Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli Jan 2016

The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli

Australian Digital Forensics Conference

Conference Foreword

This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …


Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun Jan 2016

Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun

Research outputs 2014 to 2021

This paper reports the performance of a pilot scale floating constructed wetland (FCW), employed for the treatment of polluted water collected from Buriganga river in Bangladesh. The FCW system included a tank for accommodating collected water and a floating mat with media, to support the growth of two macrophyte species Phragmites australis and Canna indica. Mean mass removal rates of 0.66, 0.76, 0.08, 0.51, 2.49g/m2d were achieved for ammoniacal nitrogen (NH4-N), total inorganic nitrogen (TIN), phosphorus (P), biochemical oxygen demand (BOD), chemical oxygen demand (COD), respectively by the FCW. Nitrogen removal was via nitrification-denitrification processes, whereas filtration-sedimentation appeared to influence …


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …


Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli Jan 2016

Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli

Research outputs 2014 to 2021

This paper investigates factors which can affect the accuracy of short-term wind speed prediction when done over long periods spanning different seasons. Two types of neural networks (NNs) are used to forecast power generated via specific horizontal axis wind turbines. Meteorological data used are for a specific Western Australian location. Results reveal that seasonal variations affect the prediction accuracy of the wind resource, but the magnitude of this influence strongly depends on the details of the NN deployed. Factors investigated include the span of the time series needed to initially train the networks, the temporal resolution of these data, the …


An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene Jan 2016

An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene

Theses: Doctorates and Masters

This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …


Lifetime And Efficiency Improvement Of Organic Luminescent Solar Concentrators For Photovoltaic Applications, Yamna El Mouedden Jan 2016

Lifetime And Efficiency Improvement Of Organic Luminescent Solar Concentrators For Photovoltaic Applications, Yamna El Mouedden

Theses: Doctorates and Masters

In order to achieve the goal of zero net-energy consumption in residential and commercial buildings, substantial research has been devoted to developing methods for energy harvesting from window glass that is capable of passing visible light through the windows of buildings while converting the unwanted invisible solar radiation into electricity. Research has focussed on two particular aspects, namely (i) the integration of thin-film technology for solar radiation transmission control and (ii) light guiding structures for solar radiation routing towards the edges of the glass window.

Recently, photovoltaic (PV) solar cells have been investigated and promoted as products for converting solar …


Interfacing Of Neuromorphic Vision, Auditory And Olfactory Sensors With Digital Neuromorphic Circuits, Anup Vanarse Jan 2016

Interfacing Of Neuromorphic Vision, Auditory And Olfactory Sensors With Digital Neuromorphic Circuits, Anup Vanarse

Theses: Doctorates and Masters

The conventional Von Neumann architecture imposes strict constraints on the development of intelligent adaptive systems. The requirements of substantial computing power to process and analyse complex data make such an approach impractical to be used in implementing smart systems.

Neuromorphic engineering has produced promising results in applications such as electronic sensing, networking architectures and complex data processing. This interdisciplinary field takes inspiration from neurobiological architecture and emulates these characteristics using analogue Very Large Scale Integration (VLSI). The unconventional approach of exploiting the non-linear current characteristics of transistors has aided in the development of low-power adaptive systems that can be implemented …


Impacts Of Artisanal And Large Scale Gold Mining On Tropical Rivers In West Africa: A Case Study From The Brong Ahafo Region Of Ghana, Karunia F. Macdonald Jan 2016

Impacts Of Artisanal And Large Scale Gold Mining On Tropical Rivers In West Africa: A Case Study From The Brong Ahafo Region Of Ghana, Karunia F. Macdonald

Theses: Doctorates and Masters

Mining communities in more than 70 developing countries, mostly in the tropical regions, still practise artisanal and small scale gold mining (ASGM). ASGM commonly operates along rivers and streams for easy access to process water and as receptacles for mine water discharges. A largely unregulated industry, ASGM employs rudimentary mining and processing methods including the use of mercury amalgamation, and is often found near to larger scale and modern mining (LSM) operations.

The substantial use of mercury by ASGM has drawn the attention of agencies and researchers but so has its persistent economic role in providing much needed rural employment. …