Browsing by Study Area "Computing"
Now showing items 1-20 of 306
-
3D FPGA versus multiple FPGA system : enhanced parallelism in smaller area
(2014-01)Handling large amounts of data is being limited by bandwidth constraint between processors components and their memory counterparts. Three-dimensional integration (3D) is providing possible solution to handle such critical ... -
Acoustic analysis and computerized reconstruction of speech in laryngectomised individuals
(2016-05)In laryngectomised individuals, rehabilitation options include esophageal speech, tracheoesophageal puncture (TEP), and electrolarynx devices enabling patients to communicate. These do not generate natural sounding speech; ... -
Acoustic features of dysphonic speech vs normal speech in New Zealand English speakers
(Computing and Information Technology Research and Education New Zealand (CITRENZ), 2021-07)This poster presents the acoustic features of distorted speech in three dysphonic New Zealanders compared to three healthy individuals as the control group. There are a total of six subjects in this study. Voice onset time ... -
Acoustic signal processing systems for intelligent beehive monitoring
(Acoustical Society of New Zealand, 2022)Bees, as pollinators and producers of honey and medicinal products, play a crucial role in human life and environmental sustainability. Emerging Smart Beekeeping technologies utilise various methodologies in apiology, ... -
Activity recognition and resident identification in smart home environment
(2020)World’s population is ageing rapidly. There have been various efforts to improve the quality of life for elderly. Ambient assisted living is one possible solution which enables elderly or disabled people to live a better ... -
Adaptive active control of free space acoustic noise
(Published by the Acoustical Society of America through the American Institute of Physics, 2013)This paper concerns adaptive active control of acoustic noise in free space. Conventional adaptive active noise control algorithms are efficient in acoustic ducts or headphones; however, they are very sensitive when being ... -
Adaptive background modeling for land and water composition scenes
(International Conference on Image Analysis and Processing (ICIAP), 2015-09)In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ... -
Adaptive document image skew estimation
(International Association of Engineers (IAENG), 2017-03)The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ... -
Advancements in English-Persian hierarchical statistical machine translation
(2012)In this paper we show that a hierarchical phrase-based translation system will outperform a classical (non-hierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ... -
Aiding forensic investigations using machine learning
(2022-11-28)Advances in machine learning find rapid adoption in many fields ranging from communications, signal processing, and the automotive industry to healthcare, law, and forensics. In this talk, I briefly focus on a couple of ... -
An Alternative Approach for Developing Socially Assistive Robots
(IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ... -
Analysing and identifying website personality by extending existing libraries
(2016)Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ... -
Analysis and configuration of boundary difference calculations
(ICONIP, 2014-11)In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ... -
Analysis and evaluation of quantum key distribution protocols
(2020)Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ... -
Analysis and prevention of account hijacking based incidents in cloud environment
(2015-12)Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ... -
Analysis of e-commerce sites using the 7C Framework, by developing a software tool
(2016)Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ... -
Analysis of Impersonation Attack on RF Fingerprinting
(2013)Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ... -
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
(Academic Press, 2014-05)Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ... -
Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack
(2018)Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ...