المستودع الرقمي لـكلية تقنية المعلومات

احصائيات كلية تقنية المعلومات

  • Icon missing? Request it here.
  • 43

    مقال في مؤتمر علمي

  • 22

    مقال في مجلة علمية

  • 1

    كتاب

  • 3

    فصل من كتاب

  • 0

    رسالة دكتوراة

  • 0

    رسالة ماجستير

  • 0

    مشروع تخرج بكالوريوس

  • 0

    تقرير علمي

  • 0

    عمل غير منشور

  • 0

    وثيقة

Simulation of Leishmaniasis Epidemiology in Libya Using Agent Based Modelling

Epidemics control is a continues struggle. In this paper is an attempt to model and then simulate an epidemiological disease known as Cutaneous Leishmaniasis (CL), which is currently affecting large communities in Libya. The model is developed to facilitate the Agent Based Models (ABM) as one of the many tools applied for epidemiological management. Validation of the model is considered by comparing the model's behavior with a trend of field data used by Libyan authorities. The methodology used for describing and designing CL model is derived from nature of the disease mechanisms. The ABM model involves three types of agents: Human, Rodent and Sand-fly. Each agent has its own properties. Additionally, global model parameters are used for following the human infection processes. Several experiments are given for illustrating the model performance, and monitor the number of people infected. Simulation results show that active human agents are more vulnerable to sand-fly bites, and infection rate is increasing or decreasing dependent on number of sand-fly vectors, number of host rodents, and human population awareness level. arabic 9 English 68
Rudwan A. Husain, Hala Shaari, Marwa Solla, Hassan A. H. Ebrahem(3-2019)
موقع المنشور

A Model and Tool Features for Collaborative Artifact Inspection and Review

Inspection offers an opportunity to detect and remove defects at various points during software development. Early detection will reduce the effect of propagation and amplification of defects into the later phases of software development. Collaborative inspection on the web aims to eliminate the time factor needed to assemble the inspection or review team at a physical location. Through the collaborative mode, software teams can perform software inspection and review from geographically separated places asynchronously. These newly introduced practices have proven that collaborative inspection and review of artifacts on the web is feasible. This paper provides a model for collaborative inspection and review including possible features of model and tool that will support collaborative inspection and review on the web. arabic 10 English 64
Abdusalam Nwesri, Khairuddin Hashim(10-2008)

Capturing Variants of Transliterated Arabic Names in English Text

Transliteration is the process of representing words of one language into another using corresponding equivalent phonemes. For example, “Mohammed”, “Mohammad”, or “Muhammed” are three valid transliterations to the Arabic proper noun “محمد”. Transliteration from Arabic to English usually results in several different versions for the same Arabic name causing some names to have more than 40 different versions. Finding transliterated names is a problem in most languages. In English, this problem has been studied by researchers and many techniques have been developed to find transliterated names referring to the same foreign name. Techniques such as string matching and phonetic matching have been used to find similar names. However, some of these techniques were designed to find similar names of English origin and not a specific transliterated names. In this paper we review current techniques used to find variants of the same name and introduce a new technique we specifically developed to find transliterated Arabic names in English text. We developed a data set of more than 25,000 transliterated Arabic names and tested the effectiveness of current and the new technique on finding 115 names within that list. Our results show that our technique is superior to all other techniques. We also present an online system that we developed to find transliterated Arabic names on the web using our technique. arabic 8 English 57
Abdusalam F. Ahmad Nwesri, Nabila Al-Mabrouk S. Shinbir(9-2009)

Study of Multipath Transmission Control Protocol

Multipath Transmission Control Protocol (MPTCP) has been proposed by the Internet Engineering Task Force (IETF) working group, in order to get benefit of the interfaces in the network devices, as most of these network devices are equipped with more than one interface. MPTCP splits a single data stream across multiple paths. This has obvious benefits for reliability, and it can also lead to more efficient use of network resources. The main aim of this paper is to study the main mechanism of the MPTCP and some of the multipath transmission protocols. arabic 5 English 43
Mariam Abojela Msaad, Taha Arabi , Amer R. Zerek(1-2013)

Studying and Investigation of Virtual Private Networking

Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private “tunnel” to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. A VPN is a communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed though some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a nonexclusive basis. arabic 6 English 50
Mariam Abojela Msaad, Amer R. Zerek, Hana H. saleh(1-2012)

Multiprotocol Label Switching

Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as Asynchronous Transfer Mode (ATM) or Frame Relay, or it can operate in an entirely IP native environment; this can allow users to take advantage of existing Customer Premises Equipment (CPE) while making a move towards converging all network traffic, such as data, video and voice, at a pace that users can accommodate and afford. MPLS provides. its users a number of advantageous features such as traffic engineering, network convergence, failure protection, and the ability to guarantee Quality of Service (QoS) over IP. arabic 2 English 27
Mariam Abojela Msaad, Amer R. Zerek , Wesam M. Tohamei(1-2012)

NETWORK SOLUTION FROM GSM to LTE

LTE’s study phase began in late 2004. The overall goal was to select technology that would keep 3GPP’s Universal Mobile Telecommunications System (UMTS) at the forefront of mobile wireless well into the next decade. Key project objectives were set in the following areas: peak data throughput; spectral efficiency; flexible channel bandwidths; latency; device complexity; and overall system cost. The main decision was whether to pursue the objectives by continuing to evolve the existing W-CDMA air interface (which incorporates HSPA (highspeed packet access) or adopt a new air interface based on OFDM. arabic 5 English 27
Mariam Abojela Msaad, Amer R. Zerek, Fareda A. Elmaryami(1-2014)

Sequence Mining in DNA chips data for Diagnosing Cancer Patients

: Deoxyribonucleic acid (DNA) micro-arrays present a powerful means of observing thousands of gene terms levels at the same time. They consist of high dimensional datasets, which challenge conventional clustering methods. The data’s high dimensionality calls for Self Organizing Maps (SOMs) to cluster DNA micro-array data. The DNA micro-array dataset are stored in huge biological databases for several purposes . The proposed methods are based on the idea of selecting a gene subset to distinguish all classes, it will be more effective to solve a multi-class problem, and we will propose a genetic programming (GP) based approach to analyze multi-class micro-array datasets. This biological dataset will be derived from multiple biological databases. The procedure responsible for extracting datasets called DNA-Aggregator. We will design a biological aggregator, which aggregates various datasets via DNA micro-array community-developed ontology based upon the concept of semantic Web for integrating and exchanging biological data. Our aggregator is composed of modules that retrieve the data from various biological databases. It will also enable queries by other applications to recognize the genes. The genes will be categorized in groups based on a classification method, which collects similar expression patterns. Using a clustering method such as k-mean is required either to discover the groups of similar objects from the biological database to characterize the underlying data distribution. arabic 9 English 55
Mariam Abojela Msaad, Zakaria Suliman Zubi(1-2011)