• Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

    Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
    The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
  • An artifact-centric business process execution platform 

    Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
    Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
  • Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7 

    Kolahi, Samad; Cao, Yuqing; Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)
    IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ...
  • Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols 

    Narayan, Shaneel; Ishrar, Salman; Kumar, Avinesh; Gupta, Ruchinav; Khan, Ziafil (2016-07)
    This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms ...
  • Designing mobile applications for smoking cessation in New Zealand 

    Baghaei, Nilufar; Wu, Lian; Casey, John; Biddle, TeUrikore (International Conference on Medical Information Processing and Analysis, 2016-06)
    Tobacco is a leading cause of preventable death in New Zealand. The smoking rate for New Zealand Māori was 44 percent in 2009, still significantly higher than for non-Māori (18 percent) for both males and females. In this ...
  • Computational thinking : the skill set of the 21st century 

    Mohaghegh, Dr Mahsa; McCauley, Michael (TechScience Publications, 2016-05)
    Computational thinking is a relatively new term, and is the topic of much discussion in the educational realm today. Research shows that computational thinking is a highly valuable skill that is becoming a topic of increasing ...
  • Incremental and decremental max-flow for online semi-supervised learning 

    Zhu, Lei; Pang, Shaoning; Sarrafzadeh, Hossein; Ban, Tao; Inoue, Daisuke (Institute of Electrical and Electronics Engineers (IEEE), 2016-04-13)
    Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only for the learning from static data. This paper proposes an online max-flow algorithm for the semi-supervised learning ...
  • Physical-aware predictive dynamic thermal management of multi-core processors 

    Salami, Bagher; Noori, Hamid; Madipour, Farhad; Baharani, Mohammadreza (Elsevier, 2016-03-30)
    The advances in silicon process technology have made it possible to have processors with larger number of cores. The increment of cores number has been hindered by increasing power consumption and heat dissipation due to ...
  • Performance analysis of some operating systems in wireless 802.11n networks 

    Kolahi, Samad; Li, Peng (University of Bahrain (Zallaq, Bahrain), 2016-01-30)
    In this paper, the performance of some operating systems (Windows 7, Windows XP, and Fedora 12) are evaluated over IEEE 802.11n WLAN (Wireless LAN), for TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), ...
  • SNET : a statistical normalisation method for Twitter 

    Sosamphan, Phavanh (2016)
    One of the major problems in the era of big data use is how to ‘clean’ the vast amount of data on the Internet, particularly data in the micro-blog website Twitter. Twitter enables people to connect with their friends, ...
  • Analysis of e-commerce sites using the 7C Framework, by developing a software tool 

    Yang, Chih-Hsiang (2016)
    Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ...
  • Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • Neural network classification of pharmaceutical active ingredient from near infrared spectra 

    Yee, Nigel; Yan, Ashley (Institute of Electrical and Electronics Engineers (IEEE), 2015-12)
    This paper presents results from a scoping study undertaken with the intention of demonstrating the applicability of reflectance Near-Infrared (NIR) spectroscopy in classification of pharmaceutical type based on active ...
  • Effects of software security on software development life cycle and related security issues 

    Mohaddes Deylami, Hanif; Ardekani, Iman; Muniyandi, Ravie Chandren; Sarrafzadeh, Hossein (International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)
    Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ...
  • Encryption, storage technology and security of data at rest 

    Alkorbi, Mohammed (2015-11)
    The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ...
  • Capture the talent : secondary school education with cyber security competition 

    Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
    Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...