University of Mauritius

Displaying 1-14 of 14 results

  • White Papers // Aug 2012

    AES-CBC Software Execution Optimization

    With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)- Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC)...

    Provided By University of Mauritius

  • White Papers // Aug 2012

    Low-Cost Bluetooth Mobile Positioning for Location-Based Application

    Bluetooth is a promising short-range radio network technology. The authors present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the BlueTooth (BT) Sensor System and the Central Navigation System which have...

    Provided By University of Mauritius

  • White Papers // Sep 2011

    Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network

    Caching has been used to improve the performance of network-dependent computer system. A number of cache replacement schemes along with invalidation reports schemes have been devised for MANETs. Apart from improving the response time of request in MANET, caching also increases the network lifetime. In this paper, it is shown...

    Provided By University of Mauritius

  • White Papers // Apr 2011

    SAMPCAN: A Novel Caching Technique for Client-Server Interaction Model in Large Ad Hoc Networks Using Resampling Methods

    The scalability of routing protocols has been a prominent topic to increasing the lifetime of a mobile ad hoc network. One of the underlying features behind scalable protocols is the localised nature of path maintenance. However, nodes' data communications are excluded, despite being the main purpose of the routing protocols....

    Provided By University of Mauritius

  • White Papers // Jul 2010

    An Assessment of the Performance of Bluetooth as a Broadcasting Channel

    This research looks into assessing the potential of using Bluetooth as a broadcasting medium for transmission of data files among Bluetooth-enabled devices. The effect of several parameters such as data file types and sizes, distance, barriers and interference from other wireless technologies on the system were tested. The software was...

    Provided By University of Mauritius

  • White Papers // Jul 2010

    Investigating & Improving the Reliability and Repeatability of Keystroke Dynamics Timers

    One of the most challenging tasks facing the security expert remains the correct authentication of human being which has been crucial to the fabric of the society. The emphasis is now on reliable person identification for computerized devices as the latter forms an integral part of the daily activities. Moreover...

    Provided By University of Mauritius

  • White Papers // May 2010

    LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks

    Temporal Key Integrity Protocol (TKIP) is a provisional solution for Wired Equivalent Privacy (WEP) security loopholes present in already widely deployed legacy 802.11 wireless devices. In this paper, the authors model and analyze the computational complexity of TKIP security mechanism and propose an optimized implementation, called LOTKIP, to decrease processing...

    Provided By University of Mauritius

  • White Papers // Mar 2010

    Mapping Knowledge Model Onto Java Codes

    This paper gives an overview of the mapping mechanism of SEAM-a methodology for the automatic generation of knowledge models and its mapping onto Java codes. It discusses the rules that will be used to map the different components in the knowledge model automatically onto Java classes, properties and methods. The...

    Provided By University of Mauritius

  • White Papers // Dec 2009

    Returns, Trading Volume and Volatility In The Stock Market Of Mauritius

    This paper examines the trading volume and return and volatility relationship on the Stock Exchange of Mauritius (SEM). Thirty-six stocks, six constructed indices and the SEMDEX has been used to test the validity of the Mixture of Distributions Hypothesis where volume is taken as a proxy for the rate of...

    Provided By University of Mauritius

  • White Papers // Dec 2009

    Robust Multi-Biometric Recognition Using Face and Ear Images

    This study investigates the use of ear as a biometric for authentication and shows experimental results obtained on a newly created dataset of 420 images. Images are passed to a quality module in order to reduce False Rejection Rate. The Principal Component Analysis ("Eigen ear") approach was used, obtaining 90.7...

    Provided By University of Mauritius

  • White Papers // Nov 2009

    Emotions in Pervasive Computing Environments

    The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, the authors build on enactive psychology and investigate the incorporation of emotions in pervasive systems....

    Provided By University of Mauritius

  • White Papers // Oct 2009

    AES CCMP Algorithm With N-Way Interleaved Cipher Block Chaining

    Now-a-days, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality,...

    Provided By University of Mauritius

  • White Papers // Jun 2009

    MiSense Hierarchical Cluster-Based Routing Algorithm (MiCRA) for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are currently receiving significant attention due to their unlimited potential. These networks are used for various applications, such as habitat monitoring, automation, agriculture, and security. The efficient node-energy utilization is one of important performance factors in wireless sensor networks because sensor nodes operate with limited battery...

    Provided By University of Mauritius

  • White Papers // Apr 2009

    A Service-Oriented Component-Based Middleware Architecture for Wireless Sensor Networks Sensor Network

    The use of sensor networks in different spheres of the modern society is emerging as a new trend. However, the integration and coordination of heterogeneous sensors is still a challenge, especially when the target application scenario is susceptible to constant changes. To enable a wider adoption of sensor network technologies,...

    Provided By University of Mauritius

  • White Papers // Apr 2009

    A Service-Oriented Component-Based Middleware Architecture for Wireless Sensor Networks Sensor Network

    The use of sensor networks in different spheres of the modern society is emerging as a new trend. However, the integration and coordination of heterogeneous sensors is still a challenge, especially when the target application scenario is susceptible to constant changes. To enable a wider adoption of sensor network technologies,...

    Provided By University of Mauritius

  • White Papers // Mar 2010

    Mapping Knowledge Model Onto Java Codes

    This paper gives an overview of the mapping mechanism of SEAM-a methodology for the automatic generation of knowledge models and its mapping onto Java codes. It discusses the rules that will be used to map the different components in the knowledge model automatically onto Java classes, properties and methods. The...

    Provided By University of Mauritius

  • White Papers // Dec 2009

    Returns, Trading Volume and Volatility In The Stock Market Of Mauritius

    This paper examines the trading volume and return and volatility relationship on the Stock Exchange of Mauritius (SEM). Thirty-six stocks, six constructed indices and the SEMDEX has been used to test the validity of the Mixture of Distributions Hypothesis where volume is taken as a proxy for the rate of...

    Provided By University of Mauritius

  • White Papers // Jul 2010

    An Assessment of the Performance of Bluetooth as a Broadcasting Channel

    This research looks into assessing the potential of using Bluetooth as a broadcasting medium for transmission of data files among Bluetooth-enabled devices. The effect of several parameters such as data file types and sizes, distance, barriers and interference from other wireless technologies on the system were tested. The software was...

    Provided By University of Mauritius

  • White Papers // Jul 2010

    Investigating & Improving the Reliability and Repeatability of Keystroke Dynamics Timers

    One of the most challenging tasks facing the security expert remains the correct authentication of human being which has been crucial to the fabric of the society. The emphasis is now on reliable person identification for computerized devices as the latter forms an integral part of the daily activities. Moreover...

    Provided By University of Mauritius

  • White Papers // Dec 2009

    Robust Multi-Biometric Recognition Using Face and Ear Images

    This study investigates the use of ear as a biometric for authentication and shows experimental results obtained on a newly created dataset of 420 images. Images are passed to a quality module in order to reduce False Rejection Rate. The Principal Component Analysis ("Eigen ear") approach was used, obtaining 90.7...

    Provided By University of Mauritius

  • White Papers // Apr 2011

    SAMPCAN: A Novel Caching Technique for Client-Server Interaction Model in Large Ad Hoc Networks Using Resampling Methods

    The scalability of routing protocols has been a prominent topic to increasing the lifetime of a mobile ad hoc network. One of the underlying features behind scalable protocols is the localised nature of path maintenance. However, nodes' data communications are excluded, despite being the main purpose of the routing protocols....

    Provided By University of Mauritius

  • White Papers // Nov 2009

    Emotions in Pervasive Computing Environments

    The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, the authors build on enactive psychology and investigate the incorporation of emotions in pervasive systems....

    Provided By University of Mauritius

  • White Papers // Jun 2009

    MiSense Hierarchical Cluster-Based Routing Algorithm (MiCRA) for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are currently receiving significant attention due to their unlimited potential. These networks are used for various applications, such as habitat monitoring, automation, agriculture, and security. The efficient node-energy utilization is one of important performance factors in wireless sensor networks because sensor nodes operate with limited battery...

    Provided By University of Mauritius

  • White Papers // Sep 2011

    Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network

    Caching has been used to improve the performance of network-dependent computer system. A number of cache replacement schemes along with invalidation reports schemes have been devised for MANETs. Apart from improving the response time of request in MANET, caching also increases the network lifetime. In this paper, it is shown...

    Provided By University of Mauritius

  • White Papers // May 2010

    LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks

    Temporal Key Integrity Protocol (TKIP) is a provisional solution for Wired Equivalent Privacy (WEP) security loopholes present in already widely deployed legacy 802.11 wireless devices. In this paper, the authors model and analyze the computational complexity of TKIP security mechanism and propose an optimized implementation, called LOTKIP, to decrease processing...

    Provided By University of Mauritius

  • White Papers // Aug 2012

    Low-Cost Bluetooth Mobile Positioning for Location-Based Application

    Bluetooth is a promising short-range radio network technology. The authors present a low cost and easily deployed, scalable infrastructure for indoor location-based computing of mobile devices based on Bluetooth technology. The system consists of 2 main components, namely the BlueTooth (BT) Sensor System and the Central Navigation System which have...

    Provided By University of Mauritius

  • White Papers // Aug 2012

    AES-CBC Software Execution Optimization

    With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)- Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC)...

    Provided By University of Mauritius

  • White Papers // Oct 2009

    AES CCMP Algorithm With N-Way Interleaved Cipher Block Chaining

    Now-a-days, the increased use of battery-powered mobile appliances and the urge to access time-sensitive data anytime anywhere has fuelled a high demand for wireless networks. However, wireless networks are susceptible to intrusion and security problems. There is an inherent need to secure the wireless data communication to ensure the confidentiality,...

    Provided By University of Mauritius