A computer-mediated framework to facilitate group consensus based on a shared understanding ConSULT
- Authors: Afshar, Faezeh
- Date: 2004
- Type: Text , Thesis , Masters , PhD
- Full Text: false
- Description: "Group decision-making usually involves a process of discussion and evaluation of alternatives. Important aspects of a group decision support system are: freedom to participate; the ability to explicitly present points of view; the ability to augment or oppose views by supporting evidence and reasoning; and the ability to use and consider other additional views .... The overall aim of this work is to develop an approach that can alleviate some of the problems associated with group commuication and consensus decision-making by effectively supporting group discussions towards consensus. Towards achieving this goal we have developed an approach called ConSULT (Consensus based on a Shared Understanding of a Leading Topic) as a computer-mediated framework to allow argumentation, collection and evaluation of discussion and group decision-making. This approach employs existing theories and techniques in computer-mediated communication, argumentation, Delphi and voting." -- Abstract.
- Description: Master of Information Technology
- Description: "Group decision-making usually involves a process of discussion and evaluation of alternatives. Important aspects of a group decision support system are: freedom to participate; the ability to explicitly present points of view; the ability to augment or oppose views by supporting evidence and reasoning; and the ability to use and consider other additional views .... The overall aim of this work is to develop an approach that can alleviate some of the problems associated with group commuication and consensus decision-making by effectively supporting group discussions towards consensus. Towards achieveing this goal we have developed an approach called ConSULT (Consensus based on a Shared Understanding of a Leading Topic) as a computer-mediated framework to allow argumentation, collection and evaluation of discussion and group decision-making. This approach employs existing theories and techniques in computer-mediated communication, argumentation, Delphi and voting." -- Abstract.
- Authors: Afshar, Faezeh
- Date: 2004
- Type: Text , Thesis , Masters , PhD
- Full Text: false
- Description: "Group decision-making usually involves a process of discussion and evaluation of alternatives. Important aspects of a group decision support system are: freedom to participate; the ability to explicitly present points of view; the ability to augment or oppose views by supporting evidence and reasoning; and the ability to use and consider other additional views .... The overall aim of this work is to develop an approach that can alleviate some of the problems associated with group commuication and consensus decision-making by effectively supporting group discussions towards consensus. Towards achieving this goal we have developed an approach called ConSULT (Consensus based on a Shared Understanding of a Leading Topic) as a computer-mediated framework to allow argumentation, collection and evaluation of discussion and group decision-making. This approach employs existing theories and techniques in computer-mediated communication, argumentation, Delphi and voting." -- Abstract.
- Description: Master of Information Technology
- Description: "Group decision-making usually involves a process of discussion and evaluation of alternatives. Important aspects of a group decision support system are: freedom to participate; the ability to explicitly present points of view; the ability to augment or oppose views by supporting evidence and reasoning; and the ability to use and consider other additional views .... The overall aim of this work is to develop an approach that can alleviate some of the problems associated with group commuication and consensus decision-making by effectively supporting group discussions towards consensus. Towards achieveing this goal we have developed an approach called ConSULT (Consensus based on a Shared Understanding of a Leading Topic) as a computer-mediated framework to allow argumentation, collection and evaluation of discussion and group decision-making. This approach employs existing theories and techniques in computer-mediated communication, argumentation, Delphi and voting." -- Abstract.
A computing perspective on scientific chinese trinity
- Authors: Sun, Zhaohao , Wang, Paul
- Date: 2013
- Type: Text , Journal article
- Relation: New Mathematics and Natural Computation Vol. 9, no. 2 (2013), p. 129-152
- Full Text:
- Reviewed:
- Description: The unprecedented and rapid development of the Chinese economy has been vividly displayed in front of the whole world to see. The attention has been particularly acute for the academic community and career politician alike. Ironically, this rapid economic miracle of China has been built on an unsound and often even questionable foundation of Chinese words, language and culture, of which we call them "Chinese trinity". This paper deals with the Chinese trinity from a computing science perspective. This paper argues the reform in scientific Chinese trinity with an emphasis of the word "scientific" ought to play a key role for further Chinese economic development and to launch a much improved contemporary Chinese society on a solid foundation. In addition, this paper proposes specifically ten computing paradigms and examines critically their potential impacts on scientific Chinese trinity. Finally, we feel the very focused approaches as proposed here might inspire as well as provide a much needed road map toward the goal of the scientific Chinese trinity. Judiciously chosen vigorous research projects appear to be indispensable. The unfortunate well known and long overdue reform has finally been rescued by the pressure of the information revolution coming of age. © 2013 World Scientific Publishing Company.
- Description: 2003011223
- Authors: Sun, Zhaohao , Wang, Paul
- Date: 2013
- Type: Text , Journal article
- Relation: New Mathematics and Natural Computation Vol. 9, no. 2 (2013), p. 129-152
- Full Text:
- Reviewed:
- Description: The unprecedented and rapid development of the Chinese economy has been vividly displayed in front of the whole world to see. The attention has been particularly acute for the academic community and career politician alike. Ironically, this rapid economic miracle of China has been built on an unsound and often even questionable foundation of Chinese words, language and culture, of which we call them "Chinese trinity". This paper deals with the Chinese trinity from a computing science perspective. This paper argues the reform in scientific Chinese trinity with an emphasis of the word "scientific" ought to play a key role for further Chinese economic development and to launch a much improved contemporary Chinese society on a solid foundation. In addition, this paper proposes specifically ten computing paradigms and examines critically their potential impacts on scientific Chinese trinity. Finally, we feel the very focused approaches as proposed here might inspire as well as provide a much needed road map toward the goal of the scientific Chinese trinity. Judiciously chosen vigorous research projects appear to be indispensable. The unfortunate well known and long overdue reform has finally been rescued by the pressure of the information revolution coming of age. © 2013 World Scientific Publishing Company.
- Description: 2003011223
A conceptual framework for a theory of liquidity
- Authors: Culham, James
- Date: 2018
- Type: Text , Thesis , Masters , PhD
- Full Text:
- Description: This study contributes to the understanding of liquidity in two ways. First, it considers the multifaceted nature of liquidity and its relationship with money. Second, it constructs a conceptual framework for a theory of liquidity. The first contribution is achieved by clarifying and categorising the various forms of liquidity to identify those overlooked by the existing literature. The second contribution consists of a realist critique of the literature on liquidity and money to highlight the strengths and weaknesses of each theoretical approach. The study reflects on the attempts to analyse liquidity using moneyless models of perfect barter with the assumption that every commodity exhibits perfect saleability; an assumption that removes any need for a medium of exchange and, moreover, crowds out all other forms of liquidity. It is concluded that, because liquidity is a social and monetary phenomenon, it cannot be analysed with models populated by a representative agent consuming a single commodity. Furthermore, this conclusion is not altered by the introduction of ‘financial frictions’, which are fundamentally at odds with the nature of money. Instead, the clarification of the nature of liquidity forms the basis for an interpretation of Keynes’s theory of liquidity preference that emphasises its reliance on liquidity in general, not money in particular. The study introduces the terms redemption liquidity and exchange liquidity to explain the trade-off that underpins the theory of liquidity preference. Properly interpreted, the theory of liquidity preference can then address many of the deficiencies prevalent in the dominant theories of the rate of interest. The study therefore has implications for monetary policy and asset pricing.
- Description: Doctor of Philosophy
- Authors: Culham, James
- Date: 2018
- Type: Text , Thesis , Masters , PhD
- Full Text:
- Description: This study contributes to the understanding of liquidity in two ways. First, it considers the multifaceted nature of liquidity and its relationship with money. Second, it constructs a conceptual framework for a theory of liquidity. The first contribution is achieved by clarifying and categorising the various forms of liquidity to identify those overlooked by the existing literature. The second contribution consists of a realist critique of the literature on liquidity and money to highlight the strengths and weaknesses of each theoretical approach. The study reflects on the attempts to analyse liquidity using moneyless models of perfect barter with the assumption that every commodity exhibits perfect saleability; an assumption that removes any need for a medium of exchange and, moreover, crowds out all other forms of liquidity. It is concluded that, because liquidity is a social and monetary phenomenon, it cannot be analysed with models populated by a representative agent consuming a single commodity. Furthermore, this conclusion is not altered by the introduction of ‘financial frictions’, which are fundamentally at odds with the nature of money. Instead, the clarification of the nature of liquidity forms the basis for an interpretation of Keynes’s theory of liquidity preference that emphasises its reliance on liquidity in general, not money in particular. The study introduces the terms redemption liquidity and exchange liquidity to explain the trade-off that underpins the theory of liquidity preference. Properly interpreted, the theory of liquidity preference can then address many of the deficiencies prevalent in the dominant theories of the rate of interest. The study therefore has implications for monetary policy and asset pricing.
- Description: Doctor of Philosophy
A conceptual framework for externally-influenced agents: an assisted reinforcement learning review
- Bignold, Adam, Cruz, Francisco, Taylor, Matthew, Brys, Tim, Dazeley, Richard, Vamplew, Peter, Foale, Cameron
- Authors: Bignold, Adam , Cruz, Francisco , Taylor, Matthew , Brys, Tim , Dazeley, Richard , Vamplew, Peter , Foale, Cameron
- Date: 2023
- Type: Text , Journal article
- Relation: Journal of Ambient Intelligence and Humanized Computing Vol. 14, no. 4 (2023), p. 3621-3644
- Full Text:
- Reviewed:
- Description: A long-term goal of reinforcement learning agents is to be able to perform tasks in complex real-world scenarios. The use of external information is one way of scaling agents to more complex problems. However, there is a general lack of collaboration or interoperability between different approaches using external information. In this work, while reviewing externally-influenced methods, we propose a conceptual framework and taxonomy for assisted reinforcement learning, aimed at fostering collaboration by classifying and comparing various methods that use external information in the learning process. The proposed taxonomy details the relationship between the external information source and the learner agent, highlighting the process of information decomposition, structure, retention, and how it can be used to influence agent learning. As well as reviewing state-of-the-art methods, we identify current streams of reinforcement learning that use external information in order to improve the agent’s performance and its decision-making process. These include heuristic reinforcement learning, interactive reinforcement learning, learning from demonstration, transfer learning, and learning from multiple sources, among others. These streams of reinforcement learning operate with the shared objective of scaffolding the learner agent. Lastly, we discuss further possibilities for future work in the field of assisted reinforcement learning systems. © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
- Authors: Bignold, Adam , Cruz, Francisco , Taylor, Matthew , Brys, Tim , Dazeley, Richard , Vamplew, Peter , Foale, Cameron
- Date: 2023
- Type: Text , Journal article
- Relation: Journal of Ambient Intelligence and Humanized Computing Vol. 14, no. 4 (2023), p. 3621-3644
- Full Text:
- Reviewed:
- Description: A long-term goal of reinforcement learning agents is to be able to perform tasks in complex real-world scenarios. The use of external information is one way of scaling agents to more complex problems. However, there is a general lack of collaboration or interoperability between different approaches using external information. In this work, while reviewing externally-influenced methods, we propose a conceptual framework and taxonomy for assisted reinforcement learning, aimed at fostering collaboration by classifying and comparing various methods that use external information in the learning process. The proposed taxonomy details the relationship between the external information source and the learner agent, highlighting the process of information decomposition, structure, retention, and how it can be used to influence agent learning. As well as reviewing state-of-the-art methods, we identify current streams of reinforcement learning that use external information in order to improve the agent’s performance and its decision-making process. These include heuristic reinforcement learning, interactive reinforcement learning, learning from demonstration, transfer learning, and learning from multiple sources, among others. These streams of reinforcement learning operate with the shared objective of scaffolding the learner agent. Lastly, we discuss further possibilities for future work in the field of assisted reinforcement learning systems. © 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
A conceptual model of physical performance in Australian Football
- Authors: Mooney, Mitchell
- Date: 2013
- Type: Text , Thesis , PhD
- Full Text:
- Description: Objective: The objective of this project was to identify the relative influence of valid physical parameters to elite Australian Football performance. Methods: Data was collected on match performance variables (i.e. coaches’ votes, number of ball disposals, champion data rank), match exercise intensity measures (m∙min-1, m∙min-1 above and below 15 km∙h-1 and Load™∙min-1) and physical capacities (yo-yo intermittent recovery test level 2, maximum oxygen uptake, running economy, relative aerobic intensity, maximal aerobic speed and maximal accumulated oxygen deficit) on elite and recreational Australian footballers. These variables were modelled to determine the logical sequence and relative importance towards match performance. Results: The results indicate a sequential physical path to Australian Football performance. The yo-yo intermittent recovery test (level 2) performance influenced match exercise intensity (m∙min-1 >15 km∙h-1& Load™∙min-1) which in turn, affected Australian Football performance (number of ball disposals and coaches’ votes). This sequence was altered by experience, playing position and neuromuscular fatigue. The number of interchange rotations also influenced match exercise intensity throughout the match. Furthermore, the yo-yo intermittent recovery test (level 2) was found to be determined by a complex interaction of physical capacities. However, yo-yo intermittent recovery (level 2) performance was most influenced by maximum oxygen uptake, relative aerobic intensity and maximum aerobic speed. Conclusion: This dissertation showed Australian Football performance is a complex and dynamic system influenced by many variables interacting with each other in a sequential path. Sports scientists and coaches may utilise this information as a framework to evaluate Australian Football performance matches.
- Description: Doctor of Philosophy
- Authors: Mooney, Mitchell
- Date: 2013
- Type: Text , Thesis , PhD
- Full Text:
- Description: Objective: The objective of this project was to identify the relative influence of valid physical parameters to elite Australian Football performance. Methods: Data was collected on match performance variables (i.e. coaches’ votes, number of ball disposals, champion data rank), match exercise intensity measures (m∙min-1, m∙min-1 above and below 15 km∙h-1 and Load™∙min-1) and physical capacities (yo-yo intermittent recovery test level 2, maximum oxygen uptake, running economy, relative aerobic intensity, maximal aerobic speed and maximal accumulated oxygen deficit) on elite and recreational Australian footballers. These variables were modelled to determine the logical sequence and relative importance towards match performance. Results: The results indicate a sequential physical path to Australian Football performance. The yo-yo intermittent recovery test (level 2) performance influenced match exercise intensity (m∙min-1 >15 km∙h-1& Load™∙min-1) which in turn, affected Australian Football performance (number of ball disposals and coaches’ votes). This sequence was altered by experience, playing position and neuromuscular fatigue. The number of interchange rotations also influenced match exercise intensity throughout the match. Furthermore, the yo-yo intermittent recovery test (level 2) was found to be determined by a complex interaction of physical capacities. However, yo-yo intermittent recovery (level 2) performance was most influenced by maximum oxygen uptake, relative aerobic intensity and maximum aerobic speed. Conclusion: This dissertation showed Australian Football performance is a complex and dynamic system influenced by many variables interacting with each other in a sequential path. Sports scientists and coaches may utilise this information as a framework to evaluate Australian Football performance matches.
- Description: Doctor of Philosophy
A conceptual re-alignment of methodology underpinning tax effect accounting : An Australian exploration of the contemporary normalising effect
- Authors: Morton, Elizabeth
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: This research examines the presence and effectiveness of the ‘normalising effect’, traditionally offered as the main justification for tax effect accounting’s (TEA) adoption. TEA can be seen as a technical facet of accounting practice, ‘normalising’ the timing differences between the accounting and taxation systems. That is, income tax is recognised according to when transactions are recognised for accounting purposes in order to ‘normalise’ reported profits, thereby reflecting an income statement focus. It has been contended that this will improve the usefulness of financial reports by ‘correcting’ misleading and ‘unreal’ fluctuations in income tax. Australia’s adoption of AIFRS in 2005 entailed a major conceptual re-alignment of the methodology underpinning TEA, moving away from the income statement focus in favour of a balance sheet focus. This implied a different normalisation emphasis. It is within this contemporary setting, based on a study of 90 companies over the two regulatory periods between 2002 and 2011 (AGAAP and AIFRS), that a quantitative measure of the presence and effectiveness of the normalising effect was undertaken, additionally considering the subsequent balance sheet impact. Effective normalisation was revealed during the AGAAP period, whilst only effective after the removal of loss makers during the AIFRS period. These findings suggest that the relaxation of recognition criteria under AIFRS may have had a meaningful impact on the effectiveness of the new standard. However, when normalisation was given a more narrow definition in light of prima facie tax, deferred taxes had a more substantial impact, particularly during the AIFRS period. Such findings are consistent with the notion thatTEA enables reported tax to be ‘as if’ it were a function of accounting, without a substantial build up on the balance sheet as a consequence. These findings have implications for evaluating the efficacy of TEA and comprehending the nature of contemporary financial statements.
- Description: Doctor of Philosophy
- Authors: Morton, Elizabeth
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: This research examines the presence and effectiveness of the ‘normalising effect’, traditionally offered as the main justification for tax effect accounting’s (TEA) adoption. TEA can be seen as a technical facet of accounting practice, ‘normalising’ the timing differences between the accounting and taxation systems. That is, income tax is recognised according to when transactions are recognised for accounting purposes in order to ‘normalise’ reported profits, thereby reflecting an income statement focus. It has been contended that this will improve the usefulness of financial reports by ‘correcting’ misleading and ‘unreal’ fluctuations in income tax. Australia’s adoption of AIFRS in 2005 entailed a major conceptual re-alignment of the methodology underpinning TEA, moving away from the income statement focus in favour of a balance sheet focus. This implied a different normalisation emphasis. It is within this contemporary setting, based on a study of 90 companies over the two regulatory periods between 2002 and 2011 (AGAAP and AIFRS), that a quantitative measure of the presence and effectiveness of the normalising effect was undertaken, additionally considering the subsequent balance sheet impact. Effective normalisation was revealed during the AGAAP period, whilst only effective after the removal of loss makers during the AIFRS period. These findings suggest that the relaxation of recognition criteria under AIFRS may have had a meaningful impact on the effectiveness of the new standard. However, when normalisation was given a more narrow definition in light of prima facie tax, deferred taxes had a more substantial impact, particularly during the AIFRS period. Such findings are consistent with the notion thatTEA enables reported tax to be ‘as if’ it were a function of accounting, without a substantial build up on the balance sheet as a consequence. These findings have implications for evaluating the efficacy of TEA and comprehending the nature of contemporary financial statements.
- Description: Doctor of Philosophy
A configural model of expert judgement as a preliminary epidemiological study of injury problems: An application to drowning
- Morgan, Damian, Ozanne-Smith, Joan
- Authors: Morgan, Damian , Ozanne-Smith, Joan
- Date: 2019
- Type: Text , Journal article
- Relation: PLoS ONE Vol. 14, no. 10 (2019), p.
- Full Text:
- Reviewed:
- Description: Robust epidemiological studies identifying determinants of negative health outcomes require significant research effort. Expert judgement is proposed as an efficient alternative or preliminary research design for risk factor identification associated with unintentional injury. This proposition was tested in a multi-factorial balanced experimental design using specialist judges (N = 18), lifeguards and surfers, to assess the risk contribution to drowning for swimming ability, surf bathing experience, and wave height. All factors provided unique contributions to drowning risk (p < .001). An interaction (p = .02) indicated that occasional surf bathers face a proportionally increased risk of drowning at increased wave heights relative to experienced surf bathers. Although findings were limited by strict criteria, and no gold standard comparison data were available, the study provides new evidence on causal risk factors for a drowning scenario. Countermeasures based on these factors are proposed. Further application of the method may assist in developing new interventions to reduce unintentional injury. © 2019 Morgan, Ozanne-Smith. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- Authors: Morgan, Damian , Ozanne-Smith, Joan
- Date: 2019
- Type: Text , Journal article
- Relation: PLoS ONE Vol. 14, no. 10 (2019), p.
- Full Text:
- Reviewed:
- Description: Robust epidemiological studies identifying determinants of negative health outcomes require significant research effort. Expert judgement is proposed as an efficient alternative or preliminary research design for risk factor identification associated with unintentional injury. This proposition was tested in a multi-factorial balanced experimental design using specialist judges (N = 18), lifeguards and surfers, to assess the risk contribution to drowning for swimming ability, surf bathing experience, and wave height. All factors provided unique contributions to drowning risk (p < .001). An interaction (p = .02) indicated that occasional surf bathers face a proportionally increased risk of drowning at increased wave heights relative to experienced surf bathers. Although findings were limited by strict criteria, and no gold standard comparison data were available, the study provides new evidence on causal risk factors for a drowning scenario. Countermeasures based on these factors are proposed. Further application of the method may assist in developing new interventions to reduce unintentional injury. © 2019 Morgan, Ozanne-Smith. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
A confusion of tongues : Overcoming language difficulties on the Jim Crow Goldfield
- Authors: Gervasoni, Clare
- Date: 2007
- Type: Book chapter
- Relation: Deeper Leads: New appoaches to Victorian Goldfields Chapter Chapter 6 p. 111-130
- Full Text:
- Reviewed:
- Description: Since the early 1970s Australia has been described as a multicultural society. Australian Government policy, portfolios and promotion of cohesive and co-operative communities aim to encourage understanding of cultural backgrounds of all who comprise it. Considering the importance of language to everyday life, very tittle research has been undertaken on the role of language on the Victorian goldfields. This chapter deals with the impact of language on non-English speakers, specifically Italian speakers from the Jim Crow goldfield. It can be assumed that other non-English speakers on other goldfields throughout Victoria experienced similar difficulties to those at Jim Crow.
- Authors: Gervasoni, Clare
- Date: 2007
- Type: Book chapter
- Relation: Deeper Leads: New appoaches to Victorian Goldfields Chapter Chapter 6 p. 111-130
- Full Text:
- Reviewed:
- Description: Since the early 1970s Australia has been described as a multicultural society. Australian Government policy, portfolios and promotion of cohesive and co-operative communities aim to encourage understanding of cultural backgrounds of all who comprise it. Considering the importance of language to everyday life, very tittle research has been undertaken on the role of language on the Victorian goldfields. This chapter deals with the impact of language on non-English speakers, specifically Italian speakers from the Jim Crow goldfield. It can be assumed that other non-English speakers on other goldfields throughout Victoria experienced similar difficulties to those at Jim Crow.
A constraint-based evolutionary learning approach to the expectation maximization for optimal estimation of the hidden Markov model for speech signal modeling
- Huda, Shamsul, Yearwood, John, Togneri, Roberto
- Authors: Huda, Shamsul , Yearwood, John , Togneri, Roberto
- Date: 2009
- Type: Text , Journal article
- Relation: IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics Vol. 39, no. 1 (2009), p. 182-197
- Full Text:
- Reviewed:
- Description: This paper attempts to overcome the tendency of the expectation-maximization (EM) algorithm to locate a local rather than global maximum when applied to estimate the hidden Markov model (HMM) parameters in speech signal modeling. We propose a hybrid algorithm for estimation of the HMM in automatic speech recognition (ASR) using a constraint-based evolutionary algorithm (EA) and EM, the CEL-EM. The novelty of our hybrid algorithm (CEL-EM) is that it is applicable for estimation of the constraint-based models with many constraints and large numbers of parameters (which use EM) like HMM. Two constraint-based versions of the CEL-EM with different fusion strategies have been proposed using a constraint-based EA and the EM for better estimation of HMM in ASR. The first one uses a traditional constraint-handling mechanism of EA. The other version transforms a constrained optimization problem into an unconstrained problem using Lagrange multipliers. Fusion strategies for the CEL-EM use a staged-fusion approach where EM has been plugged with the EA periodically after the execution of EA for a specific period of time to maintain the global sampling capabilities of EA in the hybrid algorithm. A variable initialization approach (VIA) has been proposed using a variable segmentation to provide a better initialization for EA in the CEL-EM. Experimental results on the TIMIT speech corpus show that CEL-EM obtains higher recognition accuracies than the traditional EM algorithm as well as a top-standard EM (VIA-EM, constructed by applying the VIA to EM). © 2008 IEEE.
- Authors: Huda, Shamsul , Yearwood, John , Togneri, Roberto
- Date: 2009
- Type: Text , Journal article
- Relation: IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics Vol. 39, no. 1 (2009), p. 182-197
- Full Text:
- Reviewed:
- Description: This paper attempts to overcome the tendency of the expectation-maximization (EM) algorithm to locate a local rather than global maximum when applied to estimate the hidden Markov model (HMM) parameters in speech signal modeling. We propose a hybrid algorithm for estimation of the HMM in automatic speech recognition (ASR) using a constraint-based evolutionary algorithm (EA) and EM, the CEL-EM. The novelty of our hybrid algorithm (CEL-EM) is that it is applicable for estimation of the constraint-based models with many constraints and large numbers of parameters (which use EM) like HMM. Two constraint-based versions of the CEL-EM with different fusion strategies have been proposed using a constraint-based EA and the EM for better estimation of HMM in ASR. The first one uses a traditional constraint-handling mechanism of EA. The other version transforms a constrained optimization problem into an unconstrained problem using Lagrange multipliers. Fusion strategies for the CEL-EM use a staged-fusion approach where EM has been plugged with the EA periodically after the execution of EA for a specific period of time to maintain the global sampling capabilities of EA in the hybrid algorithm. A variable initialization approach (VIA) has been proposed using a variable segmentation to provide a better initialization for EA in the CEL-EM. Experimental results on the TIMIT speech corpus show that CEL-EM obtains higher recognition accuracies than the traditional EM algorithm as well as a top-standard EM (VIA-EM, constructed by applying the VIA to EM). © 2008 IEEE.
A Constructivist approach to challenging men's violence against women
- Authors: Laming, Christopher
- Date: 2006
- Type: Text , Journal article
- Relation: Practice Reflexions Vol. 1, no. 1 (2006 2006), p. 53-63
- Full Text:
- Reviewed:
- Description: Men’s abuse and violence in intimate partner relationships is a worldwide problem of which there is a growing awareness. This paper will look at a model of practice developed in rural Victoria that seeks to enable men to take responsibility for their abusive behaviour and to commit to a process of behaviour change. The SHED (Self-Help Ending Domestics) Project uses a constructivist approach to challenging men's violence against women and children and it encompasses assessment, groupwork, and an integrated, collaborative model of intervention between agencies.
- Authors: Laming, Christopher
- Date: 2006
- Type: Text , Journal article
- Relation: Practice Reflexions Vol. 1, no. 1 (2006 2006), p. 53-63
- Full Text:
- Reviewed:
- Description: Men’s abuse and violence in intimate partner relationships is a worldwide problem of which there is a growing awareness. This paper will look at a model of practice developed in rural Victoria that seeks to enable men to take responsibility for their abusive behaviour and to commit to a process of behaviour change. The SHED (Self-Help Ending Domestics) Project uses a constructivist approach to challenging men's violence against women and children and it encompasses assessment, groupwork, and an integrated, collaborative model of intervention between agencies.
A continuous flow elevator to lift ore vertically for deep mine haulage using a cable disc elevator
- Authors: Webb, Colin
- Date: 2020
- Type: Text , Thesis , PhD
- Full Text:
- Description: Vertical continuous ore haulage with elevators in mining for deep haulage is virtually non-existent. In this, research investigations concentrated on a cable disc elevator. The problem of using a cable disc elevator is the friction between the elevator fixed tube and the moving ore on the disc. This research establishes the friction forces existing as the elevator cable and discs are elevated up a stationary tube. Then the focus is to find a way to eliminate that friction. The method involved developing three test rigs: Test Rig 1 measures static friction with the ore placed on a disc in a tube mounted on load cells to measure the resistance with the ore on the disc lifted by a counterweight. This is relevant for an elevator that has stopped under load. Test Rig 2 measures the dynamic friction in an operational 5-inch elevator with the tube on the lifting side held stationary by load cells when the cable discs are lifting the ore. Test Rig 3 eliminates friction in the lifting tube by using a pipe conveyor that travels vertically at the same speed as the cable disc elevator to contain the ore on the cable disc elevator. The cable disc elevator does all the ore lifting. The research generated results for static and dynamic friction for gravel, granite and coal. Cable tension required for ore lift of 1000 metres and the maximum hoisting distance for some existing cables are calculated. Implications of this research are that the cable disc elevator has the potential to haul from depths greater than existing elevators, has a small footprint in a mine, and with some further development could eliminate the need for truck haulage in open cut and underground mining from the mine.
- Description: Doctor of Philosophy
- Authors: Webb, Colin
- Date: 2020
- Type: Text , Thesis , PhD
- Full Text:
- Description: Vertical continuous ore haulage with elevators in mining for deep haulage is virtually non-existent. In this, research investigations concentrated on a cable disc elevator. The problem of using a cable disc elevator is the friction between the elevator fixed tube and the moving ore on the disc. This research establishes the friction forces existing as the elevator cable and discs are elevated up a stationary tube. Then the focus is to find a way to eliminate that friction. The method involved developing three test rigs: Test Rig 1 measures static friction with the ore placed on a disc in a tube mounted on load cells to measure the resistance with the ore on the disc lifted by a counterweight. This is relevant for an elevator that has stopped under load. Test Rig 2 measures the dynamic friction in an operational 5-inch elevator with the tube on the lifting side held stationary by load cells when the cable discs are lifting the ore. Test Rig 3 eliminates friction in the lifting tube by using a pipe conveyor that travels vertically at the same speed as the cable disc elevator to contain the ore on the cable disc elevator. The cable disc elevator does all the ore lifting. The research generated results for static and dynamic friction for gravel, granite and coal. Cable tension required for ore lift of 1000 metres and the maximum hoisting distance for some existing cables are calculated. Implications of this research are that the cable disc elevator has the potential to haul from depths greater than existing elevators, has a small footprint in a mine, and with some further development could eliminate the need for truck haulage in open cut and underground mining from the mine.
- Description: Doctor of Philosophy
A cost analysis of accidents and injuries in the open cut coalmining industry
- Authors: Esson, Ken
- Date: 1992
- Type: Text , Thesis , Masters
- Full Text: false
- Description: Following a study of back injuries in the Queensland Coal Industry, there arose several questions that needed further research. One of these was the cost of accident and injuries, and the impact of this cost would have on an organisation. The project's research involved a comprehensive study of literature pertaining to the cost of accidents and injuries. This included both insured and uninsured costs. The following four classifications of accidents were researched; first aid treatments; first aid doctor treatments; lost time injury cases; and equipment accident damage cases. A coal mine was selected for the pilot study and, data was collected on the four classifications over a complete year. This means a year that has no out standing accident cases or liablilities. The research was then considered to determine its support for the acceptance or rejection of the hypothesis whic postulates that the current methods used to analyse the cost of accidents or injuries in the coal mining industry are inadequate. As a result of the above condsiderations, a number of key points are put forward in support of the acceptance of the hypothesis. The research established costs both insured and uninsured for the four classifications under review. Then a calculation of a weighted ratio of uninsured costs was made. The paper concludes by making certain recommendations and supporting the need for further research into accident costing within the coal mining fraternity.
- Description: Masters in Applied Science in Occupational Health and Safety
- Authors: Esson, Ken
- Date: 1992
- Type: Text , Thesis , Masters
- Full Text: false
- Description: Following a study of back injuries in the Queensland Coal Industry, there arose several questions that needed further research. One of these was the cost of accident and injuries, and the impact of this cost would have on an organisation. The project's research involved a comprehensive study of literature pertaining to the cost of accidents and injuries. This included both insured and uninsured costs. The following four classifications of accidents were researched; first aid treatments; first aid doctor treatments; lost time injury cases; and equipment accident damage cases. A coal mine was selected for the pilot study and, data was collected on the four classifications over a complete year. This means a year that has no out standing accident cases or liablilities. The research was then considered to determine its support for the acceptance or rejection of the hypothesis whic postulates that the current methods used to analyse the cost of accidents or injuries in the coal mining industry are inadequate. As a result of the above condsiderations, a number of key points are put forward in support of the acceptance of the hypothesis. The research established costs both insured and uninsured for the four classifications under review. Then a calculation of a weighted ratio of uninsured costs was made. The paper concludes by making certain recommendations and supporting the need for further research into accident costing within the coal mining fraternity.
- Description: Masters in Applied Science in Occupational Health and Safety
A count data model for heart rate variability forecasting and premature ventricular contraction detection
- Allami, Ragheed, Stranieri, Andrew, Balasubramanian, Venki, Jelinek, Herbert
- Authors: Allami, Ragheed , Stranieri, Andrew , Balasubramanian, Venki , Jelinek, Herbert
- Date: 2017
- Type: Text , Journal article
- Relation: Signal Image and Video Processing Vol. 11, no. 8 (2017), p. 1427-1435
- Full Text:
- Reviewed:
- Description: Heart rate variability (HRV) measures including the standard deviation of inter-beat variations (SDNN) require at least 5 min of ECG recordings to accurately measure HRV. In this paper, we predict, using counts data derived from a 3-min ECG recording, the 5-min SDNN and also detect premature ventricular contraction (PVC) beats with a high degree of accuracy. The approach uses counts data combined with a Poisson-generated function that requires minimal computational resources and is well suited to remote patient monitoring with wearable sensors that have limited power, storage and processing capacity. The ease of use and accuracy of the algorithm provide opportunity for accurate assessment of HRV and reduce the time taken to review patients in real time. The PVC beat detection is implemented using the same count data model together with knowledge-based rules derived from clinical knowledge.
- Authors: Allami, Ragheed , Stranieri, Andrew , Balasubramanian, Venki , Jelinek, Herbert
- Date: 2017
- Type: Text , Journal article
- Relation: Signal Image and Video Processing Vol. 11, no. 8 (2017), p. 1427-1435
- Full Text:
- Reviewed:
- Description: Heart rate variability (HRV) measures including the standard deviation of inter-beat variations (SDNN) require at least 5 min of ECG recordings to accurately measure HRV. In this paper, we predict, using counts data derived from a 3-min ECG recording, the 5-min SDNN and also detect premature ventricular contraction (PVC) beats with a high degree of accuracy. The approach uses counts data combined with a Poisson-generated function that requires minimal computational resources and is well suited to remote patient monitoring with wearable sensors that have limited power, storage and processing capacity. The ease of use and accuracy of the algorithm provide opportunity for accurate assessment of HRV and reduce the time taken to review patients in real time. The PVC beat detection is implemented using the same count data model together with knowledge-based rules derived from clinical knowledge.
A counterexample to De Pierro's conjecture on the convergence of under-relaxed cyclic projections
- Cominetti, Roberto, Roshchina, Vera, Williamson, Andrew
- Authors: Cominetti, Roberto , Roshchina, Vera , Williamson, Andrew
- Date: 2019
- Type: Text , Journal article
- Relation: Optimization Vol. 68, no. 1 (2019), p. 3-12
- Full Text:
- Reviewed:
- Description: The convex feasibility problem consists in finding a point in the intersection of a finite family of closed convex sets. When the intersection is empty, a best compromise is to search for a point that minimizes the sum of the squared distances to the sets. In 2001, de Pierro conjectured that the limit cycles generated by the ε-under-relaxed cyclic projection method converge when ε ↓ 0 towards a least squares solution. While the conjecture has been confirmed under fairly general conditions, we show that it is false in general by constructing a system of three compact convex sets in R3 for which the ε-under-relaxed cycles do not converge. © 2018 Informa UK Limited, trading as Taylor & Francis Group.
- Authors: Cominetti, Roberto , Roshchina, Vera , Williamson, Andrew
- Date: 2019
- Type: Text , Journal article
- Relation: Optimization Vol. 68, no. 1 (2019), p. 3-12
- Full Text:
- Reviewed:
- Description: The convex feasibility problem consists in finding a point in the intersection of a finite family of closed convex sets. When the intersection is empty, a best compromise is to search for a point that minimizes the sum of the squared distances to the sets. In 2001, de Pierro conjectured that the limit cycles generated by the ε-under-relaxed cyclic projection method converge when ε ↓ 0 towards a least squares solution. While the conjecture has been confirmed under fairly general conditions, we show that it is false in general by constructing a system of three compact convex sets in R3 for which the ε-under-relaxed cycles do not converge. © 2018 Informa UK Limited, trading as Taylor & Francis Group.
A creative approach for undergraduate nursing students to learn anatomy and physiology : a qualitative exploratory study
- Barbagallo, Michael, Porter, Joanne, Abdelkader, Amany, James, Ainsley
- Authors: Barbagallo, Michael , Porter, Joanne , Abdelkader, Amany , James, Ainsley
- Date: 2022
- Type: Text , Journal article
- Relation: International Journal of Nursing Education Scholarship Vol. 19, no. 1 (2022), p.
- Full Text:
- Reviewed:
- Description: Anatomy and Physiology (A&P) courses in undergraduate nursing programs are often considered challenging for students. Typically, a wide variety of teaching strategies, including dissection, experiments, illustrations and photographs are used to engage students. This study aimed to explore and describe the learning experiences of an open creative assessment task on undergraduate nursing students of learning A&P. A total of eight students participated in semi-structured interviews. Two major themes emerged from the data, this included 'Bringing A&P to life' which included two sub-themes of 'Learning through peer teaching' and 'An easy way to learn', with the second major theme, 'Custom made learning' which included four sub-themes, 'To grade or not to grade', 'Catering for different learning styles', 'Logistics of group work', and 'Effect of group dynamics'. This qualitative exploratory study contributes to further pedagogical insights into art and/or creative approaches to teaching. © 2022 Walter de Gruyter GmbH, Berlin/Boston.
- Authors: Barbagallo, Michael , Porter, Joanne , Abdelkader, Amany , James, Ainsley
- Date: 2022
- Type: Text , Journal article
- Relation: International Journal of Nursing Education Scholarship Vol. 19, no. 1 (2022), p.
- Full Text:
- Reviewed:
- Description: Anatomy and Physiology (A&P) courses in undergraduate nursing programs are often considered challenging for students. Typically, a wide variety of teaching strategies, including dissection, experiments, illustrations and photographs are used to engage students. This study aimed to explore and describe the learning experiences of an open creative assessment task on undergraduate nursing students of learning A&P. A total of eight students participated in semi-structured interviews. Two major themes emerged from the data, this included 'Bringing A&P to life' which included two sub-themes of 'Learning through peer teaching' and 'An easy way to learn', with the second major theme, 'Custom made learning' which included four sub-themes, 'To grade or not to grade', 'Catering for different learning styles', 'Logistics of group work', and 'Effect of group dynamics'. This qualitative exploratory study contributes to further pedagogical insights into art and/or creative approaches to teaching. © 2022 Walter de Gruyter GmbH, Berlin/Boston.
A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems
- Al-Muhtadi, Jalal, Qiang, Ma, Zeb, Khan, Chaudhry, Junaid, Imran, Muhammad
- Authors: Al-Muhtadi, Jalal , Qiang, Ma , Zeb, Khan , Chaudhry, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 16363-16376
- Full Text:
- Reviewed:
- Description: Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
- Authors: Al-Muhtadi, Jalal , Qiang, Ma , Zeb, Khan , Chaudhry, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 16363-16376
- Full Text:
- Reviewed:
- Description: Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
A critical ethnographic study of older people participating in their health care in acute hospital environments
- Authors: Penney, Wendy
- Date: 2005
- Type: Text , Thesis , PhD
- Full Text:
- Description: "While consumer participation is the focus of 21st century health policy, little is known about this concept from the perspectives of people who require acute hospital services. [...]This project set out to explore older people's perspective of participating in their care. Adopting critical ethnographic method, field work included observation of the inpatient experience. Following discharge home people were interviewed about their experiences including what helped and what hindered participation in their care. Similarly nurses involved in [...] a hospital experience were invited to be involved in individual and focus group discussions aimed at defining how they believed they facilitated people to participate as well as barriers that prevent this style of care."
- Description: Doctor of Philosophy
- Authors: Penney, Wendy
- Date: 2005
- Type: Text , Thesis , PhD
- Full Text:
- Description: "While consumer participation is the focus of 21st century health policy, little is known about this concept from the perspectives of people who require acute hospital services. [...]This project set out to explore older people's perspective of participating in their care. Adopting critical ethnographic method, field work included observation of the inpatient experience. Following discharge home people were interviewed about their experiences including what helped and what hindered participation in their care. Similarly nurses involved in [...] a hospital experience were invited to be involved in individual and focus group discussions aimed at defining how they believed they facilitated people to participate as well as barriers that prevent this style of care."
- Description: Doctor of Philosophy
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
- Authors: Khraisat, Ansam , Alazab, Ammar
- Date: 2021
- Type: Text , Journal article
- Relation: Cybersecurity Vol. 4, no. 1 (2021), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s).
- Authors: Khraisat, Ansam , Alazab, Ammar
- Date: 2021
- Type: Text , Journal article
- Relation: Cybersecurity Vol. 4, no. 1 (2021), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s).
A critical study of the production of nampla (Thai fish sauce)
- Authors: Laixuthai, Parichart
- Date: 1997
- Type: Text , Thesis , Masters
- Full Text:
- Description: Masters of Applied Science
- Authors: Laixuthai, Parichart
- Date: 1997
- Type: Text , Thesis , Masters
- Full Text:
- Description: Masters of Applied Science
A cross-layer approach for QoS topology control in wireless ad hoc networks
- Rokonuzzaman, S. K., Pose, Ronald, Gondal, Iqbal
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: TENCON 2009 - 2009 IEEE Region 10 Conference
- Full Text:
- Reviewed:
- Description: Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting the beamwidth and beam directions to minimize interference and to maximize the number of possible concurrent network communications. This in turn helps to maintain the QoS of the communications. QoS routing has long been used to meet the user requirements by finding appropriate paths to the destinations. We extend this concept to create an adaptive QoS topology control (AQTC) system using smart antennas. We use a cross-layer approach to control the topology dynamically where the topology control layer sits between the MAC and the routing protocol. The performance of our protocol has been evaluated using extensive simulations. Simulation results show that different topologies for a set of communications perform differently. AQTC always forms a topology to facilitate the current communications and improves the network throughput and end-to-end delay.
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: TENCON 2009 - 2009 IEEE Region 10 Conference
- Full Text:
- Reviewed:
- Description: Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting the beamwidth and beam directions to minimize interference and to maximize the number of possible concurrent network communications. This in turn helps to maintain the QoS of the communications. QoS routing has long been used to meet the user requirements by finding appropriate paths to the destinations. We extend this concept to create an adaptive QoS topology control (AQTC) system using smart antennas. We use a cross-layer approach to control the topology dynamically where the topology control layer sits between the MAC and the routing protocol. The performance of our protocol has been evaluated using extensive simulations. Simulation results show that different topologies for a set of communications perform differently. AQTC always forms a topology to facilitate the current communications and improves the network throughput and end-to-end delay.