• Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, Keysha; Zhang, C.; Gu, Z. (2017-07)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, Keysha; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A.A. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN 

      Kolahi, Samad; Almatrook, A.A. (2017-07)
      In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ...
    • Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7 

      Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)
      IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ...
    • The impact of wireless LAN security on performance for different windows operating systems 

      Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D.T.; Sunarto, Y.; Mani, Paul (Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)
      This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...
    • Implementation of evolutionary algorithms for deep architectures 

      Tirumala, Sreenivas Sremath (CEUR Workshop Proceedings, 2014-11)
      Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ...
    • Improved learning through peer tutoring in a declarative programming course 

      Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
      A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ...
    • Incorporating a code review process into the assessment 

      Li, Xiaosong (2007)
      This paper describes an action research process, which is used to implement the Code Review Process (CRP). The CRP was used as one of the assessment methods in a third year undergraduate Web Application Development course. ...
    • Increasing self-compassion in young people through virtual reality 

      Baghaei, Nilufar; Hach, Sylvia; Khaliq, I.; Stemmet, L.; Krishnan, J.; Naslund, J.; Liang, H.L.; Sharifzadeh, Hamid (2019-10)
      As part of our proposal, we aim to:  provide increased practice/exposure and target a younger audience  increase the chance of generalisation to everyday life  employ better VR visualisation, e.g. assigning more ...
    • The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment 

      Kolahi, Samad; Singla, Hitesh; Ehsan, Mohd Nash; Dong, Clarence (Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)
      The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ...
    • An intelligent agent based land encroachment detection approach 

      Dacey, Simon; Song, Lei; Pang, Shaoning (Asia Pacific Neural Network Assembly (APNNA), 2013)
      Land management and planning is essential to assist the economic growth, sustainable resource use and environmental protection of a city. This paper describes a novel approach to automatic encroachment detection to assist ...
    • Intelligent and Affective Tutoring Systems - emerging trends and future possibilities [Keynote speech] 

      Sarrafzadeh, Hossein (International eConference on Computer and Knowledge Engineering, 2013)
      Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if e-learning systems, Automatic Teller Machines, ticketing machines and robotic systems ...
    • An intelligent student advising system using collaborative filtering 

      Ganeshan, Kathiravelu; Li, Xiaosong (Frontiers in Education Conference (FIE), 2015-10)
      We propose a web based intelligent student advising system using collaborative filtering, a technique commonly used in recommendation systems assuming that users with similar characteristics and behaviors will have similar ...
    • Interfaces that adapt like humans 

      Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Springer, 2004)
      Whenever people talk to each other, non-verbal behaviour plays a very important role in regulating their interaction. However, almost all human-computer interactions take place using a keyboard or mouse – computers are ...
    • Investigating a conceptual construct for software context 

      Kirk, D.C.; MacDonell, S.G. (ACM DL (Digital Library), 2014-05-13)
      A growing number of empirical software engineering researchers suggest that a complementary focus on theory is required if the discipline is to mature. A first step in theory-building involves the establishment of suitable ...
    • An Investigation of Factors and Measurements for Successful e-Commerce Websites 

      Li, Xiaosong; Lian, Wei; Sarrafzadeh, Hossein (WEBIST (Setúbal - Portugal), 2014)
      Business-to-Consumer (B2C) e-commerce is popular because of its convenience, speed and price. Although there has been intense debate about quality dimensions of e-commerce websites, more research is needed to find a ...
    • Large-scale image retrieval using local binary patterns and iterative quantization 

      Shakerdonyavi, M.; Shanbehzadeh, J.; Sarrafzadeh, Hossein (2015-11)
      Hashing algorithm is an efficient approximate searching algorithm for large-scale image retrieval. Learning binary code is a key step to improve its performance and it is still an ongoing challenge. The inputs of Hashing ...
    • Maori-English machine translation 

      Mohaghegh, Mahsa; McCauley, Michael; Mohammadi, Mehdi (2014-04-24)
      In this paper we present our research over machine translation for Maori to English language pairs. The aim of this research is to create a lookup table for Maori-English words or phrases that are extracted from a set of ...
    • Maximum a posteriori adjustment of adaptive transversal filters in active noise control 

      Ardekani, Iman; Zhang, X.; Sharifzadeh, Hamid; Kaipio, J. (2017-12)
      This paper develops a novel approach to adaptive active noise control based on the theory of Bayesian estimation. Control system parameters are considered as statistical variables and a formulation for the joint probability ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142