University of Maine at Presque Isle

Displaying 1-40 of 98 results

  • White Papers // Sep 2014

    Variable Strength T-Way Test Suite Generator with Constraints Support

    T-way testing (or interaction testing) is a common test planning method used to sample a complete or exhaustive test suite systematically. In t-way testing, it is assumed that interaction only occurs between t numbers of parameters (where t is the interaction strength). Therefore, all t-way strategies generate the t-way test...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    New Domain Decomposition Method For Quality-Aware Parallel H.264 Video Coding

    In this paper, the authors present a new parallel granularity called \"Tiling\" to parallelize the H.264 codec. The new parallel granularity, which has the same granularity level as the parallel slice-level H.264 codec, is based on decomposing the entire video frame into tiles by utilizing a new inherently parallel 2D...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    An Artificial Neural Network Classification Approach For Improving Accuracy Of Customer Identification In E-Commerce

    With the advances in web-based oriented technologies, experts are able to capture user activities on the web. Users' web browsing behavior is used for user identification. Identifying users during their activities is extremely important in electronic commerce (e-Commerce) as it has the potential to prevent illegal transactions or activities particularly...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    Recognition Of Emotion In Speech Using Variogram Based Features

    Speech Emotion Recognition (SER) is a relatively new and challenging branch in speech processing area. In this paper, the authors propose new features derived from speech spectrogram using image processing techniques for emotion recognition. For this purpose, variogram graphs are calculated from speech spectrogram. The significant Discrete Cosine Transform (DCT)...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2014

    Understanding User Behaviors in Social Networking Service for Mobile Learning: a Case Study with Twitter

    With the rapid adoption of smart devices, various services have been evolved in mobile environment. Particularly, Twitter has become one of major mobile social networking services. In spite of the increasing use of Twitter services by students and instructors in colleges, very little empirical studies that concern the impact of...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2014

    Performance Evaluation Of Enhanced Velocity-Based Handoff Algorithm For VANET

    Vehicular Ad hoc NETworks (VANETs) is based on 802.11p standard where a vehicle is connected to a base station in a dynamic manner. The vehicle is traversed from one base station to another and may affect the transmission of packets. To minimize the disruption, handoff latency must be kept at...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2014

    Permutation Induced Shuffling Based Block Cipher for Real-Time Applications

    The widespread usage of multimedia data in the internet makes media content protection important. Internet telephony, internet conferencing, internet security monitoring, video teleconference, Pay-Per-View (PPV), Video-On-Demand (VOD), medical image transmission, interactive video games are some of the real time applications that require confidentiality. To accommodate the confidentiality in various applications,...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2014

    Prioritizing and Fulfilling Quality Attributes for Virtual Lab Development Through Application of Fuzzy Analytic Hierarchy Process and Software Development

    The evolution in pedagogy and research has introduced new requirements in the educational sector. On demand computing resource provisioning, often referred as virtual lab, is one of the requirements in great demand. Most current virtual lab systems are proprietary and thus their detailed software architectures are not accessible to developers....

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2014

    A Direction Framework to Address Problems in Requirements Engineering Education

    Requirements Engineering (RE) is the most difficult stage of software development for students to learn and for lecturers to teach. Requirements Engineering Education (REE) problems are reported in several studies. This paper is to verify that REE problems presented in the literature really exist in practice especially in Malaysia and...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2013

    A Novel Application Licensing Framework for Mobile Cloud Environment

    Mobile cloud computing is a new technology that enhances Smartphone applications capabilities in terms of performance, energy efficiency, and execution support. These features are achieved via computation offloading technique that is supported by specialized mobile cloud application development models. However, the cloud-enabled applications are prone to application piracy issue for...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2013

    A Study of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection

    In recent years, mobile devices are ubiquitous. They are employed for purposes beyond merely making phone calls. Among the mobile operating systems, Android is the most popular due to its availability as an open source operating system. Due to the proliferation of Android malwares, it is crucial to study the...

    Provided By University of Maine at Presque Isle

  • White Papers // Nov 2013

    Pirax: Framework for Application Piracy Control in Mobile Cloud Environment

    Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a Smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is performed...

    Provided By University of Maine at Presque Isle

  • White Papers // Oct 2013

    Hybrid Pervasive Mobile Cloud Computing: Toward Enhancing Invisibility

    Vanishing computers into background toward invisible, distraction-free pervasive computing was envisioned by the researchers which is yet remained unfulfilled. Current pervasive systems feature insufficient infrastructures to accurately perceive, infer context, tune the spaces, and prevent cyber threats. Convergence of wireless networks and cloud computing with Smartphone's alleviate issues and promote...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Optimal Resource Key Management Protocol for Clustered Heterogeneous Wireless Sensor Networks

    Secure communication in a Wireless Sensor Network (WSN) can be achieved through efficient key management techniques. Achieving security is not so simple due to the limited capability of radio module in wireless sensor network device. The probabilistic model provides a flexible and efficient solution when comparing various key distribution schemes...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Spectrum-aware Distributed Channel Assignment for Cognitive Radio Wireless Mesh Networks

    In cognitive radio networks, the application throughput is not only affected by primary user activity but also by numerous environment factors such as interference. Therefore, channel assignment for cognitive radio networks should not only consider channel idle time but also an error rate perceived on the channel. The spectrum-aware channel...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Distributed Context Aware Dynamic Adaptation Model for Knowledge Assessment in E-Learning System

    In this paper, the authors propose a context driven dynamic adaptation model for knowledge assessment in e-learning system through software as component. Most of the existing models deployed for knowledge management have focused on the contents of the assessment while giving less emphasis to the context with which the assessment...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Recognition of Emotion in Speech Using Spectral Patterns

    Recent developments in man-machine interaction have intensified the need for recognizing human's emotion from speech. In this paper, the authors proposed using Spectral Pattern (SP) and Harmonic Energy (HE) features for the automatic recognition of human affective information from speech. These features were extracted from the spectrogram of the speech...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Path Discovery and Selection for Energy Efficient Routing with Transmit Power Control in MANET

    In this paper, the authors design an energy efficient routing mechanism based on Dynamic Source Routing (DSR). In order to achieve energy efficient reliable transmission, routing here is divided into two parts. One is to discover the path based on Received Signal Strength (RSS) and residual energy and the other...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Detecting Faces in Colored Images Using Multi-Skin Color Models and Neural Network with Texture Analysis

    In this paper, the authors present an efficient hybrid system to detect frontal faces in colored images regardless of scale, location, illumination, race, number of faces, and complex background. The general architecture of the proposed system encompasses three methods: skin color segmentation, rule-based geometric knowledge, and neural network-based classifier. In...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Intelligent Agent Based Pair Programming and Increased Self-Efficacy Through Prior-Learning for Enhanced Learning Performance

    Performances of the students in learning a programming course is not same, since learning to program is greatly influenced by two dominating factors namely self-efficacy and mental efforts. Prior research efforts have shown that high self-efficacy can have an increased effect of being a trained programmer, especially in an intelligent...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

    Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Does Knowledge Management Deliver the Goods in SMEs?

    This paper is to review research on knowledge management's benefits within small and medium-sized firms. The paper attempts to answer the following research questions: Which studies have been conducted that focus on the benefits of KM within SMEs? What were the main findings of the studies? In what manner does...

    Provided By University of Maine at Presque Isle

  • White Papers // May 2013

    Success Factors of Successful Microcredit Entrepreneurs: Empirical Evidence from Malaysia

    The aims of the current paper are twofold: first, to explore the profile of successful microcredit entrepreneurs; second, to examine the key factors contributing to the success. The sample of this study comprises 250 entrepreneurs who joined the scheme of I-Wawasan in Perak. In this study, the total assets owned...

    Provided By University of Maine at Presque Isle

  • White Papers // Apr 2013

    Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges

    The unabated flurry of research activities to augment various mobile devices by leveraging heterogeneous cloud resources has created a new research domain called Mobile Cloud Computing (MCC). In the core of such a non-uniform environment, facilitating interoperability, portability, and integration among heterogeneous platforms is nontrivial. Building such facilitators in MCC...

    Provided By University of Maine at Presque Isle

  • White Papers // Feb 2013

    Optimizing Wireless Channel Using Adaptive Modulation To Improve QoS in VANET

    Vehicular Ad hoc NETwork (VANET) is a multi-hop wireless network which involves vehicles acting as nodes to communicate with each other without infrastructural support. With the increase in Quality of Service (QoS) needs in evolving applications and the widespread use of wireless and mobile devices, it is desirable to support...

    Provided By University of Maine at Presque Isle

  • White Papers // Feb 2013

    Greedy Interaction Elements Coverage Analysis for AI-Based T-Way Strategies

    Recently, many researchers have started to adopt Artificial Intelligence AI-based strategies for t-way testing. Here, each interaction is covered at most once whenever possible. In many AI-based strategies, sampling for the most optimal test cases is given utmost priority, but measuring of the interaction coverage metric per test case is...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2013

    Sustainability: What It Means for Business

    Adopting more sustainable practices is an option for any size or type of business. There is much low-hanging fruit, where more sustainable conduct is immediately profitable. Numerous studies have shown that it pays to be green. Most studies also find that stock markets reward more sustainable behavior. Governments have a...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2013

    Electronic Commerce Adoption Model for Small & Medium Sized Enterprises

    Electronic commerce (E-commerce) plays an important role in growth of Small and Medium-sized Enterprises (SMEs) as it allow them compete efficiently in both domestic and international markets. This paper aim to develop a conceptual model based on factors that affect the Business-To-Consumer (B2C) e-commerce success. The factors are identified by...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2013

    An Evaluation of the Effectiveness of E-Recruitment Practices for SMEs in Malaysia

    The purpose of this paper is the analysis of the possibilities and difficulties of e-recruitment practices for SMEs in Malaysia, elaborating their effectiveness, and explaining some practical and managerial implications concerning these actions. Statistical analyses and empirical findings expressed here show that the attitudes and opinions of SME executives towards...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2012

    User's Visual Intention Driven Retrieval Model for Semantic Video Search and Retrieval

    There are various models of retrieval mechanisms for effective video retrieval; however, 'Semantic gap' still persists. This paper aims to reduce the gap by providing a graphical user interface that allows user to express the visuals in their mind into a query using semantic association of spatial and temporal visual...

    Provided By University of Maine at Presque Isle

  • White Papers // Oct 2012

    Traffic Engineering with Rerouting in Diffserv MPLS Networks

    An important aspect of traffic engineering is the re-optimization of network resources. In this process, traffic over a congested path is rerouted to a new path to improve efficiency in network resource utilization. The aggregation nature of DiffServ MPLS networks often gives rise to long-lived flows within the network. A...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2012

    Harnessing Cloud Computing for Dynamic Resource Requirement by Database Workloads

    In this paper, the authors illustrate a mechanism to address a very important aspect in the Cloud hosting strategy - resource management. They want to show how database hosting can benefit from this technology better, together with analysis on some of the causes and concerns of hosting databases in the...

    Provided By University of Maine at Presque Isle

  • White Papers // Aug 2012

    SMEs; Virtual R&D Teams and New Product Development: A Literature Review

    Small and Medium-sized Enterprises (SMEs) are indeed the engines of global economic growth. Their continued growth is a major subject for the economy and employment of any country. Towards that end, Virtual Research and Development (R&D) could be a viable option to sustain and ease the operations of SMEs. However,...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2012

    Byzantine Fault Tolerance in Soap Communication Services

    An innovative SOAP communication model with modified message exchange pattern is proposed to identify and eliminate Byzantine faults in distributed services environment. When a request is made by a client to a Web enabled application, it is usually processed by a set of composite Web services. In a system of...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2012

    SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing

    Mobile Cloud Computing (MCC) is the state-of the-art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing. However, long-WAN latency and trust are still two major issues in MCC that hinder its...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2012

    MOMCC: Market-Oriented Architecture for Mobile Cloud Computing Based on Service Oriented Architecture

    The vision of augmenting computing capabilities of mobile devices, especially Smartphones with least cost is likely transforming to reality leveraging cloud computing. Cloud exploitation by mobile devices breeds a new research domain called Mobile Cloud Computing (MCC). However, issues like portability and interoperability should be addressed for mobile augmentation which...

    Provided By University of Maine at Presque Isle

  • White Papers // May 2012

    Mobile Cloud Computing: A Review on Smartphone Augmentation Approaches

    Smartphone's have recently gained significant popularity in heavy mobile processing while users are increasing their expectations toward rich computing experience. However, resource limitations and current mobile computing advancements hinder this vision. Therefore, resource-intensive application execution remains a challenging task in mobile computing that necessitates device augmentation. In this paper, Smartphone...

    Provided By University of Maine at Presque Isle

  • White Papers // Apr 2012

    Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing

    Recent trend of mobile computing is emerging toward executing resource-intensive applications in mobile devices regardless of underlying resource restrictions (e.g. limited processor and energy) that necessitate imminent technologies. Prosperity of cloud computing in stationary computers breeds Mobile Cloud Computing (MCC) technology that aims to augment computing and storage capabilities of...

    Provided By University of Maine at Presque Isle

  • White Papers // Apr 2012

    Protection in Optical Mesh Networks - A Cost Effective Strategy Based on Topological Constraints

    The physical topology of optical networks imposes significant effects on the wavelength requirements and the associated network cost. Some paper on this topic has already appeared, but the impact of topologies on survivability, which is a prime issue in optical networks, is a nascent topic. This paper proposes a protection...

    Provided By University of Maine at Presque Isle

  • White Papers // Apr 2012

    Research On Mobile Cloud Computing: Review, Trend, And Perspectives

    Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2013

    A Novel Application Licensing Framework for Mobile Cloud Environment

    Mobile cloud computing is a new technology that enhances Smartphone applications capabilities in terms of performance, energy efficiency, and execution support. These features are achieved via computation offloading technique that is supported by specialized mobile cloud application development models. However, the cloud-enabled applications are prone to application piracy issue for...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2010

    Using Graphics Processors for a High Performance Normalization of Gene Expressions

    The authors are witnessing the consolidation of GPUs in parallel computing. Represented by solid commercial products, GPUs provide a low cost road towards high performance whose scope spreads beyond graphical territory. Shaders programming has transformed vertex and pixel processors into configurable units willing to compute very diverse problems, and unified...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    An Artificial Neural Network Classification Approach For Improving Accuracy Of Customer Identification In E-Commerce

    With the advances in web-based oriented technologies, experts are able to capture user activities on the web. Users' web browsing behavior is used for user identification. Identifying users during their activities is extremely important in electronic commerce (e-Commerce) as it has the potential to prevent illegal transactions or activities particularly...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    Recognition Of Emotion In Speech Using Variogram Based Features

    Speech Emotion Recognition (SER) is a relatively new and challenging branch in speech processing area. In this paper, the authors propose new features derived from speech spectrogram using image processing techniques for emotion recognition. For this purpose, variogram graphs are calculated from speech spectrogram. The significant Discrete Cosine Transform (DCT)...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2014

    Performance Evaluation Of Enhanced Velocity-Based Handoff Algorithm For VANET

    Vehicular Ad hoc NETworks (VANETs) is based on 802.11p standard where a vehicle is connected to a base station in a dynamic manner. The vehicle is traversed from one base station to another and may affect the transmission of packets. To minimize the disruption, handoff latency must be kept at...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    Variable Strength T-Way Test Suite Generator with Constraints Support

    T-way testing (or interaction testing) is a common test planning method used to sample a complete or exhaustive test suite systematically. In t-way testing, it is assumed that interaction only occurs between t numbers of parameters (where t is the interaction strength). Therefore, all t-way strategies generate the t-way test...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2014

    New Domain Decomposition Method For Quality-Aware Parallel H.264 Video Coding

    In this paper, the authors present a new parallel granularity called \"Tiling\" to parallelize the H.264 codec. The new parallel granularity, which has the same granularity level as the parallel slice-level H.264 codec, is based on decomposing the entire video frame into tiles by utilizing a new inherently parallel 2D...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2009

    Semi Fragile Watermark with Self Authentication and Self Recovery

    Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2009

    Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree

    Although intelligent intrusion and detection strategies are used to detect any false alarms within the network critical segments of network infrastructures, reducing false positives is still a major challenge. Up to this moment, these strategies focus on either detection or response features, but often lack of having both features together....

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2009

    Multi-Area QoS Provisioning Using Hierarchical Bandwidth Brokers Architecture

    In this paper, an intra-domain, multi-area Quality of Service (QoS) provisioning mechanism, namely the QoS-HBB architecture is proposed to alleviate the scalability problem in the intra-domain bandwidth broker design. By exploiting the inherent hierarchical nature of OSPF and the fact that an OSPF domain can be subdivided into multiple areas,...

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2009

    Crosscutting Concern Identification at Requirements Level

    An unresolved problem faced by software developers is the failure to identify and modularize certain artefacts that compose the software. It is difficult to modularize these artefacts because they are dispersed among other artefacts in the software properties. Aspects oriented requirements engineering is showing encouraging results in improving identification, modularization...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2008

    Load Balancing in WDM Network with Single and Multiple Lightpath Additions

    Reconfiguration of a Wavelength Division Multiplexed (WDM) optical network is considered for varying traffic demands in the network. Reconfiguration is carried out with the aim of optimizing the objective function and minimizing the number of lightpath changes. This ensures the effective utilization of the network resources with minimum disruption to...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2008

    Web-Based Knowledge Base System for Selection of Non-Traditional Machining Processes

    In this paper, the authors present a web-based knowledge base system developed for identifying the most appropriate nontraditional machining process to suit specific circumstances based on the input parameter requirements such as material type, shape applications, process economy and some of the process capabilities namely, surface finish, corner radii, width...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2007

    Using Rule-Based Technique in Developing the Tool for Finding Suitable Software Methodology

    Software development methodology involves many activities and processes that are carried out when building a software system. There are a lot of available methodologies; one should be suitable for a software project. However, deciding which methodology to be applied requires some assessments on the project nature and characteristics at the...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2007

    Enhanced Software Development Effort and Cost Estimation Using Fuzzy Logic Model

    The development of software has always been characterized by parameters that possess certain level of fuzziness. This requires that some degree of uncertainty be introduced in the models, in order to make the models realistic. Fuzzy logic fares well in this area. Many of the problems of the existing effort...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2007

    Intelligent IEEE 802.11b Wireless Networks MAC Layer Diagnostic Controller in Mobile Ad Hoc Network

    In a Mobile Ad hoc NETwork (MANET), when a node fails during the RTS-CTS handshake process, the MAC protocol is able to identify whether the failure was caused by link failure or due to congestion by inspecting the recorded radio signal strengths. If the cause is due to actual link...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2006

    Securing Network Traffic Using Genetically Evolved Transformations

    In this paper, the authors describe a new approach of classification using genetic programming. The proposed technique consists of genetically coevolving a population of non-linear transformations on the input data to be classified, and map them to a new space with a reduced dimension, in order to get maximum inter-classes...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2006

    Configuration Design and Performance Analysis of a Fast Frequency Modulation Optical CDMA Communication System

    A fast frequency modulation optical Code Division Multiple Access (CDMA) communication system is proposed. In this system, an electrically controlled Tunable Optical Filter (TOF) is used to encode the modulated broadband light source. The code depends on the function set to the controller. Two-dimensional functional code is also proposed based...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2006

    Design and Implementation of a Private and Public Key Crypto Processor for Next-Generation It Security Applications

    The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic systems. The successful deployment of these electronic systems for ecommerce, Internet banking, government online services, VPNs, mobile commerce, Public Key Infrastructure (PKI), etc. are dependent on the...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2006

    An Enhanced Anycast Routing Protocol: Nearest PIM-SIM Extension with Load-Balancing Schemes

    The primary issue with anycast routing protocol is the tradeoff between performance and reliability. An anycast routing protocol that can provide shorter end-to-end delay does not always has lower packet loss, and vice versa. This paper focuses on achieving short end-to-end delay and low packet loss, and proposes an enhancement...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2014

    Understanding User Behaviors in Social Networking Service for Mobile Learning: a Case Study with Twitter

    With the rapid adoption of smart devices, various services have been evolved in mobile environment. Particularly, Twitter has become one of major mobile social networking services. In spite of the increasing use of Twitter services by students and instructors in colleges, very little empirical studies that concern the impact of...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2014

    Permutation Induced Shuffling Based Block Cipher for Real-Time Applications

    The widespread usage of multimedia data in the internet makes media content protection important. Internet telephony, internet conferencing, internet security monitoring, video teleconference, Pay-Per-View (PPV), Video-On-Demand (VOD), medical image transmission, interactive video games are some of the real time applications that require confidentiality. To accommodate the confidentiality in various applications,...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2014

    Prioritizing and Fulfilling Quality Attributes for Virtual Lab Development Through Application of Fuzzy Analytic Hierarchy Process and Software Development

    The evolution in pedagogy and research has introduced new requirements in the educational sector. On demand computing resource provisioning, often referred as virtual lab, is one of the requirements in great demand. Most current virtual lab systems are proprietary and thus their detailed software architectures are not accessible to developers....

    Provided By University of Maine at Presque Isle

  • White Papers // Jan 2014

    A Direction Framework to Address Problems in Requirements Engineering Education

    Requirements Engineering (RE) is the most difficult stage of software development for students to learn and for lecturers to teach. Requirements Engineering Education (REE) problems are reported in several studies. This paper is to verify that REE problems presented in the literature really exist in practice especially in Malaysia and...

    Provided By University of Maine at Presque Isle

  • White Papers // Dec 2013

    A Study of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection

    In recent years, mobile devices are ubiquitous. They are employed for purposes beyond merely making phone calls. Among the mobile operating systems, Android is the most popular due to its availability as an open source operating system. Due to the proliferation of Android malwares, it is crucial to study the...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Spectrum-aware Distributed Channel Assignment for Cognitive Radio Wireless Mesh Networks

    In cognitive radio networks, the application throughput is not only affected by primary user activity but also by numerous environment factors such as interference. Therefore, channel assignment for cognitive radio networks should not only consider channel idle time but also an error rate perceived on the channel. The spectrum-aware channel...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Optimal Resource Key Management Protocol for Clustered Heterogeneous Wireless Sensor Networks

    Secure communication in a Wireless Sensor Network (WSN) can be achieved through efficient key management techniques. Achieving security is not so simple due to the limited capability of radio module in wireless sensor network device. The probabilistic model provides a flexible and efficient solution when comparing various key distribution schemes...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2013

    Distributed Context Aware Dynamic Adaptation Model for Knowledge Assessment in E-Learning System

    In this paper, the authors propose a context driven dynamic adaptation model for knowledge assessment in e-learning system through software as component. Most of the existing models deployed for knowledge management have focused on the contents of the assessment while giving less emphasis to the context with which the assessment...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Recognition of Emotion in Speech Using Spectral Patterns

    Recent developments in man-machine interaction have intensified the need for recognizing human's emotion from speech. In this paper, the authors proposed using Spectral Pattern (SP) and Harmonic Energy (HE) features for the automatic recognition of human affective information from speech. These features were extracted from the spectrogram of the speech...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Path Discovery and Selection for Energy Efficient Routing with Transmit Power Control in MANET

    In this paper, the authors design an energy efficient routing mechanism based on Dynamic Source Routing (DSR). In order to achieve energy efficient reliable transmission, routing here is divided into two parts. One is to discover the path based on Received Signal Strength (RSS) and residual energy and the other...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Detecting Faces in Colored Images Using Multi-Skin Color Models and Neural Network with Texture Analysis

    In this paper, the authors present an efficient hybrid system to detect frontal faces in colored images regardless of scale, location, illumination, race, number of faces, and complex background. The general architecture of the proposed system encompasses three methods: skin color segmentation, rule-based geometric knowledge, and neural network-based classifier. In...

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2013

    Intelligent Agent Based Pair Programming and Increased Self-Efficacy Through Prior-Learning for Enhanced Learning Performance

    Performances of the students in learning a programming course is not same, since learning to program is greatly influenced by two dominating factors namely self-efficacy and mental efforts. Prior research efforts have shown that high self-efficacy can have an increased effect of being a trained programmer, especially in an intelligent...

    Provided By University of Maine at Presque Isle

  • White Papers // Feb 2013

    Optimizing Wireless Channel Using Adaptive Modulation To Improve QoS in VANET

    Vehicular Ad hoc NETwork (VANET) is a multi-hop wireless network which involves vehicles acting as nodes to communicate with each other without infrastructural support. With the increase in Quality of Service (QoS) needs in evolving applications and the widespread use of wireless and mobile devices, it is desirable to support...

    Provided By University of Maine at Presque Isle

  • White Papers // Jul 2011

    Cloud Based Video on Demand Model with Performance Enhancement

    Today Internet has become an integral part of most of the peoples' life. The attempt to display media files through Internet was started from the mid-20th century. Several research papers have been reported to provide video on demand model in distributed environments like RMI, component based, SOA and grid computing....

    Provided By University of Maine at Presque Isle

  • White Papers // Jun 2011

    XEBPER: An e-Book Using Java 3D API

    E-book visualization is being shown by interpreting book metaphors on computer display devices. It can be expressed with the advanced features such as hyper-linking, note-taking, highlights, bookmarks, etc. However, it does not contain enough elements for representation and layout procedures, especially advanced techniques for rendering methods. This paper presents a...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2011

    Proposed Fault Tolerant New Irregular Augmented Shuffle Network

    Multistage Interconnection Networks (MINs) are playing a vital role in real time applications. The MIN with N processors and N memory modules has the complexity as O (N log2 N). In real time applications it is important to consider time dependent reliability i.e. R (t) and mean time to failure...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2011

    Deceiving Communication Links on an Organization Email Corpus

    Word use in email is correlated to the role of the individuals within the organization and relationships among them are based on their patterns of word use. In this paper, using the matrix-decomposition techniques the authors determine the communication links with individuals who conversed frequently based on their word usage...

    Provided By University of Maine at Presque Isle

  • White Papers // Mar 2011

    Cohort-Surrogate-Associate: A Server-Subscriber Load Sharing Model for Video-on-Demand Services

    In this paper, the authors outline a proxy-subscriber-subscriber approach, named Cohort-Surrogate-Associate (CSA) architecture, to address three main concerns inherent in a Video-on-Demand (VoD) service: delivery performance, video traffic, and playout delay. The model coerced coordination among subscribers, whereby every subscriber has a list of video data units stored in their...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2010

    Shoulder Surfing Resistance Using PENUP Event and Neighbouring Connectivity Manipulation

    Picture-based password has been proposed as an alternative authentication method to replace text-based password. Ensuring the security of picture-based password is not a simple task as picture-based objects are a lot easier to access and remember and can thus be easily guessed. In particular, shoulder surfing attack still remains as...

    Provided By University of Maine at Presque Isle

  • White Papers // Sep 2010

    Prosodic Analysis and Modelling for Malay Emotional Speech Synthesis

    In this paper, the authors discuss an emotional prosody generator for a Malay speech synthesis system that can re-synthesize the selected vocal emotion from neutral synthesized speech output and improve the naturalness by adopting rule-based prosody conversion techniques. The role of prosodic features in emotional expression, particularly fundamental frequency and...

    Provided By University of Maine at Presque Isle