Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen Jan 2010

Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen

Research outputs pre 2011

This paper will propose a data mining framework for the identification of agricultural production areas ill WA. The data mining (DM) framework was developed with the aim of enhancing the analysis of agricultural datasets compared to currently used statistical methods. The DM framework is a synthesis of different technologies brought together for the purpose of enhancing the interrogation of these datasets. The DM framework is based on the data, information, knowledge and wisdom continuum as a horizontal axis, with DM and online analytical processing (OLAP) forming the vertical axis. In addition the DM framework incorporates aspects of data warehousing phases, …


Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen Jan 2010

Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen

Research outputs pre 2011

Current environmental challenges such as increasing dry land salinity, water logging, eutrophication and high nutrient runoff in south western regions of Western Australia (WA) may have both cultural and environmental implications in the near future. Advances in computing through the application of data mining ,and geographic information services provide the tools to conduct •studies that can indicate possible changes in these water catchment areas of WA. The research examines the existing spatial data mining techniques that can be used to interpret trends in WA water catchment land use. Large GIS data sets of the water catchments on Peel-Harvey region have …


Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe Jan 2010

Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe

Research outputs pre 2011

A Photonic-based multi-wavelength sensor capable of discriminating objects is proposed and demonstrated for intruder detection and identification. The sensor uses a laser combination module for input wavelength signal multiplexing and beam overlapping, a custom-made curved optical cavity for multi-beam spot generation through internal beam reflection and transmission and a high-speed imager for scattered reflectance spectral measurements. Experimental results show that five different wavelengths, namely 473nm, 532nm, 635nm, 670nm and 785nm, are necessary for discriminating various intruding objects of interest through spectral reflectance and slope measurements. Objects selected for experiments were brick, cement sheet, cotton, leather and roof tile.


Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka Jan 2009

Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.


Bots Trained To Play Like A Human Are More Fun, Bhuman Soni, Philip Hingston Jan 2008

Bots Trained To Play Like A Human Are More Fun, Bhuman Soni, Philip Hingston

Research outputs pre 2011

Computational intelligence methods are well-suited for use in computer controlled opponents for video games. In many other applications of these methods, the aim is to simulate near-optimal intelligent behaviour. But in video games, the aim is to provide interesting opponents for human players, not optimal ones. In this study, we trained neural network-based computer controlled opponents to play like a human in a popular first-person shooter. We then had gamers play-test these opponents as well as a hand-coded opponent, and surveyed them to find out which opponents they enjoyed more. Our results show that the neural network-based opponents were clearly …


Evaluation Of An Optical Image Sensor For Use In The Microphotonic Real-Time Vegetation Discrimination System, Arie Paap, Sreten Askraba, Kamal Alameh, John Rowe Jan 2008

Evaluation Of An Optical Image Sensor For Use In The Microphotonic Real-Time Vegetation Discrimination System, Arie Paap, Sreten Askraba, Kamal Alameh, John Rowe

Research outputs pre 2011

A comparison between the performance of a commercially available line scan camera and a linear sensor array employed in a micro-photonic real-time vegetation discrimination system for use in selective herbicide spraying systems is presented.


Photonic-Based Spectral Reflectance Sensor For Ground-Based Plant Detection And Weed Discrimination, Arie Paap, Sreten Askraba, Kamal Alameh, John Rowe Jan 2008

Photonic-Based Spectral Reflectance Sensor For Ground-Based Plant Detection And Weed Discrimination, Arie Paap, Sreten Askraba, Kamal Alameh, John Rowe

Research outputs pre 2011

A bench prototype photonic-based spectral reflectance sensor architecture for use in selective herbicide spraying systems performing non-contact spectral reflectance measurements of plants and soil is described and experimental data obtained with simulated farming vehicle traveling speeds of 7 and 22 km/h is presented. The sensor uses a three-wavelength laser diode module that sequentially emits identically-polarized laser light beams through a common aperture, along one optical path. Each laser beam enters a multi-spot beam generator which produces up to 14 parallel laser beams over a 210mm span. The intensity of the reflected light from each spot is detected by a high-speed …


Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa J. Armstrong Jan 2007

Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa J. Armstrong

Research outputs pre 2011

Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to …


Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa J. Armstrong Jan 2007

Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa J. Armstrong

Research outputs pre 2011

Public Key Infrastructure (PKI) has for the last two decades been a means of securing systems and communication. With the adoption of Open Document Format (ODF) as an ISO standard, the question remains if the unpopular, expensive, complex and unmaintainable PKI can prove to be a viable means of securing ODF documents. This paper analyses the drawbacks of PKI and evaluates the useji.tlness of PKl in provisioning robust, cheap and maintainable XML security to XML based ODF. This paper also evaluates the existing research on XML security, more specifically fine grained access control.


Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith Jan 2007

Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith

Research outputs pre 2011

This paper demonstrates discrete laser spot projection over a wide angle using a novel cylindrical quasi-cavity waveguide, with no moving parts. Furthermore, the distance to each spot is calculated using active laser triangulation. The triangulation arrangement and the trajectory of principal rays are modelled using a system of linear equations based on optical geometry. Linear algebra is used to derive the unique baseline and outgoing angle of every projected beam. The system is calibrated by finding optimal values for uncertain instrumental parameters using constrained non-linear optimization. Distances calculated indoors result in accuracies of over 93%


A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli Jan 2006

A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …


Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli Jan 2006

Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli

Research outputs pre 2011

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified


Leading Hackers Down The Garden Path, Suen Yek Jan 2006

Leading Hackers Down The Garden Path, Suen Yek

Research outputs pre 2011

Can a hacker be controlled by predetermined deception? Limiting the decision making capabilities of hackers is one technique of network countermeasure that a honeynet enables. By furnishing a honeynet with a realistic range of services but restricted vulnerabilities, a hacker may be forced to direct their attacks to the only available exploits. This research discusses the deployment of a honeynet configured with a deceptive TELNET and TFTP exploit. Four hackers were invited to attack the honeynet and the analysis of their compromise identified if they engaged in a guided pathway to the intended deception. Hand trace analysis was performed on …


After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli Jan 2005

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges Jan 2005

Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges

Research outputs pre 2011

Macroalgal epiphytes within seagrass meadows make a significant contribution to total primary production by assimilating water column N and transferring organic N to sediments. Assimilation of NO3 – requires nitrate reductase (NR, EC 1.6.6.1); NR activity represents the capacity for NO3 – assimilation. An optimised in vitro assay for determining NR activity in algal extracts was applied to a wide range of macroalgae and detected NR activity in all 22 species tested with activity 2 to 290 nmolNO3 – min–1 g–1 frozen thallus. With liquid-N2 freezing immediately after sample collection, this method was practical for estimating NR activity in field …


Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek Jan 2005

Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek

Research outputs pre 2011

TCP/IP fingerprinting is a common technique used to detect unique network stack characteristics of an Operating System (OS) . Its usage for network compromise is renowned for performing host discovery and in aiding the blackhat to determine a tailored exploit of detected OSs. The honeyd honeynet is able to countermeasure blackhats utilising TCP/IP fingerprinting via host device emulation on a virtual network. Honeyd allows the creation of host personalities that respond to network stack fingerprinting as a real network would. The nature of this technique however, has shown to provide inconsistent and unreliable results when performed over wired and wireless …


How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek Jan 2005

How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek

Research outputs pre 2011

The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type of OS running on a target and this information can then be used to determine the type of vulnerabilities to target on the host. Testing the effectiveness of this technique to ensure that a wireless honeypot using honeyd may deceive an attacker …


Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston Jan 2003

Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston

Research outputs pre 2011

The aim of this research was to automate the composition of convincingly “real” music in specific musical genres. By “real” music we mean music which is not obviously “machine generated”, is recognizable as being of the selected genre, is perceived as aesthetically pleasing, and is usable in a commercial context. To achieve this goal, various computational techniques were used, including genetic algorithms and finite state automata. The process involves an original, top down approach and a bottom up approach based on previous studies. Student musicians have objectively assessed the resulting compositions.


Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj Jan 2002

Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj

Research outputs pre 2011

Code construction is the one inescapable phase of the software development cycle yet educators seem unable to escape the mind-set which equates programming with syntax and semantics. Accumulated coding wisdom of more than four decades, now being codified in the SWEBOK, should smooth the process of learning to develop software if presented early in the student's career. Typically, however, it continues to be presented in advanced programming units rather than as fundamental understanding. As a consequence, code hacking is the norm in undergraduate years. This paper examines current practice and presents the view that what is needed is not a …


If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek Jan 2002

If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek

Research outputs pre 2011

This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.


Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.) Jan 2002

Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)

Research outputs pre 2011

The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year's conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.

The papers cover many topics, all within the field of information warfare and its applications, now and into the future.

The papers have been grouped into six streams: …


The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai Jan 2002

The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai

Research outputs pre 2011

To interoperate data sources which differ structurally and semantically, particular problems occur, for example, problems of changing schemas in data sources will affect the integrated schema. In this paper, we propose the mediated integration architecture (MedInt), which employs mediation and wrapping techniques as the main components for the integration of heterogeneous systems. With MedInt, a mediator acts as an intermediate medium transforming queries to sub-queries, integrating result data and resolving conflicts. Wrappers then transform sub-queries to specific local queries so that each local system is able to understand the queries.


Firewall Or Folly - An Initial Investigation Into The Effectiveness Of Personal Firewalls In Securing Personal Computers From Attack, Jeshua Yee Jan 2002

Firewall Or Folly - An Initial Investigation Into The Effectiveness Of Personal Firewalls In Securing Personal Computers From Attack, Jeshua Yee

Research outputs pre 2011

With the increase in the use of Personal Computer (PC) firewall, this study looks at the security features provided by eight PC firewall; they are BlackICE, Deerfield, Kirio, MacAfee, Outpost, Sygate, Tiny and Zonealarm. The Nessus network scanner was used to probe these systems in a variety of configurations. The paper discusses the results and their implications for users of this new range of software.


B-Nodes: A New Scalable High Level Abstraction Model, Stanislaw P. Maj, Craig William Caulfield Jan 2001

B-Nodes: A New Scalable High Level Abstraction Model, Stanislaw P. Maj, Craig William Caulfield

Research outputs pre 2011

This paper proposes a new modeling technique called B-Nodes. B-Nodes represent a new, high-level abstraction that allows technical detail to be controlled using top-down recursive decomposition. This abstraction. is independent of architectural detail and can therefore accommodate rapid changes in technology. The use of recursive decomposition allows B-Nodes to be used not only for entire e-commerce system but also sub-modules within this system. The use of fundamental units allows the performance of heterogeneous technologies to be compared and other units to be derived. Results to date indicate no comparable model exists. Should further work validate this technique the authors recommend …


A Case For Systems Thinking And System Dynamics, Craig William Caulfield, Stanislaw P. Maj Jan 2001

A Case For Systems Thinking And System Dynamics, Craig William Caulfield, Stanislaw P. Maj

Research outputs pre 2011

Systems thinking is a way of thinking that focuses on the relationships between the parts forming a purposeful whole. System dynamics is concerned with building computer models of complex problem situations and then experimenting with and studying the behaviour of these models over time. This paper is a review of systems thinking that considers its unique history and influences, paradigms and methodologies, and presents a case for the system dynamics methodology as the best tool for the most diverse range of problem situations


Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.) Jan 2001

Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)

Research outputs pre 2011

Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.

This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.

All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.


Educating Professional Software Engineers: Pathways And Progress In The Australian Experience, Rick Duley, David Veal, Stanislaw P. Maj Jan 2001

Educating Professional Software Engineers: Pathways And Progress In The Australian Experience, Rick Duley, David Veal, Stanislaw P. Maj

Research outputs pre 2011

Australia has seized the international initiative in the recognition of software engineers as professionals. Of the 37 universities in Australia offering undergraduate courses in computing, eleven offer courses in software engineering which are accredited by the Institute of Engineers, Australia (IEAust) and which may lead the graduate to membership of the Institute. In this way, the Institute has plausible claim to being the first national professional engineering body in the world to have accredited four-year undergraduate software engineering degrees as professional qualifications. The paper traces the development of the relationship between the Institute of Engineers and the computing industry and …


Biometric Imaging: Three Dimensional Imaging Of The Human Hand Using Coded Structured Lighting, T. A. Vuori, C. L. Smith Jan 1995

Biometric Imaging: Three Dimensional Imaging Of The Human Hand Using Coded Structured Lighting, T. A. Vuori, C. L. Smith

Research outputs pre 2011

In this report the results of applying a three dimensional range imaging system, based on coded structured light, are presented. This includes a description of a new improved spatial coding scheme. This new scheme increases the number of reference points available and provides a basis for more accurate calculation of their location. A detailed description of the image processing methods used to extract structural information and to identify structural objects from the camera image are given. In addition the method used to calculate the locations of reference points with 'subpixel' accuracy is described. Finally, the results of experiments with synthesised …