• Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Progress report on a proposed theory for software development 

    Kirk, Diana; MacDonell, Stephen G. (SCITEPRESS (Science and Technology Publications) Digital Library, 2015-07)
    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
  • Efficient FXLMS algorithm with simplified secondary path models. 

    Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

    Ahmad, Aziz; Anderson, Tim (Australia PV Institute, 2014-12)
    In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • The global cyber security workforce : an ongoing human capital crisis 

    Fourie, Leon; Pang, Shaoning; Kingston, Tamsin; Hettema, Hinne; Watters, Paul; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
    Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ...
  • Eve : an affect-sensitive pedagogical agent 

    Fourie, Leon; Overmyer, Scott; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Alexander, Samuel T.V. (Global Business and Technology Association, 2014-07)
    Easy with Eve is an affect-sensitive tutoring system that features Eve, an animated pedagogical agent that adapts to student emotion based on the results of an observational study of human tutors. This paper presents the ...
  • Improved learning through peer tutoring in a declarative programming course 

    Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
    A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ...
  • Global solar radiation prediction using artificial neural network models for New Zealand 

    Ahmad, Aziz; Anderson, Tim (Solar 2014 Conference & Expo, 2014-05)
    In this study, nonlinear autoregressive recurrent neural networks with exogenous input (NARX) were used to predict global solar radiation across New Zealand. Data for nine hourly weather variables recorded across New Zealand ...
  • Smart Task Orderings for Active Online Multitask Learning 

    Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (Society for Industrial and Applied Mathematics, Activity Group on Data Mining and Analytics, 2014-04-26)
    This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
  • Maori-English Machine Translation 

    Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (2014-04-24)
    In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
  • Portability of an RF Fingerprint of a Wireless Transmitter 

    Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Vein Pattern Visualization Through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation 

    Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (International Conference on Pattern Recognition (ICPR), 2014)
    Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
  • Radio Frequency Fingerprinting and its Challenges 

    Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
    RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • An Alternative Approach for Developing Socially Assistive Robots 

    Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Investigating a conceptual construct for software context. 

    Kirk, Diana; MacDonell, Stephen G. (ACM (Association for Computing Machinery), 2014)
    A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...