Usman Younis

Learn More
Non-cryptographic hash functions have been investigated to identify their pseudo-random nature when employed in the implementation of hash tables for real-time storage and look-up of uniform resource locators. Statistical studies have been performed on the sequences generated using five widely used noncryptographic hash functions: (1) CRC, (2) Adler, (3)(More)
Deep packet inspection (DPI) is one of the crucial tasks in modern intrusion detection and intrusion prevention systems. It allows the inspection of packet payload using patterns. Modern DPI based systems use regular expressions to define these patterns. Deterministic finite automata (DFA) is considered to be an ideal choice for performing regular(More)
In this paper we propose and investigate Redundancy Aware Routing Algorithm (RARA), a novel reactive routing algorithm that reduces the delays and provides better performance characteristics for the wireless front-end of Wireless Optical Broadband Access Networks (WOBAN). The simulated results have shown that at higher data rates above 6 Mbps, RARA gives a(More)
In this paper we present a modified network architecture of Time-Slotted Optical Burst Switching (TSOBS), which shows improved performance in terms of lower packet transmission delay. Additionally, we present a novel delay aware burst transmission algorithm which has resulted in a lower data loss probability than the existing burst transmission approaches.(More)
Semiconductor lasers have the potential to meet demands for next generation high speed optical networks. Their low cost, wide tunability, low power consumption, and very good spectral response make them ideal transmission sources. This paper presents a review of the current applications, commercial availability, and future directions of semiconductor(More)
  • 1