Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Articles (7)
- EAgriculture (5)
- Data mining (4)
- Decision making (3)
- Asphalt pavement distress data (2)
-
- Automated classification (2)
- Cracking (2)
- Emerging Technologies (2)
- FPGA (2)
- Information Systems (2)
- Social Implications of ICT (2)
- 802.11 localization (1)
- Advancements (1)
- Agricultural applications (1)
- Agriculture (1)
- Analysis (1)
- Android (1)
- Antagonistic group (1)
- Archaeology (1)
- Artificial neural network (1)
- Artificial neural networks (1)
- Automated optimization (1)
- Automotive-grade CMOS camera (1)
- Autonomous vehicle applications (1)
- Behavior preservation (1)
- Behavioral models (1)
- Biplots (1)
- Book review (1)
- Bug Severity (1)
- Calendar (1)
Articles 31 - 55 of 55
Full-Text Articles in Physical Sciences and Mathematics
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Allen B. Downey
This paper presents the design and implementation of Lachesis, a job scheduler for the Cray T3E. Lachesis was developed at the San Diego Supercomputer Center (SDSC) in an attempt to correct some problems with the scheduling system Cray provides with the T3E.
Work In Progress - Synthesizing Design, Engineering, And Entrepreneurship Through A Mobile Application Development Course, Mark L. Chang
Work In Progress - Synthesizing Design, Engineering, And Entrepreneurship Through A Mobile Application Development Course, Mark L. Chang
Mark L. Chang
In this paper, we describe our experiences in designing and delivering a course that blends together design, engineering, and entrepreneurship through the use of mobile devices. The significance of this work is in advocating for and demonstrating the motivational and educational benefits of using a mobile platform, and describing how to utilize the mobile marketplace to provide an authentic, real-world experience across these three domains.
Precis: A Design-Time Precision Analysis Tool, Mark L. Chang, Scott Hauck
Precis: A Design-Time Precision Analysis Tool, Mark L. Chang, Scott Hauck
Mark L. Chang
Currently, few tools exist to aid the FPGA developer in translating an algorithm designed for a general-purpose-processor into one that is precision-optimized for FPGAs. This task requires extensive knowledge of both the algorithm and the target hardware. We present a design-time tool, Precis, which assists the developer in analyzing the precision requirements of algorithms specified in MATLAB. Through the combined use of simulation, user input, and program analysis, we demonstrate a methodology for precision analysis that can aid the developer in focusing their manual precision optimization efforts.
Low-Cost Stereo Vision On An Fpga, Chris A. Murphy, Daniel Lindquist, Ann Marie Rynning, Thomas Cecil, Sarah Leavitt, Mark L. Chang
Low-Cost Stereo Vision On An Fpga, Chris A. Murphy, Daniel Lindquist, Ann Marie Rynning, Thomas Cecil, Sarah Leavitt, Mark L. Chang
Mark L. Chang
We present a low-cost stereo vision implementation suitable for use in autonomous vehicle applications and designed with agricultural applications in mind. This implementation utilizes the Census transform algorithm to calculate depth maps from a stereo pair of automotive-grade CMOS cameras. The final prototype utilizes commodity hardware, including a Xilinx Spartan-3 FPGA, to process 320times240 pixel images at greater than 150 frames per second and deliver them via a USB 2.0 interface.
Automated Least-Significant Bit Datapath Optimization For Fpgas, Mark L. Chang, Scott Hauck
Automated Least-Significant Bit Datapath Optimization For Fpgas, Mark L. Chang, Scott Hauck
Mark L. Chang
In this paper, we present a method for FPGA datapath precision optimization subject to user-defined area and error constraints. This work builds upon our previous research which presented a methodology for optimizing the dynamic range- the most significant bit position. In this work, we present an automated optimization technique for the least-significant bit position of circuit datapaths. We present results describing the effectiveness of our methods on typical signal and image processing kernels.
Interactionless Calendar-Based Training For 802.11 Localization, Mark Chang, Andrew J. Barry, Noah L. Tye
Interactionless Calendar-Based Training For 802.11 Localization, Mark Chang, Andrew J. Barry, Noah L. Tye
Mark L. Chang
This paper presents our work in solving one of the weakest links in 802.11-based indoor-localization: the training of ground-truth received signal strength data. While crowdsourcing this information has been demonstrated to be a viable alternative to the time consuming and accuracy-limited process of manual training, one of the chief drawbacks is the rate at which a system can be trained. We demonstrate an approach that utilizes users' calendar and appointment information to perform interactionless training of an 802.11-based indoor localization system. Our system automatically determines if a user attended a calendar event, resulting in accuracy comparable to our previously published …
Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Bruce Vanstone
No abstract provided.
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Allen B. Downey
Collection and analysis of pavement distress data is an important component of any pavement‐management system. Various systems are currently under development that automate this process. They consist of appropriate hardware for the acquisition of pavement distress images and, in some cases, software for the analysis of the collected data. An important step in the automatic interpretation of images is segmentation, the process of extracting the objects of interest (distresses) from the background. We examine algorithms for segmenting pavement images and evaluate their effectiveness in separating the distresses from the background. The methods examined include the Otsu method, Kittler's method, a …
Primitive-Based Classification Of Pavement Cracking Images, Allen Downey
Primitive-Based Classification Of Pavement Cracking Images, Allen Downey
Allen B. Downey
Collection and analysis of pavement distress data are receiving attention for their potential to improve the quality of information on pavement condition. We present an approach for the automated classificaton of asphalt pavement distresses recorded on video or photographic film. Based on a model that describes the statistical properties of pavement images, we develop algorithms for image enhancement, segmentation, and distress classification. Image enhancement is based on subtraction of an “average” background: segmentation assigns one of four possible values to pixels based on their likelihood of belonging to the object. The classification approach proceeds in two steps: in the first …
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
The Role Of An Online Community To Support Overweight Adolescents: A Survey Of Australian Healthcare Professionals. Research In Progress, Leisa Armstrong, Rachel Mahncke
The Role Of An Online Community To Support Overweight Adolescents: A Survey Of Australian Healthcare Professionals. Research In Progress, Leisa Armstrong, Rachel Mahncke
Leisa Armstrong
In Australia, as in other developed countries, there is au increasing trend of obesity in children and adolescents. Research studies indicate that technology may be a contributing factor to this epidemic and that behavioural change may be a significant solution. One route of inquiry identified as potentially beneficial is that of the development of online communities for children and adolescents to discuss issues such as obesity to contribute to behavioural change. This research outlined in this paper aims to determine if such an online community is feasible and potentially effective to contribute to the changes required. A survey of health …
Applying Data Mining Techniques In The Selection Of Plant Traits, Dean Diepeveen, Leisa Armstrong
Applying Data Mining Techniques In The Selection Of Plant Traits, Dean Diepeveen, Leisa Armstrong
Leisa Armstrong
In the agricultural sector, farmers are provided with crop related information by various research agencies in order to make critical decisions about which is the most profitable crop variety choice. Research agencies provide information which is generic, rather than being tailored to the individual farmers cropping situation. A number of specific plant and growth traits are used to establish the most suitable crop varieties. When selecting crop varieties for release to growers, the application of data mining techniques to crop research data enables the customization of information to each individual farmers farming situation. The challenge for agricultural research perspective is …
C-Commerce Innovation: Unravelling The Effects Of Knowledge Ties On Embedded Network Structure, Mark Brogan, Leisa Armstrong
C-Commerce Innovation: Unravelling The Effects Of Knowledge Ties On Embedded Network Structure, Mark Brogan, Leisa Armstrong
Leisa Armstrong
Relative to other nations, economically significant activity in Australia and New Zealand is skewed toward micro and small business. Issues of scale and- access to resources and expertise, suggest issues for Australian and New Zealand SMEs seeking to compete in the era of the global Internet economy. Collaborative, or so-called C-commerce, has arisen as a concept and key enabler for clustering of SMEs to secure resource advantage and to promote global competitiveness. Through the lens of a C-commerce case study in tourism, this paper explores network/actors that impinge upon C-commerce innovation in an SME setting. The paper demonstrates the usefulness …
An Evaluation Of Methodologies For Eagriculture In An Australian Context, Leisa Armstrong, Dean Diepeveen
An Evaluation Of Methodologies For Eagriculture In An Australian Context, Leisa Armstrong, Dean Diepeveen
Leisa Armstrong
Australian agricultural producers’ profits are dependent on the decisions they make about farm productivity systems. They may use recommendations and information provided by government agencies and private consultants. For cereal growers, success is dependent on decisions made about selection of crop varieties suitable for their agronomic and climatic conditions. This paper reports on research which aimed to evaluate some current eAgriculture methodologies for their application in the Western Australian agricultural industry. In particular the paper illustrates the findings from a project which aimed to explain the variability seen in crop varieties grown in Western Australia. The problems associated with crop …
Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong
Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong
Leisa Armstrong
Following Moore's law, the numbers of mobile phones and their capabifities have increased exponentially in recent years. The platform of choice for running applications on resource constrained devices such as mobile phones, today, is the Java 2 Micro Edition (J2ME) with Connected Limited Device Configuration (CLDC). This popularity exposes the security risks. These risks include the loss of data, money and privacy. Means of securing mobile phones and communication have been weI! researched and models have been proposed, based on their success on desktop computers. However, little has been done to explore and correct inherent flaws and possible vulnerabilities in …
Selecting Areas For Land Use Change In A Catchment, Neil Dunstan, Leisa Armstrong, Dean A. Diepeveen
Selecting Areas For Land Use Change In A Catchment, Neil Dunstan, Leisa Armstrong, Dean A. Diepeveen
Leisa Armstrong
Some farming areas in Australia have been degraded by agricultural practices that result in rises in the water table that bring salt to the surface and reduce the quality of runoff water and the yield from pasture and crops. There is a need for a balanced choice of land uses that can reduce the salinity problem. A framework is proposed that uses catchment data and a hydrology model to predict areas with high rates of recharge and to identify sites for land use change.
An Eagriculture-Based Decision Support Framework For Information Dissemination, Leisa Armstrong, Dean Diepeveen, Khumphicha Tantisantisom
An Eagriculture-Based Decision Support Framework For Information Dissemination, Leisa Armstrong, Dean Diepeveen, Khumphicha Tantisantisom
Leisa Armstrong
The ability of farmers to acquire knowledge to make decisions is limited by the information quality and applicability. Inconsistencies information delivery and standards/or the integration o/information also limit decision making processes. This research uses a similar approach to the Knowledge Discovery in Databases (KDD) methodology to develop an ICT based framework which can be used to facilitate the acquisition of knowledge for farmer's' decision making processes. This is one of the leading areas of research and development for information technology in an agricultural industry, which is yet to utilize such technologies fully. The Farmer Knowledge and Decision Support Framework (FKDSF) …
An Information-Based Decision Support Framework For Eagriculture, Leisa Armstrong, Dean Diepeveen
An Information-Based Decision Support Framework For Eagriculture, Leisa Armstrong, Dean Diepeveen
Leisa Armstrong
The ability of farmers to acquire knowledge to make decisions is limited by the information quality and applicability. An inconsistency in information delivery and standards for the integration of information also limits the decision making process. Knowledge Discovery in Databases (KDD) methodology described for the data mining is an example of how frameworks can be used to facilitate such data integration. This research will examine how such a ICT based framework can be used to facilitate the acquisition of knowledge for the farmer decision making process. The Farmer Knowledge and Decision Support Framework (FKDSF) takes information provided to farmers and …
Enforcing Multitenancy For Cloud Computing Environments, Jinan Fiaidhi, Irena Bojanova, Jia Zhang, Liang-Jie Zhang
Enforcing Multitenancy For Cloud Computing Environments, Jinan Fiaidhi, Irena Bojanova, Jia Zhang, Liang-Jie Zhang
Jia Zhang
No abstract provided.
Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador
Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador
Angela M Labrador
Archaeological database management systems serve the basic and important functions of ordering, archiving, and disseminating archaeological data. The increased availability of computers and data storage over the past two decades has enabled the exponential growth of archaeological databases and data models. Despite their importance and ubiquity, archaeological database systems are rarely the subject of theoretical analysis within the discipline due to their ‘‘black box’’ nature and the perceived objectivity of computerized systems. Inspired by H. Martin Wobst’s meditations on materiality and disciplinary ethics, in this paper I explore how archaeological database systems structure archaeological interpretation and disciplinary practice. In turn, …
Introduction To Adobe Dreamweaver, Christy Allen
A Historical Usage-Based Approach Supporting Scientific Service Reuse, Jia Zhang, John Alexandar, Wei Tan, Ian Foster, Ravi Madduri, Carole Goble
A Historical Usage-Based Approach Supporting Scientific Service Reuse, Jia Zhang, John Alexandar, Wei Tan, Ian Foster, Ravi Madduri, Carole Goble
Jia Zhang
No abstract provided.