Browsing Computing Conference Papers by Title
Now showing items 1-20 of 153
-
3D FPGA versus multiple FPGA system : enhanced parallelism in smaller area
(2014-01)Handling large amounts of data is being limited by bandwidth constraint between processors components and their memory counterparts. Three-dimensional integration (3D) is providing possible solution to handle such critical ... -
Acoustic analysis and computerized reconstruction of speech in laryngectomised individuals
(2016-05)In laryngectomised individuals, rehabilitation options include esophageal speech, tracheoesophageal puncture (TEP), and electrolarynx devices enabling patients to communicate. These do not generate natural sounding speech; ... -
Acoustic features of dysphonic speech vs normal speech in New Zealand English speakers
(Computing and Information Technology Research and Education New Zealand (CITRENZ), 2021-07)This poster presents the acoustic features of distorted speech in three dysphonic New Zealanders compared to three healthy individuals as the control group. There are a total of six subjects in this study. Voice onset time ... -
Acoustic signal processing systems for intelligent beehive monitoring
(Acoustical Society of New Zealand, 2022)Bees, as pollinators and producers of honey and medicinal products, play a crucial role in human life and environmental sustainability. Emerging Smart Beekeeping technologies utilise various methodologies in apiology, ... -
Adaptive active control of free space acoustic noise
(Published by the Acoustical Society of America through the American Institute of Physics, 2013)This paper concerns adaptive active control of acoustic noise in free space. Conventional adaptive active noise control algorithms are efficient in acoustic ducts or headphones; however, they are very sensitive when being ... -
Adaptive background modeling for land and water composition scenes
(International Conference on Image Analysis and Processing (ICIAP), 2015-09)In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ... -
Adaptive document image skew estimation
(International Association of Engineers (IAENG), 2017-03)The skew of the scanned document image is inevitable, and its correction improves the performance of document recognition systems. Skew specifies the text lines deviation from the horizontal or vertical axes. To date, skew ... -
Advancements in English-Persian hierarchical statistical machine translation
(2012)In this paper we show that a hierarchical phrase-based translation system will outperform a classical (non-hierarchical) phrase-based system in the English-to-Persian translation direction, yet for the Persian-to-English ... -
Aiding forensic investigations using machine learning
(2022-11-28)Advances in machine learning find rapid adoption in many fields ranging from communications, signal processing, and the automotive industry to healthcare, law, and forensics. In this talk, I briefly focus on a couple of ... -
An Alternative Approach for Developing Socially Assistive Robots
(IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ... -
Analysis and configuration of boundary difference calculations
(ICONIP, 2014-11)In the field of land management, stakeholders (people) everywhere have many disputes over the location of boundaries between private land and public land. We find that the stakeholders disagree with each other over boundaries. ... -
Analysis and prevention of account hijacking based incidents in cloud environment
(2015-12)Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ... -
Analysis of Impersonation Attack on RF Fingerprinting
(2013)Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its ... -
Analysis of NTP DRDoS attacks’ performance effects and mitigation techniques
(2016-12-14)Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of ... -
Analysis of results in simulation and modeling of CDMA systems
(Institute of Electrical and Electronics Engineers (IEEE), 2007-07-01)In this paper, using discrete event stochastic simulation by batch-means, new results have been obtained by analysing the sensitivity of CDMA blocking probability for a given traffic load against various number of calls ... -
An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing
(International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ... -
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
(2015-07-15)Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip ... -
Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13
(Institute of Electrical and Electronics Engineers (IEEE), 2015-02-19)Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ... -
An artifact-centric business process execution platform
(Institute of Electrical and Electronics Engineers (IEEE), 2016-09)Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ... -
Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning
(ISCA (International Speech Communication Association), 2020-10)Dysarthria is a speech disorder that can significantly impact a person’s daily life, and yet may be amenable to therapy. To automatically detect and classify dysarthria, researchers have proposed various computational ...