Recent Submissions

  • RF fingerprinting : research opportunities 

    Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq (Asia Pacific Signal and Information Processing Association (APSIPA), 2015-01)
    Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Computational thinking : the skill set of the 21st century 

    Mohaghegh, Dr Mahsa; McCauley, Michael (TechScience Publications, 2016-05)
    Computational thinking is a relatively new term, and is the topic of much discussion in the educational realm today. Research shows that computational thinking is a highly valuable skill that is becoming a topic of increasing ...
  • Capture the talent : secondary school education with cyber security competition 

    Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
    Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...
  • Effects of software security on software development life cycle and related security issues 

    Mohaddes Deylami, Hanif; Ardekani, Iman; Muniyandi, Ravie Chandren; Sarrafzadeh, Hossein (International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)
    Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ...
  • Estimation of internet node location by latency measurements : the underestimation problem 

    Komosny, Dan; Voznak, Miroslav; Ganeshan, Kathiravelu; Sathu, Hira (Kaunas University of Technology (Kaunas, Lithuania), 2015)
    In this paper we deal with discovering a geographic location of a node in the Internet. Knowledge of location if fundamental element for many location based applications and web services. We focus on location finding without ...
  • A fast and adaptive video-based method for eye blink rate estimation 

    Mohammadi, Gheis; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein (ACCENT Society (India), 2015-06-16)
    Eye blink rate (EBR) estimation is one of the informative cues and challengeable areas in eye-based systems that has a wide range of applications like the detecting a driver’s drowsiness, anxiety analysis, diseases detection ...
  • Other-cells Interference in CDMA systems 

    Kolahi, Samad; Williamson, Allan G.; Sowerby, Kevin William (Institution of Engineering and Technology (IET), 2004-09-20)
    Using simulation and modelling, the other-cells interference factor for CDMA systems is obtained. Situations with tiers of neighbouring cells are investigated under various propagation parameters and for two scenarios, ...
  • Performance analysis of some operating systems in wireless 802.11n networks 

    Kolahi, Samad; Li, Peng (University of Bahrain (Zallaq, Bahrain), 2016-01-30)
    In this paper, the performance of some operating systems (Windows 7, Windows XP, and Fedora 12) are evaluated over IEEE 802.11n WLAN (Wireless LAN), for TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), ...
  • Evaluating IPv6 in peer-to-peer 802.11n wireless LAN 

    Kolahi, Samad; LI, Peng (IEEE Computer Society, 2011-08)
    IPv6 is built into the latest versions of Microsoft Windows and Linux-based operating systems. It's expected to replace the current IPv4 and solve its numerous problems, such as address exhaustion, security, and mobility. ...
  • NIR spectrometer used for material modeling with neural networks 

    Yee, Nigel (IEEE Computer Science, 2014)
    Near infrared multi-spectral image analysis is a tool used for non-destructive determination of biological material properties. In this investigation a custom built imaging spectrometer is constructed and used for the image ...
  • Melanoma Diagnosis by the Use of Wavelet Analysis based on Morphological Operators 

    Fassihi, Nima; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Ghasemi, Elham (International MultiConference of Engineers and Computer Scientists., 2011-03)
    Skin melanoma is the most dangerous type of skin cancer which is curable if diagnosed at the right time.. Drawing distinction between melanoma and mole is a difficult task and needs detailed laboratory tests. Utilizing ...
  • A View Framework for Modeling and Change Validation of Artifact-Centric Inter-Organizational Business Processes 

    Liu, Chengfei; Jian, Yu; Zhao, Xiaohui; Yongchareon, Sira (Elsevier, 2015)
    Over the past several years, more efficient approaches have been on increasing demands for designing, modeling, and implementing inter-organizational business processes. In the process collaboration across organizational ...
  • Potato Crisp moisture determination using NIR data and a Back Propagation Neural Network 

    Yee, Nigel; Potgieter, Paul; Liggett, Stephen (Advanced Institute of Convergence Information Technology (AICIT), 2013-06)
    Near infrared analysis is a tool used for non-destructive determination of material properties and the potato crisp production sector has been using the technique for determination of moisture content however near infrared ...
  • Migration from PLC to IEC 61499 using Semantic Web Technologies 

    Dai, Wenbin; Dubinin, V.N.; Vyatkin, V. (IEEE, 2014-03)
    This paper proposes a new methodology of migration from IEC 61131-3 PLCs to IEC 61499 function blocks. The aim of this migration process is to recreate IEC 61131-3 applications in IEC 61499 implementations with equivalent ...
  • Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

    Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Academic Press, 2014-05)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
  • Play & Learn: Designing Engaging Educational Games for Children 

    Nand, Kalpana; Baghaei, Nilufar; Casey, John (Cognitive Technology Journal, 2013)
    The use of computer games as common vehicles for education, as opposed to pure entertainment, has gained immense popularity in recent years. In this paper, we investigate the appealing characteristics of engaging computer ...
  • On the stochastic modeling and analysis of FxLMS adaptation algorithm 

    Ardekani, Iman; Abdulla, Waleed H. (The Institution of Engineering and Technology, 2013)
    This study represents a stochastic model for the adaptation process performed on adaptive control systems by the filtered-x least-mean-square (FxLMS) algorithm. The main distinction of this model is that it is derived ...
  • Generalization of VLC Decoding Trees-to-Processes 

    Hong, Guan Yue; Fong, A.C.M. (2010-05)
    In an earlier paper, we presented a novel application of Communicating Sequential Processes (CSP) to the modeling of variable length code (VLC) synchronization. Different from the traditional encoding/decoding tree analysis, ...
  • Does the robot have a mind? : mind perception and attitudes towards robots predict use of an eldercare robot? 

    Stafford, Rebecca Q.; MacDonald, Bruce A.; Jayawardena, Chandimal; Wegner, Daniel M; Broadbent, Elizabeth (2014-01-01)
    Robots are starting to be developed for aged care populations and some of these have been made into commercial products that have been well received. However, little is known about the psychological factors that promote ...
  • Service provision control in federated service providing systems 

    Chen, Gang; Sarrafzadeh, Abdolhossein; Pang, Shaoning (2013-03)
    Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ...

View more