relevance of emotional intelligence for effective higher education academic leadership. Semi-structured interviews were conducted, pre and post a leadership capacity development intervention, to gather broad data on participants' experiences, insights, and engagement in leadership and the utilisation of emotional intelligence in leading. The study found that emotional intelligence is recognised as a highly relevant and important requirement for academic leadership in higher education. Additionally, the investigation ascertained that emotional intelligence traits related to empathy, inspiring and guiding others and responsibly managing oneself were most applicable for academic ...


Making Country Good: Stewardship And Environmental Change In Central Australian Pastoral Culture, Nicholas Gill Jan 2014

Making Country Good: Stewardship And Environmental Change In Central Australian Pastoral Culture, Nicholas Gill

Faculty of Social Sciences - Papers (Archive)

Rural stewardship has been a focus of much natural resource management policy in Australia and elsewhere. Despite landowners professing stewardship, some researchers have cast doubt on the utility of the concept due to its vagueness and difficulties of associating attitudes with behaviour. In contrast I argue that stewardship should remain an important concept for understanding rural cultures, landholder practices and the politics of land. Stewardship, however, needs to be understood as emergent, as a 'dwelt achievement', as having temporal depth and as being part of the production of socio-natures. Moreover, as a key vernacular practice, its capacities and vulnerabilities require ...


Carbon Dioxide Rebreathing In Respiratory Protective Devices: Influence Of Speech And Work Rate In Full-Face Masks, Carmen L. Smith, Jane L. Whitelaw, Brian Davies Mar 2013

Carbon Dioxide Rebreathing In Respiratory Protective Devices: Influence Of Speech And Work Rate In Full-Face Masks, Carmen L. Smith, Jane L. Whitelaw, Brian Davies

Faculty of Science, Medicine and Health - Papers: part A

Carbon dioxide (CO2) rebreathing has been recognised as a concern regarding respirator use and is related to symptoms of discomfort, fatigue, dizziness, headache, muscular weakness and drowsiness. Previous investigations are limited by small sample size and have not evaluated the relationship between CO2 inhalation and phonic respiration (breathing during speech) in respiratory protective devices (RPDs). A total of 40 workers trained in the use of RPDs performed a graded exercise test on a cycle ergonometer that increased in workload every 5 min. During the third minute of each stage, participants read aloud a prepared text. Measures of mixed expired CO2 ...


'Reel Love' Across Ethnic Boundaries? The Extent And Significance Of Inter-Ethnic Intimacy In Australian Cinema, Natascha Klocker, Elyse Stanes Jan 2013

'Reel Love' Across Ethnic Boundaries? The Extent And Significance Of Inter-Ethnic Intimacy In Australian Cinema, Natascha Klocker, Elyse Stanes

Faculty of Science, Medicine and Health - Papers: part A

National cinemas play an important role in the construction of national identities, representing the 'self' to both domestic and international audiences. Evidence of the material impacts of media representations on individuals and society, and the pervasiveness of movie-watching as a cultural activity, underscore the importance of scholarly inquiry into film. Here, we are concerned with how ethnic diversity has been negotiated within the Australian national cinema - specifically at the scale of intimate interpersonal relationships. Our analysis of twenty-five recent Australian films considers how cinema alerts audiences to the possibilities and limitations of love within and across ethnic boundaries. We find ...


Computerisation Of Perinatal Data Entry: Is The Data Accurate?, Alison Craswell, Lorna Moxham, Marc Broadbent Jan 2013

Computerisation Of Perinatal Data Entry: Is The Data Accurate?, Alison Craswell, Lorna Moxham, Marc Broadbent

Faculty of Science, Medicine and Health - Papers: part A

Perinatal data (PD) is collected for mothers and babies Australia wide as mandated at a federal level. The data is used to monitor patterns in midwifery, obstetric and neonatal practice and health outcomes and is also used for research purposes, funding allocation and the education of midwives and medical officers. Accuracy in PD is most often reported via quantitative validation studies of PD collections both internationally and within Australia [1]. These studies report varying levels of accuracy in PD collection and suggest researchers need to be more aware of the quality of data they use. This paper presents findings from ...


Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au Jan 2013

Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au

Faculty of Engineering and Information Sciences - Papers: Part A

The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data are usually encrypted prior to being outsourced. Nevertheless, effective data utilization remains a challenging task and there is a clear need for a secure and efficient searching mechanism over the encrypted data in the cloud, to increase the us-ability of the secure cloud environment. Unfortunately, existing work in the area of ...


Some New Constructions Of Orthogonal Designs, Tianbing Xia, Jennifer Seberry, Mingyuan Xia, Shangli Zhang Jan 2013

Some New Constructions Of Orthogonal Designs, Tianbing Xia, Jennifer Seberry, Mingyuan Xia, Shangli Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper we construct OD(4pqr(q+1); pqr, pqr, pqr, pqr, pqr+1, pqr+1, pqr+1, pqr+1) for each core order q ≡ 3(mod 4), r ≥ 0 or q = 1, p odd, p ≤ 21 and p ∈ {25, 49}, and COD(2qr(q + 1); qr, qr, qr+1, qr+1) for any prime power q ≡ 1 (mod 4) (including q = 1), r ≥ 0.


Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari Jan 2013

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a novel approach for optimal key characteristics-based sensor distribution in a multi-station assembly process, for the purpose of diagnosing variation sources responsible for product quality defects in a timely manner. Current approaches for sensor distribution are based on the assumption that measurement points can be allocated at arbitrary locations on the part or subassembly. This not only presents challenges in the implementation of these approaches but additionally does not allow required product assurance and quality control standards to be integrated with them, due to lack of explicit relations between measured features and geometric dimensioning and tolerancing (GD ...


Social Media Influence On Viewer Engagement, Mark Freeman, Matthew Halliwell, Alison E. Freeman Jan 2013

Social Media Influence On Viewer Engagement, Mark Freeman, Matthew Halliwell, Alison E. Freeman

Faculty of Engineering and Information Sciences - Papers: Part A

Society is being reshaped through Social Media. The case of Social Media integration into the London 2012 Olympics mainstream media coverage is used to demonstrate this. Social Media has modified television viewing from a passive to an active activity. It has also allowed opinions to be shared more quickly and broadly. Analysis of practical examples through the theoretical lens of sociomateriality demonstrates that greater use of the components in the 'Theoretical Framework of Member Needs' reflect the presence of viewers who are more active. This paper discusses the inability to separate the use of technology from its social context, the ...


Improving Graph Matching Via Density Maximization, Chao Wang, Lei Wang, Lingqiao Liu Jan 2013

Improving Graph Matching Via Density Maximization, Chao Wang, Lei Wang, Lingqiao Liu

Faculty of Engineering and Information Sciences - Papers: Part A

Graph matching has been widely used in various applications in computer vision due to its powerful performance. However, it poses three challenges to image sparse feature matching: (1) The combinatorial nature limits the size of the possible matches, (2) It is sensitive to outliers because the objective function prefers more matches, (3) It works poorly when handling many-to-many object correspondences, due to its assumption of one single cluster for each graph. In this paper, we address these problems with a unified framework-Density Maximization. We propose a graph density local estimator (DLE) to measure the quality of matches. Density Maximization aims ...


Optimal Design Of An Ultrasmall Soi-Based 1 X 8 Flat-Top Awg By Using An Mmi, Hongqiang Li, Yaoting Bai, Xiaoyi Dong, Enbang Li, Yang Li, Yu Liu, Wenqian Zhou Jan 2013

Optimal Design Of An Ultrasmall Soi-Based 1 X 8 Flat-Top Awg By Using An Mmi, Hongqiang Li, Yaoting Bai, Xiaoyi Dong, Enbang Li, Yang Li, Yu Liu, Wenqian Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

Four methods based on a multimode interference (MMI) structure are optimally designed to flatten the spectral response of silicon-on-insulator- (SOI-) based arrayed-waveguide grating (AWG) applied in a demodulation integration microsystem. In the design for each method, SOI is selected as the material, the beam propagation method is used, and the performances (including the 3 dB passband width, the crosstalk, and the insertion loss) of the flat-top AWG are studied. Moreover, the output spectrum responses of AWGs with or without a flattened structure are compared. The results show that low insertion loss, crosstalk, and a flat and efficient spectral response are ...


Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun Jan 2013

Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun

Faculty of Engineering and Information Sciences - Papers: Part A

Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and ...


Realizing Fully Secure Unrestricted Id-Based Ring Signature In The Standard Model Based On Hibe, Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou Jan 2013

Realizing Fully Secure Unrestricted Id-Based Ring Signature In The Standard Model Based On Hibe, Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

We describe a secure and unrestricted identity-based ring signature scheme in the standard model. Our construction is provably fully secure in the standard model under static assumptions and is motivated by an existing HIBE scheme. Our observation on the relationship between ID-based ring signatures and HIBE is of interest to researchers in other fields as well. Following the strongest anonymity definition in ring signatures, we define a new level of anonymity for ID-based ring signatures in which the attacker can specify the randomness used in the creation of the user secret key, in addition to the private key generators master ...


Systematic Network Design For Liner Shipping Services, Shuaian Wang, Zhiyuan Liu, Qiang Meng Jan 2013

Systematic Network Design For Liner Shipping Services, Shuaian Wang, Zhiyuan Liu, Qiang Meng

Faculty of Engineering and Information Sciences - Papers: Part A

A systematic design for a liner shipping network was addressed. Many practical features in real-world operations, including multiple types of containers, container transshipment operations, empty container repositioning, origin-to-destination transit time constraints, consistent services with the current network, and joint services with other liner shipping companies, were considered. Given a set of candidate ship routes, some of these routes had to be used, and the use of others was optional. A mixed-integer linear programming model was proposed for the selection of optional ship routes. The solution of this model provided the laden and empty container flow on the selected ship routes ...


Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan Jan 2013

Risk Management In Liner Ship Fleet Deployment: A Joint Chance Constrained Programming Model, Tingsong Wang, Qiang Meng, Shuaian Wang, Zhijia Tan

Faculty of Engineering and Information Sciences - Papers: Part A

This paper provides a tangible methodology to deal with the liner ship fleet deployment problem aiming at minimizing the total cost while maintaining a service level under uncertain container demand. The problem is first formulated as a joint chance constrained programming model, and the sample average approximation method and mixed-integer programming are used to deal with it. Finally, a numerical example of a liner shipping network is carried out to verify the applicability of the proposed model and solution algorithm. It is found that the service level has significant effect on the total cost.


Noise Robust Keyword Spotting For User Generated Video Blogs, M S. Barakat, C H. Ritz, D A. Stirling Jan 2013

Noise Robust Keyword Spotting For User Generated Video Blogs, M S. Barakat, C H. Ritz, D A. Stirling

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a template-based system for speaker independent key word spotting (KWS) in continuous speech that can help in automatic analysis, indexing, search and retrieval of user generated videos by content. Extensive experiments on clean speech confirm that the proposed approach is superior to a HMM approach when applied to noisy speech with different signal-to-noise ratio (SNR) levels. Experiments conducted to detect swear words, personal names and product names within a set of online user generated video blogs shows significantly better recall and precision results compared to a traditional ASR-based approach.


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Jan 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Faculty of Engineering and Information Sciences - Papers: Part A

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then ...


Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini Jan 2013

Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini

Faculty of Engineering and Information Sciences - Papers: Part A

Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the image. Scalable compression allows a single compressed image to produce a variety of reduced resolution or reduced quality images, termed subimages, to suit the different display or bandwidth requirements of each user. However, highly scaled subimages remove a substantial fraction of the data in ...


Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin Jan 2013

Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Network robustness and throughput can be improved by routing each source-to-terminal (s, t) demand via two link-disjoint paths (TLDP). However, the use of TLDP incurs higher energy cost. Henceforth, we address the problem of minimizing the energy usage of networks that use TLDP. Specifically, our problem is to maximally switch off redundant network links while maintaining at least 0zT100% of (s, t) TLDP in the network, for a given T, and limiting the maximum link utilization (MLU) to no greater than a configured threshold. To address this problem, we present a fast heuristic, called TLDP by Shortest Path First (TLDP-SPF ...


Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin Jan 2013

Approximation Algorithms For Interference Aware Broadcast In Wireless Networks, Dianbo Zhao, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Broadcast is a fundamental operation in wireless networks and is well supported by the wireless channel. However, the interference resulting from a node's transmission pose a key challenge to the design of any broadcast algorithms/protocols. In particular, it is well known that a node's interference range is much larger than its transmission range and thus limits the number of transmitting and receiving nodes, which inevitably prolong broadcast. To this end, a number of past studies have designed broadcast algorithms that account for this interference range with the goal of deriving a broadcast schedule that minimizes latency. However ...


The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad Jan 2013

The Joint Effect Of Image Blur And Illumination Distortions For Mobile Visual Search Of Print Media, Yi Cao, Christian Ritz, Raad Raad

Faculty of Engineering and Information Sciences - Papers: Part A

Mobile Visual Search (MVS) is an emerging area of research given the explosion of smart and powerful mobile devices. Typically, the performance of MVS applications is influenced by the implemented image processing algorithms as well as various distortions that occur when capturing images by the mobile camera. This paper examines the joint effect of two common distortions, namely the illumination changes and image blurring on image matching accuracy for print media when using four state-of-the art local feature algorithms. Results obtained for a database of real camera images captured by two different camera models show that the illumination changes have ...


Factors Associated With Differences In Quit Rates Between 'Specialist' And 'Community' Stop-Smoking Practitioners In The English Stop-Smoking Services, Mairtin S. Mcdermott, Emma Beard, Leonie S. Brose, Robert West, Andy Mcewen Jan 2013

Factors Associated With Differences In Quit Rates Between 'Specialist' And 'Community' Stop-Smoking Practitioners In The English Stop-Smoking Services, Mairtin S. Mcdermott, Emma Beard, Leonie S. Brose, Robert West, Andy Mcewen

Faculty of Engineering and Information Sciences - Papers: Part A

Introduction: Behavioral support improves smokers' chances of quitting, but quit rates are typically lower for smokers supported by "community practitioners" for whom smoking cessation is a small part of their job than for those supported by "specialist practitioners" for whom it is the main role. This article examined the factors that might contribute to this. Method: A total of 573 specialist practitioners and 466 community practitioners completed a 42-item online survey that covered demographic and employment information, current practices, levels of training, and 4-week CO-verified quit rates. Responses were compared for community and specialist practitioners. Mediation analysis was undertaken to ...


Bunker Consumption Optimization Methods In Shipping: A Critical Review And Extensions, Shuaian Wang, Qiang Meng, Zhiyuan Liu Jan 2013

Bunker Consumption Optimization Methods In Shipping: A Critical Review And Extensions, Shuaian Wang, Qiang Meng, Zhiyuan Liu

Faculty of Engineering and Information Sciences - Papers: Part A

It is crucial nowadays for shipping companies to reduce bunker consumption while maintaining a certain level of shlpping service in view of the high bunker price and concerned shipping emissions. After introducing the three bunker consumption optimization contexts: minimization of total operating cost. minimization of emission and collaborative mechanisms between port operators and shipping companies, this paper presents a aiticaJ and timely literature review on mathematical solution methods for bunker consumption optimization problems. Several navel bunker consumption optimization methods are subsequently proposed. The applicability, optimality, and efficiency of the existing and newly proposed methods are al5o analyzed. This paper provides ...


Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison Jan 2013

Evidence-Free Policy: The Case Of The National Injury Insurance Scheme, Mark Harrison

Faculty of Engineering and Information Sciences - Papers: Part A

The Productivity Commission report 'Disability Care and Support' recommends tort liability be replaced by a compulsory, government-run, no-fault scheme. But theory and evidence indicate moving to a no-fault scheme will increase the accident rate. Even a move from non-risk-rated third-party insurance to non-risk-rated first-party insurance reduces incentives for care. A no-fault scheme is not superior to current policies; genuine reform will need to be informed by law and economics literature.


Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung Jan 2013

Probabilistic Fuzzy Image Fusion Approach For Radar Through Wall Sensing, C H. Seng, A Bouzerdoum, M G. Amin, S L Phung

Faculty of Engineering and Information Sciences - Papers: Part A

This paper addresses the problem of combining multiple radar images of the same scene to produce a more informative composite image. The proposed approach for probabilistic fuzzy logic-based image fusion automatically forms fuzzy membership functions using the Gaussian-Rayleigh mixture distribution. It fuses the input pixel values directly without requiring fuzzification and defuzzification, thereby removing the subjective nature of the existing fuzzy logic methods. In this paper, the proposed approach is applied to through-the-wall radar imaging in urban sensing and evaluated on real multiview and polarimetric data. Experimental results show that the proposed approach yields improved image contrast and enhances target ...


Self-Adaptation-Based Dynamic Coalition Formation In A Distributed Agent Network: A Mechanism And A Brief Survey, Dayong Ye, Minjie Zhang, Danny Sutanto Jan 2013

Self-Adaptation-Based Dynamic Coalition Formation In A Distributed Agent Network: A Mechanism And A Brief Survey, Dayong Ye, Minjie Zhang, Danny Sutanto

Faculty of Engineering and Information Sciences - Papers: Part A

In some real systems, e.g., distributed sensor networks, individual agents often need to form coalitions to accomplish complex tasks. Due to communication and computation constraints, it is infeasible for agents to directly interact with all other agents to form coalitions. Most previous coalition formation studies, however, overlooked this aspect. Those studies did not provide an explicitly modeled agent network or assumed that agents were in a fully connected network, where an agent can directly communicate with all other agents. Thus, to alleviate this problem, it is necessary to provide a neighborhood network structure, within which agents can directly interact ...


Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry Jan 2013

Strong Amicable Orthogonal Designs And Amicable Hadamard Matrices, Jennifer Seberry

Faculty of Engineering and Information Sciences - Papers: Part A

Amicable orthogonal designs have renewed interest because of their use in mobile communications. We show the existence of strong amicable orthogonal designs, AOD(n: 1, n - 1; 1, n - 1), for n = pr + 1, p ≡ 3 (mod 4) a prime and for n = 2r, n a non-negative integer in a form more suitable for communications. Unfortunately the existence of amicable Hadamard matrices is not enough to demonstrate the existence of strong amicable orthogonal designs.


The Role Of Public Procurement In Improving Accessibility To Ict, Gunela Astbrink, William Tibben Jan 2013

The Role Of Public Procurement In Improving Accessibility To Ict, Gunela Astbrink, William Tibben

Faculty of Engineering and Information Sciences - Papers: Part A

Government bodies use public procurement policies and mechanisms to purchase ICT products and services. Some governments in OECD countries apply accessibility criteria when procuring ICT to improve access to their services and employment opportunities for people with disabilities. This may have a flow-on effect of greater availability of affordable and accessible ICT thus improving digital inclusion. This paper outlines research on comparative analysis of the situation in Australia with current policy in OECD countries. The research resulted in recommendations for a consumer-oriented plan to work with Australian governments on the introduction of accessibility criteria in ICT public procurement.


Model-Driven Disaster Management, Siti Hajar Othman, Ghassan Beydoun Jan 2013

Model-Driven Disaster Management, Siti Hajar Othman, Ghassan Beydoun

Faculty of Engineering and Information Sciences - Papers: Part A

Disaster management (DM) is a challenging domain to model because of the variety of dynamic characteristics attached to the domain. Metamodeling is a model-driven approach that describes how semantic domain models can be built into an artifact called a Metamodel. By collecting all the domain concepts and partitioning the domain problems into sub-domain-problems, a metamodel can produce a domain-specific language. This paper presents a Disaster Management Metamodel that can serve as a representational layer of DM expertise. This metamodel leads to better knowledge sharing and facilitates combining and matching different DM activities to best manage the disaster on hand.


Performance Evaluation Of Cooperative Communications For Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei Jan 2013

Performance Evaluation Of Cooperative Communications For Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei

Faculty of Engineering and Information Sciences - Papers: Part A

Recently, the combination of cooperative communication, Space-Time-Frequency Codes (STFCs) and Multiband OFDM Ultra-Wideband (MB-OFDM UWB) has been proposed to improve the data rate, system capacity and reliability. This paper provides insightful performance evaluation for our previous proposed cooperative communication schemes for MBOFDM UWB systems. In particular, this paper shows that the usefulness of cooperative communication schemes is decided by the mutual relation between the signal-to-noise ratio (SNR) of the inter-node links, referred to as inter-node SNR, and that of the uplinks, which is referred to as uplink SNR. For a certain uplink SNR value, cooperative communication becomes useful when the ...