Now showing items 100-119 of 146

    • On Erlang capacity of CDMA systems 

      Kolahi, Samad (Kluwer Academic Publishers, 2003-12-01)
      In this paper, the Erlang capacity of mobile protocols such as FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) systems are compared assuming perfect ...
    • Other cells interference of power controlled CDMA systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2002-12-17)
      In this paper, using a simulation and modelling technique, the other cell interference factor is obtained and compared with previous upper bounds. The effect of propagation parameters on other cell interference is investigated. ...
    • An overview of different binary methods for documents based on their features 

      Fazeli, Fatemeh; Sarrafzadeh, Hossein; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
      This paper surveys binarization of document images. The main role of binarization is dimension and noise reduction. Binarization is one of the most important steps in preprocessing of document image understanding and ...
    • An Overview of the Challenges and Progress in PeEn-SMT: First Large Scale Persian-English SMT System 

      Mohaghegh, Mahsa; Sarrafzadeh, Hossein (2011)
      This paper documents recent work carried out for PeEn-SMT, our Statistical Machine Translation system for translation between the English-Persian language pair. We give details of our previous SMT system, and present our ...
    • A pattern recognition for group abnormal behaviors based on Markov Random Fields energy 

      Li, Zuojin; Chen, Liukui; Ren, Zhiyong; Tirumala, Sreenivas Sremath (Institute of Electrical and Electronics Engineers (IEEE), 2014-08)
      Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ...
    • Perception of synthetic speech with emotion modelling delivered through a robot platform: an initial investigation with older listeners 

      Igic, Aleksandar; Watson, Catherine I.; Stafford, R.Q.; Broadbent, E.; Jayawardena, Chandimal; MacDonald, B.A. (2010)
      In this paper we give results of an initial investigation into the perception of synthetic speech delivered through a robotic platform. The robotic speech was judged by 19 residents and 10 staff of a New Zealand retirement ...
    • Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols 

      Narayan, Shaneel; Ishrar, Salman; Kumar, Avinesh; Gupta, Ruchinav; Khan, Ziafil (2016-07)
      This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms ...
    • Performance comparison of category 5e vs. category 6 cabling systems for both IPv4 and IPv6 in gigabit ethernet 

      Soorty, Burjiz. K.; Kolahi, Samad; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2010-07-01)
      The performance of category 5e and 6 cabling is compared for both IPv4 and IPv6 using Gigabit Ethernet LAN. The maximum bandwidth achieved was 700Mbps and it was for IPv4 and category 5e cabling.
    • Performance comparison of IEEE802.11ac vs IEEE 802.11n WLAN in IPv6 

      Kolahi, Samad; Sooran, A. H.; Nasim, F.; Khan, M. M. U. (Springer, 2021-05)
      In this paper, performance of WLAN (Wireless LAN) for peer-peer and client-server networks with WPA-2 security is investigated for both IEEE802.11ac and IEEE802.11n standard. Parameters studied include throughput, and RTT ...
    • Performance comparison of IPv4 and IPv6 in peer-peer and client server local area networks 

      Kolahi, Samad; Soorty, Burjiz. K.; Chand, Navneet; Qu, Zhang (Institute of Electrical and Electronics Engineers (IEEE), 2010-06-29)
      In this paper, the performance of IPv4 and IPv6 are compared for both Client-Server and Peer-Peer networks. For both networks, IPv4 produced higher bandwidth for TCP protocol. For UDP, IPv4 and IPv6 showed insignificant ...
    • Performance evaluation of virtual private network protocols in Windows 2003 environment 

      Narayan, Shaneel; Kolahi, Samad; Brooking, Kris; de Vere, Simon (Institute of Electrical and Electronics Engineers (IEEE), 2008-12-20)
      Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses ...
    • Performance monitoring of various network traffic generators 

      Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D.T.; Sunarto, Y. (Institute of Electrical and Electronics Engineers (IEEE), 2011-03-31)
      In this paper, in a laboratory environment, the performance of four network traffic generators (Iperf, Netperf, D-ITG and IP Traffic) are compared. Two computers with Windows operating systems were connected via a 100 Mbps ...
    • The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANS with WPA2 security. 

      Kolahi, Samad; Qu, Zhang; Soorty, Burjiz. K.; Chand, Navneet (ACM Press, 2009-07-01)
      The IPv4 and IPv6 performance with UDP (User Datagram Protocol) on two client-server wireless 802.11n LANs implementing Windows Vista-Windows Server 2008 and Windows XP-Windows Server 2008 are compared. The impact of ...
    • Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title] 

      Nandigam, David; Tirumala, Sreenivas Sremath; Baghaei, Nilufar (2014-12)
      The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ...
    • Phonated speech reconstruction using twin mapping models 

      Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, I.V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
      Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
    • Physical classification and recent developments of active noise control systems 

      Munir, M.W.; Abdulla, W. H.; Ardekani, Iman; Patel, N. (Association for Computing Machinery (ACM), 2017-11)
      The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ...
    • A physical-aware task migration algorithm for dynamic thermal management of SMT multi-core processors 

      Madipour, Farhad (South Asia Pacific - Design Automation Conference, 2014-01)
      This paper presents a task migration algorithm for dynamic thermal management of SMT multi-core processors. The unique features of this algorithm include: 1) considering SMT capability of the processors for task ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Burki, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (2014-10)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • A process mining technique using pattern recognition 

      Liesaputra, Veronica; Yongchareon, Dr. Sira; Chaisiri, Sivadon (Conference on Advanced Information Systems Engineering (CAiSE), 2015-06)
      Several works have proposed process mining techniques to discover process models from event logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in event ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142