Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of...
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire...
Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic extraction...
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of...
Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block...
Grid platforms serve a wide range of activities in life sciences, bioinformatics, engineering, healthcare and other industries. This paper identifies the key bioinformatics and healthcare computing models and services on grid initiatives and classifies and describes their current use in the industry. Based on what has been reported by the literature, the paper identifies eight key areas of interests...
Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main...
Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his...
Recently the number of accidents and crimes are arising in many big cities. Mobile applications with location aware systems can be utilized in providing location information of the crime. The problem is that location information provided by mobile phones has not been fully utilized. Mostly mobile phones used for its main functions which are for calling and messaging. This paper argues that location...
This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the...
Recently, online character recognition approaches aregotten attention everywhere due to the raped growing of touch screen devices industry. Furthermore, keyboards and mice devises become inapplicable to be included in small devises. These reasons would open the gate for discovering new techniques which can enrich and enhance this kind of approaches. These online approaches can be used for recognizing...
Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance and dynamic communication performance using wormhole (WH) flow control of TTN has already been studied earlier and shown to be good than that of other networks. In this paper,...
This paper proposes a conceptual framework forowner- contractor relationship and time-cost trade-off analysisof construction project control system using fuzzy logicapproach. Construction projects require a well-definedstarting point and well-defined finish point with accurateresource allocation to avoid any cost overrun. During thelifecycle of the project, different problems can appear. Themost important...
Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used...
Searchable Encryption(SE) schemes allow users to perform keyword search on encrypted data without leakage of the sensitive information. Most of the existing SE schemes are limited to single-user setting or multi-user setting with coarser-grained access control. However, the application that multiple users with different access rights to the sharing data is more practical under the cloud environment...
User satisfaction is the key of success for any company to succeed and flourish business. Due to tremendous competition among service providers in the online sectors, many competitors feel threaten to be marginalized and loose competitive edge, and so is the profit margin. For many companies to survive business in a highly completive environment, user satisfaction may be such factor to achieve lead...
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.