University of Phoenix

Displaying 1-16 of 16 results

  • White Papers // Jun 2013

    A Survey of Large-Scale Analytical Query Processing in MapReduce

    Enterprises today acquire vast volumes of data from different sources and leverage this information by means of data analysis to support effective decision-making and provide new functionality and services. The key requirement of data analytics is scalability, simply due to the immense volume of data that need to be extracted,...

    Provided By University of Phoenix

  • White Papers // Mar 2013

    A Survey on Security and Privacy Issues in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low cost, and may also be used to improve the performance of multi-hop ad-hoc networks, Wireless Local Areas Networks (WLANs) and Wireless Metropolitan Area Networks (WMANs). Wireless Mesh Networks (WMNs)...

    Provided By University of Phoenix

  • White Papers // Oct 2011

    Cryptography Goes to the Cloud

    The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. In this paper the authors identify some areas where cryptography can help a rapid adoption of cloud computing. Although secure storage has already captured the attention of many cloud providers, offering a higher...

    Provided By University of Phoenix

  • White Papers // Jun 2011

    A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks

    In this paper, the authors present a hierarchical cluster-based IDS architecture for Mobile Ad-hoc NETworks (MANETs) that considers the mobility and energy of nodes in the cluster formation in order to improve detection accuracy and reduce energy consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering...

    Provided By University of Phoenix

  • White Papers // May 2011

    The Study Of Leadership In Small Business Organizations: Impact On Profitability And Organizational Success

    Failures of small businesses in the United States continue to increase. This research examined small construction businesses from Pennsylvania and West Virginia to determine if there was a relationship between leadership style and organizational profitability and success. Leadership was measured through perceptions of leaders, managers, and employees from small construction...

    Provided By University of Phoenix

  • White Papers // May 2010

    Performance Evaluation of Artificial Neural Network - Based Learning Schemes for Cognitive Radio Systems

    Over the last decade the world of wireless communications has been undergoing some crucial changes, which have brought it at the forefront of international research and development interest, eventually resulting in the advent of a multitude of innovative technologies and associated products such as WiFi, WiMax, 802.20, 802.22, wireless mesh...

    Provided By University of Phoenix

  • White Papers // May 2010

    Information Flow for Optimized Management of Spectrum and Radio Resources in Cognitive B3G Wireless Networks

    The Beyond 3G (B3G) radio landscape will consist of cognitive heterogeneous wireless networks, operating in the framework of diverse co-operative associations among different classes of operators and providers, for the accommodation of the demands of users with multimode and/or multi-homing enabled terminals. In this context, the optimized spectrum and radio...

    Provided By University of Phoenix

  • White Papers // May 2010

    Enhancing Channel Estimation in Cognitive Radio Systems by Means of Bayesian Networks

    This paper proposes enhancements to the channel-state estimation phase of a cognitive radio system. Cognitive radio devices have the ability to dynamically select their operating configurations, based on environment aspects, goals, profiles, preferences etc. The proposed method aims at evaluating the various candidate configurations that a cognitive transmitter may operate...

    Provided By University of Phoenix

  • White Papers // May 2010

    Policies for the Reconfiguration of Cognitive Wireless Infrastructures to 3G Radio Access Technologies

    The ceaseless evolution of wireless communications is reflected nowadays on the introduction of Beyond-3G (B3G) systems, characterized by the coexistence and cooperation of various Radio Access Technologies (RATs), over a common infrastructure. Major facilitator of this convergence is the advent of cognitive networks, which deploy elements (base stations and mobile...

    Provided By University of Phoenix

  • White Papers // May 2010

    Neural Network-Based Learning Schemes for Cognitive Radio Systems

    Intelligence is needed to keep up with the rapid evolution of wireless communications, especially in terms of managing and allocating the scarce, radio spectrum in the highly varying and disparate modern environments. Cognitive radio systems promise to handle this situation by utilizing intelligent software packages that enrich their transceiver with...

    Provided By University of Phoenix

  • White Papers // Nov 2009

    Application of the Semantic Learning Approach in the Feasibility Studies Preparation Training Process

    This paper is concerned with an ontology-based knowledge network developed for the semantic representation of the feasibility studies preparation procedure. Specifically, a training scenario in feasibility studies and business plan preparing was built, using the CULTOS tools that are based on a self-contained reusable knowledge repository, which combines the ontology...

    Provided By University of Phoenix

  • White Papers // Jan 2009

    Quantitative Study Determining The Purpose Of Career Planning In U.S. Based International Organizations

    This quantitative descriptive study strives to determine how many U.S. based international organizations incorporate a career planning program, and if the purpose of the program may be employee retention. Employee retention is critical to organizations as productivity, profitability, and growth are sacrificed when organizations fail to address employee retention. The...

    Provided By University of Phoenix

  • White Papers // Mar 2008

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    In this paper, the authors present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, they evaluate the performance of the Multi-Layer Perceptron (MLP), the linear classifier, the Gaussian Mixture Model (GMM), the naive bayes classifier and the Support Vector Machine (SVM). The performance...

    Provided By University of Phoenix

  • White Papers // Jan 2008

    Intrusion Detection Using Emergent Self-organizing Maps

    In this paper, the authors propose an intrusion detection approach that is based on a class of neural networks known as Kohonen's Self-Organizing Maps (KSOMs). Their approach combines information visualization and machine learning techniques and enables the user with the ability to have a visual view of network activity. In...

    Provided By University of Phoenix

  • White Papers // Mar 2007

    Intrusion Detection and Response in Ad Hoc Networks

    Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can...

    Provided By University of Phoenix

  • White Papers // Jun 2006

    Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

    The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention...

    Provided By University of Phoenix

  • White Papers // May 2010

    Performance Evaluation of Artificial Neural Network - Based Learning Schemes for Cognitive Radio Systems

    Over the last decade the world of wireless communications has been undergoing some crucial changes, which have brought it at the forefront of international research and development interest, eventually resulting in the advent of a multitude of innovative technologies and associated products such as WiFi, WiMax, 802.20, 802.22, wireless mesh...

    Provided By University of Phoenix

  • White Papers // May 2010

    Information Flow for Optimized Management of Spectrum and Radio Resources in Cognitive B3G Wireless Networks

    The Beyond 3G (B3G) radio landscape will consist of cognitive heterogeneous wireless networks, operating in the framework of diverse co-operative associations among different classes of operators and providers, for the accommodation of the demands of users with multimode and/or multi-homing enabled terminals. In this context, the optimized spectrum and radio...

    Provided By University of Phoenix

  • White Papers // May 2010

    Enhancing Channel Estimation in Cognitive Radio Systems by Means of Bayesian Networks

    This paper proposes enhancements to the channel-state estimation phase of a cognitive radio system. Cognitive radio devices have the ability to dynamically select their operating configurations, based on environment aspects, goals, profiles, preferences etc. The proposed method aims at evaluating the various candidate configurations that a cognitive transmitter may operate...

    Provided By University of Phoenix

  • White Papers // May 2010

    Policies for the Reconfiguration of Cognitive Wireless Infrastructures to 3G Radio Access Technologies

    The ceaseless evolution of wireless communications is reflected nowadays on the introduction of Beyond-3G (B3G) systems, characterized by the coexistence and cooperation of various Radio Access Technologies (RATs), over a common infrastructure. Major facilitator of this convergence is the advent of cognitive networks, which deploy elements (base stations and mobile...

    Provided By University of Phoenix

  • White Papers // May 2010

    Neural Network-Based Learning Schemes for Cognitive Radio Systems

    Intelligence is needed to keep up with the rapid evolution of wireless communications, especially in terms of managing and allocating the scarce, radio spectrum in the highly varying and disparate modern environments. Cognitive radio systems promise to handle this situation by utilizing intelligent software packages that enrich their transceiver with...

    Provided By University of Phoenix

  • White Papers // Jun 2011

    A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks

    In this paper, the authors present a hierarchical cluster-based IDS architecture for Mobile Ad-hoc NETworks (MANETs) that considers the mobility and energy of nodes in the cluster formation in order to improve detection accuracy and reduce energy consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering...

    Provided By University of Phoenix

  • White Papers // Jun 2013

    A Survey of Large-Scale Analytical Query Processing in MapReduce

    Enterprises today acquire vast volumes of data from different sources and leverage this information by means of data analysis to support effective decision-making and provide new functionality and services. The key requirement of data analytics is scalability, simply due to the immense volume of data that need to be extracted,...

    Provided By University of Phoenix

  • White Papers // Nov 2009

    Application of the Semantic Learning Approach in the Feasibility Studies Preparation Training Process

    This paper is concerned with an ontology-based knowledge network developed for the semantic representation of the feasibility studies preparation procedure. Specifically, a training scenario in feasibility studies and business plan preparing was built, using the CULTOS tools that are based on a self-contained reusable knowledge repository, which combines the ontology...

    Provided By University of Phoenix

  • White Papers // Jan 2009

    Quantitative Study Determining The Purpose Of Career Planning In U.S. Based International Organizations

    This quantitative descriptive study strives to determine how many U.S. based international organizations incorporate a career planning program, and if the purpose of the program may be employee retention. Employee retention is critical to organizations as productivity, profitability, and growth are sacrificed when organizations fail to address employee retention. The...

    Provided By University of Phoenix

  • White Papers // May 2011

    The Study Of Leadership In Small Business Organizations: Impact On Profitability And Organizational Success

    Failures of small businesses in the United States continue to increase. This research examined small construction businesses from Pennsylvania and West Virginia to determine if there was a relationship between leadership style and organizational profitability and success. Leadership was measured through perceptions of leaders, managers, and employees from small construction...

    Provided By University of Phoenix

  • White Papers // Mar 2013

    A Survey on Security and Privacy Issues in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low cost, and may also be used to improve the performance of multi-hop ad-hoc networks, Wireless Local Areas Networks (WLANs) and Wireless Metropolitan Area Networks (WMANs). Wireless Mesh Networks (WMNs)...

    Provided By University of Phoenix

  • White Papers // Mar 2007

    Intrusion Detection and Response in Ad Hoc Networks

    Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can...

    Provided By University of Phoenix

  • White Papers // Jun 2006

    Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

    The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention...

    Provided By University of Phoenix

  • White Papers // Mar 2008

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    In this paper, the authors present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, they evaluate the performance of the Multi-Layer Perceptron (MLP), the linear classifier, the Gaussian Mixture Model (GMM), the naive bayes classifier and the Support Vector Machine (SVM). The performance...

    Provided By University of Phoenix

  • White Papers // Jan 2008

    Intrusion Detection Using Emergent Self-organizing Maps

    In this paper, the authors propose an intrusion detection approach that is based on a class of neural networks known as Kohonen's Self-Organizing Maps (KSOMs). Their approach combines information visualization and machine learning techniques and enables the user with the ability to have a visual view of network activity. In...

    Provided By University of Phoenix

  • White Papers // Oct 2011

    Cryptography Goes to the Cloud

    The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. In this paper the authors identify some areas where cryptography can help a rapid adoption of cloud computing. Although secure storage has already captured the attention of many cloud providers, offering a higher...

    Provided By University of Phoenix