Browsing Computing Conference Papers by Title
Now showing items 61-80 of 154
-
A framework for evaluating anti spammer systems for Twitter
(Springer Verlag, 2017-10-20)Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always ... -
Free and open source intrusion detection systems : a study
(IEEE, 2015-07)Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ... -
From modelling domain knowledge to metacognitive skills : extending a constraint-based tutoring System to support collaboration
(2007)Constraint-based tutors have been shown to increase individual learning in real classroom studies, but would become even more effective if they provided support for collaboration. COLLECT-UML is a constraint-based intelligent ... -
From source coding to MIMO : a Multi-Level Unequal Error Protection
(Institute of Electrical and Electronics Engineers (IEEE), 2016-11)In this paper, unequal error protection (UEP) on different levels of the transmission system is proposed. Starting from the source coding level, two priority layers are produced, high priority (HP) and low priority (LP). ... -
Fuzzy C-means based on automated variable feature weighting
(Newswood Ltd., 2013)Fuzzy C-means (FCM) is a powerful clustering algorithm and has been introduced to overcome the crisp definition of similarity and clusters. FCM ignores the importance of features in the clustering process. This affects its ... -
The global cyber security workforce : an ongoing human capital crisis
(Global Business and Technology Association, 2014-07)Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ... -
Global solar radiation prediction using artificial neural network models for New Zealand
(Solar 2014 Conference & Expo, 2014-05)In this study, nonlinear autoregressive recurrent neural networks with exogenous input (NARX) were used to predict global solar radiation across New Zealand. Data for nine hourly weather variables recorded across New Zealand ... -
Greening and optimizing energy consumption of sensor nodes in the Internet of Things through energy harvesting : challenges and approaches
(2016-05)This paper presents a survey of current energy efficient technologies that could drive the IoT revolution while examining critical areas for energy improvements in IoT sensor nodes. The paper reviews improvements in emerging ... -
Habitabilidad, Conectividad y Salud Menta [= Habitability, Connectivity and Mental Health]
(2021-11-05)No es un fenómeno nuevo la modificación de los espacios habitables para dar lugar a elementos tecnológicos. Efectos como la contaminación visual y la invasión de los espacios cotidianos son tan comunes que hasta pasan ... -
A Hierarchical Phrase-Based Model for English-Persian Statistical Machine Translation
(2012)In this paper we show that a hierarchical phrasebased translation system will outperform a classical (nonhierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ... -
A Highly Parallel SAD Architecture for Motion Estimation in HEVC Encoder
(2014-11)The high computational cost of the motion estimation module in the new HEVC standard raises the need for efficient hardware architectures that can meet the real-time processing constraint. In addition, targeting HD and UHD ... -
Hourly power consumption prediction for New Zealand residential houses using artificial neural network models
(Australia PV Institute, 2014-12)In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ... -
Human action recognition by conceptual features
(Newswood and International Association of Engineers, 2017-03)Human action recognition is the process of labeling a video according to human behavior. This process requires a large set of labeled video and analyzing all the frames of a video. The consequence is high computation and ... -
A Hybrid Genetic Algorithm Approach to Multi-objective ERP Training Scheduling Problems
(2007)It mainly addresses a hybrid multiobjective training scheduling genetic algorithm in this research. We can get the schedule that almost matches the real decisive results to help enterprises proceed with training scheduling ... -
Impact of IPSec security on VoIP in different environments
(2017-07)In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ... -
Impact of IPSec security on VoIP in different environments
(Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ... -
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN
(Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ... -
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN
(2017-07)In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ... -
Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7
(Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ... -
The impact of wireless LAN security on performance for different windows operating systems
(Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...