咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 9 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 42 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 电气工程
    • 1 篇 冶金工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 15 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 公共管理
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 5 篇 information tech...
  • 5 篇 computational mo...
  • 4 篇 students
  • 4 篇 accuracy
  • 3 篇 education
  • 3 篇 visualization
  • 3 篇 malware
  • 3 篇 ip networks
  • 3 篇 training
  • 3 篇 computer viruses
  • 2 篇 computer simulat...
  • 2 篇 linux
  • 2 篇 operating system...
  • 2 篇 wireless communi...
  • 2 篇 history
  • 2 篇 data mining
  • 2 篇 computationalmod...
  • 2 篇 pattern recognit...
  • 2 篇 costs
  • 2 篇 analytical model...

机构

  • 16 篇 school of comput...
  • 8 篇 department of co...
  • 6 篇 national institu...
  • 5 篇 school of comput...
  • 3 篇 bay of plenty po...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 cybersecurity la...
  • 2 篇 department of co...
  • 2 篇 faculty of infor...
  • 2 篇 computing and in...
  • 2 篇 faculty of infor...
  • 2 篇 faculty of compu...
  • 2 篇 school of comput...
  • 2 篇 computing labora...
  • 2 篇 dept of informat...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 department of in...
  • 2 篇 school of engine...

作者

  • 7 篇 shaoning pang
  • 5 篇 ban tao
  • 5 篇 xiaosong li
  • 4 篇 prasad christine
  • 4 篇 tao ban
  • 4 篇 latu savae
  • 3 篇 ajit narayanan
  • 3 篇 pang shaoning
  • 3 篇 yi chen
  • 3 篇 abdolhossein sar...
  • 3 篇 lister raymond
  • 3 篇 li xiaosong
  • 3 篇 daisuke inoue
  • 3 篇 baghaei nilufar
  • 3 篇 zuojin li
  • 3 篇 young alison
  • 3 篇 hawthorn dan
  • 2 篇 alison young
  • 2 篇 kearney paul r.
  • 2 篇 kolahi samad s.

语言

  • 68 篇 英文
检索条件"机构=Computing and Information Technology Unitec"
68 条 记 录,以下是11-20 订阅
排序:
Reconstruction of phonated speech from whispers using formant-derived plausible pitch modulation
收藏 引用
ACM Transactions on Accessible computing 2015年 第4期6卷 1–21页
作者: McLoughlin, Ian V. Sharifzadeh, Hamid Reza Tan, Su Lim Li, Jingjie Song, Yan National Engineering Laboratory of Speech and Language Information Processing University of Science and Technology of China HefeiAnhui230027 China Department of Computing Unitec Institute of Technology Auckland New Zealand Singapore Institute of Technology 10 Dover Drive Singapore138683 Singapore
Whispering is a natural, unphonated, secondary aspect of speech communications for most people. However, it is the primary mechanism of communications for some speakers who have impaired voice production mechanisms, s... 详细信息
来源: 评论
A federated network online network traffics analysis engine for cybersecurity
A federated network online network traffics analysis engine ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Shaoning Pang Yiming Peng Tao Ban Daisuke Inoue Abdolhossein Sarrafzadeh Department of computing Unitec Institute of Technology New Zealand Cybersecurity Laboratory National Institute of Information and Communications Technology (NICT) Japan
Agent-oriented techniques are being increasingly used in a range of networking security applications. In this paper, we introduce FNTAE, a Federated Network Traffic Analysis Engine for real-time network intrusion dete... 详细信息
来源: 评论
Efficient FxLMS algorithm with simplified secondary path models
Efficient FxLMS algorithm with simplified secondary path mod...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Iman T. Ardekani Hamid Sharifzadeh Saeed Rehman Waleed H. Abdulla Computing and Information Technology Department Unitec Institute of Technology Auckland New Zealans ECE Department University of Auckland Auckland New Zealans
This paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is ... 详细信息
来源: 评论
An investigation of factors and measurements for successful e-commerce websites
WEBIST 2014 - Proceedings of the 10th International Conferen...
收藏 引用
WEBIST 2014 - Proceedings of the 10th International Conference on Web information Systems and Technologies 2014年 1卷 354-360页
作者: Li, Xiaosong Lian, Wei Sarrafzadeh, Abdolhossein Department of Computing and Information Technology Unitec Institute of Technology Auckland New Zealand
Business-to-Consumer (B2C) e-commerce is popular because of its convenience, speed and price. Although there has been intense debate about quality dimensions of e-commerce websites, more research is needed to find a w... 详细信息
来源: 评论
A new biological visual cognitive behavioural modeling for video energy computing  13
A new biological visual cognitive behavioural modeling for v...
收藏 引用
13th IEEE International Conference on Cognitive Informatics and Cognitive computing, ICCI*CC 2014
作者: Zuojin, Li Liukui, Chen Zhiyong, Ren Tirumala, Sreenivas Sremath College of Electrical and Information Engineering Chongqing University of Science and Technology Chongqing China Department of Communication Chongqing College of Electronic Engineering Chongqing China Department of Computing Faculty of Creative Industries and Business Unitec of Institute and Technology Auckland New Zealand
As we all know, human vision is quite sensitive to abnormal behaviors, which is attributed to the discharging of the receptor cells in the brain visual cortex and the ensuing bioelectrical energy features. Inspired by... 详细信息
来源: 评论
A pattern recognition for group abnormal behaviors based on Markov Random Fields energy  13
A pattern recognition for group abnormal behaviors based on ...
收藏 引用
13th IEEE International Conference on Cognitive Informatics and Cognitive computing, ICCI*CC 2014
作者: Zuojin, Li Liukui, Chen Zhiyong, Ren Tirumala, Sreenivas Sremath College of Electrical and Information Engineering Chongqing University of Science and Technology Chongqing China Department of Communication Chongqing College of Electronic Engineering Chongqing China Department of Computing Faculty of Creative Industries and Business Unitec of Institute and Technology Auckland New Zealand
Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video s... 详细信息
来源: 评论
Learning from industry by using an inquiry based learning approach
Learning from industry by using an inquiry based learning ap...
收藏 引用
Frontiers in Education (FIE) Conference
作者: Xiaosong Li Department of Computing & Information Technology Unitec Institute of Technology Auckland New Zealand
Inquiry based and constructivist activities can motivate students to take charge of their own learning, understand multiple perspectives and develop high level reasoning skills. This paper describes a case study of si... 详细信息
来源: 评论
An incremental learning approach to continuous image change detection
An incremental learning approach to continuous image change ...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Lei Song Shaoning Pang Gang Chen Hossein Sarrafzadeh Tao Ban Daisuke Inoue Department of Computing Unitec Institute of Technology Auckland New Zealand National Institute of Information and Communications Technology Tokyo Japan
This paper proposes a novel incremental learning based image change detection method capable of detecting changes over image series. Given two images for change detection, an intelligent agent is trained by incrementa... 详细信息
来源: 评论
Chunk Incremental IDR/QR LDA Learning
Chunk Incremental IDR/QR LDA Learning
收藏 引用
International Joint Conference on Neural Networks
作者: Yiming Peng Shaoning Pang Gang Chen Abdolhossein Sarrafzadeh Tao Ban Daisuke Inoue Department of Computing Unitec Institute of Technology Private Bag 92025 Auckland 1142 New Zealand National Institute of Information and Communications Technology 4-2-1 Nukui-Kitamachi Koganei Tokyo 184-8795 Japan
Training data in real world is often presented in random chunks. Yet existing sequential Incremental IDR/QR LDA (s-QR/IncLDA) can only process data one sample after another. This paper proposes a constructive chunk In... 详细信息
来源: 评论
A tale of four cities: Wireless security & growth in New Zealand
A tale of four cities: Wireless security & growth in New Zea...
收藏 引用
2012 International Conference on computing, Networking and Communications, ICNC'12
作者: Nisbet, Alastair Department of Computing and Information Technology Faculty of Creative Industries and Business Unitec Auckland New Zealand
Wireless networks have enjoyed considerable growth since their introduction. Security protocols supplied with the wireless equipment have reached a level of very high and robust security. However, security remains a p... 详细信息
来源: 评论