• Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A (2017-07)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • RunJumpCode : an educational game for educating programming 

    Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
    Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
  • Engaging children in diabetes education through mobile games 

    Baghaei, Nilufar; Casey, John; Nandigam, D.; Sarrafzadeh, Hossein; Maddison, R. (International Association for the Development of the Information Society (IADIS), 2017-04)
    Traditional methods for diabetic education rely heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. Mobile games can be effective, evidence-based, and ...
  • Designing a novel educational game for teaching C# programming 

    Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon; Casey, John (Computer Supported Education (CSEDU Secretariat), 2017-04)
    Learning to code can be a daunting experience for a lot of students. RunJumpCode is a novel 2D platformer video game, designed and developed in Unity, to teach players the fundamental concepts of C# programming. The game ...
  • Adaptive document image skew estimation 

    Rezaei, S.B.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (International Association of Engineers (IAENG), 2017-03)
    The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ...
  • Human action recognition by conceptual features 

    Shamsipour, G.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (Newswood and International Association of Engineers, 2017-03)
    Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ...
  • Noise removal and binarization of scanned document images using clustering of features 

    Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
    Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
  • Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques 

    Sarrafpour, Bahman; Abbaro, C.; Pitton, I.; Young, C.; Madipour, Farhad (2016-12-14)
    Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ...
  • Distributed Incremental wLPSVM Learning 

    Zhu, L.; Ban, T.; Ikeda, K.; Pang, P.; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
    Weighted linear proximal support vector machine (wLPSVM) is known as an efficient binary classification algorithm with good accuracy and class-imbalance robustness. In this work, original batch wLPSVM is facilitated with ...
  • Taxonomy of malware detection techniques 

    Mohaddes Deylami, H.; Muniyandi, R. C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
    Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
  • A survey on Internet usage and cybersecurity awareness in students 

    Tirumala, S.; Sarrafzadeh, Hossein (2016-12)
    There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
  • Evaluation of statistical text normalisation techniques for Twitter 

    Sosamphan, P.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (IC3K, 2016-11)
    One of the major challenges in the era of big data use is how to ‘clean’ the vast amount of data, particularly from micro-blog websites like Twitter. Twitter messages, called tweets, are commonly written in ill-forms, ...
  • From source coding to MIMO : a Multi-Level Unequal Error Protection 

    Barmada, Bashar; Rehman, Saeed (Institute of Electrical and Electronics Engineers (IEEE), 2016-11)
    In this paper, unequal error protection (UEP) on different levels of the transmission system is proposed. Starting from the source coding level, two priority layers are produced, high priority (HP) and low priority (LP). ...
  • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

    Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
    The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
  • An artifact-centric business process execution platform 

    Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
    Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
  • Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7 

    Kolahi, Samad; Cao, Yuqing; Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)
    IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ...
  • Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols 

    Narayan, Shaneel; Ishrar, Salman; Kumar, Avinesh; Gupta, Ruchinav; Khan, Ziafil (2016-07)
    This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms ...
  • Designing mobile applications for smoking cessation in New Zealand 

    Baghaei, Nilufar; Wu, Lian; Casey, John; Biddle, TeUrikore (International Conference on Medical Information Processing and Analysis, 2016-06)
    Tobacco is a leading cause of preventable death in New Zealand. The smoking rate for New Zealand Māori was 44 percent in 2009, still significantly higher than for non-Māori (18 percent) for both males and females. In this ...
  • Acoustic analysis and computerized reconstruction of speech in laryngectomised individuals 

    Sharifzadeh, Hamid; Allen, J .E.; Mcloughlin, I.; Sarrafzadeh, Hossein; Ardekani, Iman (2016-05)
    In laryngectomised individuals, rehabilitation options include esophageal speech, tracheoesophageal puncture (TEP), and electrolarynx devices enabling patients to communicate. These do not generate natural sounding speech; ...