Do you want to publish a course? Click here

The ability to search the Web sites has become essential for many people. However many sites have problems in giving the user the needed information. Search operations are typically limited to keyword searches and do not take into consideration the u nderlying semantics of the content.The present technologies support most languages; Though Arabic is still not well supported. One of the main application areas of Ontology technology is semantics. Although there are many tools for developing Ontology’s in many languages, Arabic WordNet seems to be the only one that supports Arabic language. In this paper we will define the necessary steps to develop Arabic Ontology for university sites using Arabic WordNet, and check that the developed Ontology is clean.
There are many methods and suggestions proposed to improve the efficiency of search in order to catch up with the increasing speed of information boom on the web. Most of these proposals are concentrated on term frequency and page rank algorithms a nd yet very few of them focus on semantic relationship of content. The objective of this research project is to provide a semantic relationship model that can be used for semi-structured or unstructured information on the web to help improve the accuracy and efficiency of search engine.
Wireless sensor network have become widely used in many civil and military issues. Like all other network, it is exposed to attacks but its simplicity structured (CPU & memory) prevent the traditional defense technic to be applied, so they need a s pecial for defense. Most security researches focus on data righteousness and privacy, in this research we focus on attacks that aimed to the power resources which are referred as Denial Of Sleep attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the power source to be drained very quickly so that it is a very dangerous attack. In this research we reviewed the sources of energy Loss in wireless sensor network and classified the attacks that target the power resource, we built a simulation module to analysis the B-MAC protocol response to denial of sleep attacks.
According to the large number of the access rules that define the networks, and the dynamic changing of the network topology, that is the verification by hand of the important properties in the network such as reachability, access rules conflict fr ee and loop free is so hard to accomplish by the programmer. Formal specification of systems and protocols is considered one of the most important methods that is used to eliminate the ambiguous of the system configurations and find bugs of its work. A lot of the researches have been introduced in packet reachability and network specification domain, but a little of them are checked and analyzed by model checkers which help to detect the errors of these models. In this paper an abstraction model for dynamic networks specification has been introduced and developed to be appropriate for several important properties of the network such as reachability, no conflict..etc, depending on the network state. The proposed model specification is implemented by TLA+(Temporal Logic of Action) language which is a high level specification language built on Set-theory and First Order Logic, the model has been analyzed and the properties are checked by TLC model checking tool which used by TLA tool. Results show the correctness of the model, and improvement in reducing the response time and the required states to get the result of the verification.
This paper presents a method integrating database with Jgroup based on Hibernate, which is one of Object Relational Mapping tools. We compare between the performance of Jgroup integrated with Hibernate and the performance of RMI integrated with Hibernate. The results show that Jgroup/Hibernate outperforms RMI/Hibernate when the number of clients increases.
In this paper the network specification by logic algebra is presented then the packets are classified into reachable packets and dropped packets according to the current state of the network and flow tables of switches. The model specification is written by TLA+ language which is built on First Order Logic (FOL), and the specification is checked by TLC. This model will help the programmers to detect the network in proactive verification and prove that this configuration meets the global policy of the network.
In this paper we introduce a specification model for the host migration process in Software Defined Network, and for verifying the reachability property for packets that do not change after the migration, and achieve the required modifications to meet the same properties. The model is designed by TLA+ language and verified by TLC which is correlated with it. The model is implemented by few states to meet the required property.
Jgroup integrates the object group paradigm with the distributed object model of Java RMI, providing a platform which is suitable for developing partitionable distributed applications. Jgroup depends on RMI in all its interactions; whether internal for coordination between object group replicas, or external for communicating clients with object group. Because of the dynamic of network which is caused by joining new servers and leaving another ones to object group, or caused by partitioning, Partitionable Group Membership Service tracks this changes to provide each member with a report called view. The view contains a list of members which can communicate and coordinate activities. The advantage of group membership in Jgroup is the ability to continue in providing service in each partition, instead of limiting it in one partition. When partitions merge, State Merging Service of Jgroup constructs a new global consistent state, to reconcile any divergence caused by conflict updates in the different partitions. Group Membership Service is required that a view is installed only after agreement is reached on its composition among the servers included in the view (Agreement On View property). To achieve this property; many of Estimation messages are exchanged between the servers, which causes overhead on the network. This article improves the performance of group membership algorithm which is responsible for achieving the agreement, through allowing for the first server detects the new change in membership to send its estimation to other servers, instead of doing that by each server. Results show that the enhanced algorithm reduces the number of exchanged estimate messages, and takes approximately the same period of time to reach to agreement on view as in the default algorithm.
In the past few years, smart phones developments than just a simple mobile phones to sophisticated computers. This development has allowed for users of smart phones to surf the Internet, receive and send e-mail, SMS and MMS messages and connect to devices to exchange information. And make all these features of the smartphone useful tool in our daily lives, but the same time, make it more useful to attract malicious applications. Knowing that most users store sensitive information on their mobile phones .smart phones are considered desirable scorer attackers and malware developers .And make the need to preserve the security and confidentiality of the data on the Android platform from malware analysis on it is an urgent issue. This research on previous methods to analyze the dynamic behavior of the applications have been approved and adopted a method to detect malware on the Android platform. It was implication the reagent in the context of assembling the effects of the number of users relied on crowdsourcing. We have been testing our frame analysis of the collected data at the central server using two types of data sets: data from the artificial malware have been created for testing purposes and malware incident of life in the world. It turns out that the method used is an effective way to isolate malware and alert users to software that was downloaded.
The Virtualization is the main structure, and the most important component from the others cloud computing components. Due to the features which are produced only from the virtual environment, such as flexibility, cost, energy saving, and the optim al usage of the resources, most business companies and the governments look ahead for deploying their services and applications on virtual severs instead of the physical ones. That point made the researchers heading toward performance comparing through different virtual environments. For reaching the best possible environment which is suitable to be used in the cloud computing, and to get the high performance computing. We described the effect evolution of the virtual environment on the high performance computing as a service, through changing the type of the used virtual environment in the infrastructures. We used the virtual environment XEN-PV ( XEN-Paravirtualization) as an infrastructures for the high performance. Lastly, I used the XEN-HVM (XEN HardWare virtual machine ), XEN is the main hypervisor in Citrix company and the performance has been evaluated by using DRBD as a shared storage of virtual disk. The results of our researches proved that both the virtual environment, and the selected clustering charts have a visible, important role in the performance of the “The high performance computing”.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا