Research Bank

Computing

Unitec Research Bank

Computing

Recent Submissions

  • Jarrett, Ben (xCoAx 2014 Second conference on Computation, Communication, Aesthetics and X, 2014)
    The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
  • Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Dr. Sira; Liesaputra, Veronica (Web Information Systems Engineering – WISE 2014 Workshops, 2014)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • Yongchareon, Sira; Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian (International Conference on Cooperative Information Systems (CoopIS), 2014, 2014)
    To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
  • Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Web Information Systems Engineering – WISE 2014 Workshops, 2014)
    Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
  • Kolahi, Samad; Alghalbi, Amro A.; Alotaibi, Abdulmohsen F.; Ahmed, Saarim S.; Lad, Divyesh (6th International Congress on Ultra Modern Telecommunications and Control Systems (IEEE ICUMT), 2014)
    The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing ...
  • Ardekani, Iman; Abdulla, Waleed H.; Rehman, Saeed (Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, 2014)
    Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
  • Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS Workshop on Physical-layer Methods for Wireless Security, 2014)
    RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS Workshop on Physical-layer Methods for Wireless Security, 2014)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (22nd International Conference on Pattern Recognition (ICPR), 2014)
    Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
  • Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Kirk, Diana; MacDonell, Stephen G. (Conference on Empirical Assessment in Software Engineering (EASE), 2014)
    A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...
  • Mohaghegh, Mahsa; Sarrafzadeh, Hossein; Mohammadi, Mehdi (The 13th International Conference on Machine Learning and Applications (ICMLA'14), 2014)
    Statistical word alignment models need large amounts of training data while they are weak in small-sized corpora. This paper proposes a new approach of an unsupervised hybrid word alignment technique using an ensemble ...
  • Li, Xiaosong; Lian, Wei; Sarrafzadeh, Hossein (WEBIST 2014 - 10th International Conference on Web Information Systems and Technologies, 2014)
    Business-to-Consumer (B2C) e-commerce is popular because of its convenience, speed and price. Although there has been intense debate about quality dimensions of e-commerce websites, more research is needed to find a ...
  • Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE/RAS-EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob 2014), 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (12th NZCSRSC New Zealand Computer Science Research Student Conference, 2014)
    In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
  • Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (2014 SIAM International Conference on Data Mining, 2014)
    This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
  • Shafiq, Alam; Gillian, Dobbie; Koh, Yun Sing; Rehman, Saeed (Biologically-Inspired Techniques for Knowledge Discovery and Data Mining, 2014)
    Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ...
  • Broadbent, Elizabeth; Peri, Kathy; Kerse, Ngaire; Jayawardena, Chandimal; Kuo, I-Han; Datta, Chandan; MacDonald, Bruce (Lecture Notes in Computer Science, 2014)
    Healthcare robots are being developed to help older people maintain independence. This randomised cross-over trial aimed to investigate whether healthcare robots were acceptable and feasible and whether the robots could ...
  • Kuo, I-Han; Jayawardena, Chandimal (Lecture Notes in Computer Science, 2014)
    Targeting research challenges in Socially Assistive Robotics (SAR), this paper provides a review of previous work that describe robot or non-robot systems that use fuzzy logic to infer high-level human intention or activities. ...
  • Rehman, Saeed; Alam, Shafiq; Ardekani, Iman T. (Biologically-Inspired Techniques for Knowledge Discovery and Data Mining, 2014)
    Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...

View more

Search


Browse Research Bank

My Account

Discover

Help

Share

  • Bookmark and Share

Usage Statistics

RSS Feeds