Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Science and Technology Studies

Image Compression And Retrieval For Mobile Visual Search, Yi Cao, Christian Ritz, Raad Raad Oct 2013

Image Compression And Retrieval For Mobile Visual Search, Yi Cao, Christian Ritz, Raad Raad

Dr Raad Raad

Mobile Visual Search (MVS) is an emerging area of research given the explosion of smart and computationally powerful mobile devices. Typically, MVS involves the computation of local image features which are then used within a matching process. Such applications pose certain unique challenges due to computation, power and bandwidth constraints of the mobile device. This paper examines the trade-off between two general frameworks for implementing MVS: 1. sending compressed images and performing feature extraction and matching on a server; and 2. performing feature extraction on the mobile device and sending these to a server for matching. A number of local …


Dynamic Channel Allocation For Mobile Cellular Systems Using A Control Theoretical Approach, Yaya Wei, Chuang Lin, Raad Raad, Fengyuan Ren Oct 2013

Dynamic Channel Allocation For Mobile Cellular Systems Using A Control Theoretical Approach, Yaya Wei, Chuang Lin, Raad Raad, Fengyuan Ren

Dr Raad Raad

The guard channel scheme in wireless mobile networks has attracted and is still drawing research interest owing to easy implementation and flexible control. Dynamic guard channel schemes have already been proposed in the literature to adapt to varying traffic load. This paper presents a novel control-theoretic approach to dynamically reserve guard channels called PI-Guard Channel (PI-GC) controller that maintains the handoff blocking probability (HBP) to a predefined value; while it still improves the channel resource utilization.


Session Based Differentiated Quality Of Service Admission Control For Web Servers, Yaya Wei, Chuang Lin, Fengyuan Ren, Eryk Dutkeiwicz, Raad Raad Oct 2013

Session Based Differentiated Quality Of Service Admission Control For Web Servers, Yaya Wei, Chuang Lin, Fengyuan Ren, Eryk Dutkeiwicz, Raad Raad

Dr Raad Raad

Recent advance-session based admission control (SBAC) has resulted in protecting the server from entering a regime in which latencies are excessive or session throughput collapses due to dropped requests and aborted sessions. The goal of this work is to introduce differentiated QoS to SBAC. We propose a two-threshold SBAC scheme (QSBAC). It can provide high throughput for preferred clients especially in overload situation. Furthermore, to adapt to varying traffic loads, a dynamic QSBAC (DQSBAC) scheme is also proposed. The experimental results show that comparing with SBAC scheme, both QSBAC scheme and DQSBAC scheme can sustain higher session throughput for preferred …


A Tutorial On The New Higher Order Rotation Spreading Matrix For Bsofdm, Ibrahim Raad, Xiaojing Huang, Raad Raad Oct 2013

A Tutorial On The New Higher Order Rotation Spreading Matrix For Bsofdm, Ibrahim Raad, Xiaojing Huang, Raad Raad

Dr Raad Raad

No abstract provided.


A Novel Destination-Based Routing Protocol (Dbrp) In Dtns, Saeid Iranmanesh, Raad Raad, Kwan-Wu Chin Oct 2013

A Novel Destination-Based Routing Protocol (Dbrp) In Dtns, Saeid Iranmanesh, Raad Raad, Kwan-Wu Chin

Dr Raad Raad

In Delay Tolerant Networks (DTNs), the aim of any forwarding/routing protocols is to achieve a high delivery ratio of packets/bundles at the lowest possible bandwidth cost, buffer space and energy. Therefore, finding a protocol which uses less resource to achieve high delivery ratio and low latency is an open research question. This paper proposes a quota-based protocol which confines the number of replicas and forwards them based on the meeting history of nodes. The unique aspect of our protocol is to weight any encounter with the final destination to be much higher than any other node encounter. This aspect of …


Securing Dsr Against Wormhole Attacks In Multirate Ad Hoc Networks, Shams Qazi, Raad Raad, Yi Mu, Willy Susilo Oct 2013

Securing Dsr Against Wormhole Attacks In Multirate Ad Hoc Networks, Shams Qazi, Raad Raad, Yi Mu, Willy Susilo

Dr Raad Raad

A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time …