UB ScholarWorks

Browsing University of Bridgeport by Title

Browsing University of Bridgeport by Title

Sort by: Order: Results:

  • Abushgra, Abdulbast; Elleithy, Khaled M. (2015-03-27)
    Quantum key distribution (QKD) is one of the recent revolutions in cryptography field that was announced in first by Charles Bennett and Gilles Brassard in 1984. Here we create another QKD protocol that based on the three ...
  • Abushgra, Abdulbast; Elleithy, Khaled M. (2015-04-30)
    Quantum key distribution (QKD) is one of the recent revolutions in cryptography field that was announced in first by Charles Bennett and Gilles Brassard in 1984. Here we create another QKD protocol that based on the three ...
  • Abushgra, Abdulbast; Elleithy, Khaled M. (IEEE, 2016-04)
    Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have ...
  • Doshi, Smit N. (2016-04-01)
    This poster describes an quadrotor built with projecting capabilities at the Robotics, Intelligent Sensing & Control (RISC) laboratory. A smart and autonomous quadrotor that can fly in a specified path. It has the ability ...
  • Sailor, Krutarth; Waste, Vaibhav (2019-03-29)
    Programmable logic controllers have been an integral part of factory automation and industrial process control for decades. These systems perform many functions, providing a variety of analog and digital input and output ...
  • Rizvi, Syed S.; Elleithy, Khaled M.; Riasat, Aasia (AIRCC Publishing, 2009-11)
    Extensive studies have been carried out for reducing the handover time of wireless mobile network at medium access control (MAC) layer. However, none of them show the impact of reduced handover time on the overall performance ...
  • Guo, Joanne; Dorr, Timothy G. (2016-04-01)
    This research uses an event-study approach to analyze the effect of Federal Reserve quantitative easing announcements on emerging market economies. Using a daily panel data of fifteen emerging economies, the period examined ...
  • Guo, Joanne; Dorr, Timothy G. (2017-03-24)
    This research uses an event-study approach to analyze the effect of Federal Reserve quantitative easing announcements on emerging market economies. Using a daily panel data of fifteen emerging economies, the period examined ...
  • Guo, Joanne (2016-04-01)
    This paper is a comprehensive study of the unconventional monetary policy taken by the Federal Reserve since the financial crisis of 2008, specifically on the purchases of different assets by the Fed to change medium and ...
  • Guo, Joanne (2017-03-24)
    This paper is a comprehensive study of the unconventional monetary policy taken by the Federal Reserve since the financial crisis of 2008, specifically on the purchases of different assets by the Fed to change medium and ...
  • Wallstedt, Eric K. (1968)
    An examination of three quantitative systems and their application to computer development. The systems covered are a real-time accounting system, a graphical examination of the key methods of capital budgeting, and a ...
  • Savic, Biljana (2016-04-01)
    The Conscious Capitalism practice contributes to well-being of workers, society, and environment, yet there is doubt about its profitability and sustainability. This paper examines quantitative metrics that can measure the ...
  • Engelmann, Kathleen; Larson, Hannah; Lorusso, Amanda; Gelgud, Ryan; Otfinoski, Jamie; Burghardt, Liana (2011)
  • Bouyahiaoui, Mohammed (2011)
  • Muneer, Alshowkan; Elleithy, Khaled M. (2016-04-01)
    Authentication is one of the security services that ensure sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build ...
  • Alshowkan, Muneer; Elleithy, Khaled M. (IEEE, 2016-04)
    Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build ...
  • Gautam, Sumit (2019-03-29)
    R, SAS, and python are the most used statistical programming languages. Analytics market has been growing up with the double pace and there are many tools available in the market. This study will be conducted to show how ...
  • Casula, Ramakrishna Manasa (2019-03-29)
    The global analytics industry is dynamic and the trends in the languages keep changing. There are attributes that help make the comparison easy. There are five attributes that I have chosen and used a scoring scale to rank ...
  • Todd, Robert S. (2016-04-01)
    This project begins a discussion of creating a secure “friend-to-friend” messaging scheme that involves only ordinary computers on the “surface web, does not depend on the difficulty of factoring, is impervious to any kind ...

Search ScholarWorks


Advanced Search

Browse

My Account