Collections in Computing

Recent Submissions

  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

    Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
    This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
  • A scenario based performance analysis of VANET protocols 

    Alobaidi, Naji (2017)
    Inter-vehicle communication is a major part of the Intelligent Transportation Systems (ITS). Vehicular Ad-Hoc Network (VANET) was primarily developed to improve safety and comfort for vehicles, passengers and drivers. ...
  • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

    Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
    This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
  • An efficient stream-based join to process end user transactions in real-time data warehousing 

    Jamil, Noreen (2014-06)
    In the field of real-time data warehousing semistream processing has become a potential area of research since last one decade. One important operation in semi-stream processing is to join stream data with a slowly changing ...
  • Role-based process view derivation and composition 

    Zhao, X.; Liu, C.; Yongchareon, Dr. Sira; Kowalkiewicz, M.; Sadiq, W. (Association for Computing Machinery (ACM), 2015-05)
    The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for ...
  • A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce 

    Alahmadi, Alaa (2017-07)
    Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ...
  • Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title] 

    Nandigam, David; Tirumala, Sreenivas Sremath; Baghaei, Nilufar (2014-12)
    The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ...
  • A pattern recognition for group abnormal behaviors based on Markov Random Fields energy 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (Institute of Electrical and Electronics Engineers (IEEE), 2014-08)
    Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ...
  • A new biological visual cognitive behavioural modeling for video energy computing 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (2014)
    As we all know, human vision is quite sensitive to abnormal behaviors, which is attributed to the discharging of the receptor cells in the brain visual cortex and the ensuing bioelectrical energy features. Inspired by this ...
  • Analysis and configuration of boundary difference calculations 

    Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
    In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
  • Implementation of evolutionary algorithms for deep architectures 

    Tirumala, Sreenivas Sremath (CEUR Workshop Proceedings, 2014-11)
    Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ...
  • Portability of an RF fingerprint of a wireless transmitter 

    Rehman, Saeed; Sowerby, K.; Alam, S.; Ardekani, Iman (2014-10)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Security in Virtual DMZ designs 

    Sathu, Hira; Komosny, D.; Singh, S. (Global Business and Technology Association (New York), 2014-07)
    Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A (2017-07)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Diabetic Mario : designing and evaluating mobile games for diabetes education 

    Baghaei, Nilufar; Nandigam, D.; Casey, John; Direito, A.; Maddison, R. (2016-06)
    Traditionally, diabetes education has relied on written materials, with limited resources available for children with diabetes. Mobile games can be effective and motivating tools for the promotion of children's health. In ...
  • Noise removal and binarization of scanned document images using clustering of features 

    Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
    Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
  • A survey on Internet usage and cybersecurity awareness in students 

    Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
    There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...

View more