Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D Delaunay triangulation (1)
- Access Network (1)
- Answer sheet (1)
- Assessment (1)
- Authentication (1)
-
- Backhaul Network (1)
- Base station (BS) (1)
- Beverage analysis (1)
- Cnn (1)
- Convolutional neural networks (1)
- Cyber security (1)
- Dcnn (1)
- Deep convolutional neural networks (1)
- Deep learning (1)
- Delau-nay triangulations (1)
- Discrimination ability (1)
- Energy efficiency (EE) (1)
- Feature representation (1)
- Fifth generation (5G) (1)
- Fingerprint authentication (1)
- Fingerprint authentication system (1)
- Fingerprint matching (1)
- Free-space optics (FSO) (1)
- Green communication (1)
- Heterogeneous Network (HetNet) (1)
- Human-robot collaboration (1)
- Internet of Things (IOT) (1)
- Internet of things (1)
- Intrusion detection (1)
- Local government (1)
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
Extraction Of Patterns In Selected Network Traffic For A Precise And Efficient Intrusion Detection Approach, Priya Naran Rabadia
Extraction Of Patterns In Selected Network Traffic For A Precise And Efficient Intrusion Detection Approach, Priya Naran Rabadia
Theses: Doctorates and Masters
This thesis investigates a precise and efficient pattern-based intrusion detection approach by extracting patterns from sequential adversarial commands. As organisations are further placing assets within the cyber domain, mitigating the potential exposure of these assets is becoming increasingly imperative. Machine learning is the application of learning algorithms to extract knowledge from data to determine patterns between data points and make predictions. Machine learning algorithms have been used to extract patterns from sequences of commands to precisely and efficiently detect adversaries using the Secure Shell (SSH) protocol. Seeing as SSH is one of the most predominant methods of accessing systems it …
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Research outputs 2014 to 2021
For robots to attain more general-purpose utility, grasping is a necessary skill to master. Such general-purpose robots may use their perception abilities to visually identify grasps for a given object. A grasp describes how a robotic end-effector can be arranged to securely grab an object and successfully lift it without slippage. Traditionally, grasp detection requires expert human knowledge to analytically form the task-specific algorithm, but this is an arduous and time-consuming approach. During the last five years, deep learning methods have enabled significant advancements in robotic vision, natural language processing, and automated driving applications. The successful results of these methods …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …
Development, Manufacture And Application Of A Solid-State Ph Sensor Using Ruthenium Oxide, Wade Lonsdale
Development, Manufacture And Application Of A Solid-State Ph Sensor Using Ruthenium Oxide, Wade Lonsdale
Theses: Doctorates and Masters
The measurement of pH is undertaken frequently in numerous settings for many applications. The common glass pH probe is almost ideal for measuring pH, and as such, it is used almost ubiquitously. However, glass is not ideal for all applications due to its relatively large size, fragility, need for recalibration and wet-storage. Therefore, much research has been undertaken on the use of metal oxides as an alternative for the measurement of pH.
Here, a solid-state potentiometric pH sensor is developed using ruthenium metal oxide (RuO2). Initially, pH sensitive RuO2 electrodes were prepared by deposition with radio frequency magnetron sputtering (RFMS) …
Automated Optical Mark Recognition Scoring System For Multiple-Choice Questions, Murtadha Alomran
Automated Optical Mark Recognition Scoring System For Multiple-Choice Questions, Murtadha Alomran
Theses: Doctorates and Masters
Multiple-choice questions are one of the questions commonly used in assessments. It is widely used because this type of examination can be an effective and reliable way to examine the level of student’s knowledge. So far, this type of examination can either be marked by hand or with specialised answer sheets and scanning equipment. There are specialised answer sheets and scanning equipment to mark multiple-choice questions automatically. However, these are expensive, specialised and restrictive answer sheets and optical mark recognition scanners.
This research aims to design and implement a multiple-choice answer sheet and a reliable image processing-based scoring system that …
Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla
Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla
Theses: Doctorates and Masters
The rapid growth in global mobile phone users has resulted in an ever-increasing demand for bandwidth and enhanced quality-of-service (QoS). Several consortia comprising major international mobile operators, infrastructure manufacturers, and academic institutions are working to develop the next generation wireless communication systems fifth generation (5G) - to support high data rates and increased QoS. 5G systems are also expected to represent a greener alternative for communication systems, which is important because power consumption from the information and communication technology (ICT) sector is forecast to increase significantly by 2030. The deployment of ultra-dense heterogeneous small cell networks (SCNs) is expected to …