• Adaptive active control of free space acoustic noise 

    Ardekani, Iman; Abdulla, Waleed H. (Published by the Acoustical Society of America through the American Institute of Physics, 2013)
    This paper concerns adaptive active control of acoustic noise in free space. Conventional adaptive active noise control algorithms are efficient in acoustic ducts or headphones; however, they are very sensitive when being ...
  • Adaptive background modeling for land and water composition scenes 

    Zhao, Jing; Pang, Shaoning; Hartill, Bruce; Sarrafzadeh, Hossein (International Conference on Image Analysis and Processing (ICIAP), 2015-09)
    In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ...
  • Advancements in English-Persian Hierarchical Statistical Machine Translation 

    Mohaghegh, Mahsa (2012)
    In this paper we show that a hierarchical phrase-based translation system will outperform a classical (non-hierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ...
  • An Alternative Approach for Developing Socially Assistive Robots 

    Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
    This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
  • Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Analysis of Impersonation Attack on RF Fingerprinting 

    Rehman, Saeed (2013)
    Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
  • Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

    Kolahi, Samad; Treseangrat, Kiattiku; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02)
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
  • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...
  • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

    Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
    The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
  • Brightness preserving fuzzy dynamic histogram equalization 

    Sarrafzadeh, Hossein; Rezazadeh, Fatemeh; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
    Abstract—Image enhancement is a fundamental step of image processing and machine vision to improve the quality of an image for a specific application. Histogram equalization is an attractive and commonly-employed image ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • A Collaborative Constraint-based Intelligent System for Learning Object-Oriented Analysis and Design using UML 

    Baghaei, Nilufar (2006)
    Automatic analysis of interaction and support for group learning through a distance collaborative learning system is at the forefront of educational technology. Research shows that collaborative leaming provides an environment ...
  • COMAC: Educational Games for Children with ADD/ADHD 

    Baghaei, Nilufar; Casey, John; Romo de Vivar, David; Harris, Grace (2012)
    Previous research has shown that children with Attention Deficit Disorder (ADD) and Attention Deficit Hyperactivity Disorder (ADHD) have unique difficulties that can make more traditional methods of teaching less effective. ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Competition for IBL Placements 

    Ram, Shiu (2006)
    Providers of tertiary education and training include work experience or real projects as compulsory requirements of a number of programs that they offer. Students have to meet either one of these requirements in order to ...
  • Cross-layer Optimisation for Quality of Service Support in Wireless Sensor Networks 

    Mohaghegh, Mahsa; Manford, Chris; Sarrafzadeh, Hossein (2011)
    Wireless sensor networks need to deliver real-time services such as video, audio and traditional data services therefore providing efficient quality of services (QoS) support is essential. In this paper we aim to address ...
  • Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • Deployment of a service robot to help older people 

    Jayawardena, Chandimal; Kuo, I-Han; Unger, U.; Wong, R.; Watson, Catherine I.; Stafford, Rhyll; Broadbent, E.; Tiwari, P.; Warren, J.; Sohn, J.; MacDonald, B. A. (2010)
    This paper presents the first version of a mobile service robot designed for older people. Six service application modules were developed with the key objective being successful interaction between the robot and the older ...
  • Designing a socially assistive companion robotic wheel chair: RoboChair 

    Jayawardena, Chandimal; Baghaei, Nilufar; Ganeshan, Kathiravelu; Sarrafzadeh, Hossein (IEEE Computer Society, 2013)
    Developing socially assistive robots is an emerging interdisciplinary research area, which requires collaboration between a wide range of disciplines. Among recent research projects, there have been attempts to develop ...
  • Designing mobile applications for smoking cessation in New Zealand 

    Baghaei, Nilufar; Wu, Lian; Casey, John; Biddle, TeUrikore (International Conference on Medical Information Processing and Analysis, 2016-06)
    Tobacco is a leading cause of preventable death in New Zealand. The smoking rate for New Zealand Māori was 44 percent in 2009, still significantly higher than for non-Māori (18 percent) for both males and females. In this ...