• The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANS with WPA2 security. 

    Kolahi, Samad; Qu, Zhang; Soorty, Burjiz K.; Chand, Navneet (ACM Press, 2009-07-01)
    The IPv4 and IPv6 performance with UDP (User Datagram Protocol) on two client-server wireless 802.11n LANs implementing Windows Vista-Windows Server 2008 and Windows XP-Windows Server 2008 are compared. The impact of ...
  • UDP performance analysis of IPv4 and IPv6 on Windows Vista and Windows XP over fast ethernet peer-peer LAN 

    Manford, Chris; Kolahi, Samad; Soorty, Burjiz. K.; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2009-12-20)
    In this paper, the performance of IPv4 and IPv6 are compared using Windows Vista and the UDP (User Datagram Protocol) throughput results are compared with Windows XP in a peer-peer environment. The results indicated that ...
  • RF fingerprinting : research opportunities 

    Rehman, Saeed; Sowerby, Kevin W.; Alam, Shafiq (Asia Pacific Signal and Information Processing Association (APSIPA), 2015-01)
    Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ...
  • Computational thinking : the skill set of the 21st century 

    Mohaghegh, Dr Mahsa; McCauley, Michael (TechScience Publications, 2016-05)
    Computational thinking is a relatively new term, and is the topic of much discussion in the educational realm today. Research shows that computational thinking is a highly valuable skill that is becoming a topic of increasing ...
  • On Erlang capacity of CDMA systems 

    Kolahi, Samad (Kluwer Academic Publishers, 2003-12-01)
    In this paper, the Erlang capacity of mobile protocols such as FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) systems are compared assuming perfect ...
  • Capture the talent : secondary school education with cyber security competition 

    Mohaddes Deylami, Hanif; Mohaghegh, Dr Mahsa; Sarrafzadeh, Hossein; McCauley, Michael; Ardekani, Iman; Kingston, Tamsin (Academy & Industry Research Collaboration Center (AIRCC), 2015-11)
    Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ...
  • Performance comparison of category 5e vs. category 6 cabling systems for both IPv4 and IPv6 in gigabit ethernet 

    Soorty, Burjiz. K.; Kolahi, Samad; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2010-07-01)
    The performance of category 5e and 6 cabling is compared for both IPv4 and IPv6 using Gigabit Ethernet LAN. The maximum bandwidth achieved was 700Mbps and it was for IPv4 and category 5e cabling.
  • The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment 

    Kolahi, Samad; Singla, Hitesh; Ehsan, Mohd Nash; Dong, Clarence (Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)
    The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ...
  • Effects of software security on software development life cycle and related security issues 

    Mohaddes Deylami, Hanif; Ardekani, Iman; Muniyandi, Ravie Chandren; Sarrafzadeh, Hossein (International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)
    Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ...
  • Estimation of internet node location by latency measurements : the underestimation problem 

    Komosny, Dan; Voznak, Miroslav; Ganeshan, Kathiravelu; Sathu, Hira (Kaunas University of Technology (Kaunas, Lithuania), 2015)
    In this paper we deal with discovering a geographic location of a node in the Internet. Knowledge of location if fundamental element for many location based applications and web services. We focus on location finding without ...
  • A fast and adaptive video-based method for eye blink rate estimation 

    Mohammadi, Gheis; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein (ACCENT Society (India), 2015-06-16)
    Eye blink rate (EBR) estimation is one of the informative cues and challengeable areas in eye-based systems that has a wide range of applications like the detecting a driver’s drowsiness, anxiety analysis, diseases detection ...
  • Neural network classification of pharmaceutical active ingredient from near infrared spectra 

    Yee, Nigel; Yan, Ashley (Institute of Electrical and Electronics Engineers (IEEE), 2015-12)
    This paper presents results from a scoping study undertaken with the intention of demonstrating the applicability of reflectance Near-Infrared (NIR) spectroscopy in classification of pharmaceutical type based on active ...
  • Other cells interference of power controlled CDMA systems 

    Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2002-12-17)
    In this paper, using a simulation and modelling technique, the other cell interference factor is obtained and compared with previous upper bounds. The effect of propagation parameters on other cell interference is investigated. ...
  • Other-cells Interference in CDMA systems 

    Kolahi, Samad; Williamson, Allan G.; Sowerby, Kevin William (Institution of Engineering and Technology (IET), 2004-09-20)
    Using simulation and modelling, the other-cells interference factor for CDMA systems is obtained. Situations with tiers of neighbouring cells are investigated under various propagation parameters and for two scenarios, ...
  • Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • The impact of wireless LAN security on performance for different windows operating systems 

    Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D. T.; Sunarto, Yonathan; Mani, Paul (Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)
    This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...
  • Evaluation of IPv6 with IPSec in IEEE 802.11n Wireless LAN using Fedora 15 Operating System 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-07-07)
    IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed ...
  • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...
  • Simulation model, warm-up period, and simulation length of cellular systems 

    Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2011-01-25)
    In this paper, discrete event simulation by batch-means of a M/M/∞ queuing system is utilised to simulate a cellular CDMA system. The details of the simulation model, warm-up period, and simulation run time are discussed. ...
  • Performance analysis of some operating systems in wireless 802.11n networks 

    Kolahi, Samad; Li, Peng (University of Bahrain (Zallaq, Bahrain), 2016-01-30)
    In this paper, the performance of some operating systems (Windows 7, Windows XP, and Fedora 12) are evaluated over IEEE 802.11n WLAN (Wireless LAN), for TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), ...