Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security measures (3)
- Computer networks (2)
- ActiveX (1)
- Computer hackers (1)
- Computer program language (1)
-
- Computer programming (1)
- Computer science (1)
- Computer security (1)
- Computer vision. (1)
- Data processing (1)
- Database management (1)
- Databases (1)
- Deception. (1)
- Design (1)
- Digital techniques (1)
- Firearms (1)
- Human face recognition (1)
- Identification (1)
- Image processing (1)
- In-service training (1)
- Interactive multimedia (1)
- Java (1)
- Management information systems. (1)
- Perth (1)
- Security measures. (1)
- Smart cards (1)
- Universities and colleges (1)
- Western Australia (1)
- Wireless communication systems (1)
- World Wide Web (1)
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Database Development And Intranet Based Image Included Database Management System For Ballistic Firearm Identification System, Toni C. Jiao
Database Development And Intranet Based Image Included Database Management System For Ballistic Firearm Identification System, Toni C. Jiao
Theses: Doctorates and Masters
The process of imaging, collecting and searching a cartridge case to identifying its suspected firearm is a time consuming procedure. Within this study, a cartridge case identification database management system in an Intranet environment is designed and implemented, thus enabling firearm examiners from different forensic laboratories to engage firearm identification without the constraints of time and location. Specifically, the study investigates appropriate database management system for image involved and Intranet secured ballistics firearm identification database. The results demonstrated that a computerized firearm identification system could be implemented in Intranet with a secure, scalable, performable Intranet database management system.
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
Theses: Doctorates and Masters
The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …
Automatic Human Face Detection In Color Images, Son Lam Phung
Automatic Human Face Detection In Color Images, Son Lam Phung
Theses: Doctorates and Masters
Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …
The Development Of An Interactive Multimedia Based Professional Development, James New
The Development Of An Interactive Multimedia Based Professional Development, James New
Theses : Honours
The role of the teacher has changed over time such that teachers are asked to augment their own specialist knowledge with skills from other domains, for example information technology. This study has examined the perceptions and experiences of teachers and speech pathologists involved in the production of an instructive Interactive Multimedia (IMM) product to deliver Professional Development (PD). The individuals involved in this project were teachers from the High Valley Language School (HVLS) -a specialised primary school. The study used a social action research methodology, which allowed the researcher to build theories from emergent data. The data collection process consisted …
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Theses : Honours
Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.
This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …
A University Wide Smart Card System, Philip Cummins
A University Wide Smart Card System, Philip Cummins
Theses : Honours
Presently, many tertiary educational institutions utilise card technologies for staff and student identification and the support of other related services within the institution. A new type of card technology has been developed known as a Smart Card, where an existing plastic card has an embedded integrated circuit and is capable of expanding the range of applications and services capable within an institution. This thesis will detail the advantages that these new Smart Cards have over existing institution cards, detail other institution's attempts to use Smart Cards and finally, this thesis proposes a suitable system for integrating Smart Cards into an …
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta
Theses: Doctorates and Masters
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
Theses: Doctorates and Masters
Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …