Recent Submissions

  • Designing a memory-aid and reminder system for dementia patients and older adults 

    Airehrour, David; Madanian, S.; Abraham, A. M. (2018-05)
    The United Nations statistics show that our society is rapidly aging, and this has led to the surge in the development of assisted living technologies. Of note is the minimal attention given to the assisted living technologies ...
  • Greening and optimizing energy consumption of sensor nodes in the Internet of Things through energy harvesting : challenges and approaches 

    Airehrour, David; Gutiérrez, J.; Ray, S. K. (2016-05)
    This paper presents a survey of current energy efficient technologies that could drive the IoT revolution while examining critical areas for energy improvements in IoT sensor nodes. The paper reviews improvements in emerging ...
  • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

    Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
    The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
  • An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing 

    Airehrour, David; Gutierrez, J. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)
    The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ...
  • Physical classification and recent developments of active noise control systems 

    Munir, M.; Abdulla, W.; Ardekani, Iman; Patel, N. (Association for Computing Machinery (ACM), 2017-11)
    The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ...
  • Automatic generation of user interface layouts for alternative screen orientations 

    Zeidler, Clemens; Weber, G.; Stuerzlinger, W.; Lutteroth, C. (Springer International Publishing, 2017)
    Creating multiple layout alternatives for graphical user interfaces to accommodate different screen orientations for mobile devices is labor intensive. Here, we investigate how such layout alternatives can be generated ...
  • A framework for evaluating anti spammer systems for Twitter 

    Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
    Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
  • Privacy-preserving data sharing in portable clouds 

    Zeidler, Clemens; Asghar, M. (Science and Technology Publications, Lda, 2016-04)
    Cloud storage is a cheap and reliable solution for users to share data with their contacts. However, the lack of standardisation and migration tools makes it difficult for users to migrate to another Cloud Service Provider ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
  • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

    Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
  • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

    Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
    This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
  • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

    Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
    This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
  • Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title] 

    Nandigam, David; Tirumala, Sreenivas Sremath; Baghaei, Nilufar (2014-12)
    The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ...
  • A pattern recognition for group abnormal behaviors based on Markov Random Fields energy 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (Institute of Electrical and Electronics Engineers (IEEE), 2014-08)
    Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ...
  • A new biological visual cognitive behavioural modeling for video energy computing 

    Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (2014)
    As we all know, human vision is quite sensitive to abnormal behaviors, which is attributed to the discharging of the receptor cells in the brain visual cortex and the ensuing bioelectrical energy features. Inspired by this ...
  • Analysis and configuration of boundary difference calculations 

    Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
    In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
  • Implementation of evolutionary algorithms for deep architectures 

    Tirumala, Sreenivas Sremath (CEUR Workshop Proceedings, 2014-11)
    Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ...
  • Portability of an RF fingerprint of a wireless transmitter 

    Rehman, Saeed; Sowerby, K.; Alam, S.; Ardekani, Iman (2014-10)
    In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
  • Security in Virtual DMZ designs 

    Sathu, Hira; Komosny, D.; Singh, S. (Global Business and Technology Association (New York), 2014-07)
    Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
  • Impact of IPSec security on VoIP in different environments 

    Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
    In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...

View more