Search
Now showing items 11-20 of 20
Modeling of the exhaust box assembly workshop using neural networks
(
IEEE
, 2008 , Conference Paper)
The paper investigates the use of artificial neural networks in modeling and control of manufacturing systems. This approach models the various elements of a manufacturing system by the form of neural networks. The modeling ...
Writer identification using edge-based directional probability distribution features for Arabic words
(
IEEE
, 2008 , Conference Paper)
A system for writer identification based on Arabic handwritten words was built. First a database of words was gathered and used as a test base. Then, features vectors were extracted from writers' word images. Prior to ...
Forensic handwritten document management system
(
IEEE
, 2008 , Conference Paper)
[No abstract available]
Writer identification of arabic handwriting documents using grapheme features
(
IEEE
, 2008 , Conference Paper)
[No abstract available]
Digital government service machine DGSM
(
IEEE
, 2008 , Conference Paper)
The rapid improvement in latest technologies motivates individuals to progress in their societies. Fast and worthy can be significant titles for the demands of this modern life. And because of technology improvements, there ...
Efficient forward error correction for reliable transmission in packet networks
(
dblp computer science bibliography
, 2008 , Conference Paper)
This paper proposes an approach that utilizes a new forward error correction mechanism for reconstructing lost or corrupted packets sent over a Network. Instead of retransmissions of lost or corrupted packets, the new ...
Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF
(
Science Publications
, 2008 , Article)
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Text summarization based on conceptual data classification
(
IGI Global
, 2008 , Book chapter)
In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...