• Bayesian parameter estimation of Euler-Bernoulli beams 

      Ardekani, Iman; Kaipio, J.; Sharifzadeh, Hamid (2018-11)
      This paper develops a statistical signal processing algorithm for parameter estimation of Euler-Bernoulli beams from limited and noisy measurement. The original problem is split into two reduced-order sub-problems coupled ...
    • A novel adaptive active noise control algorithm based on Tikhonov regularisation 

      Ardekani, Iman; Sakhaee, N.; Sharifzadeh, Hamid; Barmada, B.; Lovell, G. (2018-11)
      This paper proposes a novel adaptive active noise control algorithm based on Tikhonov regularization theory. A regularized cost function consisting of the weighted sum of the most recent samples of the residual noise and ...
    • Estimating the risk of fraud against e-services 

      Yesuf, AS.; Probst, Christian (Springer International Publishing, 2018-11)
      Industry is continuously developing, deploying, and maintaining e-services to transform traditional offerings. While protection of traditional services is well understood, their digital transformation often is vulnerable ...
    • A route map for wireless sensor networks over large coverage area 

      Jain, R.; Adhikary, P. S.; Ramirez-Prado, Guillermo; Barmada., B; Ardekani, Iman (2018-10)
      This paper presents a mechanism to increase the coverage area of Wireless Sensor Networks (WSN) and increase the availability of wireless nodes. The proposed solution relies purely on open standards that implement 6LoWPAN ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Designing a memory-aid and reminder system for dementia patients and older adults 

      Airehrour, David; Madanian, S.; Abraham, A. M. (2018-05)
      The United Nations statistics show that our society is rapidly aging, and this has led to the surge in the development of assisted living technologies. Of note is the minimal attention given to the assisted living technologies ...
    • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

      Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
      This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
    • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

      Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
      This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
    • Physical classification and recent developments of active noise control systems 

      Munir, M.; Abdulla, W.; Ardekani, Iman; Patel, N. (Association for Computing Machinery (ACM), 2017-11)
      The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ...
    • A framework for evaluating anti spammer systems for Twitter 

      Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
      Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A (2017-07)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • Designing a novel educational game for teaching C# programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon; Casey, John (Computer Supported Education (CSEDU Secretariat), 2017-04)
      Learning to code can be a daunting experience for a lot of students. RunJumpCode is a novel 2D platformer video game, designed and developed in Unity, to teach players the fundamental concepts of C# programming. The game ...
    • Engaging children in diabetes education through mobile games 

      Baghaei, Nilufar; Casey, John; Nandigam, D.; Sarrafzadeh, Hossein; Maddison, R. (International Association for the Development of the Information Society (IADIS), 2017-04)
      Traditional methods for diabetic education rely heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. Mobile games can be effective, evidence-based, and ...
    • Noise removal and binarization of scanned document images using clustering of features 

      Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
      Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
    • Adaptive document image skew estimation 

      Rezaei, S.B.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (International Association of Engineers (IAENG), 2017-03)
      The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ...
    • Human action recognition by conceptual features 

      Shamsipour, G.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (Newswood and International Association of Engineers, 2017-03)
      Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ...