Recent Submissions

  • A framework for evaluating anti spammer systems for Twitter 

    Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
    Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
  • Privacy-preserving data sharing in portable clouds 

    Zeidler, Clemens; Asghar, M. (Science and Technology Publications, Lda, 2016-04)
    Cloud storage is a cheap and reliable solution for users to share data with their contacts. However, the lack of standardisation and migration tools makes it difficult for users to migrate to another Cloud Service Provider ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

    Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
    This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
  • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

    Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
    This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
  • Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title] 

    Nandigam, David; Tirumala, Sreenivas Sremath; Baghaei, Nilufar (2014-12)
    The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ...
  • A pattern recognition for group abnormal behaviors based on Markov Random Fields energy 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (Institute of Electrical and Electronics Engineers (IEEE), 2014-08)
    Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ...
  • A new biological visual cognitive behavioural modeling for video energy computing 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (2014)
    As we all know, human vision is quite sensitive to abnormal behaviors, which is attributed to the discharging of the receptor cells in the brain visual cortex and the ensuing bioelectrical energy features. Inspired by this ...
  • Analysis and configuration of boundary difference calculations 

    Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
    In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
  • Implementation of evolutionary algorithms for deep architectures 

    Tirumala, Sreenivas Sremath (CEUR Workshop Proceedings, 2014-11)
    Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ...
  • Portability of an RF fingerprint of a wireless transmitter 

    Rehman, Saeed; Sowerby, K.; Alam, S.; Ardekani, Iman (2014-10)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Security in Virtual DMZ designs 

    Sathu, Hira; Komosny, D.; Singh, S. (Global Business and Technology Association (New York), 2014-07)
    Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A (2017-07)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Noise removal and binarization of scanned document images using clustering of features 

    Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
    Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
  • A survey on Internet usage and cybersecurity awareness in students 

    Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
    There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
  • Human action recognition by conceptual features 

    Shamsipour, G.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (Newswood and International Association of Engineers, 2017-03)
    Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ...
  • Taxonomy of malware detection techniques 

    Mohaddes Deylami, H.; Muniyandi, R. C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
    Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
  • Acoustic analysis and computerized reconstruction of speech in laryngectomised individuals 

    Sharifzadeh, Hamid; Allen, J .E.; Mcloughlin, I.; Sarrafzadeh, Hossein; Ardekani, Iman (2016-05)
    In laryngectomised individuals, rehabilitation options include esophageal speech, tracheoesophageal puncture (TEP), and electrolarynx devices enabling patients to communicate. These do not generate natural sounding speech; ...

View more