Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Science and Technology Studies

Functorial Properties Of Putnam's Homology Theory For Smale Spaces, Robin J. Deeley, D. Brady Killough, Michael F. Whittaker Jan 2016

Functorial Properties Of Putnam's Homology Theory For Smale Spaces, Robin J. Deeley, D. Brady Killough, Michael F. Whittaker

Faculty of Engineering and Information Sciences - Papers: Part A

We investigate functorial properties of Putnam's homology theory for Smale spaces. Our analysis shows that the addition of a conjugacy condition is necessary to ensure functoriality. Several examples are discussed that elucidate the need for our additional hypotheses. Our second main result is a natural generalization of Putnam's Pullback Lemma from shifts of finite type to non-wandering Smale spaces.


Vulnerability Analysis Of Hydrological Infrastructure To Flooding In Coastal Cities - A Graph Theory Approach, Robert Ighodaro Ogie, Tomas Holderness, Sarah Dunn, Etienne Turpin Jan 2016

Vulnerability Analysis Of Hydrological Infrastructure To Flooding In Coastal Cities - A Graph Theory Approach, Robert Ighodaro Ogie, Tomas Holderness, Sarah Dunn, Etienne Turpin

Faculty of Engineering and Information Sciences - Papers: Part A

Hydrological infrastructure such as pumps and floodgates are invaluable assets for mitigating flooding in coastal cities. These infrastructure components are often vulnerable to damage or failure due to the impact of flood waters, thus exacerbating the flood hazards and causing significant loss of life and destruction to property worth billions of dollars. Hence, there is a growing need worldwide to enhance the understanding of flood vulnerability and to develop key metrics for assessing it. This study proposes an approach for measuring the vulnerability of hydrological infrastructure to flood damage in coastal cities. In this approach, a hydrological infrastructure flood vulnerability …


The K-Theory Of Heegaard Quantum Lens Spaces, Piotr M. Hajac, Adam Rennie, Bartosz Zielinski Sep 2015

The K-Theory Of Heegaard Quantum Lens Spaces, Piotr M. Hajac, Adam Rennie, Bartosz Zielinski

Associate Professor Adam Rennie

Representing Z/NZ as roots of unity, we restrict a natural U(1)-action on the Heegaard quantum sphere to Z/NZ, and call the quotient spaces Heegaard quantum lens spaces. Then we use this representation of Z/NZ to construct an associated complex loine bundle. This paper proves the stable non-triviality of these line bundles over any of the quantum lens spaces we consider. We use the pullback structure of the C*-algebra of the lens space to compute its K-theory via the Mayer-Vietoris sequence, and an explicit form of the Bass connecting homomorphism to prove the stable non-triviality of the bundles. On the algebraic …


Membrane Biological Reactors: Theory, Modeling, Design, Management And Applications To Wastewater Reuse, Faisal Hai, Kazou Yamamoto, Chung-Hak Lee Sep 2015

Membrane Biological Reactors: Theory, Modeling, Design, Management And Applications To Wastewater Reuse, Faisal Hai, Kazou Yamamoto, Chung-Hak Lee

Faisal I Hai

Membrane Biological Reactors: Theory, Modeling, Design, Management and Applications to Wastewater Reuse comprehensively covers the salient features and emerging issues associated with the MBR technology. The book provides thorough coverage starting from biological aspects and fundamentals of membranes, via modeling and design concepts, to practitioners’ perspective and good application examples. Membrane Biological Reactors focuses on all the relevant emerging issues raised by including the latest research from renowned experts in the field. It is a valuable reference to the academic and professional community and suitable for undergraduate and postgraduate teaching in Environmental Engineering, Chemical Engineering and Biotechnology.


The Bulk-Edge Correspondence For The Quantum Hall Effect In Kasparov Theory, Christopher J. Bourne, Alan L. Carey, Adam C. Rennie Jan 2015

The Bulk-Edge Correspondence For The Quantum Hall Effect In Kasparov Theory, Christopher J. Bourne, Alan L. Carey, Adam C. Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

We prove the bulk-edge correspondence in K-theory for the quantum Hall effect by constructing an unbounded Kasparov module from a short exact sequence that links the bulk and boundary algebras. This approach allows us to represent bulk topological invariants explicitly as a Kasparov product of boundary invariants with the extension class linking the algebras. This paper focuses on the example of the discrete integer quantum Hall effect, though our general method potentially has much wider applications.


From Theory To Practice In Rail Geotechnology, B Indraratna, Sanjay Nimbalkar, N Tennakoon, Q D. Sun Mar 2014

From Theory To Practice In Rail Geotechnology, B Indraratna, Sanjay Nimbalkar, N Tennakoon, Q D. Sun

Buddhima Indraratna

In recent times the increase in axle loads and train speeds have posed serious geotechnical issues with ballasted railway tracks, both in Australia and the world. The large deformations and degradation of ballast under cyclic and impact loads, and the low bearing capacity of compacted ballast and impaired drainage often exacerbate track maintenance. In recent times in Australia, geosynthetics have been trialed in ballasted tracks constructed on soft and saturated formations to help improve stability and longevity. Comprehensive field studies on instrumented tracks at Bulli (near Wollongong) and Singleton (near Newcastle) supported by RailCorp and ARTC, were carried out to …


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong Mar 2014

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Professor Willy Susilo

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is …


Thinking About The Processes Used When Organisations Select And Evaluate Software: Operationalising Ict Evaluation Theory, Darren Skidmore, Linda Dawson Jan 2014

Thinking About The Processes Used When Organisations Select And Evaluate Software: Operationalising Ict Evaluation Theory, Darren Skidmore, Linda Dawson

Associate Professor Linda Dawson

No abstract provided.


Shape Optimization Of Thin-Walled Steel Sections Using Graph Theory And Aco Algorithm, Pezhman Sharafi, Lip H. Teh, Muhammad N. S Hadi Jan 2014

Shape Optimization Of Thin-Walled Steel Sections Using Graph Theory And Aco Algorithm, Pezhman Sharafi, Lip H. Teh, Muhammad N. S Hadi

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents an intuitive procedure for the shape and sizing optimizations of open and closed thin-walled steel sections using the graph theory. The goal is to find shapes of optimum mass and strength (bi-objectives). The shape optimization of open sections is treated as a multi-objective all-pairs shortest path problem, while that of closed sections is treated as a multi-objective minimum mean cycle problem. The sizing optimization of a predetermined shape is treated as a multi-objective single-pair shortest path problem. Multi-colony ant algorithms are formulated for solving the optimization problems. The verification and numerical examples involving the shape optimizations of …


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong Jan 2014

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme is …


Spline-Shape Modification For Frp-Confined Concrete Columns: Theory And Evaluation, Muhammad N. S Hadi, Xu Lei Jan 2014

Spline-Shape Modification For Frp-Confined Concrete Columns: Theory And Evaluation, Muhammad N. S Hadi, Xu Lei

Faculty of Engineering and Information Sciences - Papers: Part A

The confinement efficiency for FRP-confined square concrete columns is relatively low compared to circular columns due to a large area of ineffectively-confined concrete and stress concentration at sharp corners. Shape modification of square concrete columns has been proposed but modifying the shape of cross-section from a square to a circle results in a significant increase in crosssectional area and self-weight of the columns, which raises new issues and is not practical when the space in the structure is limited. To address the abovementioned issues, a spline-shaped cross-section is proposed in this study as a target shape for shape modification. A …


Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie Oct 2013

Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie

Associate Professor Adam Rennie

We present a definition of spectral flow for any norm closed ideal J in any von Neumann algebra N. Given a path of selfadjoint operators in N which are invertible in N/J, the spectral flow produces a class in Ko(J).Given a semifinite spectral triple (A, H, D) relative to (N, t) with A separable, we construct a class [D] ? KK1(A, K(N)). For a unitary u ? A, the von Neumann spectral flow between D and u*Du is equal to the Kasparov product [u]A[D], and is simply related to the numerical spectral flow, and a refined C*-spectral flow.


Spectral Flow Invariants And Twisted Cyclic Theory For The Haar State On Suq(2), A L. Carey, A Rennie, K Tong Oct 2013

Spectral Flow Invariants And Twisted Cyclic Theory For The Haar State On Suq(2), A L. Carey, A Rennie, K Tong

Associate Professor Adam Rennie

In [A.L. Carey, J. Phillips, A. Rennie, Twisted cyclic theory and an index theory for the gauge invariant KMS state on Cuntz algebras. arXiv:0801.4605], we presented a K-theoretic approach to finding invariants of algebras with no non-trivial traces. This paper presents a new example that is more typical of the generic situation. This is the case of an algebra that admits only non-faithful traces, namely SUq.2/ and also KMS states. Our main results are index theorems (which calculate spectral flow), one using ordinary cyclic cohomology and the other using twisted cyclic cohomology, where the twisting comes from the generator of …


Spectral Triples: Examples And Index Theory, Alan L. Carey, John Phillips, Adam C. Rennie Oct 2013

Spectral Triples: Examples And Index Theory, Alan L. Carey, John Phillips, Adam C. Rennie

Associate Professor Adam Rennie

The main objective of these notes is to give some intuition about spectral triples and the role they play in index theory. The notes are basically a road map, with much detail omitted. To give a complete account of all the topics covered would require at least a book, so we have opted for a sketch.


Twisted Cyclic Theory, Equivariant Kk-Theory And Kms States, Alan L. Carey, Sergey Neshveyev, R Nest, Adam Rennie Oct 2013

Twisted Cyclic Theory, Equivariant Kk-Theory And Kms States, Alan L. Carey, Sergey Neshveyev, R Nest, Adam Rennie

Associate Professor Adam Rennie

Given a C-algebra A with a KMS weight for a circle action, we construct and compute a secondary invariant on the equivariant K-theory of the mapping cone of AT ,! A, both in terms of equivariant KK-theory and in terms of a semifinite spectral flow. This in particular puts the previously considered examples of Cuntz algebras [10] and SUqð2Þ [14] in a general framework. As a new example we consider the Araki-Woods IIIl representations of the Fermion algebra.


Optimising Layered Integrated Instructional Design Through The Application Of Cognitive Load Theory, Abdallah Alasraj, Mark Freeman, Paul Chandler Oct 2013

Optimising Layered Integrated Instructional Design Through The Application Of Cognitive Load Theory, Abdallah Alasraj, Mark Freeman, Paul Chandler

Dr Mark Freeman

This study examined the effect of cognitive load on knowledge construction through the use of web-based layered integrated instructional design techniques. The premise through using this approach was that it would better facilitate a learner’s schema development. This research focused on how the design of web-based integrated instructional materials can utilise the principles of Cognitive Load Theory (CLT), to optimise the learning process within the university environment for learning models of procedural tasks. The study compared three different layered integrated instructional designs to identify which approach had the greatest benefit on learning outcomes. The procedural task that was used involved …


Eliciting And Specifying Requirements For Highly Interactive Systems Using Activity Theory, Robert B. K. Brown, Peter Hyland, Ian C. Piper Jun 2013

Eliciting And Specifying Requirements For Highly Interactive Systems Using Activity Theory, Robert B. K. Brown, Peter Hyland, Ian C. Piper

Dr Ian Piper

The processes of eliciting user requirements and formalising these into specifications are critical for the success of highly interactive systems. These processes are still poorly understood, partly because current methods are usually ad hoc and lack any theoretical basis. A number of researchers have used Activity Theory (AT) to refine these processes and have met with some success. To date, this approach has been more useful explaining the processes post hoc. This positional paper proposes an AT method for requirement elicitation and specification definition. The method is sufficiently prescriptive and well formed that it does not require any detailed understanding …


From Theory To Practice In Rail Geotechnology, B Indraratna, Sanjay Nimbalkar, N Tennakoon, Q D. Sun Jan 2013

From Theory To Practice In Rail Geotechnology, B Indraratna, Sanjay Nimbalkar, N Tennakoon, Q D. Sun

Faculty of Engineering and Information Sciences - Papers: Part A

In recent times the increase in axle loads and train speeds have posed serious geotechnical issues with ballasted railway tracks, both in Australia and the world. The large deformations and degradation of ballast under cyclic and impact loads, and the low bearing capacity of compacted ballast and impaired drainage often exacerbate track maintenance. In recent times in Australia, geosynthetics have been trialed in ballasted tracks constructed on soft and saturated formations to help improve stability and longevity. Comprehensive field studies on instrumented tracks at Bulli (near Wollongong) and Singleton (near Newcastle) supported by RailCorp and ARTC, were carried out to …


The K-Theory Of Heegaard Quantum Lens Spaces, Piotr M. Hajac, Adam Rennie, Bartosz Zielinski Jan 2013

The K-Theory Of Heegaard Quantum Lens Spaces, Piotr M. Hajac, Adam Rennie, Bartosz Zielinski

Faculty of Engineering and Information Sciences - Papers: Part A

Representing Z/NZ as roots of unity, we restrict a natural U(1)-action on the Heegaard quantum sphere to Z/NZ, and call the quotient spaces Heegaard quantum lens spaces. Then we use this representation of Z/NZ to construct an associated complex loine bundle. This paper proves the stable non-triviality of these line bundles over any of the quantum lens spaces we consider. We use the pullback structure of the C*-algebra of the lens space to compute its K-theory via the Mayer-Vietoris sequence, and an explicit form of the Bass connecting homomorphism to prove the stable non-triviality of the bundles. On the algebraic …


Degree Theory For Oblique Boundary Problems, Jiakun Liu Jan 2013

Degree Theory For Oblique Boundary Problems, Jiakun Liu

Faculty of Engineering and Information Sciences - Papers: Part A

Considering a second order fully nonlinear elliptic operator with a nonlinear oblique boundary condition of the general form.


On The K-Theory Of Twisted Higher-Rank-Graph C*-Algebras, Alex Kumjian, David Pask, Aidan Sims Jan 2013

On The K-Theory Of Twisted Higher-Rank-Graph C*-Algebras, Alex Kumjian, David Pask, Aidan Sims

Faculty of Engineering and Information Sciences - Papers: Part A

We investigate the K-theory of twisted higher-rank-graph algebras by adapting parts of Elliott's computation of the K-theory of the rotation algebras. We show that each 2-cocycle on a higher-rank graph taking values in an abelian group determines a continuous bundle of twisted higher-rank graph algebras over the dual group. We use this to show that for a circle-valued 2-cocycle on a higher-rank graph obtained by exponentiating a real-valued cocycle, the K-theory of the twisted higher-rank graph algebra coincides with that of the untwisted one.


Nonlinear Analysis Of Biaxially Loaded High Strength Rectangular Concrete-Filled Steel Tubular Slender Beam-Columns, Part I: Theory, Qing Quan Liang, Vipulkumar Ishvarbhai Patel, Muhammad N. S Hadi Jan 2012

Nonlinear Analysis Of Biaxially Loaded High Strength Rectangular Concrete-Filled Steel Tubular Slender Beam-Columns, Part I: Theory, Qing Quan Liang, Vipulkumar Ishvarbhai Patel, Muhammad N. S Hadi

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a new numerical model for the nonlinear inelastic analysis of biaxially loaded high strength thin-walled rectangular concrete-filled steel tubular (CFST) slender beam-columns. The numerical model considers the effects of progressive local buckling, initial geometric imperfections, high strength materials and second order. The accurate fiber element method is used to model the inelastic behavior of composite cross-sections. Theoretical models are developed that simulate the load-deflection responses and strength envelopes of thin-walled rectangular CFST slender beamcolumns under biaxial loads. New computational algorithms based on the M􀂗􁈷 ller's method are developed to adjust the depth and orientation of the neutral …


Spectral Triples: Examples And Index Theory, Alan L. Carey, John Phillips, Adam C. Rennie Jan 2011

Spectral Triples: Examples And Index Theory, Alan L. Carey, John Phillips, Adam C. Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

The main objective of these notes is to give some intuition about spectral triples and the role they play in index theory. The notes are basically a road map, with much detail omitted. To give a complete account of all the topics covered would require at least a book, so we have opted for a sketch.


A Comparative Study Of Three Inverse Kinematic Methods Of Serial Industrial Robot Manipulators In The Screw Theory Framework, Emre Sariyildiz, Eray Cakiray, Hakan Temeltas Jan 2011

A Comparative Study Of Three Inverse Kinematic Methods Of Serial Industrial Robot Manipulators In The Screw Theory Framework, Emre Sariyildiz, Eray Cakiray, Hakan Temeltas

Faculty of Engineering and Information Sciences - Papers: Part B

In this paper, we compare three inverse kinematic formulation methods for the serial industrial robot manipulators. All formulation methods are based on screw theory. Screw theory is an effective way to establish a global description of rigid body and avoids singularities due to the use of the local coordinates. In these three formulation methods, the first one is based on quaternion algebra, the second one is based on dual-quaternions, and the last one that is called exponential mapping method is based on matrix algebra. Compared with the matrix algebra, quaternion algebra based solutions are more computationally efficient and they need …


A Singularity Free Trajectory Tracking Method For The Cooperative Working Of Multi-Arm Robots Using Screw Theory, Emre Sariyildiz, Hakan Temeltas Jan 2011

A Singularity Free Trajectory Tracking Method For The Cooperative Working Of Multi-Arm Robots Using Screw Theory, Emre Sariyildiz, Hakan Temeltas

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper we present a singularity free trajectory tracking method for the cooperative working of multi-arm robot manipulators. It is based on an inverse kinematic transformation which determines the manipulator's joint angles corresponding to the end-effector trajectory given in the task space. The kinematic problem of multi-arm robot system is solved by using screw theory and quaternion algebra. Screw theory is an effective way to establish a global description of rigid body and avoids singularities due to the use of the local coordinates. Dual-quaternion is the most compact and efficient dual operator to express screw displacement. Inverse kinematic solutions …


Twisted Cyclic Theory, Equivariant Kk-Theory And Kms States, Alan L. Carey, Sergey Neshveyev, R Nest, Adam Rennie Jan 2011

Twisted Cyclic Theory, Equivariant Kk-Theory And Kms States, Alan L. Carey, Sergey Neshveyev, R Nest, Adam Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

Given a C-algebra A with a KMS weight for a circle action, we construct and compute a secondary invariant on the equivariant K-theory of the mapping cone of AT ,! A, both in terms of equivariant KK-theory and in terms of a semifinite spectral flow. This in particular puts the previously considered examples of Cuntz algebras [10] and SUqð2Þ [14] in a general framework. As a new example we consider the Araki-Woods IIIl representations of the Fermion algebra.


Spectral Flow Invariants And Twisted Cyclic Theory For The Haar State On Suq(2), A L. Carey, A Rennie, K Tong Jan 2009

Spectral Flow Invariants And Twisted Cyclic Theory For The Haar State On Suq(2), A L. Carey, A Rennie, K Tong

Faculty of Engineering and Information Sciences - Papers: Part A

In [A.L. Carey, J. Phillips, A. Rennie, Twisted cyclic theory and an index theory for the gauge invariant KMS state on Cuntz algebras. arXiv:0801.4605], we presented a K-theoretic approach to finding invariants of algebras with no non-trivial traces. This paper presents a new example that is more typical of the generic situation. This is the case of an algebra that admits only non-faithful traces, namely SUq.2/ and also KMS states. Our main results are index theorems (which calculate spectral flow), one using ordinary cyclic cohomology and the other using twisted cyclic cohomology, where the twisting comes from the generator of …


Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie Jan 2007

Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

We present a definition of spectral flow for any norm closed ideal J in any von Neumann algebra N. Given a path of selfadjoint operators in N which are invertible in N/J, the spectral flow produces a class in Ko(J).Given a semifinite spectral triple (A, H, D) relative to (N, t) with A separable, we construct a class [D] ? KK1(A, K(N)). For a unitary u ? A, the von Neumann spectral flow between D and u*Du is equal to the Kasparov product [u]A[D], and is simply related to the numerical spectral flow, and a refined C*-spectral flow.


Hydro-Turbine Governor Control: Theory, Techniques And Limitations, J Culberg, Michael Negnevitsky, Kashem M. Muttaqi Jan 2006

Hydro-Turbine Governor Control: Theory, Techniques And Limitations, J Culberg, Michael Negnevitsky, Kashem M. Muttaqi

Faculty of Engineering and Information Sciences - Papers: Part A

With the entry of Tasmania into the national electricity market, equipment upgrades are required in many parts of the existing power system. This presents an opportunity to embrace new technology, in order to enhance the current efficiency and productivity of the system. One area is that of hydro-turbine speed governors, an integral part of maintaining the frequency of the output. This paper analyses the current standard control algorithm for turbine governors, the PID controller. It illustrates the processes involved, tuning and their limitations. Finally, alternative control systems are discussed.


A Dual Graph Construction For Higher-Rank Graphs, And K-Theory For Finite 2-Graphs, Stephen Allen, David Pask, Aidan Sims Jan 2006

A Dual Graph Construction For Higher-Rank Graphs, And K-Theory For Finite 2-Graphs, Stephen Allen, David Pask, Aidan Sims

Faculty of Engineering and Information Sciences - Papers: Part A

Given a k-graph Λ and an element p of Nk, we define the dual k-graph, pΛ. We show that when Λ is row-finite and has no sources, the C*-algebras C*(Λ) and C*(pΛ) coincide. We use this isomorphism to apply Robertson and Steger's results to calculate the K-theory of C*(Λ) when Λ is finite and strongly connected and satisfies the aperiodicity condition.