Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [ECUPub] (3)
- Deception (2)
- Geology (2)
- Multivariate analysis (2)
- Statistical methods (2)
-
- ARMA model (1)
- Algorithm (1)
- Australia and Hacking (1)
- Bank deposits (1)
- Banksia -- Ecology -- Western Australia (1)
- Composition (1)
- Computer algorithms (1)
- Computer networks (1)
- Computer programs (1)
- Computer simulation. (1)
- Computer software (1)
- Computer vision (1)
- Computers and Society (1)
- Development. (1)
- Digital techniques (1)
- Disintermediation (1)
- EWMA (1)
- Fignerprinting (1)
- Forensics (1)
- Foxes -- Control -- Western Australia -- Perth (1)
- Foxes -- Environmental aspects -- Western Australia -- Perth (1)
- Geology -- Statistical methods (1)
- Graphical User Interfaces (Computer systems) (1)
- Graphics (1)
- Heathland plants -- Western Australia -- Wedge (1)
- Publication Type
Articles 1 - 19 of 19
Full-Text Articles in Entire DC Network
Australian Hackers And Ethics, Matthew Warren, William Hutchinson
Australian Hackers And Ethics, Matthew Warren, William Hutchinson
Research outputs pre 2011
The aim of the paper is to look at the way hackers act and ways in which society can protect itself. The paper will show the current views and attitudes of hackers in an Australian context. The paper will also include a case study to show how a hacking incident can develop and how technology can be used to protect against hacking.
Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca
Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca
Research outputs pre 2011
This paper describes the philosophy and pedagogy informing the design and development of Security Science online units. The Physical Security unit is used to illustrate the development of the online learning strategies and interactive activities. Learning materials developed for this course have unique attributes as they were specifically designed to provide simulations and interactivity in the learning process. Field scenarios have been developed for the activities to make the learning experiences as realistic as possible. Simulations and graphics provide these experiences, together with security site images for actual security barriers, systems and technologies. Features of units in the course include …
Applications Of Recursive Estimation Methods In Statistical Process Control, Shelton Peiris, Aerambamoorthy Thavaneswaran, David E. Allen, R. Mellor
Applications Of Recursive Estimation Methods In Statistical Process Control, Shelton Peiris, Aerambamoorthy Thavaneswaran, David E. Allen, R. Mellor
Research outputs pre 2011
In recent years there has been a growing interest in recursive estimation techniques as applied to statistical process control (SPC). In cases where prior information about the processes are available, it is shown that procedures based on the “optimal” smoothing can be superior to the classical procedures like Shewhart’s CUSUM control charts (see, for instance, Thavaneswaran, McPherson and Abraham (1998)). This paper reviews the recursive algorithms based on EWMA (exponentially weighted moving average), DLM (dynamic linear modeling), KF (Kalman filtering) and OS (optimal smoothing) in statistical process control with correlated data. We also discuss various relationships among the asymptotic mean …
Some Evidence On The Information Content Of Undisclosed Limit Orders On The Asx, M. Aitken, David E. Allen, Wenling J. Yang
Some Evidence On The Information Content Of Undisclosed Limit Orders On The Asx, M. Aitken, David E. Allen, Wenling J. Yang
Research outputs pre 2011
This paper is concerned with investigating the information content of undisclosed limit orders, and identifying factors that affect their size, plus the examination of the brokers’ behaviour in using undisclosed orders. We adopt a sample of liquid stocks listed on the ASX, and our estimation results indicate that the size of undisclosed orders are affected by a number of factors. Given the ‘stealth trading’ pattern of behaviour observed in large disclosed orders, this paper provides evidence to support a similar pattern of behaviour in the case of undisclosed orders. Our model also provides an appropriate measure for estimating the size …
A Case Study In The Security Of Network-Enabled Devices, Simeon Xenitellis, Craig Valli
A Case Study In The Security Of Network-Enabled Devices, Simeon Xenitellis, Craig Valli
Research outputs pre 2011
It is becoming increasingly common for appliances and other electronic devices to be network-enabled for usability and automation purposes. There have been fears that malicious users can control such devices remotely. Since the installation base of such network-enabled household devices is still relatively small, we examine the types of vulnerabilities that another such applicance has, the network-enabled printer, which is commonly found in the education and business sector. In this paper we analyse the source of the vulnerabilities and present detailed threat scenarios. In addition, we examine four organisations in Australia and Europe. Based on the results of the case …
Effects Of Bank Funds Management Activities On The Disintermediation Of Bank Deposits, David E. Allen, Jerry T. Parwada
Effects Of Bank Funds Management Activities On The Disintermediation Of Bank Deposits, David E. Allen, Jerry T. Parwada
Research outputs pre 2011
This study investigates the alleged disintermediation of banks’ traditional deposit-taking in favour of investment management activities. Using data on Australian bank-affiliated funds and a nine-year record of the parent banks’ liability balances, this study finds that managed funds do not displace bank liabilities. Prudential capital adequacy requirements dissuade banks from using in-house managed investments as indirect conduits for raising funds in the same manner as deposit-taking.
Honeyd - A Os Fingerprinting Artifice, Craig Valli
Honeyd - A Os Fingerprinting Artifice, Craig Valli
Research outputs pre 2011
The research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis tools. A honeypots ability to reliably deceive intruders is a key factor in gathering reliable and forensically sound data. Honeyd's primary deceptive mechanism is the use of the NMAP fingerprint database to provide bogus OS fingerprints to would be intruders. Tests conducted by the author on honeyd's ability to provide bogus fingerprints sees 78% of 704 signatures invalidated under heavy probing. However, the tests left 152 viable signatures for producing hardened honeypot designs.
Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston
Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston
Research outputs pre 2011
The aim of this research was to automate the composition of convincingly “real” music in specific musical genres. By “real” music we mean music which is not obviously “machine generated”, is recognizable as being of the selected genre, is perceived as aesthetically pleasing, and is usable in a commercial context. To achieve this goal, various computational techniques were used, including genetic algorithms and finite state automata. The process involves an original, top down approach and a bottom up approach based on previous studies. Student musicians have objectively assessed the resulting compositions.
Multivariate Geostatistical Analysis With Application To A Western Australian Nickel Laterite Deposit, Ellen Bandarian
Multivariate Geostatistical Analysis With Application To A Western Australian Nickel Laterite Deposit, Ellen Bandarian
Theses : Honours
Although it can be time consuming and computationally more expensive to work with multivariate data, it is often desirable to exploit the relationships among and between the variables sampled across a study region. In most cases the availability of this secondary information can enhance the estimation of the primary variable(s). The aim of this research is to describe and then demonstrate the use of multivariate statistical methods in geostatistical analysis. The methods will be illustrated by application to a multivariate data set from an actual mineralisation. The data suite is known as MM22D and comes from the Murrin Murrin nickel …
Floristics Of The Banksia Woodlands On The Wallingup Plain In Relation To Environmental Parameters, Claire Mccamish
Floristics Of The Banksia Woodlands On The Wallingup Plain In Relation To Environmental Parameters, Claire Mccamish
Theses : Honours
An understanding of the underlying environmental factors contributing to the floristic composition of Banksia woodlands should improve the effective management of Banksia woodland communities of the Swan Coastal Plain. Although a number of studies have examined the vegetation on the Banksia woodlands on detail there have been few studies aimed at identifying the specific environmental parameters influencing the floristic gradients on the Swan Coastal Plain. A comprehensive local scale study was undertaken on the northern Swan Coastal Plain to determine the environmental correlates influencing floristic communities in an area of Banks/a woodland known as the Wallingup Plain. Vegetation communities of …
A Linux-Based Graphical User Interface For The Creation And Reading Of The Frame Format: Version 2.4, Muhammed Aoun
A Linux-Based Graphical User Interface For The Creation And Reading Of The Frame Format: Version 2.4, Muhammed Aoun
Theses : Honours
To gain further knowledge of how the universe began, a new international co-operated project wishes not only to "see" stars exploding, but also to "hear" the explosion. It is theorised that the ability to "listen" to an explosion is possible by detecting gravitational waves. Gravitational waves are omitted when a star explodes, travelling through the cosmos at an exceptional speed. It is estimated that a gravity wave takes only 40 milliseconds to pass through the earth. Thus the aim of this international collaboration is to detect a gravitational wave. To accurately detect such waves, there needs to be several global …
A Deception Based Framework For The Application Of Deceptive Countermeasures In 802.11b Wireless Networks, Suen Yek
Theses : Honours
The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were …
Use Of Multi-Scale Phase-Based Methods To Determine Optical Flow In Dynamic Scene Analysis, Robert Hastings
Use Of Multi-Scale Phase-Based Methods To Determine Optical Flow In Dynamic Scene Analysis, Robert Hastings
Theses: Doctorates and Masters
Estimates of optical flow in images can be made by applying a complex periodic transform to the images and tracking the movement of points of constant phase in the complex output. This approach however suffers from the problem that filters of large width give information only about broad scale image features, whilst those of small spatial extent (high resolution) cannot track fast motion, which causes a feature to move a distance that is large compared to the filter-size. A method is presented in which the flow is measured at different scales, using a series of complex filters of decreasing width. …
Geostatistical Optimisation Of Sampling And Estimation In A Nickel Laterite Deposit, Mark P. Murphy
Geostatistical Optimisation Of Sampling And Estimation In A Nickel Laterite Deposit, Mark P. Murphy
Theses: Doctorates and Masters
Nickel and cobalt are key additives to metal alloys in modem industry. The largest worldwide nickel-cobalt resources occur in nickel laterite deposits that have formed during the chemical weathering of ultramafic rocks at the Earth's surface. At the Murrin Murrin mine in Western Australia, the nickel laterite deposits occur as laterally extensive, undulating blankets of mineralisation with strong vertical anisotropy, near normal nickel distributions, and positively skewed cobalt distributions. The mineral resources in nickel laterite deposits in Murrin Murrin are usually estimated from drilling and sampling on relatively wide-spaced drill patterns that are supported by local clusters of close-spaced sampling. …
Wedge Veg : Gradient Analysis Of Impacts To Coastal Heath Vegetation At Wedge, Western Australia, Steven O'Dwyer
Wedge Veg : Gradient Analysis Of Impacts To Coastal Heath Vegetation At Wedge, Western Australia, Steven O'Dwyer
Theses : Honours
A reliable technique to assess impacts to coastal zones is required as coastal areas across the world are under pressure from an increasing human presence. The result is a greater level of disturbance to the coast, both marine and terrestrial. This study addresses a worldwide problem but is focused to a local scale. Wedge, on the central coast of Western Australia, supports a squatter shack settlement and has done so for approximately 50 years. Over time, the number of shacks, campers, tourists, 4WD's and motorbikes has increased. In recent years this growth has been significant. Management of this area and …
Fox Control In Urban Conservation Reserves: An Analysis Of Bait Uptake And Public Perceptions In The Perth Metropolitan Area, Jennifer Jackson
Fox Control In Urban Conservation Reserves: An Analysis Of Bait Uptake And Public Perceptions In The Perth Metropolitan Area, Jennifer Jackson
Theses : Honours
As the world's population becomes increasingly urbanised, the need for people to see nature on their doorstep is becoming more appealing. The city of Perth (Western Australia) has large areas of bushland that have been reserved as conservation estate, and therefore are only minimally modified by urban development. But while many of these urban bushland reserves contribute highly to biodiversity in the form of vegetation, vertebrate surveys have indicated a low diversity of fauna. These areas have the potential to function in a more complete manner as nature reserves with significant conservation value by supporting populations of native animals which …
Wavelet-Based Simulation Of Geological Variables, T. T. Tran
Wavelet-Based Simulation Of Geological Variables, T. T. Tran
Theses: Doctorates and Masters
This thesis introduces a number of conditional simulation algorithms using wavelet bases. These make use of two orthogonal wavelet bases, the Haar and the Db2 bases. Firstly, two single-level algorithms are introduced, HSIM: with the Haar basis and DB2SIM with the Db2 basis. HSIM reproduces the histogram and semivariogram model of isotropic samples but not the semivariogrnm model of anisotropic samples. DB2SIM reproduces the histogram and semivariogram model in both the isotropic and anisotropic cases but, because of the conditioning method employed, is not as computationally efficient as we would wish. Because of the limitations of HSIM and Db2SIM two …
Developing A Catalogue Of Errors And Evaluating Its Impact On Software Development, Indrit Troshani
Developing A Catalogue Of Errors And Evaluating Its Impact On Software Development, Indrit Troshani
Theses: Doctorates and Masters
The development of quality software is of paramount importance, yet this has been and continues to be an elusive goal for software engineers. Delivered software often fails due to errors that are injected during its development. Correcting these errors early in the development or preventing them altogether can, therefore, be considered as one way to improve software quality. In this thesis, the development of a Catalogue of Errors is described. Field studies with senior software engineering students are used to confirm that developers using the Catalogue of Errors commit fewer errors in their development artifacts. The impact of the Catalogue …
A Drop In The Bucket: Collective Efficacy Perceptions Affect Waste Minimising Behaviours, Leesa N. Bonniface
A Drop In The Bucket: Collective Efficacy Perceptions Affect Waste Minimising Behaviours, Leesa N. Bonniface
Theses: Doctorates and Masters
The goal of this thesis was to inform a social marketing effort designed to increase environmentally friendly behaviours in an effort to ensure a more sustainable future. This study attempted to gain a better understanding of the discrepancy that exists between pro-environmental concerns and pro-environmental actions by exploring efficacy perceptions. Efficacy beliefs were compared for three groups of individuals: 1) environmentally active/members of an environmental group; 2) environmentally active/not members of an environmental group; 3) environmentally inactive and not members of an environmental group. Six focus groups were conducted and interviewees were recruited from the Earth Carers' organisation and the …