Mentouri University

Displaying 1-10 of 10 results

  • White Papers // May 2012

    New Virtual Coordinate System for Improved Routing Efficiency in Sensor Network

    Geographic routing has attracted attention since it is a memory less and scalable approach. Two types of geographic routing protocols are proposed in the literature; those relying on exact position information using GPS, and other algorithms using Virtual Coordinate System (VCS). In recently proposed VCS, the unique identity cannot be...

    Provided By Mentouri University

  • White Papers // Jul 2011

    A Contract-Based Language to Specify Design Components

    For component-based software development to be successful in organizations, the software developers must give close attention to the design of components as independent abstractions with well-specified behaviors. Without well-specified behaviors the possibility to distribute and acquire software components will be limited. In this paper, the authors present a contract-based approach...

    Provided By Mentouri University

  • White Papers // Apr 2011

    A Binary Based Approach For Generating Association Rules

    Advanced database application areas, such as computer aided design, office automation, digital libraries, data-mining, hypertext and multimedia systems, need to handle complex data structures with set-valued attributes. These information systems contain implicit data that will be necessary to extract and exploit, by using data mining techniques. To exploit the data...

    Provided By Mentouri University

  • White Papers // Feb 2011

    An Agent Based Architecture (usingplanning) for Dynamic and Semantic Web Services Composition in an EBXML Context

    The process-based semantic composition of Web Services is gaining a considerable momentum as an approach for the effective integration of distributed, heterogeneous, and autonomous applications. To compose Web Services semantically, the authors need an ontology. There are several ways of inserting semantics in Web Services. One of them consists of...

    Provided By Mentouri University

  • White Papers // Dec 2010

    Conceptual Method for Flexible Business Process Modeling

    Now-a-days, the pace of business change is such that, increasingly, new functionality has to be realized and reliably installed in a matter of days, or even hours. Consequently, more and more business processes are prone to a continuous change. The objective of the research in progress is to use the...

    Provided By Mentouri University

  • White Papers // Nov 2009

    A Combination Approach of Gaussian Mixture Models and Support Vector Machines for Speaker Identification

    Gaussian mixture models are commonly used in speaker identification and verification systems. However, owing to their non discriminant nature, Gaussian mixture models still give greater identification errors in the evaluation process. Partitioning speakers database in clusters based on some proximity criteria where only a single cluster Gaussian mixture models is...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Dynamic Adaptability Using Reflexivity for Mobile Agent Protection

    The paradigm of mobile agent provides a promising technology for the development of distributed and open applications. However, one of the main obstacles to widespread adoption of the mobile agent paradigm seems to be security. This paper treats the security of the mobile agent against malicious host attacks. It describes...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Using a Trust-Based Environment Key for Mobile Agent Code Protection

    Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Double Reduction of Ada-ECATNet Representation Using Rewriting Logic

    One major difficulty that faces developers of concurrent and distributed software is analysis for concurrency based faults like deadlocks. Petri nets are used extensively in the verification of correctness of concurrent programs. ECATNets are a category of algebraic Petri nets based on a sound combination of algebraic abstract types and...

    Provided By Mentouri University

  • White Papers // Apr 2009

    A Comprehensive Study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-Hoc Networks

    Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing)...

    Provided By Mentouri University

  • White Papers // May 2012

    New Virtual Coordinate System for Improved Routing Efficiency in Sensor Network

    Geographic routing has attracted attention since it is a memory less and scalable approach. Two types of geographic routing protocols are proposed in the literature; those relying on exact position information using GPS, and other algorithms using Virtual Coordinate System (VCS). In recently proposed VCS, the unique identity cannot be...

    Provided By Mentouri University

  • White Papers // Apr 2011

    A Binary Based Approach For Generating Association Rules

    Advanced database application areas, such as computer aided design, office automation, digital libraries, data-mining, hypertext and multimedia systems, need to handle complex data structures with set-valued attributes. These information systems contain implicit data that will be necessary to extract and exploit, by using data mining techniques. To exploit the data...

    Provided By Mentouri University

  • White Papers // Apr 2009

    A Comprehensive Study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-Hoc Networks

    Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing)...

    Provided By Mentouri University

  • White Papers // Nov 2009

    A Combination Approach of Gaussian Mixture Models and Support Vector Machines for Speaker Identification

    Gaussian mixture models are commonly used in speaker identification and verification systems. However, owing to their non discriminant nature, Gaussian mixture models still give greater identification errors in the evaluation process. Partitioning speakers database in clusters based on some proximity criteria where only a single cluster Gaussian mixture models is...

    Provided By Mentouri University

  • White Papers // Feb 2011

    An Agent Based Architecture (usingplanning) for Dynamic and Semantic Web Services Composition in an EBXML Context

    The process-based semantic composition of Web Services is gaining a considerable momentum as an approach for the effective integration of distributed, heterogeneous, and autonomous applications. To compose Web Services semantically, the authors need an ontology. There are several ways of inserting semantics in Web Services. One of them consists of...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Dynamic Adaptability Using Reflexivity for Mobile Agent Protection

    The paradigm of mobile agent provides a promising technology for the development of distributed and open applications. However, one of the main obstacles to widespread adoption of the mobile agent paradigm seems to be security. This paper treats the security of the mobile agent against malicious host attacks. It describes...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Using a Trust-Based Environment Key for Mobile Agent Code Protection

    Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to...

    Provided By Mentouri University

  • White Papers // Jun 2009

    Double Reduction of Ada-ECATNet Representation Using Rewriting Logic

    One major difficulty that faces developers of concurrent and distributed software is analysis for concurrency based faults like deadlocks. Petri nets are used extensively in the verification of correctness of concurrent programs. ECATNets are a category of algebraic Petri nets based on a sound combination of algebraic abstract types and...

    Provided By Mentouri University

  • White Papers // Jul 2011

    A Contract-Based Language to Specify Design Components

    For component-based software development to be successful in organizations, the software developers must give close attention to the design of components as independent abstractions with well-specified behaviors. Without well-specified behaviors the possibility to distribute and acquire software components will be limited. In this paper, the authors present a contract-based approach...

    Provided By Mentouri University

  • White Papers // Dec 2010

    Conceptual Method for Flexible Business Process Modeling

    Now-a-days, the pace of business change is such that, increasingly, new functionality has to be realized and reliably installed in a matter of days, or even hours. Consequently, more and more business processes are prone to a continuous change. The objective of the research in progress is to use the...

    Provided By Mentouri University