Browsing by Study Area "Computing"
Now showing items 21-40 of 296
-
An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing
(International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ... -
Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications
(2020)RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ... -
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
(2015-07-15)Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip ... -
Analysis of UDP DDoS floor cyber attack and defense mechanisms on web server with Linux Ubuntu 13
(Institute of Electrical and Electronics Engineers (IEEE), 2015-02-19)Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ... -
An application of soft systems methodology on a holistic level: Recommendations for developing and implementing green ICT strategies in New Zealand
(2011)This thesis has been conducted in order to identify and explore the issues involved in the development and implementation of Green ICT strategies in ICT recycling in New Zealand. There were interactions with five stakeholders ... -
An approach to interesting objects detection in low quality image sequences for fisheries management
(World Scientific and Engineering Academy and Society (WSEAS), 2015)In order to extract interest objects in low quality image sequences from fisheries management, this paper proposes a new significant feature extraction method based on cascade framework. This algorithm involves pre processing ... -
An artifact-centric business process execution platform
(Institute of Electrical and Electronics Engineers (IEEE), 2016-09)Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ... -
Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning
(ISCA (International Speech Communication Association), 2020-10)Dysarthria is a speech disorder that can significantly impact a person’s daily life, and yet may be amenable to therapy. To automatically detect and classify dysarthria, researchers have proposed various computational ... -
Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning
(2020)Dysarthria is a speech disorder disease that can have a significant impact on a person's daily life. Early detection of the disease can put the patient into therapy sessions more quickly. Researchers have established various ... -
Automatic generation of user interface layouts for alternative screen orientations
(Springer International Publishing, 2017)Creating multiple layout alternatives for graphical user interfaces to accommodate different screen orientations for mobile devices is labor intensive. Here, we investigate how such layout alternatives can be generated ... -
Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment
(Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ... -
Bayesian parameter estimation of Euler-Bernoulli beams
(2018-11)This paper develops a statistical signal processing algorithm for parameter estimation of Euler-Bernoulli beams from limited and noisy measurement. The original problem is split into two reduced-order sub-problems coupled ... -
Benefits of using data warehousing and data mining tools
(2013)RESEARCH QUESTION: What benefits are organisations deriving from using data warehousing and data mining tools? This research was an attempt to find out the benefits that a sample of organisations are deriving by using ... -
Biologically Inspired Techniques for Data Mining: A Brief Overview of Particle Swarm Optimization for KDD. Alam
(Information Science Reference, 2014-02-02)Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ... -
Bionic voice (pilot study) : natural speech restoration for voice impaired individuals
(Health Informatics New Zealand, 2016-11)The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ... -
Brightness preserving fuzzy dynamic histogram equalization
(Newswood Ltd., 2013)Abstract—Image enhancement is a fundamental step of image processing and machine vision to improve the quality of an image for a specific application. Histogram equalization is an attractive and commonly-employed image ... -
Can Vivaldi help in IP geolocation?
(Przegl ˛ad Elektrotechniczny, 2013)The paper deals with IP geolocation based on communication latency measurement. The aim of IP geolocation is to estimate the geographical location of an IP-enabled node. Latency-based IP geolocation methods measure latency ... -
Capture the talent : secondary school education with cyber security competition
(Academy & Industry Research Collaboration Center (AIRCC), 2015-11)Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ... -
Challenges faced by staff and students at tertiary level in flexible learning environment: An institutional study
(2007)This research is concerned with identifying the challenges / problems of flexible learning environments in the tertiary education sector. Flexible learning environments usually allow students to choose from a mix of learning ...