Kamran Khan

Techniques of Wireless Intrusion Detection System: T-WIDZ

Introduction Information held by IT products or systems is a critical resource that enables organizations to succeed in their mission. Additionally, individuals have a reasonable expectation that their personal information contained in IT products or systems remain private be available to them as needed, and not be subject to unauthorized modification.¹ It is very important that the security mechanisms of …

Read More »

Heat Transfer Between Impinging Circular Air Jet and Finned Flat Plate and Validation of Results Using Artificial Neural Network

Introduction Impinging jets have received considerable attention due to their inherent characteristics of high rates of heat transfer besides having simple geometry. Various industrial processes involving high heat transfer rates apply impinging jets. Heat transfer rates in case of impinging jets are affected by various parameters like Reynolds number, nozzle plate spacing, radial distance from stagnation point, Prandtl number, target …

Read More »

Content-Based Image Retrival in the World Wide Web

Introduction The World Wide Web contains a great quantity of image and other visual information4 such as videos, movies, and comic strips, that may belong to structured collections (e.g., museum collections) or be independent (e.g., images found in Web pages in the form of individuals photographs, logos, and so on). Considering this enormous amount of visual information unorganized, without efficient …

Read More »

Study Recycling of Plastic and Crts From Electronic Waste

Introduction Electronic products are made from valuable resources, including precious and other metals, engineered plastics, glass, and other materials, all of which require energy to source and manufacture. Many electronic products also contain parts that could be profitably refurbished and reused with little effort. Recycling reduces the need for landfills and other disposal facilities. In addition, throwing away old electronic …

Read More »

Optimized Binary Merge Coding for Lossless Image Compression

Introduction The History of spatial image data compression started probably about a half of century ago with the works on predictive coding and variable length codes. The technological breakthrough that took place in 60’s, 70’s and 80’s resulted in efficient compression algorithms8,3 that have been standardized in early 1990’s and currently are in common use together with the improvements achieved …

Read More »

A Survey of MANET Reactive Routing Protocols Under Different Mobility Models

Introduction A mobile ad hoc network (MANET) is an autonomous system of mobile hosts connected by wireless links. There is no static infrastructure such as base stations. Each node in the network also acts as a router, forwarding data packets for other nodes. Any number of people could conceivably enter a conference room and agree to support communication links6 between …

Read More »

Artificial Neural Network Based Hybrid Algorithmic Structure for Solving Linear Programming Problems

Introduction Linear programming (LP) is one of the most important techniques used in modeling and solving practical optimization problems that arise in industry, commerce, and management. Linear Programming Problems are mathematical models used to represent real life situations in the form of linear objective function and constraints various methods are available to solve linear programming problems. When formulating an LP …

Read More »

Wireless Mesh Networks – Reliability and Flexibility

Introduction Most of the traditional wireless systems, such as cellular telephone networks and wireless local area networks (WLAN), use either point-to-point or point-to-multipoint network topologies. Recently, however, a new wireless network topology, mesh topology, has emerged with the increasing use of wireless sensor networks (WSN) in industrial applications. Sensor networks are capable of providing local intelligence by sharing information about …

Read More »

Effect of Surface Area on the Electronic Parameters of Vacuum Deposited Bismuth-Silicon Junctions

Introduction Advances had been made over the years in the study of metal-semiconductor contacts and their numerous importance in modern technology. Metal-semiconductor contacts have very wide applications which include, the fabrication of devices such as infrared detectors, bipolar transistors, opto-electronic devices, lasers and Schottky diodes (Nur et al; 1996; Bosol et al, 1981; Robert et al, 1981; Qu and Stafsudd, …

Read More »

Approaches in RSA Cryptosystem Using Artificial Neural Network

Introduction The science of encrypting and decrypting messages by using mathematic to achieve information secrecy is Cryptography which enables us to store or transmit the sensitive information via an insecure channel (i.e. internet) that cannot be read and understood by anyone except the intended recipient. A simple cryptosystem consists of a plain text, cipher text, an encryption key, encryption algorithm, …

Read More »

Data Mining Analytics for Business Intelligence and Decision Support

Background We are seeing today widespread and explosive use of database technology to manage large volumes of business data. The use of database systems in supporting applications that employ query based report generation continues to be the main traditional use of this technology. However, the size and volume of data being managed raises new and interesting issues. Can we utilize …

Read More »

Delay Adjust Mac Protocol for Energy Efficiency in Wireless Sensor Networks

Introduction In Wireless Sensor Networks (WSNs)¹ nodes are usually operated by batteries and left unattended after deployment. Considering the limited power sources of nodes, such as batteries whose recharge or replacement is difficult or impossible, energy consumption is a vital point, and it occurs in three states: sensing, data processing, and communication. Communication among nodes is the major consumer of …

Read More »

Coping and Limitations of Genetic Algorithms

Introduction GA’s were introduced as a computational analogy of adaptive systems. They are modeled loosely on the principles of the evolution via natural selection, employing a population of individuals that undergo selection in the presence of variation-inducing operators such as mutation and recombination (crossover). A fitness function is used to evaluate individuals, and reproductive success varies with fitness. The Algorithms. …

Read More »

Brain Gate Technology

Introduction The main concept behind this technology is the idea of implanting tissue microelectrodes known as cortical neural prosthetics (CNPs) into specific portions of the brain to permit the recording of electrical signals sent from both the surface of the brain and within the cerebral cortex region. The motor cortex is chosen as the location to implant the device because …

Read More »

Using UML for Automatic Test Generation

Introduction Software systems are extremely complex; the amount of information contained in a system implementation is more than we can hope to comprehend. The same is true of the natural world that surrounds us, and we cope with it in exactly the same way: by creating a suitable model of the system, and working with that. The suitability of a …

Read More »

Toward a Model of M-Learning for Enhancing Dissemination of Information Among Nigerian Farmers

Introduction E-learning offers new methods for education based on computer internet technology. M-learning is the intersection of mobile computing and e-learning (Quinn, 2000); M-learning has the ability to learn everywhere at every time without permanent physical connection to cable networks. In Nigeria, farmers in the rural areas do not have access to information that will improve their farming methods because …

Read More »

The Electronic College: A Study of the Effectiveness of Electronic Management Systems Within Colleges

Introduction Electronic Management Systems (EMS) gained huge popularity in recent years due to the important role they play in simplifying managerial tasks and improving performance efficiency. Benefits of EMS include human error reduction, reduction in time required for task completion, and easier information retrieval, to name a few. King Abdul Aziz University (KAU) is a leader in the use of …

Read More »

Failures of Network Security Utilities

Introduction Networking is to secure the confidential data of the user from the other users. Lot many threats challenging the network security systemat every moment. For this reason, to increase the security for the system user installs different security systems. These security utility failures arereported most frequently due to wrongly motivated human activities or powerful threat enter into the system, …

Read More »

Multi-User Communication Through Ambient Intelligence Devices Using H. 323 Protocol

Introduction Now-a-days Technology becomes embedded in everyday objects such as furniture, clothes, vehicles, roads and smart materials, and people are provided with the tools and the processes that are necessary in order to achieve relaxing interactions with this environment. Every new technology is manifested with objects that realize it. These objects may be new or improved versions of existing objects, …

Read More »

An Intelligent System for the Characterization of Hyperlipidemic Blood and a Comparative Study on the Efficacy of Statins

Introduction Hyperlipidemia is a risk factor for coronary heart disease (CHD). Clinical studies have shown that lowering elevated serum total cholesterol levels(TC) and particularly low density lipoprotein cholesterol(LDL) levels, reduces the frequency of coronary morbidity and deaths, whereas high serum level of high density lipoprotein cholesterol (HDL) protect against CHD. Therefore hyperlipidemic blood has to be identified and lipid level …

Read More »

Cell Phone as a Portable Storage Device and Beyond

Introduction In existing network conditions, different kinds of connection sessions are available for today high speed network operation. The examples of these network sessions are client to client sessions, client to server sessions, peer to peers sessions, and so on. There are differences among these methods of network session operations. Regarding the remote session, the remote desktop from microsoft windows …

Read More »

An Optimized Call Routing Technique Using Session Initiation Protocol

Introduction ICR is implemented by maintaining a schedule in the server of the service provider. A database has to be maintained by the service provider inorder to load the schedules of its customers. Whenever a call reaches the proxy server, the server checks the database and routes the call to the location specified in the schedule of the user. The …

Read More »

Data Warehousing Practices in Business Initiatives

Introduction A diverse retailing company was experiencing the usual growing pains of the middle 1990’s. The diversity of businesses supported by multiple business units and the company’s Information Technology organization had resulted in “stove-pipes” of data, along with corresponding computer applications, which were built over several years. The data in these legacy systems were not easily accessed, causing difficulty in …

Read More »

An Algorithm for Effective Web Crawling Mechanism of a Search Engine

Introduction Search Engines A search engine is a program designed to help one access files stored on a computer, for example a public server on the World Wide Web². Unlike an index document that organizes files in a predetermined way, a search engine looks for files only after the user has entered search criteria¹. A search engine reference model Most …

Read More »

Simulation of Flat Rolling and Analyzing of Rolling Pressure Profile

Introduction One of the most important methods of metals forming process is rolling, with high production tonnage and high velocity. The production capacity of rolling process is more than all other processes in industry¹. Rolling is a continuous process and has been divided to two types. The first process is called caliber rolling, which is used for rolling of square …

Read More »

Evaluating the Impact of Internet on Research in Nigeria

Introduction The internet can be conceived as a rich, multi-layered, complex, ever-changing textual environment. The internet provides several opportunities for the academia. It is a mechanism for information dissemination and a medium for collaborative interaction between individuals and their computers without regard for geographic limitation of space (Okerson, 1991; Singh, 2002). It is a ‘live’, constantly ‘moving’, theoretically borderless, potentially …

Read More »

On the structural property of two symmetrical N2O2-coordination Schiff base compounds

Introduction There has been considerable activity concerning the synthesis of Schiff base ligands. These compounds have significant importance in chemistry; especially in the development of Schiff base complexes, because Schiff base ligands are potentially capable of forming stable complexes withmetal ions1-6. Some imines or Schiff base compounds and their metal complexes are also noted for their significant antimicrobial activities7, 8 …

Read More »

Improving on the Smoothing Technique for Obtaining Emission Probabilities in Hidden Markov Models

Introduction Hidden markov modeling is a powerful statistical learning technique with widespread application in various areas (Rabiner and Juang,1986). Hidden Markov models (HMMs) have been shown to achieve good performance when applied to information extraction tasks in both semistructured and free text. The main advantage of HMMs in language modeling is the fact that they are well suited for the …

Read More »