المنشورات العلمية لـكلية تقنية المعلومات

احصائيات منشورات كلية تقنية المعلومات

  • Icon missing? Request it here.
  • 25

    مقال في مؤتمر علمي

  • 13

    مقال في مجلة علمية

  • 0

    كتاب

  • 2

    فصل من كتاب

  • 0

    رسالة دكتوراة

  • 0

    رسالة ماجستير

  • 0

    مشروع تخرج بكالوريوس

  • 0

    تقرير علمي

  • 0

    عمل غير منشور

  • 0

    وثيقة

A developed Shadow Agent based on Ad-hoc Routing used to Optimize the Performance of DSR in different Network Environments

Abstract— in this research paper, Dynamic Source Routing were under certain studies from different aspects including a comparison between DSR performance according to different environments and with other protocols. DSR is a well-known ad hoc protocol, which is restricted to small networks. A new developed Agent used to enhance the performance of the DSR. A developed shadow Agent has made a new step forward to solve the problem of routing maintenance. This developed Agent has the ability to control the routing in the network which normally holding a routing table to increase the utilization of the routing protocol. The developed shadow Agent has played a major role to handle the expected dis-connectivity that may happen when the Agent changes its location, arabic 19 English 103
Mohamed Abdeldaiem Abdelhadi Mahboub(6-2014)
موقع المنشور

OPTIMIZATION SEGMENTATION AND CLASSIFICATION FROM MRI OF BRAIN TUMOR AND ITS LOCATION CALCULATION USING MACHINE LEARNING AND DEEP LEARNING APPROACH

The manual detection and classification finding correct location and identifying type of tumor becomes a rigorous and hectic task for the radiologists. Medical diagnosis via image processing and machine learning is considered one of the most important issues of artificial intelligence systems. Deep learning has been used successfully in supervised classification tasks in order to learn complex patterns. The main contributions of this paper are as create a more generalized method for brain tumor classification using deep learning a variety of neural networks were constructed based on the preprocessing of image data., analyze the application of tumorless brain images on brain tumor classification and empirically evaluate neural networks on the given datasets with per image accuracy and per patient accuracy. And also presents an efficient image segmentation using machine learning algorithm with some optimization techniques to detect brain tumors. arabic 19 English 128
Mohamed Abdeldaiem Abdelhadi Mahboub(3-2019)
موقع المنشور

Comparative Study on Inverted File versus Signature File performance in Information Retrieval System used by Arabic Language

Abstract--- In this research paper we have presented a comparison among two Information Retrieval models namely, Inverted file and Signature file for investigating their performance in Arabic Information Retrieval Systems. We have studied both models as to judge the models performance and their effectiveness. arabic 16 English 108
Mohamed Abdeldaiem Abdelhadi Mahboub(2-2015)
موقع المنشور

Comprehensive Study on Query Optimization Techniques used in Data Warehousing

Abstract: In this research review paper, we have introduced our work with a comprehensive study on data warehousing, regarding to its novelty; depending on that, there was an intensive research work, because of its importance and need nowadays, we have reviewed and studied big amount of researches available in the Information Systems research centers around the globe. We have focused on optimization in our comprehensive studies and also on the processes of data warehousing with respect to its updated optimized queries approaches and its vast utilization in the Market. We found that ,the most useful information extracted by using both approaches which have used within new optimized techniques for query-driven approaches, has got potentially effected on the strategies of most successful data warehousing integration models. arabic 9 English 68
Mohamed Abdeldaiem Abdelhadi Mahboub(10-2019)
موقع المنشور

A Developed Secured Model for Searching Into Secured Encrypted Data

Abstract:- Our research paper has presented a new developed model for secured search into a big data of document collections. The developed model has investigated the importance of secured search and also the need for its practices in the real world. We have actually, studied both side of encryption in practical techniques issues and theoretical issues to improve the integration of information retrieval and cryptographic methods used for secured searching. We have chosen 3DES encryption technique to encrypt document data collections. Our new developed secured model has provided an efficient secured searching and/or security and authenticity over all. arabic 9 English 58
Mohamed Abdeldaiem Abdelhadi Mahboub, , (9-2019)
موقع المنشور

An Extensive Study on Online and Mobile Ad Fraud

The advertising ecosystem faces major threats from ad fraud caused by artificial display requests or clicks, created by malicious codes, bot-nets, and click-firms. Currently, there is a multibillion-dollar online advertisement market which generates the primary revenue for some of the internet's most successful websites. Unfortunately, the complexities of the advertisement ecosystem attract a considerable amount of cybercrime activity, which profits at the expense of advertisers. Web ad fraud has been extensively studied whereas fraud in mobile ads has received very little attention. Most of these studies have been carried out to identify fraudulent online and mobile ads clicks. However, the identification of individual fraudulent displays in mobile ads has yet to be explored. Additionally, other fraudulent activity aspects such as hacking ad-campaign accounts have rarely been addressed. The purpose of this study is to provide a comprehensive review of state-of-the-art ad fraud in web content as well as mobile apps. In this context, we will introduce a deeper understanding of vulnerabilities of online/mobile advertising ecosystems, the ad fraud’s well-known attacks, their effective detection methods and prevention mechanisms. arabic 8 English 40
Hala Shaari, Nuredin Ahmed(12-2020)
عرض موقع المنشور

Improving Performance and Progression of Novice Programmers: Factors Considerations

Teaching computer programming is recognized to be difficult and a real challenge. The biggest problem faced by novice programmers is their lack of understanding of basic programming concepts. A visualized learning tool was developed and used by volunteered first-year students for two semesters. The purposes of this paper are: Firstly, to emphasize factors which directly affect the performance of our students negatively. Secondly, to examine whether the proposed tool would improve their performance and learning progression or not. This tool provides many features and enhancement which were presented to students as pre-lecture material. The results of adopting this tool were conducted using a pre-survey and post-survey questionnaire. As a result, students who used the learning tool showed better performance in their programming subject. arabic 9 English 74
Hala Shaari, Nuredin Ahmed(1-2018)
عرض موقع المنشور

The Effect of Mobility on the Performance of VOIP Application in WiMax Networks

in wireless networks, mobility is an important issue because Internet connectivity can only be effective if it is available during the movement of a node. To enhance mobility, the IEEE802.16e standard has set procedures to design wireless access systems to operate on the move without any disruption of services. The major difference between mobile WiMAX and fixed WiMAX is mobility support. However, speed and trajectory of nodes are unpredictable and can vary even in identical circumstances. In this paper mobile node trajectory is studied under different codecs schemes in order to evaluate the effect of node movement, towards or away from the base-station, on end to end delay, jitter, mean opinion score and throughput of a VoIP application. The results showed that trajectory inward improves network performance since mobile node gets closer to the base-station and hence signal is improved and less power is required. arabic 12 English 67
I. Almerhag, N. Aboalgasem(5-2017)
موقع المنشور