Engineering and Technology
Browse by
Recent Submissions
-
A Literature Review on Sampling Techniques in Semiconductor Manufacturing
(IEEE Transactions on Semiconductor Manufacturing, 2013)This paper reviews sampling techniques for inspection in semiconductor manufacturing. We discuss the strengths and weaknesses of techniques developed in the last last 20 years for excursion monitoring (when a process or ... -
The relationship between the Old Case Loads and New Case Loads in Nakivale refugee settlement in Southwestern Uganda
(Journal of Eastern African Studies, 2016)Forced migration from Rwanda has become a common trend. It has been there since time immemorial and is still continuing at varying magnitudes. Scholarly literature indicate that over 100,000 Rwandan refugees crossed into ... -
ADSMS: Anomaly Detection Scheme for Mitigating Sink Hole Attack in Wireless Sensor Network
(IEEE, 2017)In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some ... -
A Normalized Approach for Service Discovery
(Procedia Computer Science, 2015)In today’s world web services are the known perception to all the users who uses the internet. The Web Service process involves service discovery, selection and ranking. Discovery is the process of matchmaking of user ... -
mira: an Application Containerisation Pipeline for Small Software Development Teams in Low Resource Settings
(Development Engineering, 2022)Cloud native applications leverage Development and Operation (DevOps), microservice architectures and containerisation for primarily availability, resilience and scalability reasons. Small developer teams in low resource ... -
Hydraulic conductivity predictive model of RHA-ameliorated laterite for solving landfill liner leachate, soil and water contamination and carbon emission problems
(International Journal of Low-Carbon Technologies, 2022)The environment is seriously being affected by the leachate release at the unconstructed and badly constructed waste containment or landfill facilities around the globe. The worst hit is the developing world where there ... -
Energy Efficiency and Spectral Efficiency Trade-off of a Novel Interference Avoidance Approach for LTE-Femtocell Networks
(IEEE., 2012)The trade-off between energy efficiency and downlink spectral efficiency for LTE-femtocells can be significantly balanced by a novel interference management technique in the presence of the interference from the co-channel ... -
Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks
(Springer International Publishing., 2016)Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised ... -
Energy Efficiency Comparison of Common Packet Schedulers
(IEEE., 2014)This paper presents a characterisation of the energy performance of common and well-known packet schedulers in a multi-cell multi-user UTRAN long-term evolution (LTE) system. First, it was shown that the maximum SINR ... -
Long Term Evolution Downlink Packet Scheduling using A Novel Proportional-Fair-Energy Policy
(IEEE., 2012)Inter-cell interference (ICI) is a key limiting factor to the general performance of a multi-cell multi-user radio access network. The channel quality of cell edge users is greatly impaired by ICI owing to the fact that ... -
SFBC MIMO Energy Efficiency Improvements of Common Packet Schedulers for the Long Term Evolution Downlink
(IEEE., 2011)It is desirable that energy performance improvement is not realized at the expense of other network performance parameters. This paper investigates the trade off between energy efficiency, spectral efficiency and user QoS ... -
Performance Security Trade-off of Network Intrusion Detection and Prevention Systems
(UK Performance Engineering Workshop and Cyber Security Workshop, 2016)Security cyber threats are increasing with most companies being overwhelm by the complexity attached to prevention against attacks. Network Intrusion detection and prevention systems (NIDPS) are now a stable in any enterprise ... -
Performance Modelling and Analysis of the Delay Aware Routing Metric in Cognitive Radio Ad Hoc Networks
(IEEE, 2013)Cognitive Radio Networks have been proposed to solve the problem of overcrowded unlicensed spectrum by using the cognitive ability built in software radios to utilise the underutilised licensed channel when the licensed ... -
Detection of Malicious Portable Executables using Evidence Combinational Theory with Fuzzy Hashing
(IEEE, 2016)Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. However, Hashing has not been fully implemented for malware detection because it can easily be evaded by applying a simple ... -
An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications
(IEEE., 2019)Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes ... -
Prediction of cutting force for self-propelled rotary tool using artificial neural networks
(Journal of Materials Processing Technology, 2006)In this paper, a cutting force model for self-propelled rotary tool (SPRT) cutting force prediction using artificial neural networks (ANN) has been introduced. The basis of this approach is to train and test the ANN model ... -
Integrated Cross-Layer Energy Savings in a Smart and Flexible Cellular Network
(IEEE., 2012)A key challenge for mobile operators is how to reduce the operational energy and cost expenditure, whilst meeting the growing demand for throughput. In recent years, individual research techniques have shown that significant ... -
Garden Tool Transmission of Xanthomonas campestris pv. musacearum on Banana (Musa spp.) and Enset in Ethiopia
(Harnessing International, 2008)Xanthomonas wilt caused by Xanthomonas campestris pv. musacearum has been an important constraint to enset (Ensete ventricosum) and banana (Musa spp.) in Ethiopia. It was postulated that Xanthomonas wilt has a similar ... -
Mobile Transport and Computing Platform for 5G Verticals: Resource Abstraction and Implementation
(IEEE., 2018)The 5G-TRANSFORMER project aims at transforming today's mobile transport networks into an SDN/NFV-based platform, which offers slices tailored to the needs of vertical industries. The paper describes the 5G-TRANSFORMER ... -
Sensitivity of mineral dissolution rates to physical weathering : A modeling approach
(European Geosciences Union (EGU), 2015)There is continued interest on accurate estimation of natural weathering rates owing to their importance in soil formation, nutrient cycling, estimation of acidification in soils, rivers and lakes, and in understanding ...