archive-edu.com » EDU » A » ACADEMIA.EDU

Total: 295

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • The University of New Brunswick | Computer Science - Academia.edu
    Bing YANG 0 Papers Views 1 Follower Unfollow Follow Shaojun Zhang 0 Papers Views 6 Followers Unfollow Follow Undergraduates jed Beers 0 Papers Views 0 Followers Unfollow Follow Kevin Beets 0 Papers Views 19 Followers Unfollow Follow Josh Comer 0 Papers Views 1 Follower Unfollow Follow Josh Comer 0 Papers Views 1 Follower Unfollow Follow Dave Mckelvey 0 Papers Views 1 Follower Unfollow Follow Joshua Smith 0 Papers Views 7

    Original URL path: http://newbrunswick.academia.edu/Departments/Computer_Science?page=2 (2016-04-30)
    Open archived version from archive


  • The University of New Brunswick | Computer Science - Academia.edu
    that collects and displays traces of activity for tightly knit groups WebWear allows people to use contextual knowledge of contacts amp 39 interests and activities to interpret the meaning of the traces improving their usefulness In a comparative study we found that WebWear helped people complete information seeking tasks more accurately without requiring additional effort A one week field trial found that WebWear was both usable and useful and that privacy concerns were reduced in the small group context WebWear shows that small scale social navigation systems are feasible and that they can improve the effectiveness of information seeking on the World Wide Web Bookmark by Scott Bateman Using the Ecological Approach to Create Simulations of Learning Environments Bookmark by Scott Bateman and 1 Stephanie Frost The effectiveness or lack thereof of aim assist techniques in first person shooter games ABSTRACT Aim assistance techniques have been shown to work for player balancing in 2D environments but little information exists about how well these techniques will work in a 3D FPS game We carried out three studies of the performance more ABSTRACT Aim assistance techniques have been shown to work for player balancing in 2D environments but little information exists about how well these techniques will work in a 3D FPS game We carried out three studies of the performance of five different aim assists in an Unreal based game world The assists worked well in a target range scenario study 1 but their performance was reduced when game elements were introduced in a walkthrough map study 2 We systematically examined the relationships between realistic game elements and assist performance study 3 These studies show that two techniques bullet magnetism and area cursor worked well in a wide variety of situations Other techniques that worked well were too perceptible and some previously successful techniques did not work well in any game like scenario Our studies are the first to provide empirical evidence of the performance of aim assist techniques in 3D environments and the first to identify the complexities in using these techniques in real FPS games Bookmark by Scott Bateman and 1 Rodrigo Vicencio moreira Physio Home ABSTRACT Patients typically undergo physiotherapy with the help of a physiotherapist who teaches guides and corrects the patients as they perform exercises It would be nice if people could repeat these exercises at home potentially more ABSTRACT Patients typically undergo physiotherapy with the help of a physiotherapist who teaches guides and corrects the patients as they perform exercises It would be nice if people could repeat these exercises at home potentially improving their recovery rate However without guidance and or corrective feedback from a physiotherapist the patient will not know whether they are doing their exercises correctly To address this problem we implemented a prototype that guides patients through pre recorded exercise movements using visual guides overlaid atop a mirror view of the patient on a wall mounted display We conducted informal evaluations and pilot studies to assess our prototype and identified some

    Original URL path: http://newbrunswick.academia.edu/Departments/Computer_Science/Documents?page=3 (2016-04-30)
    Open archived version from archive

  • The University of New Brunswick | Computer Science - Academia.edu
    Anestis Gkanogiannis A perceptron like linear supervised algorithm for text classification A fast and accurate linear supervised algorithm is presented which compares favorably to other state of the art algorithms over several real data collections on the problem of text categorization Although it has been already presented in more A fast and accurate linear supervised algorithm is presented which compares favorably to other state of the art algorithms over several real data collections on the problem of text categorization Although it has been already presented in 6 no proof of its convergence is given From the geometric intuition of the algorithm it is evident that it is not a Perceptron or a gradient descent algorithm thus an algebraic proof of its convergence is provided in the case of linearly separable classes Additionally we present experimental results on many Bookmark by Anestis Gkanogiannis and 1 Theodore Kalamboukis Data Mining A modified and fast Perceptron learning rule and its use for Tag Recommendations in Social Bookmarking Systems Abstract A modified and fast to converge Perceptron learning rule algorithm is proposed as a general classification algorithm for linearly separable data The strategy of the algorithm takes advantage of training errors to successively more Abstract A modified and fast to converge Perceptron learning rule algorithm is proposed as a general classification algorithm for linearly separable data The strategy of the algorithm takes advantage of training errors to successively refine an initial Perceptron Classifier Original Perceptron learning rule uses training errors along with a parameter α learning rate parameter that has to be determined to define a better classifier The proposed modification does not need such a parameter in fact it is automatically determined during execution of Bookmark by Anestis Gkanogiannis and 1 Theodore Kalamboukis 2 Machine Learning Classification Ontology Based Negotiation of Dental Therapy Options Negotiation is a decision making process through which several individuals with differing points of view attempt to interactively reach an agreement It involves the discussion and evaluation of the problem as well as the consideration more Negotiation is a decision making process through which several individuals with differing points of view attempt to interactively reach an agreement It involves the discussion and evaluation of the problem as well as the consideration of alternatives Therefore a large number of possibilities should be evaluated by the decision makers which is time consuming and difficult Chiu Hung Cheung and Leung A negotiation support system can be used to facilitate interactions between different individuals In this chapter we propose using semantic web concepts such as ontologies and semantic reasoning to implement a system to facilitate negotiation The target domain of this project is negotiation between dental experts over the treatment of wisdom teeth Bookmark Download by Mahsa Kiani Fusing Multiple Sensors to Detect Network Traffic Anomalies A Control Theoretic Model Generally Intrusion Detection Systems IDSs as special purpose devices to detect network anomalies and attacks are using two approaches including misuse detection and anomaly detection In misuse detection the search for evidence of

    Original URL path: http://newbrunswick.academia.edu/Departments/Computer_Science/Documents?page=4 (2016-04-30)
    Open archived version from archive

  • The University of New Brunswick | Computer Science - Academia.edu
    Bayes is trained from the expanded training data Since a relatively small k is chosen the chance of encountering strong dependences within the neighborhood is small Thus the classification of the resulting local naive Bayes would be more accurate We experimentally compare our new algorithm with KNN and its improved variants in terms of classification accuracy using the 36 UCI datasets recommended by Weka 8 and the experimental results show that our algorithm outperforms all those algorithms significantly and consistently at various k values Bookmark by Harry Zhang A Switching Criterion for Intensification and Diversification in Local Search for SAT Bookmark Download by Harry Zhang Using Instance cloning to Improve Naive Bayes for Ranking Bookmark by Harry Zhang Deterministic and Random Selection of Variables in Local Search for SAT Bookmark by Harry Zhang Combining Adaptive Noise and Promising Decreasing Variables in Local Search for SAT Bookmark by Harry Zhang Learning Naive Bayes for Probability Estimation by Feature Selection Naive Bayes is a well known effective and efficient classification algorithm But its probability estimation is poor In many applications however accurate probability estimation is often required in order to make optimal decisions more Naive Bayes is a well known effective and efficient classification algorithm But its probability estimation is poor In many applications however accurate probability estimation is often required in order to make optimal decisions Usually probability estimation is measured by conditional log likelihood CLL There have been some learning algorithms proposed recently to extend naive Bayes for high CLL such as ERL 8 9 and BNC 2P 10 Unfortunately their computational complexity is relatively high Is there a simple but effective and efficient approach to improve the probability estimation of naive Bayes In this paper we propose to use feature selection for this purpose More precisely a search process

    Original URL path: http://newbrunswick.academia.edu/Departments/Computer_Science/Documents?page=11 (2016-04-30)
    Open archived version from archive

  • Arash Habibi Lashkari , Ph.D. | The University of New Brunswick - Academia.edu
    within the mobile networks more life and most likely covers all forms communication in the near future The goal of this book is to provide a tutorial introduction to mobile communications by illustrating the theories underpinning the layers within the mobile networks along with surveys on the currently available mobile operating systems This book begins with a review of the wireless communication emphasizing on mobile transmissions It further touches medium access controls in mobile and satellite systems It will also review mobile network layers and discussed how it provides support for mobility This book further explains and illustrates the three categories of mobile operating systems namely Linux Windows and others Finally this book will touch the programming and coding of three famous mobile operating systems namely Symbian Android and Windows Phone 7 This book was written as an ideal reference material for science undergraduate and postgraduate students It can also be use as a guide for research engineers telecommunications researchers as well as mobile system developers Upload File Bookmark Edit Delete Move section Graphical User Authentication GUA more by Arash Habibi Lashkari Ph D It is now beyond any doubt that USER AUTHENTICATION is the most critical element in the field of Information Security To date Text Based Password Authentication TBPA has shown some difficulties that users have tended to write more It is now beyond any doubt that USER AUTHENTICATION is the most critical element in the field of Information Security To date Text Based Password Authentication TBPA has shown some difficulties that users have tended to write passwords down manually or save them on hard disc This tendency is caused by the passwords being strong and thus difficult to memorize in most cases This has inadvertently given rise to security issues pertaining to attack Graphical User Authentication GUA has two symbiotic pillars as its foundation USABILITY SECURITY The macro concept of GUA is based on the human psychological factor that is images are more readily committed to memory than would TBPA s All GUA algorithms are made up of both usability and security aspects Unfortunately none of the existing algorithms are able to cover both of these aspects at the same time The security resistance features will be evaluated by calculating the Password Entropy and Password Space and compared the reviewed algorithms in a table More Info Graphical Password Algorithms and Analysis Upload File View on amazon com Bookmark Edit Delete Move section Cryptography more by Arash Habibi Lashkari Ph D The widespread usage of computers and the Internet today has fostered new interest in cryptography partly due to the new emphasis on personal privacy In our pursuits to make it easy for computers to share stuff little did we realize more The widespread usage of computers and the Internet today has fostered new interest in cryptography partly due to the new emphasis on personal privacy In our pursuits to make it easy for computers to share stuff little did we realize that in essence our efforts would also make it easy for other people to see all of our personal stuff too In most cases we naively expose far too much personal information making it effortless for unfamiliar persons to read our personal email messages credit card details love letters and so on Upload File Bookmark Edit Delete Move section Mobile Communication more by Arash Habibi Lashkari Ph D At the beginning of the new millennium telecommunications in its various forms is revolutionizing both our society and the world economy This book shows how technologies have developed how they work how they are being utilized more At the beginning of the new millennium telecommunications in its various forms is revolutionizing both our society and the world economy This book shows how technologies have developed how they work how they are being utilized today and how they are likely to come together to satisfy the needs of consumers in the future Upload File Bookmark Edit Delete Move section Papers Reorder Add Paper Characterization of Encrypted and VPN Traffic Using Time Related Features more by Arash Habibi Lashkari Ph D Traffic characterization is one of the major challenges in today s security industry The continuous evolution and generation of new applications and services together with the expansion of encrypted communications makes it a difficult more Traffic characterization is one of the major challenges in today s security industry The continuous evolution and generation of new applications and services together with the expansion of encrypted communications makes it a difficult task Virtual Private Networks VPNs are an example of encrypted communication service that is becoming popular as method for bypassing censorship as well as accessing services that are geographically locked In this paper we study the effectiveness of flow based time related features to detect VPN traffic and to characterize encrypted traffic into different categories according to the type of traffic e g browsing streaming etc We use two different well known machine learning techniques C4 5 and KNN to test the accuracy of our features Our results show high accuracy and performance confirming that time related features are good classifiers for encrypted traffic characterization Research Interests Information Security Network Security Cyber Security and Network Traffic Analysis Download pdf Bookmark Edit Delete Move section A new Evaluation Criteria for Effective Security Awareness in Computer Risk Management based on AHP more by Arash Habibi Lashkari Ph D Publication Date 2012 Download pdf Bookmark Edit Delete Move section Image processing with augmented reality AR more by Arash Habibi Lashkari Ph D Publication Date 2013 Upload File Bookmark Edit Delete Move section Mobile based biology edutainment application for secondary schools more by Arash Habibi Lashkari Ph D Publication Date 2013 Upload File Bookmark Edit Delete Move section Web based AR Advertising Branding for Proton Company more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section Mobile WiFi Based Indoor Positioning System more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section The Knowledge Based Authentication Attacks more by Arash Habibi Lashkari Ph D Publication Date 2011 Download pdf Bookmark Edit Delete Move section A Secure Recognition Based Graphical Password by Watermarking more by Arash Habibi Lashkari Ph D One of the most important topics in information security today is user authentication There is a good security when using the text based strong password schemes but often memorizing the password is so difficult and users writing them more One of the most important topics in information security today is user authentication There is a good security when using the text based strong password schemes but often memorizing the password is so difficult and users writing them down on a piece of paper or saving inside the computer There is an alternative solution to the text based authentication which is the GUA Graphical User Authentication or simply Graphical Password based on the fact that humans tend to remember images better This type of interface provides an easy to create and remember passwords for the users However one big issue that is plaguing GUA is shoulder surfing attack that can capture the users mouse clicks and image gallery attack that can change the images of the gallery with physical attack In this paper we will propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and using the random character set generation for each image for resistance to shoulder surfing attack to provide better system security All the information images in registration phase will be process by copy right protection of watermarking where the login page will check this information for security purposes Here we will evaluate and analyze six types of the more common graphical password attack methods Publication Date 2011 Download pdf View on ieeexplore ieee org Bookmark Edit Delete Move section Graphical Password Security Evaluation by Fuzzy AHP more by Arash Habibi Lashkari Ph D Publication Date Jun 2012 Download pdf Bookmark Edit Delete Move section Graphical Password Security Evaluation Criteria by Fuzzy Analytical Hierarchical Process FAHP more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section A Survey on Image Steganography Algorithms and Evaluation more by Arash Habibi Lashkari Ph D Publication Date 2011 Upload File Bookmark Edit Delete Move section Theoretical Model for Automating Students Services in Universities more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section IRC Botnet Major Issues and Solutions more by Arash Habibi Lashkari Ph D Publication Date 2011 Download pdf Bookmark Edit Delete Move section Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section FACIAL EXPRESSION RECOGNITION INTELLIGENT SECURITY SYSTEM FOR REAL TIME SURVEILLANCE more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section Simulation of Investigating the Earth and Universe Using Interactive Mobile Augmented Reality Based On Smart Evaluation more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section MOBILE AR GPS BASED FOR NAVIGATION PURPOSE more by Arash Habibi Lashkari Ph D Publication Date 2012 Upload File Bookmark Edit Delete Move section Wired Equivalent Privacy WEP versus Wi Fi Protected Access WPA more by Arash Habibi Lashkari Ph D Publication Date 2009 Download pdf View on ivanescobar com Bookmark Edit Delete Move section Wired Equivalent Privacy WEP more by Arash Habibi Lashkari Ph D There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology The contrast between wireless usage and security techniques more There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology The contrast between wireless usage and security techniques growing show that the security is not adequate enough for this data growing Itpsilas obvious that the hackers are able to monitor the transmitted data and hack whatever they want So we see that these days Companies are investing more money on securing their wireless networks There are three major type of security in wireless In this paper at first we try to completely explain the structure of WEP as a first wireless security technique and discuss about all versions of it At the second step we discuss about all problems of WEP and finally explain the solutions and improvements that done on this security technique Then we are in the next plan which is to explain the structure of two other techniques WPA WPA2 and we hope that we will publish a completely comparison among wireless techniques in the near future Publication Date 2009 Download pdf Bookmark Edit Delete Move section Pure and cued recall based graphical user authentication more by Arash Habibi Lashkari Ph D Publication Date 2009 Upload File View on ieeexplore ieee org Bookmark Edit Delete Move section A Complete Comparison on Pure and Cued Recall Based Graphical User Authentication Algorithms more by Arash Habibi Lashkari Ph D Nowadays user authentication is one of the important topics in information security Strong text based password schemes could provide with certain degree of security However the fact that strong passwords are difficult to memorize more Nowadays user authentication is one of the important topics in information security Strong text based password schemes could provide with certain degree of security However the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file Graphical authentication has been proposed as a possible alternative solution to text based authentication motivated particularly by the fact that humans can remember images better than text In recent years many networks computer systems and Internet based environments try used graphical authentication technique for their user s authentication All of graphical passwords have two different aspects which are usability and security Unfortunately none of these algorithms were being able to cover both of these aspects at the same time During our research we could find eleven recall based authentication algorithms which we tried to explain their lacks and attacks Then in the last section in order to cover usability and security features at the same time we try to make three different comparison tables Publication Date 2009 Upload File View on ieeexplore ieee org Bookmark Edit Delete Move section Shoulder Surfing attack in graphical password authentication more by Arash Habibi Lashkari Ph D Information and computer security is supported largely by passwords which are the principle part of the authentication process The most common computer authentication method is to use alphanumerical username and password which has more Information and computer security is supported largely by passwords which are the principle part of the authentication process The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks To overcome the vulnerabilities of traditional methods visual or graphical password schemes have been developed as possible alternative solutions to text based scheme A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords When users input their passwords in a public place they may be at risk of attackers stealing their password An attacker can capture a password by direct observation or by recording the individuals authentication session This is referred to as shouldersurfing and is a known risk of special concern when authenticating in public places In this paper we will present a survey on graphical password schemes from 2005 till 2009 which are proposed to be resistant against shoulder surfing attacks Publication Date 2009 Publication Name Computing Research Repository Download pdf View on arxiv org Bookmark Edit Delete Move section A survey on usability and security features in graphical user authentication algorithms more by Arash Habibi Lashkari Ph D Publication Date 2009 Download pdf View on paper ijcsns org Bookmark Edit Delete Move section Binary decision diagram BDD more by Arash Habibi Lashkari Ph D Publication Date 2009 Upload File View on ieeexplore ieee org Bookmark Edit Delete Move section A Secure Recognition Based Graphical Password by Watermarking more by Arash Habibi Lashkari Ph D Abstract One of the most important topics in information security today is user authentication There is a good security when using the text based strong password schemes but often memorizing the password is so difficult and users writing more Abstract One of the most important topics in information security today is user authentication There is a good security when using the text based strong password schemes but often memorizing the password is so difficult and users writing them down on a piece of paper or saving inside the computer There is an alternative solution to the text based authentication which is the GUA Graphical User Authentication or simply Graphical Password based on the fact that humans tend to remember images better Publication Date Aug 31 2011 Upload File Bookmark Edit Delete Move section Users perceptions on mobile devices security awareness in Malaysia more by Arash Habibi Lashkari Ph D Abstract Mobile phones are gradually replacing PCs and even laptops With so many platforms and apps available consumers are often confused and managing these devices security requires an extra knowledge This paper presents the findings more Abstract Mobile phones are gradually replacing PCs and even laptops With so many platforms and apps available consumers are often confused and managing these devices security requires an extra knowledge This paper presents the findings of a survey into the opinions of users regarding mobile security their level of awareness towards current threats and the need for more security Publication Date Dec 11 2011 Upload File Bookmark Edit Delete Move section USE OF MOBILE LEARNING TECHNOLOGY SERVICE TO OFFER INFORMAL EDUCATION TO EDUCATE PREGNANT LADIES more by Arash Habibi Lashkari Ph D Journal Name TELEPHONY Publication Date 1980 Upload File Bookmark Edit Delete Move section A Survey on Image Steganography Algorithms and Evaluation more by Arash Habibi Lashkari Ph D Abstract The technique of hiding confidential information within any media is known as Stegonography Since both stegonography and cryptography are used to protect confidential information the two are used interchangeably This is wrong more Abstract The technique of hiding confidential information within any media is known as Stegonography Since both stegonography and cryptography are used to protect confidential information the two are used interchangeably This is wrong because the appearance of the output from the two processes is totally different the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention Publication Date Jan 1 2011 Upload File Bookmark Edit Delete Move section Binary Decision Diagram BDD more by Arash Habibi Lashkari Ph D Abstract The primary aim of computer science is invention of new data structures and algorithms Those data structures and algorithms could significantly help us to solve unsolved problems or let us give much better solutions for the more Abstract The primary aim of computer science is invention of new data structures and algorithms Those data structures and algorithms could significantly help us to solve unsolved problems or let us give much better solutions for the already solved problems In this paper we introduce BDD binary decision diagram and its variants OBDD ordered binary decision diagram and ROBDD reduced ordered binary decision diagram Publication Date Apr 3 2009 Upload File Bookmark Edit Delete Move section Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory more by Arash Habibi Lashkari Ph D Attention has been drawn to mobile devices which show that the success will be the portability of applications from one platform to the other With integration of 3D virtual objects into real environment in real time thus allowing more Attention has been drawn to mobile devices which show that the success

    Original URL path: http://newbrunswick.academia.edu/ArashHabibiLashkari (2016-04-30)
    Open archived version from archive

  • Academia.edu | Analytics
    Job Board About Press Blog People Papers Terms Privacy Copyright We re Hiring Help Center Find new research papers in Physics Chemistry Biology Health Sciences Ecology Earth Sciences Cognitive Science

    Original URL path: http://newbrunswick.academia.edu/ArashHabibiLashkari/Analytics (2016-04-30)
    Open archived version from archive

  • PJ Ju | The University of New Brunswick - Academia.edu
    Advisors edit Edit Done Editing Papers Reorder Add Paper author rank by 30 day views total views followers Join PJ and 36 757 297 other researchers on Academia edu Connect with Facebook not now Close Log In Log In with Facebook Log In with Google or Email Password Remember me on this computer or reset password Enter the email address you signed up with and we ll email you a

    Original URL path: http://newbrunswick.academia.edu/PJJu (2016-04-30)
    Open archived version from archive

  • Justin Kamerman | The University of New Brunswick - Academia.edu
    Deployment Descriptors Runtime Manipulation of Servant Implementation Policies more by Justin Kamerman Publisher University of South Africa Publication Date Jan 1 2004 Download pdf Bookmark Edit Delete Move section author rank by 30 day views total views followers Join Justin and 36 757 302 other researchers on Academia edu Connect with Facebook not now Close Log In Log In with Facebook Log In with Google or Email Password Remember me

    Original URL path: http://newbrunswick.academia.edu/JustinKamerman (2016-04-30)
    Open archived version from archive