• Effect of channel impairments on radiometric fingerprinting 

      Rehman, Saeed; Sowerby, K.W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
      To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
    • Effect of channel impairments on the performance of RF Fingerprinting using low-end receivers 

      Sowerby, K.W.; Rehman, Saeed; Coghill, Colin (2013)
      Radio Frequency (RF) Fingerprinting Problem definition Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ...
    • Effect of quantization on competitive co-evolution algorithm - QCCEA versus CCEA 

      Tirumala, Sreenivas Sremath; Nandigam, David; Ali, Shahid; Li, Zuojin (International Institute of Engineers and Researchers (IIER), 2015-02-15)
      Quantum inspired Evolutionary Algorithm (QEA) which uses qubits has been the basis for the development of many Quantum Inspired algorithms. Di- verging from this, a new Quantum Inspired Competitive Co-evolution algorithm ...
    • Effect of WPA2 Security on IEEE 802.11n bandwidth and round trip time in peer-peer wireless local area networks 

      Li, Peng; Kolahi, Samad; Safdari, Mustafa; Argawe, Mulugeta (IEEE, 2011-03-22)
      In this paper 802.11 wireless peer-peer network is evaluated for both IPv4 and IPv6 in Windows 7 and Fedora 12 operating systems. IPv4 has higher throughput than IPv6 for all packet sizes for both Windows 7 and Fedora 12 ...
    • Efficient FXLMS algorithm with simplified secondary path models. 

      Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, W. H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
      his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
    • An efficient programming framework for socially assistive robots based on separation of robot behavior description from execution 

      Jayawardena, Chandimal; Kuo, I-Han; MacDonald, B.A. (IEEE Computer Society, 2013)
      One of the main challenges in socially assistive robotics is providing flexible and easy-to-use programming tools for users. Unlike other robots, designing socially assistive robots includes the subject-matter-experts ...
    • Engaging children in diabetes education through mobile games 

      Baghaei, Nilufar; Casey, John; Nandigam, David; Sarrafzadeh, Hossein; Maddison, R. (International Association for the Development of the Information Society (IADIS), 2017-04)
      Traditional methods for diabetic education rely heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. Mobile games can be effective, evidence-based, and ...
    • Enhancing customers’ knowledge and decision making using augmented reality 

      Boonrat, W.; Vaidya, V.; Baghaei, N.; Sharifzadeh, Hamid; Ahmed, A.; Casey, John (Asia-Pacific Society for Computers in Education (APSCE), 2020-11)
      Augmented reality has seen massive success in recent years as it provides an opportunity for a seamless and rich user interaction with the real world. Recent studies have shown augmented and virtual reality can play a ...
    • Enhancing engagement and collaborative learning skills in multi-touch software for UML diagramming 

      Basheri, Mohammed; Burd, Liz; Munro, Malcolm; Baghaei, Nilufar (The International Society of the Learning Sciences, 2013)
      The use of Multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This paper ...
    • Ensemble learning methods for decision making : status and future prospects 

      Ali, Shahid; Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2015-07)
      In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each model has certain limitations, the aim of ensemble learning is to supervise their strengths and ...
    • Ensemble Statistical and Heuristic Models for Unsupervised Word Alignment 

      Mohaghegh, Mahsa; Sarrafzadeh, Hossein; Mohammadi, Mehdi (IEEE (Institute of Electrical and Electronics Engineers), 2014)
      Statistical word alignment models need large amounts of training data while they are weak in small-sized corpora. This paper proposes a new approach of an unsupervised hybrid word alignment technique using an ensemble ...
    • Estimating the risk of fraud against e-services 

      Yesuf, AS.; Probst, Christian (Springer International Publishing, 2018-11)
      Industry is continuously developing, deploying, and maintaining e-services to transform traditional offerings. While protection of traditional services is well understood, their digital transformation often is vulnerable ...
    • ETL tools for data warehousing : an empirical study of open source Talend Studio versus Microsoft SSIS 

      Katragadda, Ranjith; Tirumala, Sreenivas Sremath; Nandigam, David (Institute of Electrical and Electronics Engineers (IEEE), 2015-01)
      Relational databases are bound to follow various database integrity rules and constraints that makes the reporting a time consuming process. Data Warehousing has evolved out of the desperate need for easy access to structured ...
    • Evaluating VANET Routing Protocols for Auckland Area 

      Barmada, Bashar; Alobaidi, Naji; Ardekani, Iman; Erfanian.Sabaee, M.; Ramirez-Prado, Guillermo (2018-10)
      This paper provides a performance evaluation for several popular Vehicular Ad-Hoc Network (VANET) protocols, namely AODV, DSR, OLSR, DSDV, GPSR, CBRP, and ZRP with Nakagami fading propagation model for Auckland area. The ...
    • Evaluation of IPv6 with IPSec in IEEE 802.11n Wireless LAN using Fedora 15 Operating System 

      Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-07-07)
      IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed ...
    • Evaluation of statistical text normalisation techniques for Twitter 

      Sosamphan, P.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (IC3K, 2016-11)
      One of the major challenges in the era of big data use is how to ‘clean’ the vast amount of data, particularly from micro-blog websites like Twitter. Twitter messages, called tweets, are commonly written in ill-forms, ...
    • Eve : an affect-sensitive pedagogical agent 

      Fourie, Leon; Overmyer, Scott; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Alexander, Samuel T.V. (Global Business and Technology Association, 2014-07)
      Easy with Eve is an affect-sensitive tutoring system that features Eve, an animated pedagogical agent that adapts to student emotion based on the results of an observational study of human tutors. This paper presents the ...
    • A framework for evaluating anti spammer systems for Twitter 

      Ho, K.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (Springer Verlag, 2017-10-20)
      Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ...
    • Free and open source intrusion detection systems : a study 

      Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
      Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
    • From modelling domain knowledge to metacognitive skills : extending a constraint-based tutoring System to support collaboration 

      Baghaei, Nilufar; Mitrovic, Branko (2007)
      Constraint-based tutors have been shown to increase individual learning in real classroom studies, but would become even more effective if they provided support for collaboration. COLLECT-UML is a constraint-based intelligent ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142