Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Systems (4)
- Algebras (3)
- Analysis (3)
- Codes (3)
- During (3)
-
- Error (3)
- Modelling (3)
- Rfid (3)
- Security (3)
- Approach (2)
- Assessment (2)
- C (2)
- Case (2)
- Communication (2)
- Control (2)
- Correcting (2)
- Distribution (2)
- Effect (2)
- Flow (2)
- Forward (2)
- Influence (2)
- Method (2)
- Model (2)
- Models (2)
- Nominative (2)
- Performance (2)
- Prediction (2)
- Process (2)
- Properties (2)
- Remarks (2)
Articles 1 - 30 of 48
Full-Text Articles in Social and Behavioral Sciences
Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis
Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis
Faculty of Engineering and Information Sciences - Papers: Part A
Large diameter steel line pipes are generally produced by cold deforming hot rolled or thermomechanically controlled rolled (TMCR) plate by the three-stage 'UOE' process. Pipe strength has been found to increase or decrease relative to the plate, depending on the steel grade and plate processing history. The strength increase is due to work hardening whereas any decrease in strength arises from the Bauschinger effect due to the reverse cold deformation of the UOE process. The steel chemistry, through the presence of strengthening microalloy precipitates, and prior processing, through the size and distribution of microalloy precipitates and the presence of retained …
Extension Problems And Non-Abelian Duality For C*-Algebras, Astrid An Huef, S Kaliszewski, Iain Raeburn
Extension Problems And Non-Abelian Duality For C*-Algebras, Astrid An Huef, S Kaliszewski, Iain Raeburn
Faculty of Engineering and Information Sciences - Papers: Part A
Suppose that H is a closed subgroup of a locally compact group G. We show that a unitary representation U of H is the restriction of a unitary representation of G if and only if a dual representation Û of a crossed product C*(G) (G/H) is regular in an appropriate sense. We then discuss the problem of deciding whether a given representation is regular; we believe that this problem will prove to be an interesting test question in non-Abelian duality for crossed products of C*-algebras.
Editorial: Special Issue Contributed From Chemeca 2006-Australasian Process Modelling And Control Selected Papers, Mark Nelson, Brent Young
Editorial: Special Issue Contributed From Chemeca 2006-Australasian Process Modelling And Control Selected Papers, Mark Nelson, Brent Young
Faculty of Engineering and Information Sciences - Papers: Part A
The papers in this issue of Chemical Product and Process Modelling are substantially those that arose from special sessions on ``process simulation and control" (organised by Brent R. Young) and ``mathematical modeling" (organised by Mark I. Nelson) at the 34th Australasian Chemical Engineering Conference (held between 17-20th September 2006, in Auckland, New Zealand). The papers in this special issue are available at: http://www.bepress.com/cppm/vol2/iss2. The papers featured in this issue have been revised and extended from CHEMECA and re-reviewed before publication here.All the papers in this issue use mathematics. However, this special issue only features a small number of the presentations …
Multilevel Modelling Of The Incidence Of Visceral Leishmaniasis In Teresina, Brazil, G Werneck, C Costa, Alexander Walker, John David, M. P. Wand, J Maguire
Multilevel Modelling Of The Incidence Of Visceral Leishmaniasis In Teresina, Brazil, G Werneck, C Costa, Alexander Walker, John David, M. P. Wand, J Maguire
Faculty of Engineering and Information Sciences - Papers: Part A
Epidemics of visceral leishmaniasis (VL) in major Brazilian cities are new phenomena since 1980. As determinants of transmission in urban settings probably operate at different geographic scales, and information is not available for each scale, a multilevel approach was used to examine the effect of canine infection and environmental and socio-economic factors on the spatial variability of incidence rates of VL in the city of Teresina. Details on an outbreak of greater than 1200 cases of VL in Teresina during 1993-1996 were available at two hierarchical levels: census tracts (socio-economic characteristics, incidence rates of human VL) and districts, which encompass …
Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye
Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye
Faculty of Engineering and Information Sciences - Papers: Part A
The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark …
Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang
Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang
Faculty of Engineering and Information Sciences - Papers: Part A
Characteristics of turbulent flows in rivers can be significantly modified because of the presence of sediment particles and secondary currents/nonuniformity. This paper investigates why the measured vertical distributions of velocity deviate from the log law. In contrast to previous research that attributed the deviation to Richardson number only, this study demonstrates that like Reynolds shear stress (−equation image), momentum flux (uv) caused by the nonzero wall-normal velocity v is also responsible for these deviations. Starting from Reynolds equations, this paper shows that the classical log law can be obtained only when v = 0; otherwise the velocity v results in …
Discussion, Raymond Chambers
Discussion, Raymond Chambers
Faculty of Engineering and Information Sciences - Papers: Part A
Discussion on Bjornstad, J.F. 2007, "Non-Bayesian Multiple Imputation", Journal of Official Statistics, vol. 23, no. 4, pp. 433.
An Inside Look At Rfid Technology, Linda Castro, Samuel Fosso Wamba
An Inside Look At Rfid Technology, Linda Castro, Samuel Fosso Wamba
Faculty of Engineering and Information Sciences - Papers: Part A
RFID (Radio Frequency Identification) is considered one of the "hottest" technologies due to its particular capabilities to track and trace in real-time objects across the extended supply chain. This article gives an inside look at the RFID world in order to improve the level of understanding of this technology and the EPC Network. An introduction to RFID's systems, RFID's potential to improve the efficiency of operations, different areas of application, as well as a roadmap approach to undertake an RFID implementation will be discussed in this article.
Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre
Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre
Faculty of Engineering and Information Sciences - Papers: Part A
This article introduces RFID technology and the EPC Network and investigates their potential for B-to-B eCommerce supply chain management. Based on empirical data gathered from four tightly interrelated firms from three layers of a supply chain, several scenarios integrating RFID and the EPC Network have been tested and evaluated. In the context of warehousing activities in one specific retail supply chain, the results indicate that i) the business process approach seems quite appropriate to capture the real potential of RFID and the EPC Network; ii) RFID technology and the EPC Network can improve the "shipping" and the "receiving" processes; iii) …
Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies
Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies
Faculty of Engineering and Information Sciences - Papers: Part A
The effect of sample orientation on the mechanical properties of commercially pure (CP) titanium plate with a transverse split basal texture was investigated at room temperature (RT) using plane strain compression (PSC). A large variation in flow stress of up to (EBSD) and calculating Schmid factors for all important slip and twinning modes. Importantly, the Schmid factors were calculated for all orientations in Euler space because there are significant variations over all orientations for the PSC stress state, unlike uniaxial compression or tension. The Schmid factor analysis and twin data for the wide variety of orientations tested enabled the conclusion …
A Polyhedral Model For Carbon Nanotubes, Barry Cox, James Hill
A Polyhedral Model For Carbon Nanotubes, Barry Cox, James Hill
Faculty of Engineering and Information Sciences - Papers: Part A
A new structural model accounts for the curvature inherent in their cylindrical shape.
Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams
Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams
Faculty of Engineering and Information Sciences - Papers: Part A
We show that important structural properties of C*-algebras and the muliplicity numbers of representations are preserved under Morita equivalence.
Parameter Estimation Method Using An Extended Kalman Filter, Emmanuel D. Blanchard, Adrian Sandu, Corina Sandu
Parameter Estimation Method Using An Extended Kalman Filter, Emmanuel D. Blanchard, Adrian Sandu, Corina Sandu
Faculty of Engineering and Information Sciences - Papers: Part A
Fast parameter estimation is a non-trivial task, and it is critical when the system parameters evolve with time, as demanded in real-time control applications. In this study, a new computational approach for parameter identification is proposed based on the application of polynomial chaos theory. The polynomial chaos approach has been shown to be considerably more efficient than Monte Carlo in the simulation of systems with a small number of uncertain parameters. In the framework of this new approach, a (suboptimal) Extended Kalman Filter (EKF) is used to recalculate the polynomial chaos expansions for the uncertain states and the uncertain parameters. …
Numerical Simulation Of Temperature Field And Thermal Stress Field Of Work Roll During Hot Strip Rolling, Chang-Sheng Li, Hai-Liang Yu, Guan-Yu Deng, Xiang-Hua Liu, Guo-Dong Wang
Numerical Simulation Of Temperature Field And Thermal Stress Field Of Work Roll During Hot Strip Rolling, Chang-Sheng Li, Hai-Liang Yu, Guan-Yu Deng, Xiang-Hua Liu, Guo-Dong Wang
Faculty of Engineering and Information Sciences - Papers: Part A
Based on the thermal conduction equations, the three-dimensional (3D) temperature field of a work roll was investigated using finite element method (FEM). The variations in the surface temperature of the work roll during hot strip rolling were described, and the thermal stress field of the work roll was also analyzed. The results showed that the highest roll surface temperature is 593 °C, and the difference between the minimum and maximum values of thermal stress of the work roll surface is 145. 7 MPa. Furthermore, the results of this analysis indicate that temperature and thermal stress are useful parameters for the …
Influence Of Dog-Bone Apex On Shape During Slab Horizontal Rolling Process, Hai-Liang Yu, Xiang-Hua Liu, Chang-Sheng Li, Guo-Dong Wang
Influence Of Dog-Bone Apex On Shape During Slab Horizontal Rolling Process, Hai-Liang Yu, Xiang-Hua Liu, Chang-Sheng Li, Guo-Dong Wang
Faculty of Engineering and Information Sciences - Papers: Part A
The deformation of slab with dog-bone shape during the horizontal rolling process was simulated using FEM, and the influences of apical dislocation of dog-bone on the slab spread as well as the minimum crop end loss and the lost width at slab head and tail were analyzed. The results show that with the increase in the apical dislocation of dog-bone (LA), the slab spread and the minimum crop end loss at slab head and tail decrease, while the lost width at slab head and tail increases. Meanwhile, the relationships of S/LA-LA, LH/LA-LA, WH/LA-LA, LT/LA-LA, and WT/LA-LA were obtained. © 2007 …
Impact Of Using Different Models In Practice - A Case Study With The Simplified Methods Of Iso 13790 Standard And Detailed Modelling Programs, Georgios Kokogiannakis, Jo Clarke, Paul Strachan
Impact Of Using Different Models In Practice - A Case Study With The Simplified Methods Of Iso 13790 Standard And Detailed Modelling Programs, Georgios Kokogiannakis, Jo Clarke, Paul Strachan
Faculty of Engineering and Information Sciences - Papers: Part A
The updated ISO 13790 Standard is part of the new set of CEN Standards that supports the European Energy Performance of Buildings Directive (EPBD) requirement for a general framework for calculation of the energy consumption of buildings. The Standard sets out procedures for space heating and cooling energy calculations, allowing the use of three different methods: a simplified monthly quasi-steady state method, a simple-hourly method and detailed simulation. This paper examines the implications of allowing different methods to be used for assessing the energy usage. The research method used was to undertake a comparison of the various methods applied to …
A Nonlinear 1-D Case Backward Heat Problem: Regularization And Error, Dang Duc Trong, Pham Hoang Quan, Tran Vu Khanh, Nguyen Huy Tuan
A Nonlinear 1-D Case Backward Heat Problem: Regularization And Error, Dang Duc Trong, Pham Hoang Quan, Tran Vu Khanh, Nguyen Huy Tuan
Faculty of Engineering and Information Sciences - Papers: Part A
No abstract provided.
Minimising Voltage Deviation In Distribution Feeders By Otpimising Size And Location Of Distributed Generation, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich
Minimising Voltage Deviation In Distribution Feeders By Otpimising Size And Location Of Distributed Generation, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich
Faculty of Engineering and Information Sciences - Papers: Part A
A new emerging trend of distribution networks is to use small generating units, known as distributed generation (DG), operating in parallel with the main grid. This kind of distribution networks has enabled DG to support power systems in fulfi lling their requirements to increase power output as well as quality of power supply. In order to maximise benefi ts from the DG system, proper DG planning is necessary. The main purpose of this research is to maximise voltage support through optimal sizing and location of DG. A new methodology is developed to determine an optimal DG size and DG location …
Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel
Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel
Faculty of Engineering and Information Sciences - Papers: Part A
Scenarios of future trends are widely used by government and international agencies to inform decision-making. While story line scenarios may be useful for business or government thinking, they are not effective at informing engineering research, innovation and design, and add very little to the understanding of sustainability. This paper presents a strategic analysis approach to complex systems, which relies on identification of risks to important activities and wellbeing. This method mimics the actual processes of anthropogenic continuity, where people explore, experiment, learn from success and mistakes, and adapt and evolve. The method is applied to the case study of transportation …
Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao
Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao
Faculty of Engineering and Information Sciences - Papers: Part A
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …
Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong
Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong
Faculty of Engineering and Information Sciences - Papers: Part A
A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can …
Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang
Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang
Faculty of Engineering and Information Sciences - Papers: Part A
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …
Five-Level Active Npc Converter Topology: She-Pwm Control And Operation Principles, Sridhar Reddy Pulikanti, Vassilios G. Agelidis
Five-Level Active Npc Converter Topology: She-Pwm Control And Operation Principles, Sridhar Reddy Pulikanti, Vassilios G. Agelidis
Faculty of Engineering and Information Sciences - Papers: Part A
The neutral-point-clamped (NPC) inverter topology has been the centre of research and development effort for numerous applications, including medium- and high-voltage electric motor drives, static compensators (STATCOMs) and other utility type of power electronic systems for almost three decades now. Pulse-width modulation (PWM) control methods have been developed for such topology for respective three-level and multilevel versions. The issue of voltage balancing between the DC bus capacitors is a drawback that requires attention and the problem becomes more serious as the number of levels increases. Selective harmonic elimination PWM can be applied to control the topology as a method to …
Rqf Publication Quality Measures: Methodological Issues, John W. Lamp, Simon K. Milton, Linda Dawson, Julie Fisher
Rqf Publication Quality Measures: Methodological Issues, John W. Lamp, Simon K. Milton, Linda Dawson, Julie Fisher
Faculty of Engineering and Information Sciences - Papers: Part A
The Research Quality Framework uses Thomson-ISI citation benchmarks as its main set of objective measures of research quality. The Thomson-ISI measures rely on identifying a core set of journals in which the major publications for a discipline are to be found. The core for a discipline is determined by applying a nontransparent process that is partly based on Bradford's Law (1934). Yet Bradford was not seeking measures about quality of publications or journals. How valid then is it to base measures of publication quality on Bradford's Law? We explore this by returning to Bradford's Law and subsequent related research asking …
Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson
Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson
Faculty of Engineering and Information Sciences - Papers: Part A
As growing numbers of citizens seek to use the Internet to do business, governments across the world have moved into the area of electronic service delivery. For the last decade significant advancements have been made in the area of e-Government. Today, e-Government is often assumed to be wellestablished. However, ongoing support is often missing, particularly at the local government level. The multi-level nature of government often means that citizens are frustrated when accessing services that span many levels of bureaucracy. This paper describes an empirical study which explores the factors influencing local egovernment maturity and identifies the barriers, enablers, priorities …
Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie
Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie
Faculty of Engineering and Information Sciences - Papers: Part A
We present a definition of spectral flow for any norm closed ideal J in any von Neumann algebra N. Given a path of selfadjoint operators in N which are invertible in N/J, the spectral flow produces a class in Ko(J).Given a semifinite spectral triple (A, H, D) relative to (N, t) with A separable, we construct a class [D] ? KK1(A, K(N)). For a unitary u ? A, the von Neumann spectral flow between D and u*Du is equal to the Kasparov product [u]A[D], and is simply related to the numerical spectral flow, and a refined C*-spectral flow.
Assessment Of Drucker-Prager Type Plasticity Models For Predicting The Behaviour Of Frp-Confined Concrete, T Yu, J G. Teng, Y L. Wong, S L. Dong
Assessment Of Drucker-Prager Type Plasticity Models For Predicting The Behaviour Of Frp-Confined Concrete, T Yu, J G. Teng, Y L. Wong, S L. Dong
Faculty of Engineering and Information Sciences - Papers: Part A
This paper presents a critical assessment of the ability of existing Drucker-Prager (D-P) type plasticity models to predict the behaviour of confined concrete using both experimental observations and a recent analytical model. This assessment shows that for a D-P plasticity model to succeed in predicting the behaviour of FRP-confined and other passively-confined concrete, it needs to possess the following three features: (a) a yield criterion which includes the third deviatoric stress invariant, (b) a hardening/softening rule which is dependent on the confining pressure; and (c) a flow rule which is dependent on both the confining pressure and the rate of …
The Dixmier Trace And Asymptotics Of Zeta Functions, Alan L. Carey, Adam C. Rennie, Aleksandr Sedaev, Fyodor A. Sukochev
The Dixmier Trace And Asymptotics Of Zeta Functions, Alan L. Carey, Adam C. Rennie, Aleksandr Sedaev, Fyodor A. Sukochev
Faculty of Engineering and Information Sciences - Papers: Part A
We obtain general theorems which enable the calculation of the Dixmier trace in terms of the asymptotics of the zeta function and of the trace of the heat semigroup. We prove our results in a general semi-finite von Neumann algebra. We find for p > 1 that the asymptotics of the zeta function determines an ideal strictly larger than Lp,∞ on which the Dixmier trace may be defined. We also establish stronger versions of other results on Dixmier traces and zeta functions.
Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang
Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang
Faculty of Engineering and Information Sciences - Papers: Part A
Multi-class image classification can benefit much from feature subset selection. This paper extends an error bound of binary SVMs to a feature subset selection criterion for the multi-class SVMs. By minimizing this criterion, the scale factors assigned to each feature in a kernel function are optimized to identify the important features. This minimization problem can be efficiently solved by gradient-based search techniques, even if hundreds of features are involved. Also, considering that image classification is often a small sample problem, the regularization issue is investigated for this criterion, showing its robustness in this situation. Experimental study on multiple benchmark image …
Discovering Prediction Model For Environmental Distribution Maps, Ke Zhang, Huidong Jin, Nianjun Liu, Rob Lesslie, Lei Wang, Zhouyu Fu, Terry Caelli
Discovering Prediction Model For Environmental Distribution Maps, Ke Zhang, Huidong Jin, Nianjun Liu, Rob Lesslie, Lei Wang, Zhouyu Fu, Terry Caelli
Faculty of Engineering and Information Sciences - Papers: Part A
Currently environmental distribution maps, such as for soil fertility, rainfall and foliage, are widely used in the natural resource management and policy making. One typical example is to predict the grazing capacity in particular geographical regions. This paper uses a discovering approach to choose a prediction model for real-world environmental data. The approach consists of two steps: (1) model selection which determines the type of prediction model, such as linear or non-linear; (2) model optimisation which aims at using less environmental data for prediction but without any loss on accuracy. The latter step is achieved by automatically selecting non-redundant features …