Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University for Business and Technology in Kosovo (38)
- Institute of Business Administration (24)
- Old Dominion University (17)
- Kennesaw State University (15)
- Kansas State University Libraries (12)
-
- University of Georgia School of Law (10)
- University of Nevada, Las Vegas (10)
- Embry-Riddle Aeronautical University (6)
- Murray State University (6)
- Purdue University (4)
- DePaul University (3)
- Western University (3)
- Clemson University (2)
- University of Nebraska at Omaha (2)
- Arcadia University (1)
- Cedarville University (1)
- James Madison University (1)
- Johnson County Community College (1)
- Minnesota State University, Mankato (1)
- Olivet Nazarene University (1)
- Southern Illinois University Carbondale (1)
- University of Nebraska at Kearney (1)
- Vocational Training Council (1)
- Wayne State University (1)
- Winona State University (1)
- Yale University (1)
- Keyword
-
- Bandwidth (3)
- Web portals (3)
- Wireless sensor networks (3)
- Algorithm (2)
- Authentication (2)
-
- Big Data (2)
- Collaboration (2)
- Computer architecture (2)
- Computer networks (2)
- Computer security (2)
- Cryptography (2)
- Database (2)
- Decoding (2)
- Delay (2)
- Digital preservation (2)
- Digitization (2)
- Environmental sciences – Computer network resources (2)
- GSM (2)
- Information Security (2)
- Information security (2)
- Information technology (2)
- Internet of Things (2)
- Java (2)
- Protocols (2)
- Routing protocols (2)
- Social networks (2)
- Wireless LAN (2)
- (q (1)
- 3D models (1)
- 3D printing (1)
- Publication Year
- Publication
-
- UBT International Conference (38)
- International Conference on Information and Communication Technologies (24)
- Cybersecurity Undergraduate Research Showcase (17)
- Central Plains Network for Digital Asset Management (12)
- Symposium of Student Scholars (11)
-
- Continuing Legal Education Presentations (10)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (8)
- Posters-at-the-Capitol (6)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (4)
- 2017 Academic High Altitude Conference (3)
- African Conference on Information Systems and Technology (3)
- Annual ADFSL Conference on Digital Forensics, Security and Law (3)
- Undergraduate Student Research Internships Conference (3)
- College of Engineering: Graduate Celebration Programs (2)
- Workshop on Data for AI in Network Systems (2)
- ASA Multidisciplinary Research Symposium (1)
- Capstone Showcase (1)
- Computer Science Graduate Research Workshop (1)
- Human Factors and Applied Psychology Student Conference (1)
- KSU Proceedings on Cybersecurity Education, Research and Practice (1)
- Mountain Plains Business Conference (1)
- National Training Aircraft Symposium (NTAS) (1)
- Practical Social and Industrial Research Symposium (1)
- Ramaley Celebration (1)
- SIDLIT Conference (1)
- Scholar Week 2016 - present (1)
- Scholars Cooperative Brown Bag Series (1)
- Showcase of Graduate Student Scholarship and Creative Activities (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- UNO Student Research and Creative Activity Fair (1)
- File Type
Articles 151 - 164 of 164
Full-Text Articles in Computer Engineering
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
International Conference on Information and Communication Technologies
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
International Conference on Information and Communication Technologies
In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
International Conference on Information and Communication Technologies
Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate …
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
International Conference on Information and Communication Technologies
Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
International Conference on Information and Communication Technologies
The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
International Conference on Information and Communication Technologies
Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of way point routing (WPR) model is proposed, …
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
International Conference on Information and Communication Technologies
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
International Conference on Information and Communication Technologies
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
International Conference on Information and Communication Technologies
The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
A Review Study On Digital Watermarking, Jian Liu, Xiangjian He
A Review Study On Digital Watermarking, Jian Liu, Xiangjian He
International Conference on Information and Communication Technologies
There has been a rapid development in the growth of multimedia and communications in the past few years. With the widespread use of the networks, intellectual properties can be obtained, reproduced or redistributed easily. This creates a high demand for content protection techniques. Watermarking, one of the most efficient ways to protect the digital properties has won more and more concern in recent years. This paper reviews several aspects about digital watermarking. Among them, we mainly focus on three processes of digital watermarking. Also, we will examine the properties of watermarking and several applications of watermarking. At last, this paper …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.
Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam
Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam
International Conference on Information and Communication Technologies
Telecommunications over the past one hundred years has had a major influence on the development of society. Telecommunications will continue to play an increasingly important role in nearly every human endeavour in all nations of the earth. Telecommunication industry is currently facing a technological revolution. In many countries, the number of cellular radio subscribers exceeds the subscribers of fixed telephony services. Internet technologies, such as VoIP and SIP, allow the convergence of traditional switched telephony services and data services of the internet to converge. New wireless access technologies compete and complete the services provided by the modern cellular radio networks. …