about.jpg

Filter by

Security access control research trends

Information security policy is a critical property in any organization. For systems, the security policy addresses constraints on access by external systems and adversaries including programs and access to data by people. A continuous research effort is done throughout security policy aspects, such as policy procedures, documentation, policy enforcement, and administration. In this paper, we

Artificial Intelligence

Creating an innovative generic virtual learning lab

The use of multimedia technology and gamification has offered an alternative way of delivering information in education. Interactive Multimedia has the potential to revolutionize the way we work, learn and communicate. With gamification and interactive multimedia, the learning process becomes active, not passive and it ensures that users are doing, not simply watching. Also the Laboratory has a

Artificial Intelligence

The visual object tracking VOT2013 challenge results

Visual tracking has attracted a significant attention in the last few decades. The recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted annotated data-sets and standardized evaluation protocols that would allow objective comparison of different

Artificial Intelligence

Robust real-time tracking with diverse ensembles and random projections

Tracking by detection techniques have recently been gaining popularity and showing promising results. They use samples classified in previous frames to detect an object in a new frame. However, because they rely on self updating, such techniques are prone to object drift. Multiple classifier systems can be used to improve the detection over that of a single classifier. However, such techniques can

Artificial Intelligence

Performance evaluation and comparison of the top market virtualization hypervisors

The virtualization of IT infrastructure enables the consolidation and pooling of IT resources so that they can be shared over diverse applications to offset the limitation of shrinking resources and growing business needs. It provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation

Artificial Intelligence

VoIP performance evaluation over IPv4-6 and manually configured tunnels

IPv4 address space is exhausted. Internet Engineering Task Force (IETF) developed IPv6 -the upgrade of IPv4- to satisfy the continual increase of the IP address needs. The Internet is so ramified and enormous that the complete transition from IPv4 to IPv6 is slow. Therefore, their coexistence is inevitable. Manually configured tunnels are an important solution to allow this co-existence that

Artificial Intelligence

Open issues in the sentiment analysis of Arabic social media: A case study

With the rapid increase in the volume of Arabic opinionated posts on different microblogging mediums comes an increasing demand for Arabic sentiment analysis tools. Yet, research in the area of Arabic sentiment analysis is progressing at a very slow pace compared to that being carried out in English and other languages. This paper highlights the major problems and open research issues that face

Artificial Intelligence

A corpus based approach for the automatic creation of Arabic broken plural dictionaries

Research has shown that Arabic broken plurals constitute approximately 10% of the content of Arabic texts. Detecting Arabic broken plurals and mapping them to their singular forms is a task that can greatly affect the performance of information retrieval, annotation or tagging tasks, and many other text mining applications. It has been reported that the most effective way of detecting broken

Artificial Intelligence

SAODV and modified SAODV performance comparison

Routing plays a vital role in ad hoc networks and Ad hoc On-demand Distance Vector (AODV) protocol is considered one of the most famous routing protocols in ad hoc networks. Unfortunately it doesn't specify security measures. This has motivated the researchers to design secured version of AODV. However Security always collides with performance. The higher the security level is, the lower the

Artificial Intelligence

A novel proximity based trust model for opportunistic networks

Trust should be earned. This is a famous quote that we use everyday implicitly or explicitly. Trust often is an inherent characteristic of our daily life, but in the digital community and between devices how can we represent trust? Since our mobile and digital devices became our confidants, we cannot share the information embedded in these devices with other devices without establishing trust

Artificial Intelligence