Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 204

Full-Text Articles in Physical Sciences and Mathematics

Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks Jun 2010

Rfid Deployment And Use In The Dairy Value Chain: Applications, Current Issues And Future Research Directions, S. F. Wamba, Alison Wicks

Faculty of Informatics - Papers (Archive)

RFID technology is currently considered as a key enabler of supply chain transformation. However, very little has been written about the deployment and use of RFID in the dairy industry. Drawing on an extensive literature review and a case example, this exploratory study seeks to present current applications and issues related to RFID’s adoption in the dairy industry and discuss future research directions.


E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu Jan 2010

E-Government Challenge In Disaster Evacuation Response: The Role Of Rfid Technology In Building Safe And Secure Local Communities, A. Chatfield, S. F. Wamba, T. Hirokazu

Faculty of Informatics - Papers (Archive)

While geographic information systems (GIS) can provide information on the static locations of critical infrastructure and evacuation routes, they do not provide the dynamically changing locations of things and people on the move. In contrast, radio frequency identification (RFID) wireless network technology can automatically identify and track the movement of assets (i.e., fire engines, ambulances, and rescue workers) and vulnerable citizens on the move (i.e., the elderly and the disabled), and hence providing local governments and communities with real-time information and enhanced decision-making capabilities, during chaotic disaster response operations (i.e., evacuation). Although the potential high impact and strategic value of …


Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield Jan 2010

Rfid-Enabled Warehouse Process Optimization In The Tpl Industry, S. F. Wamba, A. T. Chatfield

Faculty of Informatics - Papers (Archive)

Using the value chain model and a longitudinal real-world case study of a third-party logistics (TPL) supply chain, this study provides support for the enabling role of RFID technology in effecting warehouse process optimization. Furthermore, the findings of our study reveal the RFID technology implementation costs as the key inhibitors factor of RFID widespread adoption and usage among suppliers.


Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba Jan 2010

Rfid-Enabled Inventory Control Optimization: A Proof Of Concept In A Small-To-Medium Retailer, H. Dane, Katina Michael, S. F. Wamba

Faculty of Informatics - Papers (Archive)

This study examines the impact of radio-frequency identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a proof of concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To analyze the present mode of operation, procedural documents, semi-structured interviews and a participant observation was conducted. The basis for the proof of concept was a future mode of operation using a quasi-experimental design. Results indicate that in a small-to-medium retail environment, RFID technology could act as a loss prevention mechanism, …


Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey Jan 2010

Development And Testing Of A Work Measurement Tool To Assess Caregivers' Activities In Residential Aged Care Facilities, Esther Munyisia, Ping Yu, David Hailey

Faculty of Informatics - Papers (Archive)

The introduction of computerized information systems into health care practices may cause changes to the way healthcare workers conduct their routine work activities, such as work flow and the time spend on each activity. To date the available work measurement tools are confined to activities in hospitals and do not cover residential aged care facilities (RACFs). There is little evidence about the effects of technology on caregivers' work practices, including the distribution of time on activities in a RACF. This requires the measurement of caregivers' activities using a valid and reliable measurement tool. The contribution of this research is to …


A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu Jan 2010

A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu

Faculty of Informatics - Papers (Archive)

Systematic evaluation of the introduction and impact of health information systems (HIS) is a challenging task. As the implementation is a dynamic process, with diverse issues emerge at various stages of system introduction, it is challenge to weigh the contribution of various factors and differentiate the critical ones. A conceptual framework will be helpful in guiding the evaluation effort; otherwise data collection may not be comprehensive and accurate. This may again lead to inadequate interpretation of the phenomena under study. Based on comprehensive literature research and own practice of evaluating health information systems, the author proposes a multimethod approach that …


Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald Jan 2010

Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald

Faculty of Informatics - Papers (Archive)

The paper discusses critical factors for the successful introduction of information and communication technologies (ICT) into health care organisations. The proven evidence around the world suggests that introducing health ICT is a mutual transformation process that actively involves people, organisation and technology. The key people factors include personal attributes of the change agent, user ownership and positive user attitudes. The organisational facilitators are adequate funding, strong leadership and project management, integration of IT with work practices, managing change and end user expectations, and end user training and support. User friendly and useful systems can be achieved by involving both management …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Jan 2010

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Faculty of Informatics - Papers (Archive)

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang Jan 2010

Fixed Rank Filtering For Spatio-Temporal Data, Noel Cressie, Tao Shi, Emily L. Kang

Faculty of Informatics - Papers (Archive)

Datasets from remote-sensing platforms and sensor networks are often spatial, temporal, and very large. Processing massive amounts of data to provide current estimates of the (hidden) state from current and past data is challenging, even for the Kalman filter. A large number of spatial locations observed through time can quickly lead to an overwhelmingly high-dimensional statistical model. Dimension reduction without sacrificing complexity is our goal in this article. We demonstrate how a Spatio-Temporal Random Effects (STRE) component of a statistical model reduces the problem to one of fixed dimension with a very fast statistical solution, a methodology we call Fixed …


An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam Jan 2010

An Intelligent Approach For Cost Minimization Of Power Generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, Norazila Jaalam

Faculty of Informatics - Papers (Archive)

Cost reduction is one of the main targets in power industry due to economic load dispatch problem and allocating loads to plants for minimum cost. The principal objective in economic dispatch of thermal generators in a power system is to determine the economic loadings of the generators so that the load demand can be met and the loadings are within the feasible operating regions of the generators. This study presents an optimization approach for fuel cost and power loss minimization based on genetic algorithm and particle swarm optimization methods. To demonstrate the global optimization power of the presented techniques, these …


The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu Jan 2010

The Effect Of Dvr Location For Enhancing Voltage Sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, Herbert Iu

Faculty of Informatics - Papers (Archive)

Recently, Dynamic Voltage Restorer (DVR) has become a popular power electronic device as a protection for sensitive loads from voltage sag. Voltage sag widely known as one of the major problem in power quality, it is defined as a short reduction of voltage from the nominal. DVR is a custom power device for voltage sag mitigation which works when the fault occurs in power distribution system. In this paper, the effect of the DVR location is investigated at the low and medium voltage of the distribution system with different loads. To verify the performance of the DVR in mitigating the …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael Jan 2010

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Toward A State Of Überveillance, M G. Michael, Katina Michael Jan 2010

Toward A State Of Überveillance, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

Überveillance is an emerging concept, and neither its application nor its power have yet fully arrived [38]. For some time, Roger Clarke's [12, p. 498] 1988 dataveillance concept has been prevalent: the “systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons.”


Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu Jan 2010

Rfid- A Unique Radio Innovation For The 21st Century, Rajit Gadh, George Roussos, Katina Michael, George Q. Huang, B Shiv Prabhu, Peter Chu

Faculty of Informatics - Papers (Archive)

In 1948, the Proceedings of the Institute of Radio Engineers published Harry Stockman’s seminal work on “communication by means of reflected power,” which many consider as the first paper on RFID. The paper concluded by expressing the expectation that “considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored.” It is only appropriate that after more than 60 years following the publication of this work by its progenitor, in this special issue the Proceedings of the IEEE review current developments towards the …


Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill Jan 2010

Electronic Properties Of Carbon Nanotubes With Distinct Bond Lengths, J E. Bunder, James M. Hill

Faculty of Informatics - Papers (Archive)

In band structure calculations commonly used to derive the electronic properties of carbon nanotubes it is generally assumed that all bond lengths are equal. However, hexagonal carbon lattices are often irregular and may contain as many as three distinct bond lengths. A regular $(n,m)$ carbon nanotube will be metallic if p=(n-m)/3 for integer p. Here we analytically derive the generalized condition for metallic irregular carbon nanotubes. This condition is particularly relevant to small radius nanotubes and nanotubes experiencing small applied strains.


Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti Jan 2010

Linking The Calkin-Wilf And Stern-Brocot Trees, Bruce Bates, Martin Bunder, Keith Tognetti

Faculty of Informatics - Papers (Archive)

Links between the Calkin-Wilif tree and the Stern-Brocot tree are discussed answering the questions: What is the jth vertex in the nth level of the Calkin-Wilf tree? A simple mechanism is described for converting the jth vertex in the nth level of the Calkin-Wilf tree into the jth entry in the nth level of the Stern-Brocot tree. We also provide a simple method for evaluating terms in the hyperbinary sequence thus answering a challenge raised in Quantum in September 1997. We also examine successors and predecessors in both trees.


A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev Jan 2010

A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev

Faculty of Informatics - Papers (Archive)

Bouziad in 1996 generalized theorems of Montgomery (1936) and Ellis (1957), to prove that every Cech complete space with a separately continuous group operation must be a topological group. We generalize these results in a new direction, by dropping the requirement that the spaces be T2 or even T1. Our theorems then become applicable to groups with asymmetric topologies, such as the group of real numbers with the upper topology, whose open sets are the open upper rays. We first show a generic Ellis-type theorem for groups with a Hausdor k-bitopological structure whose symmetrization belongs to a class of k-spaces …


Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan Jan 2010

Modelling Interaction Of Atoms And Ions With Graphene, James M. Hill, Yue Chan

Faculty of Informatics - Papers (Archive)

In this Letter, the authors inve´stigate the interaction of various atoms/ions with a graphene sheet and two parallel graphene sheets using the continuous approximation and the 6–12 Lennard-Jones potential. The authors assume that the carbon atoms are smeared across the surface of the graphene sheet so that the total interaction between the single atom/ion and the graphene sheet can be approximated by a surface integration over the graphene sheet. They determine the equilibrium position for the atom/ion on the surface of the graphene sheet and the minimum intermolecular spacing between two graphene sheets. This minimum spacing is by symmetry twice …


Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver Jan 2010

Periodic 2-Graphs Arising From Subshifts, David Pask, Iain Raeburn, Natasha A. Weaver

Faculty of Informatics - Papers (Archive)

Higher-rank graphs were introduced by Kumjian and Pask to provide models for higher-rank Cuntz– Krieger algebras. In a previous paper, we constructed 2 graphs whose path spaces are rank two subshifts of finite type, and showed that this construction yields aperiodic 2 graphs whose C algebras are simple and are not ordinary graph algebras. Here we show that the construction also gives a family of periodic 2 graphs which we call domino graphs. We investigate the combinatorial structure of domino graphs, finding interesting points of contact with the existing combinatorial literature, and prove a structure theorem for the C algebras …


The D-Completeness Of T->, R K. Meyer, M W. Bunder Jan 2010

The D-Completeness Of T->, R K. Meyer, M W. Bunder

Faculty of Informatics - Papers (Archive)

A Hilbert-style version of an implicational logic can be represented by a set of axiom schemes and modus ponens or by the corresponding axioms, modus ponens and substitution. Certain logics, for example the intuitionistic implicational logic, can also be represented by axioms and the rule of condensed detachment, which combines modus ponens with a minimal form of substitution. Such logics, for example intuitionistic implicational logic (see Hindley [3]), are said to be D-complete. For certain weaker logics, the version based on condensed detachment and axioms (the condensed version of the logic) is weaker than the original. In this paper we …


Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy Jan 2010

Refraction Of Nonlinear Beams By Localized Refrative Index Changes In Nematic Liquid Crystals, Gaetano Assanto, A A Minzoni, Noel F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

The propagation of solitary waves in nematic liquid crystals in the presence of localised nonuniformities is studied. The nonuniformities can be caused by external electric fields, other light beams, or any other mechanism which results in a modified director orientation in a localised region of the liquid-crystal cell. The net effect is that the solitary wave undergoes refraction and trajectory bending. A general modulation theory for this refraction is developed, and particular cases of circular, elliptical and rectangular perturbations are considered. The results are found to be in excellent agreement with numerical solutions.


Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello Jan 2010

Exel's Crossed Product For Non-Unital C*-Algebras, Nathan D. Brownlowe, Iain F. Raeburn, Sean T. Vittadello

Faculty of Informatics - Papers (Archive)

We consider a family of dynamical systems (A, alpha, L) in which a is an endomorphism of a C*-algebra A and L is a transfer operator for a. We extend Exel's construction of a crossed product to cover non-unital algebras A, and show that the C*-algebra of a locally finite graph can be realised as one of these crossed products. When A is commutative, we find criteria for the simplicity of the crossed product, and analyse the ideal structure of the crossed product.


Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen Jan 2010

Using Singularity Theory To Analyse A Spatially Uniform Model Of Self-Heating In Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, Xiao Dong Chen

Faculty of Informatics - Papers (Archive)

Fires at industrial composting facilities, such as those storing industrial waste products like municipal solid waste (NSW) and landfills are fairly common. In most cases these are manageable and such incidents are not destructive enough to attract attention beyond these facilities. However, over the years there have been a few notable devastating fires at such facilities.

In each of these industrial processes there is an inherent increase in temperature as a consequence of the biological activity. Indeed such a temperature increase is one of the goals of the composting waste. Elevated temperatures of the order of 70-90 degrees celsius have …


A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2010

A Novel Spatial Tdma Scheduler For Concurrent Transmit/Receive Wireless Mesh Networks, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

The success of wireless mesh networks hinges on their ability to support bandwidth intensive, multi-media applications. A key approach to increasing network capacity is to equip wireless routers with smart antennas. These routers, therefore, are capable of focusing their transmission on specific neighbors whilst causing little interference to other nodes. This, however, assumes there is a link scheduling algorithm that activates links in a way that maximizes network capacity. To this end, we propose a novel link activation algorithm that maximally creates a bipartite graph, which is then used to derive the link activation schedule of each router. We have …


A New Integrated Unicast/Multicast Scheduler For Input-Queued Switches, Kwan-Wu Chin Jan 2010

A New Integrated Unicast/Multicast Scheduler For Input-Queued Switches, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

Researchers have thus far considered scheduling unicast and multicast traffic separately, and have paid little attention to integrated schedulers. To this end, we present a new integrated scheduler that considers both unicast and multicast traffic simultaneously and also addresses key shortcomings of existing approaches. Specifically, we outline a scheduler that achieves 100% throughput, and unlike existing schemes, do not require a tuning knob. Moreover from our extensive simulation studies, we show that it works well in uniform, non-uniform and bursty traffic scenarios.


On The Impact Of Wi-Fi Multimedia Power Save Mode On The Voip Capacity Of Wlans, Kwan-Wu Chin Jan 2010

On The Impact Of Wi-Fi Multimedia Power Save Mode On The Voip Capacity Of Wlans, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

VoIP capacity is an important metric as it determines the maximum number of calls that can be supported by a Wireless Local Area Network (WLAN) before call quality degrades. To this end, researchers have conducted extensive simulation and analytical studies to determine the VoIP capacity of different WLANs. These previous works, however, assume stations are always awake during a call. In 2005, the Wi-Fi Alliance proposed a power saving mode extension that allows stations to retrieve packets from the Access Point (AP) at any time. In light of this development, this paper derives the VoIP capacity of a IEEE 802.11a …


Reconstruction From Limited-Angle Projections Based On Spectrum Analysis, Jianhua Luo, Wanqing Li, Yuemin Zhu Jan 2010

Reconstruction From Limited-Angle Projections Based On Spectrum Analysis, Jianhua Luo, Wanqing Li, Yuemin Zhu

Faculty of Informatics - Papers (Archive)

This paper proposes a sparse representation of an image using discrete δ-u functions. A δ-u function is defined as the product of a Kronecker delta function and a step function. Based on the sparse representation, we have developed a novel and effective method for reconstructing an image from limited-angle projections. The method first estimates the parameters of the sparse representation from the incomplete projection data, and then directly calculates the image to be reconstructed. Experiments have shown that the proposed method can effectively recover the missing data and reconstruct images more accurately than the total-variation (TV) regularized reconstruction …


On Maximizing Voip Capacity And Energy Conservation In Multi-Rate Wlans, Kwan-Wu Chin Jan 2010

On Maximizing Voip Capacity And Energy Conservation In Multi-Rate Wlans, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

This letter highlights a key problem that arises when frame aggregation, a popular method for boosting VoIP capacity, is used in Wireless Local Area Networks (WLANs) that employ asynchronous power save mode (PSM). Specifically, it shows how the PSM proposed by the Wi-Fi Alliance renders frame aggregation ineffective. It then proposes a novel opportunistic scheduler that restores the benefits of frame aggregation whilst ensuring stations have minimal energy expenditure.


A Dimensional Tolerancing Knowledge Management System Using Nested Ripple Down Rules (Nrdr), Ramsey Hamade, V. C. Moulianitis, D. D'Addonna, Ghassan Beydoun Jan 2010

A Dimensional Tolerancing Knowledge Management System Using Nested Ripple Down Rules (Nrdr), Ramsey Hamade, V. C. Moulianitis, D. D'Addonna, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

This paper proposes to use a knowledge acquisition (KA) approach based on Nested Ripple Down Rules
(NRDR) to assist in mechanical design focusing on dimensional tolerancing. A knowledge approach
to incrementally model expert design processes is implemented. The knowledge is acquired in the
context of its use, which substantially supports the KA process. The knowledge is captured
which human designers utilize in order to specify dimensional tolerances on shafts and mating
holes in order to meet desired classes of fit as set by relevant engineering standards in order
to demonstrate the presented approach. The developed dimensional tolerancing knowledge
management system …


Asymptotics And Optimal Bandwidth Selection For Highest Density Region Estimation, R. Samworth, M. Wand Jan 2010

Asymptotics And Optimal Bandwidth Selection For Highest Density Region Estimation, R. Samworth, M. Wand

Faculty of Informatics - Papers (Archive)

We study kernel estimation of highest-density regions (HDR). Our main contributions are two-fold. First, we derive a uniform-in- bandwidth asymptotic approximation to a risk that is appropriate for HDR estimation. This approximation is then used to derive a bandwidth selection rule for HDR estimation possessing attractive asymptotic properties. We also present the results of numerical stud- ies that illustrate the benefits of our theory and methodology.