• Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

      Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
      This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...
    • Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

      Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
      This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
    • Physical classification and recent developments of active noise control systems 

      Munir, M.; Abdulla, W.; Ardekani, Iman; Patel, N. (Association for Computing Machinery (ACM), 2017-11)
      The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ...
    • A framework for evaluating anti spammer systems for Twitter 

      Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
      Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A. A (2017-07)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, K.; Zhang, C.; Gu, Z. (2017-07)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • Designing a novel educational game for teaching C# programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon; Casey, John (Computer Supported Education (CSEDU Secretariat), 2017-04)
      Learning to code can be a daunting experience for a lot of students. RunJumpCode is a novel 2D platformer video game, designed and developed in Unity, to teach players the fundamental concepts of C# programming. The game ...
    • Engaging children in diabetes education through mobile games 

      Baghaei, Nilufar; Casey, John; Nandigam, D.; Sarrafzadeh, Hossein; Maddison, R. (International Association for the Development of the Information Society (IADIS), 2017-04)
      Traditional methods for diabetic education rely heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. Mobile games can be effective, evidence-based, and ...
    • Noise removal and binarization of scanned document images using clustering of features 

      Farahmand, A.; Sarrafzadeh, Hossein; Shanbehzadeh, J. (Newswood and International Association of Engineers, 2017-03)
      Old documents are in printed form. Their archiving and retrieval is expensive according in terms of space requirement and physical search. One solution is to convert these documents into electronic form using scanners. The ...
    • Adaptive document image skew estimation 

      Rezaei, S.B.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (International Association of Engineers (IAENG), 2017-03)
      The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ...
    • Human action recognition by conceptual features 

      Shamsipour, G.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (Newswood and International Association of Engineers, 2017-03)
      Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ...
    • Automatic generation of user interface layouts for alternative screen orientations 

      Zeidler, Clemens; Weber, G.; Stuerzlinger, W.; Lutteroth, C. (Springer International Publishing, 2017)
      Creating multiple layout alternatives for graphical user interfaces to accommodate different screen orientations for mobile devices is labor intensive. Here, we investigate how such layout alternatives can be generated ...
    • Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques 

      Sarrafpour, Bahman; Abbaro, C.; Pitton, I.; Young, C.; Madipour, Farhad (2016-12-14)
      Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ...
    • Taxonomy of malware detection techniques 

      Mohaddes Deylami, H.; Muniyandi, R. C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
    • Distributed Incremental wLPSVM Learning 

      Zhu, L.; Ban, T.; Ikeda, K.; Pang, P.; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Weighted linear proximal support vector machine (wLPSVM) is known as an efficient binary classification algorithm with good accuracy and class-imbalance robustness. In this work, original batch wLPSVM is facilitated with ...
    • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

      Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
      The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...