咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 9 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 42 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 电气工程
    • 1 篇 冶金工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 15 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 公共管理
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 5 篇 information tech...
  • 5 篇 computational mo...
  • 4 篇 students
  • 4 篇 accuracy
  • 3 篇 education
  • 3 篇 visualization
  • 3 篇 malware
  • 3 篇 ip networks
  • 3 篇 training
  • 3 篇 computer viruses
  • 2 篇 computer simulat...
  • 2 篇 linux
  • 2 篇 operating system...
  • 2 篇 wireless communi...
  • 2 篇 history
  • 2 篇 data mining
  • 2 篇 computationalmod...
  • 2 篇 pattern recognit...
  • 2 篇 costs
  • 2 篇 analytical model...

机构

  • 16 篇 school of comput...
  • 8 篇 department of co...
  • 6 篇 national institu...
  • 5 篇 school of comput...
  • 3 篇 bay of plenty po...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 cybersecurity la...
  • 2 篇 department of co...
  • 2 篇 faculty of infor...
  • 2 篇 computing and in...
  • 2 篇 faculty of infor...
  • 2 篇 faculty of compu...
  • 2 篇 school of comput...
  • 2 篇 computing labora...
  • 2 篇 dept of informat...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 department of in...
  • 2 篇 school of engine...

作者

  • 7 篇 shaoning pang
  • 5 篇 ban tao
  • 5 篇 xiaosong li
  • 4 篇 prasad christine
  • 4 篇 tao ban
  • 4 篇 latu savae
  • 3 篇 ajit narayanan
  • 3 篇 pang shaoning
  • 3 篇 yi chen
  • 3 篇 abdolhossein sar...
  • 3 篇 lister raymond
  • 3 篇 li xiaosong
  • 3 篇 daisuke inoue
  • 3 篇 baghaei nilufar
  • 3 篇 zuojin li
  • 3 篇 young alison
  • 3 篇 hawthorn dan
  • 2 篇 alison young
  • 2 篇 kearney paul r.
  • 2 篇 kolahi samad s.

语言

  • 68 篇 英文
检索条件"机构=Computing and Information Technology Unitec"
68 条 记 录,以下是1-10 订阅
排序:
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks  19
Coding Observer Nodes for Sybil Attacks Detection in Mobile ...
收藏 引用
19th IEEE International Conference on Embedded and Ubiquitous computing, EUC 2021
作者: Sassani Sarrafpour, Bahman A. Alomirah, Abdulaziz Pang, Shaning Sarrafpour, Soshian School of Computing Engineering Applied Technology Unitec New Zealand Auckland New Zealand School of Computing Engineering Applied Technology Unitec New Zealand Auckland New Zealand Federation University School of Engineering Information Technology Physical Science Melbourne Australia Yale University School of Medicine Newhaven United States
Sybil attack is one of the most common and serious attacks in wireless sensor networks, in which a malicious node illegitimately forges several (fake) identities. These fake copies confuse and collapse the network. Sy... 详细信息
来源: 评论
Effectiveness of Stock Index Forecasting using ARIMA model: Evidence from New Zealand
Effectiveness of Stock Index Forecasting using ARIMA model: ...
收藏 引用
Advancements in computing (ICAC), 2019 International Conference on
作者: Wajira Dassanayake Iman Ardekani Narmada Gamage Chandimal Jayawardena Hamid Sharifzadeh School of Applied Business Unitec Institute of Technology School of Computing Unitec Institute of Technology Sri Lanka Institute of Information Technology
Time series of stock market indices are dynamic, interdependent, and considered sensitive to many factors. Thus, the prediction of such indexes is always challenging. A comprehensive review carried out by the authors ... 详细信息
来源: 评论
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
Coding Observer Nodes for Sybil Attacks Detection in Mobile ...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous computing, EUC
作者: Bahman A. Sassani Sarrafpour Abdulaziz Alomirah Shaning Pang Soshian Sarrafpour School of Computing Engineering & Applied TechnologyUnitec New ZealandAucklandNew Zealand School of Engineering Information Technology & Physical Science Federation University Melbourne Australia School of Medicine Yale University Newhaven USA
Sybil attack is one of the most common and serious attacks in wireless sensor networks, in which a malicious node illegitimately forges several (fake) identities. These fake copies confuse and collapse the network. Sy... 详细信息
来源: 评论
Enhancing customers' knowledge and decision making using augmented reality  28
Enhancing customers' knowledge and decision making using aug...
收藏 引用
28th International Conference on Computers in Education, ICCE 2020
作者: Boonrat, Wisanoo Vaidya, Vimita Baghaei, Nilufar Sharifzadeh, Hamid Ahmed, Ali Casey, John Department of Information Technology Otago Polytechnic Auckland Campus New Zealand School of Natural and Computational Sciences Massey University Auckland New Zealand School of Computing Unitec Institute of Technology New Zealand School of Engineering and Computer Science Victoria University of Wellington New Zealand
Augmented reality has seen massive success in recent years as it provides an opportunity for a seamless and rich user interaction with the real world. Recent studies have shown augmented and virtual reality can play a... 详细信息
来源: 评论
AgentPi: An IoT Enabled Motion CCTV Surveillance System
AgentPi: An IoT Enabled Motion CCTV Surveillance System
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Bahman A. Sassani Andrew David Xiaosong Li Farhad Mehdipour Unitec Institute of Technology Auckland New Zealand School of Computing and Information Technology Unitec Institute of Technology New Zealand Otago Polytechnic - Auckland International Campus Auckland New Zealand Otago Polytechnic - Auckland International Campus (OPAIC) Auckland New Zealand
In this paper, we introduce a prototype of surveillance system rigged with several vital modules and mobility as an optional functionality. The proposed cost-efficient system features motion and anomaly detection with... 详细信息
来源: 评论
S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping
S-boxes Construction Based on Quantum Chaos and PWLCM Chaoti...
收藏 引用
IEEE International Conference on Cognitive Informatics
作者: Jun Peng Shaoning Pang Du Zhang Shangzhu Jin Lixiao Feng Zuojin Li School of Intelligent Technology and Engineering Chongqing University of Science and Technology Chongqing China School of Computing and Information Technology Unitec Institute of Technology Auckland New Zealand Faculty of Information Technology Macau University of Science and Technology Macau S.A.R China Office of Academic Research Chongqing University of Science and Technology Chongqing China
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis (decoding). In this paper, we incorporate quantum chaos and PWLCM chaotic... 详细信息
来源: 评论
Multi-echelon Supply Chain Flexibility Enhancement Through Detecting Bottlenecks
收藏 引用
Global Journal of Flexible Systems Management 2016年 第4期17卷 357-372页
作者: Kazemian, Iman Aref, Samin Department of Industrial Engineering College of Engineering University of Tehran North Kargar PO Box: 4563-11155 Tehran Iran Department of Computer Science University of Auckland Private Bag 92019 Auckland New Zealand Department of Computing and Information Technology Unitec Institute of Technology Private Bag 92025 Auckland New Zealand
This study suggests a supply chain design deploying a novel idea from production planning. The idea of capacity bottlenecks is used to improve flexibility in a multi-echelon multi-product supply chain. We suggest an o... 详细信息
来源: 评论
A process mining technique using pattern recognition  27
A process mining technique using pattern recognition
收藏 引用
CAiSE 2015 Forum at the 27th International Conference on Advanced information Systems Engineering, CAiSE 2015
作者: Liesaputra, Veronica Yongchareon, Sira Chaisiri, Sivadon Department of Computing and Information Technology Unitec Institute of Technology New Zealand School of Information Technology Shinawatra University Thailand
Several works have proposed process mining techniques to discover process models fromevent logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in ev... 详细信息
来源: 评论
Efficient FxLMS algorithm with simplified secondary path models  40
Efficient FxLMS algorithm with simplified secondary path mod...
收藏 引用
40th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2015
作者: Ardekani, Iman T. Sharifzadeh, Hamid Rehman, Saeed Abdulla, Waleed H. Computing and Information Technology Department Unitec Institute of Technology Auckland New Zealand ECE Department University of Auckland Auckland New Zealand
This paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is ... 详细信息
来源: 评论
Keynote speech 1: Online machine learning for big data analytics by cognitive robots
Keynote speech 1: Online machine learning for big data analy...
收藏 引用
IEEE International Conference of Online Analysis and computing Science (ICOACS)
作者: Yingxu Wang Guoyin Wang Abdolhossein Sarrafzadeh Information Systems Lab Stanford University USA Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing 40065 China Department of Computing Faculty of Creative Industries and Business Unitec Institute of Technology New Zealand
It is recognized that both sources of and solutions to the big data challenges are human collective intelligence. Data are an abstract representation of the quantity of realistic entities and perceived objects. Big da...
来源: 评论