Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Network economic effects (2)
- Telecommunications (2)
- [RSTDPub] (2)
- 1.2 COMPUTER AND INFORMATION SCIENCE (1)
- 2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING (1)
-
- ADCR (1)
- Algorithms (1)
- Analysis (1)
- Ant colony optimization (1)
- Antenna arrays (1)
- Antennas (1)
- Archiving repository crawler (1)
- Archivists (1)
- Bicodes (1)
- Blog (1)
- Blogs (1)
- Broadband properties (1)
- Cable modem (1)
- Communication engineering and systems (1)
- Complex systems (1)
- Computer Sciences (1)
- Computer hardware and architecture (1)
- Computer network education (1)
- Computer-assisted instruction (1)
- Congestion (1)
- Cross-layer routing algorithm (1)
- Cryptology (1)
- Cryptosystem (1)
- DSL (1)
- Data disposal (1)
- Publication
-
- Research outputs pre 2011 (7)
- All Faculty Scholarship (2)
- Computer Science Faculty Publications (2)
- Architectural and Manufacturing Sciences Faculty Publications (1)
- Articles (1)
-
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CGU Faculty Publications and Research (1)
- Conference papers (1)
- Doctoral (1)
- EDU-COM International Conference (1)
- Faculty Publications (1)
- Library Papers and Presentations (1)
- NIMBUS Articles (1)
- Publications (1)
- Research Collection School Of Computing and Information Systems (1)
- SIDLIT Conference Proceedings (1)
Articles 1 - 24 of 24
Full-Text Articles in Computer Engineering
A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes
A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes
Publications
A three-dimensional pattern-space representation is presented for volumetric arrays. In this representation, the radiation pattern of an array is formed by the evaluation of the three-dimensional pattern-space on a spherical surface. The scan angle of the array determines the position of this surface within the pattern-space. This pattern-space representation is used in conjunction with a genetic algorithm to minimize the sidelobe levels exhibited by a thinned volumetric array during scanning.
Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis
Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis
Conference papers
In recent years Wireless Mesh Networks have been deployed and grown in popularity in many metropolitan areas. The deployment of such networks has allowed clients to gain access to publicly available broadband networks. The implementation of wireless mesh networks requires that backhaul services (traditionally carried by wired networks) be maintained via wireless mesh points. Because of their structure, wireless mesh networks provide an excellent means for targeting a large group of end users or simply to relay data. This may be achieved by means of broadcasting or more specifically multicasting. The lack of standards and support for multicasting over wireless …
The Interactive Research Guide: Will Function Bring Users Content? A Project Model Illustrated By A Proposed Paper-Writing Guide, Barry J. Bailey
The Interactive Research Guide: Will Function Bring Users Content? A Project Model Illustrated By A Proposed Paper-Writing Guide, Barry J. Bailey
Library Papers and Presentations
After reviewing the history of subject guides and their movement into an electronic format, their is an opportunity to change the format of information providing. Whereas a user goes to guides for lists of content, perhaps a user can go to guides to execute a function. By walking through the creation of a paper-writing guide, this idea of a functioning guide is illustrated.
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …
Building A Blog From Scratch, Jonathan Bacon
Building A Blog From Scratch, Jonathan Bacon
SIDLIT Conference Proceedings
The presenter takes the audience step-by-step through the creation of a Weblog, a tool which can be used for distance education.
E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee
E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee
CGU Faculty Publications and Research
As XML becomes a standard for communications between distributed heterogeneous machines, many schools plan to implement Web Services systems using the XML e-transcript (electronic transcript) standard. We propose a framework that supports both XML e-transcript Web Services and existing EDI e-transcript systems. The framework uses the workflow engine to exploit the benefits of workflow management mechanisms. The workflow engine manages the e-transcript business process by enacting and completing the tasks and sub-processes within the main business process. We implemented the proposed framework by using various open source projects including Java, Eclipse, and Apache Software Foundation’s Web Services projects. Compared with …
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Blog/news search engines are very important channels to reach information about the real-time happenings. In this paper, we study the popular queries collected over one year period and compare their search results returned by a blog search engine (i.e., Technorati) and a news search engine (i.e., Google News). We observed that the numbers of hits returned by the two search engines for the same set of queries were highly correlated, suggesting that blogs often provide commentary to current events reported in news. As many popular queries are related to some events, we further observed a high cohesiveness among the returned …
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …
Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch
Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch
NIMBUS Articles
We present an improved version of adaptive distributed cross-layer routing algorithm (ADCR) for hybrid wireless network with dedicated relay stations () in this paper. A mobile terminal (MT) may borrow radio resources that are available thousands mile away via secure multihop RNs, where RNs are placed at pre-engineered locations in the network. In rural places such as mountain areas, an MT may also communicate with the core network, when intermediate MTs act as relay node with mobility. To address cross-layer network layers routing issues, the cascaded ADCR establishes routing paths across MTs, RNs, and cellular base stations (BSs) and provides …
Antennas For Portable Communications In The Uwb And Gps Spectra., Giuseppe Ruvio
Antennas For Portable Communications In The Uwb And Gps Spectra., Giuseppe Ruvio
Doctoral
The thesis describes a study of antennas for solutions in emerging systems. An account of the fundamental principles of these antennas is given together with an outline of the basic electromagnetic theory on which the designs are based. While the main focus is on antennas for Ultra Wideband (UWB) systems, some additional work was carried out on enhancing performance of circularly polarised antennas for satellite navigation systems. The study focussed on the design of highly efficient broadband antennas with particular requirements for size compactness, gain stability, phase-linearity, and the use of low-cost materials. These requirements are particularly important for UWB …
Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry
Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry
Articles
Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …
The Videoconferencing Classroom: What Do Students Think?, Dr. Anthony Mark Doggett
The Videoconferencing Classroom: What Do Students Think?, Dr. Anthony Mark Doggett
Architectural and Manufacturing Sciences Faculty Publications
The advantages of video conferencing in educational institutions are well documented. Scholarly literature has indicated that videoconferencing technology reduces time and costs between remote locations, fill gaps in teaching services, increases training productivity, enables meetings that would not be possible due to prohibitive travel costs, and improves access to learning (Martin, 2005; Rose, Furner, Hall, Montgomery, Katsavras, & Clarke, 2000; Townes-Young & Ewing, 2005; West, 1999). However, there are few studies that analyze the effectiveness of videoconferencing from the student’s perspective. Videoconferencing technology is often touted as a method to connect with previously inaccessible student populations, but does it adequately …
Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal
Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal
EDU-COM International Conference
Within the higher education domain, there is a prevalent belief that e-learning, virtual classroom and tele-education are essential requirements for the long-term effectiveness and success of educational institutions. Many information technologies have been adopted to assist studying and learning remotely and are hence potentially beneficial to students, teachers and educational providers. For educational providers, the benefits are that there are no physical or geographical limits to the number of students that can be enrolled in a course of study. However, within the field of network technology, students must actually use network devices during their studies. This is important not only …
Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson
Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson
Computer Science Faculty Publications
There are innumerable departmental, community, and personal web sites worthy of long-term preservation but proportionally fewer archivists available to properly prepare and process such sites. We propose a simple model for such everyday web sites which takes advantage of the web server itself to help prepare the site's resources for preservation. This is accomplished by having metadata utilities analyze the resource at the time of dissemination. The web server responds to the archiving repository crawler by sending both the resource and the just-in-time generated metadata as a straight-forward XML-formatted response. We call this complex object (resource + metadata) a CRATE. …
Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad
Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission …
Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad
Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the …
Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland
Research outputs pre 2011
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …
Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad
Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad
Research outputs pre 2011
Providing quality of service (QoS) for converging traffic in wireless local area network (WLAN) is still a major issue for the researchers and industries. Due to the limited bandwidth and exposure to unpredictable interferences in a wireless environment, efficient management and optimization of the access protocols are essential to provide acceptable QoS for real-time traffic and fairness to best-effort traffic. In this paper, we investigate the throughput and delay performance of the legacy IEEE 802.11 and the 802.11e when carrying converging data in WLAN. We evaluate our recently proposed protocol known as wireless token network protocol (WTN) and show that …
An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman
An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman
Research outputs pre 2011
WiMAX has emerged as a promising wireless communication technology with potential to deliver high throughput and guaranteed quality of service to the end applications. Recent studies suggest that while WiMAX (802.16e) is capable of delivering a data rate of up to 75 Mbps for fixed wireless communications, data rate decreases drastically for mobile wireless communications, often providing a data rate less than 1 Mb/s when the mobile nodes travel at vehicular speeds. High bit error rate caused at high vehicular speeds is the key reason for low throughput. In noisy mobile communication environments, standard error control mechanisms like the transmission …
Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti
Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti
Computer Science Faculty Publications
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. It is expected that these small devices, referred to as sensors, will be mass-produced and deployed, making their production cost negligible. Due to their small form factor and modest non-renewable energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location is not necessary, and all that the individual sensors need is a coarse-grain location awareness. The task of acquiring such a coarse-grain location awareness is referred to as training. …
Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad
Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad
Research outputs pre 2011
The IEEE 802.15.4 standard medium access control (MAC) protocol for low rate wireless personal area networks (LRWPAN) is design mainly for static sensor networks and its capability to support mobile sensor networks has not yet been established. To the best knowledge of authors, this is the first paper that evaluates the suitability of IEEE 802.15.4 MAC in mobile sensor networks environment. We evaluate the performance based on node's speed and beacon order, and observe the effect on energy usage, packet delivery ratio and time required to associate with its coordinator. From the experiment we observe that the moving nodes experienced …
Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad
Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
In the IEEE 802.15.4 medium access control (MAC) protocol for wireless sensor networks, a sensor node needs to associate with a coordinator before it starts sending or receiving data. The sensor node will mostly choose the nearest coordinator to associate with. However, this method is not suitable for a constantly moving sensor node because it will end up switching coordinators too often due to short connectivity time. The IEEE 802.15.4 has a simplistic and inadequate method of choosing a coordinator in this context. In this paper, we introduce a method to increase the mobile sensor node connectivity time with its …
New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy
New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy
Branch Mathematics and Statistics Faculty and Staff Publications
Historically a code refers to a cryptosystem that deals with linguistic units: words, phrases etc. We do not discuss such codes in this book. Here codes are message carriers or information storages or information transmitters which in time of need should not be decoded or read by an enemy or an intruder. When we use very abstract mathematics in using a specific code, it is difficult for non-mathematicians to make use of it. At the same time, one cannot compromise with the capacity of the codes. So the authors in this book have introduced several classes of codes which are …
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Faculty Publications
A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …