- Published Papers
- Work in Progress
- Conference Presentation Slides and Papers
- Large Datasets (download available by clicking on link provided at the bottom of page)
Published Papers
Using Big Data to Detect Financial Fraud Aided by FinTech Methods
Abstract: Financial fraud has been prevalent for centuries. Technological growth has led financial institutions to adopt modern methods to authenticate the customer before carrying out a customer instruction. Fraudsters have taken advantage of processes that do not seek secondary validation before carrying out a financial transfer. FinTech is the approach by financial institutions to implement newer ways of monitoring and authenticating customers using technology. FinTech approach includes several methods that rely on technology to verify that the customer's instructions are valid and the customer is the person who they claim to be. In this paper we look at the many FinTech approaches that are available to protect the financial resources of an organization and how they are vulnerable to fraudulent attempts. One tool that we will explore is the availability of several related pieces of data that must be gathered and analyzed before arriving at a decision on whether a particular transaction is legitimate or not. Today many transactions are done via the internet and so there is no easy way to verify the identity of the individual initiating the transaction. In this effort we will first discuss how Big Data works and how to use Big Data techniques to gather data from multiple sources and combine them into actionable intelligence. We are especially identifying several actionable threat intelligence that businesses could consider before carrying out a financial transaction.
Understanding Workplace Adoption of Social Networking: An Empirical Investigation
Studies on social networking rarely touched on the acceptance of social networking in the workplace. This study, in turn, attempts to fill this gap by explaining the acceptance of social networking in the workplace by proposing a research model for the acceptance of social networking, based on the technology acceptance model (TAM), in order to explain the intention of managers/supervisors to adopt social networking in the workplace. We do this by examining the extent to which the perception of managers/supervisors about the benefits/usefulness, subjective norms, challenges/risk, and the ease of use of social networking affect the intention to adopt the use of social networking in the workplace.
Is Security realistic in Cloud Computing?
Cloud computing is well received because of the benefits it offers but many users are not clear about the scope of security in cloud computing. Many surveys point out that security in the cloud remains the top concern for businesses in their decision making consideration in spite of the cost advantages it offers. In order to identify the security concerns we analyzed over 50 research articles and industry white papers published over the past five years. In this paper we focus on the question “Is security realistic in cloud computing?” In presenting the justification that it is possible to expect adequate security features in the cloud we address several related issues. First, we briefly describe the three types of cloud services – SaaS, PaaS and IaaS. Then we focus on the security aspects that businesses must pay attention to in order to succeed. Next, we consider the importance of trust in the service providers and how they could build customer trust in their services. This discussion leads to service reliability in the cloud and how the cloud providers could build trust in light of the cloud outages. Also, we highlight how the security features offered in the cloud support compliance requirements. We conclude the paper with some relevant information on the legal aspects related to cloud computing.
Security and Privacy vs. Computer Forensics Capabilities
ISACA Journal, Online version, 2009.
Computers are used as a communications tool in many activities today and also serve as repositories of information. The stored documents contain important data that the user would want to protect and in the case of illegal activities, the user would want to hide from investigators. Moreover, legitimate users would expect reasonable security precautions to be in place to protect the data on the computer when the computer is connected to the Internet. In this paper we examine several security features that are commonly used and how such precautions are thwarted by Computer Forensics tools and their impact on privacy.
Lack of Privacy Awareness in Social Networks
ISACA Journal, vol. 6, 21-25, 2012.
Abstract: Social networks have opened up a new avenue of communication for millions of people around the world. The number and demographics of these users span a large spectrum of ages. The major attraction of this new technology is the ease with which people could share their personal information with their friends. In this paper we trace the history of Social Networks and analyze its growth with particular reference to privacy and security aspects. This analysis shows that users perceive that convenience comes first. We used the Technology Acceptance Model in this study to see how the perceived ease of use and perceived usefulness influenced the behavioral intentions to use this new technology.
Significance of efficient spectrum management for global economic development
Journal of International Technology and Information Management (to appear)
Abstract: Radio spectrum is a finite resource to communicate wireless signals over the air. Many economies around the world depend heavily on facilitating wireless communication. International Telecommunications Union guides worldwide spectrum use. Governments around the world control spectrum allocation within their borders. In U.S., Federal Communications Commission allocates spectrum for non-Federal use. Recent spectrum allocation policies in U.S. have generated much discussion on efficient use of spectrum. The theoretical basis for this paper revolves around the efficient management of the spectrum to meet the growing global needs for new services. In this paper, we analyze the policy decisions in the context of spectrum auctions and how they could be adapted for efficient spectrum use. The main goal is then the impact of spectrum availability to facilitate commerce.
Global analysis of security and trust perceptions in web design for e-commerce
International Journal of Information Security and Privacy, vol. 6, #1, 1-13, 2012.
Abstract: Security and trust play a critical role in e-commerce transactions. Web sites project the trustworthiness of the business. In this regard the web design should take into account the user perceptions concerning security and trust in facilitating e-commerce. In this study we focused on these two key aspects. Successful interaction with an e-commerce site depends on attracting and maintaining user’s trust of the web business. In order to assess this security and trust perception we designed and surveyed over 1000 college students, a major group supporting e-commerce. We developed three hypotheses concerning e-commerce web site design with respect to trust, security and privacy. In this paper we identify the important user expectations with regard to web site design and test our hypotheses. E-commerce being global, this analysis includes results from other countries besides U.S.
Intrusion Detection Algorithm for MANET
International Journal of Information Security and Privacy, vol. 5, #3, 36-49, 2011.
Abstract: Mobile ad hoc networks (MANET) present the opportunity to connect transient nodes to the internet without having central control. This very design supports new nodes to join and leave the network based on their proximity to the MANET. Concurrently, it creates many security challenges for authenticating nodes that are not present in a traditional wired network. Much of the existing work on MANET security has focused on routing and mobility. In this paper we present an algorithm that considers the neighboring nodes’ status to determine if a particular node is malicious or not. We used NS2 simulation tool to test the algorithm and present the results in the paper. The major benefits of this research work are in military applications.
Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks
International Journal of Computer Science and Network Security, vol. 9, 1-10, 2009.
Abstract: Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without any centralized authority. These unique characteristics, coupled with the increased vulnerability of MANET for security attacks, demand an immediate solution for securing the ad hoc network prior to its full-fledged deployment in commercial and military applications. So far, most of the research in MANET has been primarily focused on the routing and mobility aspects rather than securing the ad hoc networks. Due to the ever increasing security threats, there is a need to develop architecture, algorithms, and mechanisms for a secured ad hoc network infrastructure. Existing Intrusion Detection Approaches (IDA) in MANET suffer from the lack of design and implementation details for intrusion response. To address this limitation, in this paper we are proposing an intruder identification and response framework for MANET. Experimental results of the model simulated in NS2 for selected Denial of Service attacks are very promising.
Security and Privacy Tradeoffs in RFID Use
Information Systems Control Journal, vol. 6, Online version, 2009.
Abstract: Radio frequency identification (RFID) tags are gaining widespread use in supply chains and inventory control. Besides these two areas, RFID is also being touted as a useful tool for marketing and tracking. Given the nature of RFID technology, all these areas are vulnerable to exploitation by unsavory elements that could put people’s and organizations’ privacy in jeopardy. This paper will explore the potential of RFID technology, its vulnerabilities, and the trade-offs that one could accept for the sake of security and privacy.
A Multi-hop Mobility Management Protocol for Heterogeneous Wireless Networks
International Journal of Pervasive Computing and Communications, vol. 5, #2, 1-17, 2009.
Abstract: Mobility management for single-hop cellular networks has received much research attention in the last few years. One of the research challenges for 4G wireless systems is the design of mobility management techniques that integrate cellular and ad-hoc networks. Currently there are no structured mobility management schemes for these heterogeneous multi-hop networks. In this paper we propose a protocol for Mobility Management in Multi-Hop Heterogeneous Wireless Networks (MHWN) for seamless mobility in an integrated cellular and ad-hoc network. This paper describes techniques for tracking a mobile node in an integrated architecture with minimum overhead. This scheme is independent of the routing protocol used in a multi-hop network. Using MHWN a node can migrate from a single-hop network to a multi-hop connectivity seamlessly. We have implemented and evaluated the proposed protocol by using the network simulator (NS-2).
Information Security Policies and Controls for a Trusted Environment
Information Systems Control Journal, vol. 2, 54-56, 2008.
Abstract: Information Security policies are essential for managing a network. At the same time controls are needed to enhance trust in the information systems. These are put in place to protect the network from attacks. Here, we examine the need for policies and controls in a trusted environment and how such policies could be implemented. The significance of this topic comes from the fact that trust is essential in network communications. Often network attacks succeed because policies are not properly implemented or trust mechanisms are compromised by the attackers. In this paper we focus on operational trust aspects only for a wired system. Much of the trust aspects relate to how the network nodes such as routers, firewalls, and peer nodes behave in handling packets from suspect nodes. Control aspects govern the implementation of policies pertaining to such operations.
Statistical Based Intrusion Detection Framework using Six Sigma Technique
International Journal of Computer Science and Network Security, vol. 7, #10, 333-342
Abstract: This paper presents our statistical based intrusion detection framework for computer networks. This framework uses the Six Sigma technique to identify the thresholds for the critical network parameters. With the help of raw network data, the thresholds identified are used to differentiate normal, uncertain and abnormal behavior due to network intrusion. This is then used for efficient detection and response. We also present a methodology of Six Sigma control analysis for intrusion detection in a network. Performance evaluation of our statistical based intrusion detection approach with related intrusion detection approaches conducted using the benchmark DARPA data are very promising.
Security and Privacy vs. Computer Forensic Capabilities
ISACA Journal Online, 2007
Abstract: Computers are used as a communications tool in many activities today and also serve as repositories of information. The stored documents contain important data that the user would want to protect and in the case of illegal activities, the user would want to hide from investigators. Moreover, legitimate users would expect reasonable security precautions to be in place to protect the data on the computer when the computer is connected to the Internet. In this paper we examine several security features that are commonly used and how such precautions are thwarted by Computer Forensics tools and their impact on privacy.
Work in Progress
Is security Realistic in Cloud Computing?
Abstract: Cloud computing is rapidly emerging as an attractive IT option for businesses. As a concept cloud computing is well received because of the benefits it offers but many users are not clear about the scope of security in cloud computing. We analyzed the ever growing literature on cloud computing security. To put the topic in context we briefly describe the three types of cloud services – SaaS, PaaS and IaaS. Then we focus on the security aspects that businesses must pay attention to in order to succeed. This analysis leads us to the question of how realistic is it expect secure storage and processing of data in the cloud. The paper provides relevant information on the legal aspects of providing security in the cloud and how compliance could be supported.
RFID Applications: Where they stand now and what the future holds
Abstract: Radio Frequency IDentification (RFID) applications are rapidly emerging in many areas. For a while this technology growth was stagnant because of lack of standards and privacy concerns. Even though privacy concerns still remain, global standards are emerging and the acceptance of EPCglobal’s industry-driven recommendations are paving the way for many new applications. In this technology status review chapter we will focus on the growth of RFID technology over the past decade, the emergence of new global standards and the introduction of applications in retail, transportation, financial and healthcare sectors. We will also address the privacy concerns related to RFID and the status of regulations at the federal and state levels in USA in this regard.
Assessment Tools for a Digital Forensics Course
Abstract: Information Security curricula include traditional security topics such as network security and operating system security. Today, people in all walks of life use computing resources heavily. When people come to expect access to information at any time from any place the need to protect such information increases greatly. Moreover, the type of information that is stored in computing systems has also grown significantly. When personally identifiable information is stored there is greater interest for hackers to access such information. Simultaneously there is vast amount of data theft, inadvertent data leak and loss of portable data storage devices. This being the case it is essential to have the tools to protect the data and to find out how and what was lost. In this paper we identify several such tools that were used successfully in a digital forensics course with the goal that other academicians will be able to benefit.
Conference Presentation Slides and Papers
An Assessment of Technologies for In-Home Entertainment
Security and Privacy in Computer Forensics Context
Privacy Issues in Big Data Processing in light of Data Breaches
Cyber-Security and Privacy in the Cloud Amidst Data Breaches
Big Data Analytics Security Applications in Business
Big Data Applications in Business
Big Data applications are revolutionizing various fields such as medicine, meteorology, business and scientific areas. The main thrust of these applications is the ability to use tools such as Hadoop to process very large volumes of data rapidly. The goal is to discern patterns of behavior from a variety of related actions so that one could predict future action. The benefit of using Big Data is to leverage the knowledge gained from the data to tailor the planned action in order to derive some benefit.
Keywords: Big Data, Hadoop, applications, and pattern recognition.
Teaching Big Data Analytics using Tableau Software
Big Data Analytics is being embraced widely by businesses because of the timely information it provides. Today, data capture is much easier thanks to automated systems such as geo location in Facebook. Moreover, a variety of providers capture all kinds of data related to customer preferences, purchase patterns, circle of friends and their general interests in diverse areas such as music, movies, food, travel, etc. Sharing of such data is widespread because of consolidated storage services offered by cloud service providers. Businesses tend to benefit if they can reach their customers when they are physically close to a product or service location. With the information gathered from geo location services about the current location of an individual, businesses in that area could bring to the attention of the potential customer the goods and services available in that vicinity. A typical example would be a restaurant that realizes that a potential customer is in that neighborhood and sends a text message to them about the food specials they have and an incentive coupon. This kind of communication capability is critical to derive the desired outcome. This is facilitated by most people carrying a smart phone with them. I have tried to expose my students to the benefits of Big Data Analytics. This concept is also known by the phrase Business Intelligence. In the paragraphs to follow I will describe the benefits of using Big Data Analytics through the use of Tableau software.
The major software available for Big Data Analytics are Cognos, Information Builders, QlikTech, SAS, SAP, Oracle, and Tableau. A comparative study of all major Business Intelligence software are available in the Magic Quadrant paper by Gartner Research (Gartner, 2012) I had the benefit of having access to Tableau for my students at no cost. Tableau will provide the instructor license for one year and the students’ license for one semester. It is easy to get these licenses once the institution information is registered with Tableau. In the following paragraphs I will describe the use of Tableau for data analysis. In order to get the full benefit of Big Data we will need large data sets. I put together four different data sets of size 500 to 2500 records. The descriptions here are based on the CRM data set of 2500 records.
Cloud Computing Benefits and Security Challenges
Cloud computing is rapidly emerging as an attractive IT option for both small and medium sized enterprises as well as large organizations. The way these two groups approach cloud computing differs somewhat – the former focuses on public cloud and the latter on private cloud. As a concept cloud computing is well received because of the benefits it offers but many are not clear about the scope of what cloud computing can deliver. We analyzed the ever growing literature on cloud computing and the three types of cloud services – SaaS, PaaS and IaaS. In this talk we provide a brief overview of these three types of services and then focus on the security aspects that businesses must pay attention to both for success as well as compliance. We discuss in detail the major commercial cloud services and the levels of data security that they offer. This talk covers in detail the security issues associated with each of the three types of cloud services and suggests some solutions to overcome the challenges.
Radio Spectrum Management – An International Perspective
Radio Spectrum is a finite resource that needs to be managed efficiently in order for all the wireless communications to succeed. The International Telecommunications Union (ITU) has set out guidelines for world-wide use of the radio frequencies. Each country manages this resource by adopting suitable policies following closely the ITU guidelines. Over the past decade several new technologies have been introduced that use the spectra more efficiently. With the introduction of many new services involving voice, video, and data the demand for additional spectra has grown exponentially. Consequently, many governments are now making changes in their policies to make available additional spectra for civilian use and realigning other spectra in order to meet the increased demand. In this paper we will explore how several leading countries such as United States, United Kingdom, Japan, South Korea, and Singapore have addressed the demand for new spectra.
Preserving Trust in Cloud Computing
Acceptance of cloud computing as an alternative to or as a supplement to in-house Information System infrastructure has been phenomenal. This new technology option was introduced less than a decade ago and it has benefited small and medium sized businesses greatly. Large businesses with the necessary resources have also been adopting cloud computing as a supplement to their in-house Information System infrastructure. This new technology option has enabled several businesses to offer services directly to consumers. In all these cases the users have come to realize the benefits of cloud computing while at the same time expressing their concern with regard to security and privacy of their data. One way to alleviate such concerns is to build trust in the service. In this short paper we will explore four different aspects of trust building and trust preservation. The first approach is to leverage the brand awareness of the service. Studies have shown that brand awareness engenders trust. The second aspect involves providing assurances through Service Level Agreement (SLA). This involves having measurable ways for the customer to seek remedy in case of SLA violation. The third aspect in building trust involves the use of Trusted Third Parties (TTPs). In the case of cloud computing the TTPs are emerging as Cloud Service Brokerages who provide value added service to the customer, especially integration of related services. The fourth trust builder involves the use of industry leaders for service components that make up the service.
Cloud service providers must first earn the trust of customers and then offer means to maintain the trust. To overcome the trust issues associated with system availability the service providers could offer data access from backups. Another fundamental aspect to trust building is to offer choices to customers that enable them to build their own encrypted data and have applications that can process encrypted data over the cloud. Another key aspect of building and preserving trust involves transparency in practice. Because of the large number of customers in the cloud it would be impractical for service providers to audit their services by cloud customers. However, the service provider could develop policies that show transparency in how the application processing and data storage are handled. New approaches to processing data over the cloud are emerging that give control to the customer on the data confidentiality and integrity.
Building Trust in Cloud Computing: Challenges in the midst of outages
Cloud computing is evolving rapidly as a global technology solution for cost-effective Information System deployment. The economic impact of cloud computing on e-commerce is expected to be $650 billion by 2016. Most of the major cloud service providers are in US at this time, with several niche cloud service providers emerging in Europe and Asia. By its design the cloud computing concept requires the businesses to operate over the internet by subscribing to services as needed. Internet was not designed for secure communication. Moreover, businesses feel that they lose control over the infrastructure and data when they use cloud services. The cloud service providers provide assurances to the customer on the safe handling of their data and access to unlimited computing resources on demand. Another key feature of cloud service’s attraction is the ability to use more or less services as the demand changes and pay only for what is used. Cloud service providers are also able to provide higher Service Level Agreements (SLAs) concerning service availability. These positive features have attracted several businesses to the cloud but concern remains about the reliability and security of cloud service usage. The major reason for this concern is the high profile outages at all the major service providers that lasted several days at times. These outages erode customer trust in the service. In this paper we focus on the various steps that the cloud service provider could take to earn customer trust and build on it further. To put things in perspective we address the major outages in cloud service over the past five years and the lessons learned in order to provide uninterrupted service.
Privacy Concerns amongst an Avalanche of Data Breaches
Globally social media use is increasing rapidly. People want to share information with their near and dear. Much of the information sharing is automated by settings that the user chooses for the services that they use. Such information is stored in a central repository for rapid access. Often businesses have needs to store and share their information about their customers with a group of business partners. Technology today allows for ways to access such stored information with suitable filters. This capability is a major boon as well as a major problem. Within the past two years there have been a spate of very large scale data breaches among major businesses that have resulted in millions of customer data being stolen. The nature of stolen data could shed significant information about individual customers. In this talk our goal is to analyze the causes for data breach and how more could be done to protect the customer privacy. We will shed light on the cost of data breaches to the businesses and individuals and how customer privacy concerns could be addressed by a combination of policies and technology.
Our analysis will summarize the major data breaches over the past two years and then focus on five specific data breaches – Target stores, Chase Bank, Home Depot, Sony Play Station and Sony Studios. Collectively these five data breaches accounted for the unauthorized access of.
Analysis of online and blended course delivery and their future in academia
Frontiers in Education Conference, Las Vegas, NV. July 16-19, 2012.
Abstract: Academic institutions are facing a new kind of challenge in the course delivery mechanisms. Several students want flexibility in the way courses are delivered because of their lifestyle changes. Two such methods that are popular with students are online and blended courses. Online courses have become more popular because of advances in technology that make video communication using the internet highly reliable. In meeting the institutional expectations for quality, online courses offer some unique challenges. Blended courses satisfy some of the constraints experienced in online courses. In the future there is going to be greater need to try different methods of course delivery since the learners have become adept in using technology in ways that will help simulate a physical presence in a classroom setting. In this talk we address these two course delivery mechanisms and how institutions could cope up with the demand while maintaining quality.
Significance of Offshoring in the IT Sector - a U.S. perspective
2012 Western Hemispheric Trade Conference, Texas A & M International University, Laredo, TX, April 11-12, 2012.
Abstract: Offshoring is a form of outsourcing that is used extensively in the service sector. Relative to the organization that is offshoring a service the execution of the activity takes place in a foreign country. Many developed countries resorted to offshoring as one way to reduce cost. With this goal in mind, services were offshored by U.S. and Western European companies to India and China. When the manufacturing sector outsourced production to low-wage countries such as China and South Korea it resulted in significant job losses in the developed countries. With this experience preceding the wave of offshoring that started in the 1990s in the IT sector there was a general feeling that offshoring of services would result in loss of jobs in the origin country. This perception was reinforced by comments by leading politicians in developed countries. To understand this phenomenon better researchers needed reliable data spread over a long period of time and focused on various sectors. When in-depth analysis of offshoring started it became apparent that such detailed data was lacking. This contributed to several studies arriving at conclusions that showed the negative aspects of offshoring. Even though detailed data is still lacking, many organizations around the world have started focusing on gathering relevant data by industry. In U.S., the Bureau of Labor Statistics started producing more reliable data starting in 2007 when they adopted a new classification system for jobs.
In this presentation we analyze the historical perspective of offshoring, with specific reference to the U.S. experience. We examine data from multiple sources in this context. Our special focus is on the significance of offshoring in the IT sector. The analysis shows both a shift in some jobs abroad and the creation of different types of jobs back in U.S. Given the current level of high unemployment in U.S. it would be difficult for anyone to accept any finding that sheds some positive light on offshoring. We present a balanced view in this paper which shows that offshoring has significantly impacted local jobs in some areas of IT within U.S. and has opened up new avenues for more sophisticated jobs in U.S. for IT professionals. In this analysis we highlight the significance of international trade that is facilitated by the enhanced opportunities that offshoring has opened up in U.S. We use primarily secondary data in our analysis.
Social Media Security: Protecting Privacy
25th Annual Federal Information Systems Security Educators Association Conference, National Institute of Standards and Technology, Gaithersburg, MD. March 27-29, 2012.
Abstract: Social media is wildly popular today and thousands of new users are joining social networks daily. Many users are focused on communicating with their friends and not seriously consider the security and privacy implications. In this presentation we highlight the various technologies that are available for the consumer in the social media market. Also, we point out where the security and privacy issues arise as users focus on their communication. Our presentation includes discussion on how the social media settings are meant to provide ease of use for the customer. Thus, it becomes the responsibility of the customer to take into account the potential risks associated with privacy violations. Equally important in our discussion is the steps the customer could take to protect the privacy of the information being communicated and know how certain pieces of information are automatically relayed to the other users on the member’s circle of contacts. Also, we would emphasize the monitoring tools available for users which would enable them to take some protective measures.
In a brief analysis of the tools available from major social media outlets such as Facebook, Twitter and LinkedIn we will point out what the settings are meant to do and how certain well publicized violations have hurt the reputations of these providers. We will also highlight some best practices for privacy protection.
We studied the social media acceptance in business enterprises by conducting a survey of several businesses. Our study focused on how businesses perceive use of social media in businesses. We found out that many businesses have come to accept that social media is beneficial for the business to use.
Global Perspective on Radio Spectrum Management Usage and Policy
51st Annual Conference of the International Association for Computer Information Systems Conference, Mobile, AL. October 5-8, 2011.
Abstract: Radio Spectrum is a finite resource that is not exhausted by use but still needs to be managed efficiently for all the wireless communications to succeed. The International Telecommunications Union (ITU) has set out guidelines for world-wide use of radio frequencies. Each country manages this resource by adopting suitable policies. Many new technologies such as the Ultra Wide Band (UWB), Worldwide Interoperability for Microwave Access (WiMax) and Long Term Evolution (LTE) have been introduced recently that use spectra more efficiently. With the introduction of many new services the world-wide demand for additional spectra have grown exponentially. Spectrum resource is managed directly by governments or by government agencies in all the countries. Many governments are now making changes in their policies to make available additional spectra for non-governmental use and realigning other spectra in order to meet the increased demand. In this paper we explore how five industrialized countries – United States, United Kingdom, Japan, South Korea, and Singapore – have addressed the demand for new spectra and set policies accordingly. In this discussion we have included how the additional spectra have been allocated using various forms of auctions and identify the revenue generated by such auctions.
An Assessment of Technologies for In-home Entertainment
IEEE International Conference on Computer Communications and Networking, Maui, HI, July 31-August 4, 2011.
Abstract: Technological advancements are constant. When newer technologies such as UWB, WiMAX and LTE were introduced there was great anticipation that these technologies would fulfill the need for greater reach at higher data rates. Compared to Wi-Fi rates these three technologies offered much higher data rates. However, some of the applications essential for wireless home entertainment require video transmission with low latency. This new demand on technology is easily met by wired systems. The focus is on providing the same experience by wireless means through interconnection of several of the existing devices such as laptop, TV and cell phone. The newer technologies that are emerging for high speed wireless video delivery are WiHD, WHDI and WiDi. In this paper we will analyze where the technology stands today with respect to these three technologies as well as UWB, WiMAX and LTE.
Large Datasets
By Clicking the link below you can download the Data.
Diabetic Data
Water_Quality_Sampling