Time filter

Source Type

Toronto, Canada

Mahmood A.N.,Australian Defence Force Academy | Kabir M.E.,University of Queensland | Mustafa A.K.,Humber College
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | Year: 2015

In recent years, there has been an alarming increase of online identity theft and attacks using personally identifiable information. The goal of privacy preservation is to de-associate individuals from sensitive or microdata information. Microaggregation techniques seeks to protect microdata in such a way that can be published and mined without providing any private information that can be linked to specific individuals. Microaggregation works by partitioning the microdata into groups of at least k records and then replacing the records in each group with the centroid of the group. An optimal microaggregation method must minimize the information loss resulting from this replacement process. The challenge is how to minimize the information loss during the microaggregation process. This paper presents a new microaggregation technique for Statistical Disclosure Control (SDC). It consists of two stages. In the first stage, the algorithm sorts all the records in the data set in a particular way to ensure that during microaggregation very dissimilar observations are never entered into the same cluster. In the second stage an optimal microaggregation method is used to create k-anonymous clusters while minimizing the information loss. It works by taking the sorted data and simultaneously creating two distant clusters using the two extreme sorted values as seeds for the clusters. The performance of the proposed technique is compared against the most recent microaggregation methods. Experimental results using benchmark datasets show that the proposed algorithm has the lowest information loss compared with a basket of techniques in the literature. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.

Savescu M.,Delaware State University | Savescu M.,University of Pennsylvania | Khan K.R.,Humber College | Naruka P.,Engineering College | And 3 more authors.
Journal of Computational and Theoretical Nanoscience | Year: 2013

This paper studies the dynamics of optical solitons with an improved nonlinear Schrödinger's equation that models the propagation of solitons through nano optical fibers. The traveling wave hypothesis as well as the ansatz method will be applied to extract bright and dark soliton solutions of this model. There are five types of nonlinearities that will be studied. They are Kerr law, power law, parabolic law, dual-power law and log law nonlinearity. Copyright © 2013 American Scientific Publishers All rights reserved.

Monette B.L.,Humber College
International Conference on Enterprise Information Systems and Web Technologies 2010, EISWT 2010 | Year: 2010

The requirements for teaching Web development have changed over the years. At the community college we are trying to integrate both the academic learning of Web technologies and industry participation in our curriculum. In this case study a motivated group of students were paired with a local business to build an ecommerce Web site. Rather than coding from scratch the students used an open source content management system (CMS) to build the Web site and satisfy the client.

Khan D.,Humber College | Ball P.,Oxford Brookes University | Childs G.,Oxford Brookes University
Proceedings of the 2012 8th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2012 | Year: 2012

Wireless ad hoc networks are being deployed in a wide range of applications and many of these networks use battery operated nodes. A key requirement for these networks is to maximize the time span when all nodes have sufficient battery charge to participate in communication with other nodes. To meet this requirement, this paper describes a routing strategy that seeks to find the best balance between minimizing the power consumption and evenly using all nodes within the network to avoid early exhaustion of individual nodes. The proposed scheme is compared to reported schemes using minimum power routing and the results show that the proposed scheme gives a longer time until the first node's battery energy is depleted with a lower network power consumption than schemes using just energy minimization. © 2012 IEEE.

Serrador P.,Serrador Project Management | Serrador P.,Humber College
International Journal of Project Management | Year: 2015

The Agile project management methodology has been widely used in recent years as a means to counter the dangers of traditional, front-end planning methods that often lead to downstream development pathologies. Although numerous authors have pointed to the advantages of Agile, with its emphasis on individuals and interactions over processes, customer collaboration over contracts and formal negotiations, and responsiveness over rigid planning, there are, to date, very few large-scale, empirical studies to support the contention that Agile methods can improve the likelihood of project success. Developed originally for software development, it is still predominantly an IT phenomenon. But due to its success it has now spread to non-IT projects. Using a data sample of 1002 projects across multiple industries and countries, we tested the effect of Agile use in organizations on two dimensions of project success: efficiency and overall stakeholder satisfaction against organizational goals. We further examined the moderating effects of variables such as perceived quality of the vision/goals of the project, project complexity, and project team experience. Our findings suggest that Agile methods do have a positive impact on both dimensions of project success. Further, the quality of the vision/goals is a marginally significant moderator of this effect. Implications of these findings and directions for future research are discussed. © 2015 Elsevier Ltd. APM and IPMA.

Discover hidden collaborations