Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 180

Full-Text Articles in Physical Sciences and Mathematics

Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael Dec 2008

Rfid-Enabled Warehouse Optimization: Lessons From Early Adopters In The 3pl Industry, S. F. Wamba, T. R. Coltman, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper presents the impact of RFID technology on the picking and shipping processes of one RFID-enabled warehouse in the 3PL industry. The findings from our study confirm initial results from many studies where RFID implementation has been shown to enable business process redesign, improve data quality, real-time data collection and synchronization and enhance system integration. In this study we show that the full potential of RFID technology is dependent upon the involvement of all supply chain members involved in implementation. Moreover, firms considering implementing RFID technology need to take into account their investment in complementary assets such as employee …


Developing Real Time Applications With Java Based Sun Spot, L. Chen, Phillip J. Mckerrow, Q. Lu Dec 2008

Developing Real Time Applications With Java Based Sun Spot, L. Chen, Phillip J. Mckerrow, Q. Lu

Faculty of Informatics - Papers (Archive)

Most researchers develop real-time applications with C, including programming hardware with C and using a Real Time Operating System (RTOS) that is written in C to manage the task environment. In this paper, we research a different approach by using Java to develop a real-time application. We implement an example real-time project, onboard computation of a coaxial helicopter Lama, with a Java based Sun SPOT to control the hardware and a Java RTOS (JARTOS) running on top of the Sun SPOT to manage the processes. This project enables us to answer several questions regarding to real-time system development with the …


Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward Dec 2008

Head-Pose Tracking With A Time-Of-Flight Camera, Simon Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

Intelligent interfaces that make use of the user's head pose or facial features in order to interpret the user's identity or point of attention, are finding increasing application in numerous fields. Although various techniques exist to passively track the user's gaze or head pose using monocular or stereo cameras, these systems generally cannot perceive in detail the characteristic three-dimensional (3D) profile of the user's head or face. Time-of-flight cameras, such as the Swiss Ranger SR-3000, are a recent innovation capable of providing three-dimensional image data from a single sensor. The advent of such sensors opens up new possibilities in the …


An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael Oct 2008

An Information System Design Theory For And Rfid University-Based Laboratory, S. F. Wamba, Katina Michael

Faculty of Informatics - Papers (Archive)

RFID technology is defined as a wireless automatic identification and data capture (AIDC) technology and is considered as “the next big thing” in the management and “the next revolution in supply chain”. Recently, the topic has attracted the interest of the industrial community as well as the scientific community. Following this tendency, this paper applies an Information Systems Design Theory (ISDT) for an RFID-based University Laboratory. For practitioners, the paper provides some insights into the set-up and use of RFID laboratory in university settings, and at the same time, it offers a set of hypotheses that can be empirically tested.


Acoustic Flow, Phillip J. Mckerrow Sep 2008

Acoustic Flow, Phillip J. Mckerrow

Faculty of Informatics - Papers (Archive)

As an echolocating sensor moves through an environment the pattern of echoes reflected by objects to that sensor changes continuously, creating acoustic flow. Acoustic flow has been observed in both bats and humans. In this paper, we develop a theory of acoustic flow, and discuss measuring it with a Continuous Transmission Frequency Modulated (CTFM) ultrasonic sensor.


A Software Architecture For Mobile Robot Navigation, Phillip J. Mckerrow, Sherine M. Antoun Sep 2008

A Software Architecture For Mobile Robot Navigation, Phillip J. Mckerrow, Sherine M. Antoun

Faculty of Informatics - Papers (Archive)

Directed sensing poses the problem of sensing in specific directions in synchronisation with robot motion while avoiding collisions with objects in other directions. The rebuild of an outdoor mobile robot, with the goal of mimicking a blind person navigating with echolocation, has provided the opportunity to experiment with a state machine based software architecture for landmark navigation. In this paper, we discuss the rebuild of the robot, the software architecture and an initial experiment in collision avoidance.


Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid Jul 2008

Understanding The Impact Of Emerging Technologies On Process Optimization: The Case Of Rfid Technology, S. F. Wamba, Y. Bendavid

Faculty of Informatics - Papers (Archive)

This paper examines the case of one supply chain in the electricity sector where RFID technology integrated with firm’s information systems acts as an enabler of process optimization. Using a business process approach and laboratory simulation, we explain how the implementation of RFID technology can increase the visibility of information at various layers of the supply chain, allowing members to gather precise information on real demand and improve replenishment processes. On the other hand, while RFID technology has the potential to automate some processes, human intervention is still required. Therefore, use case scenarios and sensitivity analysis should be carefully considered …


Outbound Tourism From China: Literature Review And Research Agenda, Byron W. Keating, A. Kriz Jul 2008

Outbound Tourism From China: Literature Review And Research Agenda, Byron W. Keating, A. Kriz

Faculty of Informatics - Papers (Archive)

The rapid growth of China's outbound tourism market has attracted a great deal of attention in recent years. However, the academic literature is still sparse in this area. Using a theoretical framework that synthesises the key processes related to destination choice, the authors undertake a systematic review of the academic literature on outbound tourism from China. Stemming from this review, the article provides some direction for future empirical research on this important topic. The authors also suggest that a new model for travel planning could be developed, suggesting that traditional destination choice models may inadequately capture the nuances of destination …


The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael Jun 2008

The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

Radio frequency identification (RFID) chip implants for humans are no longer the tales of science fiction. Already preliminary findings have shown that the number of people willing to get chipped has increased since the technology’s commercial arrival in 2002, despite the fact that adoption rates have been very low. This investigation presents three case studies of the main users/ innovators of humancentric chip implants. The first case is of a British researcher in an academic institution who has conducted several implant experiments; the second case, is of a hobbyist and entrepreneur who has focused on the use of RFID implants …


Amal Graafstra- The Do-It-Yourselfer Rfid Implantee: The Culture, Values And Ethics Of Hobbyist Implantees: A Case Study, R. Ip, Katina Michael, M G. Michael Jun 2008

Amal Graafstra- The Do-It-Yourselfer Rfid Implantee: The Culture, Values And Ethics Of Hobbyist Implantees: A Case Study, R. Ip, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper provides insights into the culture, values and ethics of do-it-yourself microchip implantees. Microchip implantees are people who have opted to bear a radio-frequency identification (RFID) device beneath their skin for particular electronic applications. This paper uses a single case study of the most prominent hobbyist microchip implantee, Mr Amal Graafstra of the United States, to explore the preliminary motivations for being implanted, the actual chip experience, and the subsequent repercussions of being an implantee. The data for this paper was collected using two main techniques, a primary interview with the case subject, complemented by secondary documentary evidence available …


The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael Jun 2008

The Rfid Value Proposition, Benjamin D. Renegar, Katina Michael

Faculty of Informatics - Papers (Archive)

Radio Frequency Identification (RFID) has the potential to revolutionize the retail industry, yet the linking of this automatic identification (auto-ID) technology to consumer goods has resulted in widespread concern over the potential privacy threats, primarily due to the aspect of traceability it could impose on consumers. As a consequence, privacy has come to be perceived as a barrier stopping RFID adoption in retail in its tracks. When investigating other complex information and communication technologies (ICT), it becomes apparent that consumers often sacrifice privacy in order to take advantage of some form of value afforded by the technology. This interplay between …


Advanced Location-Based Services, Miguel A. Labrador, Katina Michael, Axel Kuepper Apr 2008

Advanced Location-Based Services, Miguel A. Labrador, Katina Michael, Axel Kuepper

Faculty of Informatics - Papers (Archive)

This special issue of Computer Communications presents state-of-the-art research and applications in the area of location-based services (LBS). Initial location-based services entered the market around the turn of the millennium and for the greater part appeared in the form of restaurant finders and tourist guides, which never gained widespread user acceptance. The reasons for this were numerous and ranged from inaccurate localization mechanisms like Cell-ID, little creativity in the design and functions of such services, to a generally low acceptance of data services. However, in recent years, there has been an increasing market penetration of GPS-capable mobile phones and devices, …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip Apr 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Faculty of Informatics - Papers (Archive)

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael Apr 2008

A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Advanced location-based services (A-LBS) for humancentric tracking and monitoring are now emerging as operators and service providers begin to leverage their existing infrastructure and invest in new technologies, toward increasingly innovative location application solutions. We can now point to humancentric tracking and monitoring services where the person (i.e. subject) has become an active node in the network. For example, in health applications through the use of embedded technologies such as radio-frequency identification (RFID) or in campus applications through the use of electronic monitoring techniques in the form of global positioning systems (GPS). These technologies, for the greater part, have been …


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael Apr 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


The Rfid-Enabled Dairy Farm: Towards Total Farm Management, Adam Trevarthen, Katina Michael Apr 2008

The Rfid-Enabled Dairy Farm: Towards Total Farm Management, Adam Trevarthen, Katina Michael

Faculty of Informatics - Papers (Archive)

Radio-frequency identification (RFID) is currently being deployed in government mandated livestock identification schemes across the world. RFID in its basic function can help authorities identify animals, especially when traceability becomes paramount during disease outbreaks across regions. This paper provides a view of how an RFID-enabled dairy farm can leverage mobile network infrastructure towards achieving total farm management. The data for the study was collected from two case studies, both NLIS (national livestock identification system) compliant dairy farms on the South Coast of New South Wales in Australia. The Cochrane and Strong Farms were used as models to illustrate the core …


Rfid And Supply Chain Management: Introduction To The Special Issue, Tim Coltman, R. Gadh, K. Michael Apr 2008

Rfid And Supply Chain Management: Introduction To The Special Issue, Tim Coltman, R. Gadh, K. Michael

Faculty of Informatics - Papers (Archive)

Much of the received wisdom emanating from modern corporations indicates that business competition is being fought “supply chain versus supply chain” rather than “firm versus firm”. The ability to deliver goods and services in full, on time and error free to customers is therefore of increasing strategic importance to any organization, independent of size or sector. From demand forecasting, to the sourcing of raw materials, right through to manufacture and dispatch- visibility in the supply chain is becoming an important facet of any modern operation. How to leverage emerging information technologies, such as radio frequency identification (RFID) to create innovative …


Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Apr 2008

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Faculty of Informatics - Papers (Archive)

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.


Social And Organizational Aspects Of Information Security Management, Katina Michael Apr 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


The Inhabitation Problem For Intersection Types, M. W. Bunder Jan 2008

The Inhabitation Problem For Intersection Types, M. W. Bunder

Faculty of Informatics - Papers (Archive)

In the system lambda ^ of intersection types, without w, the problem as to whether an arbitrary type has an inhabitant, has been shown to be undecidable by Urzyczyn in [9]. For one subsystem of lambda ^, that lacks the ^- introduction rule, the inhabitation problem has been shown to be decidable in Kurata and Takahashi [9]. The natural question that arises is: What other subsystems of lambda ^, have a decidable inhabitation problem? The work in [2], which classifies distinct and inhabitation-distinct subsystems of lambda ^, leads to the extension of the undecidability result to lambda ^ without the …


Modeling Dynamic Controls On Ice Streams: A Bayesian Statistical Approach, L Mark Berliner, Kenneth Jezek, Noel Cressie, Yongku Kim, Calvin Lam, Cornelis Van Der Veen Jan 2008

Modeling Dynamic Controls On Ice Streams: A Bayesian Statistical Approach, L Mark Berliner, Kenneth Jezek, Noel Cressie, Yongku Kim, Calvin Lam, Cornelis Van Der Veen

Faculty of Informatics - Papers (Archive)

Our main goal is to exemplify the study of ice-stream dynamics via Bayesian statistical analysis incorporating physical, though imperfectly known, models using data that are both incomplete and noisy. The physical-statistical models we propose account for these uncertainties in a coherent, hierarchical manner. The initial modeling assumption estimates basal shear stress as equal to driving stress, but subsequently includes a random corrector process to account for model error. The resulting stochastic equation is incorporated into a simple model for surface velocities. Use of Bayes' theorem allows us to make inferences on all unknowns given basal elevation, surface elevation and surface …


Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain Jan 2008

Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain

Faculty of Informatics - Papers (Archive)

Vulnerability assessment in power systems is important so as to determine how vulnerable a power system in case of any unforeseen catastrophic events. This paper presents the application of Radial Basis Function Neural Network (RBFNN) for vulnerability assessment of power system incorporating a new proposed feature extraction method named as the Neural Network Weight Extraction (NNWE) for dimensionality reduction of input data. The performance of the RBFNN is compared with the Multi Layer Perceptron Neural Network (MLPNN) so as to evaluate the effectiveness of the RBFNN in assessing the vulnerability of a power system based on the indices, power system …


Some Diagnostics For Markov Random Fields, Noel A. Cressie, Prasenjit Kapat Jan 2008

Some Diagnostics For Markov Random Fields, Noel A. Cressie, Prasenjit Kapat

Faculty of Informatics - Papers (Archive)

The development of diagnostics to check the fit of a proposed Markov random field (MRP) to data is a very important problem in spatial statistics. In this article, the consequences of fitting a given MRF to spatial data are visualized using diagnostic plots. The Gaussian MRF known as the conditional autoregressive model is featured. Various types of departures of the data from the fitted MRF model are calculated, allowing locally influential observations to be highlighted using the MRF-Neighborhoods plot. Through a global summary statistic and the Model-Comparison plot, we compare MRF models that differ both in terms of the neighborhood …


It Offshoring Risks And Governance Capabilities, Akemi T. Chatfield, Padmaharsha Wanninayaka Jan 2008

It Offshoring Risks And Governance Capabilities, Akemi T. Chatfield, Padmaharsha Wanninayaka

Faculty of Informatics - Papers (Archive)

IT offshoring or offshore outsourcing is a fast growing trend that is worldwide and continuing. Driven by the competitive pressure to reduce IT costs, firms in developed countries opt to buy IT services from offshore service providers in developing countries, which provide comparative advantage in lower labour costs and skilled workforce. While much has been written about its relative costs and benefits, there is a lack of comprehensive research on risks of IT offshoring. This research aims to identify IT offshoring risks based on a comprehensive review of the literature and content analysis. It also aims to map those risks …


Generalised Linear Mixed Model Analysis Via Sequential Monte Carlo Sampling, Y Fan, D S. Leslie, M P. Wand Jan 2008

Generalised Linear Mixed Model Analysis Via Sequential Monte Carlo Sampling, Y Fan, D S. Leslie, M P. Wand

Faculty of Informatics - Papers (Archive)

We present a sequential Monte Carlo sampler algorithm for the Bayesian analysis of generalised linear mixed models (GLMMs). These models support a variety of interesting regression-type analyses, but performing inference is often extremely difficult, even when using the Bayesian approach combined with Markov chain Monte Carlo (MCMC). The Sequential Monte Carlo sampler (SMC) is a new and general method for producing samples from posterior distributions. In this article we demonstrate use of the SMC method for performing inference for GLMMs. We demonstrate the effectiveness of the method on both simulated and real data, and find that sequential Monte Carlo is …


Finding Symmetries By Incorporating Initial Conditions As Side Conditions, J. M. Goard Jan 2008

Finding Symmetries By Incorporating Initial Conditions As Side Conditions, J. M. Goard

Faculty of Informatics - Papers (Archive)

It is generally believed that in order to solve initial value problems using Lie symmetry methods, the initial condition needs to be left invariant by the infinitesimal symmetry generator that admits the invariant solution. This is not so. In this paper we incorporate the imposed initial value as a side condition to find ‘infinitesimals’ from which solutions satisfying the initial value can be recovered, along with the corresponding symmetry generator.


Lie Symmetry Methods In Finance: An Example Of The Bond Pricing Equation, Joanna M. Goard Jan 2008

Lie Symmetry Methods In Finance: An Example Of The Bond Pricing Equation, Joanna M. Goard

Faculty of Informatics - Papers (Archive)

Using Lie’s classical method of group invariants, new solutions are found for the valuation of zero-coupon bonds. In finding the solutions, the model for the underlying short-term interest rate assumes a realistic time-dependent, mean-reverting drift form and a power-law volatility.


An Operational Model For A Well-Stirred Membrane Bioreactor: Reactor Performance Analysis, Mark Nelson, Harvinder Sidhu, Soji Adesina Jan 2008

An Operational Model For A Well-Stirred Membrane Bioreactor: Reactor Performance Analysis, Mark Nelson, Harvinder Sidhu, Soji Adesina

Faculty of Informatics - Papers (Archive)

We investigate the behavior of a reaction described by Michaelis-Menten kinetics in an immobilised enzyme reactor (IER). The IER is treated as a well-stirred flow reactor, in which the bound and unbounded enzyme species are immobilized and therefore constrained to remain within the reaction vessel. The product species leaves the bioreactor either in the reactor outflow or by permeating through the semi-permeable reactor wall. We explore how the concentration of recovered product and the reactor productivity vary with process parameters, particularly those associated with the separation of the product from the substrate through the semi-permeable reactor wall. We show that …


Formal Concept Analysis For E-Learning, Ghassan Beydoun Jan 2008

Formal Concept Analysis For E-Learning, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

We capture student interactions in an e-learning community to construct a semantic web (SW) to create a collective meta-knowledge structure guiding students as they search the existing knowledge corpus. We use formal concept analysis (FCA) as a knowledge acquisition tool to process the students virtual surfing trails to express and exploit the dependencies between web-pages to yield subsequent and more effective focused search results. We mirror social navigation and bypass the cumbersome manual annotation of webpages and at the same time paralleling social navigation for knowledge. We present our system KAPUST2 (Keeper and Processor of User Surfing Trails) which constructs …


Chord4s: A P2p-Based Decentralised Service Discovery Approach, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin Jan 2008

Chord4s: A P2p-Based Decentralised Service Discovery Approach, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin

Faculty of Informatics - Papers (Archive)

Service-oriented computing is emerging as a paradigm for developing distributed applications. A critical issue of utilising service-oriented computing is to have a scalable, reliable and robust service discovery mechanism. However, traditional service discovery methods using centralised registries can easily suffer from problems such as performance bottleneck and vulnerability to failures in the large scalable service network, thus functioning abnormally. To address these problems, this paper proposes a peer-to-peer based decentralised service discovery approach named Chord4S. Chord4S utilises the data distribution and lookup capabilities of the popular Chord to distribute and discover services in a decentralised manner. Data availability is further …