Curtin University of Technology

Displaying 1-16 of 16 results

  • White Papers // Jan 2014

    Efficiently Mining Frequent Patterns from Dense Datasets using a Cluster of Computers

    Efficient mining of frequent patterns from large databases has been an active area of research since it is the most expensive step in association rules mining. In this paper, the authors present an algorithm for finding complete frequent patterns from very large dense datasets in a cluster environment. The data...

    Provided By Curtin University of Technology

  • White Papers // Jan 2013

    Impact of SMEs Character in the Loan Approval Stage

    The authors attempt to integrate the prior literature on SME financing, and propose that these issues should be researched in a structured and holistic manner. To that end, they suggest that SME financing can be studied from the supply side (banks') perspective, but not be restricted to a discussion on...

    Provided By Curtin University of Technology

  • White Papers // Dec 2012

    Domain Bifurcation as a Customisation and Business Intelligence Strategy in Domain-driven Innovation

    Bifurcation of domain models is introduced as a strategy for customisation and business intelligence in a Malaysian real estate CRM system. The process of bifurcation forms part of a broader strategy in the context of domain-driven innovation. The overarching approach is described, the bifurcation process and resulting domain models are...

    Provided By Curtin University of Technology

  • White Papers // Jan 2012

    Dynamic Traffic Cellular Automata Model to Express the Congestion at One Lane Highway Traffic System

    Highway congestions can cause considerable impact on loss of time and delays displacement. This paper introduces a new method of explanation of the congestion in contrast to conventional method of vehicles capacity on the highways. This method is primarily based on the Cellular Automata (CA) concept introduced by Nagel and...

    Provided By Curtin University of Technology

  • White Papers // Dec 2010

    Controlled Options: Derivatives With Added Flexibility

    The paper introduces a modification of the passport options such that the holder selects dynamically a weight function that controls the distribution of the payments (benefits) for option holder over time. The control processes are assumed to be adapted to the current flow of information. These options are oriented on...

    Provided By Curtin University of Technology

  • White Papers // Oct 2010

    On Detecting The Dependence Of Time Series

    This paper suggests a heuristic method for detecting the dependence of random time series that can be used in the case when this dependence is relatively weak and such that the traditional methods are not effective. The method requires comparing some special functionals on the sample characteristic functions with the...

    Provided By Curtin University of Technology

  • White Papers // Aug 2010

    Comparative Inquiry Into The Axiom Of Business Relationship Management: Insights From Japanese And Australian Manufacturers

    The Industrial Marketing and Purchasing (IMP) Group researchers have generated rich account of an evolution of business relationship and a co-evolution of organisations through the relationship. One of their research foci has been on inter-firm adaptation-making as the driver of the evolution and co-evolution. Explicit in this paper perspective is...

    Provided By Curtin University of Technology

  • White Papers // Aug 2010

    New Proxy Signatures Preserving Privacy and as Secure as ElGamal Signatures

    Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g....

    Provided By Curtin University of Technology

  • White Papers // Jul 2010

    Corporate Kangaroos And Dragons Sustainability Disclosures: A Comparative Analysis

    The purpose of this paper is to undertake a comparative analysis of the current state of Corporate Sustainability Disclosures (CSD) in Australia and China. Content analyses of CSD were undertaken according to six major criteria (Indicator Sections) with 51 indicators for the top 40 listed companies (by market capitalisation) on...

    Provided By Curtin University of Technology

  • White Papers // May 2010

    Cloud Computing: Issues and Challenges

    Cloud computing has recently emerged as a buzz word in the distributed computing community. Many believe that Cloud is going to reshape the IT industry as a revolution. Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, the authors aim to pinpoint the...

    Provided By Curtin University of Technology

  • White Papers // Apr 2010

    Leadership Styles And The Moral Choice Of Internal Auditors

    According to the theory of reasoned action, the intention of an individual is influenced by personal attitudes, the social norms and weighing of these two considerations. These motivational factors emanate from the self (personal identity), the environment and the interaction of the two. Within organizational settings, the self could be...

    Provided By Curtin University of Technology

  • White Papers // Jun 2009

    Flagging Critical Components to Prevent Transient Faults in Real-Time Systems

    This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed...

    Provided By Curtin University of Technology

  • White Papers // Apr 2009

    Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods

    Spammers have proven very powerfully adaptable, if the users thwart all current spam methods, they will find new loophole to use them. Blogs, comments, forums, opinions, online communities, wikis and tags are nowadays targets for their campaigns. This paper presents analysis of current anti-spam methods in Web 2.0 for spam...

    Provided By Curtin University of Technology

  • White Papers // Apr 2009

    Indexing and Retrieval of Multimodal Lecture Recordings From Open Repositories for Personalized Access in Modern Learning Settings

    An increasing number of lecture recordings are available to complement face-to face and the more conventional content-based e-learning approaches. These recordings provide additional channels for remote students and time-independent access to the lectures. Many universities offer even complete series of recordings of hundreds of courses which are available for public...

    Provided By Curtin University of Technology

  • White Papers // Mar 2009

    Performance Measurement of Various Routing Protocols in Ad-Hoc Network

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols like Destination-Sequenced Distance-Vector (DSDV), Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Temporally Ordered...

    Provided By Curtin University of Technology

  • White Papers // Nov 2008

    Factors Influencing Implementation of CRM Technology Among Small and Medium Sized Enterprises

    This paper aims to identify the factors that influence the implementation of Customer Relationship Management (CRM) technology among Small and Medium-sized Enterprises (SMEs). From the existing literature six factors: relative advantage, cost effectiveness, top management support, Information Technology (IT) knowledge, government support and competitive pressure were identified to influence CRM...

    Provided By Curtin University of Technology

  • White Papers // Mar 2009

    Performance Measurement of Various Routing Protocols in Ad-Hoc Network

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols like Destination-Sequenced Distance-Vector (DSDV), Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Temporally Ordered...

    Provided By Curtin University of Technology

  • White Papers // Apr 2010

    Leadership Styles And The Moral Choice Of Internal Auditors

    According to the theory of reasoned action, the intention of an individual is influenced by personal attitudes, the social norms and weighing of these two considerations. These motivational factors emanate from the self (personal identity), the environment and the interaction of the two. Within organizational settings, the self could be...

    Provided By Curtin University of Technology

  • White Papers // Apr 2009

    Indexing and Retrieval of Multimodal Lecture Recordings From Open Repositories for Personalized Access in Modern Learning Settings

    An increasing number of lecture recordings are available to complement face-to face and the more conventional content-based e-learning approaches. These recordings provide additional channels for remote students and time-independent access to the lectures. Many universities offer even complete series of recordings of hundreds of courses which are available for public...

    Provided By Curtin University of Technology

  • White Papers // Aug 2010

    Comparative Inquiry Into The Axiom Of Business Relationship Management: Insights From Japanese And Australian Manufacturers

    The Industrial Marketing and Purchasing (IMP) Group researchers have generated rich account of an evolution of business relationship and a co-evolution of organisations through the relationship. One of their research foci has been on inter-firm adaptation-making as the driver of the evolution and co-evolution. Explicit in this paper perspective is...

    Provided By Curtin University of Technology

  • White Papers // Aug 2010

    New Proxy Signatures Preserving Privacy and as Secure as ElGamal Signatures

    Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g....

    Provided By Curtin University of Technology

  • White Papers // Jul 2010

    Corporate Kangaroos And Dragons Sustainability Disclosures: A Comparative Analysis

    The purpose of this paper is to undertake a comparative analysis of the current state of Corporate Sustainability Disclosures (CSD) in Australia and China. Content analyses of CSD were undertaken according to six major criteria (Indicator Sections) with 51 indicators for the top 40 listed companies (by market capitalisation) on...

    Provided By Curtin University of Technology

  • White Papers // Jun 2009

    Flagging Critical Components to Prevent Transient Faults in Real-Time Systems

    This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed...

    Provided By Curtin University of Technology

  • White Papers // Dec 2010

    Controlled Options: Derivatives With Added Flexibility

    The paper introduces a modification of the passport options such that the holder selects dynamically a weight function that controls the distribution of the payments (benefits) for option holder over time. The control processes are assumed to be adapted to the current flow of information. These options are oriented on...

    Provided By Curtin University of Technology

  • White Papers // Oct 2010

    On Detecting The Dependence Of Time Series

    This paper suggests a heuristic method for detecting the dependence of random time series that can be used in the case when this dependence is relatively weak and such that the traditional methods are not effective. The method requires comparing some special functionals on the sample characteristic functions with the...

    Provided By Curtin University of Technology

  • White Papers // Jan 2012

    Dynamic Traffic Cellular Automata Model to Express the Congestion at One Lane Highway Traffic System

    Highway congestions can cause considerable impact on loss of time and delays displacement. This paper introduces a new method of explanation of the congestion in contrast to conventional method of vehicles capacity on the highways. This method is primarily based on the Cellular Automata (CA) concept introduced by Nagel and...

    Provided By Curtin University of Technology

  • White Papers // Jan 2013

    Impact of SMEs Character in the Loan Approval Stage

    The authors attempt to integrate the prior literature on SME financing, and propose that these issues should be researched in a structured and holistic manner. To that end, they suggest that SME financing can be studied from the supply side (banks') perspective, but not be restricted to a discussion on...

    Provided By Curtin University of Technology

  • White Papers // Nov 2008

    Factors Influencing Implementation of CRM Technology Among Small and Medium Sized Enterprises

    This paper aims to identify the factors that influence the implementation of Customer Relationship Management (CRM) technology among Small and Medium-sized Enterprises (SMEs). From the existing literature six factors: relative advantage, cost effectiveness, top management support, Information Technology (IT) knowledge, government support and competitive pressure were identified to influence CRM...

    Provided By Curtin University of Technology

  • White Papers // Dec 2012

    Domain Bifurcation as a Customisation and Business Intelligence Strategy in Domain-driven Innovation

    Bifurcation of domain models is introduced as a strategy for customisation and business intelligence in a Malaysian real estate CRM system. The process of bifurcation forms part of a broader strategy in the context of domain-driven innovation. The overarching approach is described, the bifurcation process and resulting domain models are...

    Provided By Curtin University of Technology

  • White Papers // Apr 2009

    Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods

    Spammers have proven very powerfully adaptable, if the users thwart all current spam methods, they will find new loophole to use them. Blogs, comments, forums, opinions, online communities, wikis and tags are nowadays targets for their campaigns. This paper presents analysis of current anti-spam methods in Web 2.0 for spam...

    Provided By Curtin University of Technology

  • White Papers // May 2010

    Cloud Computing: Issues and Challenges

    Cloud computing has recently emerged as a buzz word in the distributed computing community. Many believe that Cloud is going to reshape the IT industry as a revolution. Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, the authors aim to pinpoint the...

    Provided By Curtin University of Technology

  • White Papers // Jan 2014

    Efficiently Mining Frequent Patterns from Dense Datasets using a Cluster of Computers

    Efficient mining of frequent patterns from large databases has been an active area of research since it is the most expensive step in association rules mining. In this paper, the authors present an algorithm for finding complete frequent patterns from very large dense datasets in a cluster environment. The data...

    Provided By Curtin University of Technology