Yung-Wey Chong

Learn More
The Shannon capacity predicts the theoretical maximum rate of information transfer through a channel, at a given noise level. However, this concept has limited application in LTE networks. As such, alpha-Shannon capacity, which is modified from Shannon capacity, has been proposed for use in LTE networks. Nonetheless, the existing alpha-Shannon capacity(More)
Packet size and modulation scheme can play an important role on optimizing the data rate of Long Term Evolution (LTE) system. The performance of the existing LTE system is evaluated in this paper in term of throughput and packet loss for Orthogonal Frequency-Division Multiple Access (OFDMA) modulation scheme with different packet sizes. The performance of(More)
Peer-to-peer (P2P) systems have been widely used in today's network. The limitation of server-client systems in number of clients that can be served leads to invent p2p systems enable sharing of contents with individual nodes in the network. In p2p systems tasks such as video streaming are shared among individual nodes directly to other nodes in the(More)
The ability of an intrusion detection system (IDS) to accurately detect potential attacks is crucial in protecting network resources and data from the attack's destructive effects. Among many techniques available for incorporation into IDS to improve its accuracy, classification algorithms have been demonstrated to produce impressive and efficient results(More)
Modulation and Coding Schemes (MCSs) is one of the parameters that can be adapted according to the channel condition. The IEEE 802.16 system specifies several MCSs, such as QPSK, 16-QAM, 64-QAM in case of modulation and 1/2, 2/3, 3/4, 5/6 in case of coding. However, the specification does not provide a policy to select MCS for various link conditions. In(More)
Trust-ND is an alternative lightweight security mechanism based on distributed trust management model to secure IPv6 Neighbor Discovery Protocol. Trust-ND introduced a new NDP option, called Trust option, with three fields: Message Generation Time (or timestamp), Nonce, and Message Authentication Data. A thorough investigation and analysis of the use of(More)
Acoustic Echo Cancellation (AEC) has become a necessity in today's conferencing system in order to enhance the audio quality of hands-free communication systems. In recent years, many researchers and manufacturers have developed various AEC algorithms for telecommunication solutions in order to improve the quality of service. Many factors influence the(More)
  • 1