• Analysis and comparison of deepfakes detection methods for cross-library generalisation 

      Wang, Changjin; Sharifzadeh, Hamid; Varastehpour, Soheil; Ardekani, Iman (2023-08-21)
      The rise of generative artificial intelligence (GenAI) has made it increasingly possible to use Deepfakes technology to generate fake pictures and videos. While this technology has benefits, it also has downsides such as ...
    • Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

      Rehman, Saeed; Sowerby, K.W.; Coghill, Colin (Academic Press, 2014-05)
      Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...
    • An approach to interesting objects detection in low quality image sequences for fisheries management 

      Li, Z.; Chen, L.; Peng, J.; Song, Lei (World Scientific and Engineering Academy and Society (WSEAS), 2015)
      In order to extract interest objects in low quality image sequences from fisheries management, this paper proposes a new significant feature extraction method based on cascade framework. This algorithm involves pre processing ...
    • Can Vivaldi help in IP geolocation? 

      Komosny, Dan; Simek, Milan; Kathiravelu, Ganeshan (Przegl ˛ad Elektrotechniczny, 2013)
      The paper deals with IP geolocation based on communication latency measurement. The aim of IP geolocation is to estimate the geographical location of an IP-enabled node. Latency-based IP geolocation methods measure latency ...
    • Capture the talent : secondary school education with cyber security competition 

      Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
      Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...
    • A cluster-driven energy routing protocol for optimal network lifetime in ad hoc networks 

      Airehrour, David; Cherrington, M.; Madanian, S. (Telecommunications Association Inc., 2019-06-11)
      Mobile Ad hoc Network (MANET) is a group of networked mobile devices working in a cooperative manner. Due to usage, these devices quickly run out of battery power in critical situations and consequently fail in packet ...
    • Collaborative learning skills in multi-touch tables for UML software design 

      Basheri, Mohammed; Munro, Malcolm; Burd, Liz; Baghaei, Nilufar (International Journal of Advanced Computer Science and Applications, 2013)
      The use of multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This paper ...
    • A comprehensive review of computational methods for automatic prediction of schizophrenia with insight into indigenous populations 

      Randall, Ratana; Sharifzadeh, Hamid; Krishnan, J.; Pang, Shaoning (Frontiers Media (parent company: Holtzbrinck Publishing Group), 2019-09-12)
      Psychiatrists rely on language and speech behavior as one of the main clues in psychiatric diagnosis. Descriptive psychopathology and phenomenology form the basis of a common language used by psychiatrists to describe ...
    • A comprehensive review of deep learning algorithms 

      Varastehpour, Soheil; Sharifzadeh, Hamid; Ardekani, Iman (Unitec ePress, 2021-11-26)
      Deep learning algorithms are a subset of machine learning algorithms that aim to explore several levels of the distributed representations from the input data. Recently, many deep learning algorithms have been proposed to ...
    • Computational thinking : the skill set of the 21st century 

      Mohaghegh, Dr Mahsa; McCauley, Michael (TechScience Publications, 2016-05)
      Computational thinking is a relatively new term, and is the topic of much discussion in the educational realm today. Research shows that computational thinking is a highly valuable skill that is becoming a topic of increasing ...
    • Critical data detection for dynamically adjustable product quality in IIoT-enabled manufacturing 

      Sen, Sachin K.; Karmakar, G. C.; Pang, Shaoning (Institute of Electrical and Electronics Engineers (IEEE), 2023-05-17)
      The IIoT technologies, due to the widespread use of sensors, generate massive data that are key in providing innovative and efficient industrial management, operation, and product quality control processes. The significance ...
    • Diabetic Mario : designing and evaluating mobile games for diabetes education 

      Baghaei, Nilufar; Nandigam, David; Casey, John; Direito, Artur; Maddison, R. (2016-06)
      Traditionally, diabetes education has relied on written materials, with limited resources available for children with diabetes. Mobile games can be effective and motivating tools for the promotion of children's health. In ...
    • Dynamic class imbalance learning for incremental LPSVM 

      Pang, Shaoning; Zhu, Lei; Chen, Gang; Sarrafzadeh, Hossein; Ban, Tao; Inoue, Daisuke (Neural Networks, 2013-02)
      Linear Proximal Support Vector Machines (LPSVMs), like decision trees, classic SVM, etc. are originally not equipped to handle drifting data streams that exhibit high and varying degrees of class imbalance. For online ...
    • Effects of software security on software development life cycle and related security issues 

      Mohaddes Deylami, Hanif; Ardekani, Iman; Muniyandi, R.C.; Sarrafzadeh, Hossein (International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)
      Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ...
    • An efficient stream-based join to process end user transactions in real-time data warehousing 

      Jamil, Noreen (2014-06)
      In the field of real-time data warehousing semistream processing has become a potential area of research since last one decade. One important operation in semi-stream processing is to join stream data with a slowly changing ...
    • Error signal measurement in active noise control systems 

      Sheth, Darshana; Ardekani, Iman (Asia-Pasific Signal Information Processing Association, 2015-08)
      Active noise control (ANC) creates a set of silent points at the location of error microphones. As a byproduct, a zone of quiet is created surrounding the silent points. Unfortunately, the extension of the created quite ...
    • Estimation of internet node location by latency measurements : the underestimation problem 

      Komosny, Dan; Voznak, Miroslav; Ganeshan, Kathiravelu; Sathu, Hira (Kaunas University of Technology (Kaunas, Lithuania), 2015)
      In this paper we deal with discovering a geographic location of a node in the Internet. Knowledge of location if fundamental element for many location based applications and web services. We focus on location finding without ...
    • Evaluating encryption algorithms for sensitive data using different storage devices 

      Sarrafpour, Bahman; Alkorbi, Mohammed; Jamil, N.; Asif Naeem, M.; Mirza, F. (Hindawi, 2020-05-20)
      Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise ...
    • Evaluating IPv6 in peer-to-peer 802.11n wireless LAN 

      Kolahi, Samad; Li, Peng (IEEE Computer Society, 2011-08)
      IPv6 is built into the latest versions of Microsoft Windows and Linux-based operating systems. It's expected to replace the current IPv4 and solve its numerous problems, such as address exhaustion, security, and mobility. ...
    • A fast and adaptive video-based method for eye blink rate estimation 

      Mohammadi, Gheis; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein (ACCENT Society (India), 2015-06-16)
      Eye blink rate (EBR) estimation is one of the informative cues and challengeable areas in eye-based systems that has a wide range of applications like the detecting a driver’s drowsiness, anxiety analysis, diseases detection ...