Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Parallel Versus Iterated: Comparing Population Oriented And Chained Sequential Simulated Annealing Approaches To Cost-Based Abduction, Heba Abdallah Amer Jun 2005

Parallel Versus Iterated: Comparing Population Oriented And Chained Sequential Simulated Annealing Approaches To Cost-Based Abduction, Heba Abdallah Amer

Archived Theses and Dissertations

Stochastic search techniques are used to solve NP-hard combinatorial optimization problems. Simulated annealing, genetic algorithms and hybridization of both, all attempt to find the best solution with minimal cost and time. Guided Evolutionary Simulated Annealing is one technique of such hybridization. It is based on evolutionary programming where a number of simulated annealing chains are working in a generation to find the optimum solution for a problem. Abduction is the problem of finding the best explanation to a given set of observations. In AI, this has been modeled by a set of hypotheses that need to be assumed to prove …


Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha El Sokkary Jun 2005

Detecting Malicious Vbscripts Using Anomaly Host Based Ids Based On Principal Component Analysis (Pca), Racha El Sokkary

Archived Theses and Dissertations

Intrusion detection research over the last twenty years has focused on the threat of individuals illegally hacking into systems. Nowadays, intrusion threat to computer systems has changed radically. Instead of dealing with hackers, most current works focus on defending the system against code-driven attacks. Today’s web script codes such as VBScript are receiving increasing focus as a backdoor for attacking many computers through e-mail attachments or infected web sites. The nature of these malicious codes is that they can spread widely causing serious damages to many applications. Moreover, the majority of anti-virus tools used today are able to detect known …


Capturing Design Patterns For Performance Issues In Database-Driven Web Applications, Osama Mabroul Khaled Jun 2005

Capturing Design Patterns For Performance Issues In Database-Driven Web Applications, Osama Mabroul Khaled

Archived Theses and Dissertations

The Design patterns technology is a new research topic which aims at helping with communicating technical knowledge in a standard non-technical format. People coming from different technical backgrounds can share this knowledge and apply it in their own way. For example, pieces of designs could be the same for different applications but they get implemented using different programming languages. On the other hand, web applications are becoming more widely spread, especially e-commerce ones, which make light returns on investment and achieve good relations between the companies and the customers. To stabilize this relationship, a web application must have a good …


Plits, Dina Salah El Din Nasr May 2005

Plits, Dina Salah El Din Nasr

Archived Theses and Dissertations

No abstract provided.


Art Of The Astrolabe, Heather Suzanne Campbell Feb 2005

Art Of The Astrolabe, Heather Suzanne Campbell

Archived Theses and Dissertations

The astrolabe is a well known scientific instrument, commonly found in Islamic art collections. Despite its placement in art museums, it does not receive the same examination or discussion as other metalwork. This leads to errors in dating and place of origin when an instrument that lacks a dedication inscription or a signature.

This study places the astrolabe in an art historical context and not a scientific one.

Much literature has been written on this instrument concentrating on the scientific nature of the instrument or as part of a collection of scientific instruments. Its history, function, place in society and …


Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm Feb 2005

Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm

Archived Theses and Dissertations

No abstract provided.