Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok
Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok
Australian Counter Terrorism Conference
With an increasing focus on lone-wolf operations, al-Qaeda is becoming increasingly focussed on its internet discourses and propaganda. One of its most significant discourses is the importance of jihad and martyrdom in carrying out a terrorist attack. This study looks at Facebook pages and profiles and examines the discourses presented in relation to jihad and martyrdom. Three important concepts including their justification are considered: Al-Jihad fi Sabilillah (just fight for the sake of Allah), Istishhad (operational heroism of loving death more than the West love life) and Shaheed (becoming a martyr). Results supported previous studies indicating the strong seductive nature …
Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa Armstrong
Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa Armstrong
Leisa Armstrong
Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to …
Using Monte Carlo Tree Search For Replanning In A Multistage Simultaneous Game, Daniel Beard, Philip Hingston, Martin Masek
Using Monte Carlo Tree Search For Replanning In A Multistage Simultaneous Game, Daniel Beard, Philip Hingston, Martin Masek
Research outputs 2012
In this study, we introduce MC-TSAR, a Monte Carlo Tree Search algorithm for strategy selection in simultaneous multistage games. We evaluate the algorithm using a battle planning scenario in which replanning is possible. We show that the algorithm can be used to select a strategy that approximates a Nash equilibrium strategy, taking into account the possibility of switching strategies part way through the execution of the scenario in the light of new information on the progress of the battle.
The Application Of A Visual Data Mining Framework To Determine Soil, Climate And Land-Use Relationships, Yunous Vagh
The Application Of A Visual Data Mining Framework To Determine Soil, Climate And Land-Use Relationships, Yunous Vagh
Research outputs 2012
In this research study, the methodology of action research dynamics and a case study was employed in constructing a visual data mining framework for the processing and analysis of geographic land-use data in an agricultural context. The geographic data was made up of a digital elevation model (DEM), soil and land use profiles that were juxtaposed with previously captured climatic data from fixed weather stations in Australia. In this pilot study, monthly rainfall profiles for a selected study area were used to identify areas of soil variability. The rainfall was sampled for the beginning (April) of the rainy season for …
Exploration Games Played On A Ddr Pad Can Constitute Beneficial Physical Exercise, Kimthy Nguyen, Bohan Li, Martin Masek, Yuwanuch Gulatee
Exploration Games Played On A Ddr Pad Can Constitute Beneficial Physical Exercise, Kimthy Nguyen, Bohan Li, Martin Masek, Yuwanuch Gulatee
Research outputs 2012
The addition of an exercise component to computer games is a method that attempts to increase exercise compliance among the population. Various attempts at such games have been made, both commercially and as research projects, but the set of studied game mechanics that are both entertaining and provide beneficial exercise are relatively small. In our work, a game mechanic was designed for a floor-based input controller (DDR Pad). Rather than the standard mechanic usually employed for this device, our approach allows the player to explore a virtual world, requiring exertive movements on the input device in order to progress. The …
A Multimodal Problem For Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, Martin Masek
A Multimodal Problem For Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, Martin Masek
Research outputs 2012
Coevolutionary algorithms are a special kind of evolutionary algorithm with advantages in solving certain specific kinds of problems. In particular, competitive coevolutionary algorithms can be used to study problems in which two sides compete against each other and must choose a suitable strategy. Often these problems are multimodal - there is more than one strong strategy for each side. In this paper, we introduce a scalable multimodal test problem for competitive coevolution, and use it to investigate the effectiveness of some common coevolutionary algorithm enhancement techniques.
On The Effectiveness Of Intrusions Into Zigbee-Based Wireless Sensor Networks, Michael Johnstone, Jeremy Jarvis
On The Effectiveness Of Intrusions Into Zigbee-Based Wireless Sensor Networks, Michael Johnstone, Jeremy Jarvis
Research outputs 2012
Wireless Sensor Networks are becoming popular as a means of collecting data by military organisations, public utilities, motor vehicle manufacturers and security firms. Unfortunately, the devices on such networks are often insecure by default, which creates problems in terms of the confidentiality and integrity of data transmitted across such networks. This paper discusses attacks that were successful on a simple network consisting of nodes using the ZigBee protocol stack and proposes defences to thwart these attacks, thus leading to increased user confidence in the ability of organisations to provide secure and effective services. The outcomes were that it was possible …
A Data Mining Perspective Of The Dual Effect Of Rainfall And Temperature On Wheat Yield, Yunous Vagh, Jitian Xiao
A Data Mining Perspective Of The Dual Effect Of Rainfall And Temperature On Wheat Yield, Yunous Vagh, Jitian Xiao
Research outputs 2012
This paper presents the final investigation within the series of qualitative and quantitative investigations carried out for the processing and analysis of geographic land-use data in an agricultural context. The geographic data was made up of crop and cereal production land use profiles. These were linked to previously recorded climatic data from fixed weather stations in Australia that was interpolated using ordinary krigeing to fit a grid surface. In this study, the profiles for the stochastic average monthly temperature and rainfall for a selected study area were used to determine their simultaneous effects on crop production at the shire level. …
Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway
Web Accessibility In Corporate Australia: Perceptions Versus Reality, Justin Brown, Vivienne Conway
Research outputs 2012
In this paper we describe the results of website audits and survey responses for organizations involved in the Australia Web Awards for 2011. 160 organizations entered their sites or sites they had developed as part of the awards, and in doing so were required to select the level of WCAG compliance for their site. Audits conducted on these sites after the awards completion showed that very few of the entrants actually met their selected level of accessibility compliance, regardless of the organization type. Survey responses from participating entrants in the AWA indicated that they were aware of the WCAG guidelines …