Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Networks (3)
- AODV (2)
- Computer networks (2)
- Mobile (2)
- Optimization (2)
-
- Routing (2)
- 3D construction (1)
- AI (1)
- AMIRA (1)
- ARAN (1)
- AUC (1)
- Agent based approach (1)
- Architecture (1)
- Atmospheric pressure (1)
- Attacks (1)
- Automated (1)
- Biometric authentication (1)
- Business (1)
- CBA (1)
- CI (1)
- CMP (1)
- CT (1)
- Computational intelligence (1)
- Computer Vision - Motion Detection - Randomized Algorithms - Hough Transforms - Randomized Hough Transform - Parametric Domain Methods (1)
- Computer architecture (1)
- Computer network resources (1)
- Computer software (1)
- Computer storage devices (1)
- Connectionist (1)
- Cooperative expert system (1)
Articles 1 - 30 of 57
Full-Text Articles in Engineering
An Adaptive Hybrid Genetic-Annealing Approach For Solving The Map Problem On Belief Networks, Manar Hosny
An Adaptive Hybrid Genetic-Annealing Approach For Solving The Map Problem On Belief Networks, Manar Hosny
Archived Theses and Dissertations
No abstract provided.
Energy Optimization By Scratchpad Memory Banking For Embedded Systems, Noha Abuaesh
Energy Optimization By Scratchpad Memory Banking For Embedded Systems, Noha Abuaesh
Archived Theses and Dissertations
No abstract provided.
Pervasive Open Spaces: An Intelligent And Scalable Pervasive Environment For Providing Contextual Resource Sharing, Amgad Magdy Madkour
Pervasive Open Spaces: An Intelligent And Scalable Pervasive Environment For Providing Contextual Resource Sharing, Amgad Magdy Madkour
Archived Theses and Dissertations
No abstract provided.
Texture Classification Using Transform Analysis, Mary Fouad Habib
Texture Classification Using Transform Analysis, Mary Fouad Habib
Archived Theses and Dissertations
No abstract provided.
Assessing Network Security Through Automated Attack Graph Based Multi-Level Penetration Testing, Ahmed Mohamed Hassan
Assessing Network Security Through Automated Attack Graph Based Multi-Level Penetration Testing, Ahmed Mohamed Hassan
Archived Theses and Dissertations
Assessing network security can be done in many different ways like applying penetration testing against target network. Penetration testing follows actual steps like reconnaissance, scanning, exploit and logical access to compromised hosts. When attacker compromises a machine, he uses it as a pivot for attacking other machines and getting access to them. An attacker continues in this process till he explores the entire target network or till he reaches his endeavor. This shows that attacks are not a single step but, to reach attackers' goal, the attacker has to go through multiple steps. Many of the available exploitation tools depend …
An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr
An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr
Archived Theses and Dissertations
Enterprise Resource Planning (ERP) solutions provide generic off-the-shelf reference models usually known as "best practices". The configuration !individualization of the reference model to meet specific requirements of business end users however, is a difficult task. The available modeling languages do not provide a complete configurable language that could be used to model configurable reference models. More specifically, there is no algorithm that monitors the transformation of configurable UML Activity Diagram (AD) models while preserving the syntactic correctness of the model. To fill these gaps we propose an extended UML AD modeling language which we named Configurable UML Activity Diagram (C-UML …
Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly
Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly
Archived Theses and Dissertations
Suspended atmospheric particles (particulate matter) are a form of air pollution that visually degrades urban scenery and is hazardous to human health and the environment. Current environmental monitoring devices are limited in their capability of measuring average particulate matter (PM) over large areas. Quantifying the visual effects of haze in digital images of urban scenery and correlating these effects to PM levels is a vital step in more practically monitoring our environment. Current image haze extraction algorithms remove all the haze from the scene and hence produce unnatural scenes for the sole purpose of enhancing vision. We present two algorithms …
Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk
Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk
Archived Theses and Dissertations
Software quality measurement lies at the heart of the quality engineering process. Quality measurement for object-oriented artifacts has become the key for ensuring high quality software. Both researchers and practitioners are interested in measuring software product quality for improvement. It has recently become more important to consider the quality of products at the early phases, especially at the design level to ensure that the coding and testing would be conducted more quickly and accurately. The research work on measuring quality at the design level progressed in a number of steps. The first step was to discover the correct set of …
Label Oriented Clustering For Social Network Groups, Ahmed El Kholy
Label Oriented Clustering For Social Network Groups, Ahmed El Kholy
Archived Theses and Dissertations
No abstract provided.
Collaborative Filtering For Domain Independent Recommendation, Rami El-Gawly
Collaborative Filtering For Domain Independent Recommendation, Rami El-Gawly
Archived Theses and Dissertations
No abstract provided.
Selective Summarization Of Online Discussions, Mohamed Al Tantawy
Selective Summarization Of Online Discussions, Mohamed Al Tantawy
Archived Theses and Dissertations
No abstract provided.
Mobile User Movement And Service Usage Prediction Using Bayesian Learning For Neural Networks, Sherif Hany Akoush
Mobile User Movement And Service Usage Prediction Using Bayesian Learning For Neural Networks, Sherif Hany Akoush
Archived Theses and Dissertations
No abstract provided.
Aspectization Of Web Applications Quality Of Service Measures, Lamya Atef Othman Tantawy
Aspectization Of Web Applications Quality Of Service Measures, Lamya Atef Othman Tantawy
Archived Theses and Dissertations
No abstract provided.
Threat-Driven Security Architecture Modeling And Analysis Of Web Services-Based Systems, Yomna Mostafa El-Sayed Aly
Threat-Driven Security Architecture Modeling And Analysis Of Web Services-Based Systems, Yomna Mostafa El-Sayed Aly
Archived Theses and Dissertations
No abstract provided.
System Level Modeling And Design Using Sysml And Systemc, Waseem Mohamed Raslan
System Level Modeling And Design Using Sysml And Systemc, Waseem Mohamed Raslan
Archived Theses and Dissertations
No abstract provided.
Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama
Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama
Archived Theses and Dissertations
No abstract provided.
Distributed Web Services Firewall, Hesham Samy Sabry
Distributed Web Services Firewall, Hesham Samy Sabry
Archived Theses and Dissertations
No abstract provided.
Integrating Globalization Processes Into The Rational Unified Process, Omar Bahy Badreddin
Integrating Globalization Processes Into The Rational Unified Process, Omar Bahy Badreddin
Archived Theses and Dissertations
No abstract provided.
A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim
A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim
Archived Theses and Dissertations
No abstract provided.
The Context-Oriented Architecture: Integrating Context Into Semantic Web Services, Aisha Mohamed-Salama Elsafty
The Context-Oriented Architecture: Integrating Context Into Semantic Web Services, Aisha Mohamed-Salama Elsafty
Archived Theses and Dissertations
No abstract provided.
Securing The Aodv Protocol Using Specification-Based Intrusion Detection, Hoda Mamdouh Hassan
Securing The Aodv Protocol Using Specification-Based Intrusion Detection, Hoda Mamdouh Hassan
Archived Theses and Dissertations
[Abstract not provided]
A Three Core Type Heterogeneous Chip Multiprocessor: Towards An Optimized Cmp Architecture, Ali Yehia Ali
A Three Core Type Heterogeneous Chip Multiprocessor: Towards An Optimized Cmp Architecture, Ali Yehia Ali
Archived Theses and Dissertations
No abstract provided.
Web Services - Based Autonomic Computing Framework (Wsac), Sherif Atef Gurguis
Web Services - Based Autonomic Computing Framework (Wsac), Sherif Atef Gurguis
Archived Theses and Dissertations
No abstract provided.
Lock-Based Cache Coherence Protocol For Chip Multiprocessors, Ihab Ismail
Lock-Based Cache Coherence Protocol For Chip Multiprocessors, Ihab Ismail
Archived Theses and Dissertations
Chip multiprocessor (CMP) is replacing the superscalar processor due to its huge performance gains in terms of processor speed, scalability, power consumption and economical design. Since the CMP consists of multiple processor cores on a single chip usually with share cache resources, process synchronization is an important issue that needs to be dealt with. Synchronization is usually done by the operating system in case of shared memory multiprocessors (SMP). This work studies the effect of performing synchronization by the hardware through its integration with the cache coherence protocol. A novel cache coherence protocol, called Lock-based Cache Coherence Protocol (LCCP) was …
An Ontological Approach For Building A Pattern Language And A Pattern Language Management Tool, Reaham Osama Badr
An Ontological Approach For Building A Pattern Language And A Pattern Language Management Tool, Reaham Osama Badr
Archived Theses and Dissertations
The Study of patterns and pattern inter relationships has become a recent issue tackled by many researchers. Although not many pattern languages exist yet, the importance of their existence is clearly noted. Authors argue that connecting related patterns using the relationships existing between them, gives them an additional value over individual patterns.
The main issues faced when dealing with pattern languages is how to build these languages and how to mange them afterwards. In this research work, an ontological approach is used to present a methodology for building a pattern language. This methodology is presented in the form of a …
Reputed Authenticated Routing For Ad Hoc Networks Protocol (Reputed-Aran), Abdalla Ahmed Fekry Mahmoud
Reputed Authenticated Routing For Ad Hoc Networks Protocol (Reputed-Aran), Abdalla Ahmed Fekry Mahmoud
Archived Theses and Dissertations
A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of …
Motion Detection Using Randomized Methods, Howaida Mohamed Naguib
Motion Detection Using Randomized Methods, Howaida Mohamed Naguib
Archived Theses and Dissertations
The detection and recogni6on of a moving object in a sequence of time varying images proves to be a very important task in machine intelligence in general and computer vision in particular. Recently, parametric domain techniques have been successfully used with a number of variants. In such melhods, the image is transfonned into some parameter space and the motion detection process is applied in that space. A recent parametric domain is the Randomized Hough Transform (RHT) that uses random sampling mechanism in the image space, score accumulation in the parameter space, and bridge between them using a converging mapping. The …
Towards A Minimal Metrics Suite For Agent Based Systems, Maha Ahmed Nabil Abdel Kader
Towards A Minimal Metrics Suite For Agent Based Systems, Maha Ahmed Nabil Abdel Kader
Archived Theses and Dissertations
No abstract provided.
Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid
Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid
Archived Theses and Dissertations
No abstract provided.
A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah
A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah
Archived Theses and Dissertations
Operating systems are the first developed piece of software for a computer and it is still the first application to run over our computers. Software developers spent a lot of time and efforts to build reliable systems using different philosophies and software engineering strategies. They built monolithic kernels, micro-kernels, pico-kernels, etc. to fulfill users' requirements and hardware developments as well. However, Most of the proposed solutions for operating systems design and implementation are for solving traditional problems. Operating systems are still constructed as a general piece of software used for either machine's resource management or as a virtual machine for …