Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 57

Full-Text Articles in Computer Engineering

An Adaptive Hybrid Genetic-Annealing Approach For Solving The Map Problem On Belief Networks, Manar Hosny Nov 2021

An Adaptive Hybrid Genetic-Annealing Approach For Solving The Map Problem On Belief Networks, Manar Hosny

Archived Theses and Dissertations

No abstract provided.


Energy Optimization By Scratchpad Memory Banking For Embedded Systems, Noha Abuaesh Nov 2021

Energy Optimization By Scratchpad Memory Banking For Embedded Systems, Noha Abuaesh

Archived Theses and Dissertations

No abstract provided.


Pervasive Open Spaces: An Intelligent And Scalable Pervasive Environment For Providing Contextual Resource Sharing, Amgad Magdy Madkour Nov 2021

Pervasive Open Spaces: An Intelligent And Scalable Pervasive Environment For Providing Contextual Resource Sharing, Amgad Magdy Madkour

Archived Theses and Dissertations

No abstract provided.


Texture Classification Using Transform Analysis, Mary Fouad Habib Nov 2021

Texture Classification Using Transform Analysis, Mary Fouad Habib

Archived Theses and Dissertations

No abstract provided.


Assessing Network Security Through Automated Attack Graph Based Multi-Level Penetration Testing, Ahmed Mohamed Hassan Mar 2012

Assessing Network Security Through Automated Attack Graph Based Multi-Level Penetration Testing, Ahmed Mohamed Hassan

Archived Theses and Dissertations

Assessing network security can be done in many different ways like applying penetration testing against target network. Penetration testing follows actual steps like reconnaissance, scanning, exploit and logical access to compromised hosts. When attacker compromises a machine, he uses it as a pivot for attacking other machines and getting access to them. An attacker continues in this process till he explores the entire target network or till he reaches his endeavor. This shows that attacks are not a single step but, to reach attackers' goal, the attacker has to go through multiple steps. Many of the available exploitation tools depend …


Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly Jun 2010

Measuring Atmospheric Scattering From Digital Images Of Urban Scenery Using Temporal Polarization-Based Vision, Tarek El-Gaaly

Archived Theses and Dissertations

Suspended atmospheric particles (particulate matter) are a form of air pollution that visually degrades urban scenery and is hazardous to human health and the environment. Current environmental monitoring devices are limited in their capability of measuring average particulate matter (PM) over large areas. Quantifying the visual effects of haze in digital images of urban scenery and correlating these effects to PM levels is a vital step in more practically monitoring our environment. Current image haze extraction algorithms remove all the haze from the scene and hence produce unnatural scenes for the sole purpose of enhancing vision. We present two algorithms …


An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr Jun 2010

An Extended Configurable Uml Activity Diagram And A Transformation Algorithm For Business Process Reference Modeling, Yosra Osama Badr

Archived Theses and Dissertations

Enterprise Resource Planning (ERP) solutions provide generic off-the-shelf reference models usually known as "best practices". The configuration !individualization of the reference model to meet specific requirements of business end users however, is a difficult task. The available modeling languages do not provide a complete configurable language that could be used to model configurable reference models. More specifically, there is no algorithm that monitors the transformation of configurable UML Activity Diagram (AD) models while preserving the syntactic correctness of the model. To fill these gaps we propose an extended UML AD modeling language which we named Configurable UML Activity Diagram (C-UML …


Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk Jun 2009

Software Quality Attribute Measurement And Analysis Based On Class Diagram Metrics, Dalia Rizk

Archived Theses and Dissertations

Software quality measurement lies at the heart of the quality engineering process. Quality measurement for object-oriented artifacts has become the key for ensuring high quality software. Both researchers and practitioners are interested in measuring software product quality for improvement. It has recently become more important to consider the quality of products at the early phases, especially at the design level to ensure that the coding and testing would be conducted more quickly and accurately. The research work on measuring quality at the design level progressed in a number of steps. The first step was to discover the correct set of …


Collaborative Filtering For Domain Independent Recommendation, Rami El-Gawly Feb 2009

Collaborative Filtering For Domain Independent Recommendation, Rami El-Gawly

Archived Theses and Dissertations

No abstract provided.


Label Oriented Clustering For Social Network Groups, Ahmed El Kholy Feb 2009

Label Oriented Clustering For Social Network Groups, Ahmed El Kholy

Archived Theses and Dissertations

No abstract provided.


Selective Summarization Of Online Discussions, Mohamed Al Tantawy Jun 2008

Selective Summarization Of Online Discussions, Mohamed Al Tantawy

Archived Theses and Dissertations

No abstract provided.


Mobile User Movement And Service Usage Prediction Using Bayesian Learning For Neural Networks, Sherif Hany Akoush Feb 2008

Mobile User Movement And Service Usage Prediction Using Bayesian Learning For Neural Networks, Sherif Hany Akoush

Archived Theses and Dissertations

No abstract provided.


Aspectization Of Web Applications Quality Of Service Measures, Lamya Atef Othman Tantawy Feb 2008

Aspectization Of Web Applications Quality Of Service Measures, Lamya Atef Othman Tantawy

Archived Theses and Dissertations

No abstract provided.


Threat-Driven Security Architecture Modeling And Analysis Of Web Services-Based Systems, Yomna Mostafa El-Sayed Aly Jan 2008

Threat-Driven Security Architecture Modeling And Analysis Of Web Services-Based Systems, Yomna Mostafa El-Sayed Aly

Archived Theses and Dissertations

No abstract provided.


Integrating Globalization Processes Into The Rational Unified Process, Omar Bahy Badreddin Jun 2007

Integrating Globalization Processes Into The Rational Unified Process, Omar Bahy Badreddin

Archived Theses and Dissertations

No abstract provided.


System Level Modeling And Design Using Sysml And Systemc, Waseem Mohamed Raslan Jun 2007

System Level Modeling And Design Using Sysml And Systemc, Waseem Mohamed Raslan

Archived Theses and Dissertations

No abstract provided.


Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama Jun 2007

Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama

Archived Theses and Dissertations

No abstract provided.


Distributed Web Services Firewall, Hesham Samy Sabry Jun 2007

Distributed Web Services Firewall, Hesham Samy Sabry

Archived Theses and Dissertations

No abstract provided.


A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim Feb 2007

A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim

Archived Theses and Dissertations

No abstract provided.


The Context-Oriented Architecture: Integrating Context Into Semantic Web Services, Aisha Mohamed-Salama Elsafty Dec 2006

The Context-Oriented Architecture: Integrating Context Into Semantic Web Services, Aisha Mohamed-Salama Elsafty

Archived Theses and Dissertations

No abstract provided.


Securing The Aodv Protocol Using Specification-Based Intrusion Detection, Hoda Mamdouh Hassan Nov 2006

Securing The Aodv Protocol Using Specification-Based Intrusion Detection, Hoda Mamdouh Hassan

Archived Theses and Dissertations

[Abstract not provided]


Lock-Based Cache Coherence Protocol For Chip Multiprocessors, Ihab Ismail Jun 2006

Lock-Based Cache Coherence Protocol For Chip Multiprocessors, Ihab Ismail

Archived Theses and Dissertations

Chip multiprocessor (CMP) is replacing the superscalar processor due to its huge performance gains in terms of processor speed, scalability, power consumption and economical design. Since the CMP consists of multiple processor cores on a single chip usually with share cache resources, process synchronization is an important issue that needs to be dealt with. Synchronization is usually done by the operating system in case of shared memory multiprocessors (SMP). This work studies the effect of performing synchronization by the hardware through its integration with the cache coherence protocol. A novel cache coherence protocol, called Lock-based Cache Coherence Protocol (LCCP) was …


Web Services - Based Autonomic Computing Framework (Wsac), Sherif Atef Gurguis Jun 2006

Web Services - Based Autonomic Computing Framework (Wsac), Sherif Atef Gurguis

Archived Theses and Dissertations

No abstract provided.


A Three Core Type Heterogeneous Chip Multiprocessor: Towards An Optimized Cmp Architecture, Ali Yehia Ali Jun 2006

A Three Core Type Heterogeneous Chip Multiprocessor: Towards An Optimized Cmp Architecture, Ali Yehia Ali

Archived Theses and Dissertations

No abstract provided.


An Ontological Approach For Building A Pattern Language And A Pattern Language Management Tool, Reaham Osama Badr Feb 2006

An Ontological Approach For Building A Pattern Language And A Pattern Language Management Tool, Reaham Osama Badr

Archived Theses and Dissertations

The Study of patterns and pattern inter relationships has become a recent issue tackled by many researchers. Although not many pattern languages exist yet, the importance of their existence is clearly noted. Authors argue that connecting related patterns using the relationships existing between them, gives them an additional value over individual patterns.

The main issues faced when dealing with pattern languages is how to build these languages and how to mange them afterwards. In this research work, an ontological approach is used to present a methodology for building a pattern language. This methodology is presented in the form of a …


Reputed Authenticated Routing For Ad Hoc Networks Protocol (Reputed-Aran), Abdalla Ahmed Fekry Mahmoud Feb 2006

Reputed Authenticated Routing For Ad Hoc Networks Protocol (Reputed-Aran), Abdalla Ahmed Fekry Mahmoud

Archived Theses and Dissertations

A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of …


Motion Detection Using Randomized Methods, Howaida Mohamed Naguib Jun 2005

Motion Detection Using Randomized Methods, Howaida Mohamed Naguib

Archived Theses and Dissertations

The detection and recogni6on of a moving object in a sequence of time varying images proves to be a very important task in machine intelligence in general and computer vision in particular. Recently, parametric domain techniques have been successfully used with a number of variants. In such melhods, the image is transfonned into some parameter space and the motion detection process is applied in that space. A recent parametric domain is the Randomized Hough Transform (RHT) that uses random sampling mechanism in the image space, score accumulation in the parameter space, and bridge between them using a converging mapping. The …


Towards A Minimal Metrics Suite For Agent Based Systems, Maha Ahmed Nabil Abdel Kader Feb 2005

Towards A Minimal Metrics Suite For Agent Based Systems, Maha Ahmed Nabil Abdel Kader

Archived Theses and Dissertations

No abstract provided.


Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid Jun 2004

Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid

Archived Theses and Dissertations

No abstract provided.


A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah Feb 2004

A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah

Archived Theses and Dissertations

Operating systems are the first developed piece of software for a computer and it is still the first application to run over our computers. Software developers spent a lot of time and efforts to build reliable systems using different philosophies and software engineering strategies. They built monolithic kernels, micro-kernels, pico-kernels, etc. to fulfill users' requirements and hardware developments as well. However, Most of the proposed solutions for operating systems design and implementation are for solving traditional problems. Operating systems are still constructed as a general piece of software used for either machine's resource management or as a virtual machine for …