Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Real-World Performance Of Current Proactive Multi-Hop Mesh Protocols, M. Abolhasan, Brett Hagelstein, Jerry Chun-Ping Wang Oct 2009

Real-World Performance Of Current Proactive Multi-Hop Mesh Protocols, M. Abolhasan, Brett Hagelstein, Jerry Chun-Ping Wang

Faculty of Informatics - Papers (Archive)

The proliferation of mesh or ad hoc network protocols has lead to a push for protocol standardisation. While there are a number of both open-source and proprietary mesh routing protocols being developed, there is only a small amount of literature available that shows relative strengths and weaknesses of different protocols. This paper investigates the performance of a number of available routing protocols using a real-world testbed. Three routing protocols - Optimised Link State Routing (OLSR), Better Approach To Mobile Ad hoc Network (B.A.T.M.A.N.) and BABEL - were chosen for this study. Our investigations focus on the multi-hopping performance and the …


Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Apr 2008

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Faculty of Informatics - Papers (Archive)

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.


Statistical Pos Tagging Experiments On Persian Text, F. Raja, S. Tasharofi, Farhad Oroumchian Jan 2007

Statistical Pos Tagging Experiments On Persian Text, F. Raja, S. Tasharofi, Farhad Oroumchian

University of Wollongong in Dubai - Papers

Part-Of-Speech (POS) tagging is the process of marking-up the words in a text with their corresponding parts of speech. It is an essential part of text and natural language processing. There are many models and software for POS tagging in English and other European languages. Little work has been done on POS tagging of Persian language which uses Arabic script for writing. In these experiments we want to see how effective would be if we just applied a POS tagger from a language such as English to Persian. Although English and Persian are both Indo-European languages but they have subtle …


Using Owa Fuzzy Operator To Merge Retrieval System Results, H. Amiri, A. Aleahmad, Farhad Oroumchian, C. Lucas, M. Rahgozar Jan 2007

Using Owa Fuzzy Operator To Merge Retrieval System Results, H. Amiri, A. Aleahmad, Farhad Oroumchian, C. Lucas, M. Rahgozar

University of Wollongong in Dubai - Papers

With rapid growth of information sources, it is essential to develop methods that retrieve most relevant information according to the user requirements. One way of improving the quality of retrieval is to use more than one retrieval engine and then merge the retrieved results and show a single ranked list to the user. There are studies that suggest combining the results of multiple search engines will improve ranking when these engine are treated as independent experts. In this study, we investigated performance of Persian retrieval by merging four different language modeling methods and two vector space models with Lnu.ltu and …


A Vector Based Method Of Ontology Matching, Z. Eidoon, N. Yazdani, Farhad Oroumchian Jan 2007

A Vector Based Method Of Ontology Matching, Z. Eidoon, N. Yazdani, Farhad Oroumchian

University of Wollongong in Dubai - Papers

Semantic interoperability is highly influenced by similarities and differences which exist between ontologies. Ontology matching as a solution for finding corresponding concepts among ontologies has emerged to facilitate semantic based negotiations of applications. This paper presents a method of ontology matching which is based on vectorizing ontologies and estimating their similarity degree. A post processing with two heuristic rules also has been employed to improve the results. The proposed method is successfully applied to the test suit of Ontology Alignment Evaluation Initiative 2005 [10] and compared to results obtained by other methods. In general the preliminary results are encouraging and …


Fufair: A Fuzzy Farsi Information Retrieval System, A. Nayyeri, Farhad Oroumchian Jan 2006

Fufair: A Fuzzy Farsi Information Retrieval System, A. Nayyeri, Farhad Oroumchian

University of Wollongong in Dubai - Papers

Persian (Farsi) is one of the languages of Middle East. There are significant amount of Persian documents available in digital form and even more are created every day. Therefore, there is a necessity to implement Information Retrieval System with high precision for this language. This paper discusses the design, implementation and testing of a Fuzzy retrieval system for Persian called FuFaIR. This system also supports Fuzzy quantifiers in its query language. Tests have been conducted using a standard Persian test corpus called Hamshari. The performance results obtained from FuFaIR are positive and they indicate that the FuFaIR could notably outperform …


Clusid: A Clustering Scheme For Intrusion Detection, Improved By Information Theory, R. Shokri, Farhad Oroumchian, N. Yazdani Jan 2005

Clusid: A Clustering Scheme For Intrusion Detection, Improved By Information Theory, R. Shokri, Farhad Oroumchian, N. Yazdani

University of Wollongong in Dubai - Papers

Security is a big issue for all networks in any enterprise environment. Many solutions have been proposed to secure the network infrastructure and communication over the Internet. Intrusion Detection Systems with many different techniques such as data mining approaches are employed to maximize the detection rate of intrusions while reducing false alarm rate. For instance, many clustering techniques are recommended which segregate normal and abnormal data in IDSs. Clustering methods put emphasis on finding differences and similarities of traffic sessions to categorize each one in its corresponding groups. These groups are represented by their assigned labels. Later, these labels are …


Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray Jan 2005

Performance Of Java Middleware - Java Rmi, Jaxrpc, And Corba, N. A. B. Gray

Faculty of Informatics - Papers (Archive)

Developers of distributed Java systems can now choose among Java-RMI, CORBA, and Web-Service (JAXRPC) middleware technologies. Performance is one factor that has to be considered in choosing the appropriate technology for a particular application. The results presented in this paper show that the nature of response data has a greater impact on relative performance than has been allowed for in most previous studies. Relative performances of the technologies as measured on simple requests and responses are not representative of the behaviour that can be expected in practical applications.


Near-Distance Software Engineering Education, F. O'Brien Jan 1994

Near-Distance Software Engineering Education, F. O'Brien

Faculty of Informatics - Papers (Archive)

The University of Wollongong has been seeking ways by which it can attract capable students from the southern side of the States capital city, Sydney, Australia. The paper describes the concept of limiting the required daily travel to the University through an amalgam of technologies, and changes to the core teaching syllabus. Progress through 1994, and plans for full introduction in 1995, is described.