Southern Illinois University

Displaying 1-9 of 9 results

  • White Papers // Mar 2013

    From Big Data to Big Data Mining: Challenges, Issues, and Opportunities

    While \"Big data\" has become a highlighted buzzword since last year, \"Big data mining\", i.e., mining from big data, has almost immediately followed up as an emerging, interrelated research area. This paper provides an overview of big data mining and discusses the related challenges and the new opportunities. The discussion...

    Provided By Southern Illinois University

  • White Papers // Mar 2011

    Location-Aware, Trust-Based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks

    The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks the authors introduce a location-aware, trust-based...

    Provided By Southern Illinois University

  • White Papers // Dec 2010

    A New Technique for Text Data Compression

    In this paper the authors use ternary representation of numbers for compressing text data. They use a binary map for ternary digits and introduce a way to use the binary 11-pair, which has never been use for coding data before, and they further use 4-Digits ternary representation of alphabet with...

    Provided By Southern Illinois University

  • White Papers // Dec 2009

    Channel Switching Overhead for 802.11b

    IEEE 802.11b devices operate in the 2.4 GHz ISM band the United States. Because of this, 802.11b devices are susceptible to interference from a multitude of sources such as microwave ovens and cordless phones. Interference from other devices can lead to transmission failures and degraded performance. Wireless devices may be...

    Provided By Southern Illinois University

  • White Papers // Oct 2009

    Impact Of Mentoring On Perception Of Organizational Effectiveness: A Qualitative Study

    Faculty members in a radiological sciences program at a major university were asked to share their perceptions of mentoring in their department, including what impact mentoring has had on the organization's overall effectiveness. Perceptions of the department's faculty was gathered and analyzed in this qualitative study to assess their understanding...

    Provided By Southern Illinois University

  • White Papers // Jul 2009

    Internet Banking in Jordan: An Arabic Instrument Validation Process

    Internet banking is booming in Jordan and it is time for banks and customers to reap the benefits from such technology. Bank customers' propensity to use internet banking is dependent on their attitudes towards such technology. This work validates an Arabic technology acceptance instrument through a rigorous process so that...

    Provided By Southern Illinois University

  • White Papers // Feb 2009

    Understanding Programming Language Semantics For The Sophisticated World

    Computers are used virtually everywhere, everyday in the world. In the last two decades scientists found that the computing world is complicated and is overwhelmed with data that requires more sophisticated computation facilities and better languages for computation. This created new computing disciplines. Today, real world projects can be very...

    Provided By Southern Illinois University

  • White Papers // Oct 2008

    Providing End-to-End Guarantees in Cyber-Physical Systems

    Cyber-physical systems are integrations of computation, communication and control with physical processes/entities. They may be viewed as a networked system of embedded systems that must work together in a safe, efficient, reliable, predictable and timely manner to monitor and control physical entities. In recent times, embedded systems have become ubiquitous...

    Provided By Southern Illinois University

  • White Papers // Sep 2008

    Clustering of Wireless Sensor and Actor Networks Based on Sensor Distribution and Inter-Actor Connectivity

    Wireless Sensor and Actor Networks (WSANs) employ significantly more capable actor nodes that can collect data from sensors and perform application specific actions. To take these actions collaboratively at any spot in the monitored regions, maximal actor coverage along with inter-actor connectivity is desirable. In this paper, the authors propose...

    Provided By Southern Illinois University

  • White Papers // Mar 2013

    From Big Data to Big Data Mining: Challenges, Issues, and Opportunities

    While \"Big data\" has become a highlighted buzzword since last year, \"Big data mining\", i.e., mining from big data, has almost immediately followed up as an emerging, interrelated research area. This paper provides an overview of big data mining and discusses the related challenges and the new opportunities. The discussion...

    Provided By Southern Illinois University

  • White Papers // Feb 2009

    Understanding Programming Language Semantics For The Sophisticated World

    Computers are used virtually everywhere, everyday in the world. In the last two decades scientists found that the computing world is complicated and is overwhelmed with data that requires more sophisticated computation facilities and better languages for computation. This created new computing disciplines. Today, real world projects can be very...

    Provided By Southern Illinois University

  • White Papers // Dec 2009

    Channel Switching Overhead for 802.11b

    IEEE 802.11b devices operate in the 2.4 GHz ISM band the United States. Because of this, 802.11b devices are susceptible to interference from a multitude of sources such as microwave ovens and cordless phones. Interference from other devices can lead to transmission failures and degraded performance. Wireless devices may be...

    Provided By Southern Illinois University

  • White Papers // Oct 2008

    Providing End-to-End Guarantees in Cyber-Physical Systems

    Cyber-physical systems are integrations of computation, communication and control with physical processes/entities. They may be viewed as a networked system of embedded systems that must work together in a safe, efficient, reliable, predictable and timely manner to monitor and control physical entities. In recent times, embedded systems have become ubiquitous...

    Provided By Southern Illinois University

  • White Papers // Dec 2010

    A New Technique for Text Data Compression

    In this paper the authors use ternary representation of numbers for compressing text data. They use a binary map for ternary digits and introduce a way to use the binary 11-pair, which has never been use for coding data before, and they further use 4-Digits ternary representation of alphabet with...

    Provided By Southern Illinois University

  • White Papers // Jul 2009

    Internet Banking in Jordan: An Arabic Instrument Validation Process

    Internet banking is booming in Jordan and it is time for banks and customers to reap the benefits from such technology. Bank customers' propensity to use internet banking is dependent on their attitudes towards such technology. This work validates an Arabic technology acceptance instrument through a rigorous process so that...

    Provided By Southern Illinois University

  • White Papers // Oct 2009

    Impact Of Mentoring On Perception Of Organizational Effectiveness: A Qualitative Study

    Faculty members in a radiological sciences program at a major university were asked to share their perceptions of mentoring in their department, including what impact mentoring has had on the organization's overall effectiveness. Perceptions of the department's faculty was gathered and analyzed in this qualitative study to assess their understanding...

    Provided By Southern Illinois University

  • White Papers // Mar 2011

    Location-Aware, Trust-Based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks

    The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks the authors introduce a location-aware, trust-based...

    Provided By Southern Illinois University

  • White Papers // Sep 2008

    Clustering of Wireless Sensor and Actor Networks Based on Sensor Distribution and Inter-Actor Connectivity

    Wireless Sensor and Actor Networks (WSANs) employ significantly more capable actor nodes that can collect data from sensors and perform application specific actions. To take these actions collaboratively at any spot in the monitored regions, maximal actor coverage along with inter-actor connectivity is desirable. In this paper, the authors propose...

    Provided By Southern Illinois University