Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael Dec 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael Dec 2010

The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael

Professor Katina Michael

This chapter investigates the implications of the S. and Marper v United Kingdom ruling by the European Court of Human Rights (ECtHR), which found that the UK Government’s current deoxyribonucleic acid (DNA) retention policy breached Article 8 of the European Convention on Human Rights (ECHR) (Council of Europe 2008). The aim of this chapter is to look beyond the changes that have been instigated in Britain, since the landmark decision by the ECtHR was made, and toward the legal and human rights implications of the sharing of DNA data across the borders of European Union member states. Of significance here …


Early And Often: Bringing More Parallelism Into Undergraduate Computer Science, Elizabeth Shoop, Et Al Oct 2010

Early And Often: Bringing More Parallelism Into Undergraduate Computer Science, Elizabeth Shoop, Et Al

Elizabeth Shoop

No abstract provided.


Towards A Community Of Computer Science Educators Who Teach More Parallelism, Elizabeth Shoop, Peter Hinsbeeck, Richard Brown Oct 2010

Towards A Community Of Computer Science Educators Who Teach More Parallelism, Elizabeth Shoop, Peter Hinsbeeck, Richard Brown

Elizabeth Shoop

No abstract provided.


Tag Expression: Tagging With Feeling, Shilad Sen, Jesse Vig, Matthew Soukup, John Riedl Sep 2010

Tag Expression: Tagging With Feeling, Shilad Sen, Jesse Vig, Matthew Soukup, John Riedl

Shilad Sen

No abstract provided.


Distributed Web Design, Christy Allen Sep 2010

Distributed Web Design, Christy Allen

Christy Allen

No abstract provided.


Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu Aug 2010

Guest Editors Introduction: Rfid - A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, K. Michael, George Q. Huang, Shiv Prabhu, Peter Chu

Professor Katina Michael

In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …


Stop Social Network Pitfalls, K. Michael Aug 2010

Stop Social Network Pitfalls, K. Michael

Professor Katina Michael

Ask a group of teenagers how they spend their spare time and most will mention Facebook, YouTube, World of Warcraft, or Second Life – ‘virtual’ social networks that bring millions of people together online. The benefits of social networks have been touted but what about the pitfalls? Some teens will share everything about themselves to hundreds of online friends, most of whom they have never met. Twitter style prompts like where you are, what you are doing, and who you are doing it with reveal a lot about one’s behaviours, one’s inner thoughts, and even one’s vulnerabilities. Some teens upload …


Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens Jul 2010

Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens

Carmen Cox

Consumers are increasingly turning to the online environment to provide information to assist them in making purchase decisions related to travel products. They often rely on travel recommendations from different sources, such as sellers, independent experts and, increasingly, other consumers. A new type of online content, user-generated content (UGC), provides a number of legal and social challenges to providers and users of that content, especially in relation to areas such as defamation, misrepresentation and social embarrassment. This paper reports research that examined the level of trustworthiness of online travel information from these different sources. The study used a survey of …


A Review Of Procedures To Evolve Quantum Algorithms, Adrian Gepp, Phil Stocks Jul 2010

A Review Of Procedures To Evolve Quantum Algorithms, Adrian Gepp, Phil Stocks

Adrian Gepp

There exist quantum algorithms that are more efficient than their classical counterparts; such algorithms were invented by Shor in 1994 and then Grover in 1996. A lack of invention since Grover’s algorithm has been commonly attributed to the non-intuitive nature of quantum algorithms to the classically trained person. Thus, the idea of using computers to automatically generate quantum algorithms based on an evolutionary model emerged. A limitation of this approach is that quantum computers do not yet exist and quantum simulation on a classical machine has an exponential order overhead. Nevertheless, early research into evolving quantum algorithms has shown promise. …


Business Failure Prediction Using Survival Analysis, Kuldeep Kumar, Adrian Gepp Jul 2010

Business Failure Prediction Using Survival Analysis, Kuldeep Kumar, Adrian Gepp

Adrian Gepp

Accurate business failure prediction models would be extremely valuable to many industry sectors, particularly in financial investment and lending. Recently, there has been a significant increase in interest in business failure prediction, from both industry and academia. Statistical business failure prediction models attempt to predict the failure or success of a business. Discriminant and logit analyses have been the most popular approaches, but there are also a large number of alternative techniques available. In this paper, a comparatively new technique known as survival analysis has been used for business failure prediction. Overall, the results suggest that survival analysis techniques provide …


A Framework For Computational Thinking Across The Curriculum, Ljubomir Perkovi´C, Amber Settle, Sungsoon Hwang, Joshua Jones Jun 2010

A Framework For Computational Thinking Across The Curriculum, Ljubomir Perkovi´C, Amber Settle, Sungsoon Hwang, Joshua Jones

Sungsoon Hwang

We describe a framework for implementing computational thinking in a broad variety of general education courses. The framework is designed to be used by faculty without formal training in information technology in order to understand and integrate computational thinking into their own general education courses. The framework includes examples of computational thinking in a variety of general education courses, as well as sample in-class activities, assignments, and other assessments for the courses. The examples in the different courses are related and differentiated using categories taken from Denning Great Principles of Computing, so that similar types of computational thinking appearing in …


Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael Jun 2010

Using A Social Informatics Framework To Study The Effects Of Location-Based Social Networking On Relationships Between People: A Review Of Literature, Sarah Jean Fusco, K. Michael, M.G. Michael

Professor Katina Michael

This paper is predominantly a review of literature on the emerging mobile application area known as location-based social networking. The study applies the social informatics framework to the exploratory question of what effect location based social networking may have on relationships between people. The classification model used in the paper relates previous research on location based services and online social networking together. Specifically the wider study is concerned with literature which identifies the impact of technology on trust with respect to friendship. This paper attempts to draw out the motivations behind using location based social networking applications and the implications …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

Professor Katina Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Tobias Hahn

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Bruce Vanstone

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Strategies For Preparing Computer Science Students For The Multicore World, Elizabeth Shoop, Et Al Dec 2009

Strategies For Preparing Computer Science Students For The Multicore World, Elizabeth Shoop, Et Al

Elizabeth Shoop

No abstract provided.


Embedded Systems As Datacenters, Robert Iannucci Dec 2009

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang Dec 2009

Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


A Snapshot Of Results Of The Survey Study On Rfid Technology, S. F. Wamba Dec 2009

A Snapshot Of Results Of The Survey Study On Rfid Technology, S. F. Wamba

Dr Samuel Fosso Wamba

No abstract provided.