Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Systems Architecture

Self-Supervised Learning To Detect Key Frames In Videos, Xiang Yan, Syed Zulqarnain Gilani, Mingtao Feng, Liang Zhang, Hanlin Qin, Ajmal Mian Jan 2020

Self-Supervised Learning To Detect Key Frames In Videos, Xiang Yan, Syed Zulqarnain Gilani, Mingtao Feng, Liang Zhang, Hanlin Qin, Ajmal Mian

Research outputs 2014 to 2021

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Detecting key frames in videos is a common problem in many applications such as video classification, action recognition and video summarization. These tasks can be performed more efficiently using only a handful of key frames rather than the full video. Existing key frame detection approaches are mostly designed for supervised learning and require manual labelling of key frames in a large corpus of training data to train the models. Labelling requires human annotators from different backgrounds to annotate key frames in videos which is not only expensive and time consuming but …


Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland Jan 2015

Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland

Research outputs 2014 to 2021

The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony's latest version of their PlayStation. This console provides a number of features including web browsing, downloading of material and chat functionality; all communication features that will be of interest to forensic investigators. In this paper we undertake an initial investigation of the PlayStation 4 games console. This paper identifies potential information sources …


Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Efstratios Skafidas, Kamal Alameh Jan 2014

Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Efstratios Skafidas, Kamal Alameh

Research outputs 2014 to 2021

In this paper, we propose and experimentally demonstrate reconfigurable card-to-card optical wireless interconnects architecture with 16-Carrierless-Amplitude/Phase modulation. Results show that 3×40 Gb/s interconnection is achieved with 2 mW transmission power.


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks Nov 2010

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

Australian Security and Intelligence Conference

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


A Type Of Variation Of Hamilton Path Problem With Applications, Jitian Xiao, Jun Wang Jan 2008

A Type Of Variation Of Hamilton Path Problem With Applications, Jitian Xiao, Jun Wang

Research outputs pre 2011

This paper describes a type of variation of the Hamilton path problem that can be applied to a type of applications. Unlike the original Hamilton path problem, the variation always has a solution. The problem of finding solutions to the variation of the Hamilton path problem is NP-complete. A heuristic for finding solutions to the problem is developed and analyzed. The heuristic is then applied to a real application scenario in the area of spatial cluster scheduling in spatial join processing. Experiments have demonstrated that the proposed method generates better cluster sequence than existing algorithms.


Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, Huaizhong Li Jan 2008

Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, Huaizhong Li

Research outputs pre 2011

The article presents a novel control-flow based test sequence generation technique using UML 2.0 activity diagram, which is a behavioral type of UML diagram. Like other model-based techniques, this technique can be used in the earlier phases of the development process owing to the availability of the design models of the system. The activity diagram model is seamlessly converted into a colored Petri net. We proposed a technique that enables the automatic generation of test sequences according to a given coverage criteria from the execution of the colored Petri nets model. Two types of structural coverage criteria for AD based …


Supporting Component Selection With A Suite Of Classifiers, Valerie Maxville, Chiou Peng Lam, J Armarego Jan 2008

Supporting Component Selection With A Suite Of Classifiers, Valerie Maxville, Chiou Peng Lam, J Armarego

Research outputs pre 2011

Software selection involves the assimilation of information and results for each candidate to enable a comparison for decisions to be made. The processes and tools developed assist with software selection to enhance quality, documentation and repeatability. The CdCE process aims to retain and document the information used in selection to assist decisions and to document them for reference as the system evolves. This paper describes the CdCE process and our approach to assist the shortlisting of candidates through a suite of classifiers. The application of the suite is illustrated using a selection and evaluation case study. Applying this approach helps …


Mutation Analysis For The Evaluation Of Ad Models, Usman Farooq, Chiou Peng Lam Jan 2008

Mutation Analysis For The Evaluation Of Ad Models, Usman Farooq, Chiou Peng Lam

Research outputs pre 2011

UML has became the industry standard for analysis and design modeling. Model is a key artifact in Model Driven Architect (MDA) and considered as an only concrete artifact available at earlier development stages. Error detection at earlier development stages can save enormous amount of cost and time. The article presents a novel mutation analysis technique for UML 2.0 Activity Diagram (AD). Based on the AD oriented fault types, a number of mutation operators are defined. The technique focuses on the key features of AD and enhances the confidence in design correctness by showing the absence of control-flow and concurrency related …


Optimized Wlan Mac Protocol For Multimedia Applications, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad Jan 2008

Optimized Wlan Mac Protocol For Multimedia Applications, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad

Research outputs pre 2011

In this paper we propose an optimized WLAN MAC protocol for multimedia applications. The proposed MAC protocol consist of 3 main optimizing architectures, traffic segregation, specific service interval (SI) for voice and video traffic and smaller contention window (CW). Traffic segregation segregates real-time traffic from best-effort traffic while specific service interval provides voice and video traffic with the SI based on its mean arrival rate. In the contention time frame, the CW is made smaller to reduce delay and increase throughput. Ns2 is used as a simulating tool to compare the results of our proposed protocol with the legacy 802.11 …


A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks Apr 2006

A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks

Australian Information Warfare and Security Conference

This study presented an overview of the training available to intruder alarm installers. A survey of domestic and commercial intruder alarm systems (n=20) were completed across Perth, Western Australia, metropolitan area. The gathered data were evaluated against Australian Standard AS2201.1 for intruder alarm systems, to determine whether alarm installations comply with two parts of the standard, being that of control panel location and zone supervision. AS2201.1 requires that intruder alarm control equipment shall be located within the alarmed area, located outside the entry/exit point and operate as dual endofline supervision. The study presents significant findings into the compliance of installed …


Sicnn Optimisation, Two Dimensional Implementation And Comparison, Grant Walker Jan 2000

Sicnn Optimisation, Two Dimensional Implementation And Comparison, Grant Walker

Theses : Honours

The study investigates the process of optimisation, implementation and comparison of a Shunting Inhibitory Cellular Neural Network (SICNN) for Edge Detection. Shunting inhibition is lateral inhibition where the inhibition function is nonlinear. Cellular Neural Networks are locally interconnected nonlinear, parallel networks which can exist as either discrete time or continuous networks. The name given to Cellular Neural Networks that use shunting inhibition as their nonlinear cell interactions are called Shunting Inhibitory Cellular Neural Networks. This project report examines some existing edge detectors and thresholding techniques. Then it describes the optimisation of the connection weight matrix for SICNN with Complementary Output …