Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 215

Full-Text Articles in Entire DC Network

Redtnet: A Network Model For Strategy Games, Philip Hingston, Mike Preuss, Daniel Spierling Jan 2010

Redtnet: A Network Model For Strategy Games, Philip Hingston, Mike Preuss, Daniel Spierling

Research outputs pre 2011

In this work, we develop a simple, graph-based framework, RedTNet, for computational modeling of strategy games and simulations. The framework applies the concept of red teaming as a means by which to explore alternative strategies. We show how the model supports computer-based red teaming in several applications: realtime strategy games and critical infrastructure protection, using an evolutionary algorithm to automatically detect good and often surprising strategies.


Light Reductions Drive Macroinvertebrate Changes In Amphibolis Griffithii Seagrass Habitat, Adam Gartner, Paul S. Lavery, Kathryn Mcmahon, Anne Brearley, Helen Barwick Jan 2010

Light Reductions Drive Macroinvertebrate Changes In Amphibolis Griffithii Seagrass Habitat, Adam Gartner, Paul S. Lavery, Kathryn Mcmahon, Anne Brearley, Helen Barwick

Research outputs pre 2011

Numerous anthropogenic activities can significantly reduce the amount of light reaching seagrass habitats. Typically these result in morphological and physiological changes to the plant and associated algal epiphytes. However, the flow-on effects to seagrass-dependent fauna induced by these disturbances has yet to be examined. This study investigated the effects of different light reduction intensity (high: ~92% reduction; moderate: ~84% reduction), duration (3, 6 and 9 mo) and timing (post-winter and post-summer) on the density and biomass of macroinvertebrate epifauna within an Amphibolis griffithii seagrass ecosystem (Western Australia). There were generally lower epifauna densities and biomass within shaded seagrass plots. When …


Android Forensics: Simplifying Cell Phone Examinations, Jeff Lessard, Gary Kessler Jan 2010

Android Forensics: Simplifying Cell Phone Examinations, Jeff Lessard, Gary Kessler

Research outputs pre 2011

It is hardly appropriate to call the devices many use to receive the occasional phone call a telephone any more. The capability of these devices is growing, as is the number of people utilizing them. By the end of 2009, 46.3% of mobile phones in use in the United States were reported to be smart phones (AdMob, 2010). With the increased availability of these powerful devices, there is also a potential increase for criminals to use this technology as well. Criminals could use smart phones for a number of activities such as committing fraud over e-mail, harassment through text messages, …


How Do You Make Information Security User Friendly?, Andrew Jones Jan 2010

How Do You Make Information Security User Friendly?, Andrew Jones

Research outputs pre 2011

This article explores the past and the present situation, outlines a new approach, and presents conclusions.


Autonomous Bee Colony Optimization For Multi-Objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, M Chandramohan Jan 2010

Autonomous Bee Colony Optimization For Multi-Objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, M Chandramohan

Research outputs pre 2011

An Autonomous Bee Colony Optimization (A-BCO) algorithm for solving multi-objective numerical problems is proposed. In contrast with previous Bee Colony algorithms, A-BCO utilizes a diversity-based performance metric to dynamically assess the archive set. This assessment is employed to adapt the bee colony structures and flying patterns. This self-adaptation feature is introduced to optimize the balance between exploration and exploitation during the search process. Moreover, the total number of search iterations is also determined/optimized by A-BCO, according to user pre-specified conditions, during the search process. We evaluate A-BCO upon numerical benchmark problems and the experimental results demonstrate the effectiveness and robustness …


A New Design For A Turing Test For Bots, Philip Hingston Jan 2010

A New Design For A Turing Test For Bots, Philip Hingston

Research outputs pre 2011

Interesting, human-like opponents add to the entertainment value of a video game, and creating such opponents is a difficult challenge for programmers. Can artificial intelligence and computational intelligence provide the means to convincingly simulate a human opponent? Or are simple programming tricks and deceptions more effective? To answer these questions, the author designed and organised a game bot programming competition, the BotPrize, in which competitors submit bots that try to pass a “Turing Test for Bots”. In this paper, we describe a new design for the competition, which will make it simpler to run, and, we hope, open up new …


An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell Jan 2010

An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell

Research outputs pre 2011

As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect yourself is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been directed at organizations, with a few national programs focused upon home users. Given people's use of technology is primarily focused upon those two areas: …


Official/ Unofficial: Information Management And Social Association, Kay Hearn Jan 2010

Official/ Unofficial: Information Management And Social Association, Kay Hearn

Research outputs pre 2011

This paper explores the debates around civil society and corporatism as ways of understanding changes in social association, including non-governmental organisations and protest groups, and information management in relation to the development of the Internet. Both concepts have been used to examine the changes that have taken place since the implementation of the Open Door Policy and more recently the development of the Internet, and have shed light on the way in which new forms of social association operate, and on their relationship to the government. However, both concepts tend to be deterministic and eductionist positions. Instead, I use a …


A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng Jan 2010

A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng

Research outputs pre 2011

The identification of ballistics specimens from imaging systems is of paramount importance in criminal investigation. Binarization plays a key role in preprocess of recognizing cartridges in the ballistic imaging systems. Unfortunately, it is very difficult to get the satisfactory binary image using existing binary algorithms. In this paper, we utilize the global and local thresholds to enhance the image binarization. Importantly, we present a novel criterion for effectively detecting edges in the images. Comprehensive experiments have been conducted over sample ballistic images. The empirical results demonstrate the proposed method can provide a better solution than existing binary algorithms.


The Adsl Router Forensics Process, Patryk Szewczyk Jan 2010

The Adsl Router Forensics Process, Patryk Szewczyk

Research outputs pre 2011

In 2010 the number of threats targeting ADSL routers is continually increasing. New and emergent threats have been developed to bypass authentication processes and obtain admin privileges directly to the device. As a result many malicious attempts are being made to alter the configuration data and make the device subsequently vulnerable. This paper discusses the non-invasive digital forensics approach into extracting evidence from ADSL routers. Specifically it validates an identified digital forensic process of acquisition. The paper then discusses how the approach may be utilised to extract configuration data ever after a device has been compromised to the point where …


Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin Jan 2010

Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin

Research outputs pre 2011

The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate ‘identities’ for different aspects of our on-line interactions. Proving beyond a reasonable doubt that an individual that is suspected of a crime that is based on the technologies that we increasingly rely on was the actual perpetrator has always been problematic. …


Evolving Group Strategies For Ipd, Philip Hingston Jan 2010

Evolving Group Strategies For Ipd, Philip Hingston

Research outputs pre 2011

The Iterated Prisoners Dilemma (IPD) is often used to model cooperation between self-interested agents. In an earlier study, we introduced a framework using IPD to study the effects of species-level competition on the evolution of cooperative behaviour. In this paper, we extend the previous work, using co-evolutionary simulations of interactions between species of IPD-playing agents to investigate how group strategies may evolve. We find that the ability to cooperate more with agents of the same species greatly increases the ferocity of competition between species.


A Novel Subspace Outlier Detection Approach In High Dimensional Data Sets, Jinsong Leng Jan 2010

A Novel Subspace Outlier Detection Approach In High Dimensional Data Sets, Jinsong Leng

Research outputs pre 2011

Many real applications are required to detect outliers in high dimensional data sets. The major difficulty of mining outliers lies on the fact that outliers are often embedded in subspaces. No efficient methods are available in general for subspace-based outlier detection. Most existing subspacebased outlier detection methods identify outliers by searching for abnormal sparse density units in subspaces. In this paper, we present a novel approach for finding outliers in the ‘interesting’ subspaces. The interesting subspaces are strongly correlated with `good' clusters. This approach aims to group the meaningful subspaces and then identify outliers in the projected subspaces. In doing …


A Wrapper-Based Feature Selection For Analysis Of Large Data Sets, Jinsong Leng, Craig Valli, Leisa Armstrong Jan 2010

A Wrapper-Based Feature Selection For Analysis Of Large Data Sets, Jinsong Leng, Craig Valli, Leisa Armstrong

Research outputs pre 2011

Knowledge discovery from large data sets using classic data mining techniques has been proved to be difficult due to large size in both dimension and samples. In real applications, data sets often consist of many noisy, redundant, and irrelevant features, resulting in degrading the classification accuracy and increasing the complexity exponentially. Due to the inherent nature, the analysis of the quality of data sets is difficult and very limited approaches about this issue can be found in the literature. This paper presents a novel method to investigate the quality and structure of data sets, i.e., how to analyze whether there …


Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli Jan 2010

Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

The paper examines the advice and support provided by seven major Internet Service Providers in Australia through late 2009 and early 2010 in relation to computer and network security. Previous research has indicated that many end-users will attempt to utilise the support provided by Internet Service Providers as a simple and effective method by which to obtain key information in regards to computer security. This paper demonstrates that in many cases the individuals working at the help desk are either reluctant to provide IT security support or have insufficient skill to provide the correct information.


Behaviour Profiling On Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland Jan 2010

Behaviour Profiling On Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland

Research outputs pre 2011

Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortunately, whilst the popularity of mobile devices has increased, a corresponding increase can also be identified in the threats being targeted towards these devices. Security countermeasures such as AV and firewalls are being deployed, however, the increasing sophistication of the attacks requires additional measures to be taken. This paper proposes a novel behaviour-based profiling technique that is able to build upon the weaknesses of current systems by developing a comprehensive multilevel approach to profiling. In support of this model, a series of experiments have been …


A Distributed And Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, P L Reynolds Jan 2010

A Distributed And Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, P L Reynolds

Research outputs pre 2011

As the requirement for companies and individuals to protect information and personal details comes more into focus, the implementation of security that goes beyond the ubiquitous password or Personal Identification Number (PIN) is paramount. With the ever growing number of us utilizing more than one device simultaneously, the problem and need is compounded. This paper proposes a novel approach to security that leverages the collective confidence of user identity held by the multiplicity of devices present at any given time. User identity confidence is reinforced by sharing established credentials between devices, enabling them to make informed judgments on their own …


An Online Ballistics Imaging System For Firearm Identification, Zhihu Huang, Jinsong Leng Jan 2010

An Online Ballistics Imaging System For Firearm Identification, Zhihu Huang, Jinsong Leng

Research outputs pre 2011

Since the traditional ballistics imaging system is dependent upon the expertise and experience of end-user, an intelligent ballistics imaging system is highly demanded to overcome the drawbacks of traditional techniques. This paper aims to develop a novel ballistics imaging system so as to combine the traditional functions with new features such as the line-scan image module, the characteristics extraction module, and the intelligent image processing module. With the help of these features, the new system can identify firearm more efficiently and effectively than the traditional techniques.


Analysis Of Hu's Moment Invariants On Image Scaling And Rotation, Zhihu Huang, Jinsong Leng Jan 2010

Analysis Of Hu's Moment Invariants On Image Scaling And Rotation, Zhihu Huang, Jinsong Leng

Research outputs pre 2011

Moment invariants have been widely applied to image pattern recognition in a variety of applications due to its invariant features on image translation, scaling and rotation. The moments are strictly invariant for the continuous function. However, in practical applications images are discrete. Consequently, the moment invariants may change over image geometric transformation. To address this research problem, an analysis with respect to the variation of moment invariants on image geometric transformation is presented, so as to analyze the effect of image's scaling and rotation. Finally, the guidance is also provided for minimizing the fluctuation of moment invariants.


Employee Engagement With A Corporate Physical Activity Program: The Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, Nadine Henley Jan 2010

Employee Engagement With A Corporate Physical Activity Program: The Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, Nadine Henley

Research outputs pre 2011

Employers engage with corporate physical activity programs to foster employee wellbeing with a view to reducing the costs of absence and recruitment. This study reports on employee engagement with a commercial program, the Global Corporate Challenge, in terms of motivation, barriers, team dynamics, social aspects and self-reported physical activity levels. It uses guided introspection to explore how participation affected employee's motivation to sustain regular physical activity within the workplace setting. The program raised awareness of employees' individual physical activity levels and fostered social interaction in the workplace. Findings highlight the importance of employers providing a supportive context, fostering staff-led team …


Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen Jan 2010

Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen

Research outputs pre 2011

This paper will propose a data mining framework for the identification of agricultural production areas ill WA. The data mining (DM) framework was developed with the aim of enhancing the analysis of agricultural datasets compared to currently used statistical methods. The DM framework is a synthesis of different technologies brought together for the purpose of enhancing the interrogation of these datasets. The DM framework is based on the data, information, knowledge and wisdom continuum as a horizontal axis, with DM and online analytical processing (OLAP) forming the vertical axis. In addition the DM framework incorporates aspects of data warehousing phases, …


The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone Jan 2010

The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone

Research outputs pre 2011

Study investigates the relationship between the Kolb learning style of first-year programming students and their level of achievement. The method of data collection is described and the process of hypothesis testing is explained. The students in this study were predominately converger and accommodator learning styles. Statistical tests indicated no overall difference between the results of students with different learning styles but a difference was found along Kolb's concrete-abstract axis. A number of possible impacts on teaching are discussed and suggestions made for future research.


Stable Isotopes Reveal A Consistent Consumer-Diet Relationship Across Hundreds Of Kilometres, Mathew A. Vanderklift, Thomas Wernberg Jan 2010

Stable Isotopes Reveal A Consistent Consumer-Diet Relationship Across Hundreds Of Kilometres, Mathew A. Vanderklift, Thomas Wernberg

Research outputs pre 2011

Characterising geographical variation in trophic interactions is an important step towards understanding the consequences of changes in food webs. We characterised geographical variation across ~1000 km in stable isotope values (δ15N and δ13C) of the widely distributed sea urchin Heliocidaris erythrogramma and macroalgae that are its potential food. Variation in δ15N of H. erythrogramma and macroalgae was typically greatest among locations separated by hundreds of km, while variation in δ13C was typically greatest among reefs separated by a few km. Geographical variation in δ15N and δ13C of H. erythrogramma was well-explained by variation in δ15N and δ13C of the kelp …


Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen Jan 2010

Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen

Research outputs pre 2011

Current environmental challenges such as increasing dry land salinity, water logging, eutrophication and high nutrient runoff in south western regions of Western Australia (WA) may have both cultural and environmental implications in the near future. Advances in computing through the application of data mining ,and geographic information services provide the tools to conduct •studies that can indicate possible changes in these water catchment areas of WA. The research examines the existing spatial data mining techniques that can be used to interpret trends in WA water catchment land use. Large GIS data sets of the water catchments on Peel-Harvey region have …


Proximity To Rocky Reefs Alters The Balance Between Positive And Negative Effects On Seagrass Fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, Christine Hanson Jan 2010

Proximity To Rocky Reefs Alters The Balance Between Positive And Negative Effects On Seagrass Fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, Christine Hanson

Research outputs pre 2011

Proximity to habitat margins can alter the balance between positive and negative forces on species abundance. Based on this idea we examined abundance patterns of herbivorous gastropods in seagrasses adjacent to rocky reefs. We tested whether the balance between the intensity of predation (negative effect) and recruitment of new individuals (positive effect) changes with increasing distance from reefs. Abundances of gastropods varied with distance to reefs, but the direction of changes in abundance was taxon-specific: some taxa decreased in abundance with increasing distance from reefs (e.g. Pyrene bidentata), while others showed the opposite pattern (e.g. Cantharidus lepidus). Predators were more …


Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe Jan 2010

Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe

Research outputs pre 2011

A Photonic-based multi-wavelength sensor capable of discriminating objects is proposed and demonstrated for intruder detection and identification. The sensor uses a laser combination module for input wavelength signal multiplexing and beam overlapping, a custom-made curved optical cavity for multi-beam spot generation through internal beam reflection and transmission and a high-speed imager for scattered reflectance spectral measurements. Experimental results show that five different wavelengths, namely 473nm, 532nm, 635nm, 670nm and 785nm, are necessary for discriminating various intruding objects of interest through spectral reflectance and slope measurements. Objects selected for experiments were brick, cement sheet, cotton, leather and roof tile.


Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen Jan 2009

A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen

Research outputs pre 2011

We introduce in this paper a new semiparametric approach to a nonlinear ACD model, namely the Semiparametric ACD (SEMI-ACD) model. This new model is more flexible in the sense that the data are allowed to speak for themselves, without a hypothetical assumption being imposed arbitrarily on its key component. Moreover, it enables a much more thorough examination of the intertemporal importance of the conditional duration on the ACD process. Our experimental analysis suggests that the new model possesses a sound asymptotic character, while its performance is also robust across data generating processes and assumptions about the conditional distribution of the …


Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris Jan 2009

Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris

Research outputs pre 2011

Autoregressive conditional duration (ACD) models play an important role in financial modeling. This paper considers the estimation of the Weibull ACD model using a semiparametric approach based on the theory of estimating functions (EF). We apply the EF and the maximum likelihood (ML) methods to a data set given in Tsay (2003, p203) to compare these two methods. It is shown that the EF approach is easier to apply in practice and gives better estimates than the MLE. Results show that the EF approach is compatible with the ML method in parameter estimation. Furthermore, the computation speed for the EF …


A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao Jan 2009

A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao

Research outputs pre 2011

An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have to be added if the final test sequence generated was not started from the same starting state of the given FSM. A new approach is proposed in this paper to overcome this problem thus to improve the quality …