(CSIT ) IEEE
|
|
- Noah York
- 5 years ago
- Views:
Transcription
1 2013 5th International Conference on Computer Science and Information Technology (CSIT 2013) Amman, Jordan March 2013 IEEE Catalog Number: ISBN: CFP13YAE-POD
2 Table of Contents Table of Contents Welcome message from the Vice President and Dean of Scientific Research and Graduate Studies at Applied Science University iii ix Welcome message from the General Chairperson of the th International Conference on Computer Science and Information Technology (CSIT) x Keynote Speakers Organizing Committee xi xiii (Artificial Intelligence and Web Systems) Compact Image Signature Generation: An Application in Image Retrieval 1 Manish Chowdhury, Sudeb Das and Malay Kumar Kundu Fuzzy Logic and Dempster-Shafer Theory to Find Kicking Range of Sepak Takraw 8 Game Andino Maseleno Modeling of ANFIS in predicting TiN coatings roughness 13 A.S.M. Jaya, S.Z.M. Hashim,H. Haron,R. Ngah, M.R. Muhamad and M.N.A. Rahman Ontology Semantic Approach to Extraction of knowledge from Holy Quran 19 Aliyu Rufai Yauri,Rabiah Abdul Kadir,Azreen Azman and Masrah Azrifah Azmi Murad Robust Local Triangular Kernel Density-based Clustering for High-dimensional Data 24 Aina Musdholifah and Siti Zaiton Mohd. Hashim The Forensic Investigation of Android Private Browsing Sessions using Orweb 33 Nedaa Al Barghouthy, Andrew Marrington and Ibrahim Baggili iii iii
3 Using Ontologies for Users-Groups Matching in An Annotation System 38 Danilo Avola, Paolo Bottoni and Amjad Hawash Ontology Evaluation: Which Test to Use 45 Ahmad Kayed Parallel Verification of UML Using DiVinE Tool 49 Muhammad Abdul Basit-Ur-Rahim, Jamil Ahmad and Fahim Arif A metric approach for Simultaneous Localization and Map Building 54 Noureddine Slimane, Mohamed Salah Khireddine and Kheireddine Chafaa Database Security Threats: A Survey Study 60 Dana Aldlaeen and Nedhal Al-Saiyd Approach for a Rule Based Ontologies Integration 65 Sihem Klai and Med Tarek Khadir An Optimistic Approach in Distributed Database Concurrency Control 71 Obaidah A.Rawashdeh, Hiaba A.Muhareb and Nedhal A.Al-Sayid Evaluation of Discernibility Matrix Based Reduct Computation Techniques 76 Enas A. Khashashneh and Qasem A. Al-Radaideh Review on Raindrop Detection and Removal in Weather Degraded Images 82 Mohd Helmy Abd Wahab, Ching-Hung Su, Nasriah Zakaria and Rosalina Abdul Salam (Communication and Networking) A Novel Communication System for Firefighters using Audio/Video Conferencing/Sub- 89 conferencing in standalone MANETs Moayad Aloqaily, Safa Otoum and Hussein Mouftah iv iv
4 Matching Mother and Calf Reindeer Using Wireless Sensor Networks 99 Mohamad Y. Mustafa and Svein M. Eilertsen Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks Issa Khalil1, Sameer Bataineh, Liana Qubajah and Abdallah Khreishah A Secure Mobile Payment System using QR Code Sana Nseir, Musbah Aqel and Nael Hirzallah Electronic Media and Digital Convergence O. Al Sheik Salem and R.A.Earnshaw Effective Usage of AI Technique for Requirement Change Management Practices Hummera Naz, Yasir Hafeez Motla, Sohail Asghar, Muhammad Azeem Abbas and Asma Khatoon Cyber-Bullying Taxonomies: Definition, Forms, Consequences and Mitigation Strategies Ali Al Mazari Towards a Dynamic Mapping in P2P Mediation system Selma.El Yahyaoui El Idrissi, Ahmed.Zellou and Ali.Idri Evaluation of Breast Cancer Risk by Using Formal Reasoning Algorithm Dr. Raed I. Hamed Undeniable Threshold Proxy Signature Scheme Sattar Aboud and Sufian Yousef (So ft war e Engineering) Use of computer animation for displaying the mode shapes of a three-dimensional framework 154 Jia-Jang Wu, Fang-Yu Chen and Tsung-Han Hsieh v
5 Exploring the Effect of Meta-Individual Values on Management of Software 162 Development using Schwartz s Model: A Case of Thai IT Professionals Waraporn Jirachiefpattana Extracting UML Models from Images 169 Bilal Karasneh and Michel R.V. Chaudron A New Strategic Risk Reduction Mourad Ykhlef and Danah Algawiaz Software Interfaces: On The Impact of Interface Design Anomalies Hani Abdeen, Osama Shata and Abdelkarim Erradi Mining Over dispersed and Auto correlated Vehicular Traffic Volume Yousef-Awwad Daraghmi, Chih-Wei Yi and Tsun-Chieh Chiang The hybrid integration system: Towards a new approach for creating candidate views for materialization Samir Anter, Ahmed Zelllou and Ali Idri 3D Geological Modeling and Visualization of Rock Masses Based on Google Earth: A Case Study Gang Mei, John C.Tipper and Nengxiong Xu Software Cost Estimation Based on Use Case Points for Global Software Development Mohammad Azzeh Employing Auditory Icons to Support Virtual Lecturers in E-Learning Interfaces Marwan Alseid, Mohammad Azzeh and Yousef El Sheikh USER S UTTERANCE CLASSIFICATION USING MACHINE LEARNING FOR ARABIC CONVERSATIONAL AGENTS Mohammad Hijjawi, Zuhair Bandar and Keeley Crockett Design and Implementation of Parallel SOM Model on GPGPU Saad Qasim Khan and Muhammad Ali Ismail vi vi
6 An Approach to Convert Object Oriented Database into XML Yusra Amer and Nael Hirzallah The Integrating Between Web Usage Mining And Data Mining Techniques Omer Adel Nassar and Dr. Nedhal A. Al Saiyd Fulvis: New approach for selecting views to materialize in Hybrid Information Integration Wadiî Hadi, Ahmed Zellou and Bouchaib Bounabat DECS, a Meta-CASE Tool with Visually-Oriented Constraint Definition Features Hazem Qattous, Philip Gray and Ray Welland Distributed and Parallel Computing Projective Rational Arithmetic with Floating Point Vaclav Skala A Hadoop Performance Model for Multi-Rack Clusters Jungkyu Han, Masakuni Ishii, Hiroyuki Makino PMR: Personalized Mobile Restaurant System Eman Yasser Daraghmi and Shyan-Ming Yuan Domain Ontology for Trustworthy Context-dependent Services Naseem Ibrahim and Ismail Khalil Message Rearrange Theory in Message Recovery Protocol Jing Cai and Shenfa Gao Hardware Implementation of LU Decomposition Using Dataflow Architecture on FPGA Mahmoud Eljammaly, Yasser Hanafy, Abdelmoniem Wahdan and Amr Bayoumi vii
7 Replica Control Protocol: Triple Quorum Replication (TQR) in Data Grid Rohaya Latip1, Tazquia Mizan, Nur Faezah Ghazali, Rabiah Abd Kadir and Feras. Ahmad Hanandeh Modular Modeling and Analyzing of Multimedia Documents with Repetitive Objects Djaouida Dahmani, Samia Mazouz and Malika Boukala CBIR using Relevance Feedback:Comparative Analysis and Major Challenges Khadidja Belattar and Sihem Mostefai Transforming Architectural Descriptions for Formal Analysis Naseem Ibrahim, Mubarak Mohammad and Vangalur Alagar Subjective Measures to Human Performance in Virtual Environment with Kinaesthetic Feedback Abdulslam M. Bashir and Robert Bicker Author Index 339 viii
ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology
ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationC.V ACADEMIC EXPERIENCES
C.V Name: Mohammad Rateb Al Rawajbeh Date of Birth:15/11/1968 Nationality: Jordanian Mobile: 00962-777460737 E-mail: m.rawajbeh@zuj.edu.jo EDUCATION STAGES 1986-1987- General Secondary Education Certification
More informationAppraising Vehicular ADHOC Networks Routing Protocols Using NS2
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 491-498 International Research Publications House http://www. irphouse.com /ijict.htm Appraising
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 INTRUSION DETECTION IN INTERNET OF THINGS A SURVEY T. S. Urmila, Dr. B. Balasubramanian
More informationRegression Based Cluster Formation for Enhancement of Lifetime of WSN
Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar
More informationAN IMAGE RANKING USING GOOGLE IMAGE SEARCH
AN IMAGE RANKING USING GOOGLE IMAGE SEARCH Shilpa A. Shingare, Manoj D. Patil ABSTRACT: Millions of images can be found on internet and a number is continuously growing day by day and tendency of people
More informationDISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS
DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS Zulkifli Md Yusof 1, Zuwairie Ibrahim 1, Ismail Ibrahim 1, Kamil Zakwan Mohd Azmi 1, Nor Azlina Ab Aziz 2, Nor Hidayati
More informationINTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST
More informationDIRECTORY OF EXPERTISE IN UiTM (PERAK)
DIRECTORY OF EXPERTISE IN UiTM (PERAK) NAME OF LECTURER AREA OF SPECIALIZATION FACULTY OF CIVIL ENGINEERING Prof. Ir. Dr. Hjh Zainab Mohamed Civil Engineering Geotechnical Engineering Rock Engineering
More informationTHE description and representation of the shape of an object
Enhancement of Shape Description and Representation by Slope Ali Salem Bin Samma and Rosalina Abdul Salam Abstract Representation and description of object shapes by the slopes of their contours or borders
More informationBee-Inspired Protocol Engineering
Muddassar Farooq Bee-Inspired Protocol Engineering From Nature to Networks With 128 Figures and 61 Tables Springer 1 Introduction 1 1.1 Motivation of the Work 2 1.2 Problem Statement 4 1.2.1 Hypotheses
More informationDetection of Anomalies using Online Oversampling PCA
Detection of Anomalies using Online Oversampling PCA Miss Supriya A. Bagane, Prof. Sonali Patil Abstract Anomaly detection is the process of identifying unexpected behavior and it is an important research
More informationClass: FYP 2_SEMESTER JAN 2017
Class: FYP 2_SEMESTER JAN 2017 Abdul Basit, Amatul Syafi 1 of 40 Username aabdulbasit460 To start creating your website, please visit: Password asab12345 http://students.weebly.com Abdul Fatakh, Afiqah
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationSemester Wise Schema BS Computer Science
Semester I (Credit Hours: 15) 1 CSC-101 Introduction to Information and Communication Technology (ICT) 4(3 + 1) -NONE- 2 CSC-102 Introduction to Programming 4 (3 + 1) -NONE- 3 ENG-101 Functional English
More informationGender Classification Technique Based on Facial Features using Neural Network
Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,
More informationFast / Software Engineering
Fast / Software Engineering Prof. Dr. Michel Chaudron Chalmers/Gothenburg Univ. Leiden Univ. Supervisor Ramin Etemaadi Phd candidate Software Architecture Optimization Hafeez Osman Phd candidate Software
More informationDATA STREAMS: MODELS AND ALGORITHMS
DATA STREAMS: MODELS AND ALGORITHMS DATA STREAMS: MODELS AND ALGORITHMS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598 Kluwer Academic Publishers Boston/Dordrecht/London
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Discovery
More informationPramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India
Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT
More informationResearch Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011
Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 1. Supervisor s Name Dr. M Kaykobad, Professor Visit Personal Webpage: http://www.buet.ac.bd/cse/faculty/facdetail.php?id=kaykobad
More informationAnnual Report
Annual Report 2017 1 Regional General Manager Letter The SUNRISE Resorts and Nile Cruises have recognized that its tourism related business has positive and negative impact on the environment. We recognized
More informationProceedings of The Second International Conference on Web Information Systems Engineering
Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun
More informationAPPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS
APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS ABSTRACT Ashwani Kharola 1, Dr SB Singh 2 Govt. Of India, Ministry of Defence Institute of Technology
More informationA Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering
A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering Gurpreet Kaur M-Tech Student, Department of Computer Engineering, Yadawindra College of Engineering, Talwandi Sabo,
More informationName of the lecturer Doç. Dr. Selma Ayşe ÖZEL
Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended
More informationContents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1
Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing
More informationAdvanced Cyber Topics
International Academy, Research, and Industry Association (IARIA) Tutorial Advanced Cyber Topics Tutorial Session I Instructors: Dr. Thomas J. Klemas and Dr. Steve Chan 18 November 2018 Tutorial Syllabus
More informationCollege of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology
Master s of Science in Computer Sciences Master s of Science in Biotechnology Department of Computer Sciences 1. Introduction\Program Mission The Program mission is to prepare students to be fully abreast
More informationITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015
Brief Description: ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 DRAFT AGENDA This forum is being organized as part of the implementation of the Regional Initiative on the "Use of telecommunications/icts
More informationHex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network
ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring
More informationHeterogeneous Sim-Rank System For Image Intensional Search
Heterogeneous Sim-Rank System For Image Intensional Search Jyoti B.Thorat, Prof.S.S.Bere PG Student, Assistant Professor Department Of Computer Engineering, Dattakala Group of Institutions Faculty of Engineering
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationM.C.A DEGREE EXAMINATION, MAY Third Year. Paper I ARTIFICIAL INTELLIGENCE. SECTION A (3 15 = 45 marks) Answer any THREE of the following
(DMCA 301) Time : Three hours M.C.A DEGREE EXAMINATION, MAY 2012. Third Year Paper I ARTIFICIAL INTELLIGENCE SECTION A (3 15 = 45 marks) Answer any THREE of the following Maximum : 75 marks 1. (a) Explain
More informationEnas El-Sayed Mohammed El-Sharawy
Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official
More informationCryptography, Information Security, Network Security, and System Analysis and Design.
االسم : د. حممد أمحد عاليه الربيد اإللكرتوين اهلاتف رقم الفاكس للجامعه الكليه القسم اللقب العلمي اتريخ احلصول عليه التخصص االهتمام البحثي دكتوراه / ماجستري اخلربه األحباث املنشوره Dr.m.alia@zuj.edu.jo
More informationMOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi
MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents
More informationImage Processing (IP)
Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationDynamic Data Placement Strategy in MapReduce-styled Data Processing Platform Hua-Ci WANG 1,a,*, Cai CHEN 2,b,*, Yi LIANG 3,c
2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 Dynamic
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationHFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging
007 International Conference on Convergence Information Technology HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging Lixin Han,, Guihai Chen Department of Computer Science and Engineering,
More informationTable of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17
Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION
vi TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION iii xii xiii xiv 1 INTRODUCTION 1 1.1 WEB MINING 2 1.1.1 Association Rules 2 1.1.2 Association Rule Mining 3 1.1.3 Clustering
More informationMass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality
Mass Classification Method in Mammogram Using Fuzzy K-Nearest Neighbour Equality Abstract: Mass classification of objects is an important area of research and application in a variety of fields. In this
More informationIMOTION. Heiko Schuldt, University of Basel, Switzerland
IMOTION Heiko Schuldt, University of Basel, Switzerland heiko.schuldt@unibas.ch IMOTION at a Glance Project Title Intelligent Multimodal Augmented Video Motion Retrieval System (IMOTION) Project Start
More informationPROGRAMME November 2016 BDAW American University in Bulgaria Blagoevgrad, Bulgarie
PROGRAMME BDAW 2016 10-11 November 2016 American University in Bulgaria Blagoevgrad, Bulgarie Committee General Chair: General Co-Chair Reinhardt Euler, Lab-STICC, UBO, France Lamri Laouamer, Al Qassim
More informationMOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03
MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationA SURVEY ON WEB LOG MINING AND PATTERN PREDICTION
A SURVEY ON WEB LOG MINING AND PATTERN PREDICTION Nisha Soni 1, Pushpendra Kumar Verma 2 1 M.Tech.Scholar, 2 Assistant Professor, Dept.of Computer Science & Engg. CSIT, Durg, (India) ABSTRACT Web sites
More informationContents Introduction A Comprehensive Survey of Nature-Inspired Routing Protocols
1 Introduction... 1 1.1 MotivationoftheWork... 2 1.2 ProblemStatement... 4 1.2.1 Hypotheses......................................... 5 1.3 An Engineering Approach to Nature-Inspired Routing Protocols...
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationQADR with Energy Consumption for DIA in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationQiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.
2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationAPPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING
APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING 1 NADIA IDRISSI, 2 AHMED ROUKHE 1,2 Faculty of Sciences Moulay Ismail Univerity Meknes, LAMPE Laboratory, Department
More informationCS 395T Numerical Optimization for Graphics and AI (3D Vision) Qixing Huang August 29 th 2018
CS 395T Numerical Optimization for Graphics and AI (3D Vision) Qixing Huang August 29 th 2018 3D Vision Understanding geometric relations between images and the 3D world between images Obtaining 3D information
More informationAUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS
AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,
More informationManaging the Emerging Semantic Risks
The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern
More informationSimulation of Zhang Suen Algorithm using Feed- Forward Neural Networks
Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization
More informationKuder Richardson Reputation Coefficient Based Reputation Mechanism for Isolating Root Node Attack in MANETs
International Journal of Mathematics and Computational Science Vol. 1, No. 4, 2015, pp. 206-213 http://www.aiscience.org/journal/ijmcs Kuder Richardson Reputation Coefficient Based Reputation Mechanism
More informationManifold Learning Theory and Applications
Manifold Learning Theory and Applications Yunqian Ma and Yun Fu CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Contents
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant
More informationFACULTY OF INFORMATION SCIENCE & TECHNOLOGY MASTERS PROGRAMME SESSION (9 SEPT 2013)
FACULTY OF INFORMATION SCIENCE & TECHNOLOGY MASTERS PROGRAMME SESSION 2013-2014 (9 SEPT 2013) MASNIZAH MOHD HEAD OF MASTERS PROGRAMME Email: mas@ftsm.ukm.my Tel: 03-8921 6813/6077 9/9/2013 FTSM 2013-2014
More informationSTUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless
More informationModel to Analyse Network and for Proactive node Management Implemented in Hadoop environment
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Model to Analyse Network and for Proactive
More informationDetection and Prevention Mechanism against Attack for MANET Routing Protocol
Detection and Prevention Mechanism against Attack for MANET Routing Protocol Miss A.P.Deshmukh Dr. V. M. Thakare Dr. S.S.Sherekar SGBAU, Amravati SGBAU, Amravati SGBAU, Amravati Maharashtra, India. Maharashtra,
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationBézier Surface Modeling for Neutrosophic Data Problems
Neutrosophic Sets and Systems, Vol. 19, 2018 19 University of New Mexico Bézier Surface Modeling for Neutrosophic Data Problems Selçuk Topal 1 * and Ferhat Taş 2 1 Department of Mathematics, Faculty of
More informationA Hierarchical Document Clustering Approach with Frequent Itemsets
A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of
More informationA Survey on Infrequent Weighted Itemset Mining Approaches
A Survey on Infrequent Weighted Itemset Mining Approaches R. PRIYANKA, S. P. SIDDIQUE IBRAHIM Abstract Association Rule Mining (ARM) is one of the most popular data mining technique. All existing work
More informationSegmentation of User Task Behaviour by Using Neural Network
Segmentation of User Task Behaviour by Using Neural Network Arti Dwivedi(Mtech scholar), Asst. Prof. Umesh Lilhore Abstract This paper, introduces Segmentation of User s Task to understand user search
More informationAmerican International Journal of Research in Science, Technology, Engineering & Mathematics
American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
More informationUsing Genetic Algorithm to Solve Travelling Salesman Optimization Problem Based on Google Map Coordinates for Duhok City Areas
Academic Journal of Nawroz University (AJNU) 99 Using Genetic Algorithm to Solve Travelling Salesman Optimization Problem Based on Google Map Coordinates for Duhok City Areas Ziyad Hazim Abid Al-Jabbar
More informationDetermining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network
Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural
More informationAutomated Prediction of Defect Severity Based on Codifying Design Knowledge Using Ontologies
Automated Prediction of Defect Severity Based on Codifying Design Knowledge Using Ontologies Martin Iliev, Bilal Karasneh, Michel R.V. Chaudron, Edwin Essenius LIACS, Leiden University; Logica Nederland
More informationClustering Based Certificate Revocation Scheme for Malicious Nodes in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of
More informationDATABASE TECHNOLOGIES AND APPLICATIONS (DBTA) Annual Report Prepared by: [AP Dr Lilly Suriani Affendey] 12 April 2017
Annual Report 2016 Prepared by: [AP Dr Lilly Suriani Affendey] 12 April 2017 EXECUTIVE SUMMARY Introduction The Database Technologies and Applications Research Group at the Faculty of Computer Science
More informationCollision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks
RESEARCH ARTICLE OPEN ACCESS Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks Harjinderjeet Singh [1], Manuraj Moudgil [2] Department of Computer Science
More informationA Bayesian Approach to Hybrid Image Retrieval
A Bayesian Approach to Hybrid Image Retrieval Pradhee Tandon and C. V. Jawahar Center for Visual Information Technology International Institute of Information Technology Hyderabad - 500032, INDIA {pradhee@research.,jawahar@}iiit.ac.in
More informationSecured Double Layer Data Hiding Using Encryption and Decryption Techniques
Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet
More informationEfficient Method for Intrusion Detection in Multitenanat Data Center; A Review
Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering
More informationPattern Classification based on Web Usage Mining using Neural Network Technique
International Journal of Computer Applications (975 8887) Pattern Classification based on Web Usage Mining using Neural Network Technique Er. Romil V Patel PIET, VADODARA Dheeraj Kumar Singh, PIET, VADODARA
More informationParallelization of K-Means Clustering Algorithm for Data Mining
Parallelization of K-Means Clustering Algorithm for Data Mining Hao JIANG a, Liyan YU b College of Computer Science and Engineering, Southeast University, Nanjing, China a hjiang@seu.edu.cn, b yly.sunshine@qq.com
More informationPerformance Evaluation of Breera Using Net Logo Simulator
Performance Evaluation of Breera Using Net Logo Simulator Prof. Dr. Saad Talib Hasson, Alyaa. Abdul-Moneim Al-Najar College of Sciences, University of Babylon, IRAQ, Abstract: Recently increased the attention
More informationAN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS
AN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS H.S Behera Department of Computer Science and Engineering, Veer Surendra Sai University
More informationPart I: Data Mining Foundations
Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?
More informationVolume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based
More informationResearch Article Performance Analysis of EIGRP via OSPF Based on OPNET and GNS3
Research Journal of Applied Sciences, Engineering and Technology 8(8): 989-994, 2014 DOI:.19026/rjaset.8.60 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted: December,
More informationRoute Optimization in MANET using FIGA
Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve
More informationA Review on Security in Smart Grids
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Review on Security in Smart Grids Jeetu Sharma, Partha Pratim Bhattacharya and V K Jain College
More informationAccelerating Unique Strategy for Centroid Priming in K-Means Clustering
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Accelerating Unique Strategy for Centroid Priming in K-Means Clustering
More informationDETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN
DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationProgramme Outcome COURSE OUTCOMES MCA
Programme Outcome PO1: To provide trained human resource for the IT industry. COURSE OUTCOMES MCA MCA 101 : Object Oriented Programming CO1 The students develops a sound approach to problem solving using
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi
ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification
More informationComparative Analysis of Vertical Fragmentation Techniques in Distributed Environment
Comparative Analysis of Vertical Fragmentation Techniques in Distributed Environment Mukta Goel 1, Shalini Bhaskar Bajaj 2 1 Assistant Professor, IT, TIT&S, Bhiwani, Haryana, India, 2 Professor, CSE, AUH,
More information