University of Arkansas
Computer Science And Computer Engineering
When consumers purchase expensive products, they want to receive a reliable information about products. So, the manufacturer of the expensive products made the anticounterfeiting devices, which can be used to prevent the forgery. But,... more
— Recently sensor technology has drawn greater attention in ubiquitous computing by deploying huge amount of sensor tags in supply chain, harbor logistics, healthcare management etc. Sensor tags are capable to provide the sensing... more
— The EPCglobal has defined the standard for sharing the tagged product information among the enterprises, which are mainly the product level information rather than event level information. Now the EPCglobal aims at provide visibility in... more
Weed infestation is a common problem in agriculture that adversely affects crop production. Given severe constraints on the budget of many land-grant universities due to the economic downturn, outreach services have taken a hit. To adapt... more
Weed infestation is a common problem in agriculture that adversely affects crop production. Given severe constraints on the budget of many land-grant universities due to the economic downturn, extension services or agencies responsible... more
We investigate the state change behavior of one-dimensional cellular automata during the solution of the binary density-classification task. Update rules of high, low and unknown fitness are applied to cellular automata, thereby providing... more
The genetic algorithm (GA) and simulated annealing algorithm (SA) are empirically compared for the problem of optimizing the topological design of a network. In addition to the usual problem of optimizing only the placement of links, in... more
brought together academic, industry, and government experts working on radio frequency identification (RFID), biometrics, sensors, animal identification, identity cards, RFID-enabled passports, identity theft, terrorism, retail and... more
Service restorability is a network-wide parameter for a specific failure scenario that is dependent on the physical topology of the network. Previously network topology generator models for generating random models were based on... more
Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared secret value. Two different digital... more