Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Experiments With Monte Carlo Othello, Philip Hingston, Martin Masek Jan 2007

Experiments With Monte Carlo Othello, Philip Hingston, Martin Masek

Research outputs pre 2011

In this paper, we report on our experiments with using Monte Carlo simulation (specifically the UCT algorithm) as the basis for an Othello playing program. Monte Carlo methods have been used for other games in the past, most recently and notably in successful Go playing programs. We show that Monte Carlo-based players have potential for Othello, and that evolutionary algorithms can be used to improve their strength.


Firearm Identification With Hierarchical Neural Networks By Analyzing The Firing Pin Images Retrieved From Cartridge Cases, Dongguang Li Jan 2007

Firearm Identification With Hierarchical Neural Networks By Analyzing The Firing Pin Images Retrieved From Cartridge Cases, Dongguang Li

Research outputs pre 2011

When a gun is fired, characteristic markings on the cartridge and projectile of a bullet are produced. Over thirty different features can be distinguished from observing these marks, which in combination produce a "fingerprint" for identification of a firearm. ln this paper, through the use of hierarchial neural networks a firearm identification system based on cartridge case images is proposed. We focus on the cartridge case identification of rim-fire mechanism. Experiments show that the model proposed has high performance and robustness by integrating two levels Self- Organizing Feature Map (SOFM) neural networks and the decision-making strategy. This model will also …


State Model Diagrams As A Pedagogical Tool - An International Evaluation, Stanislaw Maj, David Veal Jan 2007

State Model Diagrams As A Pedagogical Tool - An International Evaluation, Stanislaw Maj, David Veal

Research outputs pre 2011

State model diagrams (SMDs) have been successfully used as the pedagogical foundation of network technology curriculum. SMDs selectively integrate relevant output from network devices by means of tables. SMDs are modular and hierarchical, thereby providing top-down decomposition by means of levelling, allowing a complex network to be partitioned or structured into independent units of an amenable size so that the entire system can be more easily understood. An overview of the entire network or increasing levels of detail may be obtained while maintaining links and interfaces between the different levels. Furthermore, SMDs allow technical detail to be introduced in an …


Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli Jan 2007

Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli

Research outputs pre 2011

This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …


Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong Jan 2007

Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong

Research outputs pre 2011

The idea that social networks play an important role in knowledge diffusion of innovation has a long pedigree in innovation theory. In his Diffusion of Innovation (DOI) theory, Rogers (1995) argued that in the information network of the organization, managerial champions and opinion leaders could affect both organizational acceptance and also the velocity of adoption of innovation. In Small to Medium Enterprise (SME) C-commerce innovation, the role of such social factors has been understood in terms of ‘embedded network structure’ (Braun, 2003) that impacts on clustering behavior. This article explores the use of quantitative Social Network Analysis (SNA) to model …


Information Governance: A Model For Security In Medical Practice, Patricia Williams Jan 2007

Information Governance: A Model For Security In Medical Practice, Patricia Williams

Research outputs pre 2011

Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information'. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term ,and there is little existing …


Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa J. Armstrong Jan 2007

Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa J. Armstrong

Research outputs pre 2011

Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to …


Heat Shock Protein 90: A Potential Therapeutic Target In Leukemic Progenitor And Stem Cells Harboring Mutant Bcr-Abl Resistant To Kinase Inhibitors, C Peng, Dongguang Li, L Shaoguang Jan 2007

Heat Shock Protein 90: A Potential Therapeutic Target In Leukemic Progenitor And Stem Cells Harboring Mutant Bcr-Abl Resistant To Kinase Inhibitors, C Peng, Dongguang Li, L Shaoguang

Research outputs pre 2011

Development of drug resistance has become a major obstacle for tyrosine kinase inhibitors (TKIs) in the treatment of Philadelphia chromosome-positive (Ph+) chronic myelogenous leukemia (CML) and other cancers. The BCR-ABL-T315I mutant does not respond to clinically available TKIs, although some newly developed anti-BCR-ABL-T315I TKIs are now being tested in patients. TKIs transiently inhibit kinase activity of BCR-ABL, but do not reduce the level of the BCR-ABL protein. Elimination of mutant BCR-ABL protein would provide a new therapeutic strategy for treating Ph+ leukemia. We recently showed that inhibition of heat shock protein 90 (Hsp90) by a novel Hsp90 inhibitor, IPI-504, causes …


Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa J. Armstrong Jan 2007

Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa J. Armstrong

Research outputs pre 2011

Public Key Infrastructure (PKI) has for the last two decades been a means of securing systems and communication. With the adoption of Open Document Format (ODF) as an ISO standard, the question remains if the unpopular, expensive, complex and unmaintainable PKI can prove to be a viable means of securing ODF documents. This paper analyses the drawbacks of PKI and evaluates the useji.tlness of PKl in provisioning robust, cheap and maintainable XML security to XML based ODF. This paper also evaluates the existing research on XML security, more specifically fine grained access control.


Evolving Players For An Ancient Game: Hnefatafl, Philip Hingston Jan 2007

Evolving Players For An Ancient Game: Hnefatafl, Philip Hingston

Research outputs pre 2011

Hnefatafl is an ancient Norse game - an ancestor of chess. In this paper, we report on the development of computer players for this game. In the spirit of Blondie24, we evolve neural networks as board evaluation functions for different versions of the game. An unusual aspect of this game is that there is no general agreement on the rules: it is no longer much played, and game historians attempt to infer the rules from scraps of historical texts, with ambiguities often resolved on gut feeling as to what the rules must have been in order to achieve a balanced …


Use Of Online Tools To Aid Group Work, Martin Masek Jan 2007

Use Of Online Tools To Aid Group Work, Martin Masek

Research outputs pre 2011

In this paper we examine the use of online tools – namely wikis and blogs in aiding group work for a large and diverse student-based team. The results suggest that while students see the generic skill of being able to work in a team as important for their future career, using blogs and wikis is not seen to be as important. It was also found that the flexibility of these tools provides more motivation for students than having assessment based on their use.


Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li Jan 2007

Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li

Research outputs pre 2011

Charactetistic markings on the cartridge case and projectile of a fired bullet are created when it is fired. Over thirty different features within these marks can be distinguished, which in combination produce a "fingerprint" for a firearm. By analyzing features within such a set of fireann :fingerprints, it will be possible to identify not only the type and model of a fireann, but also each every individual weapon as effectively as human :fingerprint identification. A new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens by the line-scan imaging technique is proposed in this paper. Experimental …


Proceedings Of The Sixth International Workshop For Applied Pkc (Iwap2007), Dongguang Li Jan 2007

Proceedings Of The Sixth International Workshop For Applied Pkc (Iwap2007), Dongguang Li

Research outputs pre 2011

IWAP2007 will be the sixth of a series of successful international workshops with focus on research and engineering issues of the applied aspects of public key cryptosystems. The inaugural IWAP event was held in Korea in 2001, and was subsequently held in 2002, 2004, 2005 and 2006 respectively in Taipei, Japan, Singapore and China. The IWAP2003 was cancelled due to the SARS breakout. Theoreticians and practitioners interested in the applied issues of PKC were encouraged to participate and contribute to the continuous success of the IWAP workshop series. The host of the IWAP2007 is Edith Cowan University. It is my …


Some Problems In Network And Data Centre Management, David Veal, Gurpreet Kohli Jan 2007

Some Problems In Network And Data Centre Management, David Veal, Gurpreet Kohli

Research outputs pre 2011

Computer networks are vital to the running of modern organisations. Network managers are often concerned with the running of data centres. This paper provides an overview of some of the more important issues in managing modern computer networks and data centres and the problems faced in undertaking this task. It would be impossible to provide a complete list which, due to the fluid nature of this industry, would become outdated very quickly. It is important that network managers have an awareness of modern Occupational Health and Safety (OHS) requirements, training and skills. There is also a need for network managers …


Using A Cultural Lens To Interpret The Success And Failure Of Regional Internet Community Portals In Promoting E-Commerce Adoption By Smes, Denise Gengatharen, Craig Standing Jan 2007

Using A Cultural Lens To Interpret The Success And Failure Of Regional Internet Community Portals In Promoting E-Commerce Adoption By Smes, Denise Gengatharen, Craig Standing

Research outputs pre 2011

In Western Australia (WA), efforts to increase SME e-commerce adoption have been integrated with some governmentlunded collaboratively-owned regional Internet community portals. This paper examines three such cases, two in regional WA and one in the metropolitan area, to determine the impact of cultural factors on the success of these portals. Results indicate that the collectivist culture of the communities in the two regional areas played an important role in initially sustaining the portals. Subsequently, legitimacy and mimetic pressure also contributed to SME involvement in these portals resulting in an overall increase in awareness by this sector of the benefits and …


Factors Influencing Speed Of Cancer Diagnosis In Rural Wa, Moyez Jiwa, Georgia Halkett, Samar Aoun, Hayley Arnet, Marthe Smith, Megan Pilkington, Cheryl Mcmullen Jan 2007

Factors Influencing Speed Of Cancer Diagnosis In Rural Wa, Moyez Jiwa, Georgia Halkett, Samar Aoun, Hayley Arnet, Marthe Smith, Megan Pilkington, Cheryl Mcmullen

Research outputs pre 2011

Introduction: The speed of diagnosis impacts on prognosis and survival in all types of cancer. In most cases survival and prognosis are significantly worse in rural and remote Australian populations who have less access to diagnostic and therapeutic services than metropolitan communities in this country. Research suggests that in general delays in diagnosis were a factor of misdiagnosis, the confounding effect of existing conditions and delayed or misleading investigation of symptoms. The aim of this study is to further explore the factors that impact on the speed of diagnosis in rural Western Australia with direct reference to General Practitioners (GPs) …


It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli Jan 2007

It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli

Research outputs pre 2011

Organisations worldwide are failing to adequately erase data from hard disks before disposing of them. Recent studies have uncovered significant and highly confidential data from computer hard disks for sale in the second hand market using minimal foresic recovery techniques. Increasingly medical businesses are being required to use IT based systems to deliver or receive services. Also medical records are becoming electronic in nature and have significant secondary storage requirements. Given the increased use of IT in medical practice this paper examines the issues uncovered in the studies into recovery of remnant data from hard disks. The paper also explores …


Experimental Demonstration Of A Dynamic 10gbit/S Wdm Header/Label Recognition Structure, Muhsen Aljada, Kamal Alameh, Byeong Ha Lee, Yong Tak Lee, Kiegon Im, Se-Jong Baik Jan 2007

Experimental Demonstration Of A Dynamic 10gbit/S Wdm Header/Label Recognition Structure, Muhsen Aljada, Kamal Alameh, Byeong Ha Lee, Yong Tak Lee, Kiegon Im, Se-Jong Baik

Research outputs pre 2011

In this paper, we experimentally demonstrate a dynamic wavelength-division-multiplexing (WDM) header/label recognition structure that processes on-the-fly WDM patterns. An opto-VLSI processor is used to dynamically generate digital phase holograms that control the wavelength components of the label/header to create digital wavelength profiles. An autocorrelation function of a high-peak is generated when a label bit pattern matches a digital wavelength profile. The main attractive feature of using an opto-VLSI processor is that the lookup table of matching digital wavelength profiles does not need modification when the data bit-rate is upgraded. The dynamic pattern recognition structure is experimentally demonstrated at 10 Gbit/s …


Experimental Demonstration Of A Tunable Laser Using An Soa And An Opto-Vlsi Processor, Muhsen Aljada, Rong Zheng, Kamal Alameh, Yong Lee Jan 2007

Experimental Demonstration Of A Tunable Laser Using An Soa And An Opto-Vlsi Processor, Muhsen Aljada, Rong Zheng, Kamal Alameh, Yong Lee

Research outputs pre 2011

In this paper we propose and experimentally demonstrate a tunable laser structure cascading a semiconductor optical amplifier (SOA) that generates broadband amplified spontaneous emission and a reflective Opto-VLSI processor that dynamically reflects arbitrarily wavelengths and injects them back into the SOA, thus synthesizing an output signal of variable wavelength. The wavelength tunablility is performed using digital phase holograms uploaded on the Opto-VLSI processor. Experimental results demonstrate a tuning range from 1524nm to 1534nm, and show that the proposed tunable laser structure has a stable performance.


Pervasive 2d Barcodes For Camera Phone Applications, Hiroko Kato, Keng T. Tan Jan 2007

Pervasive 2d Barcodes For Camera Phone Applications, Hiroko Kato, Keng T. Tan

Research outputs pre 2011

In a previous study, we evaluated six 2D barcodes using eight criteria for standardization potential: omnidirectional symbol reading, support for low-resolution cameras, reading robustness under different lighting conditions, barcode reading distance, error correction capability, security, support for multiple character sets, and data capacity. We also considered the fidelity of the camera phone's captured image as a metric for gauging reading reliability. Here, we review the six 2D barcodes and then use an additional metric - a first-read rate - to quantitatively verify our earlier results and better gauge reading reliability.


It Devices And Energy Consumption, David Veal Jan 2007

It Devices And Energy Consumption, David Veal

Research outputs pre 2011

The need for energy conservation has been topical for many years and has gained importance with global warming scenarios and the increasing cost of energy. This paper examines energy consumption of common home IT devices such as routers, voice boxes, PCs and printers with respect to minimising standby power. Another problem of concern in energy usage as related to IT activity is the increasing electrical power consumption levels of data centres, along with data centre cooling problems and the attempts to enhance their energy efficiency. These scenarios illustrate small amounts of energy consumption used by vast numbers of device compared …


Profiling Through A Digital Mobile Device, Lee Fueng Yap, Andrew Jones Jan 2007

Profiling Through A Digital Mobile Device, Lee Fueng Yap, Andrew Jones

Research outputs pre 2011

Mobile digital devices have evolved from telecommunications device to a lifestyle product over the years. These devices are used in all aspects of our daily life. As a result, more information is stored within the devices. Unprotected mobile digital device is susceptible to privacy invasion attack when the device falls into the wrong hand of any unscrupulous third party. The main objective of this paper is to provide an implication analysis on the possible risks of information leakage through digital mobile devices, in the case when users forget to, or choose never to apply any security protection to their devices


A Gui For The Deaf-Blind: An Additional Concepts Paper, David Veal Jan 2007

A Gui For The Deaf-Blind: An Additional Concepts Paper, David Veal

Research outputs pre 2011

People with some residual vision though still classified as blind may be able to read on screen patterns presented via a computer program whereby such a pattern can represent a textual character and a presentation of sequences of such patterns can represent words. These patterns can be adjusted to utilize the user’s remaining vision capacity. Previous research has shown that volunteers who where legally classified as blind could read simple sentences via such a system. This system is known as the Dynamic Pattern System (DPS) and is a test bed for research. Although this research involved a single pattern represented …


Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith Jan 2007

Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith

Research outputs pre 2011

This paper demonstrates discrete laser spot projection over a wide angle using a novel cylindrical quasi-cavity waveguide, with no moving parts. Furthermore, the distance to each spot is calculated using active laser triangulation. The triangulation arrangement and the trajectory of principal rays are modelled using a system of linear equations based on optical geometry. Linear algebra is used to derive the unique baseline and outgoing angle of every projected beam. The system is calibrated by finding optimal values for uncertain instrumental parameters using constrained non-linear optimization. Distances calculated indoors result in accuracies of over 93%


Design And Characterization Of Cmos/Soi Image Sensors, Igor Brouk, Kamal Alameh, Yael Nemirovsky Jan 2007

Design And Characterization Of Cmos/Soi Image Sensors, Igor Brouk, Kamal Alameh, Yael Nemirovsky

Research outputs pre 2011

The design, operation, and characterization of CMOS imagers implemented using: 1) "regular" CMOS wafers with a 0.5-mum CMOS analog process; 2) "regular" CMOS wafers with a 0.35-mum CMOS analog process; and 3) silicon-on-insulator (SOI) wafers in conjunction with a 0.35-mum CMOS analog process, are discussed in this paper. The performances of the studied imagers are compared in terms of quantum efficiency, dark current, and optical bandwidth. It is found that there is strong dependence of quantum efficiency of the photodiodes on the architecture of the image sensor. The results of this paper are useful for designing and modeling CMOS/SOI image …


Wavelength-Encoded Ocdma System Using Opto-Vlsi Processors, Muhsen Aljada, Kamal Alameh Jan 2007

Wavelength-Encoded Ocdma System Using Opto-Vlsi Processors, Muhsen Aljada, Kamal Alameh

Research outputs pre 2011

We propose and experimentally demonstrate a 2.5 Gbits/sper user wavelength-encoded optical code-division multiple-access encoder-decoder structure based on opto-VLSI processing. Each encoder and decoder is constructed using a single 1D opto-very-large-scale-integrated (VLSI) processor in conjunction with a fiber Bragg grating (FBG) array of different Bragg wavelengths. The FBG array spectrally and temporally slices the broadband input pulse into several components and the opto-VLSI processor generates codewords using digital phase holograms. System performance is measured in terms of the autocorrelation and cross-correlation functions as well as the eye diagram.