about.jpg

Filter by

Reliable Collaborative Semi-infrastructure Vehicle-to-Vehicle Communication for Local File Sharing

Recently, Vehicular Cloud Communication (VCC) has been gaining momentum targeting intelligent and efficient data transmission. VCC is a type of mobile ad-hoc network comprising heterogeneous vehicles sharing their resources to perform collaborative activities. In this paper, we propose a new semi-infrastructure file-browsing in order to provide Network as a service (NaaS) enabling internet

Software and Communications

Using deep neural networks for extracting sentiment targets in arabic tweets

In this paper, we investigate the problem of recognizing entities which are targeted by text sentiment in Arabic tweets. To do so, we train a bidirectional LSTM deep neural network with conditional random fields as a classification layer on top of the network to discover the features of this specific set of entities and extract them from Arabic tweets. We’ve evaluated the network performance

Artificial Intelligence

Design and Implementation of Fuzzy PID Controller into Multi Agent Smart Library System Prototype

This paper compares the performance of four different controllers implemented on two multi agent robots to stabilize its motion from one station to another during delivery tasks. The controllers are; multi-position controller, PID controller, fuzzy logic controller and fuzzy-PID controller. The aim of this paper is to control the mobile robot robustly to arrive its target destination. The robots

Mechanical Design

A study in WPA2 enterprise recent attacks

Organizations and network developers continuously exert much money and efforts to secure wireless transmission. WPA2 framework is widely deployed for Wi-Fi communications since it is efficient and secure against several wireless attacks. However, WPA2 security has been lately threatened by advanced developed versions of wireless attacks. The increase of computer processing power, continuous

Software and Communications

MoArLex: An Arabic Sentiment Lexicon Built Through Automatic Lexicon Expansion

Research addressing Sentiment Analysis has witnessed great attention over the last decade especially after the huge increase in social media networks usage. Social networks like Facebook and Twitter generate an incredible amount of data on a daily basis, containing posts that discuss all kinds of different topics ranging from sports and products to politics and current events. Since data generated

Artificial Intelligence

A Hydro-Kinematic approach for the design of compact corrugated plate interceptors for the de-oiling of produced water

A Hydro-Kinematic approach is proposed for the design of compact corrugated plate interceptors (CPIs) for the de-oiling of produced water. For a given set of design targets of a specific flow rate, maximum retention time and minimum captured oil droplet diameter, the Hydro-Kinematic approach proposes a systematic way to determine the CPI unit dimensions and operating conditions with the minimum

Energy and Water

Modeling of target tracking system for homing missiles and air defense systems

One reason of why the guidance and control systems are imperfect is due to the dynamics of both the tracker and the missile, which appears as an error in the alignment with the LOS and delay in the response of the missile to change its orientation. Other reasons are the bias and disturbances as well as the noise about and within the system such as the thermal noise. This paper deals with the

Cloud computing privacy issues, challenges and solutions

There are many cloud computing initiatives that represent a lot of benefit to enterprise customers. However, there are a lot of challenges and concerns regarding the security and the privacy of the customer data that is hosted on the cloud. We explore in this paper the various aspects of cloud computing regarding data life cycle and its security and privacy challenges along with the devised

Artificial Intelligence
Software and Communications

Detection and Countermeasures of DDoS Attacks in Cloud Computing

Greater portions of the world are moving to cloud computing because of its advantages However, due to its distributed nature, it can be easily exploited by Distributed Denial of Service (DDoS) attacks. In distributed DDoS attacks, legitimate users are prevented from using cloud resources. In this paper, the various DDoS detection and defenses mechanisms cloud computing are reviewed. We propose a

Artificial Intelligence
Software and Communications

Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems

The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time monitoring and tracking. Bit tracking-based anti-collision algorithms have attracted considerable attention, recently, due to its positive impact on decreasing the

Circuit Theory and Applications
Software and Communications