Efficient Genetic-Wrapper Algorithm Based Data Mining for Feature Subset Selection in a Power Qualit
Multilayer Neural Network-Burg Combination
for Acoustical Detection of Buried Objects
1Faculty of Engineering Technology, Zarqa Private University, Jordan
2Faculty of Engineering, Philadelphia University, Jordan
Abstract: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line holography is used to increase the ratio of the signal to noise due to the effect of concealing media that decreases the value of the received signal. The performance is enhanced by using multilayer neural network for noise reduction. The aim of using multilayer neural network is to extract the essential knowledge from a noisy training data. Theoretical and experimental results have showed that preprocessing the noisy data with multilayer neural network will decrease the effect of noise as much as possible. Applying the enhanced data to spectral estimation methods has improved the performance of the model. A comparison is made for the two cases: with and without application of neural network for different values of signal to noise ratio. Also, the performance is investigated for different numbers of samples.
Keywords: Multilayer neural networks, holographic imaging, burg method, and modelling.
A Performance Comparison of MD5
Authenticated Routing Traffic with
EIGRP, RIPv2, and OSPF
1Department of Computer Science and Engineering College of Engineering, Qatar University, Qatar
2Department of Computer Science, Faculty of Information Technology, Malaysia
Abstract: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we conduct performance evaluation comparisons on message digest 5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. A network model of four Cisco routers has been employed with an ON/OFF traffic model used to describe text files transmissions over the network. Eventually, analysis tool has been developed and used to measure the average delay time and average jitter. The collected results show that the average delay time and jitter in the secured message digest 5 case can become significantly larger when compared to the non-secured case even in steady state conditions. Among all, the secured OSPF protocol shows the highest performance even when the system is extremely overloaded.
Keywords: Performance, MD5, EIGRP, RIPv2, and OSPF.
A Novel Radon-Wavelet Based OFDM
System Design and Performance Under
Different Channel Conditions
EE Engineering Department, Tafila Technical University, Jordan
Received April 8, 2009; accepted August 4, 2009
Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier
1Department of Mathematical & Computer Science, Al Menoufia University, Egypt
2Department of Computer Science, Al Menoufia University, Egypt
3Faculty of Computing Studies, Amman Arab University for Graduate Studies, Jordan
Keywords: Neuro-Identefier, classical cipher, stream cipher, black box, emulation, and cryptanalysis.
Received May 27, 2008; accepted September 1, 2008
Implementation of a Speech Coding
Strategy for Auditory Implants
Signal Processing Laboratory, Engineering Faculty of Tunis, Tunisia
Keywords: Cochlea prosthesis, stimulus, gammatone filter, gammachirp, and speech coding.
Received February 8, 2009; accepted May 27, 2009
Improving Web Services Security Models
Al-Balqa' Applied University, Jordan
Keywords: Web services, WSRP, single-sign-on, security, and e-contract.
Received July 23, 2008; accepted May 17, 2009
2009 Index
The International Arab Journal for Information Technology Vol. 6
Evaluation of Text Clustering
Methods Using WordNet
1EEDIS Laboratory, Department of Computer Science, UDL University, Algeria
2Department of Computer Science, UTMS University, Algeria
3IN3S, Joseph Fourier University, France
Received February 24, 2009; accepted August 3, 2009
A Modified High Capacity Image Steganography Technique Based on Wavelet Transform
1Department of Electrical Engineering and Electronics, University of Liverpool, UK
2Department of Computer Engineering, Nahrain University, Iraq
Received August 17, 2008; accepted August 3, 2009
Brightness Preserving Image Contrast Enhancement using Weighted Mixture of Global and Local Transfor
Brightness Preserving Image Contrast Enhancement using Weighted Mixture of Global and Local Transformation Functions
1Department of Computer Engineering, Kyung Hee University, Korea
2Industrial and Management Engineering Division, Hankuk University of Foreign Studies, Korea
Received March 29, 2009; accepted August 4, 2009
JAM: Justifiable Allocation of Memory with Efficient Mounting and Fast Crash Recovery
for NAND Flash Memory File Systems
School of Information and Computer Engineering, Ajou University, Korea
Received December 18, 2008; accepted July 26, 2009
An Algorithm for Diagnosis of the Three
Kinds of Constitutional Jaundice
School of Information Science and Engineering, Central South University, China
Received May 19, 2009; accepted August 3, 2009
Framework for Intrusion Detection in
IEEE 802.11 Wireless Mesh Networks
1School of Engineering and Design, Brunel University, UK
2Kohat University of Science and Technology, Pakistan
3Gomal University, Pakistan
Received May 12, 2009; accepted August 3, 2009
Hybrid Computing Algorithm in
Representing Solid Model
Muhammad Matondang and Habibollah Haron
Department of Modeling and Industrial Computing, Universiti Teknologi Malaysia, Malaysia
Abstract: This paper presents an algorithm, which is a hybrid-computing algorithm in representing solid model. The proposed algorithm contains two steps namely reconstruction and representation. In the reconstruction step, neural network with back propagation has been applied to derive the depth values of solid model that was represented by the given two-Dimensional (2D) line drawing. And then in the representation step, once the depth value was derived, the mathematical modeling was used to generate the mathematical models to represent the reconstructed solid model. The algorithm has been tested on a cube. Totally, there are eighty-three cubes has been used on the development of neural network model and six mathematical equations yielded to represent each one cube. The proposed algorithm successfully takes the advantages of neural network and mathematical modeling in representing solid model. Comparison analysis conducted between the algorithm and skewed symmetry model shows that the algorithm has more advantages in term of the ease of the uses and in simplifying the use of mathematical modeling in representing solid model.
Keywords: Solid model, reconstruction, representation, neural network, mathematical modeling, and hybrid computing.
Measurement of V2oIP over Wide Area
Network between Countries Using
Soft Phone and USB Phone
Mohd Ismail
Department of MIIT, University of Kuala Lumpur, Malaysia
Abstract: In this research, we propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly can give a great financial benefit over traditional telephony. Therefore, this study is to analyze the V2oIP and investigate the performance areas evolved with the quality of service delivered by video phone system over LAN and WAN. This study focuses on quality of voice and video, packet loss, delay time and jitter through the USB video phone and soft phone over LAN and WAN. In this study, network management system is used to monitor and capture the performance of V2oIP between LAN and WAN. In addition, the most apparent of implementing soft phone and USB video phone platform is to define the best achievement between LAN and WAN that can be used in operational environment. Based on the finding result, it shows that users may experience V2oIP quality service degradations due to delays and losses in WAN compare to LAN.
Keywords: V2oIP, jitter, delay, packet loss, CPU, LAN, WAN, and NMS