The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, we analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks are simulated using Sensoria simulator.... more
Educational computer games studies experienced rapid growth due to the belief that games can offer various learning benefits being highly popular among younger generations. Programming is considered a challenging subject by students and... more
and Heart Rate. Remote users (family and medical personnel) might have a real time access to the collected information through a web application.
A fuzzy filter adaptive to both sample's activity and the relative position between samples is proposed to reduce the artifacts in compressed multidimensional signals. For JPEG images, the fuzzy spatial filter is based on the directional... more
As genomes evolve over hundreds of millions years, the chromosomes become rearranged, with segments of some chromosomes inverted, while other chromosomes reciprocally exchange chunks from their ends. These rearrangements lead to the... more
Personalized e-learning implementation is recognized one of the most interesting research areas in the distance web-based education. Since the learning style of each learner is different we must to fit elearning to the different needs of... more
Shape is an important aspects in recognizing plants. Several approaches have been introduced to identify objects, including plants. Combination of geometric features such as aspect ratio, compactness, and dispersion, or moments such as... more
an Artificial Neural Network classifier is a nonparametric classifier. It does not need any priori knowledge regarding the statistical distribution of the class in a giver selected data Source. While, neural network can be trained to... more
This research investigates the feasibility and usefulness of designing an authoring environment for diagram-based Computer Based Assessment (CBA). CBA systems present students with an environment that permits them to solve exercises. Upon... more
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network
. The results show that the GLCM at 0 o , 45 o , 90 o and 135 o with a window size of 8X8 produces informative features to classify between masses and non-masses. Our method was able to achieve an accuracy of 91.67% sensitivity and 84.17%... more
For the last few decades more than twenty standardized usability questionnaires for evaluating software systems have been proposed. These instruments have been widely used in the assessment of usability of user interfaces. They have their... more
The Arabic Language has a very rich vocabulary. More than 200 million people speak this language as their native speaking, and over 1 billion people use it in several religion-related activities. In this paper a new technique is presented... more
This article proposes a graph-theoretic methodology for query approximation in Geographic Information Systems, enabling the relaxation of three kinds of query constraints: topological, semantic and structural. An approximate query is... more
Iris recognition is considered as one of the best biometric methods used for human identification and verification, this is because of its unique features that differ from one person to another, and its importance in the security field.... more
We describe a Context Free Grammar (CFG) for Bangla language and hence we propose a Bangla parser based on the grammar. Our approach is very much general to apply in Bangla Sentences and the method is well accepted for parsing a language... more
Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC... more
Based on the empirical analysis of data contained in the International Software Benchmarking Standards Group (ISBSG) repository, this paper presents software engineering project duration models based on project effort. Duration models are... more
Web usage mining is the type of Web mining activity that involves the automatic discovery of user access patterns from one or more Web servers. In this paper we analyze the pattern using different algorithms like
Personalized adaptive systems rely heavily on the learning style and the learner's behavior. Due to traditional teaching methods and high learner/teacher ratios, a teacher faces great obstacles in the classroom. In these methods, teachers... more
In this paper, we have made improvements in region growing image segmentation. The First one is seeds select method, we use Harris corner detect theory to auto find growing seeds. Through this method, we can improve the segmentation... more
Multi-core processors are becoming prevalent rapidly in personal computing and embedded systems. Nevertheless, the programming environment for multi-core processor-based systems is still quite immature and lacks efficient tools. In this... more
In this paper, we introduce a new hue-preserving histogram equalization method based on the ROB color space for image enhancement. We use fi-red, G-green, and B-blue 1D histograms to estimate the histogram to be equalized using a Naive... more
This paper introduces a new model which is intended to combine the power of a connectionist engine based on fast matrix calculation, RDF based memory and inference mechanisms, and affective computing in a hybrid cognitive model. The model... more
The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of... more
High overhead involved in flooding while route creation is a limiting factor of Dynamic Source Routing (DSR) protocol applied for mobile ad hoc networks (MANETs). During data delivery, it seems that we fully benefit from DSR if the route... more
Internet technology has been revolutionary over the years especially in the educational sector. However, the utility of internet technology in the learning process of a student in a higher learning institution has not been determined over... more
The rising popularity of evolutionary algorithms to solve complex problems has inspired researchers to explore their utility in recommender systems. Recommender systems are intelligent web applications which generate recommendations... more
Delay tolerant networks (DTNs) experience frequent and long lasting network disconnection due to various reasons such as mobility, power management, and scheduling. One primary concern in DTNs is to route messages to keep the end-to-end... more
We present a Compression Tool , GenBit Compress", for genetic sequences based on our new proposed "GenBit Compress Algorithm". Our Tool achieves the best compression ratios for Entire Genome (DNA sequences) . Significantly better... more
With the increasing demand for data traffic and with the massive foreseen deployment of the Internet of Things (IoT), higher data rates and capacity are required in mobile networks. While Heterogeneous Networks (HetNets) are under study... more
The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area... more
Modern biological science produces vast amounts of genomic sequence data. This is fuelling the need for efficient algorithms for sequence compression and analysis. Data compression and the associated techniques coming from information... more
The number of missed appointments in healthcare institutions in Nigeria caused problems, hence the need for integrated healthcare system to intervene and provide seamless care for patients. Appointment scheduling system lies at the... more
Insertion of a text message, audio data or/and an image into another image or 3D model is called as a watermarking process. Watermarking has variety of applications like: Copyright Protection, Owner Identification, Copy Protection and... more
27001 together when governing information security in enterprises will be issued.
Grammar-based parsing is a prevalent method for natural language understanding (NLU) and has been introduced into dialogue systems for spoken language processing (SLP). A robust parsing scheme is proposed in this paper to overcome the... more
This paper describes the architecture and design of Part-A-lot, an automated parking management system. It explains the working dynamics of this prototype system and its communication with the website to find a parking spot before... more
Concatenative speech synthesis systems generate speech by concatenating small prerecorded speech units which are stored in the speech unit inventory. The most commonly used type of these units is the diphone which is a unit that starts at... more
Options have been shown to be a key step in extending reinforcement learning beyond low-level reactionary systems to higher-level, planning systems. Most of the options research involves hand-crafted options; there has been only very... more
Efficient Market Hypothesis is the popular theory about stock prediction. With its failure much research has been carried in the area of prediction of stocks. This project is about taking non quantifiable data such as financial news... more
Wireless communication is used in many different situations such as mobile telephony, radio and TV broadcasting, satellite communication, wireless LANs, and military operations. In each of these situations a frequency assignment problem... more
Automatic speech processing systems are employed more and more often in real environments. Although the underlying speech technology is mostly language independent, differences between languages with respect to their structure and grammar... more
In this paper, methods to automatically detect and categorize the severity of skin burn images using various classification techniques are compared and presented. A database comprising of skin burn images belonging to patients of diverse... more
This paper outlines a methodology for designing information systems based on XML. The methodology uses XML DTDs to define the design standards, and the structure and constraints of the design specifications. The result of the design... more
Free space optics (FSO) is a promising solution for the need to very high data
Development and maintenance of Web application is still a complex and error-prone process. We need integrated techniques and tool support for automated generation of Web systems and a ready prescription for easy maintenance. The MDA... more