Recent Submissions

  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Progress report on a proposed theory for software development 

    Kirk, Diana; MacDonell, Stephen G. (SCITEPRESS (Science and Technology Publications) Digital Library, 2015-07)
    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
  • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

    Ahmad, Aziz; Anderson, Tim (Australia PV Institute, 2014-12)
    In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
  • Global solar radiation prediction using artificial neural network models for New Zealand 

    Ahmad, Aziz; Anderson, Tim (Solar 2014 Conference & Expo, 2014-05)
    In this study, nonlinear autoregressive recurrent neural networks with exogenous input (NARX) were used to predict global solar radiation across New Zealand. Data for nine hourly weather variables recorded across New Zealand ...
  • SVM based ensemble learning for spatial and temporal air pollution analysis 

    Ali, Sahid; Lai, Anthony (2014)
    The paper aims to propose spatial and temporal air pollution data analysis by using Support Vector Machine (SVM) ensemble method along with single SVM, Bagging and AdaboostM1 algorithms to identify three objectives of our ...
  • Uncovering Biokinetic Interfacing 

    Jarrett, Ben (xCoAx, 2014)
    The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes 

    Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian; Yongchareon, Sira (Springer Verlag, 2014)
    To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
  • A Survey on Approaches to Modeling Artifact-centric Business Processes 

    Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
    Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
  • Remote FxLMS algorithm for active control of sound in remote locations 

    Ardekani, Iman; Abdulla, Waleed H.; Rehman, Saeed (Asia-Pacific Signal and Information Processing Association (APSIPA), 2014)
    Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
  • Radio Frequency Fingerprinting and its Challenges 

    Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Portability of an RF Fingerprint of a Wireless Transmitter 

    Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Vein Pattern Visualization Through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation 

    Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (International Conference on Pattern Recognition (ICPR), 2014)
    Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
  • Efficient FXLMS algorithm with simplified secondary path models. 

    Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Investigating a conceptual construct for software context. 

    Kirk, Diana; MacDonell, Stephen G. (ACM (Association for Computing Machinery), 2014)
    A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...
  • Ensemble Statistical and Heuristic Models for Unsupervised Word Alignment 

    Mohaghegh, Mahsa; Sarrafzadeh, Hossein; Mohammadi, Mehdi (IEEE (Institute of Electrical and Electronics Engineers), 2014)
    Statistical word alignment models need large amounts of training data while they are weak in small-sized corpora. This paper proposes a new approach of an unsupervised hybrid word alignment technique using an ensemble ...

View more