Recent Submissions

  • Analysis of results in simulation and modeling of CDMA systems 

    Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2007-07-01)
    In this paper, using discrete event stochastic simulation by batch-means, new results have been obtained by analysing the sensitivity of CDMA blocking probability for a given traffic load against various number of calls ...
  • Performance comparison of IPv4 and IPv6 in peer-peer and client server local area networks 

    Kolahi, Samad; Soorty, Burjiz; Chand, Navneet; Qu, Zhang (Institute of Electrical and Electronics Engineers (IEEE), 2010-06-29)
    In this paper, the performance of IPv4 and IPv6 are compared for both Client-Server and Peer-Peer networks. For both networks, IPv4 produced higher bandwidth for TCP protocol. For UDP, IPv4 and IPv6 showed insignificant ...
  • Analysis of UDP DDoS floor cyber attack and defense mechanisms on web server with Linux Ubuntu 13 

    Kolahi, Samad; Treseangrat, Kiattiku; Sarrafpour, Bahman (Institute of Electrical and Electronics Engineers (IEEE), 2015-02-19)
    Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be ...
  • Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13 

    Treseangrat, Kiattikul; Kolahi, Samad; Sarrafpour, Bahman (2015-07-15)
    Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip ...
  • An artifact-centric business process execution platform 

    Ngamakeur, Kan; Yongchareon, Dr. Sira; Liesaputra, Veronica; Liu, Chengfei; Yu, Jian (Institute of Electrical and Electronics Engineers (IEEE), 2016-09)
    Artifact-centric modeling has become an alternative, yet promising approach of business process (BP) modeling and management as it provides higher flexibility than that of traditional activity-centric approaches. However, ...
  • Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7 

    Kolahi, Samad; Cao, Yuqing; Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)
    IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ...
  • Bionic voice (pilot study) : natural speech restoration for voice impaired individuals 

    Sharifzadeh, Hamid; Allen, Jacqui; Sarrafzadeh, Hossein; Ardekani, Iman (Health Informatics New Zealand, 2016-11)
    The human voice is the most magnificent instrument for communication, capable of expressing deep emotions, conveying oral history through generations, or of starting a war. However, those who suffer from aphonia (no voice) ...
  • Designing mobile applications for smoking cessation in New Zealand 

    Baghaei, Nilufar; Wu, Lian; Casey, John; Biddle, TeUrikore (International Conference on Medical Information Processing and Analysis, 2016-06)
    Tobacco is a leading cause of preventable death in New Zealand. The smoking rate for New Zealand Māori was 44 percent in 2009, still significantly higher than for non-Māori (18 percent) for both males and females. In this ...
  • Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols 

    Narayan, Shaneel; Ishrar, Salman; Kumar, Avinesh; Gupta, Ruchinav; Khan, Ziafil (2016-07)
    This paper provide an overview of behaviour of transition mechanisms, with and without VPN Protocols. Performance metrics related to networks have been gathered from test-bed implementations. The two transition mechanisms ...
  • The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANS with WPA2 security. 

    Kolahi, Samad; Qu, Zhang; Soorty, Burjiz K.; Chand, Navneet (ACM Press, 2009-07-01)
    The IPv4 and IPv6 performance with UDP (User Datagram Protocol) on two client-server wireless 802.11n LANs implementing Windows Vista-Windows Server 2008 and Windows XP-Windows Server 2008 are compared. The impact of ...
  • UDP performance analysis of IPv4 and IPv6 on Windows Vista and Windows XP over fast ethernet peer-peer LAN 

    Manford, Chris; Kolahi, Samad; Soorty, Burjiz. K.; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2009-12-20)
    In this paper, the performance of IPv4 and IPv6 are compared using Windows Vista and the UDP (User Datagram Protocol) throughput results are compared with Windows XP in a peer-peer environment. The results indicated that ...
  • On Erlang capacity of CDMA systems 

    Kolahi, Samad (Kluwer Academic Publishers, 2003-12-01)
    In this paper, the Erlang capacity of mobile protocols such as FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) systems are compared assuming perfect ...
  • Performance comparison of category 5e vs. category 6 cabling systems for both IPv4 and IPv6 in gigabit ethernet 

    Soorty, Burjiz. K.; Kolahi, Samad; Qu, Zhang; Chand, Navneet (Institute of Electrical and Electronics Engineers (IEEE), 2010-07-01)
    The performance of category 5e and 6 cabling is compared for both IPv4 and IPv6 using Gigabit Ethernet LAN. The maximum bandwidth achieved was 700Mbps and it was for IPv4 and category 5e cabling.
  • The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment 

    Kolahi, Samad; Singla, Hitesh; Ehsan, Mohd Nash; Dong, Clarence (Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)
    The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ...
  • Neural network classification of pharmaceutical active ingredient from near infrared spectra 

    Yee, Nigel; Yan, Ashley (Institute of Electrical and Electronics Engineers (IEEE), 2015-12)
    This paper presents results from a scoping study undertaken with the intention of demonstrating the applicability of reflectance Near-Infrared (NIR) spectroscopy in classification of pharmaceutical type based on active ...
  • Other cells interference of power controlled CDMA systems 

    Kolahi, Samad (Institute of Electrical and Electronics Engineers (IEEE), 2002-12-17)
    In this paper, using a simulation and modelling technique, the other cell interference factor is obtained and compared with previous upper bounds. The effect of propagation parameters on other cell interference is investigated. ...
  • Data mining driven computational analysis of stock markets, methods and strategies 

    Lai, Anthony; Phang, Shaoning; Holmes, Wayne (Academic Fora (Kuala Lumpur, Malaysia), 2015-12)
    The stock market is a complex, dynamic and non-linear environment. The prediction of any future market reaction is further complicated by huge amounts of often unstructured financial data and uncertainty due to the effects ...
  • The impact of wireless LAN security on performance for different windows operating systems 

    Kolahi, Samad; Narayan, Shaneel; Nguyen, Du D. T.; Sunarto, Yonathan; Mani, Paul (Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)
    This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ...
  • Evaluation of IPv6 with IPSec in IEEE 802.11n Wireless LAN using Fedora 15 Operating System 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-07-07)
    IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed ...
  • Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment 

    Kolahi, Samad; Cao, Yuqing (Rico); Chen, Hong (Institute of Electrical and Electronics Engineers (IEEE), 2013-11-12)
    Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 ...

View more