• Development of unified and dynamic geometric framework for modelling plant leaf spots 

      Alshadli, Duaa; Borna, Kambiz; Lador, Cesar (2020-11)
      The use of computer vision and image processing techniques have proven to be effective in detecting and classifying plant diseases from symptoms, such as leaf spots or mosaic leaf patterns caused by pathogens. To identify ...
    • Enhancing customers’ knowledge and decision making using augmented reality 

      Boonrat, W.; Vaidya, V.; Baghaei, N.; Sharifzadeh, Hamid; Ahmed, A.; Casey, John (Asia-Pacific Society for Computers in Education (APSCE), 2020-11)
      Augmented reality has seen massive success in recent years as it provides an opportunity for a seamless and rich user interaction with the real world. Recent studies have shown augmented and virtual reality can play a ...
    • Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning 

      Tong, H.; Sharifzadeh, Hamid; McLoughlin, I. (ISCA (International Speech Communication Association), 2020-10)
      Dysarthria is a speech disorder that can significantly impact a person’s daily life, and yet may be amenable to therapy. To automatically detect and classify dysarthria, researchers have proposed various computational ...
    • Increasing self-compassion in young people through virtual reality 

      Baghaei, Nilufar; Hach, Sylvia; Khaliq, I.; Stemmet, L.; Krishnan, J.; Naslund, J.; Liang, H.L.; Sharifzadeh, Hamid (2019-10)
      As part of our proposal, we aim to:  provide increased practice/exposure and target a younger audience  increase the chance of generalisation to everyday life  employ better VR visualisation, e.g. assigning more ...
    • Reducing ICT carbon footprints through adoption of green computing 

      Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)
      A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ...
    • Psychoacoustically motivated active noise control at remote locations 

      Munir, M.W.; Abdulla, W. H.; Ardekani, Iman (2019)
      Active noise control (ANC) is an effective way to cancel the low-frequency noise. The conventional ANC system creates the ‘zone of quiet’ by minimizing the mean square error (MSE) at the location of an error microphone. ...
    • Estimating the risk of fraud against e-services 

      Yesuf, AS.; Probst, Christian (Springer International Publishing, 2018-11)
      Industry is continuously developing, deploying, and maintaining e-services to transform traditional offerings. While protection of traditional services is well understood, their digital transformation often is vulnerable ...
    • Bayesian parameter estimation of Euler-Bernoulli beams 

      Ardekani, Iman; Kaipio, J.; Sharifzadeh, Hamid (2018-11)
      This paper develops a statistical signal processing algorithm for parameter estimation of Euler-Bernoulli beams from limited and noisy measurement. The original problem is split into two reduced-order sub-problems coupled ...
    • A novel adaptive active noise control algorithm based on Tikhonov regularisation 

      Ardekani, Iman; Sakhaee, N.; Sharifzadeh, Hamid; Barmada, Bashar; Lovell, G. (2018-11)
      This paper proposes a novel adaptive active noise control algorithm based on Tikhonov regularization theory. A regularized cost function consisting of the weighted sum of the most recent samples of the residual noise and ...
    • Tracking a person’s behaviour in a smart house 

      Chand, G.; Ali M.; Barmada, Bashar; Liesaputra, Veronica; Prado, G. (Springer Verlag, 2018-11)
      This paper proposes to use machine learning techniques with ultrasonic sensors to predict the behavior and status of a person when they live solely inside their house. The proposed system is tested on a single room. A grid ...
    • Evaluating VANET Routing Protocols for Auckland Area 

      Barmada, Bashar; Alobaidi, Naji; Ardekani, Iman; Erfanian.Sabaee, M.; Ramirez-Prado, Guillermo (2018-10)
      This paper provides a performance evaluation for several popular Vehicular Ad-Hoc Network (VANET) protocols, namely AODV, DSR, OLSR, DSDV, GPSR, CBRP, and ZRP with Nakagami fading propagation model for Auckland area. The ...
    • A route map for wireless sensor networks over large coverage area 

      Jain, R.; Adhikary, P. S.; Ramirez-Prado, Guillermo; Barmada, Bashar; Ardekani, Iman (2018-10)
      This paper presents a mechanism to increase the coverage area of Wireless Sensor Networks (WSN) and increase the availability of wireless nodes. The proposed solution relies purely on open standards that implement 6LoWPAN ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Designing a memory-aid and reminder system for dementia patients and older adults 

      Airehrour, David; Madanian, S.; Abraham, A. M. (2018-05)
      The United Nations statistics show that our society is rapidly aging, and this has led to the surge in the development of assisted living technologies. Of note is the minimal attention given to the assisted living technologies ...
    • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

      Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
      This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
    • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

      Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
      This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
    • MoodRush : designing a language-free mobile app for mood self-assessment 

      Hach, Sylvia; Baghaei, Nilufar; Jauny, Ray; Hayward, Christian; Sarrafzadeh, Hossein (2017-11)
      Depression affects a large percentage of young adults across the globe. The delivery of mental health information and the provision of tools for the self-assessment of mood are important means in addressing this problem. ...
    • Physical classification and recent developments of active noise control systems 

      Munir, M.W.; Abdulla, W. H.; Ardekani, Iman; Patel, N. (Association for Computing Machinery (ACM), 2017-11)
      The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ...
    • A framework for evaluating anti spammer systems for Twitter 

      Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
      Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A.A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142