Digital Repository for Faculty of Information Technology

Statistics for Faculty of Information Technology

  • Icon missing? Request it here.
  • 43

    Conference paper

  • 22

    Journal Article

  • 1

    Book

  • 3

    Chapter

  • 0

    PhD Thesis

  • 0

    Master Thesis

  • 0

    Final Year Project

  • 0

    Technical Report

  • 0

    Unpublished work

  • 0

    Document

Comprehensive Study on Query Optimization Techniques used in Data Warehousing

Abstract: In this research review paper, we have introduced our work with a comprehensive study on data warehousing, regarding to its novelty; depending on that, there was an intensive research work, because of its importance and need nowadays, we have reviewed and studied big amount of researches available in the Information Systems research centers around the globe. We have focused on optimization in our comprehensive studies and also on the processes of data warehousing with respect to its updated optimized queries approaches and its vast utilization in the Market. We found that ,the most useful information extracted by using both approaches which have used within new optimized techniques for query-driven approaches, has got potentially effected on the strategies of most successful data warehousing integration models. arabic 9 English 68
Mohamed Abdeldaiem Abdelhadi Mahboub(10-2019)
publisher's website

A Developed Secured Model for Searching Into Secured Encrypted Data

Abstract:- Our research paper has presented a new developed model for secured search into a big data of document collections. The developed model has investigated the importance of secured search and also the need for its practices in the real world. We have actually, studied both side of encryption in practical techniques issues and theoretical issues to improve the integration of information retrieval and cryptographic methods used for secured searching. We have chosen 3DES encryption technique to encrypt document data collections. Our new developed secured model has provided an efficient secured searching and/or security and authenticity over all. arabic 9 English 58
Mohamed Abdeldaiem Abdelhadi Mahboub, , (9-2019)
publisher's website

An Extensive Study on Online and Mobile Ad Fraud

The advertising ecosystem faces major threats from ad fraud caused by artificial display requests or clicks, created by malicious codes, bot-nets, and click-firms. Currently, there is a multibillion-dollar online advertisement market which generates the primary revenue for some of the internet's most successful websites. Unfortunately, the complexities of the advertisement ecosystem attract a considerable amount of cybercrime activity, which profits at the expense of advertisers. Web ad fraud has been extensively studied whereas fraud in mobile ads has received very little attention. Most of these studies have been carried out to identify fraudulent online and mobile ads clicks. However, the identification of individual fraudulent displays in mobile ads has yet to be explored. Additionally, other fraudulent activity aspects such as hacking ad-campaign accounts have rarely been addressed. The purpose of this study is to provide a comprehensive review of state-of-the-art ad fraud in web content as well as mobile apps. In this context, we will introduce a deeper understanding of vulnerabilities of online/mobile advertising ecosystems, the ad fraud’s well-known attacks, their effective detection methods and prevention mechanisms. arabic 8 English 40
Hala Shaari, Nuredin Ahmed(12-2020)
publisher's website

Improving Performance and Progression of Novice Programmers: Factors Considerations

Teaching computer programming is recognized to be difficult and a real challenge. The biggest problem faced by novice programmers is their lack of understanding of basic programming concepts. A visualized learning tool was developed and used by volunteered first-year students for two semesters. The purposes of this paper are: Firstly, to emphasize factors which directly affect the performance of our students negatively. Secondly, to examine whether the proposed tool would improve their performance and learning progression or not. This tool provides many features and enhancement which were presented to students as pre-lecture material. The results of adopting this tool were conducted using a pre-survey and post-survey questionnaire. As a result, students who used the learning tool showed better performance in their programming subject. arabic 9 English 74
Hala Shaari, Nuredin Ahmed(1-2018)
publisher's website

The Effect of Mobility on the Performance of VOIP Application in WiMax Networks

in wireless networks, mobility is an important issue because Internet connectivity can only be effective if it is available during the movement of a node. To enhance mobility, the IEEE802.16e standard has set procedures to design wireless access systems to operate on the move without any disruption of services. The major difference between mobile WiMAX and fixed WiMAX is mobility support. However, speed and trajectory of nodes are unpredictable and can vary even in identical circumstances. In this paper mobile node trajectory is studied under different codecs schemes in order to evaluate the effect of node movement, towards or away from the base-station, on end to end delay, jitter, mean opinion score and throughput of a VoIP application. The results showed that trajectory inward improves network performance since mobile node gets closer to the base-station and hence signal is improved and less power is required. arabic 12 English 67
I. Almerhag, N. Aboalgasem(5-2017)
publisher's website

Effect of Channel Multipath Fading and Node Trajectory on VoIP QoS in WiMAX Networks.

Abstract: In WiMAX networks, the biggest challenge is to overcome the effects of fading especially when nodes are mobile. The multipath nature of channel leads to ISI (Inter Symbol Interference) and the severity of ISI effects increases with bandwidth increase and this might get worse when nodes are moving . The radio link between the Base Station and Service Station/Mobile Station can be a LOS or it can be a NLOS. The environmental objects and features like buildings, weather conditions can severely obstruct NLOS signal. In this paper the effect of pedestrian multipath and node mobility in WiMAX network is studied under different codecs schemes in order to evaluate the effect of multipath channel fading when nodes are moving on the QoS parameters end to end delay, jitter, mean opinion score and throughput of a VoIP application. The obtained results showed that multipath fading with mobile nodes has sever effect on throughput and MOS value for all studied codecs and on the other parameters the effect varies depending on the implemented codecs. arabic 14 English 71
N. Aboalgasm, I. Almerhag , A. Daeri(3-2018)
publisher's website

Performance Analysis of Spoken Arabic Digits Recognition Techniques

A performance evaluation of sound recognition techniques in recognizing some spoken Arabic words, namely digits from zero to nine, is proposed. One of the main characteristics of all Arabic digits is polysyllabic words except for zero. The performance analysis is based on different features of phonetic isolated Arabic digits. The main aim of this paper is to compare, analyze, and discuss the outcomes of spoken Arabic digits recognition systems based on three recognition features: the Yule-Walker spectrum features, the Walsh spectrum features, and the Mel frequency Cepstral coefficients (MFCC) features. The MFCC based recognition system achieves the best average correct recognition. On the other hand, the Yule-Walker based recognition system achieves the worst average correct recognition. arabic 7 English 60
A. Ganoun, I. Almerhag(6-2012)
publisher's website

Agent Based Computing Technique for Epidemiological Disease Modelling

Agent-Based Models (ABM) have become popular as tools for epidemiological simulations due to their ability to model real life phenomena at individual entity levels. ABM is a relatively new area for modelling as compared to the classical modelling methods. Many different fields use agentbased models including ecology, demography, geography, political science and epidemiology. Recently, an abundance of literature has presented applications of agent-based modeling in the biological systems. In this paper, the authors present an agent-based model attempts to simulate an epidemiological disease known as Cutaneous Leishmaniasis (CL). The model is developed to investigate the ability of ABM in modelling a disease that keeps speeding in Libya. The methodology used for describing and designing CL model is derived from nature of the disease mechanism. The ABM model involves three types of agents: Human, Rodent and Sand-fly. Each agent has its own properties, in addition to other global parameters which affect the human infection processes. The main parameter used for monitoring the model's performance is the number of people infected. The model experiments are designed to investigate ABM’s performance in modeling CL disease. Simulation results show that human infection rate is increasing or decreasing dependent on number of sand-fly vectors, number of host rodents, and human population awareness level arabic 7 English 62
Rudwan A. Husain, Hala Shaar, Marwa Solla, Hassan A. H. Ebrahem(3-2019)
publisher's website