University of Southern Queensland

Displaying 1-12 of 12 results

  • White Papers // Aug 2010

    Linear Model of Adapting Frame Size in DFSA of Passive GEN2 RFID Systems

    Low costs of passive UHF RFID tags, as well as their simplicity makes them appropriate for the localization and tracking services in today's fast-moving, information rich trading networks. However, a few disadvantages of passive RFID technology performances, as a reading range of passive tags and high collision rate during RFID...

    Provided By University of Southern Queensland

  • White Papers // Jul 2010

    Corporate Intellectual Capital Disclosure In A Non-Mandatory Disclosure Regime

    The purpose of this paper is to present an overview of corporate discretionary intellectual capital reporting in Bangladesh. From a sample of 136 listed companies with Dhaka Stock Exchange and by using the content analysis with codification of data, it examines the extent of intellectual capital reporting. It is found...

    Provided By University of Southern Queensland

  • White Papers // Jun 2010

    Integrating Diversity Management Initiatives With Strategic Human Resource Management

    Managing diversity is usually viewed in broad conceptual terms as recognizing and valuing differences among people; it is directed towards achieving organizational outcomes and reflects management practices adopted to improve the effectiveness of people management in organizations. The purpose of the paper is to examine the debate on how diversity...

    Provided By University of Southern Queensland

  • White Papers // Mar 2010

    Piecemeal: A Formal Collaborative Editing Technique Guaranteeing Correctness

    While collaboration on documents has been supported for several decades by a variety of systems and tools, in recent months a renewed interest is apparent through the appearance of new collaborative editors and applications. Some of these distributed groupware systems are plug-ins for standalone word processors, while others have a...

    Provided By University of Southern Queensland

  • White Papers // Dec 2009

    Shoulder-Surfing Safe Login in a Partially Observable Attacker Model

    Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: the attacker fully observes the entire input and output of a login procedure, the attacker only partially observes the input and output. Login methods secure in the fully...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Service Re-Routing for Service Network Graph: Efficiency, Scalability and Implementation

    The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Empirical Examination of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential of being deployed in many places where traditional wired or wireless networks are not feasible. But they have also many new challenges more than other wireless networks. These challenges include the design of embedded intelligent sensors and wireless networking technology, ie. Routing protocols...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Institutionalism as a Lens to Examine ITIL Adoption and Diffusion

    IT Service management standards such as the IT Infrastructure Library (ITIL) are of increasing importance to organisations around the globe. Although the actual number of organizations adopting ITIL is not known, there are many indicators of the growing awareness and adoption. For example, there are now 53 national chapters of...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Artificial Intelligence To Select The Optimal E-CRM Based Business Needs

    These days, business circumstances are changing rapidly because of information technology development and the spread of the Internet. Thus, it is important to develop Customer Relationship Management (CRM). CRM can satisfy customer needs that are becoming more complex. In addition, companies prefer existing customers to new customers because acquiring new...

    Provided By University of Southern Queensland

  • White Papers // Jul 2008

    Embedding Metadata and Other Semantics in Word Processing Documents

    This paper describes a technique for embedding document metadata, and potentially other semantic references inline in word processing documents, which the authors have implemented with the help of a software development team. Several assumptions underly the approach; It must be available across computing platforms and work with both Microsoft Word...

    Provided By University of Southern Queensland

  • White Papers // Jun 2008

    Australia-s Equity Home Bias And Real Exchange Rate Volatility

    This paper examines the impact of real exchange rate volatility on Australia's equity home bias by employing, International Monetary Fund's high quality dataset (2001 to 2006) on cross border equity investment. The paper finds some interesting trends in Australia's equity home bias. The paper uses different control measures and also...

    Provided By University of Southern Queensland

  • White Papers // Apr 2008

    Data Missing and Make-Up Work Studies Over a PIDn Networked Control System

    This paper studies the data missing and makeup work over a PIDn Networked Control System (NCS). The authors start with the simplest method by replacing the missed data with the previous one, then move to the linear interpolation and the numerator polynomial method. The study shows that these data make-up...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Institutionalism as a Lens to Examine ITIL Adoption and Diffusion

    IT Service management standards such as the IT Infrastructure Library (ITIL) are of increasing importance to organisations around the globe. Although the actual number of organizations adopting ITIL is not known, there are many indicators of the growing awareness and adoption. For example, there are now 53 national chapters of...

    Provided By University of Southern Queensland

  • White Papers // Jul 2008

    Embedding Metadata and Other Semantics in Word Processing Documents

    This paper describes a technique for embedding document metadata, and potentially other semantic references inline in word processing documents, which the authors have implemented with the help of a software development team. Several assumptions underly the approach; It must be available across computing platforms and work with both Microsoft Word...

    Provided By University of Southern Queensland

  • White Papers // Oct 2008

    Using Artificial Intelligence To Select The Optimal E-CRM Based Business Needs

    These days, business circumstances are changing rapidly because of information technology development and the spread of the Internet. Thus, it is important to develop Customer Relationship Management (CRM). CRM can satisfy customer needs that are becoming more complex. In addition, companies prefer existing customers to new customers because acquiring new...

    Provided By University of Southern Queensland

  • White Papers // Mar 2010

    Piecemeal: A Formal Collaborative Editing Technique Guaranteeing Correctness

    While collaboration on documents has been supported for several decades by a variety of systems and tools, in recent months a renewed interest is apparent through the appearance of new collaborative editors and applications. Some of these distributed groupware systems are plug-ins for standalone word processors, while others have a...

    Provided By University of Southern Queensland

  • White Papers // Jun 2010

    Integrating Diversity Management Initiatives With Strategic Human Resource Management

    Managing diversity is usually viewed in broad conceptual terms as recognizing and valuing differences among people; it is directed towards achieving organizational outcomes and reflects management practices adopted to improve the effectiveness of people management in organizations. The purpose of the paper is to examine the debate on how diversity...

    Provided By University of Southern Queensland

  • White Papers // Jun 2008

    Australia-s Equity Home Bias And Real Exchange Rate Volatility

    This paper examines the impact of real exchange rate volatility on Australia's equity home bias by employing, International Monetary Fund's high quality dataset (2001 to 2006) on cross border equity investment. The paper finds some interesting trends in Australia's equity home bias. The paper uses different control measures and also...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Service Re-Routing for Service Network Graph: Efficiency, Scalability and Implementation

    The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of...

    Provided By University of Southern Queensland

  • White Papers // Apr 2009

    Empirical Examination of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great potential of being deployed in many places where traditional wired or wireless networks are not feasible. But they have also many new challenges more than other wireless networks. These challenges include the design of embedded intelligent sensors and wireless networking technology, ie. Routing protocols...

    Provided By University of Southern Queensland

  • White Papers // Jul 2010

    Corporate Intellectual Capital Disclosure In A Non-Mandatory Disclosure Regime

    The purpose of this paper is to present an overview of corporate discretionary intellectual capital reporting in Bangladesh. From a sample of 136 listed companies with Dhaka Stock Exchange and by using the content analysis with codification of data, it examines the extent of intellectual capital reporting. It is found...

    Provided By University of Southern Queensland

  • White Papers // Apr 2008

    Data Missing and Make-Up Work Studies Over a PIDn Networked Control System

    This paper studies the data missing and makeup work over a PIDn Networked Control System (NCS). The authors start with the simplest method by replacing the missed data with the previous one, then move to the linear interpolation and the numerator polynomial method. The study shows that these data make-up...

    Provided By University of Southern Queensland

  • White Papers // Aug 2010

    Linear Model of Adapting Frame Size in DFSA of Passive GEN2 RFID Systems

    Low costs of passive UHF RFID tags, as well as their simplicity makes them appropriate for the localization and tracking services in today's fast-moving, information rich trading networks. However, a few disadvantages of passive RFID technology performances, as a reading range of passive tags and high collision rate during RFID...

    Provided By University of Southern Queensland

  • White Papers // Dec 2009

    Shoulder-Surfing Safe Login in a Partially Observable Attacker Model

    Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: the attacker fully observes the entire input and output of a login procedure, the attacker only partially observes the input and output. Login methods secure in the fully...

    Provided By University of Southern Queensland