Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari Jan 2015

Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari

Theses: Doctorates and Masters

With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems.

Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never ...


On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji Jan 2013

On A Joint Physical Layer And Medium Access Control Sublayer Design For Efficient Wireless Sensor Networks And Applications, Mahir Lumumba Meghji

Theses: Doctorates and Masters

Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN).

Future applications may require large WSNs consisting of huge numbers of inexpensive ...


An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt Jan 2012

An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt

Theses: Doctorates and Masters

The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric ...


An Investigation Into Internetworking Education., Woratat Makasiranondh Jan 2011

An Investigation Into Internetworking Education., Woratat Makasiranondh

Theses: Doctorates and Masters

Computer network technology and the Internet grew rapidly in recent years. Their growth created a large demand from industry for the development of IT and internetworking professionals. These professionals need to be equipped with both technical hands-on skills and non-technical or soft skills. In order to supply new professionals to the industry, educational institutions need to address these skills training in their curricula. Technical hands-on skills in internetworking education can be emphasised through the practical use of equipment in classrooms. The provision of the networking equipment to the internetworking students is a challenge. Particularly, university students in developing countries may ...


Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen Jan 2009

Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen

Theses: Doctorates and Masters

Every second, vast amounts of data are transferred over communication systems around the world, and as a result, the demands on optical infrastructures are extending beyond the traditional, ring-based architecture. The range of content and services available from the Internet is increasing, and network operations are constantly under pressure to expand their optical networks in order to keep pace with the ever increasing demand for higher speed and more reliable links.


Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang Jan 2006

Design Of Survivable Wdm Network Based On Pre-Configured Protection Cycle, Byungkyu Kang

Theses: Doctorates and Masters

Wavelength Division Multiplexing (WDM) is an important technique which allows the trans- port of large quantities of data over optical networks. All optical WDM-based networks have been used to improve overall communication capacity and provide an excellent choice for the design of backbone networks. However, due to the high traffic load that each link can carry in a WDM network, survivability against failures becomes very important. Survivability in this context is the ability of the network to maintain continuity of service against failures, since a failure can lead to huge data losses. In recent years, many survivability mechanisms have been ...


An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli Jan 2005

An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli

Theses: Doctorates and Masters

This thesis consists of a series of internationally published, peer reviewed, conference research papers and one journal paper. The papers evaluate and further develop two modelling methods for use in Information Technology (IT) design and for the educational and training needs of students within the area of computer and network technology. The IT age requires technical talent to fill positions such as network managers, web administrators, e-commerce consultants and network security experts as IT is changing rapidly, and this is placing considerable demands on higher educational institutions, both within Australia and internationally, to respond to these changes.


The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai Jan 2003

The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai

Theses: Doctorates and Masters

The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data ...


Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao Jan 2001

Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao

Theses: Doctorates and Masters

Asynchronous Transfer Mode (ATM) technology is widely employed for the transport of network traffic, and has the potential to be the base technology for the next generation of global communications. Connection Admission Control (CAC) is the effective traffic control mechanism which is necessary in ATM networks in order to avoid possible congestion at each network node and to achieve the Quality-of-Service (QoS) requested by each connection. CAC determines whether or not the network should accept a new connection. A new connection will only be accepted if the network has sufficient resources to meet its QoS requirements without affecting the QoS ...


Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed Jan 2000

Development Of Self-Adaptive Back Propagation And Derivative Free Training Algorithms In Artificial Neural Networks, Shamsuddin Ahmed

Theses: Doctorates and Masters

Three new iterative, dynamically self-adaptive, derivative-free and training parameter free artificial neural network (ANN) training algorithms are developed. They are defined as self-adaptive back propagation, multi-directional and restart ANN training algorithms. The descent direction in self-adaptive back propagation training is determined implicitly by a central difference approximation scheme, which chooses its step size according to the convergence behavior of the error function. This approach trains an ANN when the gradient information of the corresponding error function is not readily available. The self- adaptive variable learning rates per epoch are determined dynamically using a constrained interpolation search. As a result, appropriate ...


Bandwidth Management And Quality Of Service, Adalbert Engel Jan 2000

Bandwidth Management And Quality Of Service, Adalbert Engel

Theses: Doctorates and Masters

With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses ...


The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples Jan 1996

The Mobile Telephone: The Transportation Of Social Relationships, Kenneth C. Staples

Theses: Doctorates and Masters

In the studies of contemporary electronic media artifacts and their effects on society, television, satellites, and computers have been extensively investigated and their various impacts well documented. With regards to telecommunication technologies, academic scholarship is somewhat less, with most comment being restricted to either historic evolution, or technical description. Exceptions to this are, Marvin's reference to the telephone in her publication, When Old Technologies Were New: Thinking About Electronic Communication in the Late Nineteenth Century (1988}, and Umble's The Amish and the telephone: resistance and reconstruction (1992). Both of these publications are used for supporting arguments in my ...