Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [RstdPub] (2)
- Biochemical oxygen demand (1)
- Biochemical oxygen demands (BOD) (1)
- Chemical oxygen demand (1)
- Communications (1)
-
- Computer crime (1)
- Computer forensics (1)
- Computer security (1)
- Detection (1)
- Escherichia coli (1)
- Fences (1)
- Fiber optic sensors (1)
- Fibers (1)
- Harsh environment (1)
- In-ground (1)
- Influent concentrations (1)
- Intrusion Detection Systems (1)
- Intrusion detection (1)
- Macrophytes (1)
- Mercury (metal) (1)
- Mobile (1)
- Multi-parameter prediction (1)
- Neural networks (1)
- Nitrification-denitrification (1)
- Nitrogen (1)
- Nitrogen removal (1)
- Nutrients (1)
- Optical Fiber (1)
- Optical fibers (1)
- Organics (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian
Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian
Australian Digital Forensics Conference
The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …
The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli
Australian Digital Forensics Conference
Conference Foreword
This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …
Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun
Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun
Research outputs 2014 to 2021
This paper reports the performance of a pilot scale floating constructed wetland (FCW), employed for the treatment of polluted water collected from Buriganga river in Bangladesh. The FCW system included a tank for accommodating collected water and a floating mat with media, to support the growth of two macrophyte species Phragmites australis and Canna indica. Mean mass removal rates of 0.66, 0.76, 0.08, 0.51, 2.49g/m2d were achieved for ammoniacal nitrogen (NH4-N), total inorganic nitrogen (TIN), phosphorus (P), biochemical oxygen demand (BOD), chemical oxygen demand (COD), respectively by the FCW. Nitrogen removal was via nitrification-denitrification processes, whereas filtration-sedimentation appeared to influence …
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Research outputs 2014 to 2021
Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …
Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli
Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli
Research outputs 2014 to 2021
This paper investigates factors which can affect the accuracy of short-term wind speed prediction when done over long periods spanning different seasons. Two types of neural networks (NNs) are used to forecast power generated via specific horizontal axis wind turbines. Meteorological data used are for a specific Western Australian location. Results reveal that seasonal variations affect the prediction accuracy of the wind resource, but the magnitude of this influence strongly depends on the details of the NN deployed. Factors investigated include the span of the time series needed to initially train the networks, the temporal resolution of these data, the …