Collections in Computing

Recent Submissions

  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Progress report on a proposed theory for software development 

    Kirk, Diana; MacDonell, Stephen G. (SCITEPRESS (Science and Technology Publications) Digital Library, 2015-07)
    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
  • The effect of mobility, security and shadowing on latest wireless LAN standard (IEEE802.11ac) 

    Almatrook, Abdulbasit (2015)
    This thesis focuses on the evaluation of IEEE 802.11ac WLAN performance using TCP and UDP for both versions of the Internet Protocol (IPv4, IPv6) in three scenarios, namely, the effect of implementing WPA2 security encryption, ...
  • Encryption, storage technology and security of data at rest 

    Alkorbi, Mohammed (2015-11)
    The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ...
  • NIR spectrometer used for material modeling with neural networks 

    Yee, Nigel (IEEE Computer Science, 2014)
    Near infrared multi-spectral image analysis is a tool used for non-destructive determination of biological material properties. In this investigation a custom built imaging spectrometer is constructed and used for the image ...
  • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

    Ahmad, Aziz; Anderson, Tim (Australia PV Institute, 2014-12)
    In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
  • Global solar radiation prediction using artificial neural network models for New Zealand 

    Ahmad, Aziz; Anderson, Tim (Solar 2014 Conference & Expo, 2014-05)
    In this study, nonlinear autoregressive recurrent neural networks with exogenous input (NARX) were used to predict global solar radiation across New Zealand. Data for nine hourly weather variables recorded across New Zealand ...
  • SVM based ensemble learning for spatial and temporal air pollution analysis 

    Ali, Sahid; Lai, Anthony (2014)
    The paper aims to propose spatial and temporal air pollution data analysis by using Support Vector Machine (SVM) ensemble method along with single SVM, Bagging and AdaboostM1 algorithms to identify three objectives of our ...
  • Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks 

    Mudaliar, Keysha (2015)
    The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ...
  • Mobile internet user experience of Small to Medium Enterprises (SMEs) in New Zealand 

    Iqbal, Asif (2015)
    This study is about SMEs (Small to medium enterprises) customers’ mobile internet experience in relation to its key attributes such as speed, security, cost, coverage, reliability and smart phones used. This study is ...
  • Melanoma Diagnosis by the Use of Wavelet Analysis based on Morphological Operators 

    Fassihi, Nima; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Ghasemi, Elham (International MultiConference of Engineers and Computer Scientists., 2011-03)
    Skin melanoma is the most dangerous type of skin cancer which is curable if diagnosed at the right time.. Drawing distinction between melanoma and mole is a difficult task and needs detailed laboratory tests. Utilizing ...
  • Uncovering Biokinetic Interfacing 

    Jarrett, Ben (xCoAx, 2014)
    The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes 

    Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian; Yongchareon, Sira (Springer Verlag, 2014)
    To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
  • A Survey on Approaches to Modeling Artifact-centric Business Processes 

    Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
    Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
  • Performance Comparison of Defense Mechanisms Against TCP SYN Flood Cyber Attack 

    Kolahi, Samad; Alghalbi, Amro A.; Alotaibi, Abdulmohsen F.; Ahmed, Saarim S.; Lad, Divyesh (ICUMT, 2014)
    The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing ...

View more