• 3D FPGA versus multiple FPGA system : enhanced parallelism in smaller area 

      Nunna, K.C.; Madipour, Farhad; Murakami, K.J. (2014-01)
      Handling large amounts of data is being limited by bandwidth constraint between processors components and their memory counterparts. Three-dimensional integration (3D) is providing possible solution to handle such critical ...
    • Acoustic analysis and computerized reconstruction of speech in laryngectomised individuals 

      Sharifzadeh, Hamid; Allen, Jacqui E.; McLoughlin, I.V.; Sarrafzadeh, Hossein; Ardekani, Iman (2016-05)
      In laryngectomised individuals, rehabilitation options include esophageal speech, tracheoesophageal puncture (TEP), and electrolarynx devices enabling patients to communicate. These do not generate natural sounding speech; ...
    • Activity recognition and resident identification in smart home environment 

      Kashyap, Venkatesh Subramanya (2020)
      World’s population is ageing rapidly. There have been various efforts to improve the quality of life for elderly. Ambient assisted living is one possible solution which enables elderly or disabled people to live a better ...
    • Adaptive active control of free space acoustic noise 

      Ardekani, Iman; Abdulla, W. H. (Published by the Acoustical Society of America through the American Institute of Physics, 2013)
      This paper concerns adaptive active control of acoustic noise in free space. Conventional adaptive active noise control algorithms are efficient in acoustic ducts or headphones; however, they are very sensitive when being ...
    • Adaptive background modeling for land and water composition scenes 

      Zhao, Jing (Jane); Pang, Shaoning; Hartill, B.; Sarrafzadeh, Hossein (International Conference on Image Analysis and Processing (ICIAP), 2015-09)
      In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ...
    • Adaptive document image skew estimation 

      Rezaei, S.B.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (International Association of Engineers (IAENG), 2017-03)
      The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ...
    • Advancements in English-Persian Hierarchical Statistical Machine Translation 

      Mohaghegh, Mahsa (2012)
      In this paper we show that a hierarchical phrase-based translation system will outperform a classical (non-hierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ...
    • An Alternative Approach for Developing Socially Assistive Robots 

      Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
      This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
    • Analysing and identifying website personality by extending existing libraries 

      Chishti, Shafquat Ali (2016)
      Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ...
    • Analysis and configuration of boundary difference calculations 

      Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
      In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
    • Analysis and evaluation of quantum key distribution protocols 

      Rouhani, Reza (2020)
      Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ...
    • Analysis and prevention of account hijacking based incidents in cloud environment 

      Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
      Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
    • Analysis of e-commerce sites using the 7C Framework, by developing a software tool 

      Yang, Chih-Hsiang (2016)
      Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ...
    • Analysis of Impersonation Attack on RF Fingerprinting 

      Rehman, Saeed (2013)
      Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
    • Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

      Rehman, Saeed; Sowerby, K.W.; Coghill, Colin (Academic Press, 2014-05)
      Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
    • Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack 

      Al-Jarrah, Zaid (2018)
      Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ...
    • Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques 

      Sarrafpour, Bahman; Abbaro, C.; Pitton, I.; Young, C.; Madipour, Farhad (2016-12-14)
      Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ...
    • Analysis of results in simulation and modeling of CDMA systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2007-07-01)
      In this paper, using discrete event stochastic simulation by batch-means, new results have been obtained by analysing the sensitivity of CDMA blocking probability for a given traffic load against various number of calls ...
    • An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing 

      Airehrour, David; Gutierrez, J. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)
      The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ...
    • Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications 

      Wang, Lu (2020)
      RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142