Digital Repository for Department of Networking

Statistics for Department of Networking

  • Icon missing? Request it here.
  • 19

    Conference paper

  • 7

    Journal Article

  • 0

    Book

  • 3

    Chapter

  • 0

    PhD Thesis

  • 0

    Master Thesis

  • 0

    Final Year Project

  • 0

    Technical Report

  • 0

    Unpublished work

  • 0

    Document

Sequence Mining in DNA chips data for Diagnosing Cancer Patients

: Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 9 English 55
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2011)

Using sequence DNA chips data to Mining and Diagnosing Cancer Patients

Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 10 English 60
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2010)

Study and test performance of the Zigbee Wireless technology in some network models by using Opnet software

ZigBee Wireless Technology is the leading global standard for implementing low-cost, Low-data-rate, short-range wireless networks with extended battery life. The ZigBee standard provides network, security, and application support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) wireless standard. It employs a suite of technologies to enable scalable, self-organizing, and self-healing networks that can manage various data traffic patterns, The low cost allows the technology to be widely deployed in wireless control and monitoring applications, the low power-usage allows longer life with smaller batteries, and the mesh networking provides high reliability and larger range. ZigBee has been developed to meet the growing demand for capable wireless networking between numerous low power devices. In this paper , we will try to give a complete picture about ZigBee technology including the structure of this technology, the layers where this technology works referred to the OSI model, how this technology works, the main components that use to create a ZigBee network, The objective of this simulation is to establish tree topology networkby; using an OPNET Modeller 14.5 program, and to investigate the performance of the network model, and see the effect on data when we change the time of transmission and finally we will investigate the performance of some network models that employ IEEE 802.15.4 protocol using different scenarios. arabic 19 English 91
Mariam Abojela Msaad, Almoatasem Aboaisha , Ahmed Eshoul(12-2019)

Implementation Network Management Solution Using PRTG and Solar Winds Tools

Successful companies know that network management is crucial for the proper support and maintenance of network infrastructure. When it comes to managing a large-scale or highly complex network, you’ll need a powerful network management system that will meet your challenging business needs. There are several programs suggested different types of solutions. PRTG and SolarWinds are an excellent solution, since they have many features that help the network engineer, administrator or technician to easily control, manage and monitor the devices comprehensively. Moreover, PRTG and SolarWinds can integrate with monitoring and management protocols such as SNMP and NetFlow to provide an excellent integrated unified management solution. That being said, PRTG and SolarWinds will facilitate the management of network devices throughout performing configuration, Security, Fault, Performance and Accounting management which will increase productivity, Quality, Revenue and lower the cost. arabic 9 English 66
Mariam Abojela Msaad, Mohamed Fathi Almograbi , Anas Moftah Alshoukri (12-2019)

Different Approaches to Classify Network Routing Protocols

In this paper a brief introduction to the concept of quality of service has been given. However, it mainly focuses on the classification of routing algorithms based on a number of different criteria like: protocols, structure, technologies in use, etc. And it concludes with a presentation of a common problem facing routing protocols, namely routing loops, and explained the known solutions to that problem. arabic 6 English 52
Ibrahim Almerhag, Ali Ganoun(6-2018)

Enhancement of Grain-128 Using Variable Feedback Polynomials of Linear Feedback Shift Register

DLFSR is promising for enhancing the security of stream ciphers. However, good inviolability and statistical properties of the DLFSR generator are only achievable when the parameters of the switching algorithm are properly selected. This paper describes a new experimental method for choosing suitable parameters for the algorithm of switching the polynomial in DLFSR. This method was used to enhance the Grain-128 stream cipher. The randomness of the modified Grain was evaluated using the NIST suite, and the results are encouraging. The modified Grain was also compared to the original, and the results indicated that the modified algorithm outperforms the original in several tests. arabic 12 English 82
Fayrouz Aljadi, Ibrahim Almerhag, Fardous Eljadi(3-2019)
publisher's website

Routing based on security

Even though it is an essential requirement of any computer system, there is not yet a standard method to measure data security, especially when sending information over a network. However, the most common technique used to achieve the three goals of security is encryption. Three security metrics are derived from important issues of network security in this chapter. Each metric demonstrates the level of achievement in preserving one of the security goals. Routing algorithms based on these metrics are implemented to test the proposed solution. Computational effort and blocking probability are used to assess the behavior and the performance of these routing algorithms. Results show that the algorithms are able to find feasible paths between communicating parties and make reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities are encountered, which is the price to be paid for such savings. arabic 3 English 22
Ibrahim Almerhag(3-2014)
publisher's website

Designing an Efficient MPLS-Based Switch for FAT Tree Network-on-Chip Systems

This paper describes a proposal for FAT tree based Network-on- Chip system based on MPLS forwarding mechanism. The FAT tree includes processing nodes and communication switches. IP node (processing nodes) has a message generator unit which randomly generates messages to different destinations with different packet lengths and buffering. The switch is based on MPLS technique and consists of the following units: crossbar switch, input/output link controllers and routing and arbitration units. A simulator has been developed in C++ to analyze the proposed architecture. A comparison with wormhole switch is provided to show the efficiency of the MPLS designed switch arabic 12 English 65
Azeddien M. Sllame, Nagwa Abobaker Salama(1-2016)
publisher's website