• Aiding forensic investigations using machine learning 

      Sharifzadeh, Hamid; Varastehpour, Soheil; Francis, X.; Keivanmarz, A.; Fleming, R.; Ardekani, Iman; Newton, A. (2022-11-28)
      Advances in machine learning find rapid adoption in many fields ranging from communications, signal processing, and the automotive industry to healthcare, law, and forensics. In this talk, I briefly focus on a couple of ...
    • An Alternative Approach for Developing Socially Assistive Robots 

      Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
      This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
    • Analysis and configuration of boundary difference calculations 

      Dacey, Simon; Pang, Shaoning; Song, Lei; Zhu, Lei (ICONIP, 2014-11)
      In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ...
    • Analysis and prevention of account hijacking based incidents in cloud environment 

      Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
      Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
    • Analysis of Impersonation Attack on RF Fingerprinting 

      Rehman, Saeed (2013)
      Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
    • Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques 

      Sarrafpour, Bahman; Abbaro, C.; Pitton, I.; Young, C.; Madipour, Farhad (2016-12-14)
      Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ...
    • Analysis of results in simulation and modeling of CDMA systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2007-07-01)
      In this paper, using discrete event stochastic simulation by batch-means, new results have been obtained by analysing the sensitivity of CDMA blocking probability for a given traffic load against various number of calls ...
    • An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing 

      Airehrour, David; Gutierrez, J. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)
      The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ...
    • Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13 

      Treseangrat, Kiattikul; Kolahi, Samad; Sarrafpour, Bahman (2015-07-15)
      Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip ...
    • Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

      Kolahi, Samad; Treseangrat, Kiattikul; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02-19)
      Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
    • An artifact-centric business process execution platform 

      Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
      Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
    • Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning 

      Tong, H.; Sharifzadeh, Hamid; McLoughlin, I. (ISCA (International Speech Communication Association), 2020-10)
      Dysarthria is a speech disorder that can significantly impact a person’s daily life, and yet may be amenable to therapy. To automatically detect and classify dysarthria, researchers have proposed various computational ...
    • Automatic generation of user interface layouts for alternative screen orientations 

      Zeidler, Clemens; Weber, G.; Stuerzlinger, W.; Lutteroth, C. (Springer International Publishing, 2017)
      Creating multiple layout alternatives for graphical user interfaces to accommodate different screen orientations for mobile devices is labor intensive. Here, we investigate how such layout alternatives can be generated ...
    • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

      Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
      Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...
    • Bayesian active noise control 

      Ardekani, Iman; Varastehpour, Soheil; Sharifzadeh, Hamid (Acoustical Society of New Zealand, 2022-10)
      Active Noise Control (ANC) is a challenging practical application of adaptive control systems. This paper approaches ANC from the perspective of the Bayesian Inverse Problems theory. The ANC underlying problem is initially ...
    • Bayesian parameter estimation of Euler-Bernoulli beams 

      Ardekani, Iman; Kaipio, J.; Sharifzadeh, Hamid (2018-11)
      This paper develops a statistical signal processing algorithm for parameter estimation of Euler-Bernoulli beams from limited and noisy measurement. The original problem is split into two reduced-order sub-problems coupled ...
    • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

      Sharifzadeh, Hamid; Allen, Jacqui E.; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
      The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
    • Brightness preserving fuzzy dynamic histogram equalization 

      Sarrafzadeh, Hossein; Rezazadeh, Fatemeh; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
      Abstract—Image enhancement is a fundamental step of image processing and machine vision to improve the quality of an image for a specific application. Histogram equalization is an attractive and commonly-employed image ...
    • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

      Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
      Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
    • A collaborative constraint-based intelligent system for learning object-oriented analysis and design using UML 

      Baghaei, Nilufar (2006)
      Automatic analysis of interaction and support for group learning through a distance collaborative learning system is at the forefront of educational technology. Research shows that collaborative leaming provides an environment ...