Now showing items 124-143 of 154

    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (2014-10)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • A process mining technique using pattern recognition 

      Liesaputra, Veronica; Yongchareon, Dr. Sira; Chaisiri, Sivadon (Conference on Advanced Information Systems Engineering (CAiSE), 2015-06)
      Several works have proposed process mining techniques to discover process models from event logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in event ...
    • Progress report on a proposed theory for software development 

      Kirk, D.C.; MacDonell, S.G. (2015-07)
      There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
    • Psychoacoustically motivated active noise control at remote locations 

      Munir, M.W.; Abdulla, W. H.; Ardekani, Iman (2019)
      Active noise control (ANC) is an effective way to cancel the low-frequency noise. The conventional ANC system creates the ‘zone of quiet’ by minimizing the mean square error (MSE) at the location of an error microphone. ...
    • Radio Frequency fingerprinting and its challenges 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • Reducing ICT carbon footprints through adoption of green computing 

      Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)
      A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ...
    • Remote FxLMS algorithm for active control of sound in remote locations 

      Ardekani, Iman; Abdulla, W. H.; Rehman, Saeed (Asia-Pacific Signal and Information Processing Association (APSIPA), 2014)
      Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
    • A route map for wireless sensor networks over large coverage area 

      Jain, R.; Adhikary, P. S.; Ramirez-Prado, Guillermo; Barmada, Bashar; Ardekani, Iman (2018-10)
      This paper presents a mechanism to increase the coverage area of Wireless Sensor Networks (WSN) and increase the availability of wireless nodes. The proposed solution relies purely on open standards that implement 6LoWPAN ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Security in Virtual DMZ designs 

      Sathu, Hira; Komosny, Dan; Singh, S. (Global Business and Technology Association (New York), 2014-07)
      Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
    • Simulation model, warm-up period, and simulation length of cellular systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2011-01-25)
      In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. ...
    • Skew detection of scanned document images 

      Rezaei, , Sepideh Barekat; Sarrafzadeh, Hossein; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
      Skewing of the scanned image is an inevitable process and its detection is an important issue for document recognition systems. The skew of the scanned document image specifies the deviation of the text lines from the ...
    • Smart beekeeping using IoT & ML 

      Ardekani, Iman; Shakiba, Masoud (2022-12-02)
      OUTLINE 1 Introduction 2 Intelligent beehive monitoring 3 Proposed system 4 Data collection 5 Conclusion
    • Smart task orderings for active online multitask learning 

      Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (Society for Industrial and Applied Mathematics, Activity Group on Data Mining and Analytics, 2014-04-26)
      This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
    • Software upgrading and the related issues 

      Li, Xiaosong (2008)
      This paper takes Microsoft Internet Explorer (IE) and Microsoft Visual Studio .NET (VS.NET) as examples to study software upgrading and the related issues. The public browser statistics information from three different ...
    • Stability of residual acoustic noise variance in active control of stochastic noise 

      Ardekani, Iman; Abdulla, W. H. (Institute of Electrical and Electronics Engineers, 2013)
      This paper concerns about the theoretical stability of the adaptation process performed by the Filtered-x Least Mean Square (FxLMS) algorithm in active control of acoustic noise. A dynamic model for the Variance of Residual ...
    • A Survey on Approaches to Modeling Artifact-centric Business Processes 

      Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
      Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...