The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with:metaheuristics; optimization ; information technology; cultural heritage; natural language processing; data mining; next generation broadband networks; software engineering and high performance computing.
We present a novel parallel auction algorithm implementation for solving the linear sum assignment problem. It is implemented using the message passing interface (MPI) on a computer cluster. Our approach enables dynamic computational load balancing over all processors throughout all steps of the algorithm's execution. We show that the performance of our approach is superior to existing approaches...
We present an attempt to separate between two kinds of events, using Genetic Algorithms. Events were produced by a Monte Carlo generator and characterized by the most discriminant variables. For the separation between events, two approaches are investigated. First, discriminant function parameters and neural network connection weights are optimized. In a multidimensional search approach, hyper-planes...
Many computing-intensive applications in different domains are benefiting from new High Performance Computing (HPC) architectures such as clusters and computational grids. This experimental study shows the performance results of parallelizing a computing-intensive risk management financial simulator application using the Message Passing Interface (MPI) and running it on two configurations of a dedicated...
Due to the fact that the element of uncertainty, not only, exists, but also significantly affects system performance in many real-world applications. Therefore there is a need for finding powerful techniques to handle such situations. The main objective of this research is to introduce a new version of ant algorithm that can solve the problems, which contain uncertain information or imprecise data...
The main goal of this work was to analyze the network traffic of the University of Dhaka and find out the Hurst parameter to assess the degree of self similarity. For this verification a number of tests and analyses were performed on the data collected from the University Gateway router. The conclusions were supported by a rigorous statistical analysis of 7.5 millions of data packets of high quality...
Automatic Speech Recognition (ASR) is one of the advanced fields of Natural Language Processing (NLP). Recent past has witnessed valuable research activities in ASR in English, European and East Asian languages. But unfortunately South Asian Languages in general and ??Urdu?? in particular have received very less attention. In this paper we present an approach to develop an ASR system for Urdu language...
Malicious botnets have been around for years. Although the information security community has developed many countermeasures for combating botnets, the recent trend of smaller botnets and the rise of super-botnets (i.e., networks of independent botnets) that are more sophisticated and highly resistant to the current countermeasures pose a serious threat to the entire industry. We have conducted a...
The global demand for Internet access services has increased at a notable rate in recent years. The quality of service (QoS) of several real time multimedia applications has become a crucial research topic. One of the challenges to achieve QoS requirements is to determine how to allocate system bandwidth to various applications with the respect of their QoS requirements. In this paper, we proposed...
The main goal of this work is to study and analyze the behavior of the network data traffic of the University of Dhaka and to characterize it by measuring some specific parameters of the self similar traffic model of University of Dhaka (DU). A number of tests and analyses were performed on the data collected from the University of Dhaka Internet Gateway router and both the busy hour traffic and non-busy...
Due to the heterogeneity of the existing platforms, IT Environments became very extremely complex, consequently the communication between the organizations more difficult. The service oriented architecture (SOA) claims that the interactions between different parities will be easier. Moreover after applying SOA on ERP systems there are some issues are raised like performance and modifications issues...
Text Categorization aims to assign an electronic document to one or more categories based on its contents. Due to the rapid growth of the number of online Arabic documents, the information libraries and Arabic document corpus, automatic Arabic document classification becomes an important task. This paper suggests the use of rooting algorithm with Nai??ve Bayes Classifier to the problem of document...
Design of Experiment is becoming a common practice in solving many of engineering problems. In particular, sampling optimization is believed to be a major step in design optimization. Among the sampling methodologies, Latin Hypercube Design, whose efficiency was proven for wide range of applications, the paper addresses its optimization by proposing a multi-objective optimization criteria, which will...
The scheduling and mapping of the precedence-constrained task graphs of parallel programs to processors is considered one of the most crucial NP-complete problems in parallel and distributed computing systems. In this paper, a dynamic task scheduling model based on fuzzy logic is proposed. The main objective of this technique is to improve the fuzzy decision which is used in task scheduling on a network...
This paper presents an event-driven vision system, including a dual-line dynamic vision sensor and a general purpose address-event processor tailored for real-time and highspeed applications. The asynchronous and self-spiking pixels of the dynamic vision sensor are times tamped with high-precision and routed to the processor for flexible and data rate-dependent information processing. The general-purpose...
Internet has emerged as a popular medium of communication, not only for common people but also for criminals. Various modes of covert communication are adopted by such elements. Steganography hides the information in digital images without changing their visual perception. These images can then be transferred over internet, without causing any suspicion to an observer. Steganalysis techniques inspect...
The application of RFID in industry warehouse, monitoring system and personal life brings researchers and engineers to focus on it. RFID has a number of technological challenges. First, electronic architectures must manage large amounts of data and minimize energy consumption. In addition, they must fully implement an integrated software architecture that enables reliable transfer of data by minimizing...
Regression testing is a maintenance activity applied to modified software to provide confidence that the changed parts are correct and that the unchanged parts have not been adversely affected by the modifications. Regression test selection techniques reduce the cost of regression testing, by selecting a subset of an existing test suite to use in retesting modified programs. This paper presents the...
In Egypt and in many developing countries, there is a high level of unemployment among youth with high and middle diplomas but with limited IT and computer programming skills or with limited ability to readjust to market changes and new work requirements. This is sometimes attributed to a psychological barrier (e.g., fear or intimidation) to IT and computer programming. In this paper, we study the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.