Browsing Volume 03 by Title

Sort by: Order: Results:

  • Khan, Salman A. (2014)
    Extremal optimization is an optimization technique that has been applied to a number of complex optimization problems. One such optimization problem is topology design of enterprise networks. The problem involves simultaneous ...
  • Charrada, Mohamed Aymen; Amara, Najoua Essoukri Ben (2014)
    In this paper, we give an overview on approaches for the graphic extraction, and especially for the image extraction from printed documents. We present also our contribution to this area operating on historical Arab ...
  • Chandio, Aftab Ahmed; Zhu, Dingju; Sodhro, Ali Hassan; Syed, Muhammad Umer (2014)
    As educational institutions and their departments rapidly increase, a communication between their end-users becomes more and more difficult in traditional online management systems (OMS). However, the end-users, i.e., ...
  • Sharabas, Khaled Elsayed Hassanin; Alzouebi, Khadeegha (2014)
    Psychologists have often emphasized the need to incorporate games into the school curriculum as a way of providing learners with opportunities to develop skills in all aspects of the curriculum. Accordingly, these games ...
  • Mundt, Thomas; Dähn, Andreas; Sass, Stephan (2014)
    Modern buildings are often equipped with universal bus systems. The purpose of these bus systems is to control the functions of houses such as lighting, climate control, and heating. In this paper we present a case study ...
  • Jamnejad, Iman; Heidarzadegan, Ali; Parvin, Hamid; Alinejad-Rokny, Hamid (2014)
    Software error detection is about finding and prediction software logical error before deliver it to customers by some of automatic approaches. Some of logical errors are hidden in source code and cannot be found simply ...
  • Hsieh, Hui-Ching; Chen, Yen-Chiu; Lin, He-Chih (2014)
    With the popularity of online shopping, Online to Offline (O2O) commerce is a newly business model between company and customers. Online to Offline (O2O) commerce means customers can order some services or products online, ...
  • Elhameed, Amaal S. Abd; A. Fahmy, Yasmeen; El-Soudani, Magdy S. (2014)
    To maintain network reliability and performance, it must be protected against two common problems; link and node failures. Network protection codes (NPC) were proposed to protect operational networks against these failures, ...
  • Zadehbagheri, Mahmoud; Ildarabad, Rahim; Nejad, Majid Baghaei (2014)
    Brushless DC Motors play a significant role in numerous applications. Power density and efficiency are two prominent factors associated with design of these motors. Three phase brushless DC motor is a synchronous permanent ...
  • Kaur, Inderpreet; Gupta, Neena (2014)
    A model of TDFA has been proposed based on simulation after considering all the major parameters like pump and signal power, without considering ASE. Through this analysis of TDFA the optimum value of pump power and the ...
  • Kandil, Magy; Gadallah, Ahmed; Tawfik, Faten; Kandil, Nema (2014)
    Ozone is one of the most effective pollutants in lower atmosphere. Concentration of ozone in atmosphere reveals its impact on plants, human and on other organic materials. Many techniques had been used in past to calculate ...
  • El-ghobashy, Ahmed N.; Attiya, Gamal M.; Kelash, Hamdy M. (2014)
    Semantic Web is an approach to facilitate communication by making the web suitable for computers. To enhance current Web, a semantic layer should be added to the web pages to enable computers understand them. Recently, ...
  • Thanh, Tran; Vu, Tran Hoang; Cuong, Nguyen Van; Nam, Pham Ngoc (2014)
    Intellectual Property (IP) core remote update via the Internet is an advantage of FPGA-based devices. Whereby the system designer or user can change or renew a part of his equipment. However, the problem of communication ...
  • Souad, Bekkouche; Mohamed, Faraoun Kame (2014)
    This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of ...
  • Andel, Todd R.; Barron, John W.; McDonald, J. Todd; Humphries, Jeffrey W. (2014)
    The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has been the focus of many side channel analysis (SCA) attacks in recent years. Current SCA attack countermeasures are static, ...
  • Ghadi, M. Jabbari; Gilani, S. Hakimi; Afrakhte, H.; Baghramian, A. (2014)
    Utilization ofwind power as one of renewable resources of energy has been growing quickly all over the world in the last decades. Wind power generation is significantly vacillating due to the wind speed alteration. Therefore, ...
  • Rodríguez, Demóstenes Zegarra; Rosa, Renata Lopes; Bressan, Graça (2014)
    Entertainment applications that work with images and videos processing use the Cluster computing to decrease their rendering time. A complexity level can be experimentally determined according to the time spent to render ...

All Journals


Advanced Search

Browse

Administrator Account