Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (17)
- Singapore Management University (15)
- California Polytechnic State University, San Luis Obispo (10)
- University of Kentucky (8)
- University of Nebraska - Lincoln (7)
-
- Air Force Institute of Technology (6)
- Old Dominion University (6)
- Technological University Dublin (6)
- Selected Works (5)
- DePaul University (3)
- Embry-Riddle Aeronautical University (3)
- University of New Mexico (3)
- University of North Florida (3)
- City University of New York (CUNY) (2)
- Louisiana State University (2)
- Michigan Technological University (2)
- New Jersey Institute of Technology (2)
- University of Arkansas, Fayetteville (2)
- University of Pennsylvania Carey Law School (2)
- Western University (2)
- Cedarville University (1)
- East Tennessee State University (1)
- Edith Cowan University (1)
- Florida International University (1)
- Kennesaw State University (1)
- Liberty University (1)
- Montclair State University (1)
- Morehead State University (1)
- Seattle Pacific University (1)
- South Dakota State University (1)
- Keyword
-
- Cloud computing (4)
- Internet (4)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (3)
- Android (3)
- Communication (3)
-
- Controls (3)
- OpenFlow (3)
- Social media (3)
- Thesis; University of North Florida; UNF; Dissertations (3)
- App (2)
- Arduino (2)
- Automation (2)
- Biometrics (2)
- CAN (2)
- Chaos (2)
- Cloud security (2)
- Content analysis (2)
- Data analytics (2)
- Honeypot (2)
- Industrial control systems (2)
- MPI (2)
- Noise (2)
- Privacy (2)
- SDN (2)
- Security (2)
- Smartphones (2)
- #antcenter (1)
- AFN (1)
- Academic -- UNF -- Computing; Cloud Computing; Infrastructure-as-a-Service; Benchmarking; Performance evaluation (1)
- Academic -- UNF -- Computing; Cloud Platforms; HIbench tools; Big Data Applications; Performance Evaluations (1)
- Publication
-
- Journal of International Technology and Information Management (17)
- Research Collection School Of Computing and Information Systems (12)
- Information Science Faculty Publications (5)
- Theses and Dissertations (5)
- Conference papers (4)
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (3)
- Computer Science and Software Engineering (3)
- UNF Graduate Theses and Dissertations (3)
- 2017 Academic High Altitude Conference (2)
- All Faculty Scholarship (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (2)
- CSE Technical Reports (2)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Computer Engineering (2)
- Dissertations and Theses Collection (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Thesis and Dissertation Repository (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- LSU Doctoral Dissertations (2)
- Master's Theses (2)
- Matt Schultz (2)
- Mechanical Engineering (2)
- Publications and Research (2)
- The ITB Journal (2)
- Theses (2)
- AFIT Patents (1)
- CDM Annual Reports (1)
- Community & Leadership Development Faculty Publications (1)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
Articles 91 - 120 of 120
Full-Text Articles in Computer Engineering
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler
Publications and Research
Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many aggregators …
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz
Journal of International Technology and Information Management
Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
CSE Technical Reports
In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information and feedback mechanism to improve performance wireless underground communications. Array element in soil has been analyzed empirically and impacts of soil type and soil moisture on return loss and resonant frequency are investigated. Beam patterns are investigated to communicate with both underground and above ground devices. Depending on the incident angle, refraction from soil-air interface has the adverse effects in the UG communications. It is …
Annual Report 2016-2017, Depaul University College Of Computing And Digital Media
Annual Report 2016-2017, Depaul University College Of Computing And Digital Media
CDM Annual Reports
The College of Computing and Digital Media has always prided itself on curriculum, creative work, and research that stays current with changes in our various fields of instruction. As we looked back on our 2016-17 academic year, the need to chronicle the breadth and excellence of this work became clear. We are pleased to share with you this annual report, our first, highlighting our accomplishments.
Last year, we began offering three new graduate programs and two new certificate programs. We also planned six degree programs and three new certificate programs for implementation in the current academic year. CDM faculty were …
Contributions To Edge Computing, Vernon K. Bumgardner
Contributions To Edge Computing, Vernon K. Bumgardner
Theses and Dissertations--Computer Science
Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.
Edge Computing is the migration of computational functionality to sources of data generation. The importance of …
Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval
Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval
UNF Graduate Theses and Dissertations
Cloud Computing is an emerging paradigm in the field of computing where scalable IT enabled capabilities are delivered ‘as-a-service’ using Internet technology. The Cloud industry adopted three basic types of computing service models based on software level abstraction: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Infrastructure-as-a-Service allows customers to outsource fundamental computing resources such as servers, networking, storage, as well as services where the provider owns and manages the entire infrastructure. This allows customers to only pay for the resources they consume. In a fast-growing IaaS market with multiple cloud platforms offering IaaS services, the user's decision on the selection …
Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms.
Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms.
UNF Graduate Theses and Dissertations
Cloud computing is a computing paradigm where large numbers of devices are connected through networks that provide a dynamically scalable infrastructure for applications, data and storage. Currently, many businesses, from small scale to big companies and industries, are changing their operations to utilize cloud services because cloud platforms could increase company’s growth through process efficiency and reduction in information technology spending [Coles16]. Companies are relying on cloud platforms like Amazon Web Services, Google Compute Engine, and Microsoft Azure, etc., for their business development.
Due to the emergence of new technologies, devices, and communications, the amount of data produced is growing …
Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker
Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker
Journal of International Technology and Information Management
Table of Contents JITIM vol 26 issue 1, 2017
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Computational Modeling & Simulation Engineering Faculty Publications
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions …
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …
Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo
Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo
Theses and Dissertations--Electrical and Computer Engineering
Most systems in HPC make use of hierarchical designs that allow multiple levels of parallelism to be exploited by programmers. The use of multiple multi-core/multi-processor computers to form a computer cluster supports both fine-grain and large-grain parallel computation. Aggregate function communications provide an easy to use and efficient set of mechanisms for communicating and coordinating between processing elements, but the model originally targeted only fine grain parallel hardware. This work shows that a hierarchical implementation of aggregate functions is a viable alternative to MPI (the standard Message Passing Interface library) for programming clusters that provide both fine grain and large …
Computation Of Shortest Path Problem In A Network With Sv-Triangular Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Computation Of Shortest Path Problem In A Network With Sv-Triangular Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Branch Mathematics and Statistics Faculty and Staff Publications
In this article, we present an algorithm method for finding the shortest path length between a paired nodes on a network where the edge weights are characterized by single valued triangular neutrosophic numbers. The proposed algorithm gives the shortest shortest path length from source node to destination node based on a ranking method. Finally, a numerical example is also presented to illustrate the efficiency of the proposed approach.
Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden
Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden
UNF Graduate Theses and Dissertations
In this thesis, the improvement to relevance in computerized search results is studied. Information search tools return ranked lists of documents ordered by the relevance of the documents to the user supplied search. Using a small number of words and phrases to represent complex ideas and concepts causes user search queries to be information sparse. This sparsity challenges search tools to locate relevant documents for users. A review of the challenges to information searches helps to identify the problems and offer suggestions in improving current information search tools. Using the suggestions put forth by the Strategic Workshop on Information Retrieval …
Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783
Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783
Journal of International Technology and Information Management
Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman
Journal of International Technology and Information Management
There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran
Journal of International Technology and Information Management
In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr
Journal of International Technology and Information Management
Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …
The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond
The Ipv6 Internet: An Assessment Of Adoption And Quality Of Services, John Pickard, John Southworth, Dale Drummond
Journal of International Technology and Information Management
The goal of this study is to deliver both an in-depth comprehensive analysis of the current state of IPv6 adoption and an assessment of the quality of services over the IPv6 Internet. Our assessment comprises an examination of eight data sets used to produce a comprehensive picture of IPv6 adoption across 12 metrics. We assessed the quality of services over the IPv6 Internet using eight globally distributed monitoring agents to compare the HTTP load times to targeted websites over IPv6 and IPv4. The results of our analysis confirm the findings of previous studies showing that IPv6 is in an accelerating …
Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari
Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari
Journal of International Technology and Information Management
This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
Branch Mathematics and Statistics Faculty and Staff Publications
The paper aims to explain the technology of emergence of information. Our research proves that information as communicational product is the result of processing within some operations, actions, mechanisms and strategies of informational material meanings. Are determined eight computational-communicative operations of building information. Information occurs in two communication phases, syncretic and the segregation-synthetic. The syncretic phase consists of four operations: referral of significant field, primary delimitation of information, detection-looking information and an anticipative-draft constitution (feedforward). The segregation-synthetic phase also includes four operations: discrimination, identification, interpretation and confrontation (feedback). In the future we will investigate informational actions, mechanisms and strategies.
A Dynamic Scaling Methodology For Improving Performance Of Big Data Systems, Nashmiah Alhamdawi
A Dynamic Scaling Methodology For Improving Performance Of Big Data Systems, Nashmiah Alhamdawi
Electronic Theses and Dissertations
The continuous growth of data volume in various fields such as, healthcare, sciences, economics, and business has caused an overwhelming flow of data in the last decade. The overwhelming flow of data has raised challenges in processing, analyzing, and storing data, which lead many systems to face an issue in performance. Poor performance of systems creates negative impact such as delays, unprocessed data, and increasing response time. Processing huge amounts of data demands a powerful computational infrastructure to ensure that data processing and analysis success [7]. However, the architectures of these systems are not suitable to process that quantity of …
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
Engineering Technology Faculty Publications
A distinctive feature of wireless communication systems is implied by the fact that there is no physical connection between the transmitter and its corresponding receiver, which enables user mobility. However, experimenting with wireless communication systems is mostly done in the lab, where transmitters and receivers are setup on benches, in stationary settings. This prevents students from experiencing fading and other propagation effects associated with mobile wireless channels. This paper describes a mobile platform for wireless communication experimentation that enables students to run experiments beyond the confines of a traditional lab, in realistic settings that cover indoor and outdoor scenarios with …
Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio
Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio
Conference papers
In this paper we analyse how the behavior of an online financial community in time of geopolitical crises. In particular, we studied the behaviour, composition and communication patterns of online investors before and after a military geopolitical event. We selected a set of 23 key-events belonging to the 2003 US-led invasion of Iraq, the Arab Spring and the first period of the Ukraine crisis. We restricted our study to a set of eight so called military stocks, which are US-manufacturing companies active in the defence sector. We studied the resilience of the community to information shocks by comparing the community …
High Performance Multiview Video Coding, Caoyang Jiang
High Performance Multiview Video Coding, Caoyang Jiang
Dissertations, Master's Theses and Master's Reports
Following the standardization of the latest video coding standard High Efficiency Video Coding in 2013, in 2014, multiview extension of HEVC (MV-HEVC) was published and brought significantly better compression performance of around 50% for multiview and 3D videos compared to multiple independent single-view HEVC coding. However, the extremely high computational complexity of MV-HEVC demands significant optimization of the encoder. To tackle this problem, this work investigates the possibilities of using modern parallel computing platforms and tools such as single-instruction-multiple-data (SIMD) instructions, multi-core CPU, massively parallel GPU, and computer cluster to significantly enhance the MVC encoder performance. The aforementioned computing tools …
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Information Technology & Decision Sciences Faculty Publications
The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …
Guaranteed Rendezvous For Cognitive Radio Networks Based On Cycle Length, Li Gou
Guaranteed Rendezvous For Cognitive Radio Networks Based On Cycle Length, Li Gou
Dissertations, Master's Theses and Master's Reports
Rendezvous is a fundamental process establishing a communication link on common channel between a pair of nodes in the cognitive radio networks. How to reach rendezvous efficiently and effectively is still an open problem. In this work, we propose a guaranteed cycle lengths based rendezvous (CLR) algorithm for cognitive radio networks. When the cycle lengths of the two nodes are coprime, the rendezvous is guaranteed within one rendezvous period considering the time skew between the two nodes. When Ti and Tj are not coprime, i.e., Ti=Tj, the deadlock checking and node IDs are combined …
Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim