Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 58 of 58

Full-Text Articles in Entire DC Network

Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong Jan 2005

Potential Bluetooth Vulnerabilities In Smartphones, Lih Wern Wong

Research outputs pre 2011

Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-enable smartphones, leading to severe data breaches. This paper gives an insight on potential security vulnerabilities in Bluetooth-enabled smartphones and how these vulnerabilities may affect smartphone users. This paper is discussed from the viewpoint of Bluetooth weaknesses and implementation flaws, which includes pairing, weak key storage, key disclosure, key …


Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins Jan 2005

Identity Synthesis: Creating An Identity From Scratch, Lennon Hopkins

Research outputs pre 2011

A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fabrication has been focused on the unlawful or the malicious use of created identities. Admittedly, the primary intention of a falsified identity is to usually gain a financial benefit however, instances such as long-term witness protection would provide a legitimate need …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson Jan 2005

A Discussion On Developing Online Learning Communities For Student Information Professionals, Karen Anderson

Research outputs pre 2011

The Internet provides a wealth of resources and opportunities for enhancing professional education. In professional education courses for archivists and records managers, students can shape their own learning and develop professional skills through authentic assessment strategies which require them to find, analyse and evaluate policy documents and best practice standards published by leading archival organizations. Use of online discussion facilities provided by the ECU School of Computer and Information Science's eCourse system allows students to engage in professional discussion just as they would in the workplace while developing communication and information literacy skills. Student evaluations of this form of assessment …


Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li Jan 2005

Ad2us: An Automated Approach To Generating Usage Scenarios From Uml Activity Diagrams, Robert Chandler, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

Although attention has been given to the use of UML (Unified Modelling Language) activity diagrams in the generation of scenarios, thin-threads and test-cases, the processes described in the literature rely heavily on manual intervention either in the information extraction process or in the process of transforming them to an alternate structure. This paper introduces an approach that capture, store and output usage scenarios derived automatically from UML activity diagrams.


From Smorgasbord To Satisfying Meal: An Holistic Approach To Information Literacy And Lifelong Learning, Barbara Combes Jan 2005

From Smorgasbord To Satisfying Meal: An Holistic Approach To Information Literacy And Lifelong Learning, Barbara Combes

Research outputs pre 2011

Educators have long recognised the potential offered by technology as a tool for learning. However, there have been few attempts to provide teachers in the classroom with a framework that assist them to embed technology into curriculum programs in a pedagogically sound manner. This paper details the development and implementation of a module of online curriculum developed for Year Eleven Food Technology (sixteen years of age) students. The module was developed using a framework (CLEO - Curriculum Learning and Education Online) that embeds learning technologies, utilises industry partnerships, has cross curriculum outcomes, scaffolds information literacy skills development and was the …


Enumerating Knight's Tours Using An Ant Colony Algorithm, Philip Hingston, Graham Kendall Jan 2005

Enumerating Knight's Tours Using An Ant Colony Algorithm, Philip Hingston, Graham Kendall

Research outputs pre 2011

In this paper, we show how an ant colony optimisation algorithm may be used to enumerate knight's tours for variously sized chessboards. We have used the algorithm to enumerate all tours on 5×5 and 6×6 boards, and, while the number of tours on an 8×8 board is too large for a full enumeration, our experiments suggest that the algorithm is able to uniformly sample tours at a constant, fast rate for as long as is desired.


Designing Comminution Circuits With A Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, Richard Bearman Jan 2005

Designing Comminution Circuits With A Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, Richard Bearman

Research outputs pre 2011

Mining is an important industry in Australia, contributing billions of dollars to the economy. The performance of a processing plant has a large impact on the profitability of a mining operation, yet plant design decisions are typically guided more by intuition and experience than by analysis. In this paper, we motivate the use of an evolutionary algorithm to aid in the design of such plants. We formalise plant design in terms suitable for application in a multi-objective evolutionary algorithm and create a simulation to assess the performance of candidate solutions. Results show the effectiveness of this approach with our algorithm …


Information Security: A Misnomer, William Hutchinson Jan 2005

Information Security: A Misnomer, William Hutchinson

Research outputs pre 2011

This paper argues that the definition of 'information' is crucial to the understanding of 'information security'. At present, information security concentrates on the technological aspects of data, computer and network security. This computer-centric approach ignores the fact that the majority of information within an organisation is derived from other sources than computer stored data. The implications for security are that much data can be leaked from an organisation even if the computer and network systems are secured.


Architecture For Self-Estimation Of Security Level In Ad Hoc Network Nodes, Reijo Savola Jan 2005

Architecture For Self-Estimation Of Security Level In Ad Hoc Network Nodes, Reijo Savola

Research outputs pre 2011

Inherent freedom due to a lack of central authority of self-organised mobile ad hoc networks introduces challenges to security and trust management. In these kinds of scenarios, the nodes themselves are naturally responsible for their own security – or they could trust certain known nodes, called “micro-operators”. We propose an architecture for security management in self-organising mobile ad hoc networks that is based on the nodes’ own responsibility and node-level security monitoring. The aim is to predict, as well as to monitor the security level concentrating on the principal effects contributing to it.


Understanding Transition Towards Information Security Culture Change, Leanne Ngo, Wanlei Zhou, Matthew Warren Jan 2005

Understanding Transition Towards Information Security Culture Change, Leanne Ngo, Wanlei Zhou, Matthew Warren

Research outputs pre 2011

Transitioning towards an information security culture for organisations has not been adequately explored in the current security and management literature. Many authors have proposed how information security culture can be created, fostered and managed within organisations, but have failed to adequately address the transition process towards information security culture change, particularly for small medium enterprises (SMEs). This paper aims to (1) recapitulate key developments and trends within information security culture literature; (2) explore in detail the transition process towards organisational change; (3) adapt the transition process with respects to the key players involved in transition and propose a transition model …


An Investigation Into The Paradox Of Organisational Flexibility Versus Security: A Research Project, Rosanna Fanciulli Jan 2005

An Investigation Into The Paradox Of Organisational Flexibility Versus Security: A Research Project, Rosanna Fanciulli

Research outputs pre 2011

The trend towards utilising geographically and temporally dispersed personnel has grown quickly over the past decade; enabled by swift advances in computing, telecommunications, and networking technologies. The impact of these developments on corporate strategies and forms has manifested itself in a move to de-legitimise the rigid structure of a traditional bureaucracy and move towards one that is more flexible. These new technologies and organisational structures, however, also bring with them Information Security threats and risks. It is critical that managers become informed and equipped to deal with these issues. This paper presents an ongoing study designed to determine the major …


Detecting Rogue Access Points That Endanger The Maginot Line Of Wireless Authentication, Zhiqi Tao, A. B. Ruighaver Jan 2005

Detecting Rogue Access Points That Endanger The Maginot Line Of Wireless Authentication, Zhiqi Tao, A. B. Ruighaver

Research outputs pre 2011

The rapid growth in deployment of wireless networks in recent years may be an indication that many organizations believe that their system will be adequately secured by the implementation of enhanced encryption and authentication. However, in our view, the emphasis on cryptographic solutions in wireless security is repeating the history of the “Maginot Line”. Potential attackers of wireless networks currently will find many ways to get access to wireless networks to compromise the confidentiality of information without the need to crack the encryption. In this paper we analyze how rogue access points threaten the security of an organization’s wireless network …


Multinomial Representation Of Majority Logic Coding, John B. Moore, Keng T. Tan Jan 2005

Multinomial Representation Of Majority Logic Coding, John B. Moore, Keng T. Tan

Research outputs pre 2011

Multinomial representations are derived for majority logic operations on bipolar binary data. The coefficients are given simply in terms of the readily computed lower Cholesky factor of Pascal matrices of order n for codes of block length n


Issues Relating To The Forensic Analysis Of Pda And Telephony (Pdat) Enabled Devices, Craig Valli Jan 2005

Issues Relating To The Forensic Analysis Of Pda And Telephony (Pdat) Enabled Devices, Craig Valli

Research outputs pre 2011

An emergent technology is the PDAT (Personal Digital Assistant & Telecommunicator) a hybrid of a mobile phone and coupled with a PDA's computing and storage abilities. Potentially every mobile phone is now an alternate or possibly primary computing and data repository for individuals. This paper explores current issues relating to its merger with mobile phone technology.


An Investigation Into The Efficiency Of Forensic Erasure Tools For Hard Disk Mechanisms, Craig Valli, Paul Patak Jan 2005

An Investigation Into The Efficiency Of Forensic Erasure Tools For Hard Disk Mechanisms, Craig Valli, Paul Patak

Research outputs pre 2011

One of the common anecdotal complaints used when defending the insecure erasure of hard disks is the length of time taken to affect a secure erasure. This paper discusses results of experiments conducted with Unix/Linux based hard disk wiping software when run on various machines and hard disk mechanisms in terms of size, speed and interface. The initial research has uncovered a range of issues and factors that affect the speed of erasure of hard disk mechanisms. Some of these factors included memory configuration and CPU but not in ways that were expected. This paper includes results from contemporary ATA …


The Underestimation Of Threats To Patients Data In Clinical Practice, Patricia Williams Jan 2005

The Underestimation Of Threats To Patients Data In Clinical Practice, Patricia Williams

Research outputs pre 2011

Issues in the security of medical data present a greater challenge than in other data security environments. The complexity of the threats and ethics involved, coupled with the poor management of these threats makes the protection of data in clinical practice problematic. This paper discusses the security threats to medical data in terms of confidentiality, privacy, integrity, misuse and availability, and reviews the issue of responsibility with reference to clinical governance. Finally. the paper uncovers some of the underlying reasons for the underestimation of the threats to medical data by the medical profession.


Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges Jan 2005

Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges

Research outputs pre 2011

Macroalgal epiphytes within seagrass meadows make a significant contribution to total primary production by assimilating water column N and transferring organic N to sediments. Assimilation of NO3 – requires nitrate reductase (NR, EC 1.6.6.1); NR activity represents the capacity for NO3 – assimilation. An optimised in vitro assay for determining NR activity in algal extracts was applied to a wide range of macroalgae and detected NR activity in all 22 species tested with activity 2 to 290 nmolNO3 – min–1 g–1 frozen thallus. With liquid-N2 freezing immediately after sample collection, this method was practical for estimating NR activity in field …


Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones Jan 2005

Computer Security: Investigating The Impact That Security Specific Education Has On Users’ Behaviour, Samuel David Jones

Theses : Honours

A lack in end-user awareness in computer security issues provides the rationale for this investigation. The research considers whether or not the provision of an educational package addressing computer security issues will improve awareness and transform behaviour of end-users in assessing and enacting appropriate responses in computer security situations. A group of twenty participants was studied in detail using a mixed methods research approach. The participants were drawn from a cross section of computer end-users, from elementary to advanced levels of computer literacy. Outcomes include a positive response to the provision of material, however human factors were found to be …


A Study Of The Effects Of Probait On Chuditch, Dasyurus Geoffroii, Within The Julimar Conservation Park With Notes On The General Ecology, Melissa York Jan 2005

A Study Of The Effects Of Probait On Chuditch, Dasyurus Geoffroii, Within The Julimar Conservation Park With Notes On The General Ecology, Melissa York

Theses : Honours

Broad scale fox baiting programs have been underway in Western Australia since 1996 when the Western Shield fauna recovery program commenced with the aim of recovering many fauna species that are under threat of extinction. Until recently, effective fox control for fauna recovery has been achieved with dried meat baits impregnated with the poison 1080. The Department of Conservation and Land Management (CALM) has developed more readily available and cost effective sausage meat baits, termed Probait. As bait acceptability trials in the laboratory indicated a potential risk from Pro bait ingestion by chuditch (Dasyurus geoffroii), assessment of the likely risk …


An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake Jan 2005

An Investigation Of Network Security Management Methods, Shamila Anuranga Ratnayake

Theses : Honours

Network Management (NM) is concerned with reducing complexity and managing cost. The traditional NM tools and techniques are based on the Open System Interconnection (OSI) NM model. However, several drawbacks have been identified when managing a network using traditional NM tools (Sarkar & Verma, 2001). Network security is a major issue when managing a network. Even though the technology assists to reduce security risks, unless properly managed, the security measures may not do the job as expected. The State Model (SM) diagram is a new method, which may assists in managing the network. This new method may provide functionality not …


Dryland Salinity In Western Australia: A Local Government Perspective, Paul Scalzi Jan 2005

Dryland Salinity In Western Australia: A Local Government Perspective, Paul Scalzi

Theses : Honours

This study evaluated local government's response to the problem of dryland salinity in the Western Australian Wheatbelt, and to what extent local government has the capacity to meet its statutory obligations. Salinity is a significant environmental problem that has the potential to have a marked effect on Western Australia's economy, environment and social fabric. The problem has been the focus of much Commonwealth and State attention, but the same level of involvement is not apparent in the institution of local government. This is also reflected in the paucity of published literature in the area of local government and salinity. Local …


Predicting The Spatial Distribution Of Organic Rich Sediments On The Swan Coastal Plain, Western Australia, David Blake Jan 2005

Predicting The Spatial Distribution Of Organic Rich Sediments On The Swan Coastal Plain, Western Australia, David Blake

Theses : Honours

The Organic Rich Sediments (ORS) of the Swan Coastal Plain (SCP) are an important component of the ecosystem, an important source of habitat and refuge for many species of fauna and act as natural fire control mechanisms through edaphic measures within the landscape. There have been numerous impacts on ORS, with fire now rated as one of the imminent threats to the continued existence and functioning of these entities. Conversely fire is an important tool for land mangers in their efforts to promote biodiversity and manage fuel loads to prevent wildfires, at present many of these ORS are becoming victim …


Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown Jan 2005

Towards Persistent Resource Identification With The Uniform Resource Name, Luke Brown

Theses : Honours

The exponential growth of the Internet, and the subsequent reliance on the resources it connects, has exposed a clear need for an Internet identifier which remains accessible over time. Such identifiers have been dubbed persistent identifiers owing to the promise of reliability they imply. Persistent naming systems exist at present, however it is the resolution of these systems into what Kunze, (2003) calls "persistent actionable identifiers" which is the focus of this work. Actionable identifiers can be thought of as identifiers which are accessible in a simple fashion such as through a web browser or through a specific application. This …


Opto-Vlsi Processing For Reconfigurable Optical Devices, Chung-Kiak Poh Jan 2005

Opto-Vlsi Processing For Reconfigurable Optical Devices, Chung-Kiak Poh

Theses: Doctorates and Masters

The implementation of Wavelength Division Multiplexing system (WDM) optical fibre transmission systems has the potential to realise this high capacity data rate exceeding 10 Tb/s. The ability to reconfigure optical networks is a desirable attribute for future metro applications where light paths can be set up or taken down dynamically as required in the network. The use of microelectronics in conjunction with photonics enables intelligence to be added to the high-speed capability of photonics, thus realising reconfigurable optical devices which can revolutionise optical telecommunications and many more application areas. In this thesis, we investigate and demonstrate the capability of Opto-VLSI …


A Salt On The Land: The Osmolyte Production And Physiological Responses Of Selected Myrtaceae Species Exposed To Salt And Water Stress, Janelle Atkinson Jan 2005

A Salt On The Land: The Osmolyte Production And Physiological Responses Of Selected Myrtaceae Species Exposed To Salt And Water Stress, Janelle Atkinson

Theses: Doctorates and Masters

Glasshouse trials were conducted on Calothamnus quadrifidus, Eucalyptus camaldulensis and Melaleuca uncinata

to test relative tolerance and uniformity of response in the Myrtaceae family to salt, waterlogging and salt x waterlogging. Seed sources from both saline (SA) and non-saline areas were used to compare differences in survival, growth and proline production to these stresses.


2d-Barcode For Mobile Devices, Hiroko Kato Jan 2005

2d-Barcode For Mobile Devices, Hiroko Kato

Theses : Honours

2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink …


View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson Jan 2005

View Space Linking, Solid Node Compression And Binary Space Partitioning For Visibility Determination In 3d Walk-Throughs, Joel Anderson

Theses : Honours

Today's 3D games consumers are expecting more and more quality in their games. To enable high quality graphics at interactive rates, games programmers employ a technique known as hidden surface removal (HSR) or polygon culling. HSR is not just applicable to games; it may also be applied to any application that requires quality and interactive rates, including medical, military and building applications. One such commonly used technique for HSR is the binary space partition (BSP) tree, which is used for 3D ‘walk-throughs’, otherwise known as 3D static environments or first person shooters. Recent developments in 3D accelerated hardware technology do …