Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University for Business and Technology in Kosovo (28)
- SelectedWorks (13)
- Singapore Management University (13)
- California State University, San Bernardino (9)
- Technological University Dublin (9)
-
- California Polytechnic State University, San Luis Obispo (8)
- University of Massachusetts Amherst (4)
- University of Nebraska - Lincoln (4)
- Old Dominion University (3)
- Selected Works (3)
- University of Arkansas, Fayetteville (3)
- University of Kentucky (3)
- DePaul University (2)
- Edith Cowan University (2)
- Governors State University (2)
- Tennessee State University (2)
- The University of Akron (2)
- The University of Maine (2)
- University of Pennsylvania Carey Law School (2)
- Western University (2)
- Air Force Institute of Technology (1)
- Georgia Southern University (1)
- Liberty University (1)
- Luther Seminary (1)
- Montclair State University (1)
- Southwestern Oklahoma State University (1)
- The University of San Francisco (1)
- The University of Southern Mississippi (1)
- Union College (1)
- United Arab Emirates University (1)
- Keyword
-
- Computer security (4)
- Editor (4)
- Routing (4)
- Table (4)
- Cloud computing (3)
-
- Contents (3)
- CubeSat (3)
- Internet (3)
- Open Orbiter Project (3)
- OpenOrbiter (3)
- Published Articles (3)
- Small Spacecraft (3)
- Technology (3)
- Android (2)
- Applied sciences (2)
- Big Data (2)
- Cyber security (2)
- Cybersecurity (2)
- Data (2)
- Detection (2)
- Hackers (2)
- Information (2)
- Information security (2)
- Infrastructure (2)
- International (2)
- International Journal of Scientific Engineering and Technology (IJSET) (2)
- Journal (2)
- Management (2)
- Mobile devices (2)
- Network security (2)
- Publication
-
- UBT International Conference (28)
- Research Collection School Of Computing and Information Systems (12)
- Journal of International Technology and Information Management (8)
- The ITB Journal (8)
- Jeremy Straub (5)
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Electronic Theses and Dissertations (3)
- Masters Theses (3)
- Rana Asif Rehman (3)
- All Capstone Projects (2)
- All Faculty Scholarship (2)
- Computer Engineering (2)
- Computer Science Faculty Research (2)
- Computer Science Theses & Dissertations (2)
- Computer Science and Software Engineering (2)
- Doctoral Dissertations (2)
- Electrical Engineering (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Innovative Research Publications IRP India (2)
- Theses and Dissertations--Computer Science (2)
- Williams Honors College, Honors Research Projects (2)
- 2017 Academic High Altitude Conference (1)
- Australian Digital Forensics Conference (1)
- Biology Faculty Publications (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Conference papers (1)
- DePaul Magazine (1)
- Publication Type
Articles 121 - 136 of 136
Full-Text Articles in Computer Engineering
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte
Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte
Conference papers
There are many types of degradation which can occur in Voice over IP (VoIP) calls. Of interest in this work are degradations which occur independently of the codec, hardware or network in use. Specifically, their effect on the subjective and objec- tive quality of the speech is examined. Since no dataset suit- able for this purpose exists, a new dataset (TCD-VoIP) has been created and has been made publicly available. The dataset con- tains speech clips suffering from a range of common call qual- ity degradations, as well as a set of subjective opinion scores on the clips from 24 …
Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons
Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons
Electronic Theses and Dissertations
Abstract
Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.
This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …
An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni
An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni
UNF Graduate Theses and Dissertations
Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and …
Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad
Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad
Computer Science Theses & Dissertations
Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.
Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson
Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson
Williams Honors College, Honors Research Projects
This research project explores the operation of the IS-IS routing protocol, as well as DHCP and DNS services provided by a Raspberry Pi computer. IS-IS is a routing protocol that is commonly ignored in most training and certification programs, because it is most frequently used by service providers. However, IS-IS solutions are also deployed in some large enterprise networks, making experience with the protocol a valuable skill.
In order to gain a deeper understanding of the routing domains, route propagation, and general operation of IS-IS, additional services were implemented in this project. A Raspberry Pi computer was used as an …
Automated Beverage Dispenser, Sonya Istocka
Automated Beverage Dispenser, Sonya Istocka
Williams Honors College, Honors Research Projects
The intention of this project is to define a new way of distributing liquor. The project will consist of a device which will measure and track liquor being poured and associate it with a person, either a bartender or a bar patron. The challenges will be controlling the flow of liquor and recording it in an extremely accurate manner as well as processing data quickly so that a pour can be initiated very soon after a person is identified. The liquor dispenser will open up the possibility of a person being able to dispense their own liquor in a controlled …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …