• On the stochastic modeling and analysis of FxLMS adaptation algorithm 

      Ardekani, Iman; Abdulla, W. H. (The Institution of Engineering and Technology, 2013)
      This study represents a stochastic model for the adaptation process performed on adaptive control systems by the filtered-x least-mean-square (FxLMS) algorithm. The main distinction of this model is that it is derived ...
    • Online scalable SVM ensemble learning method (OSSELM) for spatio-temporal air pollution analysis 

      Ali, Shahid; Dacey, Simon (AIRCC Publishing Corporation, 2017)
      Environmental air pollution studies fail to consider the fact that air pollution is a spatio-temporal problem. The volume and complexity of the data have created the need to explore various machine learning models, however, ...
    • Other-cells Interference in CDMA systems 

      Kolahi, Samad; Williamson, Allan G.; Sowerby, K.W. (Institution of Engineering and Technology (IET), 2004-09-20)
      Using simulation and modelling, the other-cells interference factor for CDMA systems is obtained. Situations with tiers of neighbouring cells are investigated under various propagation parameters and for two scenarios, ...
    • Performance analysis of some operating systems in wireless 802.11n networks 

      Kolahi, Samad; Li, Peng (University of Bahrain (Zallaq, Bahrain), 2016-01-30)
      In this paper, the performance of some operating systems (Windows 7, Windows XP, and Fedora 12) are evaluated over IEEE 802.11n WLAN (Wireless LAN), for TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), ...
    • Performance comparison of peer-peer vs client-server 802.11ac WLAN using 80Mhz channel size 

      Kolahi, Samad; Sooran, A. K.; Khan, M.M.U.; Nasim, M.F. (2019-09-01)
      In this paper, the performance of IEEE 802.11ac wireless LAN using IPv4, IPv6, TCP, UDP, peer-peer, and client-server networks is investigated while implementing WPA2 security. The latest operating systems are used in the ...
    • Physical-aware predictive dynamic thermal management of multi-core processors 

      Salami, Bagher; Noori, Hamid; Madipour, Farhad; Baharani, Mohammadreza (Elsevier, 2016-03-30)
      The advances in silicon process technology have made it possible to have processors with larger number of cores. The increment of cores number has been hindered by increasing power consumption and heat dissipation due to ...
    • Play & learn: designing engaging educational games for children 

      Nand, Kalpana; Baghaei, Nilufar; Casey, John (Cognitive Technology Journal, 2013)
      The use of computer games as common vehicles for education, as opposed to pure entertainment, has gained immense popularity in recent years. In this paper, we investigate the appealing characteristics of engaging computer ...
    • Potato Crisp moisture determination using NIR data and a Back Propagation Neural Network 

      Yee, Nigel; Potgieter, Paul; Liggett, Stephen (Advanced Institute of Convergence Information Technology (AICIT), 2013-06)
      Near infrared analysis is a tool used for non-destructive determination of material properties and the potato crisp production sector has been using the technique for determination of moisture content however near infrared ...
    • RF fingerprinting : research opportunities 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq (Asia Pacific Signal and Information Processing Association (APSIPA), 2015-01)
      Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • Role-based process view derivation and composition 

      Zhao, X.; Liu, Chengfei; Yongchareon, Dr. Sira; Kowalkiewicz, M.; Sadiq, W. (Association for Computing Machinery (ACM), 2015-05)
      The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for ...
    • A Self-Organization Mechanism Based on Cross-Entropy Method for P2P-Like Applications 

      Sarrafzadeh, Hossein; Chen, Gang (2010)
      P2P-like applications are quickly gaining popularity in the Internet. Such applications are commonly modeled as graphs with nodes and edges. Usually nodes represent running processes that exchange information with each ...
    • Service provision control in federated service providing systems 

      Chen, Gang; Sarrafzadeh, Hossein; Pang, Shaoning (2013-03)
      Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ...
    • Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model 

      Airehrour, David; Nair, N.K.C.; Madanian, S. (MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)
      Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ...
    • Technical review : performance of existing imputation methods for missing data in SVM ensemble creation 

      Ali, Shahid; Dacey, Simon (AIRCC Publishing Corporation, 2017)
      Incomplete data is present in many study contents. This incomplete or uncollected data information is named as missing data (values), and considered as vital problem for various researchers. Even this missing data problem ...
    • A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks 

      Airehrour, David; Ray, J.; Ray, S. K. (RMIT University, Melbourne, Victoria, Australia, 2017-03-26)
      This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles ...
    • A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (TelSoc : Telecommunications and the Digital Economy, 2018-03-30)
      The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed ...
    • Using vector agents to implement an unsupervised image classification algorithm 

      Borna, Kambiz; Moore, T.; Azadeh, N.H.; Pascal, S. (MDPI (Multidisciplinary Digital Publishing Institute), 2021-12-02)
      Unsupervised image classification methods conventionally use the spatial information of pixels to reduce the effect of speckled noise in the classified map. To extract this spatial information, they employ a predefined ...