Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

[RSTDPub]

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 150

Full-Text Articles in Computer Sciences

Pymaivar: An Open-Source Python Suit For Audio-Image Representation In Human Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar Sep 2023

Pymaivar: An Open-Source Python Suit For Audio-Image Representation In Human Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar

Research outputs 2022 to 2026

We present PyMAiVAR, a versatile toolbox that encompasses the generation of image representations for audio data including Wave plots, Spectral Centroids, Spectral Roll Offs, Mel Frequency Cepstral Coefficients (MFCC), MFCC Feature Scaling, and Chromagrams. This wide-ranging toolkit generates rich audio-image representations, playing a pivotal role in reshaping human action recognition. By fully exploiting audio data's latent potential, PyMAiVAR stands as a significant advancement in the field. The package is implemented in Python and can be used across different operating systems.


A Survey On Artificial Intelligence-Based Acoustic Source Identification, Ruba Zaheer, Iftekhar Ahmad, Daryoush Habibi, Kazi Y. Islam, Quoc Viet Phung Jan 2023

A Survey On Artificial Intelligence-Based Acoustic Source Identification, Ruba Zaheer, Iftekhar Ahmad, Daryoush Habibi, Kazi Y. Islam, Quoc Viet Phung

Research outputs 2022 to 2026

The concept of Acoustic Source Identification (ASI), which refers to the process of identifying noise sources has attracted increasing attention in recent years. The ASI technology can be used for surveillance, monitoring, and maintenance applications in a wide range of sectors, such as defence, manufacturing, healthcare, and agriculture. Acoustic signature analysis and pattern recognition remain the core technologies for noise source identification. Manual identification of acoustic signatures, however, has become increasingly challenging as dataset sizes grow. As a result, the use of Artificial Intelligence (AI) techniques for identifying noise sources has become increasingly relevant and useful. In this paper, we …


A Review Of Multi-Factor Authentication In The Internet Of Healthcare Things, Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang Jan 2023

A Review Of Multi-Factor Authentication In The Internet Of Healthcare Things, Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang

Research outputs 2022 to 2026

Objective: This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. Methods: To review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations …


Evaluating Staff Attitudes, Intentions, And Behaviors Related To Cyber Security In Large Australian Health Care Environments: Mixed Methods Study, Martin Dart, Mohiuddin Ahmed Jan 2023

Evaluating Staff Attitudes, Intentions, And Behaviors Related To Cyber Security In Large Australian Health Care Environments: Mixed Methods Study, Martin Dart, Mohiuddin Ahmed

Research outputs 2022 to 2026

Background: Previous studies have identified that the effective management of cyber security in large health care environments is likely to be significantly impacted by human and social factors, as well as by technical controls. However, there have been limited attempts to confirm this by using measured and integrated studies to identify specific user motivations and behaviors that can be managed to achieve improved outcomes.

Objective: This study aims to document and analyze survey and interview data from a diverse range of health care staff members, to determine the primary motivations and behaviors that influence their acceptance and application of cyber …


Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang Dec 2022

Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang

Research outputs 2022 to 2026

Monitoring a patient’s vital signs is considered one of the most challenging problems in telehealth systems, especially when patients reside in remote locations. Companies now use IoT devices such as wearable devices to participate in telehealth systems. However, the steady adoption of wearables can result in a significant increase in the volume of data being collected and transmitted. As these devices run on limited battery power, they can run out of power quickly due to the high processing requirements of the device for data collection and transmission. Given the importance of medical data, it is imperative that all transmitted data …


Expressiveness Of Real-Time Motion Captured Avatars Influences Perceived Animation Realism And Perceived Quality Of Social Interaction In Virtual Reality, Alan D. Fraser, Isabella Branson, Ross C. Hollett, Craig P. Speelman, Shane L. Rogers Dec 2022

Expressiveness Of Real-Time Motion Captured Avatars Influences Perceived Animation Realism And Perceived Quality Of Social Interaction In Virtual Reality, Alan D. Fraser, Isabella Branson, Ross C. Hollett, Craig P. Speelman, Shane L. Rogers

Research outputs 2022 to 2026

Using motion capture to enhance the realism of social interaction in virtual reality (VR) is growing in popularity. However, the impact of different levels of avatar expressiveness on the user experience is not well understood. In the present study we manipulated levels of face and body expressiveness of avatars while investigating participant perceptions of animation realism and interaction quality when disclosing positive and negative experiences in VR. Moderate positive associations were observed between perceptions of animation realism and interaction quality. Post-experiment questions revealed that many of our participants (approximately 40 %) indicated the avatar with the highest face and body …


Anomaly Detection In Cybersecurity Datasets Via Cooperative Co-Evolution-Based Feature Selection, Bazlur A. N. M. Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland Sep 2022

Anomaly Detection In Cybersecurity Datasets Via Cooperative Co-Evolution-Based Feature Selection, Bazlur A. N. M. Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland

Research outputs 2022 to 2026

Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challenging and computationally expensive task. Feature selection (FS) is an approach to remove irrelevant and redundant features and select a subset of features, which can improve the machine learning algorithms’ performance. In fact, FS is an effective preprocessing step of anomaly detection techniques. This article’s main objective is to improve and quantify the accuracy and scalability of both supervised and unsupervised anomaly detection techniques. In this effort, a novel anomaly detection approach using FS, called Anomaly Detection Using Feature Selection (ADUFS), has been introduced. Experimental analysis …


Ransomware 2.0: An Emerging Threat To National Security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, Shaun Barnett Jul 2022

Ransomware 2.0: An Emerging Threat To National Security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, Shaun Barnett

Research outputs 2022 to 2026

The global Covid-19 pandemic has seen the rapid evolution of our traditional working environment; more people are working from home and the number of online meetings has increased. This trend has also affected the security sector. Consequently, the evolution of ransomware to what is now being described as ‘Ransomware 2.0’ has governments, businesses and individuals alike rushing to secure their data.


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Research outputs 2022 to 2026

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Biometric Security: A Novel Ear Recognition Approach Using A 3d Morphable Ear Model, Md Mursalin, Mohiuddin Ahmed, Paul Haskell-Dowland Jan 2022

Biometric Security: A Novel Ear Recognition Approach Using A 3d Morphable Ear Model, Md Mursalin, Mohiuddin Ahmed, Paul Haskell-Dowland

Research outputs 2022 to 2026

Biometrics is a critical component of cybersecurity that identifies persons by verifying their behavioral and physical traits. In biometric-based authentication, each individual can be correctly recognized based on their intrinsic behavioral or physical features, such as face, fingerprint, iris, and ears. This work proposes a novel approach for human identification using 3D ear images. Usually, in conventional methods, the probe image is registered with each gallery image using computational heavy registration algorithms, making it practically infeasible due to the time-consuming recognition process. Therefore, this work proposes a recognition pipeline that reduces the one-to-one registration between probe and gallery. First, a …


Realistic Motion Avatars Are The Future For Social Interaction In Virtual Reality, Shane L. Rogers, Rebecca Broadbent, Jemma Brown, Allan Fraser, Craig P. Speelman Jan 2022

Realistic Motion Avatars Are The Future For Social Interaction In Virtual Reality, Shane L. Rogers, Rebecca Broadbent, Jemma Brown, Allan Fraser, Craig P. Speelman

Research outputs 2022 to 2026

This study evaluated participant self-reported appraisal of social interactions with another person in virtual reality (VR) where their conversational partner was represented by a realistic motion avatar. We use the term realistic motion avatar because: 1. The avatar was modelled to look like the conversational partner it represented, and 2. Full face and body motion capture was utilised so that the avatar mimicked the facial and body language of the conversational partner in real-time. We compared social interaction in VR with face-to-face interaction across two communicative contexts: 1. Getting acquainted conversation, and 2. A structured interview where the participant engaged …


Infrequent Pattern Detection For Reliable Network Traffic Analysis Using Robust Evolutionary Computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Al-Sakib K. Pathan Jan 2021

Infrequent Pattern Detection For Reliable Network Traffic Analysis Using Robust Evolutionary Computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Al-Sakib K. Pathan

Research outputs 2014 to 2021

While anomaly detection is very important in many domains, such as in cybersecurity, there are many rare anomalies or infrequent patterns in cybersecurity datasets. Detection of infrequent patterns is computationally expensive. Cybersecurity datasets consist of many features, mostly irrelevant, resulting in lower classification performance by machine learning algorithms. Hence, a feature selection (FS) approach, i.e., selecting relevant features only, is an essential preprocessing step in cybersecurity data analysis. Despite many FS approaches proposed in the literature, cooperative co-evolution (CC)-based FS approaches can be more suitable for cybersecurity data preprocessing considering the Big Data scenario. Accordingly, in this paper, we have …


Green Underwater Wireless Communications Using Hybrid Optical-Acoustic Technologies, Kazi Y. Islam, Iftekhar Ahmad, Daryoush Habibi, M. Ishtiaque A. Zahed, Joarder Kamruzzaman Jan 2021

Green Underwater Wireless Communications Using Hybrid Optical-Acoustic Technologies, Kazi Y. Islam, Iftekhar Ahmad, Daryoush Habibi, M. Ishtiaque A. Zahed, Joarder Kamruzzaman

Research outputs 2014 to 2021

Underwater wireless communication is a rapidly growing field, especially with the recent emergence of technologies such as autonomous underwater vehicles (AUVs) and remotely operated vehicles (ROVs). To support the high-bandwidth applications using these technologies, underwater optics has attracted significant attention, alongside its complementary technology – underwater acoustics. In this paper, we propose a hybrid opto-acoustic underwater wireless communication model that reduces network power consumption and supports high-data rate underwater applications by selecting appropriate communication links in response to varying traffic loads and dynamic weather conditions. Underwater optics offers high data rates and consumes less power. However, due to the severe …


The Open Maritime Traffic Analysis Dataset, Martin Masek, Chiou Peng Lam, Travis Rybicki, Jacob Snell, Daniel Wheat, Luke Kelly, Damion Glassborow, Cheryl Smith-Gander Jan 2021

The Open Maritime Traffic Analysis Dataset, Martin Masek, Chiou Peng Lam, Travis Rybicki, Jacob Snell, Daniel Wheat, Luke Kelly, Damion Glassborow, Cheryl Smith-Gander

Research outputs 2014 to 2021

Ships traverse the world’s oceans for a diverse range of reasons, including the bulk transportation of goods and resources, carriage of people, exploration and fishing. The size of the oceans and the fact that they connect a multitude of different countries provide challenges in ensuring the safety of vessels at sea and the prevention of illegal activities. To assist with the tracking of ships at sea, the International Maritime Organisation stipulates the use of the Automatic Identification System (AIS) on board ships. The AIS system periodically broadcasts details of a ship’s position, speed and heading, along with other parameters corresponding …


Investigation Of Enhanced Double Weight Code In Point To Point Access Networks, Hesham A. Bakarman, Ali Z. Ghazi Zahid, M. H. Mezher, Al Aboud Wahed Al-Isawi, Feras N. Hasoon, Saad H. Al-Isawi, Hussein A. Rasool, Sahbudin Shaari, Maitham Al-Alyawy, S. T. Yousif, Jaber K. Taher, Ali H. Mezher, Hala Musawy, W. Y. Chong, R. Zakaria Jun 2020

Investigation Of Enhanced Double Weight Code In Point To Point Access Networks, Hesham A. Bakarman, Ali Z. Ghazi Zahid, M. H. Mezher, Al Aboud Wahed Al-Isawi, Feras N. Hasoon, Saad H. Al-Isawi, Hussein A. Rasool, Sahbudin Shaari, Maitham Al-Alyawy, S. T. Yousif, Jaber K. Taher, Ali H. Mezher, Hala Musawy, W. Y. Chong, R. Zakaria

Research outputs 2014 to 2021

© 2020 Published under licence by IOP Publishing Ltd. In this paper, an investigation and evaluation to enhanced double weight (EDW) code is performed, a new technique for code structuring and building using modified arithmetical model has been given for the code in place of employing previous technique based on Trial Inspections. Innovative design has been employed for the code into P2P networks using diverse weighted EDW code to be fitting into optical CDMA relevance applications. A new developed relation for EDW code is presented, the relation is based on studying and experimenting the effect of input transmission power with …


Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli Jun 2020

Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli

Research outputs 2014 to 2021

Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular. Cyber security threats against the MQTT protocol are anticipated to increase at par with its increasing use by IoT manufacturers. In particular, IoT is vulnerable to protocol-based Application layer Denial of Service (DoS) attacks, which have been known to cause widespread service disruption in legacy systems. In this paper, we propose an Application layer DoS attack detection framework for the MQTT protocol and test the scheme on …


Migrating From Partial Least Squares Discriminant Analysis To Artificial Neural Networks: A Comparison Of Functionally Equivalent Visualisation And Feature Contribution Tools Using Jupyter Notebooks, Kevin M. Mendez, David I. Broadhurst, Stacey N. Reinke Jan 2020

Migrating From Partial Least Squares Discriminant Analysis To Artificial Neural Networks: A Comparison Of Functionally Equivalent Visualisation And Feature Contribution Tools Using Jupyter Notebooks, Kevin M. Mendez, David I. Broadhurst, Stacey N. Reinke

Research outputs 2014 to 2021

Introduction:

Metabolomics data is commonly modelled multivariately using partial least squares discriminant analysis (PLS-DA). Its success is primarily due to ease of interpretation, through projection to latent structures, and transparent assessment of feature importance using regression coefficients and Variable Importance in Projection scores. In recent years several non-linear machine learning (ML) methods have grown in popularity but with limited uptake essentially due to convoluted optimisation and interpretation. Artificial neural networks (ANNs) are a non-linear projection-based ML method that share a structural equivalence with PLS, and as such should be amenable to equivalent optimisation and interpretation methods.

Objectives:

We hypothesise that …


Cooperative Co-Evolution For Feature Selection In Big Data With Random Feature Grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland Jan 2020

Cooperative Co-Evolution For Feature Selection In Big Data With Random Feature Grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland

Research outputs 2014 to 2021

© 2020, The Author(s). A massive amount of data is generated with the evolution of modern technologies. This high-throughput data generation results in Big Data, which consist of many features (attributes). However, irrelevant features may degrade the classification performance of machine learning (ML) algorithms. Feature selection (FS) is a technique used to select a subset of relevant features that represent the dataset. Evolutionary algorithms (EAs) are widely used search strategies in this domain. A variant of EAs, called cooperative co-evolution (CC), which uses a divide-and-conquer approach, is a good choice for optimization problems. The existing solutions have poor performance because …


A Novel Penalty-Based Wrapper Objective Function For Feature Selection In Big Data Using Cooperative Co-Evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland Jan 2020

A Novel Penalty-Based Wrapper Objective Function For Feature Selection In Big Data Using Cooperative Co-Evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul Haskell-Dowland

Research outputs 2014 to 2021

The rapid progress of modern technologies generates a massive amount of high-throughput data, called Big Data, which provides opportunities to find new insights using machine learning (ML) algorithms. Big Data consist of many features (also called attributes); however, not all these are necessary or relevant, and they may degrade the performance of ML algorithms. Feature selection (FS) is an essential preprocessing step to reduce the dimensionality of a dataset. Evolutionary algorithms (EAs) are widely used search algorithms for FS. Using classification accuracy as the objective function for FS, EAs, such as the cooperative co-evolutionary algorithm (CCEA), achieve higher accuracy, even …


Trade-Off Assessments Between Reading Cost And Accuracy Measures For Digital Camera Monitoring Of Recreational Boating Effort, Ebenezer Afrifa-Yamoah, Stephen M. Taylor, Ute Mueller Jan 2020

Trade-Off Assessments Between Reading Cost And Accuracy Measures For Digital Camera Monitoring Of Recreational Boating Effort, Ebenezer Afrifa-Yamoah, Stephen M. Taylor, Ute Mueller

Research outputs 2014 to 2021

Digital camera monitoring is increasingly being used to monitor recreational fisheries. The manual interpretation of video imagery can be costly and time consuming. In an a posteriori analysis, we investigated trade-offs between the reading cost and accuracy measures of estimates of boat retrievals obtained at various sampling proportions for low, moderate and high traffic boat ramps in Western Australia. Simple random sampling, systematic sampling and stratified sampling designs with proportional and weighted allocation were evaluated to assess trade-offs in terms of bias, accuracy, precision, coverage rate and cost in estimating the annual total number of powerboat retrievals in 10,000 jackknife …


Performances Of The Lbp Based Algorithm Over Cnn Models For Detecting Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le, Selam Ahderom, Kamal Alameh Jan 2020

Performances Of The Lbp Based Algorithm Over Cnn Models For Detecting Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le, Selam Ahderom, Kamal Alameh

Research outputs 2014 to 2021

Weed invasions pose a threat to agricultural productivity. Weed recognition and detection play an important role in controlling weeds. The challenging problem of weed detection is how to discriminate between crops and weeds with a similar morphology under natural field conditions such as occlusion, varying lighting conditions, and different growth stages. In this paper, we evaluate a novel algorithm, filtered Local Binary Patterns with contour masks and coefficient k (k-FLBPCM), for discriminating between morphologically similar crops and weeds, which shows significant advantages, in both model size and accuracy, over state-of-the-art deep convolutional neural network (CNN) models such as VGG-16, VGG-19, …


Use Of Landsat Imagery To Map Spread Of The Invasive Alien Species Acacia Nilotica In Baluran National Park, Indonesia, Sutomo Sutomo, Eddie Van Etten, Rajif Iryadi Jan 2020

Use Of Landsat Imagery To Map Spread Of The Invasive Alien Species Acacia Nilotica In Baluran National Park, Indonesia, Sutomo Sutomo, Eddie Van Etten, Rajif Iryadi

Research outputs 2014 to 2021

© 2020 Seameo Biotrop. In the late 1960s, Acacia nilotica was introduced to Baluran National Park to establish fire breaks which would prevent the spread of fire from Baluran Savanna to the adjacent teak forest. However, A. nilotica has spread rapidly and has threatened the existence of Baluran Savanna as it has caused an ecosystem transition from an open savanna to a closed canopy of A. nilotica in some areas. This study is one of the few that examines A. nilotica invasion in Baluran National Park through remote sensing. Land cover dynamics were quantified using a supervised classification approach on …


Quantifiable Isovist And Graph-Based Measures For Automatic Evaluation Of Different Area Types In Virtual Terrain Generation, Andrew Pech, Chiou Peng Lam, Martin Masek Jan 2020

Quantifiable Isovist And Graph-Based Measures For Automatic Evaluation Of Different Area Types In Virtual Terrain Generation, Andrew Pech, Chiou Peng Lam, Martin Masek

Research outputs 2014 to 2021

© 2013 IEEE. This article describes a set of proposed measures for characterizing areas within a virtual terrain in terms of their attributes and their relationships with other areas for incorporating game designers' intent in gameplay requirement-based terrain generation. Examples of such gameplay elements include vantage point, strongholds, chokepoints and hidden areas. Our measures are constructed on characteristics of an isovist, that is, the volume of visible space at a local area and the connectivity of areas within the terrain. The calculation of these measures is detailed, in particular we introduce two new ways to accurately and efficiently calculate the …


Sam-Sos: A Stochastic Software Architecture Modeling And Verification Approach For Complex System-Of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar Jan 2020

Sam-Sos: A Stochastic Software Architecture Modeling And Verification Approach For Complex System-Of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar

Research outputs 2014 to 2021

A System-of-Systems (SoS) is a complex, dynamic system whose Constituent Systems (CSs) are not known precisely at design time, and the environment in which they operate is uncertain. SoS behavior is unpredictable due to underlying architectural characteristics such as autonomy and independence. Although the stochastic composition of CSs is vital to achieving SoS missions, their unknown behaviors and impact on system properties are unavoidable. Moreover, unknown conditions and volatility have significant effects on crucial Quality Attributes (QAs) such as performance, reliability and security. Hence, the structure and behavior of a SoS must be modeled and validated quantitatively to foresee any …


Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh Jan 2019

Effective Plant Discrimination Based On The Combination Of Local Binary Pattern Operators And Multiclass Support Vector Machine Methods, Vi N T Le, Beniamin Apopei, Kamal Alameh

Research outputs 2014 to 2021

Accurate crop and weed discrimination plays a critical role in addressing the challenges of weed management in agriculture. The use of herbicides is currently the most common approach to weed control. However, herbicide resistant plants have long been recognised as a major concern due to the excessive use of herbicides. Effective weed detection techniques can reduce the cost of weed management and improve crop quality and yield. A computationally efficient and robust plant classification algorithm is developed and applied to the classification of three crops: Brassica napus (canola), Zea mays (maize/corn), and radish. The developed algorithm is based on the …


Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian Noel Mcateer, Peter Hannay, Muhammad Imran Malik, Zubair Baig Jan 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian Noel Mcateer, Peter Hannay, Muhammad Imran Malik, Zubair Baig

Research outputs 2014 to 2021

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Minimally Actuated Walking: Identifying Core Challenges To Economical Legged Locomotion Reveals Novel Solutions, Ryan T. Schroeder, John Ea Bertram Jan 2018

Minimally Actuated Walking: Identifying Core Challenges To Economical Legged Locomotion Reveals Novel Solutions, Ryan T. Schroeder, John Ea Bertram

Research outputs 2014 to 2021

Terrestrial organisms adept at locomotion employ strut-like legs for economical and robust movement across the substrate. Although it is relatively easy to observe and analyze details of the solutions these organic systems have arrived at, it is not as easy to identify the problems these movement strategies have solved. As such, it is useful to investigate fundamental challenges that effective legged locomotion overcomes in order to understand why the mechanisms employed by biological systems provide viable solutions to these challenges. Such insight can inform the design and development of legged robots that may eventually match or exceed animal performance. In …


Bringing Defensive Artificial Intelligence Capabilities To Mobile Devices, Kevin Chong, Ahmed Ibrahim Jan 2018

Bringing Defensive Artificial Intelligence Capabilities To Mobile Devices, Kevin Chong, Ahmed Ibrahim

Australian Information Security Management Conference

Traditional firewalls are losing their effectiveness against new and evolving threats today. Artificial intelligence (AI) driven firewalls are gaining popularity due to their ability to defend against threats that are not fully known. However, a firewall can only protect devices in the same network it is deployed in, leaving mobile devices unprotected once they leave the network. To comprehensively protect a mobile device, capabilities of an AI-driven firewall can enhance the defensive capabilities of the device. This paper proposes porting AI technologies to mobile devices for defence against today’s ever-evolving threats. A defensive AI technique providing firewall-like capability is being …


Security Vulnerabilities In Android Applications, Crischell Montealegre, Charles Rubia Njuguna, Muhammad Imran Malik, Peter Hannay, Ian Noel Mcateer Jan 2018

Security Vulnerabilities In Android Applications, Crischell Montealegre, Charles Rubia Njuguna, Muhammad Imran Malik, Peter Hannay, Ian Noel Mcateer

Australian Information Security Management Conference

Privacy-related vulnerabilities and risks are often embedded into applications during their development, with this action being either performed out of malice or out of negligence. Moreover, the majority of the mobile applications initiate connections to websites, other apps, or services outside of its scope causing significant compromise to the oblivious user. Therefore, mobile data encryption or related data-protection controls should be taken into account during the application development phase. This paper evaluates some standard apps and their associated threats using publicly available tools and demonstrates how an ignorant user or an organisation can fall prey to such apps.


Xmpp Architecture And Security Challenges In An Iot Ecosystem, Muhammad Imran Malik, Ian Noel Mcateer, Peter Hannay, Syed Naeem Firdous, Zubair Baig Jan 2018

Xmpp Architecture And Security Challenges In An Iot Ecosystem, Muhammad Imran Malik, Ian Noel Mcateer, Peter Hannay, Syed Naeem Firdous, Zubair Baig

Australian Information Security Management Conference

The elusive quest for technological advancements with the aim to make human life easier has led to the development of the Internet of Things (IoT). IoT technology holds the potential to revolutionise our daily life, but not before overcoming barriers of security and data protection. IoTs’ steered a new era of free information that transformed life in ways that one could not imagine a decade ago. Hence, humans have started considering IoTs as a pervasive technology. This digital transformation does not stop here as the new wave of IoT is not about people, rather it is about intelligent connected devices. …