International Arab Journal of Information Technology

Displaying 1-9 of 9 results

  • White Papers // Jan 2012

    Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs

    Due to the availability of multiple sensing units on a single radio board of the modern sensor motes, some sensor networks need to handle heterogeneous traffic within the same application. This diverse traffic could have different priorities in terms of transmission rate, required bandwidth, packet loss, etc. Because of the...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Investigation of Design Level Class Cohesion Metrics

    Design level class cohesion metrics are based on the assumption that if all the methods of a class have access to similar parameter types, then they all process closely related information. A class with a large number of parameter types common in its methods is more cohesive than a class...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Robust Segmentation Approach for Noisy Medical Images Using Fuzzy Clustering With Spatial Probability

    Image segmentation plays a major role in medical imaging applications. During last decades, developing robust and efficient algorithms for medical image segmentation has been a demanding area of growing research interest. The renowned unsupervised clustering method, Fuzzy C-Means (FCM) algorithm is extensively used in medical image segmentation. Despite its pervasive...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    CFS: A New Dynamic Replication Strategy for Data Grids

    Data grids are currently proposed solutions to large scale data management problems including efficient file transfer and replication. Large amounts of data and the world-wide distribution of data stores contribute to the complexity of the data management challenge. Recent architecture proposals and prototypes deal with dynamic replication strategies for a...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Intelligent Approach of Sniffer Detection

    ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Routing for Wireless Mesh Networks With Multiple Constraints Using Fuzzy Logic

    Since, wireless mesh networks are ad-hoc in nature, many routing protocols used for ad-hoc networks like AODV are also used for wireless mesh networks by considering only the shortest route to destination. Since, data transfer in wireless mesh networks is to and from the AP, these protocols lead to congested...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Framework for Distributed Pattern Matching Based on Multithreading

    Despite of the dramatic evolution in high performance computing, the people still need to devise new efficient algorithms to speed up the search process. In this paper, the authors present a framework for a data-distributed and multithreaded string matching approach in a homogeneous distributed environment. The main idea of this...

    Provided By International Arab Journal of Information Technology

  • White Papers // Oct 2011

    Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter

    Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2011

    Effect of Weight Assignment in Data Fusion Based Information Retrieval

    Variation in performances of an Information Retrieval system, which merges results from a number of retrieval schemes possessing equal and unequal weights, is studied in this paper. Weight of the retrieval schemes for a particular document is derived from the relevance scores of that corresponding document. Since, the relevance scores...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Prioritized Heterogeneous Traffic-Oriented Congestion Control Protocol for WSNs

    Due to the availability of multiple sensing units on a single radio board of the modern sensor motes, some sensor networks need to handle heterogeneous traffic within the same application. This diverse traffic could have different priorities in terms of transmission rate, required bandwidth, packet loss, etc. Because of the...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Investigation of Design Level Class Cohesion Metrics

    Design level class cohesion metrics are based on the assumption that if all the methods of a class have access to similar parameter types, then they all process closely related information. A class with a large number of parameter types common in its methods is more cohesive than a class...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Robust Segmentation Approach for Noisy Medical Images Using Fuzzy Clustering With Spatial Probability

    Image segmentation plays a major role in medical imaging applications. During last decades, developing robust and efficient algorithms for medical image segmentation has been a demanding area of growing research interest. The renowned unsupervised clustering method, Fuzzy C-Means (FCM) algorithm is extensively used in medical image segmentation. Despite its pervasive...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    CFS: A New Dynamic Replication Strategy for Data Grids

    Data grids are currently proposed solutions to large scale data management problems including efficient file transfer and replication. Large amounts of data and the world-wide distribution of data stores contribute to the complexity of the data management challenge. Recent architecture proposals and prototypes deal with dynamic replication strategies for a...

    Provided By International Arab Journal of Information Technology

  • White Papers // Oct 2011

    Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter

    Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    An Intelligent Approach of Sniffer Detection

    ARP cache poisoning and putting host Network Interface Card (NIC) in promiscuous mode are ways of sniffer attacks. ARP cache poisoning attack is effective in an environment which is not broadcast in nature (like switch LAN environment) and other attack is effective in an environment which is broadcast in nature...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jul 2011

    Effect of Weight Assignment in Data Fusion Based Information Retrieval

    Variation in performances of an Information Retrieval system, which merges results from a number of retrieval schemes possessing equal and unequal weights, is studied in this paper. Weight of the retrieval schemes for a particular document is derived from the relevance scores of that corresponding document. Since, the relevance scores...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    Routing for Wireless Mesh Networks With Multiple Constraints Using Fuzzy Logic

    Since, wireless mesh networks are ad-hoc in nature, many routing protocols used for ad-hoc networks like AODV are also used for wireless mesh networks by considering only the shortest route to destination. Since, data transfer in wireless mesh networks is to and from the AP, these protocols lead to congested...

    Provided By International Arab Journal of Information Technology

  • White Papers // Jan 2012

    A Framework for Distributed Pattern Matching Based on Multithreading

    Despite of the dramatic evolution in high performance computing, the people still need to devise new efficient algorithms to speed up the search process. In this paper, the authors present a framework for a data-distributed and multithreaded string matching approach in a homogeneous distributed environment. The main idea of this...

    Provided By International Arab Journal of Information Technology