Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1159)
- Information Security (481)
- Environmental Sciences (370)
- Life Sciences (165)
- Engineering (92)
-
- Social and Behavioral Sciences (92)
- Medicine and Health Sciences (69)
- Business (59)
- Environmental Monitoring (57)
- Oceanography and Atmospheric Sciences and Meteorology (53)
- Earth Sciences (49)
- Software Engineering (47)
- Artificial Intelligence and Robotics (41)
- Statistics and Probability (40)
- Water Resource Management (38)
- Ecology and Evolutionary Biology (36)
- Marine Biology (35)
- Computer Engineering (34)
- Oceanography (33)
- Education (30)
- Chemistry (29)
- Databases and Information Systems (28)
- Natural Resources and Conservation (27)
- Other Computer Sciences (23)
- Terrestrial and Aquatic Ecology (22)
- Electrical and Computer Engineering (20)
- Graphics and Human Computer Interfaces (20)
- Public Affairs, Public Policy and Public Administration (20)
- Sociology (20)
- Keyword
-
- [RSTDPub] (211)
- Security (102)
- Australia (42)
- Digital forensics (41)
- Information security (38)
-
- [ECUPub] (38)
- Climate change (35)
- Seagrass (35)
- Privacy (34)
- Machine learning (27)
- Blue carbon (26)
- Computer security (24)
- Cyber security (23)
- Network security (22)
- Artificial intelligence (20)
- Authentication (20)
- Forensics (20)
- Intrusion detection (20)
- Western Australia (20)
- Malware (18)
- [aism] (18)
- Deep learning (17)
- Environment (16)
- Encryption (15)
- Healthcare (15)
- Cybersecurity (14)
- Risk (14)
- Sustainability (14)
- Vulnerability (14)
- Biometrics (13)
- Publication Year
- Publication
-
- Research outputs 2014 to 2021 (378)
- Research outputs 2022 to 2026 (226)
- Australian Information Security Management Conference (225)
- Research outputs pre 2011 (215)
- Australian Digital Forensics Conference (177)
-
- Theses : Honours (163)
- Theses: Doctorates and Masters (151)
- Australian Information Warfare and Security Conference (58)
- Research outputs 2011 (45)
- Research outputs 2012 (44)
- Australian Security and Intelligence Conference (42)
- Australian eHealth Informatics and Security Conference (25)
- Research Datasets (22)
- International Cyber Resilience conference (20)
- Research outputs 2013 (17)
- Australian Counter Terrorism Conference (9)
- eCULTURE (7)
- Australian Journal of Teacher Education (4)
- EDU-COM International Conference (4)
- ECU Research Week (3)
- InfoSci@ECU Seminars (2)
- Archival Publications (1)
- Creative Connections Symposium @ BEAP2004 September 4, 2004 (1)
- School of Natural Sciences Publications (1)
- Publication Type
- File Type
Articles 1831 - 1840 of 1840
Full-Text Articles in Physical Sciences and Mathematics
A Comparison Of The Effects Of Reading From A Vdu And From Paper As Measured In Terms Of Reading Speed And Comprehension, Elizabeth Payumo
A Comparison Of The Effects Of Reading From A Vdu And From Paper As Measured In Terms Of Reading Speed And Comprehension, Elizabeth Payumo
Theses: Doctorates and Masters
This study investigates the legibility and visual effects of eight combinations of font and colour on VDU and two different fonts on paper. Forty subjects, sixteen females and twenty-four males, were exposed to three of the ten different conditions, one in each of the set of readings, on either VDU or paper. They were asked to read different sets of stories in each condition on different days where each condition lasted for approximately two hours. Reading speed and comprehension scores were measured in every story read in the set of stories. The change of mood and physical symptoms states of …
An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall
An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall
Research outputs pre 2011
This study as indicated in [7] was carried out under the auspices of Edith Cowan University's Institute of Security and Applied Technology and had the support of the Western Australian Police and the Perth-based Central Monitoring Agencies. The data analysed was obtained essentially from Police records, backed up by data from two of Perth's larger security companies, and consists of all the monitored alarms in the Perth Metropolitan Area which were attended by the police in the months of May and September 1989.In our consideration of the frequency of alarms by time of day and day of week, and the …
An Examination And Analysis Of The Boltzmann Machine, Its Mean Field Theory Approximation, And Learning Algorithm, Vincent Clive Phillips
An Examination And Analysis Of The Boltzmann Machine, Its Mean Field Theory Approximation, And Learning Algorithm, Vincent Clive Phillips
Theses : Honours
It is currently believed that artificial neural network models may form the basis for inte1ligent computational devices. The Boltzmann Machine belongs to the class of recursive artificial neural networks and uses a supervised learning algorithm to learn the mapping between input vectors and desired outputs. This study examines the parameters that influence the performance of the Boltzmann Machine learning algorithm. Improving the performance of the algorithm through the use of a naïve mean field theory approximation is also examined. The study was initiated to examine the hypothesis that the Boltzmann Machine learning algorithm, when used with the mean field approximation, …
Three Denerations Of Dbms, Maria Skiba
Three Denerations Of Dbms, Maria Skiba
Theses : Honours
This paper describes the evolution of data base technology from early computing to the sophisticated systems of today. It presents an overview of the most popular data base management systems architectures such as hierarchical, network, relational and object-oriented. The last section of this paper presents a view of the factors that will influence the future of data base technology.
An Analysis And Implementation Of Linear Derivation Strategies, Winston M. Tabada
An Analysis And Implementation Of Linear Derivation Strategies, Winston M. Tabada
Theses: Doctorates and Masters
This study examines the efficacy of six linear derivation strategies: (i) s-linear resolution, (ii) the ME procedure; (iii) t-linear resolution, (iv) SL -resolution, (v) the GC procedure, and (vi) SLM. The analysis is focused on the different restrictions and operations employed in each derivation strategy. The selection function, restrictive ancestor resolution, compulsory ancestor resolution on literals having atoms which are or become identical, compulsory merging operations, reuse of truncated literals, spreading of FALSE literals, no-tautologies resection, no two non-B-literals having identical atoms restriction, and the use of semantic information to trim irrelevant derivations from the search tree are the major …
Digital Image Processing Using Mathematical Morphology, Andrew Mehnert
Digital Image Processing Using Mathematical Morphology, Andrew Mehnert
Theses : Honours
This dissertation is a natural extension of my undergraduate research project entitled, "Digital Image Processing”. Whilst my undergraduate project dealt with a number of classical digital image filtering techniques such as spatial convolution and frequency domain filtering via the Fourier transform, this dissertation focuses on an alternative approach employing Mathematical Morphology. In contrast to classical filtering techniques, which often geometrically distort the original image, morphological operations, used sensibly, essentially preserve shape and geometry. Mathematical morphology therefore lends itself to image processing applications requiring the identification of objects and object features within an image. Herein basic morphological operations are developed, firstly …
The Development Of An Expert System For The Diagnosis Of Diseases In Fibre And Dairy Goats, Tim S. Roberts
The Development Of An Expert System For The Diagnosis Of Diseases In Fibre And Dairy Goats, Tim S. Roberts
Theses: Doctorates and Masters
This thesis details the development of an expert system for the diagnosis of diseases in fibre and dairy goats. Divided into five sections, five appendices, and a bibliography, this thesis centres on the methods used to build the expert system: the decisions taken at the outset of, and during the course of, development; some of the problems encountered, and the solutions to those problems. A detailed appraisal is made of the development process and suggestions are made for future developments over similar domains (for example, the diagnosis of diseases in animals other than goats). Much emphasis is placed on three …
Rottnest Island : A Reference List, Jennifer Browne
Rottnest Island : A Reference List, Jennifer Browne
Research outputs pre 2011
No abstract provided.
An Investigation Into The Use Of Prolog For Chinese-English Translation, J. W. L. Millar
An Investigation Into The Use Of Prolog For Chinese-English Translation, J. W. L. Millar
Research outputs pre 2011
In order to undertake machine translation from Chinese to English, it is necessary to accomplish three tasks. Firstly, the Chinese characters need to be handled on the computer system in use - in this case an IBM PC/XT. Secondly, the grammar for the language has to be represented and here Prolog has been used with a Definite Clause Grammar. Finally, the lexicon must be stored in a manner that facilitates efficient retrieval. Arity Prolog provides a hash table that achieves this task. This report describes the current state of a project aimed at producing a Chinese English machine translation system.
The Goldfields Water Supply : The True Story Of Its Origin, Unknown
The Goldfields Water Supply : The True Story Of Its Origin, Unknown
Archival Publications
No abstract provided.