Research Bank

Browsing Computing by Date Published

Unitec Research Bank

Browsing Computing by Date Published

Sort by: Order: Results:

  • Godha, Narendra (Master of Computing, 2015)
    Since 2003 the enterprises have accelerated research in this approach through development of methods, tools and other technologies in support of the artifact-centric approach. The artifact-centric approach is expected to ...
  • Yongchareon, Dr. Sira; Liu, Chengfei; Jian, Yu; Zhao, Xiaohui (Information Systems, 2015)
    Over the past several years, more efficient approaches have been on increasing demands for designing, modeling, and implementing inter-organizational business processes. In the process collaboration across organizational ...
  • Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Rehman, Saeed; Alam, Shafiq; Ardekani, Iman T. (Biologically-Inspired Techniques for Knowledge Discovery and Data Mining, 2014)
    Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...
  • Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Dr. Sira; Liesaputra, Veronica (Web Information Systems Engineering – WISE 2014 Workshops, 2014)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Global Business and Technology Association 2014 Conference, 2014)
    A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ...
  • Fourie, Leon; Overmyer, Scott; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Alexander, Samuel T.V. (Global Business and Technology Association 2014 Conference, 2014)
    Easy with Eve is an affect-sensitive tutoring system that features Eve, an animated pedagogical agent that adapts to student emotion based on the results of an observational study of human tutors. This paper presents the ...
  • Fourie, Leon; Pang, Shaoning; Kingston, Tamsin; Hettema, Hinne; Watters, Paul; Sarrafzadeh, Hossein (Global Business and Technology Association 2014 Conference, 2014)
    Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ...
  • Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Journal of Computer and System Sciences, 2014)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
  • Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (2014 SIAM International Conference on Data Mining, 2014)
    This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
  • Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (12th NZCSRSC New Zealand Computer Science Research Student Conference, 2014)
    In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
  • Dai, Wenbin; Dubinin, V.N.; Vyatkin, V. (IEEE Transactions on Systems, Man, Cybernetics, Part C: Applications and Review, 2014)
    This paper proposes a new methodology of migration from IEC 61131-3 PLCs to IEC 61499 function blocks. The aim of this migration process is to recreate IEC 61131-3 applications in IEC 61499 implementations with equivalent ...
  • Shafiq, Alam; Gillian, Dobbie; Koh, Yun Sing; Rehman, Saeed (Biologically-Inspired Techniques for Knowledge Discovery and Data Mining, 2014)
    Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ...
  • Stafford, Rebecca Q.; MacDonald, Bruce A.; Jayawardena, Chandimal; Wegner, Daniel M; Broadbent, Elizabeth (International Journal of Social Robotics, 2014)
    Robots are starting to be developed for aged care populations and some of these have been made into commercial products that have been well received. However, little is known about the psychological factors that promote ...
  • You, Li (Master of Computing, 2014)
    The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible, exible, stable and to the utmost, decentralized network ...
  • Kaur, Navneet (Master of Computing, 2014)
    Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own ...
  • Song, Lei (Master of Computing, 2014)
    A variety of environmental problems increasingly attract academic research in order to protect ecosystems and minimise negative effects on human health. Advanced computational environmental analysis technologies have the ...
  • Narayan, Shaneel (Doctor of Computing, 2014)
    Computer networks are complex - they are a heterogeneous environment in which numerous services, such as electronic mail, web browsing, voice and multimedia data, traverse the globe daily. The needs and demands of end users ...
  • Treseangrat, Kiattikul (Master of Computing, 2014)
    A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ...
  • Broadbent, Elizabeth; Peri, Kathy; Kerse, Ngaire; Jayawardena, Chandimal; Kuo, I-Han; Datta, Chandan; MacDonald, Bruce (Lecture Notes in Computer Science, 2014)
    Healthcare robots are being developed to help older people maintain independence. This randomised cross-over trial aimed to investigate whether healthcare robots were acceptable and feasible and whether the robots could ...