International Arab Journal of Information Technology

Displaying 1-31 of 31 results

  • White Papers // May 2015

    Novel Approaches for Scheduling Task Graphs in Heterogeneous Distributed Computing Environment

    Distributed heterogeneous computing environment comprises of diverse set of interconnected resources that are capable of performing computationally complex tasks efficiently. In order to exploit the high performance of such a system, the task scheduling problem demands for the efficient mapping of the tasks. Because of its fundamental importance, the problem...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2015

    A Hierarchical Approach to Improve Job Scheduling and Data Replication in Data Grid

    In dynamic environment of data grid effective job scheduling methods consider location of required data in dispatching jobs to resources. Also, job scheduling methods are combined with data replication mechanisms to reduce remote data access as well as save network bandwidth. In this paper, the authors combine job scheduling method...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2015

    Combination of Feature Selection and Optimized Fuzzy Apriori Rules: The Case of Credit Scoring

    Credit scoring is an important topic and banks collect different data from their loan applicants to make appropriate and correct decisions. Rule bases are favorite in credit decision making because of their ability to explicitly distinguish between good and bad applicants. This paper uses four feature selection approaches as features...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2015

    A Fuzzy Based Scheme for Sanitizing Sensitive Sequential Patterns

    The rapid advances in technology have led to generating and analyzing huge amounts of data in databases. The examples of such kind of data are bank records, web logs, cell phone records and network traffic records. This has raised a new challenge for people i.e., to transform this data into...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    On Static Scheduling of Tasks in Real Time Multiprocessor Systems: An Improved GA-Based Approach

    Task execution Deadline Time (DL) in real-time systems is a critical constraint. Every task should have a Maximum Computational Time (MCT) that is needed before reaching a given DL time. Scheduling jobs in real-time systems is thus a nondeterministic polynomial NP problem. Three algorithms can be found in literature to...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    Synthesizing Global Negative Association Rules in Multi-Database Mining

    Association rule mining has been widely adopted by data mining community for discovering relationship among item-sets that co-occur together frequently. Besides positive association rules, negative association rule mining, which find out negation relationships of frequent item-sets are also important. The importance of negative association rule mining is accounted in customer-driven...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    XML Access Control: Mapping XACML Policies to Relational Database Tables

    Although eXtensible Access Control Markup Language (XACML) is recognized as a precise and a complete policy description language, the structure of the current XACML policy is complex. Hence, users need to understand XACML well and write down the securing policy all by hand, which make it difficult to master and...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    Developing an Appliance Real Time Control in Heterogeneous Operating Systems

    In this paper, the authors present a proposed system for controlling the real time application (video conferencing) in heterogeneous operating systems dealing with transferring streams of audio-video data with real time constraints among heterogeneous operating systems. This system provides integration between multimedia technologies as well as real time technologies via...

    Provided By International Arab Journal of Information Technology

  • White Papers // Sep 2014

    Mining Frequent User Query Patterns from XML Query Streams

    An XML (eXtensible Markup Language) query stream is a massive and unbounded sequence of queries that are continuously generated at a fast speed from users over the Internet. Compared with traditional approaches of mining frequent user query patterns in static XML query databases, pattern mining in XML query streams is...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2014

    Association Rule Mining and Load Balancing Strategy in Grid Systems

    The parallel and distributed systems represent one of the important solutions proposed to ameliorate the performance of the sequential association rule mining algorithms. However, parallelization and distribution process is not trivial and still facing many problems of synchronization, communication and workload balancing. The authors' paper is limited to the workload...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2014

    Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

    The Elliptic Curve Cryptosystem shortly called as (ECC) is one of the asymmetric key cryptosystems, which provides a high security for wireless applications compared to other asymmetric key cryptosystem. The implementation of this algorithm over prime field Zp has a set of point operations, which are point addition, point subtraction,...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    Identifying Product Features from Customer Reviews Using Hybrid Patterns

    In this paper, the authors have addressed the problem of automatic identification of product features from customer reviews. Costumers, retailers and manufacturers are popularly using customer reviews on websites for product reputation and sales forecasting. Opinion mining application has been potentially employed to summarize the huge collection of customer reviews...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    A Software Tool for Automatic Generation of Neural Hardware

    Natural neural networks greatly benefit from their parallel structure that makes them fault tolerant and fast in processing the inputs. Their artificial counterpart, artificial neural networks, proved difficult to implement in hardware where they could have a similar structure. Although, many circuits have been developed, they usually present problems regarding...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    Reduct Algorithm Based Execution Times Prediction in Knowledge Discovery Cloud Computing Environment

    Cloud environment is a complex system which includes the matching between computation resources and data resources. Efficient predicting services execution time is a key component of successful tasks scheduling and resource allocation in cloud computing environment. In this paper, the authors propose a framework for supporting knowledge discovery application running...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2014

    An Efficient Traffic Forecasting System Based on Spatial Data and Decision Trees

    The rapid proliferation of Global Position Service (GPS) devices and mounting number of traffic monitoring systems employed by municipalities have opened the door for advanced traffic control and personalized route planning. Most state of the art traffic management and information systems focus on data analysis and very little has been...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2014

    PCFA: Mining of Projected Clusters in High Dimensional Data Using Modified FCM Algorithm

    Data deals with the specific problem of partitioning a group of objects into a fixed number of subsets, so that the similarity of the objects in each subset is increased and the similarity across subsets is reduced. Several algorithms have been proposed in the literature for clustering, where k-means clustering...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2014

    A Critical Comparison for Data Sharing Approaches

    Integrating and accessing data stored in autonomous, distributed and heterogeneous data sources have been recognized as of a great importance to small and huge-scale businesses. Enhancing the accessibility and the reusability of these data entail the development of new approaches for data sharing. These approaches should satisfy a minimal set...

    Provided By International Arab Journal of Information Technology

  • White Papers // Sep 2013

    Collaborative and Integrated Network and Systems Management: Management using Grid Technologies

    Current Internet trends are moving towards decentralization of computation, storage and resources. Supporting network management for such a vast and a highly complex system has become a challenging issue. A management platform has to sufficiently support decentralization, collaboration and integration. Grid technologies have the potential to serve as management architecture...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2013

    Using Model Driven Architecture to Develop Multi-Agent Systems

    In recent years, Multi-Agent Systems (MASs) had started gaining widespread acceptance in the field of information technology. This prompted many researchers to attempt to find ways to facilitate their development process, which typically includes building different models. The transformation of system specifications into models and their subsequent translation into code...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2013

    A Framework of Summarizing XML Documents with Schemas

    eXtensible Markup Language (XML) has become one of the de facto standards of data exchange and representation in many applications. An XML document is usually too complex and large to understand and use for a human being. A summarized XML document of the original document is useful in such cases....

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2012

    Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical Embedded Systems

    The faults caused by ambient cosmic radiation are a growing threat to the dependability of advanced embedded computer systems. Maintaining availability and consistency in distributed applications is one of the fundamental attribute in building complex critical systems. To achieve this, a key factor is the ability to detect the fault...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Investigation of Design Level Class Cohesion Metrics

    Design level class cohesion metrics are based on the assumption that if all the methods of a class have access to similar parameter types, then they all process closely related information. A class with a large number of parameter types common in its methods is more cohesive than a class...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Robust Segmentation Approach for Noisy Medical Images Using Fuzzy Clustering With Spatial Probability

    Image segmentation plays a major role in medical imaging applications. During last decades, developing robust and efficient algorithms for medical image segmentation has been a demanding area of growing research interest. The renowned unsupervised clustering method, Fuzzy C-Means (FCM) algorithm is extensively used in medical image segmentation. Despite its pervasive...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    CFS: A New Dynamic Replication Strategy for Data Grids

    Data grids are currently proposed solutions to large scale data management problems including efficient file transfer and replication. Large amounts of data and the world-wide distribution of data stores contribute to the complexity of the data management challenge. Recent architecture proposals and prototypes deal with dynamic replication strategies for a...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Routing for Wireless Mesh Networks With Multiple Constraints Using Fuzzy Logic

    Since, wireless mesh networks are ad-hoc in nature, many routing protocols used for ad-hoc networks like AODV are also used for wireless mesh networks by considering only the shortest route to destination. Since, data transfer in wireless mesh networks is to and from the AP, these protocols lead to congested...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Framework for Distributed Pattern Matching Based on Multithreading

    Despite of the dramatic evolution in high performance computing, the people still need to devise new efficient algorithms to speed up the search process. In this paper, the authors present a framework for a data-distributed and multithreaded string matching approach in a homogeneous distributed environment. The main idea of this...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs

    Due to the availability of multiple sensing units on a single radio board of the modern sensor motes, some sensor networks need to handle heterogeneous traffic within the same application. This diverse traffic could have different priorities in terms of transmission rate, required bandwidth, packet loss, etc. Because of the...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Intelligent Approach of Sniffer Detection

    ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature...

    Provided By International Arab Journal of Information Technology

  • White Papers // Oct 2011

    Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter

    Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2011

    Effect of Weight Assignment in Data Fusion Based Information Retrieval

    Variation in performances of an Information Retrieval system, which merges results from a number of retrieval schemes possessing equal and unequal weights, is studied in this paper. Weight of the retrieval schemes for a particular document is derived from the relevance scores of that corresponding document. Since, the relevance scores...

    Provided By International Arab Journal of Information Technology

  • White Papers // Apr 2010

    A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs

    A test procedure for testing mainly the boundary scan cells and testing partially the test access port controller in programmable logic devices and field programmable gate array devices is suggested. The test procedure involves; the configuration of programmable logic devices or field programmable gate array device, the application of test...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Investigation of Design Level Class Cohesion Metrics

    Design level class cohesion metrics are based on the assumption that if all the methods of a class have access to similar parameter types, then they all process closely related information. A class with a large number of parameter types common in its methods is more cohesive than a class...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Robust Segmentation Approach for Noisy Medical Images Using Fuzzy Clustering With Spatial Probability

    Image segmentation plays a major role in medical imaging applications. During last decades, developing robust and efficient algorithms for medical image segmentation has been a demanding area of growing research interest. The renowned unsupervised clustering method, Fuzzy C-Means (FCM) algorithm is extensively used in medical image segmentation. Despite its pervasive...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    CFS: A New Dynamic Replication Strategy for Data Grids

    Data grids are currently proposed solutions to large scale data management problems including efficient file transfer and replication. Large amounts of data and the world-wide distribution of data stores contribute to the complexity of the data management challenge. Recent architecture proposals and prototypes deal with dynamic replication strategies for a...

    Provided By International Arab Journal of Information Technology

  • White Papers // Oct 2011

    Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter

    Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Routing for Wireless Mesh Networks With Multiple Constraints Using Fuzzy Logic

    Since, wireless mesh networks are ad-hoc in nature, many routing protocols used for ad-hoc networks like AODV are also used for wireless mesh networks by considering only the shortest route to destination. Since, data transfer in wireless mesh networks is to and from the AP, these protocols lead to congested...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Framework for Distributed Pattern Matching Based on Multithreading

    Despite of the dramatic evolution in high performance computing, the people still need to devise new efficient algorithms to speed up the search process. In this paper, the authors present a framework for a data-distributed and multithreaded string matching approach in a homogeneous distributed environment. The main idea of this...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs

    Due to the availability of multiple sensing units on a single radio board of the modern sensor motes, some sensor networks need to handle heterogeneous traffic within the same application. This diverse traffic could have different priorities in terms of transmission rate, required bandwidth, packet loss, etc. Because of the...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Intelligent Approach of Sniffer Detection

    ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2011

    Effect of Weight Assignment in Data Fusion Based Information Retrieval

    Variation in performances of an Information Retrieval system, which merges results from a number of retrieval schemes possessing equal and unequal weights, is studied in this paper. Weight of the retrieval schemes for a particular document is derived from the relevance scores of that corresponding document. Since, the relevance scores...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2015

    Combination of Feature Selection and Optimized Fuzzy Apriori Rules: The Case of Credit Scoring

    Credit scoring is an important topic and banks collect different data from their loan applicants to make appropriate and correct decisions. Rule bases are favorite in credit decision making because of their ability to explicitly distinguish between good and bad applicants. This paper uses four feature selection approaches as features...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2014

    Association Rule Mining and Load Balancing Strategy in Grid Systems

    The parallel and distributed systems represent one of the important solutions proposed to ameliorate the performance of the sequential association rule mining algorithms. However, parallelization and distribution process is not trivial and still facing many problems of synchronization, communication and workload balancing. The authors' paper is limited to the workload...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2014

    An Efficient Traffic Forecasting System Based on Spatial Data and Decision Trees

    The rapid proliferation of Global Position Service (GPS) devices and mounting number of traffic monitoring systems employed by municipalities have opened the door for advanced traffic control and personalized route planning. Most state of the art traffic management and information systems focus on data analysis and very little has been...

    Provided By International Arab Journal of Information Technology

  • White Papers // Mar 2014

    PCFA: Mining of Projected Clusters in High Dimensional Data Using Modified FCM Algorithm

    Data deals with the specific problem of partitioning a group of objects into a fixed number of subsets, so that the similarity of the objects in each subset is increased and the similarity across subsets is reduced. Several algorithms have been proposed in the literature for clustering, where k-means clustering...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    Identifying Product Features from Customer Reviews Using Hybrid Patterns

    In this paper, the authors have addressed the problem of automatic identification of product features from customer reviews. Costumers, retailers and manufacturers are popularly using customer reviews on websites for product reputation and sales forecasting. Opinion mining application has been potentially employed to summarize the huge collection of customer reviews...

    Provided By International Arab Journal of Information Technology

  • White Papers // Apr 2010

    A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs

    A test procedure for testing mainly the boundary scan cells and testing partially the test access port controller in programmable logic devices and field programmable gate array devices is suggested. The test procedure involves; the configuration of programmable logic devices or field programmable gate array device, the application of test...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2014

    A Critical Comparison for Data Sharing Approaches

    Integrating and accessing data stored in autonomous, distributed and heterogeneous data sources have been recognized as of a great importance to small and huge-scale businesses. Enhancing the accessibility and the reusability of these data entail the development of new approaches for data sharing. These approaches should satisfy a minimal set...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    A Software Tool for Automatic Generation of Neural Hardware

    Natural neural networks greatly benefit from their parallel structure that makes them fault tolerant and fast in processing the inputs. Their artificial counterpart, artificial neural networks, proved difficult to implement in hardware where they could have a similar structure. Although, many circuits have been developed, they usually present problems regarding...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2014

    Reduct Algorithm Based Execution Times Prediction in Knowledge Discovery Cloud Computing Environment

    Cloud environment is a complex system which includes the matching between computation resources and data resources. Efficient predicting services execution time is a key component of successful tasks scheduling and resource allocation in cloud computing environment. In this paper, the authors propose a framework for supporting knowledge discovery application running...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2015

    A Fuzzy Based Scheme for Sanitizing Sensitive Sequential Patterns

    The rapid advances in technology have led to generating and analyzing huge amounts of data in databases. The examples of such kind of data are bank records, web logs, cell phone records and network traffic records. This has raised a new challenge for people i.e., to transform this data into...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2015

    Novel Approaches for Scheduling Task Graphs in Heterogeneous Distributed Computing Environment

    Distributed heterogeneous computing environment comprises of diverse set of interconnected resources that are capable of performing computationally complex tasks efficiently. In order to exploit the high performance of such a system, the task scheduling problem demands for the efficient mapping of the tasks. Because of its fundamental importance, the problem...

    Provided By International Arab Journal of Information Technology

  • White Papers // May 2015

    A Hierarchical Approach to Improve Job Scheduling and Data Replication in Data Grid

    In dynamic environment of data grid effective job scheduling methods consider location of required data in dispatching jobs to resources. Also, job scheduling methods are combined with data replication mechanisms to reduce remote data access as well as save network bandwidth. In this paper, the authors combine job scheduling method...

    Provided By International Arab Journal of Information Technology

  • White Papers // Sep 2014

    Mining Frequent User Query Patterns from XML Query Streams

    An XML (eXtensible Markup Language) query stream is a massive and unbounded sequence of queries that are continuously generated at a fast speed from users over the Internet. Compared with traditional approaches of mining frequent user query patterns in static XML query databases, pattern mining in XML query streams is...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    On Static Scheduling of Tasks in Real Time Multiprocessor Systems: An Improved GA-Based Approach

    Task execution Deadline Time (DL) in real-time systems is a critical constraint. Every task should have a Maximum Computational Time (MCT) that is needed before reaching a given DL time. Scheduling jobs in real-time systems is thus a nondeterministic polynomial NP problem. Three algorithms can be found in literature to...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    Synthesizing Global Negative Association Rules in Multi-Database Mining

    Association rule mining has been widely adopted by data mining community for discovering relationship among item-sets that co-occur together frequently. Besides positive association rules, negative association rule mining, which find out negation relationships of frequent item-sets are also important. The importance of negative association rule mining is accounted in customer-driven...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    XML Access Control: Mapping XACML Policies to Relational Database Tables

    Although eXtensible Access Control Markup Language (XACML) is recognized as a precise and a complete policy description language, the structure of the current XACML policy is complex. Hence, users need to understand XACML well and write down the securing policy all by hand, which make it difficult to master and...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2013

    A Framework of Summarizing XML Documents with Schemas

    eXtensible Markup Language (XML) has become one of the de facto standards of data exchange and representation in many applications. An XML document is usually too complex and large to understand and use for a human being. A summarized XML document of the original document is useful in such cases....

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2013

    Using Model Driven Architecture to Develop Multi-Agent Systems

    In recent years, Multi-Agent Systems (MASs) had started gaining widespread acceptance in the field of information technology. This prompted many researchers to attempt to find ways to facilitate their development process, which typically includes building different models. The transformation of system specifications into models and their subsequent translation into code...

    Provided By International Arab Journal of Information Technology

  • White Papers // Nov 2014

    Developing an Appliance Real Time Control in Heterogeneous Operating Systems

    In this paper, the authors present a proposed system for controlling the real time application (video conferencing) in heterogeneous operating systems dealing with transferring streams of audio-video data with real time constraints among heterogeneous operating systems. This system provides integration between multimedia technologies as well as real time technologies via...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2014

    Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

    The Elliptic Curve Cryptosystem shortly called as (ECC) is one of the asymmetric key cryptosystems, which provides a high security for wireless applications compared to other asymmetric key cryptosystem. The implementation of this algorithm over prime field Zp has a set of point operations, which are point addition, point subtraction,...

    Provided By International Arab Journal of Information Technology

  • White Papers // Sep 2013

    Collaborative and Integrated Network and Systems Management: Management using Grid Technologies

    Current Internet trends are moving towards decentralization of computation, storage and resources. Supporting network management for such a vast and a highly complex system has become a challenging issue. A management platform has to sufficiently support decentralization, collaboration and integration. Grid technologies have the potential to serve as management architecture...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2012

    Verification of Cooperative Transient Fault Diagnosis and Recovery in Critical Embedded Systems

    The faults caused by ambient cosmic radiation are a growing threat to the dependability of advanced embedded computer systems. Maintaining availability and consistency in distributed applications is one of the fundamental attribute in building complex critical systems. To achieve this, a key factor is the ability to detect the fault...

    Provided By International Arab Journal of Information Technology