Philip Tsang - Academia.edu (original) (raw)
Papers by Philip Tsang
Missouri Journal of Mathematical Sciences, Oct 1, 1992
Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt Universit... more Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt University{Riverina, Australia Shing S. So Central Missouri State University Abstract. Generating functions, one of the important ...
Technology may (or may not!) have altered the classical path of teaching it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...
ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted ... more ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted in many industries, such as logistics and healthcare. The growth of IoT motivates this project which aims at designing an indoor positioning method to monitor human movement in an indoor environment. Unlike other positioning methods, it is simple to apply 1-dimensional (1D) positioning result into a 2-dimensional (2D) floor plan. Moreover, this method is designed without pre-requested calibrations, and makes use of data processing techniques, such as Kalman filter and moving average, to improve the positioning accuracy. 1. INTRODUCTION This project is to study and design an indoor real-time positioning method for managing facilities and workers. Internet of Things (IoT) is a key modern technology to perform the monitoring work. The positioning method not only records which choke points they have passed through, but the real-time locations are also a piece of important information to guarantee that everyone and all equipment are working at a right place and right time. In addition, some restricted areas can be also controlled by ensuring no unauthorized entrance. IoT is a unique tailored interconnection system to link between embedded computing devices and internet infrastructure. There are many different technologies involved to develop an IoT network. Radio Frequency Identification (RFID) is one of the popular technologies to ‘tag’ objects in order to perform a track-and-trace function in various industries, such as supply chain and healthcare industries.
WORLD SCIENTIFIC eBooks, Jun 1, 2008
Technology may (or may not!) have altered the classical path of teaching it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...
A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter... more A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter-building transmission is proposed and developed. This system enables the mobility of ZigBee devices and WiMAX long-distance transmission. Architecture, mobility framework and Adaptive Modulation/Coding (AMC) performance are discussed in details. It is evaluated that the new algorithm offers good efficiency and thus resulting in low management cost. The MPMS aids life saving by providing panic button and location tracking service. The system may be used in telemedicine applications.
Journal of Modern Literature, 2017
Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across t... more Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across the twentieth century. As the emblem of Englishness, the gentleman loses its authority as the British Empire contracts, and reinvests itself as the symbol of a resurgent national culture of postwar England. While this narrative of decline and revival is persuasive, it also risks stabilizing the concepts of the "gentleman" and "Englishness."
Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2015
The emergence of electronic marketing on the Web has created many issues for Web researchers tryi... more The emergence of electronic marketing on the Web has created many issues for Web researchers trying to discover effective design ways to advertise via the Web. The way different design features are used varies from simple and complex plaint text to colour backgrounds and moveable graphic styles to produce special visual effects to draw the viewer’s attention. The variables of Web page design features, differentiating between effective and less effective, are the core Issues to be examined in this research. This paper describes the design of the experiment and suggests a set of user friendly implementation guidelines and tool usage which will benefit on-line advertising.
As active and innovative e-learning researchers, we had been part of the voting crowd but also we... more As active and innovative e-learning researchers, we had been part of the voting crowd but also were applicants to public voting contents on the Web.L3T, a project delivering an open textbook about learning and teaching withtechnologies, was applicant at three public voting contests on the Web: at the‘Neue Deutsche Buchpreis” (2011), at the podcast competition of the MMKH(2011) as well as at the MOOC Production Fellowship (2013). According to our experiences made, we got the impression, that there is a need to re-name ‘publicvoting” to ‘social voting”, as it is not ‘the public” (i.e. the crowd) that decideswho wins. In fact, we found out social aspects, i.e. strong and weak ties in so-cial communities to dictate the voting results. Therefore the publication ad-dresses the research question, whether public voting on the Web is a democratic process at all.
International Journal of Innovation and Learning, 2006
Abstract: Using the internet for education has become mainstreamed. It has become normal and unex... more Abstract: Using the internet for education has become mainstreamed. It has become normal and unexceptional. There is a wide spectrum of areas in which the net is being used. Some academics focus on the cognitive model of web design for e-learning, some on classroom ...
2010 International Conference on Machine Learning and Cybernetics, 2010
Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of trainin... more Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of training examples. To reduce the human effort in preparing training examples, we have developed a semi-supervised framework for learning an MLN from unlabeled data and a limited number of training examples. One characteristic of our approach is that instead of maximizing the pseudo-log-likelihood function
New Horizon in Web-Based Learning - Proceedings of the Third International Conference on Web-based Learning (ICWL 2004), 2004
USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communicatio... more USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communications Technology, OUHK, 30 Good Shepherd St Homantin, Hong Kong SAR, China JOSEPH FONG Computer Science Department, City University, Tat Chee Rd ...
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011), 2011
In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-... more In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-threshold CAC schemes, namely the dual threshold bandwidth reservation and the Tri-threshold bandwidth reservation scheme, are studied. Based on the findings, the novel concept of adaptive threshold for CAC is further investigated. It is concluded that the adaptive CAC scheme can be applied to Long Term Evolution.
International Journal of Services and Standards, 2012
The operational challenges facing indoor radio coverage to emergency services; especially police,... more The operational challenges facing indoor radio coverage to emergency services; especially police, fire and ambulance are examined. A solution is achieved within the paradigm of a public-private partnership service model. The paper includes a consolidated literature review of the basics of PPP and various PPP research frameworks that lay the background in the development of our PPP-WWW reference model. A review of the challenges associated with the highly profiled HK Police Force project, a Third Generation Command and Control Communications System (CC3) in support of frontline beat patrol police officers, is examined. Finally an innovative PPP business model will be presented and justifications for its acceptance will be delineated.
Industrial Management & Data Systems, 2005
Purpose To identify the relative effects of three features of response toward web interface (RW... more Purpose To identify the relative effects of three features of response toward web interface (RWI) on their advertising promotion effectiveness as measured by the number of accesses to various web pages. Design/methodology/approach A factorial design experiment was conducted ...
ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographicall... more ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographically-distributed client access points—as opposed to latency data between major server nodes. In response, this paper details the creation and launch of a web-based, client-driven, extendable database of client-to-client network latency data (ping data). It demonstrates the potential for distributed processing and data collection contained entirely within the web browser using asynchronous scripting techniques. The paper offers preliminary visual interpretations of an initial global latency dataset.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018
This paper will describe three case studies on the human factors, in personal and public safety a... more This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of "Internet of Things" and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of public safety and cyber security. The growth of disruption by cyber criminals-especially when using small devices and applications to interact with large social networks is a cause for concern. This is part of the evolving development of a cyber-physical world. The paper presents three case studies and proposes a Self-awareness and Intervention Model for public safety and security by increasing and maintaining the awareness, understanding and preparedness of cyber security measures by the individual when using mobile device applications to participate in large social systems and concludes by highlighting the importance of including the human factors and message framing alongside the cyber security measures in place.
Interactive Technology and Smart Education, 2012
International Journal of Accounting & Information Management, 2012
ABSTRACT
Missouri Journal of Mathematical Sciences, Oct 1, 1992
Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt Universit... more Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt University{Riverina, Australia Shing S. So Central Missouri State University Abstract. Generating functions, one of the important ...
Technology may (or may not!) have altered the classical path of teaching it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...
ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted ... more ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted in many industries, such as logistics and healthcare. The growth of IoT motivates this project which aims at designing an indoor positioning method to monitor human movement in an indoor environment. Unlike other positioning methods, it is simple to apply 1-dimensional (1D) positioning result into a 2-dimensional (2D) floor plan. Moreover, this method is designed without pre-requested calibrations, and makes use of data processing techniques, such as Kalman filter and moving average, to improve the positioning accuracy. 1. INTRODUCTION This project is to study and design an indoor real-time positioning method for managing facilities and workers. Internet of Things (IoT) is a key modern technology to perform the monitoring work. The positioning method not only records which choke points they have passed through, but the real-time locations are also a piece of important information to guarantee that everyone and all equipment are working at a right place and right time. In addition, some restricted areas can be also controlled by ensuring no unauthorized entrance. IoT is a unique tailored interconnection system to link between embedded computing devices and internet infrastructure. There are many different technologies involved to develop an IoT network. Radio Frequency Identification (RFID) is one of the popular technologies to ‘tag’ objects in order to perform a track-and-trace function in various industries, such as supply chain and healthcare industries.
WORLD SCIENTIFIC eBooks, Jun 1, 2008
Technology may (or may not!) have altered the classical path of teaching it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...
A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter... more A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter-building transmission is proposed and developed. This system enables the mobility of ZigBee devices and WiMAX long-distance transmission. Architecture, mobility framework and Adaptive Modulation/Coding (AMC) performance are discussed in details. It is evaluated that the new algorithm offers good efficiency and thus resulting in low management cost. The MPMS aids life saving by providing panic button and location tracking service. The system may be used in telemedicine applications.
Journal of Modern Literature, 2017
Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across t... more Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across the twentieth century. As the emblem of Englishness, the gentleman loses its authority as the British Empire contracts, and reinvests itself as the symbol of a resurgent national culture of postwar England. While this narrative of decline and revival is persuasive, it also risks stabilizing the concepts of the "gentleman" and "Englishness."
Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2015
The emergence of electronic marketing on the Web has created many issues for Web researchers tryi... more The emergence of electronic marketing on the Web has created many issues for Web researchers trying to discover effective design ways to advertise via the Web. The way different design features are used varies from simple and complex plaint text to colour backgrounds and moveable graphic styles to produce special visual effects to draw the viewer’s attention. The variables of Web page design features, differentiating between effective and less effective, are the core Issues to be examined in this research. This paper describes the design of the experiment and suggests a set of user friendly implementation guidelines and tool usage which will benefit on-line advertising.
As active and innovative e-learning researchers, we had been part of the voting crowd but also we... more As active and innovative e-learning researchers, we had been part of the voting crowd but also were applicants to public voting contents on the Web.L3T, a project delivering an open textbook about learning and teaching withtechnologies, was applicant at three public voting contests on the Web: at the‘Neue Deutsche Buchpreis” (2011), at the podcast competition of the MMKH(2011) as well as at the MOOC Production Fellowship (2013). According to our experiences made, we got the impression, that there is a need to re-name ‘publicvoting” to ‘social voting”, as it is not ‘the public” (i.e. the crowd) that decideswho wins. In fact, we found out social aspects, i.e. strong and weak ties in so-cial communities to dictate the voting results. Therefore the publication ad-dresses the research question, whether public voting on the Web is a democratic process at all.
International Journal of Innovation and Learning, 2006
Abstract: Using the internet for education has become mainstreamed. It has become normal and unex... more Abstract: Using the internet for education has become mainstreamed. It has become normal and unexceptional. There is a wide spectrum of areas in which the net is being used. Some academics focus on the cognitive model of web design for e-learning, some on classroom ...
2010 International Conference on Machine Learning and Cybernetics, 2010
Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of trainin... more Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of training examples. To reduce the human effort in preparing training examples, we have developed a semi-supervised framework for learning an MLN from unlabeled data and a limited number of training examples. One characteristic of our approach is that instead of maximizing the pseudo-log-likelihood function
New Horizon in Web-Based Learning - Proceedings of the Third International Conference on Web-based Learning (ICWL 2004), 2004
USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communicatio... more USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communications Technology, OUHK, 30 Good Shepherd St Homantin, Hong Kong SAR, China JOSEPH FONG Computer Science Department, City University, Tat Chee Rd ...
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011), 2011
In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-... more In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-threshold CAC schemes, namely the dual threshold bandwidth reservation and the Tri-threshold bandwidth reservation scheme, are studied. Based on the findings, the novel concept of adaptive threshold for CAC is further investigated. It is concluded that the adaptive CAC scheme can be applied to Long Term Evolution.
International Journal of Services and Standards, 2012
The operational challenges facing indoor radio coverage to emergency services; especially police,... more The operational challenges facing indoor radio coverage to emergency services; especially police, fire and ambulance are examined. A solution is achieved within the paradigm of a public-private partnership service model. The paper includes a consolidated literature review of the basics of PPP and various PPP research frameworks that lay the background in the development of our PPP-WWW reference model. A review of the challenges associated with the highly profiled HK Police Force project, a Third Generation Command and Control Communications System (CC3) in support of frontline beat patrol police officers, is examined. Finally an innovative PPP business model will be presented and justifications for its acceptance will be delineated.
Industrial Management & Data Systems, 2005
Purpose To identify the relative effects of three features of response toward web interface (RW... more Purpose To identify the relative effects of three features of response toward web interface (RWI) on their advertising promotion effectiveness as measured by the number of accesses to various web pages. Design/methodology/approach A factorial design experiment was conducted ...
ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographicall... more ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographically-distributed client access points—as opposed to latency data between major server nodes. In response, this paper details the creation and launch of a web-based, client-driven, extendable database of client-to-client network latency data (ping data). It demonstrates the potential for distributed processing and data collection contained entirely within the web browser using asynchronous scripting techniques. The paper offers preliminary visual interpretations of an initial global latency dataset.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018
This paper will describe three case studies on the human factors, in personal and public safety a... more This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of "Internet of Things" and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of public safety and cyber security. The growth of disruption by cyber criminals-especially when using small devices and applications to interact with large social networks is a cause for concern. This is part of the evolving development of a cyber-physical world. The paper presents three case studies and proposes a Self-awareness and Intervention Model for public safety and security by increasing and maintaining the awareness, understanding and preparedness of cyber security measures by the individual when using mobile device applications to participate in large social systems and concludes by highlighting the importance of including the human factors and message framing alongside the cyber security measures in place.
Interactive Technology and Smart Education, 2012
International Journal of Accounting & Information Management, 2012
ABSTRACT