Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

6173 Full-Text Articles 7466 Authors 1472327 Downloads 135 Institutions

All Articles in Science and Technology Studies

Faceted Search

6173 full-text articles. Page 7 of 224.

The Architecture Of An Effective Software Application For Managing Enterprise Projects, Reza R. Zamani, Robert B. K Brown, Ghassan Beydoun, William J. Tibben 2017 University of Wollongong

The Architecture Of An Effective Software Application For Managing Enterprise Projects, Reza R. Zamani, Robert B. K Brown, Ghassan Beydoun, William J. Tibben

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Hierarchical Functional Encryption For Linear Transformations, Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang 2017 University of Wollongong

Hierarchical Functional Encryption For Linear Transformations, Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang

Faculty of Engineering and Information Sciences - Papers: Part B

In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending FE with key delegation ability, hierarchical functional encryption (HFE) enables a secret key holder to delegate a portion of its decryption ability to others and the delegation can be done hierarchically. All HFE schemes in the literature are for general functionalities and not very practical. In this paper, we focus on the functionality of linear transformations (i.e. matrix product evaluation). We refine the definition of HFE and further extend the delegation to accept multiple ...


Mergeable And Revocable Identity-Based Encryption, Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo 2017 University of Wollongong

Mergeable And Revocable Identity-Based Encryption, Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part B

Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential. Hence, revocable identity-based encryption (RIBE) has been proposed in the literature to offer an efficient revocation mechanism. In contrast to revocation, another issue that will also occur in practice is to combine two or multiple IBE systems into one system, e.g., due to the merge of the departments or companies. However, this issue has ...


Decompression Modelling Of Pipelines Carrying Co2-N2 Mixture And The Influence Of Non-Equilibrium Phase Transition, Bin Liu, Xiong Liu, Cheng Lu, Ajit R. Godbole, Guillaume Michal, Anh Kiet Tieu 2017 University of Wollongong

Decompression Modelling Of Pipelines Carrying Co2-N2 Mixture And The Influence Of Non-Equilibrium Phase Transition, Bin Liu, Xiong Liu, Cheng Lu, Ajit R. Godbole, Guillaume Michal, Anh Kiet Tieu

Faculty of Engineering and Information Sciences - Papers: Part B

The Carbon Capture and Storage (CCS) is the technology that has been proposed to reduce high concentrations of CO2 in the atmosphere. This method involves transporting the CO2 to the storage site, usually in pipelines. In order to ensure safe transport, the required pipe toughness must be accurately estimated. This, in turn, requires an accurate estimate of the decompression wave speed in the fluid. In this paper, a multi-phase Computational Fluid Dynamics (CFD) model is presented to simulate the decompression of a CO2-N2 mixture in a pipe. A real gas EOS (GERG-2008) was incorporated into ...


Metals Challenged By Neutron And Synchrotron Radiation, Klaus-Dieter Liss 2017 University of Wollongong

Metals Challenged By Neutron And Synchrotron Radiation, Klaus-Dieter Liss

Faculty of Engineering and Information Sciences - Papers: Part B

In the past one and a half decades, neutron and synchrotron radiation techniques have come to the forefront as an excellent set of tools for the wider investigation of material structures and properties, becoming available to a large user community. This holds especially true for metals, which are a fascinating class of materials with both structural and functional applications. With respect to these application classes, metals are used to engineer bridges and automotive engines as well as to exploit magnetic and electric properties in computer storage, optics, and electronics. Both neutron sources and synchrotrons are large user facilities of quantum-beam ...


Analysis Of Hydrodynamic Mechanism On Particles Focusing In Micro-Channel Flows, Qikun Wang, Dan Yuan, Weihua Li 2017 University of Wollongong

Analysis Of Hydrodynamic Mechanism On Particles Focusing In Micro-Channel Flows, Qikun Wang, Dan Yuan, Weihua Li

Faculty of Engineering and Information Sciences - Papers: Part B

In this paper, the hydrodynamic mechanism of moving particles in laminar micro-channel flows was numerically investigated. A hydrodynamic criterion was proposed to determine whether particles in channel flows can form a focusing pattern or not. A simple formula was derived to demonstrate how the focusing position varies with Reynolds number and particle size. Based on this proposed criterion, a possible hydrodynamic mechanism was discussed as to why the particles would not be focused if their sizes were too small or the channel Reynolds number was too low. The Re-¿ curve (Re, ¿ respectively represents the channel-based Reynolds number and the particle ...


Numerical Investigation Into The Effect Of Natural Fracture Density On Hydraulic Fracture Network Propagation, Zhaohui Chong, Xuehua Li, Xiangyu Chen, Ji Zhang, Jingzheng Lu 2017 University of Wollongong, China University of Mining and Technology

Numerical Investigation Into The Effect Of Natural Fracture Density On Hydraulic Fracture Network Propagation, Zhaohui Chong, Xuehua Li, Xiangyu Chen, Ji Zhang, Jingzheng Lu

Faculty of Engineering and Information Sciences - Papers: Part B

Hydraulic fracturing is an important method to enhance permeability in oil and gas exploitation projects and weaken hard roofs of coal seams to reduce dynamic disasters, for example, rock burst. It is necessary to fully understand the mechanism of the initiation, propagation, and coalescence of hydraulic fracture network (HFN) caused by fluid flow in rock formations. In this study, a coupled hydro-mechanical model was built based on synthetic rock mass (SRM) method to investigate the effects of natural fracture (NF) density on HFN propagation. Firstly, the geometrical structures of NF obtained from borehole images at the field scale were applied ...


Comprehensive Gait Analysis Of Healthy Older People: Unveiling Reasons For Lack Of Long-Distance Walking, Mustafa M. Elhadi, Christina Ma, Duo Wong, Anson Wan, Winson Lee 2017 The Hong Kong Polytechnic University

Comprehensive Gait Analysis Of Healthy Older People: Unveiling Reasons For Lack Of Long-Distance Walking, Mustafa M. Elhadi, Christina Ma, Duo Wong, Anson Wan, Winson Lee

Faculty of Engineering and Information Sciences - Papers: Part B

Many older adults do not adhere to the recommended physical activity levels. This study examines the gait changes upon long-distance walking among healthy older adults. Gait tests of 24 adults aged 65 or more were conducted at the baseline, at the end of 30 and 60 minutes of treadmill walk. Spatial temporal, kinematic and kinetic gait data were computed. Perceived level of exertion was evaluated for each subject. Ten subjects (Group B) perceived higher exertion level than the remaining fourteen subjects (Group A). After walking, group B had significant reductions in dominant-side ankle joint range of motion and power, suggesting ...


R Package Asmap: Efficient Genetic Linkage Map Construction And Diagnosis, J D. Taylor, David G. Butler 2017 University of Adelaide

R Package Asmap: Efficient Genetic Linkage Map Construction And Diagnosis, J D. Taylor, David G. Butler

Faculty of Engineering and Information Sciences - Papers: Part B

Although various forms of linkage map construction software are widely available, there is a distinct lack of packages for use in the R statistical computing environment (R Core Team 2017). This article introduces the ASMap linkage map construction R package which contains functions that use the efficient MSTmap algorithm (Wu, Bhat, Close, and Lonardi 2008) for clustering and optimally ordering large sets of markers. Additional to the construction functions, the package also contains a suite of tools to assist in the rapid diagnosis and repair of a constructed linkage map. The package functions can also be used for post linkage ...


Investigation Of Velocity Distribution In Open Channel Flows Based On Conditional Average Of Turbulent Structures, Yu Han, Shu-qing Yang, Muttucumaru Sivakumar, Liu-Chao Qiu 2017 University of Wollongong, China Agricultural University

Investigation Of Velocity Distribution In Open Channel Flows Based On Conditional Average Of Turbulent Structures, Yu Han, Shu-Qing Yang, Muttucumaru Sivakumar, Liu-Chao Qiu

Faculty of Engineering and Information Sciences - Papers: Part B

We report the development of a new analytical model similar to the Reynolds-averaged Navier-Stokes equations to determine the distribution of streamwise velocity by considering the bursting phenomenon. It is found that, in two-dimensional (2D) flows, the underlying mechanism of the wake law in 2D uniform flow is actually a result of up/down events. A special experiment was conducted to examine the newly derived analytical model, and good agreement is achieved between the experimental data in the inner region and the model's prediction. The obtained experimental data were also used to examine the DML-Law (dip-modified-log-law), MLW-Law (modified-log-wake law), and ...


Modelling Dynamic Fracture Propagation In Rock, Gaetano Venticinque, Jan Nemcik 2017 University of Wollongong

Modelling Dynamic Fracture Propagation In Rock, Gaetano Venticinque, Jan Nemcik

Faculty of Engineering and Information Sciences - Papers: Part B

Fracture propagation in brittle rock is very fast and highly dynamic. Typically this process consists of fracture initiation, propagation and termination. Growth of micro-fractures is conceptually and numerically well established, however, current practices to model fracture propagation in rock employs slow evolving static regimes that do not represent the true nature of fracture propagation in the laboratory or the field. This paper presents a newly developed numerical approach using Micro-Brittle Dynamics theory to model the propagation of fractures through rock in real time. This work presented here is based on a newly developed Dynamic Rock Fracture Model (DRFM2D ) and ...


Strength Properties Of Grout For Strata Reinforcement, Naj Aziz, Dean Majoor, Ali Mirza 2017 University of Wollongong

Strength Properties Of Grout For Strata Reinforcement, Naj Aziz, Dean Majoor, Ali Mirza

Faculty of Engineering and Information Sciences - Papers: Part B

An experimental study was carried out on grout samples prepared from both Stratabinder and BU100 cementitious products. Samples were prepared with various water to grout ratios and tested for uniaxial compressive and shear strength. Triaxial tests were performed on cylindrical samples to determine values for internal friction angle, cohesion and tensile strength. It was found that the water to cement ratio affects the uniaxial compressive and shear strength of grout. The triaxial test indicated that both internal friction angle and cohesion of Stratabinder do not differ significantly from BU100.


Innovative Approach To Monitoring Coal Pillar Deformation And Roof Movement Using 3d Laser Technology, Vlastimil Kajzar, Radovan Kukutsch, Petr Waclawik, Jan Nemcik 2017 Institute of Geonics of CAS

Innovative Approach To Monitoring Coal Pillar Deformation And Roof Movement Using 3d Laser Technology, Vlastimil Kajzar, Radovan Kukutsch, Petr Waclawik, Jan Nemcik

Faculty of Engineering and Information Sciences - Papers: Part B

Monitoring of pillar and roadway deformations is one of the most important issues in geotechnical engineering and mining practice. The use of 3D laser technology is ideal to monitor strata displacements in underground excavations enabling complex spatial data capture of the entire space around monitored pillars including all roof and rib deformation which occurs during the pillar excavation. This method based on repeated scans, can monitor the excavation surface movement ranging from a few mm to more than 600 mm. The 3D laser scanner was used to monitor the coal mine roadways and pillar stability in room and pillar panel ...


Stress State Monitoring In The Surroundings Of The Roadway Ahead Of Longwall Mining, Petr Waclawik, Radovan Kukutsch, Petr Konicek, Jiri Ptacek, Vlastimil Kajzar, Jan Nemcik, Lubomir Stas, Kamil Soucek, Martin Vavro 2017 Institute Of Clean Technologies, Institute of Geonics of CAS

Stress State Monitoring In The Surroundings Of The Roadway Ahead Of Longwall Mining, Petr Waclawik, Radovan Kukutsch, Petr Konicek, Jiri Ptacek, Vlastimil Kajzar, Jan Nemcik, Lubomir Stas, Kamil Soucek, Martin Vavro

Faculty of Engineering and Information Sciences - Papers: Part B

Accurate knowledge of the stress-strain state of rock mass, not only in their vicinity but also in the wide surroundings of mine workings, is absolutely critical for precise support designing. Investigation of the rock stress is usually carried out by interpretation of the rock mass deformation processes, which can be relatively precisely observed and measured. In order to verify the stress state of the rock mass and changes in it induced by longwall mining, monitoring of changes in the rock mass stress in connection with the mine out of the longwall No. 371 202 was carried out. The seam extracted ...


Tower Load Analysis Of Offshore Wind Turbines And The Effects Of Aerodynamic Damping, Xiong Liu, Cheng Lu, Gangqiang Li, Ajit R. Godbole, Yan Chen 2017 University of Wollongong

Tower Load Analysis Of Offshore Wind Turbines And The Effects Of Aerodynamic Damping, Xiong Liu, Cheng Lu, Gangqiang Li, Ajit R. Godbole, Yan Chen

Faculty of Engineering and Information Sciences - Papers: Part B

This study presents an analysis of the loads on offshore Horizontal Axis Wind Turbines (HAWTs). The aerodynamic loads are estimated using the Blade Element-Momentum (BEM) theory, including the effects of dynamic inflow and dynamic stall. The wave loads are calculated using Morison's equation. Models are proposed to account for the effects of aerodynamic damping on the fatigue loading on the tower during its working lifetime. Load analysis of a 5 MW offshore HAWT is carried out and the influence of aerodynamic damping on the fatigue load is investigated.


On The Convergence Of He And Zhu's New Series Solution For Pricing Options With The Heston Model, Song-Ping Zhu, Xin-Jiang He 2017 University of Wollongong

On The Convergence Of He And Zhu's New Series Solution For Pricing Options With The Heston Model, Song-Ping Zhu, Xin-Jiang He

Faculty of Engineering and Information Sciences - Papers: Part B

In this paper, a modified formula for European options and a set of complete convergence proofs for the solution that cover the entire time horizon of a European option contact are presented under the Heston model with minimal entropy martingale measure. Although He & Zhu [5] worked on this model, they only provided a converged solution with a condition imposed on the time to expiry. The new solution presented here is only slightly modified in its form. But, it is accompanied with the proof of convergence of the solution for the entire span of the time horizon of an option.


Id-Based Encryption With Equality Test Against Insider Attack, Tong Wu, Sha Ma, Yi Mu, Shengke Zeng 2017 University of Wollongong

Id-Based Encryption With Equality Test Against Insider Attack, Tong Wu, Sha Ma, Yi Mu, Shengke Zeng

Faculty of Engineering and Information Sciences - Papers: Part B

Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test.


Does Mathematical Study Develop Logical Thinking? Testing The Theory Of Formal Discipline, Rodney Nillsen 2017 University of Wollongong

Does Mathematical Study Develop Logical Thinking? Testing The Theory Of Formal Discipline, Rodney Nillsen

Faculty of Engineering and Information Sciences - Papers: Part B

Book review of Inglis , M. and Attridge, N. (2016). Does Mathematical Study Develop Logical Thinking? Testing the Theory of Formal Discipline. London: World Scientific Publishing Europe Ltd.


Advanced Techniques For Characterizing Bioinspired Materials, Raul Machado, Vitor Sencadas 2017 University of Minho

Advanced Techniques For Characterizing Bioinspired Materials, Raul Machado, Vitor Sencadas

Faculty of Engineering and Information Sciences - Papers: Part B

Understanding materials' analytical techniques is a key feature to ensure efficient material development and to fully evaluate their functional properties. Biobased materials are emergent materials that are attracting attention due to their outstanding properties, pushing forward their use in a wide range of applications going from biomedical and pharmacy to even food industry, among others. This chapter provides an educational resource with the most relevant characterization techniques that are applicable to the development and characterization of biobased materials. It discusses physical, thermal, and chemical characterization techniques that are able to provide information related to the microstructure and morphology, and the ...


The Frontiers Of Technology In Warhead Verification, Henrietta N. Toivanen 2017 Claremont McKenna College

The Frontiers Of Technology In Warhead Verification, Henrietta N. Toivanen

CMC Senior Theses

How might new technical verification capabilities enhance the prospects of success in future nuclear arms control negotiations? Both theory and evidence suggest that verification technologies can influence the dynamics of arms control negotiations by shaping and constraining the arguments and strategies that are available to the involved stakeholders. In the future, new technologies may help transcend the specific verification challenge of high-security warhead authentication, which is a verification capability needed in future disarmament scenarios that address fewer warheads, limit new categories of warheads, and involve nuclear weapons states other than the United States and Russia. Under these circumstances, the core ...


Digital Commons powered by bepress