• Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

    Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Academic Press, 2014-05)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
  • Can Vivaldi help in IP geolocation? 

    Komosny, Dan; Simek, Milan; Kathiravelu, Ganeshan (Przegl ˛ad Elektrotechniczny, 2013)
    The paper deals with IP geolocation based on communication latency measurement. The aim of IP geolocation is to estimate the geographical location of an IP-enabled node. Latency-based IP geolocation methods measure latency ...
  • Capture the talent : secondary school education with cyber security competition 

    Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
    Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...
  • Collaborative learning skills in multi-touch tables for UML software design 

    Basheri, Mohammed; Munro, Malcolm; Burd, Liz; Baghaei, Nilufar (International Journal of Advanced Computer Science and Applications, 2013)
    The use of multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This paper ...
  • Computational thinking : the skill set of the 21st century 

    Mohaghegh, Dr Mahsa; McCauley, Michael (TechScience Publications, 2016-05)
    Computational thinking is a relatively new term, and is the topic of much discussion in the educational realm today. Research shows that computational thinking is a highly valuable skill that is becoming a topic of increasing ...
  • Does the robot have a mind? : mind perception and attitudes towards robots predict use of an eldercare robot? 

    Stafford, Rebecca Q.; MacDonald, Bruce A.; Jayawardena, Chandimal; Wegner, Daniel M; Broadbent, Elizabeth (2014-01-01)
    Robots are starting to be developed for aged care populations and some of these have been made into commercial products that have been well received. However, little is known about the psychological factors that promote ...
  • Dynamic class imbalance learning for incremental LPSVM 

    Pang, Shaoning; Zhu, Lei; Chen, Gang; Sarrafzadeh, Hossein; Ban, Tao; Inoue, Daisuke (Neural Networks, 2013-02)
    Linear Proximal Support Vector Machines (LPSVMs), like decision trees, classic SVM, etc. are originally not equipped to handle drifting data streams that exhibit high and varying degrees of class imbalance. For online ...
  • Effects of software security on software development life cycle and related security issues 

    Mohaddes Deylami, Hanif; Ardekani, Iman; Muniyandi, Ravie Chandren; Sarrafzadeh, Hossein (International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)
    Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ...
  • Error signal measurement in active noise control systems 

    Sheth, Darshana; Ardekani, Iman (Asia-Pasific Signal Information Processing Association, 2015-08)
    Active noise control (ANC) creates a set of silent points at the location of error microphones. As a byproduct, a zone of quiet is created surrounding the silent points. Unfortunately, the extension of the created quite ...
  • Estimation of internet node location by latency measurements : the underestimation problem 

    Komosny, Dan; Voznak, Miroslav; Ganeshan, Kathiravelu; Sathu, Hira (Kaunas University of Technology (Kaunas, Lithuania), 2015)
    In this paper we deal with discovering a geographic location of a node in the Internet. Knowledge of location if fundamental element for many location based applications and web services. We focus on location finding without ...
  • Evaluating IPv6 in peer-to-peer 802.11n wireless LAN 

    Kolahi, Samad; LI, Peng (IEEE Computer Society, 2011-08)
    IPv6 is built into the latest versions of Microsoft Windows and Linux-based operating systems. It's expected to replace the current IPv4 and solve its numerous problems, such as address exhaustion, security, and mobility. ...
  • A fast and adaptive video-based method for eye blink rate estimation 

    Mohammadi, Gheis; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein (ACCENT Society (India), 2015-06-16)
    Eye blink rate (EBR) estimation is one of the informative cues and challengeable areas in eye-based systems that has a wide range of applications like the detecting a driver’s drowsiness, anxiety analysis, diseases detection ...
  • Foundation of an Affective Tutoring System: Learning How Human Tutors Adapt to Student Emotion 

    Sarrafzadeh, Hossein; Alexander, Samuel T.V.; Hill, S (2008)
    The developing field of Affective Tutoring Systems (ATSs) has created a need to understand how such tutoring systems should adapt to the emotional state of students. To this end, an observational study of human tutors was ...
  • Generalization of VLC Decoding Trees-to-Processes 

    Hong, Guan Yue; Fong, A.C.M. (2010-05)
    In an earlier paper, we presented a novel application of Communicating Sequential Processes (CSP) to the modeling of variable length code (VLC) synchronization. Different from the traditional encoding/decoding tree analysis, ...
  • Hand and Face Tracking for Gesture Recognition 

    Dadgostar, F; Sarrafzadeh, Hossein (2009)
    "This paper presents research leading to the development of a vision-based gesture recognition system. The system comprises of three abstracts layers each with their own specific type and requirements of data ..."
  • “How do you know that I don't understand?" A look at the future of intelligent tutoring systems 

    Sarrafzadeh, Hossein (Pergamon, 2007)
    Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems (ITSs), ATM’s, ticketing machines could recognise when users ...
  • Melanoma Diagnosis by the Use of Wavelet Analysis based on Morphological Operators 

    Fassihi, Nima; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Ghasemi, Elham (International MultiConference of Engineers and Computer Scientists., 2011-03)
    Skin melanoma is the most dangerous type of skin cancer which is curable if diagnosed at the right time.. Drawing distinction between melanoma and mole is a difficult task and needs detailed laboratory tests. Utilizing ...
  • Migration from PLC to IEC 61499 using Semantic Web Technologies 

    Dai, Wenbin; Dubinin, V.N.; Vyatkin, V. (IEEE, 2014-03)
    This paper proposes a new methodology of migration from IEC 61131-3 PLCs to IEC 61499 function blocks. The aim of this migration process is to recreate IEC 61131-3 applications in IEC 61499 implementations with equivalent ...
  • NIR spectrometer used for material modeling with neural networks 

    Yee, Nigel (IEEE Computer Science, 2014)
    Near infrared multi-spectral image analysis is a tool used for non-destructive determination of biological material properties. In this investigation a custom built imaging spectrometer is constructed and used for the image ...
  • On performance of multicast delivery with fixed WiMAX telemedicine networks using single-carrier modulation 

    Fong, Bernard; Hong, Guan Yue (Academy Publisher, 2010)
    IEEE 802.16e fixed WiMAX provides a low cost solution for integrated multimedia access networks with a wide bandwidth making it particularly suitable for telemedicine applications. While a wide variety of modulation schemes ...