Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai Jan 2018

Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai

ECU Publications Post 2013

For robots to attain more general-purpose utility, grasping is a necessary skill to master. Such general-purpose robots may use their perception abilities to visually identify grasps for a given object. A grasp describes how a robotic end-effector can be arranged to securely grab an object and successfully lift it without slippage. Traditionally, grasp detection requires expert human knowledge to analytically form the task-specific algorithm, but this is an arduous and time-consuming approach. During the last five years, deep learning methods have enabled significant advancements in robotic vision, natural language processing, and automated driving applications. The successful results of these methods ...


Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally Jan 2018

Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally

ECU Publications Post 2013

Ransomware infections have grown exponentially during the recent past to cause major disruption in operations across a range of industries including the government. Through this research, we present an analysis of 14 strains of ransomware that infect Windows platforms, and we do a comparison of Windows Application Programming Interface (API) calls made through ransomware processes with baselines of normal operating system behaviour. The study identifies and reports salient features of ransomware as referred through the frequencies of API calls


Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh Jan 2018

Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh

ECU Publications Post 2013

Highly bismuth-substituted iron garnet thin films are prepared on quartz substrates by using a radio frequency (RF) magnetron sputtering technique. We study the factors (process parameters associated with the RF magnetron sputter deposition technique) affecting the magneto-optical (MO) properties of ferrite garnet films of composition Bi2.1Dy0.9Fe3.9Ga1.1O12. All films show high MO response across the visible range of wavelengths after being annealed. In particular, the effects of substrate stage temperature and rotation rate on the various properties of films are studied. Experimental results reveal that the characteristics of garnet films of this type can be tuned and ...


Spectrally-Selective Energy-Harvesting Solar Windows For Public Infrastructure Applications, Mikhail Vasiliev, Kamal Alameh, Mohammad Alam Jan 2018

Spectrally-Selective Energy-Harvesting Solar Windows For Public Infrastructure Applications, Mikhail Vasiliev, Kamal Alameh, Mohammad Alam

ECU Publications Post 2013

A study of photovoltaic solar window technologies is reported and it focuses on their structural features, functional materials, system development, and suitability for use in practical field applications including public infrastructures and agricultural installations. Energy generation performance characteristics are summarized and compared to theory-limit predictions. Working examples of pilot-trial solar window-based installations are described. We also report on achieving electric power outputs of about 25 Wp/m2 from clear and transparent large-area glass-based solar windows.


Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli Jan 2017

Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli

ECU Publications Post 2013

Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based ...


A Feature-Based Structural Measure: An Image Similarity Measure For Face Recognition, Noor A. Shnain, Zahir Hussain, Song F. Lu Jan 2017

A Feature-Based Structural Measure: An Image Similarity Measure For Face Recognition, Noor A. Shnain, Zahir Hussain, Song F. Lu

ECU Publications Post 2013

Facial recognition is one of the most challenging and interesting problems within the field of computer vision and pattern recognition. During the last few years, it has gained special attention due to its importance in relation to current issues such as security, surveillance systems and forensics analysis. Despite this high level of attention to facial recognition, the success is still limited by certain conditions; there is no method which gives reliable results in all situations. In this paper, we propose an efficient similarity index that resolves the shortcomings of the existing measures of feature and structural similarity. This measure, called ...


A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell Jan 2017

A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell

ECU Publications Post 2013

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, however ...


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

ECU Publications Post 2013

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages ...


Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli Jan 2016

Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli

ECU Publications Post 2013

This paper investigates factors which can affect the accuracy of short-term wind speed prediction when done over long periods spanning different seasons. Two types of neural networks (NNs) are used to forecast power generated via specific horizontal axis wind turbines. Meteorological data used are for a specific Western Australian location. Results reveal that seasonal variations affect the prediction accuracy of the wind resource, but the magnitude of this influence strongly depends on the details of the NN deployed. Factors investigated include the span of the time series needed to initially train the networks, the temporal resolution of these data, the ...


A Forecasting Tool For Predicting Australia's Domestic Airline Passenger Demand Using A Genetic Algorithm, Panarat Srisaeng, Glenn Baxter, Steven Richardson, Graham Wild Oct 2015

A Forecasting Tool For Predicting Australia's Domestic Airline Passenger Demand Using A Genetic Algorithm, Panarat Srisaeng, Glenn Baxter, Steven Richardson, Graham Wild

ECU Publications Post 2013

This study has proposed and empirically tested for the first time genetic algorithm optimization models for modelling Australia’s domestic airline passenger demand, as measured by enplaned passengers (GAPAXDE model) and revenue passenger kilometres performed (GARPKSDE model). Data was divided into training and testing datasets; 74 training datasets were used to estimate the weighting factors of the genetic algorithm models and 13 out-of-sample datasets were used for testing the robustness of the genetic algorithm models. The genetic algorithm parameters used in this study comprised population size (n): 200; the generation number: 1,000; and mutation rate: 0.01. The modelling ...


Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland Jan 2015

Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland

ECU Publications Post 2013

The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony's latest version of their PlayStation. This console provides a number of features including web browsing, downloading of material and chat functionality; all communication features that will be of interest to forensic investigators. In this paper we undertake an initial investigation of the PlayStation 4 games console. This paper identifies potential information ...


Improving Processing By Adaption To Conditional Geostatistical Simulation Of Block Compositions, R. Tolosana-Delgado, Ute A. Mueller, K. G. Van Den Boogaart, C. Ward, J. Gutzmer Jan 2015

Improving Processing By Adaption To Conditional Geostatistical Simulation Of Block Compositions, R. Tolosana-Delgado, Ute A. Mueller, K. G. Van Den Boogaart, C. Ward, J. Gutzmer

ECU Publications Post 2013

Exploitation of an ore deposit can be optimized by adapting the beneficiation processes to the properties of individual ore blocks. This can involve switching in and out certain treatment steps, or setting their controlling parameters. Optimizing this set of decisions requires the full conditional distribution of all relevant physical parameters and chemical attributes of the feed, including concentration of value elements and abundance of penalty elements. As a first step towards adaptive processing, the mapping of adaptive decisions is explored based on the composition, in value and penalty elements, of the selective mining units. Conditional distributions at block support are ...