• Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • The impact of wireless LAN security on performance for different windows operating systems 

    Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D. T.; Sunarto, Yonathan; Mani, Paul (Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)
    This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...
  • Evaluation of IPv6 with IPSec in IEEE 802.11n Wireless LAN using Fedora 15 Operating System 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-07-07)
    IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed ...
  • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...
  • Simulation model, warm-up period, and simulation length of cellular systems 

    Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2011-01-25)
    In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. ...
  • Performance analysis of some operating systems in wireless 802.11n networks 

    Kolahi, Samad; Li, Peng (University of Bahrain (Zallaq, Bahrain), 2016-01-30)
    In this paper, the performance of some operating systems (Windows 7, Windows XP, and Fedora 12) are evaluated over IEEE 802.11n WLAN (Wireless LAN), for TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), ...
  • Performance evaluation of virtual private network protocols in Windows 2003 environment 

    Narayan, Shaneel; Kolahi, Samad; Brooking, Kris; de Vere, Simon (Institute of Electrical and Electronics Engineers (IEEE), 2008-12-20)
    Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses ...
  • WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems 

    Kolahi, Samad; Li, Peng; Safdari, Mustafa; Argawe, Mulugeta (Institute of Electrical and Electronics Engineers (IEEE), 2012-07-01)
    In this paper, we present new results on the performance of IEEE 802.11n using open system (no security) and WPA2 security for Windows XP and Windows 7. Enabling WPA2 security results in approximately 4.4 Mbps less TCP ...
  • ETL tools for data warehousing : an empirical study of open source Talend Studio versus Microsoft SSIS 

    Katragadda, Ranjith; Tirumala, Sreenivas Sremath; Nandigam, David (Institute of Electrical and Electronics Engineers (IEEE), 2015-01)
    Relational databases are bound to follow various database integrity rules and constraints that makes the reporting a time consuming process. Data Warehousing has evolved out of the desperate need for easy access to structured ...
  • Effect of WPA2 Security on IEEE 802.11n Bandwith 

    Li, Peng; Kolahi, Samad; Safdari, Mustafa; Argawe, Mulugeta (IEEE, 2011-03-22)
    In this paper 802.11 wireless peer-peer network is evaluated for both IPv4 and IPv6 in Windows 7 and Fedora 12 operating systems. IPv4 has higher throughput than IPv6 for all packet sizes for both Windows 7 and Fedora 12 ...
  • Ensemble based learning for decision making : current status and future prospects 

    Ali, Shahid; Tirumala, Sreenivas Sremath; Sarrafzadeh, Hossein (Institute of Electrical and Electronics Engineers (IEEE), 2015-07)
    In real world situations every model has some weaknesses and will make errors on training data. Given the fact that each model has certain limitations, the aim of ensemble learning is to supervise their strengths and ...
  • Effect of quantization on competitive co-evolution algorithm - QCCEA versus CCEA 

    Tirumala, Sreenivas Sremath; Nandigam, David; Ali, Shahid; Li, Zuojin (International Institute of Engineers and Researchers (IIER), 2015-02-15)
    Quantum inspired Evolutionary Algorithm (QEA) which uses qubits has been the basis for the development of many Quantum Inspired algorithms. Di- verging from this, a new Quantum Inspired Competitive Co-evolution algorithm ...
  • A process mining technique using pattern recognition 

    Liesaputra, Veronica; Yongchareon, Dr. Sira; Chaisiri, Sivadon (Conference on Advanced Information Systems Engineering (CAiSE), 2015-06)
    Several works have proposed process mining techniques to discover process models from event logs. With the existing works, mined models can be built based on analyzing the relationship between any two events seen in event ...
  • Evaluating IPv6 in peer-to-peer 802.11n wireless LAN 

    Kolahi, Samad; LI, Peng (IEEE Computer Society, 2011-08)
    IPv6 is built into the latest versions of Microsoft Windows and Linux-based operating systems. It's expected to replace the current IPv4 and solve its numerous problems, such as address exhaustion, security, and mobility. ...
  • Analysis of UDP DDoS flood cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

    Kolahi, Samad; Treseangrat, Kiattiku; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02)
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
  • Adaptive background modeling for land and water composition scenes 

    Zhao, Jing; Pang, Shaoning; Hartill, Bruce; Sarrafzadeh, Hossein (International Conference on Image Analysis and Processing (ICIAP), 2015-09)
    In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background Modeling method for Land and Water composition scenes (ABM-lw) to interpret the traffic of boats passing across boat ramps. We ...
  • Mobile devices as support systems for health behaviour 

    Nandigam, David; Baghaei, Nilufar; Liang, Haining (Institute of Electrical and Electronics Engineers (IEEE), 2015-05)
    A Behaviour Change Support System (BCSS) is a socio-technical information system designed to form, alter, or reinforce attitudes, behaviours, or compliance to a regular patterns of activities, and they do so without the ...
  • An intelligent student advising system using collaborative filtering 

    Ganeshan, Kathiravelu; Li, Xiaosong (Frontiers in Education Conference (FIE), 2015-10)
    We propose a web based intelligent student advising system using collaborative filtering, a technique commonly used in recommendation systems assuming that users with similar characteristics and behaviors will have similar ...
  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...