Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Digital Communications and Networking

Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci Oct 2012

At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci

Robert A Iannucci

No abstract provided.


Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp Oct 2012

Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp

Eric Copp

The DNA Safeguard project involves processing DNA sequence data in order to find nullomer sequences (non-existent short DNA sequences). While the fundamental algorithm for finding nullomer sequences is simple, it is complicated by the amount of data that must be handled. Four methods for handling terabytes of of data are investigated, single instance of a MySQL database, PVFS (Parallel Virtual File System), Hadoop, and a custom MPI (Message Passing Interface) program.


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss Sep 2012

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss

Martin L Griss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


Frg Turbojet, Tyler Vitti Jun 2012

Frg Turbojet, Tyler Vitti

Computer Engineering

Members of the Cal Poly SLO campus club FRG work together with students of several different disciplines to build a functional turbojet engine. Engineering approaches include design, fabrication, testing, and computer sensing, control, and integration. The goal of the project is to produce a running turbojet engine monitored and controlled by embedded hardware and specialized PC software. This project is to be used by later groups for further research and development.


Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour Jun 2012

Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour

Electrical Engineering

This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.

LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …


Bluemote!, Philip Kaye Mar 2012

Bluemote!, Philip Kaye

Computer Engineering

In today’s society, our mobile phones are an extremely useful device when we are on the go and away from our homes; however, when we return home, our smart phone becomes just a communication tool again. Home automation is inevitable, and it will find its way into every house. The first person to commercialize it to the point where it is as easy to set-up and as affordable as a home router will end up breaking this slow trend. The key to this success is the smart phone; this should end up being the most expensive piece of hardware for …


Kreative Outlets, Travis Crist, Steve Clark, Jason Peressini Mar 2012

Kreative Outlets, Travis Crist, Steve Clark, Jason Peressini

Computer Engineering

With the widespread use of smart phones and the advancement of WiFi technologies, people now have the Internet at their fingertips at all times. Home automation and control has the possibility of becoming the next big technology that can utilize the abundant availability of the Internet. This paper documents the findings and results of a project aimed at developing the infrastructure needed for a home automation system that is accessible anywhere. We implemented a system that utilized a web enabled ethernet connection and RF wireless technology to control AC outlets and provide the user with feedback information about the status …


Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai Jan 2012

Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai

Branch Mathematics and Statistics Faculty and Staff Publications

In this book the authors study the erasure techniques in concatenated Maximum Rank Distance (MRD) codes. The authors for the first time in this book introduce the new notion of concatenation of MRD codes with binary codes, where we take the outer code as the RD code and the binary code as the inner code. The concatenated code consists of the codewords of the outer code expressed in terms of the alphabets of the inner code. These new class of codes are defined as CRM codes. This concatenation techniques helps one to construct any CRM code of desired minimum distance …