Collections in Computing

Recent Submissions

  • Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks 

    Mudaliar, Keysha (2015)
    The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ...
  • Mobile internet user experience of Small to Medium Enterprises (SMEs) in New Zealand 

    Iqbal, Asif (2015)
    This study is about SMEs (Small to medium enterprises) customers’ mobile internet experience in relation to its key attributes such as speed, security, cost, coverage, reliability and smart phones used. This study is ...
  • Melanoma Diagnosis by the Use of Wavelet Analysis based on Morphological Operators 

    Fassihi, Nima; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Ghasemi, Elham (International MultiConference of Engineers and Computer Scientists., 2011-03)
    Skin melanoma is the most dangerous type of skin cancer which is curable if diagnosed at the right time.. Drawing distinction between melanoma and mole is a difficult task and needs detailed laboratory tests. Utilizing ...
  • Uncovering Biokinetic Interfacing 

    Jarrett, Ben (xCoAx, 2014)
    The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes 

    Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian; Yongchareon, Sira (Springer Verlag, 2014)
    To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
  • A Survey on Approaches to Modeling Artifact-centric Business Processes 

    Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
    Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
  • Performance Comparison of Defense Mechanisms Against TCP SYN Flood Cyber Attack 

    Kolahi, Samad; Alghalbi, Amro A.; Alotaibi, Abdulmohsen F.; Ahmed, Saarim S.; Lad, Divyesh (ICUMT, 2014)
    The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing ...
  • Remote FxLMS algorithm for active control of sound in remote locations 

    Ardekani, Iman; Abdulla, Waleed H.; Rehman, Saeed (Asia-Pacific Signal and Information Processing Association (APSIPA), 2014)
    Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
  • Radio Frequency Fingerprinting and its Challenges 

    Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Portability of an RF Fingerprint of a Wireless Transmitter 

    Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Vein Pattern Visualization Through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation 

    Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (International Conference on Pattern Recognition (ICPR), 2014)
    Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
  • Efficient FXLMS algorithm with simplified secondary path models. 

    Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Investigating a conceptual construct for software context. 

    Kirk, Diana; MacDonell, Stephen G. (ACM (Association for Computing Machinery), 2014)
    A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...
  • Ensemble Statistical and Heuristic Models for Unsupervised Word Alignment 

    Mohaghegh, Mahsa; Sarrafzadeh, Hossein; Mohammadi, Mehdi (IEEE (Institute of Electrical and Electronics Engineers), 2014)
    Statistical word alignment models need large amounts of training data while they are weak in small-sized corpora. This paper proposes a new approach of an unsupervised hybrid word alignment technique using an ensemble ...
  • An Investigation of Factors and Measurements for Successful e-Commerce Websites 

    Li, Xiaosong; Lian, Wei; Sarrafzadeh, Hossein (WEBIST (Setúbal - Portugal), 2014)
    Business-to-Consumer (B2C) e-commerce is popular because of its convenience, speed and price. Although there has been intense debate about quality dimensions of e-commerce websites, more research is needed to find a ...
  • An Alternative Approach for Developing Socially Assistive Robots 

    Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Maori-English Machine Translation 

    Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (2014-04-24)
    In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
  • Smart Task Orderings for Active Online Multitask Learning 

    Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (Society for Industrial and Applied Mathematics, Activity Group on Data Mining and Analytics, 2014-04-26)
    This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
  • Biologically Inspired Techniques for Data Mining: A Brief Overview of Particle Swarm Optimization for KDD. Alam 

    Shafiq, Alam; Gillian, Dobbie; Koh, Yun Sing; Rehman, Saeed (Information Science Reference, 2014-02-02)
    Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ...

View more