Research Bank

Computing Conference Papers

Unitec Research Bank

Computing Conference Papers

 

Recent Submissions

  • Jarrett, Ben (xCoAx 2014 Second conference on Computation, Communication, Aesthetics and X, 2014)
    The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
  • Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Dr. Sira; Liesaputra, Veronica (Web Information Systems Engineering – WISE 2014 Workshops, 2014)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • Yongchareon, Sira; Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian (International Conference on Cooperative Information Systems (CoopIS), 2014, 2014)
    To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
  • Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Web Information Systems Engineering – WISE 2014 Workshops, 2014)
    Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
  • Ardekani, Iman; Abdulla, Waleed H.; Rehman, Saeed (Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, 2014)
    Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
  • Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS Workshop on Physical-layer Methods for Wireless Security, 2014)
    RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS Workshop on Physical-layer Methods for Wireless Security, 2014)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (22nd International Conference on Pattern Recognition (ICPR), 2014)
    Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
  • Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Kirk, Diana; MacDonell, Stephen G. (Conference on Empirical Assessment in Software Engineering (EASE), 2014)
    A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...
  • Mohaghegh, Mahsa; Sarrafzadeh, Hossein; Mohammadi, Mehdi (The 13th International Conference on Machine Learning and Applications (ICMLA'14), 2014)
    Statistical word alignment models need large amounts of training data while they are weak in small-sized corpora. This paper proposes a new approach of an unsupervised hybrid word alignment technique using an ensemble ...
  • Li, Xiaosong; Lian, Wei; Sarrafzadeh, Hossein (WEBIST 2014 - 10th International Conference on Web Information Systems and Technologies, 2014)
    Business-to-Consumer (B2C) e-commerce is popular because of its convenience, speed and price. Although there has been intense debate about quality dimensions of e-commerce websites, more research is needed to find a ...
  • Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE/RAS-EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob 2014), 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (12th NZCSRSC New Zealand Computer Science Research Student Conference, 2014)
    In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
  • Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (2014 SIAM International Conference on Data Mining, 2014)
    This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
  • Sowerby, Kevin; Rehman, Saeed; Coghill, Colin (Virginia Tech Symposium on Wireless Personal Communications., 2013)
    Radio Frequency (RF) Fingerprinting Problem definition Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
  • Rehman, Saeed (IEEE NZ Wireless Workshop., 2013)
    Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
  • Sarrafzadeh, Hossein (3rd International eConference on Computer and Knowledge Engineering (ICCKE 2013), 2013)
    Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if e-learning systems, Automatic Teller Machines, ticketing machines and robotic systems ...
  • Dacey, Simon; Song, Lei; Pang, Shaoning (ICONIP 2013 : 20th International Conference on Neural Information Processing, 2013)
    Land management and planning is essential to assist the economic growth, sustainable resource use and environmental protection of a city. This paper describes a novel approach to automatic encroachment detection to assist ...
  • Ardekani, Iman; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2013), 2013)
    This paper concerns about the theoretical stability of the adaptation process performed by the Filtered-x Least Mean Square (FxLMS) algorithm in active control of acoustic noise. A dynamic model for the Variance of Residual ...

View more

Search


Browse Research Bank

My Account

Discover

Help

Share

  • Bookmark and Share

Usage Statistics

RSS Feeds