Journal of Communications and Computer Engineering
Latest Publications


TOTAL DOCUMENTS

17
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By Modern Science Publishers

2090-6234, 2090-830x

2014 ◽  
Vol 3 (2) ◽  
pp. 10
Author(s):  
Anna Sedrak Hovakimyan ◽  
Siranush Gegham Sargsyan ◽  
Arshak Nazaryan

Human iris is  a good subject of biometrical identification, since  iris patterns are unique like fingerprints. Iris is well protected against damage, unlike fingerprints, which can be harder to recognize after years of certain types of manual labor.A problem of iris recognition is considered in the paper. In machine learning, pattern recognition is the assignment of a label to a given input value. Pattern classification is an example of pattern recognition: it attempts to assign each input value to one of a given set of classes. Nowadays various techniques are used for this purpose, and in particular artificial neural networks.For iris recognition problem solving  Kohenen Self Organizing Maps are suggested to use. The software for iris recognition is developed  which is customizable and allows to select the appropriate parameters of the neural network to obtain the most satisfactory results. The developed Self-Organizing Map Library of classes can be used for various kinds of object classification problem solving as well as for any problems suitable to solve with Self-Organizing Maps.


2014 ◽  
Vol 3 (2) ◽  
pp. 1 ◽  
Author(s):  
Safwat Hamad ◽  
Amal Khalifa ◽  
Ahmed Elhadad ◽  
Saad Rida

In this paper, a new extension of the Playfair cipher algorithm is proposed to encrypt image data more securely. The proposed method constructs a 16×16 secret key matrix to scramble image data byte by byte. In addition, the algorithm complexity is increased using masking and XOR procedure. That is, the key is used to generate a mask that is subsequently XORed with the scrambled image. Experimental results showed that using two slightly different secret keys, the resultant encrypted images are still completely different.


2013 ◽  
Vol 3 (1) ◽  
pp. 52 ◽  
Author(s):  
Mohammad Awwad AlNagdawi

In this paper, we make a program that can find the poem meter name (called Bahar in Arabic) by Arud science, this science provides a methodology to classify Arabic poems into 16 meters, to help a user to find the meter name for any Arabic poem using context free grammar (CFG). And we discuss the solutions for problems, from the starting phase to the result, using regular expression and CFG. And the result 75% of the verse is found its meter, when input enters correctly.


2012 ◽  
Vol 3 (1) ◽  
pp. 48
Author(s):  
Thomas Ray ◽  
George Scheets

Abstract This paper aims to determine the actual amount of channel change time reductions seen by correctly pre-selecting the next channel to be accessed in Internet Protocol Television systems. Numerous researchers have published techniques for pre-selecting channels that are then streamed down to user set top boxes prior to selection to reduce channel change times. These previous papers consistently indicate that when the next channel selection is already being streamed to the user that the channel change times will be significantly reduced based on the theory of operation. However, a precise determination of this reduction has not been adequately put forth in the previous research, nor has an experimental analysis validating this reduction been well documented. In this research an experimental platform was constructed and a systematic analysis of the beneficial effects of channel pre-selection was undertaken. A theoretical forecast of the resulting channel change time reduction is advanced, and a comparison of the forecast to the experimental results validated the expected time reduction.


2012 ◽  
Vol 3 (1) ◽  
pp. 40 ◽  
Author(s):  
Wafa Elmannai ◽  
Abdul Razaque ◽  
Khaled Elleithy

Transmission Control Protocol (TCP) is the most reliable protocol. That was previously introduced for wired networks only. Lately the TCP started to act poorly for several factors due to the advent of wireless network. The represented factors which need to be addressed are recovery mechanism, backup mechanism, mobility, congestion window and maximum packet size. Based on existing variants, new were introduced. The most two debated variants are Vegas and Westwood which motivated many researches. However, the number of studies proved that Vegas could perform more efficiency than other variants during the congested network whereas Westwood could consume less bandwidth. Hence, in our previous publications, we already proved by integrating some features of Vegas and Westwood to get better and more stable variant even in high congested network. It is called TCP University of Bridgeport (TCP-UB).Based on a previous simulation, TCP-UB proved a high efficiency, less bandwidth consumption and stability from static and mobility point of view. Therefore, in this paper we are using NS2 simulator to perform TCP-UB over wireless mesh network supported with manhattan mobility model. It provides robust and faster transmission service among several police stations in Connecticut, USA.Furthermore, we are comparing TCP-UB with Vegas and Westwood from a static and mobility point of view based on bandwidth consumption and congestion window scenario. On the basis of findings, we validate that TCP-UB is also better performer even over wireless mesh network.


2012 ◽  
Vol 3 (1) ◽  
pp. 30
Author(s):  
Mona M. Abu Al-Khair ◽  
M. Koutb ◽  
H. Kelash

Each year the number of consumers and the variety of their interests increase. As a result, providers are seeking ways to infer the customer's interests and to adapt their websites to make the content of interest more easily accessible. Assume that past navigation behavior as an indicator of the user's interests. Then, the records of this behavior, kept in the web-server logs, can be mined to extract the user's interests. On this principal, recommendations can be generated, to help old and new website's visitors to find the information about their interest faster.


2012 ◽  
Vol 3 (1) ◽  
pp. 15 ◽  
Author(s):  
Abdul Razaque ◽  
Khaled Elleithy

Mobile collaborative learning (MCL) is extremely recognized as focusing archetype in educational institutions. It demonstrates cerebral synergy of assorted collective minds. It handles several problems in order to motivate social activity for mutual communication. To advance and promote baseline for MCL; several supporting frameworks, architectures including number of different mobile applications have been introduced. But, no one has mainly focused to augment the security of those architectures. The paper handles issues of rogue DHCP server that highly affects network resources during MCL. The rogue DHCP is illegal server that issues the fake IP address to users for sniffing the legal traffic. This contribution specially targets the malicuius attacks that weaken the security of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection system (MSAIDS) that blocks an unlawful behavior of rogue DHCP server. This novel security method emphasize confidence of users and secures also network from illegitimate interference of rogue DHCP server. Finally, paper confirms scheme through simulations. The simulations comrises of testbed, ns2 and discrete simulation.


2012 ◽  
Vol 3 (1) ◽  
pp. 11
Author(s):  
Ahmed Elaraby Ahmed ◽  
Hassan El-Owny

In this paper we present the new complex form for affine arithmetic (AA) which is a self-verifying computational approach that keeps track of first-order correlation between uncertainties in the data and intermediate and final results. In this paper we propose a higher-order extension satisfying the requirements of genericity, arbitrary-order and self-verification, comparing the resulting method with other wellknown high-order extensions of AA


2012 ◽  
Vol 3 (1) ◽  
pp. 7
Author(s):  
Chillali Abdelhakim ◽  
M'hammed Boulagouaz

In this paper we propose an application of public key distribution based on the security depending on the difficulty of elliptic curve discrete logarithm problem. More precisely, we propose an example of Elgamal encryption cryptosystem on the elliptic curve given by the equation:


2012 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Benabdellah Mohammed ◽  
Dellal Mohamed ◽  
Azizi Abdelmalek

Despite the effects of the diffusion of Information and Communication Technologies (ICT) on socio-economic changes that are not yet fully identified, it is now recognized that ICT alter substantially our ways of communicating, learning and producing. In addition to this, the controversy, that gave rise to the concept of "information-society", embodies these developments which foreshadow new forms of social organization structured around computer networks and telecommunications. ICT increasingly aware of the developments identified, and are introduced in all sectors. This use has made these technological tools a requirement for all countries which is likely to help them face up to the challenges ahead. In recent years our country "Morocco" has embarked on an ambitious program for the widespread use of ICT integration in the System of Education and Training. In this paper, we propose a strategy to follow in teaching students specific subjects and a training program for teachers both at the Faculties of Humanities as well as at that of the socio-economic studies; the ultimate purpose being to achieve the integration of ICT in the Moroccan Educational System and Scientific research in general. To conclude we will post the outlook for evaluation of educational ICT.


Sign in / Sign up

Export Citation Format

Share Document