73 results for Conference paper, 2015

  • Field Study for Evaluating Winter Thermal Performance of Auckland School Buildings

    Su, Bin (2015-02)

    Conference paper
    Unitec

    Auckland has a temperate climate with comfortable warm, dry summers and mild, wet winters. An Auckland school normally does not need air conditioning for cooling during the summer and only needs heating during the winter. The Auckland school building thermal design should more focus on winter thermal performance and indoor thermal comfort for energy efficiency. This field study of testing indoor and outdoor air temperatures, relative humidity and indoor surface temperatures of three classrooms with different envelopes were carried out in the Avondale College during the winter months in 2013. According to the field study data, this study is to compare and evaluate winter thermal performance and indoor thermal conditions of school buildings with different envelopes.

    View record details
  • Learning for the long haul : developing perceptions of learning affordances in CALL teachers

    Haines, Karen (2015)

    Conference paper
    Unitec

    This presentation reports on an investigation into situated teacher learning and their developing understandings of the affordances of new computer-mediated communication (CMC) tools. In-service teachers need to identify the affordances that a new tool offers for language learning in order to make decisions about which technologies they will choose to support their teaching practice. While general typologies of affordance have been identified for technology use in learning, the kinds of affordance that language teachers perceive in technology have not been specified. Sixteen tertiary teachers in Australia and New Zealand were interviewed over a period of fourteen months with reference to the knowledge they acquired around the use of new technologies in their classrooms. The term ‘learning affordance’ was coined to describe ways in which teachers perceived use of CMC tools promoted language learning in the classroom. Participants identified that new tools allowed students to engage not only with the traditional content of language learning (language skills and learning about the L2 culture) but also to engage with the processes of learning language (in relation to communication, affective factors and autonomy). Teachers also saw affordances for their teaching in relation to these areas. Implications for in-service teacher development include supporting participatory activities for on-going teacher learning such as inquiry, observation and reflection.

    View record details
  • The influence of employees' perceptions on business strategy of small and medium-sized enterprises

    Du Plessis, Andries; Phasinsaksith, Sompaseuth; Fourie, Leon; Sukumaran, Sukesh (2015-07)

    Conference paper
    Unitec

    The purpose of this research is to understand the influence of employees’ perceptions about business strategy in order to identify the factors that contribute to a successful strategy. The research also examines employees’ perceptions about strategy formulation and implementation process of SMEs in Laos, and how these perceptions would affect the outcome of strategy. This research studies the phenomenon by exploring the reality in a scientific way. As a result, this research is based on the positivist paradigm by applying a quantitative research method. The target population of this research is employees of SMEs in Lao PDR, which comprises 100 respondents as the sample size. The findings show that employees who work for profitable SMEs believe business strategy is a key factor that drives superior business performance; certain degrees of interest in business strategy among employees work for SMEs regardless of their gender, age groups, and levels of education; employees who were satisfied with the strategy of their companies performed well in their jobs; and employees who value the formulation process are those who believe in the management system of their companies.

    View record details
  • Placing nations' sectoral surpluses and deficits into their global context

    Rankin, Keith (2015-07)

    Conference paper
    Unitec

    This statistical presentation builds on previous papers (Rankin 2014a, 2014b) which explore the literature of financial balances. Using current account and general government net lending, the paper analyses private sector and government sector balances for 100 selected countries, including all the major national economies and selections representing the world's regions. This enables us to take a global view of the financial circumstances of national economies, and supra-national regional economies. For any country, domestic and foreign balances must add to zero, an accounting identity. This means that private and government balances combined equal the current account balance. For the world as a whole – a closed financial system – private and government balances add to zero, over any period of time. The world's current account balance is always zero, an accounting identity. In the long run, we would expect to see combined domestic balances in every country approach zero as short-term foreign imbalances resolve through exchange rate mechanisms. This paper uses the period from 1995-2014 as a proxy for the 'recent' long-run, and 2010-14 as the recent post-financial-crisis short run. With governments in many economies seeking to consolidate their fiscal balances in a recent period of private-sector financial caution, accommodations must be found if fiscal targets are to be achieved. The paper investigates which groupings of national economies have provided these accommodations. It notes that, especially over the longer term, New Zealand has an unusually accommodating financial profile.

    View record details
  • Progress report on a proposed theory for software development

    Kirk, Diana; MacDonell, Stephen G. (2015-07)

    Conference paper
    Unitec

    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing perspectives. We have been developing such a theory for a number of years. In this position paper, we overview our theory along with progress made thus far. We suggest that, once fully developed, this theory, or one similar to it, may be applied to support situated software development, by providing an overarching model within which software initiatives might be categorised and understood. Such understanding would inevitably lead to greater predictability with respect to outcomes.

    View record details
  • Comparative whisper vowel space for Singapore English and British English accents

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (2015-12)

    Conference paper
    Unitec

    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered vowels and some quite general estimations of whispered speech characteristics, a classic vowel space determination has been lacking for whispers. Aligning with the previous published work which aimed to redress this shortfall by presenting a vowel formant space for whispers, this paper studies Singapore English (SgE) from this respect. Furthermore, by comparing the shift amounts between normal and whispered vowel formants in two different English accents, British West Midlands (WM) and SgE, the study also considers the question of generalisation of shift amount and direction for two dissimilar accent groupings. It is further suggested that the shift amounts for each vowel are almost consistent for F2 while these vary for F1, showing the role of accent in proposing a general correlation between normal and whispered vowels on first formant. This paper presents the results of the formant analysis, in terms of acoustic vowel space mappings, showing differences between normal and whispered speech for SgE, and compares this to results obtained from the analysis of more standard English.

    View record details
  • Phonated speech reconstruction using twin mapping models

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (2015-12)

    Conference paper
    Unitec

    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating sensitive or private information. When the glottis loses function due to disease or surgery, aphonic and dysphonic patients retain the power of vocal tract modulation to some degree but they are unable to speak anything more than hoarse whispers without prosthetic aid. While whispering can be seen as a natural and secondary aspect of speech communications for most people, it becomes the primary mechanism of communications for those who have impaired voice production mechanisms, such as laryngectomees. In this paper, by considering the current limitations of speech reconstruction methods, a novel algorithm for converting whispers to normal speech is proposed and the efficiency of the algorithm is discussed. The proposed algorithm relies upon twin mapping models and makes use of artificially generated whispers (called whisperised speech) to regenerate natural phonated speech from whispers. Through a training-based approach, the mapping models exploit whisperised speech to overcome frame to frame time alignment problem in the speech reconstruction process.

    View record details
  • Free and open source intrusion detection systems : a study

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (2015-07)

    Conference paper
    Unitec

    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses and individuals. Intrusion detection systems (IDS) are considered to be an efficient way for detecting and preventing cyber security threats. However, there has been not enough attention and awareness on intrusion detection and prevention systems, especially among small businesses and individuals. Due to this, selection and deployment of IDS is significance in regard to this subject being considered highly technical, expensive and time consuming process. To overcome this, it is necessary to create an awareness of IDS tools which forms the basis of this paper. This study is the first phase of an ongoing research. In this phase, we present a detailed study of three free and open source IDS tools which are most popular in their respective categories. The IDS software used for this study are Suricata, a Network based Intrusion Detection System (NIDS), Samhain, a Host Based Intrusion Detection System (HIDS) and Ironbee, a universal web application firewall system. This study of IDS tools at one place will serve as a knowledge source for both technical and non-technical audience, small businesses which may not afford experienced security consultants. Further, this will also help in identifying suitable IDS software for their respective organization.

    View record details
  • Effect of channel impairments on radiometric fingerprinting

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (2015-12)

    Conference paper
    Unitec

    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer security is a new paradigm in which features extracted from an analog signal can be used to establish the unique identity of a transmitter. Our previous research work into Radiometric fingerprinting has shown that every transmitter has a unique fingerprint owing to imperfections in the analog components present in the RF front end. However, to the best of the author’s knowledge, no such example is available in the literature in which the effect of radio channel on Radiometric fingerprint is evaluated. This paper presents the simulation and experimental results for radiometric fingerprinting under an indoor varying radio channel. Contrary to popular assumption, it was found that the fingerprinting accuracy is little affected in an indoor channel environment.

    View record details
  • Evaluating mobile games for diabetes education

    Baghaei, Nilufar; Nandigam, David; Casey, John; Direito, Artur; Maddison, Ralph (2015-12)

    Conference paper
    Unitec

    Mobile games can be effective, evidence-based, and motivating tools for the promotion of children's health. Traditional method for diabetic education relies heavily on written materials and there is only a limited amount of resources targeted at educating diabetic children. In our earlier work, we proposed a novel approach for designing computer games aimed for educating children with diabetes. In this paper, we apply our game design to a mobile Android game (Mario Brothers). We also introduce three heuristics that are specifically designed for evaluating the mobile game, by adapting traditional usability heuristics. The results of a preliminary evaluation study, conducted for a week, showed that the children found the game engaging and it helped enhanced their knowledge of healthy diet and lifestyle.

    View record details
  • Analysis and prevention of account hijacking based incidents in cloud environment

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)

    Conference paper
    Unitec

    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and scalability. But at the same time, the incidence of malicious cyber activity is progressively increasing at an unprecedented rate posing critical threats to both government and enterprise IT infrastructure. Account or service hijacking is a kind of identity theft and has evolved to be one of the most rapidly increasing types of cyber- attack aimed at deceiving end users. This paper presents an in depth analysis of a cloud security incident that happened on The New York Times online using account hijacking. Further, we present incident prevention methods and detailed incident prevention plan to stop future occurrence of such incidents.

    View record details
  • Climate change, natural hazards and the Auckland Unitary Plan : too little too late?

    Murphy, Chris (2015-09)

    Conference paper
    Unitec

    Natural hazards remain a substantial risk for the people of Auckland, its property and its infrastructure. With over 3100 km of coastline and extensive urbanization, Auckland remains vulnerable to hazardous coastal erosion and accretion processes. This new city, which from the first of November 2010 became a new Unitary Authority through the amalgamation of 7 Territorial Authorities and 1 Regional Council, is required by law to instigate a new Auckland Unitary Plan. The final form of this Unitary Plan, particularly the section on natural hazards, will have long-term consequences for Auckland and its ability to mitigate the effects climate change will have on these coastal erosion processes. This paper will outline the background to the proposed Auckland Unitary Plan, analyze the public submissions in the section devoted to natural hazards, and comment on its intention (a first for a Unitary Plan in New Zealand) to include mapping of predicted coastal inundation and sea level rise across the Auckland isthmus. The writer will examine the effect the “new” policy approach to mitigating coastal hazards will have on the existing and future make up of urban settlements in low lying coastal areas. A case study will be presented.

    View record details
  • Saving the past : new challenges for earthquake prone buildings in New Zealand

    Murphy, Chris (2015-12)

    Conference paper
    Unitec

    The challenges facing heritage buildings in New Zealand will become all the more significant if legislation to strengthen building code requirements for these buildings is enacted. The strengthening proposals particularly affect old buildings constructed in unreinforced brick masonry. Many of these are “home shop” buildings with home accommodation above the ground floor retail space. Some have heritage value. The proposed legislation will affect all parts of New Zealand, regardless of the particular region’s exposure to earthquake risk. The implications of the upgrade are significant, both for owners and for townscape to which they belong. If the cost puts the viability of the building at risk, the owner will be in a position where demolition is the only feasible option. This could have far reaching implications for the social and heritage wellbeing of many small towns within New Zealand. This paper will report on the submissions to the proposed legislation, particularly as they relate to small-scale unreinforced brick masonry buildings. It will highlight strategies from those submissions that have the potential to enhance the life of some of these buildings, particularly in low risk earthquake zones, without unduly compromising cost and safety considerations.

    View record details
  • Constructing a professional education : a new architecture degree at Unitec 1994.

    Francis, Kerry (2015-12)

    Conference paper
    Unitec

    Abstract: In 1994 Unitec Institute of Technology welcomed its first cohort of enthusiastic students into the new Bachelor of Architecture programme within the School of Architecture and Construction. This new programme, a second architecture programme in Auckland city, was reportedly initiated by professional dissatisfaction with the lack of work preparedness of the graduates from the existing architecture programmes in the country. Little has been written, to date, about the origins of this new programme. Architecture programmes globally are evolving to meet contemporary needs and the discourse surrounding the beginnings of this programme may shed light on current trajectories. Situating the programme within a School of Architecture and Construction was part of a strategy to produce an architectural graduate who was more practice focused. But how was this intention manifest in the programme organisation and what were the distinctive features of this new programme that were designed to meet this objective? This paper will examine the originating documents and the context in which this programme was developed. It argues that, while the proposed curriculum and course structure contain elements that meet this professional, practice focused need, there are other elements embedded within the course that have a more expansive vision.

    View record details
  • An intelligent student advising system using collaborative filtering

    Ganeshan, Kathiravelu; Li, Xiaosong (2015-10)

    Conference paper
    Unitec

    We propose a web based intelligent student advising system using collaborative filtering, a technique commonly used in recommendation systems assuming that users with similar characteristics and behaviors will have similar preferences. With our advising system, students are sorted into groups and given advice based on their similarities to the groups. If a student is determined to be similar to a group students, a course preferred by that group might be recommended to the student. K-means algorithm has been used to determine the similarity of the students. This is an extremely efficient and simple algorithm for clustering analysis and widely used in data mining. Given a value of K, the algorithm partitions a data set into K clusters. Seven experiments on the whole data set and ten experiments on the training data set and testing data set were conducted. A descriptive analysis was performed on the experiment results. Based on these results, K=7 was identified as the most informative and effective value for the K-means algorithm used in this system. The high performance, merit performance and low performing student groups were identified with the help of the clusters generated by the K-means algorithm. Future work will make use of a two-phase approach using Cobweb to produce a balanced tree with sub-clusters at the leaves as in [11], and then applying K-means to the resulting sub-clusters. Possible improvements for the student model were identified. Limitation of this research is discussed.

    View record details
  • Adaptive background modeling for land and water composition scenes

    Zhao, Jing; Pang, Shaoning; Hartill, Bruce; Sarrafzadeh, Hossein (2015-09)

    Conference paper
    Unitec

    In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We compute an adaptive learning rate to account for changes on land and water composition scenes, in which the portion of water changes over time due to tidal dynamics and other environmental influences. Experimental comparative tests and quantitative performance evaluations of real-world boat-flow monitoring traffic sequences demonstrate the benefits of the proposed algorithm.

    View record details
  • Mobile devices as support systems for health behaviour change

    Nandigam, David; Baghaei, Nilufar; Liang, Haining (2015-05)

    Conference paper
    Unitec

    A Behaviour Change Support System (BCSS) is a socio-technical information system designed to form, alter, or reinforce attitudes, behaviours, or compliance to a regular patterns of activities, and they do so without the use of coercive or deceptive elements. A health BCSS (HBCSS) is then a BCSS aimed at influencing health behaviours and wellbeing in a positive way. Accordingly, mobile devices can represent ideal tools to become the enabler portals for HBCSS. In this research we provide a review of the literature on mobile applications to see if and how they can be classified as HBCSS. We focus our review on Type 1 Diabetes and emphasize on whether persuasive elements are used and, if so, how. This in turn will aid us to assess what is required for mobile devices to become HBCSS.

    View record details
  • A process mining technique using pattern recognition

    Liesaputra, Veronica; Yongchareon, Dr. Sira; Chaisiri, Sivadon (2015-06)

    Conference paper
    Unitec

    Several works have proposed process mining techniques to discover process models from event logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in event logs. Being restricted by that, they can only handle special cases of routing constructs and often produce unsound models that do not cover all of the traces in the logs. In this paper, we propose a novel technique for process mining based on using a pattern recognition technique called Maximal Pattern Mining (MPM). Our MPM technique can handle loops (of any length), duplicate tasks, non-free choice constructs, and long distance dependencies. Furthermore, by using the MPM, the discovered models are generally much easier to understand.

    View record details
  • Effect of quantization on competitive co-evolution algorithm - QCCEA versus CCEA

    Tirumala, Sreenivas Sremath; Nandigam, David; Ali, Shahid; Li, Zuojin (2015-02-15)

    Conference paper
    Unitec

    Quantum inspired Evolutionary Algorithm (QEA) which uses qubits has been the basis for the development of many Quantum Inspired algorithms. Di- verging from this, a new Quantum Inspired Competitive Co-evolution algorithm (QCCEA) has been proposed by quantifying Competitive Co-evolution Algorithm (CCEA) using a new method of representation. In the literature, the performance of QCCEA against CCEA was evaluated for numerical optimization problems. In this paper we have further analysed the performance of QCCEA using Maze problem which server as the primary investigation for combinatorial optimization problems. In the process of evaluating the performance of QCCEA against CCEA, we have performed three different experiments on the Maze problem. The results show that QCCEA has produced more diversified solutions compared to CCEA at the expense of time variable.

    View record details
  • The effect of vapour-control membrane technology on indoor air quality in buildings

    Berry, Terri-Ann; Chiswell, Jordan H.D (2015-11)

    Conference paper
    Unitec

    The impact of the inclusion of a vapour check membrane in timber buildings on indoor air quality, measured as volatile organic compounds (VOCs), was determined by Photo Ionization Detection. Two identical buildings were constructed except one building (test) contained an Intello vapour check membrane and the other building was the control. A VOC source (Wattyl Estapol High Performance Interior Clear Polyurethane Satin varnish) was placed in each building and the subsequent concentrations were monitored until background levels were resumed. Data analysis demonstrated that the VOC levels in the test house were consistently higher than those established in the control house (student t-test > 99.9% confidence). Average concentrations for VOC, temperature and relative humidity respectively were 3.23 ppm (control), 6.54 ppm (test); 17.3°C (control), 17.4°C (test) and 52.4% (control) and 54.7% (test). The humidity was also significantly higher in the test house (student t-test >99.9% confidence). Originally temperature differences were not found to be statistically conclusive; however this appeared to have been because the diurnal pattern of the temperature profile masked the difference in temperature. By removing this diurnal pattern, the temperatures in the houses were found to be significantly different over a 7 day timescale (student t-test >99.9% confidence). Diurnally, there was a strong link between VOC concentration and temperature and an inverse relationship with relative humidity. The use of the vapour control membrane had a significant effect on the indoor air quality of the buildings (based on the concentration of VOCs) which may have been due to: (1) the increased temperature and humidity, (2) the change in air flow from outside the buildings or (3) a combination of all three factors. There is a strong link between VOC concentration and temperature within the houses which may explain the highly variable profile of VOC concentration with time. An inverse relationship was observed with relative humidity.

    View record details