Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 105

Full-Text Articles in Physical Sciences and Mathematics

The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield Feb 2013

The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield

Clive Harfield

In England and Wales, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two different contexts …


Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael Dec 2009

Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael

Professor Katina Michael

No abstract provided.


Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff Dec 2009

Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff

Matthias Bärwolff

The core insight to the history of the dynamics of limitations, restrictions, and discriminations on the Internet is that they are largely a corollary to the futility of obtaining an entirely 'neutral' design of the Internet that is both robust and scalable. The question then is how to arrange the necessary volume of discriminations so as to obtain a design as value free as possible, for only such a design can be in line with the premise of stipulating no values other than (1) good order at large, and (2) the appreciation of the pursuit of local purposes by individuals. …


Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie Dec 2009

Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Bruce Vanstone

The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract future growth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

M. G. Michael

No abstract provided.


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie Nov 2009

Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Tobias Hahn

The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract futuregrowth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.


M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael Oct 2009

M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn Oct 2009

Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

There is a long established history of applying Artificial Neural Networks (ANNs) to financial data sets. In this paper, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie methodology to create a short-term focused ANN which will enhance this trading strategy. The initial trading strategy and the ANN enhanced trading strategy are comprehensively benchmarked both in-sample and …


An Ontology For Autonomic License Management, Qian Zhao, Mark Perry Oct 2009

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry

Mark Perry

The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …


A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry Oct 2009

A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry

Mark Perry

Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.


Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry Oct 2009

Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry

Mark Perry

Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …


One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael Oct 2009

One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael

Michael Organ

No abstract provided.


An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang Sep 2009

An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Open & Mobile Equipment, Timothy J. Rowley Sep 2009

Open & Mobile Equipment, Timothy J. Rowley

Timothy J Rowley

This was a "Lightning Presentation" about making cutting edge technology available to university students.


Student Staff: A Village Philosophy, Lisa Caughron Sep 2009

Student Staff: A Village Philosophy, Lisa Caughron

Lisa Caughron

No abstract provided.


Controlling Technology, K. Michael, M. G. Michael Sep 2009

Controlling Technology, K. Michael, M. G. Michael

M. G. Michael

No abstract provided.


Digital Audio In The Library, Richard Griscom Sep 2009

Digital Audio In The Library, Richard Griscom

Richard Griscom

An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.


Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang Aug 2009

Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang Aug 2009

Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang

Jia Zhang

Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …


Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar Aug 2009

Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This paper introduces an expert System (ES) named as “CADRE-Computer Assisted Diagnoses for Red Eye. Mostly the remote areas of the population are deprived of the facilities of having experts in eye disease. So it is the need of the day to store the expertise of Eye specialists in computers through using ES technology. This ES is a rule-based Expert System that assists in red-eye diagnosis and treatment. The knowledge acquired from literature review and human experts of the specific domain was used as a base for analysis, diagnosis and recommendations. CADRE evaluates the risk factors of 20 eye diseases …


Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman Aug 2009

Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman

Neil Immerman

It is well-known that every first-order property on words is expressible using at most three variables. The subclass of properties expressible with only two variables is also quite interesting and well-studied. We prove precise structure theorems that characterize the exact expressive power of first-order logic with two variables on words. Our results apply to both the case with and without a successor relation.

For both languages, our structure theorems show exactly what is expressible using a given quantifier depth, n, and using m blocks of alternating quantifiers, for any m ≤ n. Using these characterizations, we prove, among other results, …


A Framework For Technology Transfer, Arcot Desai Narasimhalu Jul 2009

A Framework For Technology Transfer, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Technology transfer is often perceived to be transfer of intellectual property (IP). Very few realize that there are other means of transferring technology. Most common means of technology transfer is the transfer of the IP alone. While this is interesting in itself, it is not the best means of transferring technology in all cases. IP such as patents, trademark and copyrighted material can easily be transferred in this manner. However, that is the lowest level of technology transfer possible. The next level of technology transfer is the ability to handover technology from the originating team to the recipient team. This …


Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh Jul 2009

Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh

Ramesh Sitaraman

Flash memories are in ubiquitous use for storage on sensor nodes, mobile devices, and enterprise servers. However, they present significant challenges in designing tree indexes due to their fundamentally different read and write characteristics in comparison to magnetic disks. In this paper, we present the Lazy-Adaptive Tree (LA-Tree), a novel index structure that is designed to improve performance by minimizing accesses to ash. The LA-tree has three key features: 1) it amortizes the cost of node reads and writes by performing update operations in a lazy manner using cascaded buffers, 2) it dynamically adapts buffer sizes to workload using an …


Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair Jul 2009

Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair

Manfred Minimair

The Cayley-Dixon formulation for multivariate projection operators (multiples of resultants of multivariate polynomials) has been shown to be efficient (both exper- imentally and theoretically) for simultaneously eliminating many variables from a polynomial system. In this paper, the behavior of the Cayley-Dixon projection op- erator and the structure of Dixon matrices are analyzed for composed polynomial systems constructed from a multivariate system in which each variable is substi- tuted by a univariate polynomial in a distinct variable. Under some conditions, it is shown that a Dixon projection operator of the composed system can be expressed as a power of the resultant …


Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov Jul 2009

Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov

Iliano Cervesato

This paper has the purpose of reviewing some of the established relationships between logic and concurrency, and of exploring new ones. Concurrent and distributed systems are notoriously hard to get right. Therefore, following an approach that has proved highly beneficial for sequential programs, much effort has been invested in tracing the foundations of concurrency in logic. The starting points of such investigations have been various idealized languages of concurrent and distributed programming, in particular the well-established state-transformation model inspired by Petri nets and multiset rewriting, and the prolific process-based models such as the π-calculus and other process algebras. In nearly …


Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom Jul 2009

Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom

John Mark Ockerbloom

In this article, David Garlan, Robert Allen, and John Ockerbloom reflect on the state of architectural mismatch, a term they coined in their 1995 IEEE Software article, "Architectural Mismatch: Why Reuse Is So Hard." Although the nature of software systems has changed dramatically since the earlier article was published, the challenge of architectural mismatch remains an important concern for the software engineering field.


Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba Jul 2009

Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba

Dr Samuel Fosso Wamba

Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …


Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba Jul 2009

Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba

Professor Katina Michael

Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …


Computational Thinking (Ct): On Weaving It In, Paul Curzon, Joan Peckham, Harriet G. Taylor, Amber Settle, Eric Roberts Jul 2009

Computational Thinking (Ct): On Weaving It In, Paul Curzon, Joan Peckham, Harriet G. Taylor, Amber Settle, Eric Roberts

Amber Settle

Computing offers essential problem-solving tools needed for contemporary challenges. The role of computing in education, and appropriate pathways for modern students, are of concern [10]. Educators recognize the importance of improving information technology (IT) skills and fluency, and studies have developed guidelines [7][8], but the analytical concepts and tools of computing have benefits beyond IT fluency. CT [12] continues earlier discussions on the nature of computing, [3][9]. This has helped the computing community to strengthen definition of the problem solving skills that computing brings to society, through education, outreach, and research. Recently, CT has served as a basis for several …