Browsing Volume 08 by Title

Sort by: Order: Results:

  • Moujahdi, Chouaib; Assad, Noureddine (2019-09-01)
    The inability of airports to absorb the increasing numbers of passengers year after year, makes the use of egates and face recognition terminals a promising solution to enhance the quality of service and security. Thus, ...
  • Sarker, Kamal Uddin; Deraman, Aziz Bin; Hasan, Raza; Abbas, Ali (2019-05-01)
    A common inward research area big data is being introduced due to the rapidly increasing of information systems in all social and business organizations. The global connectivity in the virtual environment become smarter ...
  • Al-Awad, Nasir Ahmed (2019-01-01)
    Multivariable framework includes in excess of one control loop, these loops communicate with each other, in such a way, to the point that solitary information influences its own output as well as influences different process ...
  • Jamel, Thamer M. (2019-07-01)
    To the best of my knowledge, the concept of the Fast Euclidean Direction Search (FEDS) for the wireless communication systems has not been fully exploited and only a few researchers who are working on this topic. This paper ...
  • Maoudj, Rabah; Medeiros, Juan; Terré, Michel (2019-09-01)
    In this paper, we compare different order of statistical moments to blindly estimate the propagation channel in an OFDM based wireless network. We first derive the theoretical expression of the channel estimation error and ...
  • Kolahi, Samad S; Sooran, Ahmad Khalid; Mazhar Ullah Khan, Muhammad; Nasim, Mohammed Faroq (2019-09-01)
    In this paper, the performance of IEEE 802.11ac wireless LAN using IPv4, IPv6, TCP, UDP, peer-peer, and client-server networks is investigated while implementing WPA2 security. The latest operating systems are used in the ...
  • Abdulhameed, Ahmed Faeq; Ahmed, Rana Ejaz (2019-11-01)
    A datacenter provides the core computing and storage elements for cloud computing paradigm. The Datacenter network (DCN) topology defines the structure in which servers and the networking devices are interconnected within ...
  • Hammad, Mustafa; Alqaddoumi, Abdulla; Al-Obaidy, Hadeel (2019-09-01)
    Software defect prediction is one of the most important task during the development of software systems in order to save developers’ time and effort. Discovering defects in an early stage of software development will allow ...
  • Al-Sultan, Muthana R.; Ameen, Siddeeq Y.; Abduallah, Wafaa M. (2019-09-01)
    Great efforts made to detect secret hidden information within digital files. Unfortunately, these efforts are consuming large amount of time and may fail if the hidden information encrypted. Therefore, destruction of such ...
  • AL-Allaf, Ahmad F.; A. Jabbar, A. I. (2019-01-01)
    The continued demand for improved quality of service for the Internet network is an incentive to find new methods and means to reduce the impact of congestion on the network. The Random Early Detection (RED) algorithm is ...
  • J, Jaisooraj; Kumar, D Madhu; Ghosh, Aindrila (2019-11-01)
    Ever since Internet of Things (IoT) has become a reality, fresh challenges have been propping up in a day-to-day manner for keeping the paradigm robust. As an IoT enabling technology, Low Power Lossy Networks (LLNs) play ...
  • Kyaruzi, John J.; O. Yonah, Zaipuna; Swai, Hulda S. (2019-11-01)
    This paper presents a review of the current state of agricultural and rural development (ARD) system frameworks, focusing on their capabilities and limitations to support farming-as-a-business via benchmarking (FAABB). ...
  • Hussain, Shaik Mazhar; Yusof, Kamaludin Mohamed; Hussain, Shaik Ashfaq; Eberechukwu N, Paulson (2019-01-01)
    Internet of Vehicles (IoV) is the new era of Internet of Things that interfaces the vehicles to the things through various communication modules to send and receive the data. In-spite of several benefits, IoV faces many ...
  • Mehenni, Tahar (2019-07-01)
    Data mining approaches performed recently use data coming from a single table and are not adapted to multiple tables. Moreover, computer network expansion and data sources diversity require new data mining systems handling ...
  • Ahmad, Ishrat; Bakht, Humayun (2019-01-01)
    Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security ...
  • QURESHI, Shaima (2019-05-01)
    The movement of a mobile device is likely during its communication with other mobile or stationary nodes. This movement results in what is known as the mobility problem. The general mobility problem has been addressed by ...
  • Salah Uddin, Mohammad (2019-03-01)
    This paper focuses on a smart toll collection (STCS) system based on non-contact BLE (Bluetooth low energy) technology specially designed for Bangladesh. A lots of river bridges, flyovers and Asian highways passes all over ...
  • Kumar, Pradeep (2019-11-01)
    Optimization is a complex process whose success depends on the formulation of the objective function (OF) and the selection of parameters in the optimization algorithm. This paper presents a statistical approach to select ...
  • K N, Ranjit; K S, Raghunandan; C, Naveen; H K, Chethan; C, Sunil (2019-11-01)
    In the real word scenario, automation of digital system plays a vital role, especially in the field of agriculture which needs a good automated system for classification of different fruits as it consumes customer’s time ...
  • Mohamad, Auday A.H.; Jumaa, Noor Kareem; Majeed, Sameer Hameed (2019-01-01)
    The Internet of Things (IoT) is a community of smart things that is a combination of sensors with network technology, cloud computing, and many data concepts. Presently, the IoT is applied in many fields, and one of the ...

All Journals


Advanced Search

Browse

Administrator Account