Browsing School of Engineering, Computer and Mathematical Sciences  Te Kura Mātai Pūhanga, Rorohiko, Pāngarau by Title
Now showing items 110129 of 1033

The Arbitrary Nature of Computing Curricula
(Association for Computing Machinery (ACM), 2018)Computing is still a young discipline with new topics emerging daily, spawning an extended family of disciplines, which makes negotiating a curriculum an inherently fraught process that will not meet everybody's needs. 
Arcing Behaviour of a Potential Hightemperature Superconductor (HTS) Circuit Breaker Arc Model
(IEEE, 2018)Circuit breaker is a vital and sophisticated part of protection accessories in power system. An arc model of a circuit breaker can determine the dynamic and static feature for arcing directed by a power circuit. The idea ... 
Aspect of Blame in Tweets: a Deep Recurrent Neural Network Approach
(Association for Computing Machinery (ACM), 2017)Twitter as an information dissemination tool has proved to be instrumental in generating user curated content in short spans of time. Tweeting usually occurs when reacting to events, speeches, about a service or product. ... 
Assessment of a Solar Parabolic Trough Power Plant with Grid Integration in Egypt
(Australian PV Institute (APVI), 2018)Concentrating Solar Power (CSP) is a promising technology for generating efficient renewable solar energy in countries with high Direct Normal Irradiance (DNI). Egypt as one of those countries could harness the sun’s energy ... 
Assessment of thermal comfort near a glazed exterior wall
(University of Sydney, 2011)In many highly glazed buildings, the thermal comfort of the occupants will tend to be related to the incoming solar energy and the solar heat gain coefficient of the glazing. Many real buildings tend to be deep relative ... 
Asynchronous Early Output Dualbit Full Adders Based on Homogeneous and Heterogeneous Delayinsensitive Data Encoding
(World Scientific and Engineering Academy and Society, 2017)This paper presents the designs of asynchronous early output dualbit full adders without and with redundant logic (implicit) corresponding to homogeneous and heterogeneous delayinsensitive data encoding. For homogeneous ... 
Asynchronous Early Output Sectioncarry Lookahead Adder With Alias Carry Logic
(IEEE, 2017)A new asynchronous early output sectioncarry based carry lookahead adder (SCBCLA) with alias carry output logic is presented in this paper. To evaluate the proposed SCBCLA with alias carry logic and to make a comparison ... 
Attenuation of ocean waves due to random perturbations in the seabed profile
(KiwiOz Waves Conferences (KOZ Waves), The University of Newcastle, 2014)We employ linear wave theory to study long range attenuation of ocean waves caused by small, random perturbations in the seabed. The phenomenon in an example of localization in random media. A multiplescale method is used, ... 
The AUSTRAL VLBI Observing Program
(Springer Journals, 2016)The AUSTRAL observing program was started in 2011, performing geodetic and astrometric very long baseline interferometry (VLBI) sessions using the new Australian AuScope VLBI antennas at Hobart, Katherine, and Yarragadee, ... 
Autocode generation for fast embedded model predictive controllers
(IEEE, 2012)The implementation of model predictive controllers on lowcast hardware such as microcontrollers has been traditionally hampered by the high computing and associated memory demands of the algorithm. This paper describes ... 
Automated Crossidentifying Radio to Infrared Surveys Using the LRPY Algorithm: A Case Study
(Oxford University Press (OUP), 2017)Crossidentifying complex radio sources with optical or infra red (IR) counterparts in surveys such as the Australia Telescope Large Area Survey (ATLAS) has tradi tionally been performed manually. However, with new surveys ... 
An Automated Privacy Information Detection Approach for Protecting Individual Online Social Network Users
(The Japanese Society for Artificial Intelligence, 2019)Massive private messages are posted by online social network users unconsciously every day, some users may face undesirable consequences. Thus, many studies have been dedicated to privacy leakage analysis. Whereas, there ... 
Automatic variance control and variance estimation loops
(Springer Verlag (Germany) (for Birkhäuser Boston), 2001)A closedloop servo approach is applied to the problem of controlling and estimating variance in nonstationary signals. The new circuit closely resembles, but is not the same as, automatic gain control, which is common in ... 
Automotive 3microphone noise canceller in a frequently moving noise source environment
(World Academy of Science, Engineering and Technology (WASET), 2007)A combined threemicrophone voice activity detector (VAD) and noisecanceling system is studied to enhance speech recognition in an automobile environment. A previous experiment clearly shows the ability of the composite ... 
Avoiding the opportunist: the role of Simmelian Ties in fostering the trust in SensorCloud Networks
(Hindawi Publishing Corporation, 2015)The wireless sensorcloud networks (WSCNs) are becoming popular nowadays. The new concept of trust has emerged in recent studies as an alternative mechanism to address the security concern in WSCN. Most of the studies on ... 
Baire spaces and the Wijsman topology
(AUT University, 2007)In 1960s, when he studied Banach space geometry, R. Wijsman considered the weak topology on the collection of nonempty closed subsets of a metric space generated by the distance functionals viewed as functions of set ... 
Baire spaces and Vietoris hyperspaces
(The American Mathematical Society, 2007)We prove that if the Vietoris hyperspace CL(X) of all nonempty closed subsets of a space X is Baire, then all finite powers of X must be Baire spaces. In particular, there exists a metrizable Baire space whose Vietoris ... 
Baire spaces, Tychonoff powers and the Vietoris topology
(American Mathematical Society, 2007)In this paper, we show that if the Tychonoﬀ power Xω of a quasiregular space X is Baire, then its Vietoris hyperspace 2X is also Baire. We also provide two examples to show (i) the converse of this result does not hold in ... 
Bayesian fitting procedures for hydrological point processes.
(2014)Model fitting and selection typically requires the use of likelihoods. Applying standard methods to hydrological point processes, however, is problematic as their likelihoods are often analytically intractable and the data ...