Now showing items 1-20 of 1989

    • Performance and stability analysis of multilevel data structures with deferred reorganization 

      Chen, Ing-Ray; Banawan, Sayed A. ( IEEE , 2002 , Article)
      We develop a methodology for analyzing the performance and stability of a server that maintains a multilevel data structure to service a set of access operations for (key, value) records. A subset of the operations executed ...
    • An approach for constructing complex discriminating surfaces based on Bayesian interference of the maximum entropy 

      El Chakik, Fadi; Shahine, Ahmad; Jaam, Jihad; Hasnah, Ahmad ( Elsevier Inc. , 2003 , Article)
      In this paper we present a comprehensive Maximum Entropy (MaxEnt) procedure for the classification tasks. This MaxEnt is applied successfully to the problem of estimating the probability distribution function (pdf) of a ...
    • A multi-level conceptual data reduction approach based on the Lukasiewicz implication 

      Elloumi, Samir; Jaam, Jihad; Hasnah, Ahmad; Jaoua, Ali; Nafkha, Ibtissem ( Elsevier Science Inc , 2003 , Article)
      Starting from fuzzy binary data represented as tables in the fuzzy relational database, in this paper, we use fuzzy formal concept analysis to reduce the tables size to only keep the minimal rows in each table, without ...
    • Non-linear simulation of controller for longitudinal control augmentation system of F-16 using numerical approach 

      Rachman, Endri; Jaam, Jihad M.; Hasnah, Ahmad ( Elsevier Inc , 2003 , Article)
      The non-linear simulation of controller for automatic flight control system is an essential part of the complete control design process. After using the linear approach in the design and simulation of the controller (control ...
    • Preface 

      Jaoua, Ali; Jaam, Jihad Mohamad; Hasnah, Ahmad; Akbar, Abdulhamid Sadiq ( Elsevier , 2003 , Article)
      In recent years the involvement of Information Technology in business, governments, and education has increased dramatically. More and more research works have been conducted in different areas of Information Technology such ...
    • Conceptual Data Classification: Application for Knowledge Extraction 

      Hasnah, Ahmed; Jaoua, Ali Mohamed; Jaam, Jihad ( John Wiley & Sons, Ltd , 2005 , Book chapter)
    • A new approach of clustering based machine-learning algorithm 

      Al-Omary, Alauddin Yousif; Jamil, Mohammad Shahid ( Elsevier B.V. , 2005 , Article)
      Machine-learning research is to study and apply the computer modeling of learning processes in their multiple manifestations, which facilitate the development of intelligent system. In this paper, we have introduced a ...
    • Recognition of off-line handwritten Arabic words using neural network 

      Al-Maadeed, Somaya ( IEEE , 2006 , Conference Paper)
      Neural network (NN) have been used with some success in recognizing printed Arabic words. In this paper, a complete scheme for unconstrained Arabic handwritten word recognition based on a Neural network is proposed and ...
    • MASACAD: a multiagent based approach to information customization 

      Hamdi, Mohamed Salah ( IEEE , 2006 , Article)
      MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ...
    • MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students 

      Hamdi, Mohamed Salah ( Elsevier B.V. , 2006 , Article)
      The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ...
    • Performance Evaluation of Network-Parallel Data Storage 

      Malluhi, Q.; Zhi Lin; Malouhi, M. ( IEEE , 2006 , Conference Paper)
      This paper presents a unique storage architecture that utilizes the multiplicity of storage nodes in LAN and WAN network environments to achieve high reliability, high-performance, scalability, and cost effectiveness. The ...
    • MESP: A Modified IPSec for Secure Multicast Communication 

      Ali, Eman; El-Fouly, Tarek; Badr, Ahmed M. ( IEEE , 2006 , Article)
      We propose the multicast encryption security protocol MESP. It is driven form the IPSEC ESP. The specification of the protocol are discussed and applied the existing IPSEC ESP. We use the existing implementation of the ...
    • Using IPSec to Secure Multi-Level Data Classification in MLS Networks 

      Morsi, Wissam; El-Fouly, Tarek; Badr, Ahmed ( IEEE , 2006 , Conference Paper)
      In this paper we present a method of using IPsec to secure multi-level data classification in the MLS networks by using the data sensitivity. We will show how IPsec can be modified to be used in securing communication in ...
    • A new construction technique of a triangle-free 3-colored K16’s 

      Jaam, Jihad Mohamad ( Elsevier Inc , 2006 , Article)
      In this paper, we propose a new coloring technique of the edges of the complete graph on 16 vertices, K16, with three different colors, without producing any monochromatic triangle. This method is totally different from ...
    • Cooperative Conceptual Retrieval for Heterogeneous Information 

      Nafkha, Ibtissem; Jaoua, Ali ( IEEE , 2006 , Conference Paper)
      The potentials of formal concept analysis (FCA) for information retrieval have been highlighted by a number of research studies since its inception. With the advent of the Web along with the unprecedented amount of information ...
    • Wireless Networks 

      Samaka, Mohammed; Khan, Khaled M.D. ( John Wiley & Sons, Inc. , 2007 , Book chapter)
      Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks ...
    • Using an outcome-based approach to assess computing programs 

      Impagliazzo, John ( ACM New York, NY, USA , 2007 , Poster)
      In this poster, the author provides a pictorial demonstration of the elements associated with assessment and its relationship to the newly developed requirements by accrediting agencies in various countries. The presentation ...
    • Fuzzy Expert System for Defect Classification for Non-Destructive Evaluation of Petroleum Pipes 

      Qidwai, Uvais A.; Maqbool, Mohammed ( IEEE , 2007 , Conference Paper)
      In this paper, an expert system has been outlined to classify the defects in metallic petroleum pipelines using acoustic techniques with non-destructive evaluation (NDE) protocols, the proposed system maps the quantitative ...
    • Defect deconvolution using 3rd order statistics for Ultrasonic Nondestructive Testing 

      Qidwai, Uvais; Bettayeb, Maamar; Yamani, Ahmed ( IEEE , 2007 , Conference Paper)
      Ultrasonic nondestructive testing (NDT) is primarily based upon the detection and classification of a defect in the field of industrial materials. This information is useful in making administrative decisions in terms of ...
    • Fuzzy mapping of human heuristics for defect classification in gas pipelines using ultrasonic NDE 

      Qidwai, Uvais; Maqbool, Mohammed; Jamil, Mohammad Shahid ( IEEE , 2007 , Conference Paper)
      This paper presents a methodology for classifying the common defects in steel pipelines for transporting petroleum and gas. Usually, the nondestructive evaluation (NDE) experts in the industry judges the defect type by ...