Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 450

Full-Text Articles in Physical Sciences and Mathematics

An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy Dec 2010

An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy

Associate Professor Katina Michael

Mr Peter Mahy, Partner at Howells LLP and the lawyer who represented S & Marper in front of the Grand Chamber at the European Court of Human Rights was interviewed by Katina Michael on the 10th of October 2009 while she was studying towards a Masters of Transnational Crime Prevention in the Faculty of Law at the University of Wollongong. In 2010 Peter Mahy received the Legal Aid Lawyer of the Year award for his contribution to the field. Mahy received his honours law degree from Sheffield University and a Masters in Criminology from the University of Cambridge. He did …


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael Dec 2010

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Associate Professor Katina Michael

In England, Wales and Northern Ireland, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael Sep 2010

The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services During Emergencies: An Australian Case Study, Anas Aloudat, K. Michael

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility to their citizens to safeguard them against both natural and human-made …


Towards A State Of Uberveillance, M.G. Michael, K. Michael Jun 2010

Towards A State Of Uberveillance, M.G. Michael, K. Michael

Associate Professor Katina Michael

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke’s [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.” Almost twenty years on, technology has developed so much and the national security context has altered so greatly [52], that there is a pressing need to formulate a new term to convey both the resent reality, and the Realpolitik (policy primarily based on power) of our times. However, if …


The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, K. Michael Jun 2010

The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, K. Michael

Associate Professor Katina Michael

The collection and storage of fingerprint profiles and DNA samples in the field of forensic science for non-violent crimes is highly controversial. While biometric techniques such as fingerprinting have been used in law enforcement since the early 1900s, DNA presents a more invasive and contentious technique as most sampling is of an intimate nature (e.g. buccal swab). A fingerprint is a pattern residing on the surface of the skin while a DNA sample needs to be extracted in the vast majority of cases (e.g. at times extraction even implying the breaking of the skin). This paper aims to balance the …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

Associate Professor Katina Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks Jun 2010

Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks

Faculty of Informatics - Papers (Archive)

RFID technology is currently considered as a key enabler of supply chain transformation. However, very little has been written about the deployment and use of RFID in the dairy industry. Drawing on an extensive literature review and a case example, this exploratory study seeks to present current applications and issues related to RFID’s adoption in the dairy industry and discuss future research directions.


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Faculty of Informatics - Papers (Archive)

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba Jan 2010

Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba

Faculty of Informatics - Papers (Archive)

This study examines the impact of radio-frequency identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a proof of concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To analyze the present mode of operation, procedural documents, semi-structured interviews and a participant observation was conducted. The basis for the proof of concept was a future mode of operation using a quasi-experimental design. Results indicate that in a small-to-medium retail environment, RFID technology could act as a loss prevention mechanism, …


Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey Jan 2010

Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey

Faculty of Informatics - Papers (Archive)

The introduction of computerized information systems into health care practices may cause changes to the way healthcare workers conduct their routine work activities, such as work flow and the time spend on each activity. To date the available work measurement tools are confined to activities in hospitals and do not cover residential aged care facilities (RACFs). There is little evidence about the effects of technology on caregivers' work practices, including the distribution of time on activities in a RACF. This requires the measurement of caregivers' activities using a valid and reliable measurement tool. The contribution of this research is to …


A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu Jan 2010

A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu

Faculty of Informatics - Papers (Archive)

Systematic evaluation of the introduction and impact of health information systems (HIS) is a challenging task. As the implementation is a dynamic process, with diverse issues emerge at various stages of system introduction, it is challenge to weigh the contribution of various factors and differentiate the critical ones. A conceptual framework will be helpful in guiding the evaluation effort; otherwise data collection may not be comprehensive and accurate. This may again lead to inadequate interpretation of the phenomena under study. Based on comprehensive literature research and own practice of evaluating health information systems, the author proposes a multimethod approach that …


Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald Jan 2010

Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald

Faculty of Informatics - Papers (Archive)

The paper discusses critical factors for the successful introduction of information and communication technologies (ICT) into health care organisations. The proven evidence around the world suggests that introducing health ICT is a mutual transformation process that actively involves people, organisation and technology. The key people factors include personal attributes of the change agent, user ownership and positive user attitudes. The organisational facilitators are adequate funding, strong leadership and project management, integration of IT with work practices, managing change and end user expectations, and end user training and support. User friendly and useful systems can be achieved by involving both management …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Jan 2010

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Faculty of Informatics - Papers (Archive)

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang Jan 2010

Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang

Faculty of Informatics - Papers (Archive)

Datasets from remote-sensing platforms and sensor networks are often spatial, temporal, and very large. Processing massive amounts of data to provide current estimates of the (hidden) state from current and past data is challenging, even for the Kalman filter. A large number of spatial locations observed through time can quickly lead to an overwhelmingly high-dimensional statistical model. Dimension reduction without sacrificing complexity is our goal in this article. We demonstrate how a Spatio-Temporal Random Effects (STRE) component of a statistical model reduces the problem to one of fixed dimension with a very fast statistical solution, a methodology we call Fixed …


An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam Jan 2010

An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam

Faculty of Informatics - Papers (Archive)

Cost reduction is one of the main targets in power industry due to economic load dispatch problem and allocating loads to plants for minimum cost. The principal objective in economic dispatch of thermal generators in a power system is to determine the economic loadings of the generators so that the load demand can be met and the loadings are within the feasible operating regions of the generators. This study presents an optimization approach for fuel cost and power loss minimization based on genetic algorithm and particle swarm optimization methods. To demonstrate the global optimization power of the presented techniques, these …


The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu Jan 2010

The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu

Faculty of Informatics - Papers (Archive)

Recently, Dynamic Voltage Restorer (DVR) has become a popular power electronic device as a protection for sensitive loads from voltage sag. Voltage sag widely known as one of the major problem in power quality, it is defined as a short reduction of voltage from the nominal. DVR is a custom power device for voltage sag mitigation which works when the fault occurs in power distribution system. In this paper, the effect of the DVR location is investigated at the low and medium voltage of the distribution system with different loads. To verify the performance of the DVR in mitigating the …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael Jan 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Toward A State Of Überveillance, M G. Michael, Katina Michael Jan 2010

Toward A State Of Überveillance, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke's [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.”


Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu Jan 2010

Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu

Faculty of Informatics - Papers (Archive)

In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …


Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill Jan 2010

Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill

Faculty of Informatics - Papers (Archive)

In band structure calculations commonly used to derive the electronic properties of carbon nanotubes it is generally assumed that all bond lengths are equal. However, hexagonal carbon lattices are often irregular and may contain as many as three distinct bond lengths. A regular $(n,m)$ carbon nanotube will be metallic if p=(n-m)/3 for integer p. Here we analytically derive the generalized condition for metallic irregular carbon nanotubes. This condition is particularly relevant to small radius nanotubes and nanotubes experiencing small applied strains.


Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti Jan 2010

Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti

Faculty of Informatics - Papers (Archive)

Links between the Calkin-Wilif tree and the Stern-Brocot tree are discussed answering the questions: What is the jth vertex in the nth level of the Calkin-Wilf tree? A simple mechanism is described for converting the jth vertex in the nth level of the Calkin-Wilf tree into the jth entry in the nth level of the Stern-Brocot tree. We also provide a simple method for evaluating terms in the hyperbinary sequence thus answering a challenge raised in Quantum in September 1997. We also examine successors and predecessors in both trees.


A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev Jan 2010

A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev

Faculty of Informatics - Papers (Archive)

Bouziad in 1996 generalized theorems of Montgomery (1936) and Ellis (1957), to prove that every Cech complete space with a separately continuous group operation must be a topological group. We generalize these results in a new direction, by dropping the requirement that the spaces be T2 or even T1. Our theorems then become applicable to groups with asymmetric topologies, such as the group of real numbers with the upper topology, whose open sets are the open upper rays. We first show a generic Ellis-type theorem for groups with a Hausdor k-bitopological structure whose symmetrization belongs to a class of k-spaces …


Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan Jan 2010

Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan

Faculty of Informatics - Papers (Archive)

In this Letter, the authors inve´stigate the interaction of various atoms/ions with a graphene sheet and two parallel graphene sheets using the continuous approximation and the 6–12 Lennard-Jones potential. The authors assume that the carbon atoms are smeared across the surface of the graphene sheet so that the total interaction between the single atom/ion and the graphene sheet can be approximated by a surface integration over the graphene sheet. They determine the equilibrium position for the atom/ion on the surface of the graphene sheet and the minimum intermolecular spacing between two graphene sheets. This minimum spacing is by symmetry twice …


Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver Jan 2010

Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver

Faculty of Informatics - Papers (Archive)

Higher-rank graphs were introduced by Kumjian and Pask to provide models for higher-rank Cuntz– Krieger algebras. In a previous paper, we constructed 2 graphs whose path spaces are rank two subshifts of finite type, and showed that this construction yields aperiodic 2 graphs whose C algebras are simple and are not ordinary graph algebras. Here we show that the construction also gives a family of periodic 2 graphs which we call domino graphs. We investigate the combinatorial structure of domino graphs, finding interesting points of contact with the existing combinatorial literature, and prove a structure theorem for the C algebras …


The D-Completeness Of T->, R K. Meyer, M W. Bunder Jan 2010

The D-Completeness Of T->, R K. Meyer, M W. Bunder

Faculty of Informatics - Papers (Archive)

A Hilbert-style version of an implicational logic can be represented by a set of axiom schemes and modus ponens or by the corresponding axioms, modus ponens and substitution. Certain logics, for example the intuitionistic implicational logic, can also be represented by axioms and the rule of condensed detachment, which combines modus ponens with a minimal form of substitution. Such logics, for example intuitionistic implicational logic (see Hindley [3]), are said to be D-complete. For certain weaker logics, the version based on condensed detachment and axioms (the condensed version of the logic) is weaker than the original. In this paper we …


Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy Jan 2010

Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

The propagation of solitary waves in nematic liquid crystals in the presence of localised nonuniformities is studied. The nonuniformities can be caused by external electric fields, other light beams, or any other mechanism which results in a modified director orientation in a localised region of the liquid-crystal cell. The net effect is that the solitary wave undergoes refraction and trajectory bending. A general modulation theory for this refraction is developed, and particular cases of circular, elliptical and rectangular perturbations are considered. The results are found to be in excellent agreement with numerical solutions.


Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello Jan 2010

Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello

Faculty of Informatics - Papers (Archive)

We consider a family of dynamical systems (A, alpha, L) in which a is an endomorphism of a C*-algebra A and L is a transfer operator for a. We extend Exel's construction of a crossed product to cover non-unital algebras A, and show that the C*-algebra of a locally finite graph can be realised as one of these crossed products. When A is commutative, we find criteria for the simplicity of the crossed product, and analyse the ideal structure of the crossed product.


Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen Jan 2010

Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen

Faculty of Informatics - Papers (Archive)

Fires at industrial composting facilities, such as those storing industrial waste products like municipal solid waste (NSW) and landfills are fairly common. In most cases these are manageable and such incidents are not destructive enough to attract attention beyond these facilities. However, over the years there have been a few notable devastating fires at such facilities.

In each of these industrial processes there is an inherent increase in temperature as a consequence of the biological activity. Indeed such a temperature increase is one of the goals of the composting waste. Elevated temperatures of the order of 70-90 degrees celsius have …


A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2010

A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

The success of wireless mesh networks hinges on their ability to support bandwidth intensive, multi-media applications. A key approach to increasing network capacity is to equip wireless routers with smart antennas. These routers, therefore, are capable of focusing their transmission on specific neighbors whilst causing little interference to other nodes. This, however, assumes there is a link scheduling algorithm that activates links in a way that maximizes network capacity. To this end, we propose a novel link activation algorithm that maximally creates a bipartite graph, which is then used to derive the link activation schedule of each router. We have …