- Advanced Wireless Network Optimization
- Wireless Networks and Protocols
- Network Traffic and Congestion Control
- MicroRNA in disease regulation
- Mobile Ad Hoc Networks
- Copyright and Intellectual Property
- Advanced biosensing and bioanalysis techniques
- RNA Interference and Gene Delivery
- Advanced Vision and Imaging
- Digital Games and Media
- Spam and Phishing Detection
- Blockchain Technology Applications and Security
- Distributed and Parallel Computing Systems
- Robotics and Sensor-Based Localization
- Advanced Queuing Theory Analysis
- Energy Harvesting in Wireless Networks
- IoT and Edge/Fog Computing
- Sexuality, Behavior, and Technology
- Peer-to-Peer Network Technologies
- Scheduling and Optimization Algorithms
- Smart Grid Energy Management
- Teaching and Learning Programming
- Signaling Pathways in Disease
- Cloud Computing and Resource Management
- Video Coding and Compression Technologies
Mount Royal University
2010-2023
Chongqing Medical University
2022-2023
The Affiliated Yongchuan Hospital of Chongqing Medical University
2022
University of Calgary
2004-2009
Fog computing is an emerging paradigm that has come into consideration for the deployment of Internet Things (IoT) applications amongst researchers and technology industries over last few years. highly distributed consists a wide number autonomous end devices, which contribute to processing. However, variety devices offered across different users are not audited. Hence, security major concern should consideration. Therefore, provide necessary there need understand what concerns with regards...
Applications such as robot navigation and augmented reality require high-accuracy dense disparity maps in real-time online. Due to time constraint, most realtime stereo applications rely on local winner-take-all optimization the computation process. These approaches are generally outperformed by offline global based algorithms. However, recent research shows that, through carefully selecting aggregating matching costs of neighboring pixels, produced a approach can be more accurate than those...
Technological advancements have led to increased confidence in the design of large-scale wireless networks that comprise small energy constraint devices. Despite boost technological advancements, dissipation and fault tolerance are amongst key deciding factors while designing deploying sensor networks. This paper proposes a Fault-tolerant Energy-efficient Hierarchical Clustering Algorithm (FEHCA) for (WSNs), which demonstrates energy-efficient clustering fault-tolerant operation cluster...
Accumulating evidence has reported the role of microRNA-21-3p (miR-21-3p) in sepsis, and our objective was to discuss effect miR-21-3p/regulator calcineurin 1 (Rcan1) axis on cardiomyocyte apoptosis septic rats. miR-21-3p Rcan1 expression myocardial tissues lipopolysaccharide (LPS)-treated rats LPS-treated H9c2 cardiomyocytes determined. The influences downregulating or upregulating were then evaluated. target relation between verified. It observed that elevated reduced cardiomyocytes....
Wireless Local Area Networks (WLANs) based on the IEEE 802.11 technology have become increasingly popular and ubiquitous. The standard allows each station in a WLAN equal opportunity to access wireless channel, which can result unfair sharing of network bandwidth between upstream downstream TCP flows at an AP. In this paper, we propose two different queue management techniques alleviate unfairness problem, with one Selective Packet Marking (SPM), other Least Attained Service (LAS)...
Abstract This paper presents an analytical approach to model the bi‐directional multi‐channel IEEE 802.11 MAC protocols (Bi‐MCMAC) for ad hoc networks. Extensive simulation work has been done performance evaluation of protocols. Since several limitations, this is primarily based on approach. The objective show analytically advantages Bi‐MCMAC protocol over classical protocol. distributed coordination function (DCF) mode medium access control (MAC) considered in modeling. Two different...
This paper uses a probe-based sampling approach to study the behavioural properties of Web server scheduling strategies, such as processor sharing (PS) and shortest remaining processing time (SRPT). The is general purpose, in that it can be used estimate mean variance job response time, for arbitrary arrival processes, service distributions, policies. In paper, we apply trace-driven simulation compare contrast PS SRPT We identify two types unfairness, called endogenous exogenous unfairness....
This paper uses trace-driven simulations to evaluate two novel Web server scheduling policies called K-SRPT and T-SRPT. is a multi-threaded version of SRPT (shortest remaining processing time) that can have up K jobs in service at time. T-SRPT hybrid policy dynamically switches from PS (processor sharing) when the number system exceeds T, back load diminishes. Slowdown profile plots are used analyze performance these relative PS, SRPT, FSP (fair sojourn protocol). Simulation results show new...
Cultural venues like museums increasingly seek to harness the value of data analytics make driven decisions related exhibitions duration, marketing campaigns, resource planning, and revenue optimization. One key priority is need understand influencing factors behind visitor attendance. Using collected from a large museum, we investigated whether weather has significant impact on attendance or that other are more important. We applied Cross Industry Standard Process for Data Mining (CRISP-DM)...
Small extracellular vesicles (sEVs) have been reported to play important roles in cell-to-cell communication and are promising biomarkers for the early diagnosis of infections. Therefore, it is high demand develop a method that can integrate easy-to-operate sEV isolation sensitive quantification. We herein propose novel detection scaffold via low-speed centrifugation quantification sEVs through DNAzyme-based signal amplification. The established dumbbell probe-based RCA (rolling circle...
Adult video content is considered to be responsible for a major portion of the Internet traffic. We present preliminary characterization study one largest and popular adult streaming service, xHamster. While there have been extensive analysis mainstream user generated sharing services such as YouTube, an underappreciated field researchers. Using metadata over 1.8 million videos we studied characteristics, interaction, popularity dynamics observe that garner more views per than YouTube. sites...
Capstone projects/courses, in which students undertake a significant project under supervision, have been offered many computing programs In this paper, we present our experience for the senior course as by BCIS program at Mount Royal University, provides an environment to successfully complete capstone experience. This is student initiated, single semester, individual, open ended project. We include motivation and advantages of approach well details exemplar The shows initiated projects...
Pastures are a vital source of dairy products and cattle nutrition, as such, play significant role in New Zealand’s agricultural economy. However, weeds can be major problem for pastures, making it challenge farmers to monitor control them. Currently, most the tasks weed management done manually, lack persistent technology control. This motivated us design, implement, evaluate Decision Support System (DSS) detect pastures provide decisions cleanup weeds. Our proposed system uses two primary...
Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost copyright infringement to film music industries range in tens hundreds billions dollars every year. The vast majority this illegal shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, file streaming, one-click hosting services (OCHs). In paper, two OCH indexes were studied insights into uploader dynamics. Results suggest that traditional...
Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost copyright infringement to film music industries range in tens hundreds billions dollars every year. The vast majority this illegal shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, file streaming, one-click hosting services (OCHs). current dominant analogy file- sharing, promoted by holders industry lobby groups, one 'copyright theft'; with...
Pornography can be distributed in multiple forms on the Internet. Online pornography a non-negligible fraction of total Internet traffic, with adult video streaming gaining significant traction among most visited global websites. Similar to rise User Generated Content (UGC) general Web 2.0 services, service providers have also promoted social interaction and UGC what is called 'Porn 2.0'. Discovering characteristics Porn allows for better understanding both traffic specifically services. In...
This paper presents the design, implementation, and evaluation of an energy-efficient handover algorithm for wireless sensor networks (WSNs) that are main building block in creation Internet Things (IoT). Our low-power design is based on a careful breakdown analysis potential power consumption different components process. With scanning part process being identified as drain energy, designed to place majority responsibility mains powered access points, rather than mobile nodes. The proposed...
Measuring quality of Internet access is important because it provides rich information on capability services and user experience. As actively evolve, users tend to spend more time require network capacity over time. To meet the needs consumers, there a wide mix ISPs technologies offered in New Zealand. Benchmarking Zealand for their service enables us predict what may experience among different ISPs. In this paper, we present study broadband performance Our results will provide accurate...