Now showing items 135-144 of 144

    • Taxonomy of malware detection techniques 

      Mohaddes Deylami, Hanif; Muniyandi, R.C.; Ardekani, Iman; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2016-12)
      Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends ...
    • Teaching a Tele-robot using Natural Language Commands 

      Jayawardena, Chandimal; Watanabe, Keigo; Izumi, Kiyotaka (2005)
      For Internet-based tele operation systems, user-friendly natural interfaces are advantageous because those systems are intended to be used by non-experts. In developing user friendly interfaces, natural language communication ...
    • A Text Localization Algorithm in Color Image via New Projection Profile 

      Sarrafzadeh, Hossein; Aghajari, G; Shanbehzadeh, Jamshid (2010)
      Text data in image present useful information for automatic annotation, indexing and structuring of images. In this paper, we propose an approach to automatically localize horizontally texts appearing in color and complex ...
    • Tracking a person’s behaviour in a smart house 

      Chand, G.; Ali M.; Barmada, Bashar; Liesaputra, Veronica; Prado, G. (Springer Verlag, 2018-11)
      This paper proposes to use machine learning techniques with ultrasonic sensors to predict the behavior and status of a person when they live solely inside their house. The proposed system is tested on a single room. A grid ...
    • UDP performance analysis of IPv4 and IPv6 on Windows Vista and Windows XP over fast ethernet peer-peer LAN 

      Manford, Chris; Kolahi, Samad; Soorty, Burjiz. K.; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2009-12-20)
      In this paper, the performance of IPv4 and IPv6 are compared using Windows Vista and the UDP (User Datagram Protocol) throughput results are compared with Windows XP in a peer-peer environment. The results indicated that ...
    • Uncovering Biokinetic Interfacing 

      Jarrett, Ben (xCoAx, 2014)
      The following paper details a research tangent explored within the scope of a larger project exploring a new method of interfacing the author has termed biokinetic: A biokinetic interface is a new form of dynamic and ever ...
    • Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation 

      Sharifzadeh, Hamid Reza; Zhang, Hengyi; Kong, Adams Wai-Kin (International Conference on Pattern Recognition (ICPR), 2014)
      Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ...
    • A workflow approach for a token web application specification 

      Li, Xiaosong (2008)
      In our third year Web Application Development course, there is a traditional assignment, which requires the students design and develop a token web application in ASP.NET. We have been specifying such a token web application ...
    • A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes 

      Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian; Yongchareon, Sira (Springer Verlag, 2014)
      To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...
    • WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems 

      Kolahi, Samad; Li, Peng; Safdari, Mustafa; Argawe, Mulugeta (Institute of Electrical and Electronics Engineers (IEEE), 2012-07-01)
      In this paper, we present new results on the performance of IEEE 802.11n using open system (no security) and WPA2 security for Windows XP and Windows 7. Enabling WPA2 security results in approximately 4.4 Mbps less TCP ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142