Skip to main content

Research Repository

Advanced Search

Outputs (35)

Analysis and migration of location-finding methods for GSM and 3G networks. (2004)
Presentation / Conference Contribution
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004, October). Analysis and migration of location-finding methods for GSM and 3G networks. Presented at 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on, London

This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observed time difference). It shows how these techniques can be applied to the fu... Read More about Analysis and migration of location-finding methods for GSM and 3G networks..

Uzytkowanie Komputerow. (2004)
Book
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)

Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich kompresj?, przechowywaniem, szyfrowaniem i bezpiecze?stwem, zawieraj?cy tak?e o... Read More about Uzytkowanie Komputerow..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..

PC Interfacing, communications and Windows programming. (1999)
Book
Buchanan, W. J. (1999). PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd

author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors and interface devices) to high-level software (such as Win32 programming).... Read More about PC Interfacing, communications and Windows programming..

Wiedziec wiecej Internet (1997)
Book
Buchanan, W. J. (1997). Wiedziec wiecej Internet. Wkt (Poland)

Ksi??ka ta m. In. Uczy jak korzysta? z internetu i sieci www.Opisuje bowiem techniczne aspekty tej ?wiatowej sieci informacyjnej. Dlatego te? mo?e by? wykorzystywana przez wszystkich uczniów i studentów, którzy nie tylko chc? korzysta? z internetu, l... Read More about Wiedziec wiecej Internet.

Software development for engineers. (1997)
Book
Buchanan, W. J. (1997). Software development for engineers. Butterworth-Heinemann

Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several programming languages and for the first time most of the main technical languages... Read More about Software development for engineers..

Applied PC interfacing, graphics and interrupts. (1996)
Book
Buchanan, W. J. (1996). Applied PC interfacing, graphics and interrupts. Addison Wesley

Using good practical examples, this new book introduces the reader to the component parts of a PC, showing how high and low level languages communicate with them, and how computers communicate with peripherals.

C for Electronic Engineering with Applied Software Engineering. (1995)
Book
Buchanan, W. J. (1995). C for Electronic Engineering with Applied Software Engineering. Prentice Hall

The objective of this text is to provide a practical introduction to the C programming language through the usage of electrical/electronic examples. All the examples in the text are related to the specific discipline of electronics, and this approach... Read More about C for Electronic Engineering with Applied Software Engineering..

Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing (1995)
Journal Article
Buchanan, W. J., & Gupta, N. K. (1995). Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing. Advances in engineering software, 23(2), 111-114. https://doi.org/10.1016/0965-9978%2895%2900068-8

The authors have taken the 3D FDTD approach to simulate the propagation of electrical signals within and around printed circuit boards (PCBs). This relates to the work currently being carried out into the propagation of very high speed digital pulses... Read More about Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing.