Browsing Issue 05 by Title

Sort by: Order: Results:

  • Saudi, Azali; Sulaiman, Jumat (2019-09-01)
    This paper presents the application of a two-stage Half-Sweep Arithmetic Mean (HSAM) iterative method to obtain the Harmonic functions to solve the path planning problem in a 2D indoor environment. Several path planning ...
  • Meftah, Souhail; Rachidi, Tajjeeddine; Assem, Nasser (2019-09-01)
    In this work, we apply a two stage anomaly-based network intrusion detection process using the UNSW-NB15 dataset. We use Recursive Feature Elimination and Random Forests among other techniques to select the best dataset ...
  • Moujahdi, Chouaib; Assad, Noureddine (2019-09-01)
    The inability of airports to absorb the increasing numbers of passengers year after year, makes the use of egates and face recognition terminals a promising solution to enhance the quality of service and security. Thus, ...
  • Maoudj, Rabah; Medeiros, Juan; Terré, Michel (2019-09-01)
    In this paper, we compare different order of statistical moments to blindly estimate the propagation channel in an OFDM based wireless network. We first derive the theoretical expression of the channel estimation error and ...
  • Kolahi, Samad S; Sooran, Ahmad Khalid; Mazhar Ullah Khan, Muhammad; Nasim, Mohammed Faroq (2019-09-01)
    In this paper, the performance of IEEE 802.11ac wireless LAN using IPv4, IPv6, TCP, UDP, peer-peer, and client-server networks is investigated while implementing WPA2 security. The latest operating systems are used in the ...
  • Hammad, Mustafa; Alqaddoumi, Abdulla; Al-Obaidy, Hadeel (2019-09-01)
    Software defect prediction is one of the most important task during the development of software systems in order to save developers’ time and effort. Discovering defects in an early stage of software development will allow ...
  • Al-Sultan, Muthana R.; Ameen, Siddeeq Y.; Abduallah, Wafaa M. (2019-09-01)
    Great efforts made to detect secret hidden information within digital files. Unfortunately, these efforts are consuming large amount of time and may fail if the hidden information encrypted. Therefore, destruction of such ...

All Journals


Advanced Search

Browse

Administrator Account