• Developing a navigation model for optimizing social comfort for side-by-side robotic wheelchairs 

      Nguyen, Vinh The (2018-01)
      Side-by-side robotic wheelchairs have significant direct benefits for users and lessening the burden on caregivers. The autonomous navigation function for side-byside robotic wheelchairs has attracted the attention of many ...
    • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

      Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
      This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
    • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

      Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
      This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A (2017-07)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce 

      Alahmadi, Alaa (2017-07)
      Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • Engaging children in diabetes education through mobile games 

      Baghaei, Nilufar; Casey, John; Nandigam, D.; Sarrafzadeh, Hossein; Maddison, R. (International Association for the Development of the Information Society (IADIS), 2017-04)
      Traditional methods for diabetic education rely heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. Mobile games can be effective, evidence-based, and ...
    • Designing a novel educational game for teaching C# programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon; Casey, John (Computer Supported Education (CSEDU Secretariat), 2017-04)
      Learning to code can be a daunting experience for a lot of students. RunJumpCode is a novel 2D platformer video game, designed and developed in Unity, to teach players the fundamental concepts of C# programming. The game ...
    • Noise removal and binarization of scanned document images using clustering of features 

      Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
      Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
    • Adaptive document image skew estimation 

      Rezaei, S.B.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (International Association of Engineers (IAENG), 2017-03)
      The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ...
    • Human action recognition by conceptual features 

      Shamsipour, G.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (Newswood and International Association of Engineers, 2017-03)
      Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ...
    • A scenario based performance analysis of VANET protocols 

      Alobaidi, Naji (2017)
      Inter-vehicle communication is a major part of the Intelligent Transportation Systems (ITS). Vehicular Ad-Hoc Network (VANET) was primarily developed to improve safety and comfort for vehicles, passengers and drivers. ...
    • Computational land use management of public spaces in New Zealand 

      Dacey, Simon (2017)
      Land management is the process of managing the use and development of land resources, in both urban and rural settings. In all modern states, some land is held by central or local governments. This is called public land. ...
    • Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques 

      Sarrafpour, Bahman; Abbaro, C.; Pitton, I.; Young, C.; Madipour, Farhad (2016-12-14)
      Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ...
    • Distributed Incremental wLPSVM Learning 

      Zhu, L.; Ban, T.; Ikeda, K.; Pang, P.; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Weighted linear proximal support vector machine (wLPSVM) is known as an efficient binary classification algorithm with good accuracy and class-imbalance robustness. In this work, original batch wLPSVM is facilitated with ...
    • Taxonomy of malware detection techniques 

      Mohaddes Deylami, H.; Muniyandi, R. C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...