• Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • Neural network classification of pharmaceutical active ingredient from near infrared spectra 

    Yee, Nigel; Yan, Ashley (Institute of Electrical and Electronics Engineers (IEEE), 2015-12)
    This paper presents results from a scoping study undertaken with the intention of demonstrating the applicability of reflectance Near-Infrared (NIR) spectroscopy in classification of pharmaceutical type based on active ...
  • An intelligent student advising system using collaborative filtering 

    Ganeshan, Kathiravelu; Li, Xiaosong (Frontiers in Education Conference (FIE), 2015-10)
    We propose a web based intelligent student advising system using collaborative filtering, a technique commonly used in recommendation systems assuming that users with similar characteristics and behaviors will have similar ...
  • Adaptive background modeling for land and water composition scenes 

    Zhao, Jing; Pang, Shaoning; Hartill, Bruce; Sarrafzadeh, Hossein (International Conference on Image Analysis and Processing (ICIAP), 2015-09)
    In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ...
  • Progress report on a proposed theory for software development 

    Kirk, Diana; MacDonell, Stephen G. (SCITEPRESS (Science and Technology Publications) Digital Library, 2015-07)
    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
  • Ensemble based learning for decision making : current status and future prospects 

    Ali, Shahid; Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2015-07)
    In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each model has certain limitations, the aim of ensemble learning is to supervise their strengths and ...
  • A process mining technique using pattern recognition 

    Liesaputra, Veronica; Yongchareon, Dr. Sira; Chaisiri, Sivadon (Conference on Advanced Information Systems Engineering (CAiSE), 2015-06)
    Several works have proposed process mining techniques to discover process models from event logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in event ...
  • Mobile devices as support systems for health behaviour change 

    Nandigam, David; Baghaei, Nilufar; Liang, Haining (Institute of Electrical and Electronics Engineers (IEEE), 2015-05)
    A Behaviour Change Support System (BCSS) is a socio-technical information system designed to form, alter, or reinforce attitudes, behaviours, or compliance to a regular patterns of activities, and they do so without the ...
  • Effect of quantization on competitive co-evolution algorithm - QCCEA versus CCEA 

    Tirumala, Sreenivas Sremath; Nandigam, David; Ali, Shahid; Li, Zuojin (International Institute of Engineers and Researchers (IIER), 2015-02-15)
    Quantum inspired Evolutionary Algorithm (QEA) which uses qubits has been the basis for the development of many Quantum Inspired algorithms. Di- verging from this, a new Quantum Inspired Competitive Co-evolution algorithm ...
  • Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

    Kolahi, Samad; Treseangrat, Kiattiku; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02)
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
  • ETL tools for data warehousing : an empirical study of open source Talend Studio versus Microsoft SSIS 

    Katragadda, Ranjith; Tirumala, Sreenivas Sremath; Nandigam, David (Institute of Electrical and Electronics Engineers (IEEE), 2015-01)
    Relational databases are bound to follow various database integrity rules and constraints that makes the reporting a time consuming process. Data Warehousing has evolved out of the desperate need for easy access to structured ...
  • Efficient FXLMS algorithm with simplified secondary path models. 

    Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

    Ahmad, Aziz; Anderson, Tim (Australia PV Institute, 2014-12)
    In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • The global cyber security workforce : an ongoing human capital crisis 

    Fourie, Leon; Pang, Shaoning; Kingston, Tamsin; Hettema, Hinne; Watters, Paul; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
    Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ...