Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 41 of 41

Full-Text Articles in Entire DC Network

Conceptual Modelling And The Quality Of Ontologies: Endurantism Vs. Perdurantism, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad, Sergio De Cesare, Mark Lycett Jan 2012

Conceptual Modelling And The Quality Of Ontologies: Endurantism Vs. Perdurantism, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad, Sergio De Cesare, Mark Lycett

Dr. Mutaz M. Al-Debei

Ontologies are key enablers for sharing precise and machine-understandable semantics among different applications and parties. Yet, for ontologies to meet these expectations, their quality must be of a good standard. The quality of an ontology is strongly based on the design method employed. This paper addresses the design problems related to the modelling of ontologies, with specific concentration on the issues related to the quality of the conceptualisations produced. The paper aims to demonstrate the impact of the modelling paradigm adopted on the quality of ontological models and, consequently, the potential impact that such a decision can have in relation …


Implementations Of Ict Innovations: A Comparative Analysis In Terms Of Challenges Between Developed And Developing Countries, Mutaz Al-Debei, Enas Al-Lozi Jan 2012

Implementations Of Ict Innovations: A Comparative Analysis In Terms Of Challenges Between Developed And Developing Countries, Mutaz Al-Debei, Enas Al-Lozi

Dr. Mutaz M. Al-Debei

The main aim of this paper is to achieve a depth of understanding of the various similarities and differences in terms of challenges between developed and developing countries and in regards to the implementation of ICT innovations. Indeed, advances in Information and Communication Technologies (ICTs) have brought many innovations to the field of Information Systems (IS). Despite agreements on their importance to the success of organizations, the implementation processes of such innovations are multifaceted and require proper addressing of a wide-spread issues and challenges. In this study, we address this matter by first; synthesizing a comprehensive body of recent and …


Data Mining Text Book, Abbas Madraky Jan 2012

Data Mining Text Book, Abbas Madraky

Abbas Madraky

No abstract provided.


A Survey Of The State Of The Art In Particle Swarm Optimization, Mahdiyeh Eslami, Hussain Shareef, Mohammad Khajehzadeh, Azah Mohamed Jan 2012

A Survey Of The State Of The Art In Particle Swarm Optimization, Mahdiyeh Eslami, Hussain Shareef, Mohammad Khajehzadeh, Azah Mohamed

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor Jan 2012

Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor

Hooman Hoodeh

With the advance of Vehicular ad-hoc network, routing protocol has become one of the most important issues in transmitting data among Vehicles. The two routing protocol are DSDV and AODV which DSDV is known as a novel approach in proactive system; however, AODV has good performance in reactive system. In this paper, we compare the efficiency between DSDV & AODV in terms of packet-loss, end-to-end delay and throughput based on given scenarios. The comparison has implemented in various speeds for acquiring result with higher performance. The speeds consist of 5, 20 and 40km/s. then we analyze the explicit results according …


Operating Software, Donovan Torgerson, Miyuru Arangala, Michael Hlas, David Bullock, Dayln Limesand, Cameron Kerbaugh, Daniel Schuler, Mitchell Fossen, Edwin Carlson, Atif Mohammad, Josh Berk, Jeremy Straub Jan 2012

Operating Software, Donovan Torgerson, Miyuru Arangala, Michael Hlas, David Bullock, Dayln Limesand, Cameron Kerbaugh, Daniel Schuler, Mitchell Fossen, Edwin Carlson, Atif Mohammad, Josh Berk, Jeremy Straub

Jeremy Straub

No abstract provided.


Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk Jan 2012

Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk

Jeremy Straub

No abstract provided.


Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk Jan 2012

Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk

Jeremy Straub

No abstract provided.


Adaptive Kriging Controller Design For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu Jan 2012

Adaptive Kriging Controller Design For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu

Bin Xu

No abstract provided.


Direct Neural Discrete Control Of Hypersonic Flight Vehicle, Bin Xu Jan 2012

Direct Neural Discrete Control Of Hypersonic Flight Vehicle, Bin Xu

Bin Xu

No abstract provided.


New Steganography Algorithm To Conceal A Large Amount Of Secret Message Using Hybrid Adaptive Neural Networks With Modified Adaptive Genetic Algorithm, Nameer N. El-Emam, Rasheed A. Al-Zubidy Jan 2012

New Steganography Algorithm To Conceal A Large Amount Of Secret Message Using Hybrid Adaptive Neural Networks With Modified Adaptive Genetic Algorithm, Nameer N. El-Emam, Rasheed A. Al-Zubidy

Philadelphia University, Jordan

In this paper, we propose a new steganography algorithm using non-uniform adaptive image segmentation (NUAIS) with an intelligent computing technique to conceal efficiently a large amount of confidential messages (Smsg) into color images. Whereas, the number of secret bits to be replaced is non uniform from byte to another byte; it based on byte characteristics, which are extracted by using 16 byte levels (BL) with variance distribution of the Neighboring Eight Bytes (NEB) around the current byte. Four security layers are introduced to increase resistance against statistical and visual attacks. These layers are designed to make an excellent imperceptible concealing …