• Adaptive active control of free space acoustic noise 

    Ardekani, Iman; Abdulla, Waleed H. (Published by the Acoustical Society of America through the American Institute of Physics, 2013)
    This paper concerns adaptive active control of acoustic noise in free space. Conventional adaptive active noise control algorithms are efficient in acoustic ducts or headphones; however, they are very sensitive when being ...
  • Adaptive background modeling for land and water composition scenes 

    Zhao, Jing; Pang, Shaoning; Hartill, Bruce; Sarrafzadeh, Hossein (International Conference on Image Analysis and Processing (ICIAP), 2015-09)
    In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ...
  • Advancements in English-Persian Hierarchical Statistical Machine Translation 

    Mohaghegh, Mahsa (2012)
    In this paper we show that a hierarchical phrase-based translation system will outperform a classical (non-hierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ...
  • An Alternative Approach for Developing Socially Assistive Robots 

    Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Analysis of e-commerce sites using the 7C Framework, by developing a software tool 

    Yang, Chih-Hsiang (2016)
    Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ...
  • Analysis of Impersonation Attack on RF Fingerprinting 

    Rehman, Saeed (2013)
    Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
  • Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

    Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Academic Press, 2014-05)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
  • Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

    Kolahi, Samad; Treseangrat, Kiattiku; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02)
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
  • Application of Fuzzy Techniques in Human-Robot Interaction - A Review 

    Kuo, I-Han; Jayawardena, Chandimal (Springer International Publishing, 2014)
    Targeting research challenges in Socially Assistive Robotics (SAR), this paper provides a review of previous work that describe robot or non-robot systems that use fuzzy logic to infer high-level human intention or activities. ...
  • An application of soft systems methodology on a holistic level: Recommendations for developing and implementing green ICT strategies in New Zealand 

    Zhang, Bing Qian (2011)
    This thesis has been conducted in order to identify and explore the issues involved in the development and implementation of Green ICT strategies in ICT recycling in New Zealand. There were interactions with five stakeholders ...
  • An artifact-centric business process execution platform 

    Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
    Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
  • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...
  • Benefits of using data warehousing and data mining tools 

    Ram, Shiu (2013)
    This research was an attempt to find out the benefits that a sample of organisations are deriving by using data warehousing and data mining tools(software). Participants from eight organisations were interviewed to gather ...
  • Biologically Inspired Techniques for Data Mining: A Brief Overview of Particle Swarm Optimization for KDD. Alam 

    Shafiq, Alam; Gillian, Dobbie; Koh, Yun Sing; Rehman, Saeed (Information Science Reference, 2014-02-02)
    Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ...
  • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

    Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
    The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
  • Brightness preserving fuzzy dynamic histogram equalization 

    Sarrafzadeh, Hossein; Rezazadeh, Fatemeh; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
    Abstract—Image enhancement is a fundamental step of image processing and machine vision to improve the quality of an image for a specific application. Histogram equalization is an attractive and commonly-employed image ...
  • Can Vivaldi help in IP geolocation? 

    Komosny, Dan; Simek, Milan; Kathiravelu, Ganeshan (Przegl ˛ad Elektrotechniczny, 2013)
    The paper deals with IP geolocation based on communication latency measurement. The aim of IP geolocation is to estimate the geographical location of an IP-enabled node. Latency-based IP geolocation methods measure latency ...
  • Capture the talent : secondary school education with cyber security competition 

    Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
    Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...
  • Challenges faced by staff and students at tertiary level in flexible learning environment: An institutional study 

    Sheriffdeen, Seyed (2007)
    This research is concerned with identifying the challenges / problems of flexible learning environments in the tertiary education sector. Flexible learning environments usually allow students to choose from a mix of learning ...