Remzi Seker
University of Arkansas at Little Rock, Computer Science, Faculty Member
... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG... more
... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently... more
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
Research Interests:
Research Interests:
The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect... more
The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
Research Interests:
Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to... more
Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
Research Interests:
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967).... more
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in... more
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this... more
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
Research Interests: Intellectual Property, Computational Modeling, Access Control, Human Resource, Encryption, and 10 moreCommunication System, Organizations, Key Management, Organic Computing, Public key cryptography, Secure Communication, Large Scale, RANDOM NUMBER GENERATOR, Group Key Agreement, and Secure Group Communication
Research Interests:
Research Interests:
Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop... more
Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
Research Interests:
Research Interests:
Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level... more
Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level connectivity and semantic-level compatibility. ...
Research Interests:
AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not... more
AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
Research Interests:
Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop... more
Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
Research Interests:
Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system... more
Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
Research Interests:
Research Interests:
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at... more
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43,... more
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
Research Interests: Cardiology, Time Series, Logistics, Entropy, Systems Integration, and 13 moreAutonomic Nervous System, Heart rate variability, Variability, Heart rate, Recurrence plot, Systems, Dynamical System, Lyapunov exponent, Nonlinear system, Dynamic System, Correlation Dimension, Acoustic emission testing, and Entropie
AbstractUbiquitous connectivity and availability of P2P re-sources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a... more
AbstractUbiquitous connectivity and availability of P2P re-sources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a P2P network anonymously. JigDFS is ...
Research Interests:
Page 1. 2004 Society for Design and Process Science Printed in the United States of America ASSESSMENT OF COUPLING AND COHESION FOR COMPONENT-BASED SOFTWARE BY USING SHANNON LANGUAGES R ...