Now showing items 1-20 of 13023

    • Analysing local motorcyclists’ perception towards road safety 

      Priyantha Wedagama, Dewa Made; Wishart, Darren (International Conference on Advances in Civil and Environmental Engineering (ICAnCEE 2018), 2019)
      This study sought to investigate differences in local motorcyclists’ perception towards road safety in Bali. The independent variables consisted of socio-demographic characteristics containing gender, age, marital status, ...
      CONFERENCE OUTPUT
    • Media engagement, public connection and new migrants: How can community media lead the way? 

      Forde, Susan (International Conference on Citizen and Community Media 2019, 2019)
      Ethnic multicultural broadcasting in Australia has always fulfilled a key role in servicing the needs of diverse migrant communities. For both established and emerging communities, community radio in particular not only ...
      CONFERENCE OUTPUT
    • Predicting the wave overtopping rate at berm breakwaters 

      Pillai, K; Etemad Shahidi, A; Lemckert, C (12th ISOPE Pacific-Asia Offshore Mechanics Symposium (PACOMS 2016), 2016)
      In this paper, new formulae are presented to estimate the wave overtopping rate of mass-armoured berm breakwaters. In addition to the effects of dimensionless crest freeboard and crest width, the formulae consider the ...
      CONFERENCE OUTPUT
    • Shakespeare in prisons conference, Old Globe Theatre, San Diego, Friday 23rd-25th March 2018 

      Balfour, Michael (Shakespeare in prisons conference, 2019)
      This is the third bi-annual conference of Shakespeare in Prisons since its inaugural start at University of Notre Dame in 2013. Impressively hosted by the Old Globe Theatre, San Diego, the conference highlighted the ...
      CONFERENCE OUTPUT
    • Defining graduate teacher “expertise” in embedding Aboriginal and Torres Strait Islander (Indigenous) knowledges in the HPE curriculum 

      Whatman, Susan; McLaughlin, Juliana (28th ACHPER International Conference, 2013)
      Recognising and valuing Aboriginal and Torres Strait Islander peoples’ knowledges has a long history of local advocacy and international support, and the role and place of such knowledges is clearly acknowledged in the ...
      CONFERENCE OUTPUT
    • Targeting the strategies of a bid sniper 

      Trevathan, J; Read, W; Lee, YJ; Atkinson, I (2011 44th Hawaii International Conference on System Sciences, 2011)
      Bid sniping is a dubious practice used in online auctions whereby a bidder makes a bid in the closing moments in an attempt to deny other bidders time to react. The primary goal for a bid sniper is to win the auction for ...
      CONFERENCE OUTPUT
    • Abnormal and emergency situations in aviation: improving the QRH to support resilience 

      Carim Junior, Guido; Saurin, Tarcisio; Henriqson, Eder (7th Resilience Engineering Symposium, 2017)
      Commercial airlines are known for using highly reliable technology and highly-standardized operations which reduce uncertainty, variability and risks. The systems resulted from such reliability approach are effective to ...
      CONFERENCE OUTPUT
    • Pre-processing of on-line signals in noisy environments 

      McCabe, Alan; Trevathan, Jarrod (Fourth International Conference on Information Technology (ITNG'07), 2007)
      This paper introduces the extremum consistency (EC) algorithm for avoiding local maxima and minima in a specialised domain. The most notable difference between this approach and others in the literature is that it places ...
      CONFERENCE OUTPUT
    • Surrogate Assisted Optimisation for Travelling Thief Problems 

      Namazi, Majid; Sanderson, Conrad; Newton, MA Hakim; Sattar, Abdul (13th Annual Symposium on Combinatorial Search (SoCS 2020), 2020)
      The travelling thief problem (TTP) is a multi-component optimisation problem involving two interdependent NP-hard components: the travelling salesman problem (TSP) and the knapsack problem (KP). Recent state-of-the-art TTP ...
      CONFERENCE OUTPUT
    • Privacy and anonymity in untrusted data stores 

      Trevathan, J; Read, W; Ghodosi, H; Atkinson, I (22nd Australasian Database Conference, 2011)
      This paper describes a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is ...
      CONFERENCE OUTPUT
    • A Proactive Approach to Preventing Phishing Attacks Using a Pshark 

      Shah, Ripan; Trevathan, Jarrod; Read, Wayne; Ghodosi, Hossein (2009 Sixth International Conference on Information Technology: New Generations, 2009)
      Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a Web site, ...
      CONFERENCE OUTPUT
    • Online Payments Using Handwritten Signature Verification 

      Trevathan, Jarrod; McCabe, Alan; Read, Wayne (2009 Sixth International Conference on Information Technology: New Generations, 2009)
      Making payments online is inherently insecure, especially those involving credit cards where a handwritten signature is normally required to be authenticated. This paper describes a system for enhancing the security of ...
      CONFERENCE OUTPUT
    • Artificial intelligence in sports prediction 

      McCabe, Alan; Trevathan, Jarrod (Fifth International Conference on Information Technology: New Generations (itng 2008), 2008)
      This paper presents an extension of earlier work in the use of artificial intelligence for prediction of sporting outcomes. An expanded model is described, as well as a broadening of the area of application of the original ...
      CONFERENCE OUTPUT
    • A simple shill bidding agent 

      Trevathan, Jarrod; Read, Wayne (Fourth International Conference on Information Technology (ITNG'07), 2007)
      Shill bidding is where fake bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Although shill bidding is strictly forbidden in online auctions such as ...
      CONFERENCE OUTPUT
    • Detecting collusive shill bidding 

      Trevathan, Jarrod; Read, Wayne (Fourth International Conference on Information Technology (ITNG'07), 2007)
      Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Read presented an algorithm to detect the presence of ...
      CONFERENCE OUTPUT
    • An Anonymous and Secure Continuous Double Auction Scheme 

      Trevathan, J; Ghodosi, Hossein; Read, Wayne (39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006)
      A Continuous Double Auction (CDA) allows many buyers and sellers to continuously submit bids for the purchase and sale of a commodity (e.g., online share trading). Protocols protecting privacy in this type of powerful ...
      CONFERENCE OUTPUT
    • Developing low-cost intelligent wireless sensor networks for aquatic environments 

      Trevathan, J; Atkinson, I; Read, W; Bajema, N; Lee, YJ; Scarr, A; Johnstone, R (2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2010)
      Aquatic environments are extremely difficult for developing, deploying, and maintaining wireless sensor networks. Networks deployed in aquatic settings face multiple challenges, such as marine fowling of equipment, limited ...
      CONFERENCE OUTPUT
    • The evolution of the SEMAT sensor network management system 

      Lee, YJ; Trevathan, J; Atkinson, I; Read, W; Myers, T; Johnstone, R (2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2011)
      Smart Environmental Measurements and Analysis Technologies (SEMAT) is a multidisplinary project aimed at constructing smart sensor networks that can be deployed in aquatic settings. The SEMAT system has been developed based ...
      CONFERENCE OUTPUT
    • Efficient batch authentication for hierarchical wireless sensor networks 

      Trevathan, J; Ghodosi, H; Myers, T (2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2011)
      Authentication in wireless sensor networks is critical, as they are often deployed unattended in hostile environments and must transmit information over unsecured mediums. However, the cost of performing cryptographic ...
      CONFERENCE OUTPUT
    • Benefits of building wireless sensor networks on commodity hardware and software stacks 

      Bajema, NB; Trevathan, J; Bergmann, NW; Atkinson, I; Read, W; Scarr, A; Lee, YJ; Johnstone, R (2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2011)
      The majority of wireless sensor networks are built on bespoke platforms, that is, custom designed and built hardware with a light weight software stack. There are a number of advantages to this approach. First, the ability ...
      CONFERENCE OUTPUT