University of Canberra

Displaying 1-10 of 10 results

  • White Papers // Jul 2013

    Do IS Consultants Enhance IS Competences in SMEs?

    Many Small and Medium-sized Enterprises (SMEs) turn to consultants for assistance with IS projects, for example, to help the firm select and implement a new system. Prior studies have shown that consultants have a major influence on IS success for SMEs. However, despite its importance to IS success, relatively little...

    Provided By University of Canberra

  • White Papers // May 2013

    Risk Factors in ERP Implementations: Hierarchical and Linear Relationships

    Enterprise Resource Planning (ERP) systems have been in existence for over 2 decades yet businesses are still losing billions of dollars annually due to the implementation of software designed to reduce costs and increase profitability. Risk Management is an area that contributes to these losses, specifically due to uncertain outcomes...

    Provided By University of Canberra

  • White Papers // Jun 2012

    A Survey and Taxonomy of Lightweight Intrusion Detection Systems

    Internet and computer networks are exposed to an ever increasing number of security threats that can damage computer systems and communication channels. In this paper, the authors introduce concepts and algorithms of them and survey existing approaches which have used them. In particular, they review the previous approaches according to...

    Provided By University of Canberra

  • White Papers // May 2012

    Exact Dual-User Macrodiversity Performance With Linear Receivers in Flat Rayleigh Fading

    The performance of linear receivers in the presence of Co-Channel Interference (CCI) in Rayleigh channels is a fundamental problem in wireless communications. Performance evaluation for these systems is well-known for receive arrays which are co-located. In contrast, there are almost no analytical results available for Macrodiversity systems (such as network...

    Provided By University of Canberra

  • White Papers // Mar 2011

    Efficiently Fuzzy Controlling With Dynamic Window in Elliptic Curve Cryptography Sensor Networks

    It is noted that the Wireless Sensor Networks (WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in people daily life. However, the security of the WSN becomes one of the major concerns in its applications. Even Elliptic Curve...

    Provided By University of Canberra

  • White Papers // Dec 2010

    A Framework for Resource Allocation Strategies in Cloud Computing Environment

    This paper presents a critical evaluation of current resource allocation strategies and their possible applicability in Cloud Computing Environment which is expected to gain a prominent profile in the Future Internet. This research attempts to focus towards network awareness and consistent optimization of resource allocation strategies and identifies the issues...

    Provided By University of Canberra

  • White Papers // Mar 2010

    Secure Public-Key Based Effective and Efficient Sensor Networks

    Sensor networks presented new opportunities for observing and interacting with the real physical world. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major...

    Provided By University of Canberra

  • White Papers // Nov 2009

    Detecting Liveness in Multimodal Biometric Security Systems

    This paper a novel liveness checking technique is proposed for multimodal biometric authentication systems based on faces and voice biometrics. Liveness detection ensures that biometric cues are acquired from a live person who is actually present at the time of capture for authenticating the identity. The proposed liveness checking technique...

    Provided By University of Canberra

  • White Papers // Jul 2009

    Optimal Designs With Ultra-Wide-Band for MIMO Channels in Statistical Models

    It is well-known that the third generation partnership projects spatial channel model is a stochastic channel model for MIMO systems and multi-antenna-based Multi-Input Multi-Output (MIMO) communications become the next revolution in wireless data communications. MIMO has gone through the adoption curve for commercial wireless systems to the today's situation, all...

    Provided By University of Canberra

  • White Papers // Mar 2009

    Behaviors of MIMO UWB-IR Transceiver With Statistical Models

    It is well known that multi-antenna-based Multi-Input Multi-Output (MIMO) communications become the next revolution in wireless data communications. MIMO has gone through the adoption curve for commercial wireless systems to the today's situation, all high throughput commercial standards, i.e. WiMax, Wi-Fi, cellular, etc., have adopted MIMO as part of the...

    Provided By University of Canberra

  • White Papers // Jun 2012

    A Survey and Taxonomy of Lightweight Intrusion Detection Systems

    Internet and computer networks are exposed to an ever increasing number of security threats that can damage computer systems and communication channels. In this paper, the authors introduce concepts and algorithms of them and survey existing approaches which have used them. In particular, they review the previous approaches according to...

    Provided By University of Canberra

  • White Papers // May 2013

    Risk Factors in ERP Implementations: Hierarchical and Linear Relationships

    Enterprise Resource Planning (ERP) systems have been in existence for over 2 decades yet businesses are still losing billions of dollars annually due to the implementation of software designed to reduce costs and increase profitability. Risk Management is an area that contributes to these losses, specifically due to uncertain outcomes...

    Provided By University of Canberra

  • White Papers // Nov 2009

    Detecting Liveness in Multimodal Biometric Security Systems

    This paper a novel liveness checking technique is proposed for multimodal biometric authentication systems based on faces and voice biometrics. Liveness detection ensures that biometric cues are acquired from a live person who is actually present at the time of capture for authenticating the identity. The proposed liveness checking technique...

    Provided By University of Canberra

  • White Papers // Mar 2010

    Secure Public-Key Based Effective and Efficient Sensor Networks

    Sensor networks presented new opportunities for observing and interacting with the real physical world. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major...

    Provided By University of Canberra

  • White Papers // Mar 2009

    Behaviors of MIMO UWB-IR Transceiver With Statistical Models

    It is well known that multi-antenna-based Multi-Input Multi-Output (MIMO) communications become the next revolution in wireless data communications. MIMO has gone through the adoption curve for commercial wireless systems to the today's situation, all high throughput commercial standards, i.e. WiMax, Wi-Fi, cellular, etc., have adopted MIMO as part of the...

    Provided By University of Canberra

  • White Papers // Mar 2011

    Efficiently Fuzzy Controlling With Dynamic Window in Elliptic Curve Cryptography Sensor Networks

    It is noted that the Wireless Sensor Networks (WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in people daily life. However, the security of the WSN becomes one of the major concerns in its applications. Even Elliptic Curve...

    Provided By University of Canberra

  • White Papers // Jul 2009

    Optimal Designs With Ultra-Wide-Band for MIMO Channels in Statistical Models

    It is well-known that the third generation partnership projects spatial channel model is a stochastic channel model for MIMO systems and multi-antenna-based Multi-Input Multi-Output (MIMO) communications become the next revolution in wireless data communications. MIMO has gone through the adoption curve for commercial wireless systems to the today's situation, all...

    Provided By University of Canberra

  • White Papers // May 2012

    Exact Dual-User Macrodiversity Performance With Linear Receivers in Flat Rayleigh Fading

    The performance of linear receivers in the presence of Co-Channel Interference (CCI) in Rayleigh channels is a fundamental problem in wireless communications. Performance evaluation for these systems is well-known for receive arrays which are co-located. In contrast, there are almost no analytical results available for Macrodiversity systems (such as network...

    Provided By University of Canberra

  • White Papers // Dec 2010

    A Framework for Resource Allocation Strategies in Cloud Computing Environment

    This paper presents a critical evaluation of current resource allocation strategies and their possible applicability in Cloud Computing Environment which is expected to gain a prominent profile in the Future Internet. This research attempts to focus towards network awareness and consistent optimization of resource allocation strategies and identifies the issues...

    Provided By University of Canberra

  • White Papers // Jul 2013

    Do IS Consultants Enhance IS Competences in SMEs?

    Many Small and Medium-sized Enterprises (SMEs) turn to consultants for assistance with IS projects, for example, to help the firm select and implement a new system. Prior studies have shown that consultants have a major influence on IS success for SMEs. However, despite its importance to IS success, relatively little...

    Provided By University of Canberra