Now showing items 120-139 of 144

    • Radio Frequency fingerprinting and its challenges 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • Reducing ICT carbon footprints through adoption of green computing 

      Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)
      A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ...
    • Remote FxLMS algorithm for active control of sound in remote locations 

      Ardekani, Iman; Abdulla, W. H.; Rehman, Saeed (Asia-Pacific Signal and Information Processing Association (APSIPA), 2014)
      Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
    • A route map for wireless sensor networks over large coverage area 

      Jain, R.; Adhikary, P. S.; Ramirez-Prado, Guillermo; Barmada, Bashar; Ardekani, Iman (2018-10)
      This paper presents a mechanism to increase the coverage area of Wireless Sensor Networks (WSN) and increase the availability of wireless nodes. The proposed solution relies purely on open standards that implement 6LoWPAN ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Security in Virtual DMZ designs 

      Sathu, Hira; Komosny, Dan; Singh, S. (Global Business and Technology Association (New York), 2014-07)
      Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
    • Simulation model, warm-up period, and simulation length of cellular systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2011-01-25)
      In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. ...
    • Skew detection of scanned document images 

      Rezaei, , Sepideh Barekat; Sarrafzadeh, Hossein; Shanbehzadeh, Jamshid (Newswood Ltd., 2013)
      Skewing of the scanned image is an inevitable process and its detection is an important issue for document recognition systems. The skew of the scanned document image specifies the deviation of the text lines from the ...
    • Smart task orderings for active online multitask learning 

      Pang, Paul; An, Jianbei; Zhao, Jing; Li, Xiaosong; Ban, Tao; Inoue, Daisuke; Sarrafzadeh, Hossein (Society for Industrial and Applied Mathematics, Activity Group on Data Mining and Analytics, 2014-04-26)
      This paper promotes active oMTL (i.e., Online Multitask Learning with task selection) by proposing two smart task ordering approaches: QR-decomposition Ordering and Minimal-loss Ordering, in which the optimal sequence of ...
    • Software upgrading and the related issues 

      Li, Xiaosong (2008)
      This paper takes Microsoft Internet Explorer (IE) and Microsoft Visual Studio .NET (VS.NET) as examples to study software upgrading and the related issues. The public browser statistics information from three different ...
    • Stability of residual acoustic noise variance in active control of stochastic noise 

      Ardekani, Iman; Abdulla, W. H. (Institute of Electrical and Electronics Engineers, 2013)
      This paper concerns about the theoretical stability of the adaptation process performed by the Filtered-x Least Mean Square (FxLMS) algorithm in active control of acoustic noise. A dynamic model for the Variance of Residual ...
    • A Statistical Approach to English-Persian Machine Translation 

      Mohaghegh, Mahsa (2010)
      Statistical Machine Translation has successfully been used for translation between many language pairs contributing to its popularity in recent years. It has however not been used for the English/Persian language pair. ...
    • A Survey on Approaches to Modeling Artifact-centric Business Processes 

      Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
      Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
    • Taxonomy of malware detection techniques 

      Mohaddes Deylami, Hanif; Muniyandi, R.C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
    • Teaching a Tele-robot using Natural Language Commands 

      Jayawardena, Chandimal; Watanabe, Keigo; Izumi, Kiyotaka (2005)
      For Internet-based tele operation systems, user-friendly natural interfaces are advantageous because those systems are intended to be used by non-experts. In developing user friendly interfaces, natural language communication ...
    • A Text Localization Algorithm in Color Image via New Projection Profile 

      Sarrafzadeh, Hossein; Aghajari, G; Shanbehzadeh, Jamshid (2010)
      Text data in image present useful information for automatic annotation, indexing and structuring of images. In this paper, we propose an approach to automatically localize horizontally texts appearing in color and complex ...
    • Tracking a person’s behaviour in a smart house 

      Chand, G.; Ali M.; Barmada, Bashar; Liesaputra, Veronica; Prado, G. (Springer Verlag, 2018-11)
      This paper proposes to use machine learning techniques with ultrasonic sensors to predict the behavior and status of a person when they live solely inside their house. The proposed system is tested on a single room. A grid ...
    • UDP performance analysis of IPv4 and IPv6 on Windows Vista and Windows XP over fast ethernet peer-peer LAN 

      Manford, Chris; Kolahi, Samad; Soorty, Burjiz. K.; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2009-12-20)
      In this paper, the performance of IPv4 and IPv6 are compared using Windows Vista and the UDP (User Datagram Protocol) throughput results are compared with Windows XP in a peer-peer environment. The results indicated that ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142