Browsing School of Computer and Mathematical Sciences by Date
Now showing items 120 of 431

Errors in the administration of intravenous medications in hospital and the role of correct procedures and nurse experience
(BMJ Publishing Group Ltd and the Health Foundation, 26 M)Background Intravenous medication administrations have a high incidence of error but there is limited evidence of associated factors or error severity.Objective To measure the frequency, type and severity of intravenous ... 
A foundation programme preparing students for future study in Computing and Engineering Degrees
(IEEE, 2016)This paper presents the Certificate of Science and Technology (CertScT) a predegree programme at Auckland University of Technology in New Zealand, developed with the aim of preparing students to undertake degree level ... 
Accurate calculations of Stationary Distributions and Mean First Passage Times in Markov Renewal Processes and Markov Chains
(De Gruyter Open, 2016)This article describes an accurate procedure for computing the mean first passage times of a finite irreducible Markov chain and a Markov renewal process. The method is a refinement to the Kohlas, Zeit fur Oper Res, ... 
Why the Kemeny Time is a constant
(De Gruyter Open, 2016)We present a new fundamental intuition for why the Kemeny feature of a Markov chain is a constant. This new perspective has interesting further implications. 
Analysing university students' abilities in making assumptions in a ballistics model: a case study
(The Bronx Colleges of the City University of New York, 2016)This paper investigates abilities of two groups of university students in making assumptions in a ballistics model. The first group consisted of postgraduate students majoring in applied mathematics from a New Zealand ... 
Multiple preemptive EDCA for emergency medium access control in distributed WLANs
(Springer, 2016)The increasingly use of wireless local area networks (WLANs) in public safety and emergency network services demands for a strict quality of service (QoS) guarantee especially a large number of users report an emergency ... 
EMAC: an evolutionary solution for collision avoidance in wireless ad hoc networks
(Elsevier, 2016)Transmission collision is a main cause of throughput degradation and nondeterministic latency in wireless networks. Existing collisionavoidance mechanisms for distributed wireless networks are mostly based on the random ... 
Noninformative reparameterisations for locationscale mixtures
(Cornell University Library, 2016)While mixtures of Gaussian distributions have been studied for more than a century (Pearson, 1894), the construction of a reference Bayesian analysis of those models still remains unsolved, with a general prohibition of ... 
Model prior distribution for variable selection in linear regression models
(Cornell University Library, 2016)In this work we discuss a novel model prior probability for variable selection in linear regression. The idea is to determine the prior mass in an objective sense, by considering the worth of each of the possible regression ... 
Comparisonbased systemlevel fault diagnosis protocols for mobile adhoc networks: a survey
(Elsevier, 2016)Fault diagnosis is crucial for the successful deployment and operation of mobile adhoc networks (MANETs). Comparisonbased fault diagnosis is a practical approach to identify the status of nodes based on tasks they execute. ... 
Everybody must cut code! Educational imperative, fad or fantasy?
(Association for Computing Machinery (ACM), 2015)No abstract. 
Event analogy for privacy preservation in visual surveillance
(Springer, 2015)Privacy preservation as a thorny problem in surveillance has been arisen because of its relevance to human right, however it has not been completely solved yet today. In this paper, we investigate this existing problem ... 
Face search in encrypted domain
(Springer, 2015)Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage of speed over ... 
Competencies for paradigm shift 'survival'
(IEEE, 2015)The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements ... 
A definition for a sustainable computing educator
(Computing and Information Technology Research and Education, New Zealand (CITRENZ), 2015)The concept of sustainability has been penetrating the education sector for some time. In addition to degrees in sustainability, numerous majors, and indeed whole institutions have been imbuing their curricula with a ... 
Importance sampling schemes for evidence approximation in mixture models
(International Society for Bayesian Analysis, 2015)The marginal likelihood is a central tool for drawing Bayesian inference about the number of components in mixture models. It is often approximated since the exact form is unavailable. A bias in the approximation may be ... 
Sentiment lexicon construction using SentiWordNet 3.0
(ICNC'15FSKD'15, School of Information Science and Engineering, Hunan University, China, 2015)Opinion mining and sentiment analysis have become popular in linguistic resource rich languages. Opinions for such analysis are drawn from many forms of freely available online/electronic sources, such as websites, blogs, ... 
Slicing the Pi: devicespecific IEC 61499 design
(IEEE, 2015)The IEC 61499 Function Block standard describes an architecture to support the development and reuse of software components for distributed and embedded industrial control and automation systems. Often distributed over ... 
Effective versus individual waves for water wave and thin plate problems
(Department of Mathematics at Karlsruhe Institute of Technology (KIT), 2015)Numerical results are presented to show that, for smallamplitude roughness, individual wave elevations attenuate at a far slower rate than the corresponding e ective wave elevation for both ocean waves travelling over a ... 
Use of ensembles of Fourier spectra in capturing recurrent concepts in data streams
(IEEE, 2015)In this research, we apply ensembles of Fourier encoded spectra to capture and mine recurring concepts in a data stream environment. Previous research showed that compact versions of Decision Trees can be obtained by ...