Now showing items 245-264 of 304

    • Radio Frequency fingerprinting and its challenges 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq; Ardekani, Iman (IEEE CNS, 2014)
      RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • Reducing ICT carbon footprints through adoption of green computing 

      Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)
      A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ...
    • A reliability evaluation of wireless sensor network simulator: Simulation vs. testbed 

      Guan, Zheng Yi (Alex) (2011)
      Wireless Sensor Network (WSN) is the new generation of sensor network which combines micro-electronic technology, embedded computing technology, distributed information processing technology, networking and wireless ...
    • Remote FxLMS algorithm for active control of sound in remote locations 

      Ardekani, Iman; Abdulla, W. H.; Rehman, Saeed (Asia-Pacific Signal and Information Processing Association (APSIPA), 2014)
      Available adaptive control algorithms can only create a silent point at the locations of an error microphone. In this case, the error microphone occupies a part of the zone of quiet established around the silent point, ...
    • Requirements engineering process improvement in health IT projects. Master’s Thesis 

      Chitti, Anupama (2013)
      Research has proved that requirements engineering in e-health projects is a challenge. Many of the ehealth software end-users do not believe in investment in this process and e-health vendors find it challenging to deliver ...
    • RF fingerprinting : research opportunities 

      Rehman, Saeed; Sowerby, K.W.; Alam, Shafiq (Asia Pacific Signal and Information Processing Association (APSIPA), 2015-01)
      Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
    • RFID technology introduction and impacts on supply chain management systems 

      Rochel, Roman (2006)
      Today’s dynamic and competitive business environment puts an ever increasing pressure on companies to innovate, redesign processes, and leverage the potential of partnerships along the supply chain. One of the technologies ...
    • Role-based process view derivation and composition 

      Zhao, X.; Liu, Chengfei; Yongchareon, Dr. Sira; Kowalkiewicz, M.; Sadiq, W. (Association for Computing Machinery (ACM), 2015-05)
      The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for ...
    • A route map for wireless sensor networks over large coverage area 

      Jain, R.; Adhikary, P. S.; Ramirez-Prado, Guillermo; Barmada, Bashar; Ardekani, Iman (2018-10)
      This paper presents a mechanism to increase the coverage area of Wireless Sensor Networks (WSN) and increase the availability of wireless nodes. The proposed solution relies purely on open standards that implement 6LoWPAN ...
    • RunJumpCode : an educational game for educating programming 

      Hinds, M.; Baghaei, Nilufar; Ragon, P.; Lambert, J.; Dajakaruna, T.; Houghton, T.; Dacey, Simon (International Association for the Development of the Information Society (IADIS), 2017-04-12)
      Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. ...
    • SAP®’s Univariate Sales Forecasting Functionality: An Empirical Study 

      Catt, Peter (2007)
      The accuracy of sales forecasts is a major determinant of inventory costs and service level driven revenues. Failure to establish future customer demand without a reasonable degree of certainty often leads to poor levels ...
    • Scaffolding asynchronous communication 

      Collecutt, Richard (2008)
      This research identifies and studies the techniques and strategies used by New Zealand tertiary tutors in the process of encouraging participation, and ultimately learning, when using online asynchronous discussion forums. ...
    • A scenario based performance analysis of VANET protocols 

      Alobaidi, Naji (2017)
      Inter-vehicle communication is a major part of the Intelligent Transportation Systems (ITS). Vehicular Ad-Hoc Network (VANET) was primarily developed to improve safety and comfort for vehicles, passengers and drivers. ...
    • SecTrust : a trust and recommendation system for Peer-2-Peer networks 

      Airehrour, David; Gutierrez, J.; Ray, S. K. (International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL), 2018-06)
      The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, ...
    • Security effectiveness of virtual DMZ in private clouds 

      Kaur, Navneet (2014)
      Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own ...
    • Security in Virtual DMZ designs 

      Sathu, Hira; Komosny, Dan; Singh, S. (Global Business and Technology Association (New York), 2014-07)
      Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized ...
    • Security of Wireless Devices using Biological-Inspired RF Fingerprinting Technique 

      Rehman, Saeed; Alam, Shafiq; Ardekani, Iman (IGI Global, 2014-11-23)
      Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...
    • A Self-Organization Mechanism Based on Cross-Entropy Method for P2P-Like Applications 

      Sarrafzadeh, Hossein; Chen, Gang (2010)
      P2P-like applications are quickly gaining popularity in the Internet. Such applications are commonly modeled as graphs with nodes and edges. Usually nodes represent running processes that exchange information with each ...
    • Service provision control in federated service providing systems 

      Chen, Gang; Sarrafzadeh, Hossein; Pang, Shaoning (2013-03)
      Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ...
    • Simulation model, warm-up period, and simulation length of cellular systems 

      Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2011-01-25)
      In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. ...