Collections in Computing

Recent Submissions

  • A framework for evaluating anti spammer systems for Twitter 

    Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
    Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
  • Privacy-preserving data sharing in portable clouds 

    Zeidler, Clemens; Asghar, M. (Science and Technology Publications, Lda, 2016-04)
    Cloud storage is a cheap and reliable solution for users to share data with their contacts. However, the lack of standardisation and migration tools makes it difficult for users to migrate to another Cloud Service Provider ...
  • Developing a navigation model for optimizing social comfort for side-by-side robotic wheelchairs 

    Nguyen, Vinh The (2018-01)
    Side-by-side robotic wheelchairs have significant direct benefits for users and lessening the burden on caregivers. The autonomous navigation function for side-byside robotic wheelchairs has attracted the attention of many ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

    Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
    This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
  • A scenario based performance analysis of VANET protocols 

    Alobaidi, Naji (2017)
    Inter-vehicle communication is a major part of the Intelligent Transportation Systems (ITS). Vehicular Ad-Hoc Network (VANET) was primarily developed to improve safety and comfort for vehicles, passengers and drivers. ...
  • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

    Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
    This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
  • An efficient stream-based join to process end user transactions in real-time data warehousing 

    Jamil, Noreen (2014-06)
    In the field of real-time data warehousing semistream processing has become a potential area of research since last one decade. One important operation in semi-stream processing is to join stream data with a slowly changing ...
  • Role-based process view derivation and composition 

    Zhao, X.; Liu, C.; Yongchareon, Dr. Sira; Kowalkiewicz, M.; Sadiq, W. (Association for Computing Machinery (ACM), 2015-05)
    The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for ...
  • A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce 

    Alahmadi, Alaa (2017-07)
    Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ...
  • Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title] 

    Nandigam, David; Tirumala, Sreenivas Sremath; Baghaei, Nilufar (2014-12)
    The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ...
  • A pattern recognition for group abnormal behaviors based on Markov Random Fields energy 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (Institute of Electrical and Electronics Engineers (IEEE), 2014-08)
    Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ...
  • A new biological visual cognitive behavioural modeling for video energy computing 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (2014)
    As we all know, human vision is quite sensitive to abnormal behaviors, which is attributed to the discharging of the receptor cells in the brain visual cortex and the ensuing bioelectrical energy features. Inspired by this ...
  • Analysis and configuration of boundary difference calculations 

    Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
    In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
  • Implementation of evolutionary algorithms for deep architectures 

    Tirumala, Sreenivas Sremath (CEUR Workshop Proceedings, 2014-11)
    Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ...
  • Portability of an RF fingerprint of a wireless transmitter 

    Rehman, Saeed; Sowerby, K.; Alam, S.; Ardekani, Iman (2014-10)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Security in Virtual DMZ designs 

    Sathu, Hira; Komosny, D.; Singh, S. (Global Business and Technology Association (New York), 2014-07)
    Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A (2017-07)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...

View more