Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism To Secure Wbsn Wearable Device Communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, Shixiong Chen Jan 2018

Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism To Secure Wbsn Wearable Device Communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, Shixiong Chen

Research outputs 2014 to 2021

Wireless body sensor networks (WBSNs) mostly consist of low-cost sensor nodes and implanted devices which generally have extremely limited capability of computations and energy capabilities. Hence, traditional security protocols and privacy enhancing technologies are not applicable to the WBSNs since their computations and cryptographic primitives are normally exceedingly complicated. Nowadays, mobile wearable and wireless muscle-computer interfaces have been integrated with the WBSN sensors for various applications such as rehabilitation, sports, entertainment, and healthcare. In this paper, we propose MGRNG, a novel muscle activity-driven green-oriented random number generation mechanism which uses the human muscle activity as green energy resource to generate …


Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell Jan 2016

Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell

Research outputs 2014 to 2021

Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …


The Social Life Of Big Data - Pawsey Resources, Luke Edwards Jun 2015

The Social Life Of Big Data - Pawsey Resources, Luke Edwards

The Social Life of Big Data Symposium

The presentation covers the supercomputing facilities and services available at the Pawsey Supercomputing Centre, Western Australia.
The Pawsey Supercomputing Centre is an unincorporated joint venture between CSIRO, Curtin University, Edith Cowan University, Murdoch University and the University of Western Australia and is supported by the Western Australian Government.


Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan Jan 2009

Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan

Australian Security and Intelligence Conference

Climate change and energy security are driving a worldwide renaissance in nuclear power. An Australian nuclear power industry has also been seriously investigated by the Australian government and its agencies. This paper provides a broad overview of the nuclear fuel cycle and the nuclear power industry. It identifies aspects that are sensitive to nuclear terrorism and nuclear weapons proliferation to help security professionals identify threats and prepare for a possible Australian nuclear power industry.


Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li Jan 2009

Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li

Australian Security and Intelligence Conference

Ballistics firearm identification based on image processing is of paramount importance in criminal investigation. The efficiency of traditional ballistics imaging system is heavily dependent upon the expertise and experience of end-user. An intelligent ballistics imaging system is highly demanded to address this issues. The segmentation of cartridge case object from the original image is a key step to subsequent process. It is very difficult to segment cartridge case from the original image using traditional threshold based methods due to the shadows or unlimited environments to acquire image. In this paper, we proposed a novel approach based upon the colour invariant …