Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 23 of 23

Full-Text Articles in Other Computer Sciences

International Students’ Expectations Of Information Literacy Instruction, Nicole Johnston, Meggan Houlihan, Jodi Neindorf Jan 2018

International Students’ Expectations Of Information Literacy Instruction, Nicole Johnston, Meggan Houlihan, Jodi Neindorf

Research outputs 2014 to 2021

This paper presents the findings of a case study that investigated international university students’ expectations and experiences of information literacy across two countries. The results from this case study provide insights that can be utilized by librarians working with international students, to plan and develop their information literacy instruction classes and programs. Armed with an awareness of what international students’ expectations and experiences with information literacy programs are, librarians can develop more meaningful instruction that better meets the information needs of international students. Moving beyond the pilot survey, the researchers aim to improve the survey instrument and collaborate with librarians …


Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh Jan 2018

Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh

Research outputs 2014 to 2021

Highly bismuth-substituted iron garnet thin films are prepared on quartz substrates by using a radio frequency (RF) magnetron sputtering technique. We study the factors (process parameters associated with the RF magnetron sputter deposition technique) affecting the magneto-optical (MO) properties of ferrite garnet films of composition Bi2.1Dy0.9Fe3.9Ga1.1O12. All films show high MO response across the visible range of wavelengths after being annealed. In particular, the effects of substrate stage temperature and rotation rate on the various properties of films are studied. Experimental results reveal that the characteristics of garnet films of this type can be tuned and optimized for use in …


Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh Jan 2015

Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh

Australian Information Security Management Conference

The business use of cloud computing services is motivated by the ease of use and the potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of the services becomes overly complex and difficult. The benefits also bring optimisation challenges for the information owners who must assess the service security risk and the degree to which new human behaviours are required. In this research we look at the risk of identity theft when ease of service access is provided through a Single Sign On (SSO) authorisation and ask: What are …


The Spy In Your Pocket: Smartphones And Geo-Location Data, Krishnun Sansurooah, Bradley Keane Jan 2015

The Spy In Your Pocket: Smartphones And Geo-Location Data, Krishnun Sansurooah, Bradley Keane

Australian Digital Forensics Conference

The integration of Global Positioning Systems and Smartphones has seen the significance of location based services rise. Geo-location data could prove to be an invaluable source of evidence in a forensic investigation. An attempt to extract geo-location data from an iPhone4s and Huawei Ascend G526 in a forensically sound manner revealed significant geo-location data embedded within geo-tags within photos taken on the devices. Other limited evidence was located on the devices.


Improving Energy Efficiency And Quality Of Service In An Integrated Wireless-Optical Broadband Access Network, Maha Shihab Ahmed Jan 2015

Improving Energy Efficiency And Quality Of Service In An Integrated Wireless-Optical Broadband Access Network, Maha Shihab Ahmed

Theses: Doctorates and Masters

Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices such as smart phones and tablets, is forcing telecommunication industries to rethink network design, and focus on developing high capacity mobile broadband networks. Accordingly, researchers have undertaken developmental work for an integrated wireless-optical broadband access network (WOBAN). Passive optical networks (PONs) and fourth generation (4G) wireless networks are two major candidate technologies for the WOBAN. PON is a wired access technology, well-known for its high capacity, whereas 4G is a wireless broadband access technology, popular for its ease of deployment and ability to offer …


Disability And The Web: Why Website Accessibility Matters, Vivienne Conway May 2011

Disability And The Web: Why Website Accessibility Matters, Vivienne Conway

InfoSci@ECU Seminars

With Australia now transitioning to WCAG 2.0, accessibility has become a critical area requiring a far greater emphasis in the next couple of years. The Australian Human Rights Commission has argued that all Australian websites should meet WCAG 2.0 AA by December 2014. In this presentation, Vivienne will discuss important findings from her study of public library web site accessibility. She will also provide insights into her current PhD investigation and give a first hand account of the Hyderabad conference and global efforts on web site accessibility.


Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb May 2011

Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb

InfoSci@ECU Seminars

The Australian National Data Service (ANDS) (http://ands.org.au/index.html) provides funding to foster partnerships and build infrastructure to enable better local data management in Australian universities and research institutions. Begun in 2008, ANDS has received $72 million of Commonwealth funding. ANDS aims to establish infrastructure and services for an Australian research data commons in which research data with enduring value and the potential for reuse, is preserved and managed for continuing accessibility.


Intelligent Buildings: An Investigation Into Current And Emerging Security Vulnerabilities In Automated Building Systems Using An Applied Defeat Methodology, David J. Brooks Jan 2011

Intelligent Buildings: An Investigation Into Current And Emerging Security Vulnerabilities In Automated Building Systems Using An Applied Defeat Methodology, David J. Brooks

Australian Security and Intelligence Conference

Intelligent Buildings (IB) have become increasing popular during the past decade, driven through the need to reduce energy, have more reactive and safer buildings, and increase productivity. IB integrate many systems that were in the past isolated from each other, including fire and life safety, HVAC, lighting, security, etc. Facilities contain commercial-in-confidence material and other valued assets; however, IB are integrated through open and common data communication protocols and hardware, leaving facilities exposed to external and internal threats. The study presents an investigation into IB, based on a defeat evaluation methdology. IB vulnerabilities considered two areas, namely physical and software …


Security Risk Management In The Asia Pacific Region: What Are Security Professional Using?, David J. Brooks, Hamish Cotton Jan 2011

Security Risk Management In The Asia Pacific Region: What Are Security Professional Using?, David J. Brooks, Hamish Cotton

Australian Security and Intelligence Conference

The Asia Pacific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental knowledge domain within security. Nevertheless, there has been limited understanding of what security professionals use when applying security risk management. The study was designed to gain a better understanding of risk management practice in place throughout APAC. Questions were generated to gauge an understanding of current practice and levels of implementation of standards and frameworks. Participants were drawn from many industries, using non-probabilistic sampling methods in a “snowball” …


A Strategy To Articulate The Facility Management Knowledge Categories Within The Built Environment, Robert Doleman, David J. Brooks Jan 2011

A Strategy To Articulate The Facility Management Knowledge Categories Within The Built Environment, Robert Doleman, David J. Brooks

Australian Security and Intelligence Conference

Security is applied in the built environment and this requires a close relationship with facility managers. Therefore, this study puts forward an approach to establish the facility management knowledge categories within the built environment. In part, the significance of the study stemmed from research undertaken into the compliance to Australian fire door maintenance within nursing homes, which demonstrated 87 percent noncompliance. This high level of non-compliance appeared to identify a lack of facility management knowledge, among other issues (Doleman & Brooks, 2011). The article uses a method to test the supposition of facility management knowledge construct in a three-phase Grounded …


Individualised Responses To Vigilance Demands And Their Management, Fiona M. Donald, Craig Hm Donald Jan 2011

Individualised Responses To Vigilance Demands And Their Management, Fiona M. Donald, Craig Hm Donald

Australian Security and Intelligence Conference

This research uses a task disengagement framework to examine how CCTV surveillance operators and novices respond to the vigilance demands of the detection process. Vigilance tasks are acknowledged as being high in mental workload, yet little is known about how operators deal with these demands in jobs where successful performance is reliant upon sustaining attention on a daily basis. Much vigilance research makes an implicit assumption that people perform tasks that require sustained attention in a passive manner. By contrast, this study examines how operators manage their levels of task engagement and attention resources. The sample consisted of 73 participants …


Defining The Security Professional: Definition Through A Body Of Knowledge, Mel Griffiths, David J. Brooks, Jeffrey Corkill Nov 2010

Defining The Security Professional: Definition Through A Body Of Knowledge, Mel Griffiths, David J. Brooks, Jeffrey Corkill

Australian Security and Intelligence Conference

A subject that eludes a consensus definition, security is an amalgam of disciplines that is moving inexorably towards professionalisation. Yet identifying who or what defines a security professional remains as difficult and elusory as a comprehensive definition of security that captures all of its modern facets and many actors. The view of elevating such a discipline as security to the status of a profession provokes polarised opinions. This article reviews the literature, examining what elements identify a security professional and exploring the significant themes and issues. To support these elements, security experts (n=27) were surveyed using a multidimensional scaling technique …


National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, Craig Harmes Nov 2010

National Security: A Propositional Study To Develop Resilience Indicators As An Aid To Personnel Vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, Craig Harmes

Australian Security and Intelligence Conference

Within the National Security domain there is a convergence of security responsibility across the national security agencies, law enforcement and private security sectors. The sensitivity of this environment requires individuals operating in the domain to be honest, trustworthy and loyal. Personnel vetting is a formal process used to determine an individual’s suitability for access to this domain. Notwithstanding this process, significant breaches of trust, security, and corruption still occur. In psychology, resilience is a well researched phenomenon that is considered a multidimensional construct where individual attributes, family aspects and social environment interact in aiding individuals to deal with vulnerability. There …


“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists, Robyn Torok Nov 2010

“Make A Bomb In Your Mums Kitchen”: Cyber Recruiting And Socialisation Of ‘White Moors’ And Home Grown Jihadists, Robyn Torok

Australian Counter Terrorism Conference

As a consequence of the war on terror, al-Qaeda and associated jihad groups have evolved and made increasing use of internet technologies for cyber recruitment. Recently, there has been an increasing focus on recruiting home grown terrorists who can more easily escape the scrutiny of cross border entries. Case study analysis indicates that links do exist between cyber tools, radicalisation and terrorism, however, the strength and nature of these relationships is generally unclear. Evidence does seem to support that cyber tools are most significant in the initial phases of recruitment and radicalisation. Coupled with this is the strong evolution of …


Tunable True-Time Delay Unit Based On Opto-Vlsi Processing, Feng Xiao, Budi Juswardy, Kamal Alameh Jan 2008

Tunable True-Time Delay Unit Based On Opto-Vlsi Processing, Feng Xiao, Budi Juswardy, Kamal Alameh

Research outputs pre 2011

A novel tunable true-time delay unit is proposed and demonstrated. The unit is based on the use of an Opto-VLSI processor that dynamically selects a single waveband or multiple wavebands from an RF-modulated broadband optical signal and routes them to a high-dispersion fiber for arbitrary time delay synthesis. Experimental results demonstrate continuously tunable time delay of up to 4 ns.


Integrated True-Time Delay Unit For Broadband Inteference Nulling In Phased-Array Antenna, Budi Juswardy, Kamal Alameh Jan 2008

Integrated True-Time Delay Unit For Broadband Inteference Nulling In Phased-Array Antenna, Budi Juswardy, Kamal Alameh

Research outputs pre 2011

This paper discusses an integrated true-time delay generation unit based on microminiaturisation of photonic and electronic components. The design, simulation, and performance of important building blocks for implementing a true-time delay-based phased-array antenna are presented.


Tunable Photonic Rf Signal Processor Using Opto-Vlsi, Budi Juswardy, Feng Xiao, Kamal Alameh Jan 2008

Tunable Photonic Rf Signal Processor Using Opto-Vlsi, Budi Juswardy, Feng Xiao, Kamal Alameh

Research outputs pre 2011

A tunable photonic RF signal processor is proposed and demonstrated. The filter structure comprises a reconfigurable Opto-VLSI processor for tunability, arrayed waveguide gratings for wavelength slicing and multiplexing, a custom-made fiber array for wavelength routing and dropping, and high-dispersion fibres for true-time delay generation. The processor structure enables positive and negative weights to be synthesised thus realising arbitrary responses. The proof-of-concept of the tunable photonic RF signal processor is experimentally demonstrated.


It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli Jan 2007

It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli

Research outputs pre 2011

Organisations worldwide are failing to adequately erase data from hard disks before disposing of them. Recent studies have uncovered significant and highly confidential data from computer hard disks for sale in the second hand market using minimal foresic recovery techniques. Increasingly medical businesses are being required to use IT based systems to deliver or receive services. Also medical records are becoming electronic in nature and have significant secondary storage requirements. Given the increased use of IT in medical practice this paper examines the issues uncovered in the studies into recovery of remnant data from hard disks. The paper also explores …


Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith Jan 2007

Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, Clifton Smith

Research outputs pre 2011

This paper demonstrates discrete laser spot projection over a wide angle using a novel cylindrical quasi-cavity waveguide, with no moving parts. Furthermore, the distance to each spot is calculated using active laser triangulation. The triangulation arrangement and the trajectory of principal rays are modelled using a system of linear equations based on optical geometry. Linear algebra is used to derive the unique baseline and outgoing angle of every projected beam. The system is calibrated by finding optimal values for uncertain instrumental parameters using constrained non-linear optimization. Distances calculated indoors result in accuracies of over 93%


Evaluating The Impact Of Peer Review And Participation Awareness In An Online Collaborative Document Authoring Environment, Greg Baatard Jan 2006

Evaluating The Impact Of Peer Review And Participation Awareness In An Online Collaborative Document Authoring Environment, Greg Baatard

Theses : Honours

Online Learning Environments (OLEs) have been widely adopted by higher education facilities, offering distance education with the potential to support the social and collaborative aspects deemed crucial to modern constructivist pedagogy. Groupware, a form of software which aims to facilitate group work, has been the subject of much research, from both educational and enterprise perspectives. This research introduced Reportal, an online groupware system designed to facilitate the collaborative authoring of a document. Reportal's peer review and participation awareness features were the focus of this research, and their impact was measured against the elements of online collaboration, a typology established by …


Automated Photo-Identification Of Cetaceans : An Integrated Software Solution, Daniel Griggs Jan 2006

Automated Photo-Identification Of Cetaceans : An Integrated Software Solution, Daniel Griggs

Theses : Honours

This study investigates current techniques used for automated photo-identification of cetaceans (i.e. dolphins and whales). The primary focus constitutes various techniques that can be applied to identify and extract dorsal fins from digital photographs. A comprehensive analysis of these techniques demonstrates the most effective software solution. To further support this analysis, four prototypes are developed to demonstrate the effectiveness of each technique in a practical environment. The analysis bases its final conclusions on test results generated from these prototype software examples. Final conclusions provide recommendations for an effective, accurate, and practical software solution. This software solution allows dorsal fins to …


Art Network Discussion, Paul Thomas Jan 2004

Art Network Discussion, Paul Thomas

Creative Connections Symposium @ BEAP2004 September 4, 2004

No abstract provided.


Digital Image Processing Using Mathematical Morphology, Andrew Mehnert Jan 1990

Digital Image Processing Using Mathematical Morphology, Andrew Mehnert

Theses : Honours

This dissertation is a natural extension of my undergraduate research project entitled, "Digital Image Processing”. Whilst my undergraduate project dealt with a number of classical digital image filtering techniques such as spatial convolution and frequency domain filtering via the Fourier transform, this dissertation focuses on an alternative approach employing Mathematical Morphology. In contrast to classical filtering techniques, which often geometrically distort the original image, morphological operations, used sensibly, essentially preserve shape and geometry. Mathematical morphology therefore lends itself to image processing applications requiring the identification of objects and object features within an image. Herein basic morphological operations are developed, firstly …