Browsing Volume 08 by Title

Sort by: Order: Results:

  • Meftah, Souhail; Rachidi, Tajjeeddine; Assem, Nasser (2019-09-01)
    In this work, we apply a two stage anomaly-based network intrusion detection process using the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests among other techniques to select the best dataset ...
  • Khader, Ammar Abdul-Hamed; Abdul-Jabbar, Jassim M.; Hagem, Rabee M.; Mainuddin; Beg, Mirza Tariq (2019-07-01)
    When a large number of cognitive users (CUs) are competing for the spectral resource sharing with different parameters, it is a challenging job to decide a scheduling criterion to be followed and to solve the problem of ...
  • Qamber, Isa S.; AL-Hamad, Mohamed Y. (2019-03-01)
    Nowadays Photovoltaic (PV) became the new competitive energy resource. Therefore, it needs to be connected to the grid to reduce the demand from the authority, which means the flow of the load will be reduced. The production ...
  • Moujahdi, Chouaib; Assad, Noureddine (2019-09-01)
    The inability of airports to absorb the increasing numbers of passengers year after year, makes the use of egates and face recognition terminals a promising solution to enhance the quality of service and security. Thus, ...
  • Sarker, Kamal Uddin; Deraman, Aziz Bin; Hasan, Raza; Abbas, Ali (2019-05-01)
    A common inward research area big data is being introduced due to the rapidly increasing of information systems in all social and business organizations. The global connectivity in the virtual environment become smarter ...
  • Al-Awad, Nasir Ahmed (2019-01-01)
    Multivariable framework includes in excess of one control loop, these loops communicate with each other, in such a way, to the point that solitary information influences its own output as well as influences different process ...
  • Jamel, Thamer M. (2019-07-01)
    To the best of my knowledge, the concept of the Fast Euclidean Direction Search (FEDS) for the wireless communication systems has not been fully exploited and only a few researchers who are working on this topic. This paper ...
  • Maoudj, Rabah; Medeiros, Juan; Terré, Michel (2019-09-01)
    In this paper, we compare different order of statistical moments to blindly estimate the propagation channel in an OFDM based wireless network. We first derive the theoretical expression of the channel estimation error and ...
  • Kolahi, Samad S; Sooran, Ahmad Khalid; Mazhar Ullah Khan, Muhammad; Nasim, Mohammed Faroq (2019-09-01)
    In this paper, the performance of IEEE 802.11ac wireless LAN using IPv4, IPv6, TCP, UDP, peer-peer, and client-server networks is investigated while implementing WPA2 security. The latest operating systems are used in the ...
  • Abdulhameed, Ahmed Faeq; Ahmed, Rana Ejaz (2019-11-01)
    A datacenter provides the core computing and storage elements for cloud computing paradigm. The Datacenter network (DCN) topology defines the structure in which servers and the networking devices are interconnected within ...
  • Hammad, Mustafa; Alqaddoumi, Abdulla; Al-Obaidy, Hadeel (2019-09-01)
    Software defect prediction is one of the most important task during the development of software systems in order to save developers’ time and effort. Discovering defects in an early stage of software development will allow ...
  • Al-Sultan, Muthana R.; Ameen, Siddeeq Y.; Abduallah, Wafaa M. (2019-09-01)
    Great efforts made to detect secret hidden information within digital files. Unfortunately, these efforts are consuming large amount of time and may fail if the hidden information encrypted. Therefore, destruction of such ...
  • AL-Allaf, Ahmad F.; A. Jabbar, A. I. (2019-01-01)
    The continued demand for improved quality of service for the Internet network is an incentive to find new methods and means to reduce the impact of congestion on the network. The Random Early Detection (RED) algorithm is ...
  • J, Jaisooraj; Kumar, D Madhu; Ghosh, Aindrila (2019-11-01)
    Ever since Internet of Things (IoT) has become a reality, fresh challenges have been propping up in a day-to-day manner for keeping the paradigm robust. As an IoT enabling technology, Low Power Lossy Networks (LLNs) play ...
  • Kyaruzi, John J.; O. Yonah, Zaipuna; Swai, Hulda S. (2019-11-01)
    This paper presents a review of the current state of agricultural and rural development (ARD) system frameworks, focusing on their capabilities and limitations to support farming-as-a-business via benchmarking (FAABB). ...
  • Hussain, Shaik Mazhar; Yusof, Kamaludin Mohamed; Hussain, Shaik Ashfaq; Eberechukwu N, Paulson (2019-01-01)
    Internet of Vehicles (IoV) is the new era of Internet of Things that interfaces the vehicles to the things through various communication modules to send and receive the data. In-spite of several benefits, IoV faces many ...
  • Mehenni, Tahar (2019-07-01)
    Data mining approaches performed recently use data coming from a single table and are not adapted to multiple tables. Moreover, computer network expansion and data sources diversity require new data mining systems handling ...
  • Ahmad, Ishrat; Bakht, Humayun (2019-01-01)
    Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security ...
  • QURESHI, Shaima (2019-05-01)
    The movement of a mobile device is likely during its communication with other mobile or stationary nodes. This movement results in what is known as the mobility problem. The general mobility problem has been addressed by ...
  • Salah Uddin, Mohammad (2019-03-01)
    This paper focuses on a smart toll collection (STCS) system based on non-contact BLE (Bluetooth low energy) technology specially designed for Bangladesh. A lots of river bridges, flyovers and Asian highways passes all over ...

All Journals


Advanced Search

Browse

Administrator Account