Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- [ECUPub] (2)
- Access (1)
- Animals (1)
- Biology (1)
- Biometric (1)
-
- Birds (1)
- Chemicals (1)
- Coastal zone management -- Western Australia (1)
- Computer adaptive testing (1)
- Computer programs (1)
- Computer science (1)
- Computer simulation (1)
- Computer software -- Development (1)
- Computer software -- Development -- Management (1)
- Computer systems (1)
- Cropping systems (1)
- Electronic commerce -- Security measures (1)
- Environment (1)
- Environmental ethics (1)
- Environmental monitoring -- Western Australia (1)
- Eucalyptus oil industry -- Western Australia -- Midlands (1)
- Human behavior (1)
- Human-computer interaction (1)
- IBM-compatible computers (1)
- Identification (1)
- Macroinvertebrates (1)
- Mathematical models (1)
- Microcrustacea (1)
- Object-oriented programming (1)
- Plants for soil conservation -- Western Australia -- Midlands (1)
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
Yellagonga Wetlands: A Study Of The Water Chemistry And Aquatic Fauna, Adrianne Kinnear, Patrick Garnett, Hugo Bekle, K. Upton
Yellagonga Wetlands: A Study Of The Water Chemistry And Aquatic Fauna, Adrianne Kinnear, Patrick Garnett, Hugo Bekle, K. Upton
Research outputs pre 2011
Wetlands worldwide are continually threatened by urbanisation and Western Australia is no exception. Since European settlement in 1829, it has been estimated that at least 75% of the wetlands of the Swan Coastal Plain have disappeared (Halse, 1988). The remaining 25% continue to be threatened by eutrophication and pollution, changes in hydrology and water level patterns, clearing of riparian vegetation, aesthetic disruption and weed invasion (CALM, 1980; Davis and Rolls, 1987; Wrigley et al., 1991; Balla and Davis, 1995). These degradation components are interrelated and largely the consequence of the extensive removal of surrounding vegetation...
Review Of Personal Identification Systems, J. M. Cross
Review Of Personal Identification Systems, J. M. Cross
Research outputs pre 2011
The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970's has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This …
The Dynamics Of Phase Farming: A Mathematical Model Of Economic Aspects Of Switching Between Cropping And Land Rehabilitation, Tuyet Tran
Theses : Honours
In this thesis we consider the following problem: Suppose that a farmer wishes to determine the best course of action to maximise returns from his I her land which has undergone some form of degradation. In order to rehabilitate the land, the farmer may have to change to a different farming practice for some time until the previous practice becomes profitable again. Switching from cropping to rehabilitation Of from rehabilitation to cropping incurs costs. From an economical point of view, the question then arises: When is the optimal time to switch from cropping· to rehabilitation and when is it optimal …
The Development And Use Of The Secure Electronic Transaction (Set) Protocol On The Internet, Damon James Whyte
The Development And Use Of The Secure Electronic Transaction (Set) Protocol On The Internet, Damon James Whyte
Theses : Honours
While still in its infancy, Electronic Commerce is growing at an exponential rate each year (Walson, 1997. p.53). Although few doubt that such growth will only continue in years to come, many people still have serious reservations about the levels of security offered by currently available applications for conducting such trade. This thesis identifies some of the key areas of concern regarding Electronic Commerce on the lnternet, and looks at the ways in which the Secure Electronic Transaction (SET) model, proposed by Mastercard and Visa, succeeds or fails in addressing these concerns. It identifies and describes the key dements and …
Scope Of Justice, Delegitimisation, Sentience And Ecosystemic Integrity As Predictors Of Protection, Rob Gulley
Scope Of Justice, Delegitimisation, Sentience And Ecosystemic Integrity As Predictors Of Protection, Rob Gulley
Theses : Honours
It is argued that the continuing environmental destruction results from an instrumental valuation of the non-human world. Fox's (1995) alternative intrinsic value approach to environmental protection is introduced. Two aspects of Fox's descriptive model may represent fundamental motives, or ethical bases, for behaviour. They are sentience -the quality of being capable of experiencing pain, and ecosystemic-integrity -the quality of contributing to the self-regenerating capacity of an ecosystem. The inconsistency between the presumed ethical bases for behaviour, and actual behaviour is noted. It is suggested that delegitimisation- the discounting of some desirable quality in a competitor during conflict, and the scope …
Coastal Zone Monitoring And Evaluation : A Descriptive Analysis Of Western Australian Practices, Michael F. Williams
Coastal Zone Monitoring And Evaluation : A Descriptive Analysis Of Western Australian Practices, Michael F. Williams
Theses : Honours
Currently there is no information available which documents the monitoring and evaluation practices undertaken in the coastal zone of Western Aust1alia by coastal zone managers. A review of current Australian-wide management practices in coastal management reveals that monitoring and evaluation are limited in their application. The adequacy of the links between coastal monitoring and evaluation, on which our understanding of the state of the coastal zone environment is based, is one of two central themes throughout this research. The other theme is that without an accurate, reliable and effectively managed monitoring and research information base, coastal management will be haphazard …
Webassess, Justin Anthony Brown
Webassess, Justin Anthony Brown
Theses : Honours
This project and research has resulted in the development of a World Wide Web (WWW) based testing system. WEBassess can be accessed and used from any point in the world that has a connection to the WWW. The WEBassess system allows for the creation and completion of tests through the WWW interface. Scoring and feedback of submitted tests is completely automated, allowing students to see their test result immediately, including visual indicators for correct and incorrect answers. These test results may then be viewed by academic staff, showing complete test details, such as unit code, test title, score, percentage, date …
The Toysim Project, Anthony Rodriguez
An Evaluation Of The Productivity Of Two Oil Mallee Species In A Revegetation Trial In The Central Wheatbelt Of Western Australia, Beatrice Lucie Hedwig Franke
An Evaluation Of The Productivity Of Two Oil Mallee Species In A Revegetation Trial In The Central Wheatbelt Of Western Australia, Beatrice Lucie Hedwig Franke
Theses : Honours
Two of Western Australia's most pressing land degradation problems are waterlogging and increasing soil salinity. Extensive clearing of the native. deep-rooted vegetation and its replacement with shallow-rooted crop and pasture plants has resulted in increased recharge of groundwater tables. causing them to rise. Salts stored in the soil are being brought to the soil surface with the rising watertables. Revegetation with deep-rooted native plants has been identified as the most likely strategy to achieve increased groundwater usage and a lowering of watertables. One area seriously affected by waterlogging and increasing salinity is the Western Australian central wheatbelt region. The Department …
Does Good Project Management Ensure Successful Software Development?, Julie Lisa Eldridge
Does Good Project Management Ensure Successful Software Development?, Julie Lisa Eldridge
Theses : Honours
For many years the development of computer software has been plagued by poor customer satisfaction caused by missed schedules, underestimated budgets and the development of products which do not meet requirements. The ever increasing reliance on computers, as reported by Sommerville ''the result of the proliferation of computer systems into all aspects of life and business is that personal, corporate, national and international economies are [becoming] increasingly dependant on computers and software systems" ( 1992, p.2), calls for more stable software which can be developed within time and budget constraints. To achieve this, software development activities must be analysed and …
An Approach To Display Layout Of Dynamic Windows, Nihar Trivedi
An Approach To Display Layout Of Dynamic Windows, Nihar Trivedi
Theses: Doctorates and Masters
The development of windows based user interface has introduced a new dimension to the field of human computer interaction. Now a user is able to perform multiple tasks at a time, often switching from one task to another. However windows environment also imposes the burden of manual windows management on the user. Several studies have suggested that manual window management is an unproductive chore often resulting in clutter and confusion on the display screen. Therefore we need a automatic windows layout generator to free the user to perform other useful tasks. This thesis introduces SPORDAC {Shadow Propagation for Overlap Removal …
Randomised Shuffle And Applied Misinformation: An Enhanced Model For Contact-Based Smart-Card Serial Data Transfer, Michael Collins
Randomised Shuffle And Applied Misinformation: An Enhanced Model For Contact-Based Smart-Card Serial Data Transfer, Michael Collins
Theses: Doctorates and Masters
Contact-based smart-cards, which comply to the International Standard IS0-7816, communicate with their associated read/write machines via a single bi-directional serial link. This link is easy to monitor with inexpensive equipment and resources, enabling captured data to be removed for later examination. In many contact-based smart-cards the logical abilities are provided by eight-bit microcontroller units (MCU) which are slow at performing effective cryptographic functions. Consequently, for expediency, much data may be transferred in plain-text across the vulnerable communications link, further easing an eavesdropper's task. Practitioners in military communications protect transmitted information by varying a link's carrier frequency in an apparently random …