Philip Tsang - Academia.edu (original) (raw)

Papers by Philip Tsang

Research paper thumbnail of Generating Functions: Applications and Techniques

Missouri Journal of Mathematical Sciences, Oct 1, 1992

Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt Universit... more Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt University{Riverina, Australia Shing S. So Central Missouri State University Abstract. Generating functions, one of the important ...

Research paper thumbnail of Enhancing Learning through Technology

Technology may (or may not!) have altered the classical path of teaching – it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching – it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...

Research paper thumbnail of Design of a WLAN experiment: a case study

Research paper thumbnail of A Bluetooth-based Indoor Positioning System: a Simple and Rapid Approach

ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted ... more ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted in many industries, such as logistics and healthcare. The growth of IoT motivates this project which aims at designing an indoor positioning method to monitor human movement in an indoor environment. Unlike other positioning methods, it is simple to apply 1-dimensional (1D) positioning result into a 2-dimensional (2D) floor plan. Moreover, this method is designed without pre-requested calibrations, and makes use of data processing techniques, such as Kalman filter and moving average, to improve the positioning accuracy. 1. INTRODUCTION This project is to study and design an indoor real-time positioning method for managing facilities and workers. Internet of Things (IoT) is a key modern technology to perform the monitoring work. The positioning method not only records which choke points they have passed through, but the real-time locations are also a piece of important information to guarantee that everyone and all equipment are working at a right place and right time. In addition, some restricted areas can be also controlled by ensuring no unauthorized entrance. IoT is a unique tailored interconnection system to link between embedded computing devices and internet infrastructure. There are many different technologies involved to develop an IoT network. Radio Frequency Identification (RFID) is one of the popular technologies to ‘tag’ objects in order to perform a track-and-trace function in various industries, such as supply chain and healthcare industries.

Research paper thumbnail of An Educational Guide to IEEE802.11 WLAN Survey & Visualisation Experiments

Research paper thumbnail of Enhancing Learning Through Technology

WORLD SCIENTIFIC eBooks, Jun 1, 2008

Technology may (or may not!) have altered the classical path of teaching – it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching – it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...

Research paper thumbnail of A high mobility multipurpose patient monitoring system for inter-building communication

A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter... more A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter-building transmission is proposed and developed. This system enables the mobility of ZigBee devices and WiMAX long-distance transmission. Architecture, mobility framework and Adaptive Modulation/Coding (AMC) performance are discussed in details. It is evaluated that the new algorithm offers good efficiency and thus resulting in low management cost. The MPMS aids life saving by providing panic button and location tracking service. The system may be used in telemedicine applications.

Research paper thumbnail of Long Live the English Gentleman

Journal of Modern Literature, 2017

Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across t... more Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across the twentieth century. As the emblem of Englishness, the gentleman loses its authority as the British Empire contracts, and reinvests itself as the symbol of a resurgent national culture of postwar England. While this narrative of decline and revival is persuasive, it also risks stabilizing the concepts of the "gentleman" and "Englishness."

Research paper thumbnail of Create a Visual Distinctness Web Page to Effect on-line Advertising Effectiveness

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2015

The emergence of electronic marketing on the Web has created many issues for Web researchers tryi... more The emergence of electronic marketing on the Web has created many issues for Web researchers trying to discover effective design ways to advertise via the Web. The way different design features are used varies from simple and complex plaint text to colour backgrounds and moveable graphic styles to produce special visual effects to draw the viewer’s attention. The variables of Web page design features, differentiating between effective and less effective, are the core Issues to be examined in this research. This paper describes the design of the experiment and suggests a set of user friendly implementation guidelines and tool usage which will benefit on-line advertising.

Research paper thumbnail of Discussing Public Voting in the Web as a Measure to Democratize Award Decisions

As active and innovative e-learning researchers, we had been part of the voting crowd but also we... more As active and innovative e-learning researchers, we had been part of the voting crowd but also were applicants to public voting contents on the Web.L3T, a project delivering an open textbook about learning and teaching withtechnologies, was applicant at three public voting contests on the Web: at the‘Neue Deutsche Buchpreis” (2011), at the podcast competition of the MMKH(2011) as well as at the MOOC Production Fellowship (2013). According to our experiences made, we got the impression, that there is a need to re-name ‘publicvoting” to ‘social voting”, as it is not ‘the public” (i.e. the crowd) that decideswho wins. In fact, we found out social aspects, i.e. strong and weak ties in so-cial communities to dictate the voting results. Therefore the publication ad-dresses the research question, whether public voting on the Web is a democratic process at all.

Research paper thumbnail of Harnessing the internet as a virtual lab

International Journal of Innovation and Learning, 2006

Abstract: Using the internet for education has become mainstreamed. It has become normal and unex... more Abstract: Using the internet for education has become mainstreamed. It has become normal and unexceptional. There is a wide spectrum of areas in which the net is being used. Some academics focus on the cognitive model of web design for e-learning, some on classroom ...

Research paper thumbnail of Improving Markov Logic Network learning using unlabeled data

2010 International Conference on Machine Learning and Cybernetics, 2010

Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of trainin... more Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of training examples. To reduce the human effort in preparing training examples, we have developed a semi-supervised framework for learning an MLN from unlabeled data and a limited number of training examples. One characteristic of our approach is that instead of maximizing the pseudo-log-likelihood function

Research paper thumbnail of Using E-Learning Platform in Open and Flexible Learning

New Horizon in Web-Based Learning - Proceedings of the Third International Conference on Web-based Learning (ICWL 2004), 2004

USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communicatio... more USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communications Technology, OUHK, 30 Good Shepherd St Homantin, Hong Kong SAR, China JOSEPH FONG Computer Science Department, City University, Tat Chee Rd ...

Research paper thumbnail of Call admission control for long term evolution

IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011), 2011

In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-... more In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-threshold CAC schemes, namely the dual threshold bandwidth reservation and the Tri-threshold bandwidth reservation scheme, are studied. Based on the findings, the novel concept of adaptive threshold for CAC is further investigated. It is concluded that the adaptive CAC scheme can be applied to Long Term Evolution.

Research paper thumbnail of A new win-win-win business service model for the Hong Kong police force

International Journal of Services and Standards, 2012

The operational challenges facing indoor radio coverage to emergency services; especially police,... more The operational challenges facing indoor radio coverage to emergency services; especially police, fire and ambulance are examined. A solution is achieved within the paradigm of a public-private partnership service model. The paper includes a consolidated literature review of the basics of PPP and various PPP research frameworks that lay the background in the development of our PPP-WWW reference model. A review of the challenges associated with the highly profiled HK Police Force project, a Third Generation Command and Control Communications System (CC3) in support of frontline beat patrol police officers, is examined. Finally an innovative PPP business model will be presented and justifications for its acceptance will be delineated.

Research paper thumbnail of A hedonic model for effective web marketing: an empirical examination

Industrial Management & Data Systems, 2005

Purpose – To identify the relative effects of three features of response toward web interface (RW... more Purpose – To identify the relative effects of three features of response toward web interface (RWI) on their advertising promotion effectiveness as measured by the number of accesses to various web pages. Design/methodology/approach – A factorial design experiment was conducted ...

Research paper thumbnail of Community-driven latency measurements in geographically-distributed networks

ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographicall... more ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographically-distributed client access points—as opposed to latency data between major server nodes. In response, this paper details the creation and launch of a web-based, client-driven, extendable database of client-to-client network latency data (ping data). It demonstrates the potential for distributed processing and data collection contained entirely within the web browser using asynchronous scripting techniques. The paper offers preliminary visual interpretations of an initial global latency dataset.

Research paper thumbnail of Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018

This paper will describe three case studies on the human factors, in personal and public safety a... more This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of "Internet of Things" and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of public safety and cyber security. The growth of disruption by cyber criminals-especially when using small devices and applications to interact with large social networks is a cause for concern. This is part of the evolving development of a cyber-physical world. The paper presents three case studies and proposes a Self-awareness and Intervention Model for public safety and security by increasing and maintaining the awareness, understanding and preparedness of cyber security measures by the individual when using mobile device applications to participate in large social systems and concludes by highlighting the importance of including the human factors and message framing alongside the cyber security measures in place.

Research paper thumbnail of Themed Section: 16th Web Symposium Consortium Conference 2011

Interactive Technology and Smart Education, 2012

Research paper thumbnail of ICT maturity as a driver to global competitiveness: a national level analysis

International Journal of Accounting & Information Management, 2012

ABSTRACT

Research paper thumbnail of Generating Functions: Applications and Techniques

Missouri Journal of Mathematical Sciences, Oct 1, 1992

Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt Universit... more Page 1. GENERATING FUNCTIONS: APPLICATIONS AND TECHNIQUES Philip M. Tsang Charles Sturt University{Riverina, Australia Shing S. So Central Missouri State University Abstract. Generating functions, one of the important ...

Research paper thumbnail of Enhancing Learning through Technology

Technology may (or may not!) have altered the classical path of teaching – it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching – it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...

Research paper thumbnail of Design of a WLAN experiment: a case study

Research paper thumbnail of A Bluetooth-based Indoor Positioning System: a Simple and Rapid Approach

ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted ... more ABSTRACT In recent years, Internet of Things (IoT) applications are widely developed and adopted in many industries, such as logistics and healthcare. The growth of IoT motivates this project which aims at designing an indoor positioning method to monitor human movement in an indoor environment. Unlike other positioning methods, it is simple to apply 1-dimensional (1D) positioning result into a 2-dimensional (2D) floor plan. Moreover, this method is designed without pre-requested calibrations, and makes use of data processing techniques, such as Kalman filter and moving average, to improve the positioning accuracy. 1. INTRODUCTION This project is to study and design an indoor real-time positioning method for managing facilities and workers. Internet of Things (IoT) is a key modern technology to perform the monitoring work. The positioning method not only records which choke points they have passed through, but the real-time locations are also a piece of important information to guarantee that everyone and all equipment are working at a right place and right time. In addition, some restricted areas can be also controlled by ensuring no unauthorized entrance. IoT is a unique tailored interconnection system to link between embedded computing devices and internet infrastructure. There are many different technologies involved to develop an IoT network. Radio Frequency Identification (RFID) is one of the popular technologies to ‘tag’ objects in order to perform a track-and-trace function in various industries, such as supply chain and healthcare industries.

Research paper thumbnail of An Educational Guide to IEEE802.11 WLAN Survey & Visualisation Experiments

Research paper thumbnail of Enhancing Learning Through Technology

WORLD SCIENTIFIC eBooks, Jun 1, 2008

Technology may (or may not!) have altered the classical path of teaching – it is after all, a dis... more Technology may (or may not!) have altered the classical path of teaching – it is after all, a disruptor to the 'chalk and talk' of old and although computer and telecommunications based technologies have been influencing education for a decade or two now, we are still learning how to ...

Research paper thumbnail of A high mobility multipurpose patient monitoring system for inter-building communication

A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter... more A Multipurpose Patient Monitoring System embedded (MPMS) with mobile management profile and inter-building transmission is proposed and developed. This system enables the mobility of ZigBee devices and WiMAX long-distance transmission. Architecture, mobility framework and Adaptive Modulation/Coding (AMC) performance are discussed in details. It is evaluated that the new algorithm offers good efficiency and thus resulting in low management cost. The MPMS aids life saving by providing panic button and location tracking service. The system may be used in telemedicine applications.

Research paper thumbnail of Long Live the English Gentleman

Journal of Modern Literature, 2017

Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across t... more Praseeda Gopinath explores the intertwined discourses of gentlemanliness and imperialism across the twentieth century. As the emblem of Englishness, the gentleman loses its authority as the British Empire contracts, and reinvests itself as the symbol of a resurgent national culture of postwar England. While this narrative of decline and revival is persuasive, it also risks stabilizing the concepts of the "gentleman" and "Englishness."

Research paper thumbnail of Create a Visual Distinctness Web Page to Effect on-line Advertising Effectiveness

Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 2015

The emergence of electronic marketing on the Web has created many issues for Web researchers tryi... more The emergence of electronic marketing on the Web has created many issues for Web researchers trying to discover effective design ways to advertise via the Web. The way different design features are used varies from simple and complex plaint text to colour backgrounds and moveable graphic styles to produce special visual effects to draw the viewer’s attention. The variables of Web page design features, differentiating between effective and less effective, are the core Issues to be examined in this research. This paper describes the design of the experiment and suggests a set of user friendly implementation guidelines and tool usage which will benefit on-line advertising.

Research paper thumbnail of Discussing Public Voting in the Web as a Measure to Democratize Award Decisions

As active and innovative e-learning researchers, we had been part of the voting crowd but also we... more As active and innovative e-learning researchers, we had been part of the voting crowd but also were applicants to public voting contents on the Web.L3T, a project delivering an open textbook about learning and teaching withtechnologies, was applicant at three public voting contests on the Web: at the‘Neue Deutsche Buchpreis” (2011), at the podcast competition of the MMKH(2011) as well as at the MOOC Production Fellowship (2013). According to our experiences made, we got the impression, that there is a need to re-name ‘publicvoting” to ‘social voting”, as it is not ‘the public” (i.e. the crowd) that decideswho wins. In fact, we found out social aspects, i.e. strong and weak ties in so-cial communities to dictate the voting results. Therefore the publication ad-dresses the research question, whether public voting on the Web is a democratic process at all.

Research paper thumbnail of Harnessing the internet as a virtual lab

International Journal of Innovation and Learning, 2006

Abstract: Using the internet for education has become mainstreamed. It has become normal and unex... more Abstract: Using the internet for education has become mainstreamed. It has become normal and unexceptional. There is a wide spectrum of areas in which the net is being used. Some academics focus on the cognitive model of web design for e-learning, some on classroom ...

Research paper thumbnail of Improving Markov Logic Network learning using unlabeled data

2010 International Conference on Machine Learning and Cybernetics, 2010

Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of trainin... more Existing Markov Logic Network (MLN) learning methods aim at learning an MLN from a set of training examples. To reduce the human effort in preparing training examples, we have developed a semi-supervised framework for learning an MLN from unlabeled data and a limited number of training examples. One characteristic of our approach is that instead of maximizing the pseudo-log-likelihood function

Research paper thumbnail of Using E-Learning Platform in Open and Flexible Learning

New Horizon in Web-Based Learning - Proceedings of the Third International Conference on Web-based Learning (ICWL 2004), 2004

USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communicatio... more USING E-LEARNING PLATFORM IN OPEN AND FLEXIBLE LEARNING PHILIP TSANG Electronics and Communications Technology, OUHK, 30 Good Shepherd St Homantin, Hong Kong SAR, China JOSEPH FONG Computer Science Department, City University, Tat Chee Rd ...

Research paper thumbnail of Call admission control for long term evolution

IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011), 2011

In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-... more In this paper, the threshold behavior in Call Admission Control (CAC) is investigated. Two multi-threshold CAC schemes, namely the dual threshold bandwidth reservation and the Tri-threshold bandwidth reservation scheme, are studied. Based on the findings, the novel concept of adaptive threshold for CAC is further investigated. It is concluded that the adaptive CAC scheme can be applied to Long Term Evolution.

Research paper thumbnail of A new win-win-win business service model for the Hong Kong police force

International Journal of Services and Standards, 2012

The operational challenges facing indoor radio coverage to emergency services; especially police,... more The operational challenges facing indoor radio coverage to emergency services; especially police, fire and ambulance are examined. A solution is achieved within the paradigm of a public-private partnership service model. The paper includes a consolidated literature review of the basics of PPP and various PPP research frameworks that lay the background in the development of our PPP-WWW reference model. A review of the challenges associated with the highly profiled HK Police Force project, a Third Generation Command and Control Communications System (CC3) in support of frontline beat patrol police officers, is examined. Finally an innovative PPP business model will be presented and justifications for its acceptance will be delineated.

Research paper thumbnail of A hedonic model for effective web marketing: an empirical examination

Industrial Management & Data Systems, 2005

Purpose – To identify the relative effects of three features of response toward web interface (RW... more Purpose – To identify the relative effects of three features of response toward web interface (RWI) on their advertising promotion effectiveness as measured by the number of accesses to various web pages. Design/methodology/approach – A factorial design experiment was conducted ...

Research paper thumbnail of Community-driven latency measurements in geographically-distributed networks

ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographicall... more ABSTRACT We sought a method of collecting, en masse, connection diagnostics between geographically-distributed client access points—as opposed to latency data between major server nodes. In response, this paper details the creation and launch of a web-based, client-driven, extendable database of client-to-client network latency data (ping data). It demonstrates the potential for distributed processing and data collection contained entirely within the web browser using asynchronous scripting techniques. The paper offers preliminary visual interpretations of an initial global latency dataset.

Research paper thumbnail of Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018

This paper will describe three case studies on the human factors, in personal and public safety a... more This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of "Internet of Things" and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of public safety and cyber security. The growth of disruption by cyber criminals-especially when using small devices and applications to interact with large social networks is a cause for concern. This is part of the evolving development of a cyber-physical world. The paper presents three case studies and proposes a Self-awareness and Intervention Model for public safety and security by increasing and maintaining the awareness, understanding and preparedness of cyber security measures by the individual when using mobile device applications to participate in large social systems and concludes by highlighting the importance of including the human factors and message framing alongside the cyber security measures in place.

Research paper thumbnail of Themed Section: 16th Web Symposium Consortium Conference 2011

Interactive Technology and Smart Education, 2012

Research paper thumbnail of ICT maturity as a driver to global competitiveness: a national level analysis

International Journal of Accounting & Information Management, 2012

ABSTRACT