Browsing School of Engineering, Computer and Mathematical Sciences  Te Kura Mātai Pūhanga, Rorohiko, Pāngarau by Title
Now showing items 123142 of 1138

Assessment of thermal comfort near a glazed exterior wall
(University of Sydney, 2011)In many highly glazed buildings, the thermal comfort of the occupants will tend to be related to the incoming solar energy and the solar heat gain coefficient of the glazing. Many real buildings tend to be deep relative ... 
Asynchronous Early Output Dualbit Full Adders Based on Homogeneous and Heterogeneous Delayinsensitive Data Encoding
(World Scientific and Engineering Academy and Society, 2017)This paper presents the designs of asynchronous early output dualbit full adders without and with redundant logic (implicit) corresponding to homogeneous and heterogeneous delayinsensitive data encoding. For homogeneous ... 
Asynchronous Early Output Sectioncarry Lookahead Adder With Alias Carry Logic
(IEEE, 2017)A new asynchronous early output sectioncarry based carry lookahead adder (SCBCLA) with alias carry output logic is presented in this paper. To evaluate the proposed SCBCLA with alias carry logic and to make a comparison ... 
Attenuation of ocean waves due to random perturbations in the seabed profile
(KiwiOz Waves Conferences (KOZ Waves), The University of Newcastle, 2014)We employ linear wave theory to study long range attenuation of ocean waves caused by small, random perturbations in the seabed. The phenomenon in an example of localization in random media. A multiplescale method is used, ... 
The AUSTRAL VLBI Observing Program
(Springer Journals, 2016)The AUSTRAL observing program was started in 2011, performing geodetic and astrometric very long baseline interferometry (VLBI) sessions using the new Australian AuScope VLBI antennas at Hobart, Katherine, and Yarragadee, ... 
An Australasian Study of Reading and Comprehension Skills in Novice Programmers, Using the Bloom and SOLO Taxonomies
(Australian Computer Society, 2006)In this paper we report on a multiinstitutional investigation into the reading and comprehension skills of novice programmers. This work extends previous studies (Lister 2004, McCracken 2001) by developing a question set ... 
Autocode generation for fast embedded model predictive controllers
(IEEE, 2012)The implementation of model predictive controllers on lowcast hardware such as microcontrollers has been traditionally hampered by the high computing and associated memory demands of the algorithm. This paper describes ... 
Automated Biometric Recognition Using Dorsal Hand Images and Convolutional Neural Networks
(IOP Publishing, 2021)The identification of perpetrators, present in Child Sexual Abuse Imagery (CSAI), is a significant challenge due to the use of anonymisation techniques that mask their identities. Consequently, researchers have investigated ... 
Automated Crossidentifying Radio to Infrared Surveys Using the LRPY Algorithm: A Case Study
(Oxford University Press (OUP), 2017)Crossidentifying complex radio sources with optical or infra red (IR) counterparts in surveys such as the Australia Telescope Large Area Survey (ATLAS) has tradi tionally been performed manually. However, with new surveys ... 
An Automated Privacy Information Detection Approach for Protecting Individual Online Social Network Users
(The Japanese Society for Artificial Intelligence, 2019)Massive private messages are posted by online social network users unconsciously every day, some users may face undesirable consequences. Thus, many studies have been dedicated to privacy leakage analysis. Whereas, there ... 
Automatic variance control and variance estimation loops
(Springer Verlag (Germany) (for Birkhäuser Boston), 2001)A closedloop servo approach is applied to the problem of controlling and estimating variance in nonstationary signals. The new circuit closely resembles, but is not the same as, automatic gain control, which is common in ... 
Automotive 3microphone noise canceller in a frequently moving noise source environment
(World Academy of Science, Engineering and Technology (WASET), 2007)A combined threemicrophone voice activity detector (VAD) and noisecanceling system is studied to enhance speech recognition in an automobile environment. A previous experiment clearly shows the ability of the composite ... 
Avoiding the opportunist: the role of Simmelian Ties in fostering the trust in SensorCloud Networks
(Hindawi Publishing Corporation, 2015)The wireless sensorcloud networks (WSCNs) are becoming popular nowadays. The new concept of trust has emerged in recent studies as an alternative mechanism to address the security concern in WSCN. Most of the studies on ... 
Baire spaces and the Wijsman topology
(AUT University, 2007)In 1960s, when he studied Banach space geometry, R. Wijsman considered the weak topology on the collection of nonempty closed subsets of a metric space generated by the distance functionals viewed as functions of set ... 
Baire spaces and Vietoris hyperspaces
(The American Mathematical Society, 2007)We prove that if the Vietoris hyperspace CL(X) of all nonempty closed subsets of a space X is Baire, then all finite powers of X must be Baire spaces. In particular, there exists a metrizable Baire space whose Vietoris ... 
Baire spaces, Tychonoff powers and the Vietoris topology
(American Mathematical Society, 2007)In this paper, we show that if the Tychonoﬀ power Xω of a quasiregular space X is Baire, then its Vietoris hyperspace 2X is also Baire. We also provide two examples to show (i) the converse of this result does not hold in ... 
Bayesian fitting procedures for hydrological point processes.
(2014)Model fitting and selection typically requires the use of likelihoods. Applying standard methods to hydrological point processes, however, is problematic as their likelihoods are often analytically intractable and the data ... 
Bayesian threshold selection for extremal models using measures of surprise
(Cornell University Library, 2013)Statistical extreme value theory is concerned with the use of asymptotically motivated models to describe the extreme values of a process. A number of commonly used models are valid for observed data that exceed some high ... 
BeeAE: Effective Aspect Term Extraction With Artificial Bee Colony
Aspect terms are opinion targets for people to express and understand opinions in reviews. Aspect terms extraction is an essential subtask in aspectlevel sentiment analysis. To extract aspect terms from a sentence, existing ...