Research Bank

Browsing Computing by Date Published

Unitec Research Bank

Browsing Computing by Date Published

Sort by: Order: Results:

  • Godha, Narendra (Master of Computing, 2015)
    Since 2003 the enterprises have accelerated research in this approach through development of methods, tools and other technologies in support of the artifact-centric approach. The artifact-centric approach is expected to ...
  • Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Global Business and Technology Association 2014 Conference, 2014)
    A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ...
  • Fourie, Leon; Overmyer, Scott; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Alexander, Samuel T.V. (Global Business and Technology Association 2014 Conference, 2014)
    Easy with Eve is an affect-sensitive tutoring system that features Eve, an animated pedagogical agent that adapts to student emotion based on the results of an observational study of human tutors. This paper presents the ...
  • Fourie, Leon; Pang, Shaoning; Kingston, Tamsin; Hettema, Hinne; Watters, Paul; Sarrafzadeh, Hossein (Global Business and Technology Association 2014 Conference, 2014)
    Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ...
  • Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Journal of Computer and System Sciences, 2014)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
  • Dai, Wenbin; Dubinin, V.N.; Vyatkin, V. (IEEE Transactions on Systems, Man, Cybernetics, Part C: Applications and Review, 2014)
    This paper proposes a new methodology of migration from IEC 61131-3 PLCs to IEC 61499 function blocks. The aim of this migration process is to recreate IEC 61131-3 applications in IEC 61499 implementations with equivalent ...
  • Stafford, Rebecca Q.; MacDonald, Bruce A.; Jayawardena, Chandimal; Wegner, Daniel M; Broadbent, Elizabeth (International Journal of Social Robotics, 2014)
    Robots are starting to be developed for aged care populations and some of these have been made into commercial products that have been well received. However, little is known about the psychological factors that promote ...
  • You, Li (Master of Computing, 2014)
    The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible, exible, stable and to the utmost, decentralized network ...
  • Kaur, Navneet (Master of Computing, 2014)
    Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own ...
  • Song, Lei (Master of Computing, 2014)
    A variety of environmental problems increasingly attract academic research in order to protect ecosystems and minimise negative effects on human health. Advanced computational environmental analysis technologies have the ...
  • Narayan, Shaneel (Doctor of Computing, 2014)
    Computer networks are complex - they are a heterogeneous environment in which numerous services, such as electronic mail, web browsing, voice and multimedia data, traverse the globe daily. The needs and demands of end users ...
  • Treseangrat, Kiattikul (Master of Computing, 2014)
    A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ...
  • Chen, Gang; Sarrafzadeh, Abdolhossein; Pang, Shaoning (IEEE Transactions on Parallel and Distributed Systems, 2013)
    Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ...
  • Pang, Shaoning; Zhu, Lei; Chen, Gang; Sarrafzadeh, Hossein; Ban, Tao; Inoue, Daisuke (Neural Networks, 2013)
    Linear Proximal Support Vector Machines (LPSVMs), like decision trees, classic SVM, etc. are originally not equipped to handle drifting data streams that exhibit high and varying degrees of class imbalance. For online ...
  • Komosny, Dan; Simek, Milan; Kathiravelu, Ganeshan (Przegl ˛ad Elektrotechniczny, 2013)
    The paper deals with IP geolocation based on communication latency measurement. The aim of IP geolocation is to estimate the geographical location of an IP-enabled node. Latency-based IP geolocation methods measure latency ...
  • Nand, Vikash (Master of Computing, 2013)
    Virtualisation technology is growing fast and has now become an important part of modern computing by bringing lot of benefits for many businesses and organisation. Some of the benefits are improving resource utilisation, ...
  • Ram, Shiu (Master of Computing, 2013)
    This research was an attempt to find out the benefits that a sample of organisations are deriving by using data warehousing and data mining tools(software). Participants from eight organisations were interviewed to gather ...
  • Tirumala, Sreenivas Sremath (Master of Computing, 2013)
    Continued and rapid improvement in evolutionary algorithms has made them suitable technologies for tackling many difficult optimization problems. Recently the introduction of quantum inspired evolutionary computation has ...
  • Chitti, Anupama (Master of Computing, 2013)
    Research has proved that requirements engineering in e-health projects is a challenge. Many of the ehealth software end-users do not believe in investment in this process and e-health vendors find it challenging to deliver ...
  • Veerisetty, Neeharika (Master of Computing, 2013)
    With the incidence of technology at each and every juncture of human life, there has been an accelerated growth in computational needs to satisfy the technological cravings. Computer networks have evolutionarily emerged ...