(CSIT ) IEEE

Size: px
Start display at page:

Download "(CSIT ) IEEE"

Transcription

1 2013 5th International Conference on Computer Science and Information Technology (CSIT 2013) Amman, Jordan March 2013 IEEE Catalog Number: ISBN: CFP13YAE-POD

2 Table of Contents Table of Contents Welcome message from the Vice President and Dean of Scientific Research and Graduate Studies at Applied Science University iii ix Welcome message from the General Chairperson of the th International Conference on Computer Science and Information Technology (CSIT) x Keynote Speakers Organizing Committee xi xiii (Artificial Intelligence and Web Systems) Compact Image Signature Generation: An Application in Image Retrieval 1 Manish Chowdhury, Sudeb Das and Malay Kumar Kundu Fuzzy Logic and Dempster-Shafer Theory to Find Kicking Range of Sepak Takraw 8 Game Andino Maseleno Modeling of ANFIS in predicting TiN coatings roughness 13 A.S.M. Jaya, S.Z.M. Hashim,H. Haron,R. Ngah, M.R. Muhamad and M.N.A. Rahman Ontology Semantic Approach to Extraction of knowledge from Holy Quran 19 Aliyu Rufai Yauri,Rabiah Abdul Kadir,Azreen Azman and Masrah Azrifah Azmi Murad Robust Local Triangular Kernel Density-based Clustering for High-dimensional Data 24 Aina Musdholifah and Siti Zaiton Mohd. Hashim The Forensic Investigation of Android Private Browsing Sessions using Orweb 33 Nedaa Al Barghouthy, Andrew Marrington and Ibrahim Baggili iii iii

3 Using Ontologies for Users-Groups Matching in An Annotation System 38 Danilo Avola, Paolo Bottoni and Amjad Hawash Ontology Evaluation: Which Test to Use 45 Ahmad Kayed Parallel Verification of UML Using DiVinE Tool 49 Muhammad Abdul Basit-Ur-Rahim, Jamil Ahmad and Fahim Arif A metric approach for Simultaneous Localization and Map Building 54 Noureddine Slimane, Mohamed Salah Khireddine and Kheireddine Chafaa Database Security Threats: A Survey Study 60 Dana Aldlaeen and Nedhal Al-Saiyd Approach for a Rule Based Ontologies Integration 65 Sihem Klai and Med Tarek Khadir An Optimistic Approach in Distributed Database Concurrency Control 71 Obaidah A.Rawashdeh, Hiaba A.Muhareb and Nedhal A.Al-Sayid Evaluation of Discernibility Matrix Based Reduct Computation Techniques 76 Enas A. Khashashneh and Qasem A. Al-Radaideh Review on Raindrop Detection and Removal in Weather Degraded Images 82 Mohd Helmy Abd Wahab, Ching-Hung Su, Nasriah Zakaria and Rosalina Abdul Salam (Communication and Networking) A Novel Communication System for Firefighters using Audio/Video Conferencing/Sub- 89 conferencing in standalone MANETs Moayad Aloqaily, Safa Otoum and Hussein Mouftah iv iv

4 Matching Mother and Calf Reindeer Using Wireless Sensor Networks 99 Mohamad Y. Mustafa and Svein M. Eilertsen Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks Issa Khalil1, Sameer Bataineh, Liana Qubajah and Abdallah Khreishah A Secure Mobile Payment System using QR Code Sana Nseir, Musbah Aqel and Nael Hirzallah Electronic Media and Digital Convergence O. Al Sheik Salem and R.A.Earnshaw Effective Usage of AI Technique for Requirement Change Management Practices Hummera Naz, Yasir Hafeez Motla, Sohail Asghar, Muhammad Azeem Abbas and Asma Khatoon Cyber-Bullying Taxonomies: Definition, Forms, Consequences and Mitigation Strategies Ali Al Mazari Towards a Dynamic Mapping in P2P Mediation system Selma.El Yahyaoui El Idrissi, Ahmed.Zellou and Ali.Idri Evaluation of Breast Cancer Risk by Using Formal Reasoning Algorithm Dr. Raed I. Hamed Undeniable Threshold Proxy Signature Scheme Sattar Aboud and Sufian Yousef (So ft war e Engineering) Use of computer animation for displaying the mode shapes of a three-dimensional framework 154 Jia-Jang Wu, Fang-Yu Chen and Tsung-Han Hsieh v

5 Exploring the Effect of Meta-Individual Values on Management of Software 162 Development using Schwartz s Model: A Case of Thai IT Professionals Waraporn Jirachiefpattana Extracting UML Models from Images 169 Bilal Karasneh and Michel R.V. Chaudron A New Strategic Risk Reduction Mourad Ykhlef and Danah Algawiaz Software Interfaces: On The Impact of Interface Design Anomalies Hani Abdeen, Osama Shata and Abdelkarim Erradi Mining Over dispersed and Auto correlated Vehicular Traffic Volume Yousef-Awwad Daraghmi, Chih-Wei Yi and Tsun-Chieh Chiang The hybrid integration system: Towards a new approach for creating candidate views for materialization Samir Anter, Ahmed Zelllou and Ali Idri 3D Geological Modeling and Visualization of Rock Masses Based on Google Earth: A Case Study Gang Mei, John C.Tipper and Nengxiong Xu Software Cost Estimation Based on Use Case Points for Global Software Development Mohammad Azzeh Employing Auditory Icons to Support Virtual Lecturers in E-Learning Interfaces Marwan Alseid, Mohammad Azzeh and Yousef El Sheikh USER S UTTERANCE CLASSIFICATION USING MACHINE LEARNING FOR ARABIC CONVERSATIONAL AGENTS Mohammad Hijjawi, Zuhair Bandar and Keeley Crockett Design and Implementation of Parallel SOM Model on GPGPU Saad Qasim Khan and Muhammad Ali Ismail vi vi

6 An Approach to Convert Object Oriented Database into XML Yusra Amer and Nael Hirzallah The Integrating Between Web Usage Mining And Data Mining Techniques Omer Adel Nassar and Dr. Nedhal A. Al Saiyd Fulvis: New approach for selecting views to materialize in Hybrid Information Integration Wadiî Hadi, Ahmed Zellou and Bouchaib Bounabat DECS, a Meta-CASE Tool with Visually-Oriented Constraint Definition Features Hazem Qattous, Philip Gray and Ray Welland Distributed and Parallel Computing Projective Rational Arithmetic with Floating Point Vaclav Skala A Hadoop Performance Model for Multi-Rack Clusters Jungkyu Han, Masakuni Ishii, Hiroyuki Makino PMR: Personalized Mobile Restaurant System Eman Yasser Daraghmi and Shyan-Ming Yuan Domain Ontology for Trustworthy Context-dependent Services Naseem Ibrahim and Ismail Khalil Message Rearrange Theory in Message Recovery Protocol Jing Cai and Shenfa Gao Hardware Implementation of LU Decomposition Using Dataflow Architecture on FPGA Mahmoud Eljammaly, Yasser Hanafy, Abdelmoniem Wahdan and Amr Bayoumi vii

7 Replica Control Protocol: Triple Quorum Replication (TQR) in Data Grid Rohaya Latip1, Tazquia Mizan, Nur Faezah Ghazali, Rabiah Abd Kadir and Feras. Ahmad Hanandeh Modular Modeling and Analyzing of Multimedia Documents with Repetitive Objects Djaouida Dahmani, Samia Mazouz and Malika Boukala CBIR using Relevance Feedback:Comparative Analysis and Major Challenges Khadidja Belattar and Sihem Mostefai Transforming Architectural Descriptions for Formal Analysis Naseem Ibrahim, Mubarak Mohammad and Vangalur Alagar Subjective Measures to Human Performance in Virtual Environment with Kinaesthetic Feedback Abdulslam M. Bashir and Robert Bicker Author Index 339 viii

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

C.V ACADEMIC EXPERIENCES

C.V ACADEMIC EXPERIENCES C.V Name: Mohammad Rateb Al Rawajbeh Date of Birth:15/11/1968 Nationality: Jordanian Mobile: 00962-777460737 E-mail: m.rawajbeh@zuj.edu.jo EDUCATION STAGES 1986-1987- General Secondary Education Certification

More information

Appraising Vehicular ADHOC Networks Routing Protocols Using NS2

Appraising Vehicular ADHOC Networks Routing Protocols Using NS2 International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 491-498 International Research Publications House http://www. irphouse.com /ijict.htm Appraising

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 INTRUSION DETECTION IN INTERNET OF THINGS A SURVEY T. S. Urmila, Dr. B. Balasubramanian

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

AN IMAGE RANKING USING GOOGLE IMAGE SEARCH

AN IMAGE RANKING USING GOOGLE IMAGE SEARCH AN IMAGE RANKING USING GOOGLE IMAGE SEARCH Shilpa A. Shingare, Manoj D. Patil ABSTRACT: Millions of images can be found on internet and a number is continuously growing day by day and tendency of people

More information

DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS

DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS Zulkifli Md Yusof 1, Zuwairie Ibrahim 1, Ismail Ibrahim 1, Kamil Zakwan Mohd Azmi 1, Nor Azlina Ab Aziz 2, Nor Hidayati

More information

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study... vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST

More information

DIRECTORY OF EXPERTISE IN UiTM (PERAK)

DIRECTORY OF EXPERTISE IN UiTM (PERAK) DIRECTORY OF EXPERTISE IN UiTM (PERAK) NAME OF LECTURER AREA OF SPECIALIZATION FACULTY OF CIVIL ENGINEERING Prof. Ir. Dr. Hjh Zainab Mohamed Civil Engineering Geotechnical Engineering Rock Engineering

More information

THE description and representation of the shape of an object

THE description and representation of the shape of an object Enhancement of Shape Description and Representation by Slope Ali Salem Bin Samma and Rosalina Abdul Salam Abstract Representation and description of object shapes by the slopes of their contours or borders

More information

Bee-Inspired Protocol Engineering

Bee-Inspired Protocol Engineering Muddassar Farooq Bee-Inspired Protocol Engineering From Nature to Networks With 128 Figures and 61 Tables Springer 1 Introduction 1 1.1 Motivation of the Work 2 1.2 Problem Statement 4 1.2.1 Hypotheses

More information

Detection of Anomalies using Online Oversampling PCA

Detection of Anomalies using Online Oversampling PCA Detection of Anomalies using Online Oversampling PCA Miss Supriya A. Bagane, Prof. Sonali Patil Abstract Anomaly detection is the process of identifying unexpected behavior and it is an important research

More information

Class: FYP 2_SEMESTER JAN 2017

Class: FYP 2_SEMESTER JAN 2017 Class: FYP 2_SEMESTER JAN 2017 Abdul Basit, Amatul Syafi 1 of 40 Username aabdulbasit460 To start creating your website, please visit: Password asab12345 http://students.weebly.com Abdul Fatakh, Afiqah

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Semester Wise Schema BS Computer Science

Semester Wise Schema BS Computer Science Semester I (Credit Hours: 15) 1 CSC-101 Introduction to Information and Communication Technology (ICT) 4(3 + 1) -NONE- 2 CSC-102 Introduction to Programming 4 (3 + 1) -NONE- 3 ENG-101 Functional English

More information

Gender Classification Technique Based on Facial Features using Neural Network

Gender Classification Technique Based on Facial Features using Neural Network Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,

More information

Fast / Software Engineering

Fast / Software Engineering Fast / Software Engineering Prof. Dr. Michel Chaudron Chalmers/Gothenburg Univ. Leiden Univ. Supervisor Ramin Etemaadi Phd candidate Software Architecture Optimization Hafeez Osman Phd candidate Software

More information

DATA STREAMS: MODELS AND ALGORITHMS

DATA STREAMS: MODELS AND ALGORITHMS DATA STREAMS: MODELS AND ALGORITHMS DATA STREAMS: MODELS AND ALGORITHMS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598 Kluwer Academic Publishers Boston/Dordrecht/London

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Discovery

More information

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT

More information

Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011

Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 1. Supervisor s Name Dr. M Kaykobad, Professor Visit Personal Webpage: http://www.buet.ac.bd/cse/faculty/facdetail.php?id=kaykobad

More information

Annual Report

Annual Report Annual Report 2017 1 Regional General Manager Letter The SUNRISE Resorts and Nile Cruises have recognized that its tourism related business has positive and negative impact on the environment. We recognized

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS

APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS ABSTRACT Ashwani Kharola 1, Dr SB Singh 2 Govt. Of India, Ministry of Defence Institute of Technology

More information

A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering

A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering Gurpreet Kaur M-Tech Student, Department of Computer Engineering, Yadawindra College of Engineering, Talwandi Sabo,

More information

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended

More information

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1

Contents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing

More information

Advanced Cyber Topics

Advanced Cyber Topics International Academy, Research, and Industry Association (IARIA) Tutorial Advanced Cyber Topics Tutorial Session I Instructors: Dr. Thomas J. Klemas and Dr. Steve Chan 18 November 2018 Tutorial Syllabus

More information

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology Master s of Science in Computer Sciences Master s of Science in Biotechnology Department of Computer Sciences 1. Introduction\Program Mission The Program mission is to prepare students to be fully abreast

More information

ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015

ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 Brief Description: ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 DRAFT AGENDA This forum is being organized as part of the implementation of the Regional Initiative on the "Use of telecommunications/icts

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

Heterogeneous Sim-Rank System For Image Intensional Search

Heterogeneous Sim-Rank System For Image Intensional Search Heterogeneous Sim-Rank System For Image Intensional Search Jyoti B.Thorat, Prof.S.S.Bere PG Student, Assistant Professor Department Of Computer Engineering, Dattakala Group of Institutions Faculty of Engineering

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following

M.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following (DMCA 301) Time : Three hours M.C.A DEGREE EXAMINATION, MAY 2012. Third Year Paper I ARTIFICIAL INTELLIGENCE SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. (a) Explain

More information

Enas El-Sayed Mohammed El-Sharawy

Enas El-Sayed Mohammed El-Sharawy Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official

More information

Cryptography, Information Security, Network Security, and System Analysis and Design.

Cryptography, Information Security, Network Security, and System Analysis and Design. االسم : د. حممد أمحد عاليه الربيد اإللكرتوين اهلاتف رقم الفاكس للجامعه الكليه القسم اللقب العلمي اتريخ احلصول عليه التخصص االهتمام البحثي دكتوراه / ماجستري اخلربه األحباث املنشوره Dr.m.alia@zuj.edu.jo

More information

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents

More information

Image Processing (IP)

Image Processing (IP) Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The

More information

Business Intelligence Roadmap HDT923 Three Days

Business Intelligence Roadmap HDT923 Three Days Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are

More information

Dynamic Data Placement Strategy in MapReduce-styled Data Processing Platform Hua-Ci WANG 1,a,*, Cai CHEN 2,b,*, Yi LIANG 3,c

Dynamic Data Placement Strategy in MapReduce-styled Data Processing Platform Hua-Ci WANG 1,a,*, Cai CHEN 2,b,*, Yi LIANG 3,c 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 Dynamic

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging 007 International Conference on Convergence Information Technology HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging Lixin Han,, Guihai Chen Department of Computer Science and Engineering,

More information

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17 Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION

TABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION vi TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION iii xii xiii xiv 1 INTRODUCTION 1 1.1 WEB MINING 2 1.1.1 Association Rules 2 1.1.2 Association Rule Mining 3 1.1.3 Clustering

More information

Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality

Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Abstract: Mass classification of objects is an important area of research and application in a variety of fields. In this

More information

IMOTION. Heiko Schuldt, University of Basel, Switzerland

IMOTION. Heiko Schuldt, University of Basel, Switzerland IMOTION Heiko Schuldt, University of Basel, Switzerland heiko.schuldt@unibas.ch IMOTION at a Glance Project Title Intelligent Multimodal Augmented Video Motion Retrieval System (IMOTION) Project Start

More information

PROGRAMME November 2016 BDAW American University in Bulgaria Blagoevgrad, Bulgarie

PROGRAMME November 2016 BDAW American University in Bulgaria Blagoevgrad, Bulgarie PROGRAMME BDAW 2016 10-11 November 2016 American University in Bulgaria Blagoevgrad, Bulgarie Committee General Chair: General Co-Chair Reinhardt Euler, Lab-STICC, UBO, France Lamri Laouamer, Al Qassim

More information

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03 MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

A SURVEY ON WEB LOG MINING AND PATTERN PREDICTION

A SURVEY ON WEB LOG MINING AND PATTERN PREDICTION A SURVEY ON WEB LOG MINING AND PATTERN PREDICTION Nisha Soni 1, Pushpendra Kumar Verma 2 1 M.Tech.Scholar, 2 Assistant Professor, Dept.of Computer Science & Engg. CSIT, Durg, (India) ABSTRACT Web sites

More information

Contents Introduction A Comprehensive Survey of Nature-Inspired Routing Protocols

Contents Introduction A Comprehensive Survey of Nature-Inspired Routing Protocols 1 Introduction... 1 1.1 MotivationoftheWork... 2 1.2 ProblemStatement... 4 1.2.1 Hypotheses......................................... 5 1.3 An Engineering Approach to Nature-Inspired Routing Protocols...

More information

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

QADR with Energy Consumption for DIA in Cloud

QADR with Energy Consumption for DIA in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle. 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING 1 NADIA IDRISSI, 2 AHMED ROUKHE 1,2 Faculty of Sciences Moulay Ismail Univerity Meknes, LAMPE Laboratory, Department

More information

CS 395T Numerical Optimization for Graphics and AI (3D Vision) Qixing Huang August 29 th 2018

CS 395T Numerical Optimization for Graphics and AI (3D Vision) Qixing Huang August 29 th 2018 CS 395T Numerical Optimization for Graphics and AI (3D Vision) Qixing Huang August 29 th 2018 3D Vision Understanding geometric relations between images and the 3D world between images Obtaining 3D information

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

Managing the Emerging Semantic Risks

Managing the Emerging Semantic Risks The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs

Kuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs International Journal of Mathematics and Computational Science Vol. 1, No. 4, 2015, pp. 206-213 http://www.aiscience.org/journal/ijmcs Kuder Richardson Reputation Coefficient Based Reputation Mechanism

More information

Manifold Learning Theory and Applications

Manifold Learning Theory and Applications Manifold Learning Theory and Applications Yunqian Ma and Yun Fu CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Contents

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant

More information

FACULTY OF INFORMATION SCIENCE & TECHNOLOGY MASTERS PROGRAMME SESSION (9 SEPT 2013)

FACULTY OF INFORMATION SCIENCE & TECHNOLOGY MASTERS PROGRAMME SESSION (9 SEPT 2013) FACULTY OF INFORMATION SCIENCE & TECHNOLOGY MASTERS PROGRAMME SESSION 2013-2014 (9 SEPT 2013) MASNIZAH MOHD HEAD OF MASTERS PROGRAMME Email: mas@ftsm.ukm.my Tel: 03-8921 6813/6077 9/9/2013 FTSM 2013-2014

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Model to Analyse Network and for Proactive node Management Implemented in Hadoop environment

Model to Analyse Network and for Proactive node Management Implemented in Hadoop environment Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Model to Analyse Network and for Proactive

More information

Detection and Prevention Mechanism against Attack for MANET Routing Protocol

Detection and Prevention Mechanism against Attack for MANET Routing Protocol Detection and Prevention Mechanism against Attack for MANET Routing Protocol Miss A.P.Deshmukh Dr. V. M. Thakare Dr. S.S.Sherekar SGBAU, Amravati SGBAU, Amravati SGBAU, Amravati Maharashtra, India. Maharashtra,

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

Bézier Surface Modeling for Neutrosophic Data Problems

Bézier Surface Modeling for Neutrosophic Data Problems Neutrosophic Sets and Systems, Vol. 19, 2018 19 University of New Mexico Bézier Surface Modeling for Neutrosophic Data Problems Selçuk Topal 1 * and Ferhat Taş 2 1 Department of Mathematics, Faculty of

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

A Survey on Infrequent Weighted Itemset Mining Approaches

A Survey on Infrequent Weighted Itemset Mining Approaches A Survey on Infrequent Weighted Itemset Mining Approaches R. PRIYANKA, S. P. SIDDIQUE IBRAHIM Abstract Association Rule Mining (ARM) is one of the most popular data mining technique. All existing work

More information

Segmentation of User Task Behaviour by Using Neural Network

Segmentation of User Task Behaviour by Using Neural Network Segmentation of User Task Behaviour by Using Neural Network Arti Dwivedi(Mtech scholar), Asst. Prof. Umesh Lilhore Abstract This paper, introduces Segmentation of User s Task to understand user search

More information

American International Journal of Research in Science, Technology, Engineering & Mathematics

American International Journal of Research in Science, Technology, Engineering & Mathematics American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629

More information

Using Genetic Algorithm to Solve Travelling Salesman Optimization Problem Based on Google Map Coordinates for Duhok City Areas

Using Genetic Algorithm to Solve Travelling Salesman Optimization Problem Based on Google Map Coordinates for Duhok City Areas Academic Journal of Nawroz University (AJNU) 99 Using Genetic Algorithm to Solve Travelling Salesman Optimization Problem Based on Google Map Coordinates for Duhok City Areas Ziyad Hazim Abid Al-Jabbar

More information

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural

More information

Automated Prediction of Defect Severity Based on Codifying Design Knowledge Using Ontologies

Automated Prediction of Defect Severity Based on Codifying Design Knowledge Using Ontologies Automated Prediction of Defect Severity Based on Codifying Design Knowledge Using Ontologies Martin Iliev, Bilal Karasneh, Michel R.V. Chaudron, Edwin Essenius LIACS, Leiden University; Logica Nederland

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

DATABASE TECHNOLOGIES AND APPLICATIONS (DBTA) Annual Report Prepared by: [AP Dr Lilly Suriani Affendey] 12 April 2017

DATABASE TECHNOLOGIES AND APPLICATIONS (DBTA) Annual Report Prepared by: [AP Dr Lilly Suriani Affendey] 12 April 2017 Annual Report 2016 Prepared by: [AP Dr Lilly Suriani Affendey] 12 April 2017 EXECUTIVE SUMMARY Introduction The Database Technologies and Applications Research Group at the Faculty of Computer Science

More information

Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks

Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks RESEARCH ARTICLE OPEN ACCESS Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks Harjinderjeet Singh [1], Manuraj Moudgil [2] Department of Computer Science

More information

A Bayesian Approach to Hybrid Image Retrieval

A Bayesian Approach to Hybrid Image Retrieval A Bayesian Approach to Hybrid Image Retrieval Pradhee Tandon and C. V. Jawahar Center for Visual Information Technology International Institute of Information Technology Hyderabad - 500032, INDIA {pradhee@research.,jawahar@}iiit.ac.in

More information

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet

More information

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering

More information

Pattern Classification based on Web Usage Mining using Neural Network Technique

Pattern Classification based on Web Usage Mining using Neural Network Technique International Journal of Computer Applications (975 8887) Pattern Classification based on Web Usage Mining using Neural Network Technique Er. Romil V Patel PIET, VADODARA Dheeraj Kumar Singh, PIET, VADODARA

More information

Parallelization of K-Means Clustering Algorithm for Data Mining

Parallelization of K-Means Clustering Algorithm for Data Mining Parallelization of K-Means Clustering Algorithm for Data Mining Hao JIANG a, Liyan YU b College of Computer Science and Engineering, Southeast University, Nanjing, China a hjiang@seu.edu.cn, b yly.sunshine@qq.com

More information

Performance Evaluation of Breera Using Net Logo Simulator

Performance Evaluation of Breera Using Net Logo Simulator Performance Evaluation of Breera Using Net Logo Simulator Prof. Dr. Saad Talib Hasson, Alyaa. Abdul-Moneim Al-Najar College of Sciences, University of Babylon, IRAQ, Abstract: Recently increased the attention

More information

AN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS

AN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS AN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS H.S Behera Department of Computer Science and Engineering, Veer Surendra Sai University

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Research Article Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3

Research Article Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3 Research Journal of Applied Sciences, Engineering and Technology 8(8): 989-994, 2014 DOI:.19026/rjaset.8.60 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: December,

More information

Route Optimization in MANET using FIGA

Route Optimization in MANET using FIGA Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve

More information

A Review on Security in Smart Grids

A Review on Security in Smart Grids International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Review on Security in Smart Grids Jeetu Sharma, Partha Pratim Bhattacharya and V K Jain College

More information

Accelerating Unique Strategy for Centroid Priming in K-Means Clustering

Accelerating Unique Strategy for Centroid Priming in K-Means Clustering IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Accelerating Unique Strategy for Centroid Priming in K-Means Clustering

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Programme Outcome COURSE OUTCOMES MCA

Programme Outcome COURSE OUTCOMES MCA Programme Outcome PO1: To provide trained human resource for the IT industry. COURSE OUTCOMES MCA MCA 101 : Object Oriented Programming CO1 The students develops a sound approach to problem solving using

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification

More information

Comparative Analysis of Vertical Fragmentation Techniques in Distributed Environment

Comparative Analysis of Vertical Fragmentation Techniques in Distributed Environment Comparative Analysis of Vertical Fragmentation Techniques in Distributed Environment Mukta Goel 1, Shalini Bhaskar Bajaj 2 1 Assistant Professor, IT, TIT&S, Bhiwani, Haryana, India, 2 Professor, CSE, AUH,

More information