• An Alternative Approach for Developing Socially Assistive Robots 

      Jayawardena, Chandimal; Kuo, I-Han; Sarrafzadeh, Hossein (IEEE Robotics and Automation Society + Engineering in Medicine and Biology Society, 2014)
      This paper presents the design of the socially assistive companion robotic wheelchair named RoboChair. Unlike in most current companion robotics projects, the approach of RoboChair is not to build a completely new robotic ...
    • Analysis and prevention of account hijacking based incidents in cloud environment 

      Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
      Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
    • An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing 

      Airehrour, David; Gutierrez, J. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2015-05)
      The Internet of Things (IoT) is fast becoming a global phenomenon and many issues are arising such as standardization, deployment of IPv6, sensors’ energy requirements and security among others. However, without a secure ...
    • An artifact-centric business process execution platform 

      Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
      Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
    • Ensemble learning methods for decision making : status and future prospects 

      Ali, Shahid; Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2015-07)
      In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each model has certain limitations, the aim of ensemble learning is to supervise their strengths and ...
    • Evaluation of statistical text normalisation techniques for Twitter 

      Sosamphan, P.; Liesaputra, Veronica; Yongchareon, Dr. Sira; Mohaghegh, Dr Mahsa (IC3K, 2016-11)
      One of the major challenges in the era of big data use is how to ‘clean’ the vast amount of data, particularly from micro-blog websites like Twitter. Twitter messages, called tweets, are commonly written in ill-forms, ...
    • Free and open source intrusion detection systems : a study 

      Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
      Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
    • Global solar radiation prediction using artificial neural network models for New Zealand 

      Ahmad, Aziz; Anderson, T.N. (Solar 2014 Conference & Expo, 2014-05)
      In this study, nonlinear autoregressive recurrent neural networks with exogenous input (NARX) were used to predict global solar radiation across New Zealand. Data for nine hourly weather variables recorded across New Zealand ...
    • Greening and optimizing energy consumption of sensor nodes in the Internet of Things through energy harvesting : challenges and approaches 

      Airehrour, David; Gutiérrez, J.; Ray, S. K. (2016-05)
      This paper presents a survey of current energy efficient technologies that could drive the IoT revolution while examining critical areas for energy improvements in IoT sensor nodes. The paper reviews improvements in emerging ...
    • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

      Ahmad, Aziz; Anderson, T.N. (Australia PV Institute, 2014-12)
      In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
    • Portability of an RF fingerprint of a wireless transmitter 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (2014-10)
      In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...
    • Progress report on a proposed theory for software development 

      Kirk, D.C.; MacDonell, S.G. (2015-07)
      There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
    • Reducing ICT carbon footprints through adoption of green computing 

      Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)
      A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • A Survey on Approaches to Modeling Artifact-centric Business Processes 

      Kunchala, Jyothi; Yu, Jian; Yongchareon, Sira (Cham Springer International Publishing, 2014)
      Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient ...
    • A survey on Internet usage and cybersecurity awareness in students 

      Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (2016-12)
      There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand ...
    • A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes 

      Ngamakeur, Kan; Liu, Chengfei; Chaisiri, Sivadon; Yu, Jian; Yongchareon, Sira (Springer Verlag, 2014)
      To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ...

      © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142