Browsing Computing Conference Papers by Title
Now showing items 106-125 of 154
-
On Erlang capacity of CDMA systems
(Kluwer Academic Publishers, 2003-12-01)In this paper, the Erlang capacity of mobile protocols such as FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) systems are compared assuming perfect ... -
Other cells interference of power controlled CDMA systems
(Institute of Electrical and Electronics Engineers (IEEE), 2002-12-17)In this paper, using a simulation and modelling technique, the other cell interference factor is obtained and compared with previous upper bounds. The effect of propagation parameters on other cell interference is investigated. ... -
An overview of different binary methods for documents based on their features
(Newswood Ltd., 2013)This paper surveys binarization of document images. The main role of binarization is dimension and noise reduction. Binarization is one of the most important steps in preprocessing of document image understanding and ... -
An Overview of the Challenges and Progress in PeEn-SMT: First Large Scale Persian-English SMT System
(2011)This paper documents recent work carried out for PeEn-SMT, our Statistical Machine Translation system for translation between the English-Persian language pair. We give details of our previous SMT system, and present our ... -
A pattern recognition for group abnormal behaviors based on Markov Random Fields energy
(Institute of Electrical and Electronics Engineers (IEEE), 2014-08)Group abnormal behaviors often occur abruptly under video surveillance, thus bringing serious consequences. How to recognize these behaviors correctly has always been the difficulty in research on intelligence video ... -
Perception of synthetic speech with emotion modelling delivered through a robot platform: an initial investigation with older listeners
(2010)In this paper we give results of an initial investigation into the perception of synthetic speech delivered through a robotic platform. The robotic speech was judged by 19 residents and 10 staff of a New Zealand retirement ... -
Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols
(2016-07)This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms ... -
Performance comparison of category 5e vs. category 6 cabling systems for both IPv4 and IPv6 in gigabit ethernet
(Institute of Electrical and Electronics Engineers (IEEE), 2010-07-01)The performance of category 5e and 6 cabling is compared for both IPv4 and IPv6 using Gigabit Ethernet LAN. The maximum bandwidth achieved was 700Mbps and it was for IPv4 and category 5e cabling. -
Performance comparison of IEEE802.11ac vs IEEE 802.11n WLAN in IPv6
(Springer, 2021-05)In this paper, performance of WLAN (Wireless LAN) for peer-peer and client-server networks with WPA-2 security is investigated for both IEEE802.11ac and IEEE802.11n standard. Parameters studied include throughput, and RTT ... -
Performance comparison of IPv4 and IPv6 in peer-peer and client server local area networks
(Institute of Electrical and Electronics Engineers (IEEE), 2010-06-29)In this paper, the performance of IPv4 and IPv6 are compared for both Client-Server and Peer-Peer networks. For both networks, IPv4 produced higher bandwidth for TCP protocol. For UDP, IPv4 and IPv6 showed insignificant ... -
Performance comparison of IPv6 in 802.11ac WLAN in Windows and Linux environment
(Institute of Electrical and Electronics Engineers (IEEE), 2021-12)In this paper, the performance of IEEE 802.11ac wireless LAN is analysed and compared for two operating systems, Windows, and Linux Ubuntu. Parameters measured are throughput, latency, and CPU utilization for TCP, UDP, ... -
Performance evaluation of virtual private network protocols in Windows 2003 environment
(Institute of Electrical and Electronics Engineers (IEEE), 2008-12-20)Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses ... -
Performance monitoring of various network traffic generators
(Institute of Electrical and Electronics Engineers (IEEE), 2011-03-31)In this paper, in a laboratory environment, the performance of four network traffic generators (Iperf, Netperf, D-ITG and IP Traffic) are compared. Two computers with Windows operating systems were connected via a 100 Mbps ... -
The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANS with WPA2 security.
(ACM Press, 2009-07-01)The IPv4 and IPv6 performance with UDP (User Datagram Protocol) on two client-server wireless 802.11n LANs implementing Windows Vista-Windows Server 2008 and Windows XP-Windows Server 2008 are compared. The impact of ... -
Personalized learning : promising future? [pre-print title] ; Personalized learning : current status and potential [published title]
(2014-12)The term personalized learning has proliferated over recent years especially with the advancement of several educational technologies, conceptual frameworks and mobile and wireless internet technologies. This paper ... -
Phonated speech reconstruction using twin mapping models
(IEEE Communications Society, 2015-12)Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ... -
Physical classification and recent developments of active noise control systems
(Association for Computing Machinery (ACM), 2017-11)The rapid growth of the industry has a major effect on the environmental noise pollution, and it ranks second to the air pollution that adversely affects the human health. Passive noise control techniques are impractical ... -
A physical-aware task migration algorithm for dynamic thermal management of SMT multi-core processors
(South Asia Pacific - Design Automation Conference, 2014-01)This paper presents a task migration algorithm for dynamic thermal management of SMT multi-core processors. The unique features of this algorithm include: 1) considering SMT capability of the processors for task ... -
Portability of an RF fingerprint of a wireless transmitter
(IEEE CNS, 2014)In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer ... -
Portability of an RF fingerprint of a wireless transmitter
(2014-10)In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer ...