Lamar University

Displaying 1-8 of 8 results

  • White Papers // Sep 2013

    An Authentication Middleware for Prevention of Information Theft

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both...

    Provided By Lamar University

  • White Papers // Apr 2013

    Energy Consumption in Wireless Sensor Networks Using Data Fusion Assurance

    Data fusion techniques reduce total network traffic in a wireless sensor network, since data fusion can integrate multiple raw data sets into one fused data set. However, the security or assurance of the data requires more processing power and is an important issue. Increasing the security of the fusion data...

    Provided By Lamar University

  • White Papers // May 2012

    The Effect of "Window Size" on Throughput Performance of DTN in Lossy Cislunar Communications

    Delay/Disruption Tolerant Networking (DTN) offers a new solution to highly stressed communications in space environments. It is considered one of the most suitable technologies to be employed in space internetworking. To date, little work has been done in investigating how to achieve the best performance of DTN transmission over lossy,...

    Provided By Lamar University

  • White Papers // May 2012

    Use of a Hybrid of DTN Convergence Layer Adapters (CLAs) in Interplanetary Internet

    Some work has been done with the DTN Convergence Layer Adapters (CLAs) such as TCP-based CLA (i.e., TCPCL), Lick-lider Transmission Protocol CLA (i.e., LTPCL) and User Datagram Protocol (UDP)-based CLA (i.e., UDPCL) in space communication, running as an individual protocol. Because each DTN CLA is designed for a different type...

    Provided By Lamar University

  • White Papers // Feb 2010

    The Influence Of Logistics Outsourcing On Cost: A Cross-Industry Empirical Study Of U.S. Based Manufacturing Plants

    Logistics outsourcing has a significant effect on how manufacturing firms produce and deliver products to their customers. Indeed, many manufacturing firms do not own or manage the transportation and warehousing resources used for inbound and outbound shipments from their facilities. However, earlier research has demonstrated mixed results when outsourcing; some...

    Provided By Lamar University

  • White Papers // Dec 2008

    Entrepreneurial Recovery From Natural Disaster: A Consideration of Influential Factors

    This paper contains interviews with five entrepreneurs affected by Hurricane Rita in the Southeast Texas Region. It qualitatively examines the recovery efforts of these entrepreneurs including the extent to which government assistance was utilized in their recovery efforts. The purpose was to determine if there were any specific factors that...

    Provided By Lamar University

  • White Papers // Jun 2008

    A Lightweight Secure Protocol for Wireless Sensor Networks

    In this paper, based on a Linear Congruential Generator (LCG), the authors proposes a new block cipher that is suitable for constructing a lightweight secure protocol for resource-constrained wireless sensor networks. From the cryptanalysis point of view, the building block is considered secure if the attacker cannot obtain the pseudo-random...

    Provided By Lamar University

  • White Papers // May 2008

    Using ANOVA to Analyze Modified Gini Index Decision Tree Classification

    Decision tree classification is a commonly used method in data mining. It has been used for predicting medical diagnoses. Among data mining methods for classification, decision trees have several advantages such as they are simple to understand and interpret; they are able to handle both numerical and categorical attributes. However,...

    Provided By Lamar University

  • White Papers // Apr 2013

    Energy Consumption in Wireless Sensor Networks Using Data Fusion Assurance

    Data fusion techniques reduce total network traffic in a wireless sensor network, since data fusion can integrate multiple raw data sets into one fused data set. However, the security or assurance of the data requires more processing power and is an important issue. Increasing the security of the fusion data...

    Provided By Lamar University

  • White Papers // Sep 2013

    An Authentication Middleware for Prevention of Information Theft

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both...

    Provided By Lamar University

  • White Papers // Dec 2008

    Entrepreneurial Recovery From Natural Disaster: A Consideration of Influential Factors

    This paper contains interviews with five entrepreneurs affected by Hurricane Rita in the Southeast Texas Region. It qualitatively examines the recovery efforts of these entrepreneurs including the extent to which government assistance was utilized in their recovery efforts. The purpose was to determine if there were any specific factors that...

    Provided By Lamar University

  • White Papers // Jun 2008

    A Lightweight Secure Protocol for Wireless Sensor Networks

    In this paper, based on a Linear Congruential Generator (LCG), the authors proposes a new block cipher that is suitable for constructing a lightweight secure protocol for resource-constrained wireless sensor networks. From the cryptanalysis point of view, the building block is considered secure if the attacker cannot obtain the pseudo-random...

    Provided By Lamar University

  • White Papers // Feb 2010

    The Influence Of Logistics Outsourcing On Cost: A Cross-Industry Empirical Study Of U.S. Based Manufacturing Plants

    Logistics outsourcing has a significant effect on how manufacturing firms produce and deliver products to their customers. Indeed, many manufacturing firms do not own or manage the transportation and warehousing resources used for inbound and outbound shipments from their facilities. However, earlier research has demonstrated mixed results when outsourcing; some...

    Provided By Lamar University

  • White Papers // May 2008

    Using ANOVA to Analyze Modified Gini Index Decision Tree Classification

    Decision tree classification is a commonly used method in data mining. It has been used for predicting medical diagnoses. Among data mining methods for classification, decision trees have several advantages such as they are simple to understand and interpret; they are able to handle both numerical and categorical attributes. However,...

    Provided By Lamar University

  • White Papers // May 2012

    The Effect of "Window Size" on Throughput Performance of DTN in Lossy Cislunar Communications

    Delay/Disruption Tolerant Networking (DTN) offers a new solution to highly stressed communications in space environments. It is considered one of the most suitable technologies to be employed in space internetworking. To date, little work has been done in investigating how to achieve the best performance of DTN transmission over lossy,...

    Provided By Lamar University

  • White Papers // May 2012

    Use of a Hybrid of DTN Convergence Layer Adapters (CLAs) in Interplanetary Internet

    Some work has been done with the DTN Convergence Layer Adapters (CLAs) such as TCP-based CLA (i.e., TCPCL), Lick-lider Transmission Protocol CLA (i.e., LTPCL) and User Datagram Protocol (UDP)-based CLA (i.e., UDPCL) in space communication, running as an individual protocol. Because each DTN CLA is designed for a different type...

    Provided By Lamar University