Engineering and Information Technology Collected Works - Theses

Permanent URI for this collection

Search Results

Now showing 1 - 8 of 8
  • Item
    Thumbnail Image
    Privacy protection, technological change and law reform
    Thom, James. (University of Melbourne, 1985)
    Some parts of this thesis have appeared elsewhere in an earlier form. In particular, Chapter 6 and the first section of Appendix C is based on a paper written with Peter Thorne which appeared in The Australian Computer Journal m November 1983 [Thom 83]. Parts of Chapters 4 to 9 appeared in another paper written with Peter Thorne which has been submitted for publication in 1985 [Thom 85]. These two papers were based on two technical reports ([Thom 82] and [Thom 84]), portions of which also appear in this thesis. The remainder of Appendix C and section 6.2 are substantially from a technical report written with Lee Naish [Naish 83a]; this describes the implementation of the MU-PROLOG deductive database system. In broad terms. Chapters 1 to 5 are a review of the work of others; whereas Chapters 6 to 9 constitute original research. I have endeavoured to acknowledge sources of quotes, ideas and other information via the specific references in the text and in the bibliography. I would like thank Margaret Thom and Rodney Topor who read and made many helpful detailed comments on a draft of this thesis. I would also like to thank all those, including numerous staff and students of the Computer Science Department who have-supported and encouraged me over the years. Finally, I would like to thank Peter Thorne, my supervisor, and acknowledge all his help. We have shared so many ideas together and he has read and commented on numerous drafts of this thesis.
  • Item
    Thumbnail Image
    The influence of microstructure on the wear behaviour of rail and wheel materials
    Mutton, Peter John. (University of Melbourne, 1985)
  • Item
    Thumbnail Image
    High level forms specification in office automation
    Balbin, Isaac, 1959- (University of Melbourne, 1983)
    Electronic replicas of printed forms provide a very convenient man-machine interface for capturing data. In this thesis, we describe, FSL, a very high level language for specifying forms. The specification is complete in that it contains sufficient information for the system to determine the source of the data, what data is valid, how it is to be displayed and the sequence of fields to be visited - which may depend on data previously input and the state of the database. We argue that this approach will significantly reduce the cost of producing software for transaction oriented data processing.
  • Item
    Thumbnail Image
    Annotations of concurrent programs
    Seet, Chern Hway. (University of Melbourne, 1982)
    An annotation of a program is an assignment of assertions to points before and after each statement of the program, and upon this concept is based some of the many proof techniques for concurrent programs described in the literature. We investigate in this thesis properties of the two classes of annotations for concurrent programs : � Correct annotations, which are annotations satisfying certain requirements commonly imposed by the proof techniques described in the literature. � Canonical annotations, which are annotations satisfying certain properties derived from the interpretive semantics of the program. We then study the prospect of employing these two classes of annotations for proving certain types of program properties. We show that canonical annotations can be used to prove all these types of properties but correct annotations only some of them.
  • Item
    Thumbnail Image
    Speech synthesis by modelling the vocal system
    Flower, Michael. (University of Melbourne, 1982)
  • Item
    Thumbnail Image
    A critical assessment of Halstead's software science
    Shepherd, John Andrew. (University of Melbourne, 1981)
  • Item
    Thumbnail Image
    Sediment routing in alluvial streams
    Phillips, Brett C. (Brett Clayton) (University of Melbourne, 1981)
    In this thesis, the sediment routing process has been examined in depth and the validity of a typical commercial computer model, KUWASER, investigated. Sediment routing in KUWASER is accomplished in three steps. Each of these steps has been investigated and the underlying assumptions made in KUWASER tested. A comparison of backwater profile schemes has been undertaken and the relative importance of the standard step scheme and conveyance scheme on the water surface profile has been analysed. The method whereby KUWASER fits relations to hydraulic properties has also been examined. Non-dimensional longitudinal distributions of erosion and deposition have been simulated and analysed. The distribution scheme proposed by Li and Brown (1979), and adopted in KUWASER, has been tested and the results of these comparisons presented. A comparison of several schemes, used to distribute scour around a cross section, has been undertaken. The applicability of these schemes to both in-bank and over-bank flow conditions has been studied and a scour distribution scheme recommended. The variation of Einstein's transport parameters A* and B* with grain size has been analysed and a study conducted. This study resulted in a new plot of the variation of Einstein's transport parameters with grain size being proposed. Several other aspects of Einstein's bed-load theory have also been studied. Finally, a comparison of the longitudinal variation of actual and equilibrium suspended bed-material transport rates in a channel with a gradual change in geometry was also considered. In all the studies conducted, the sensitivity of the results to various sediment and channel properties has been examined and the results of these analyses presented.
  • Item
    Thumbnail Image
    An ice thermal storage computer model
    Chaichana, Chatchawan (University of Melbourne, 1999)
    Thailand is located in a tropical area in which the weather is hot and humid. The use of air conditioning equipment can be found in every commercial or industrial building. The conventional air conditioning system is the most favored option. Ice thermal storage option however is an alternative for energy cost saving. There are two means of operating ice thermal storage, namely full storage and partial storage. Ice is formed at night where the ambient temperature is lower than the day time temperature and there is a possibility of energy saving due to the lower ambient temperature. A computer model has been developed in order to compare the energy use in the conventional air cooling system and ice thermal storage system. Control strategies for ice thermal storage are also presented. The results from the simulations show that the full ice thermal storage can save energy cost up to 55% when compared with the conventional system. On the other hand, the partial ice thermal storage consumes more energy than the conventional system but may be cost effective with Time of Use tariffs.