admin

HANDWRITTEN IDENTIFICATION TECHNIQUE BASED ON WAVELET TRANSFORM

للكاتبين : Ali Hadi Hussein1, Ashor Al Sellami2 1High Vocational Comperhensive Institute Bengashier Tripoli – Libya 2Faculty of Engineering -Al Fateh University -Tripoli – Libya ABSTRACT In this work, a system that has the ability to recognize and identify persons from their handwriting is designed. Wavelet transform algorithm was utilized to analyze the individual characters of certain person's writing. Complex …

أكمل القراءة »

AUTO-THERMAL AMMONIA SYNTHESIS REACTOR DESIGN OPTIMIZATION USING SIMULATED ANNEALING TECHNIQUE

للكاتبين : Mostafa A. khalik1, M Sherif, S Saraya, F Areed2 1 Mubarak City for Scientific Research and Technology Applications 2 Computers & Systems Dept, Faculty of Engineering, Mansoura University ABSTRACT: Simulation of an auto-thermal ammonia synthesis reactor is our task in this paper. We are interested mainly in determining the length of the reactor which has a great impact …

أكمل القراءة »

ADAPTIVE CACHE INVALIDATION REPORT ALGORITHM BASED ON ADAPTIVE WINDOW(AIRA-AW) FOR CONNECTION AND RECONNECTION PERIODS IN MOBILE ENVIRONMENT

للكاتبين : Ali I. El-Desouky, Hesham A. Ali, Engy A. El-Shafaiy Computers and Systems Department, Faculty of Engineering, Mansoura University, Egypt ABSTRACT The basic cache consistency strategy is the use of periodic invalidation reports (IRs) broadcast by the server. Recently, the addition of updated invalidation reports (UIR) has been proposed. The IR+UIR scheme achieves a much shorter query delay than …

أكمل القراءة »

INSURING LOCALITY: A LOAD BALANCING PROTOCOL FOR FULLY REPLICATED SYSTEM

للكاتبين : Al Metwally M. Mostafa1 , Nehad Mohamed2 , . Hany Harb1 1Systems & Computers Engineering Department-Faculty of Engineering – Al Azhar Univers 2Senior software Engineer -First Engineering & Software Systems ABSTRACT The distribution of data via replication within or between organizations is crucial for many applications. Such a distribution may be transparent, as it is embodied in distributed …

أكمل القراءة »

END TO END QOS BASED ONMPLS AND DIFFSERV

 للكاتب : F. Bayoumi ABSTRACT With the deployment of electronic services such as e-learning, e-business, etc, through the Internet, there is a great need to guarantee the provided Quality of Service (QoS). An underlying IP-based network provides no preferential treatment to IP packets. Traffic Engineering (TE) enhances the performance and utilization of an operational network at both the traffic and …

أكمل القراءة »

A CONCURRENT GARBAGE COLLECTOR STRATEGY FOR REAL TIME

   للكاتبين : Ali Ebrahim El Desokey1, Aida Abd El Gawad1, Amany Sarhan2, Seham Moawed3 1 Faculty of Engineering, Mansoura University, Egypt 2 Faculty of Engineering ,Tanta University, Egypt 3East Delta Company For Electricity, Egypt, ABSTRACT Due to the importance of garbage collection mechanism, especially in real-time systems, a lot of effort had been done. Meanwhile, concurrent garbage collection based …

أكمل القراءة »

A DESIGN OF A DATABASE MODEL FOR ELECTRICAL DISTRIBUTION SYSTEMS

للكاتبين : Abd El- Wahab A Abd El- Wahab, Mohamed Farid zaghlool And Hisham Al said Al Harmeel Systems & Computers Engineering depertment. Faculty of engineering, Al – Azhar University   ABSTRACT The processes of representation and analysis of electrical power distribution systems have become more and more complex. The present work aimed to find a solution for this problem …

أكمل القراءة »

BUILDING MOBILE AGENT-BASED SYSTEM FOR GIS

للكاتبين : Ashwaq Omar Maghraby , Mostafa S. Saleh and Fathy E. Eassa Faculty of engineering- Cairo University – Cairo Egypt ABSTRACT A Geographic Information System (GIS) is an important distributed information resource. GIS technology is being utilized in many areas of research. Based on the concept of agent, we introduce a multi-agent architecture to develop a GIS Multi-Agent System …

أكمل القراءة »

DESIGN OF A SECURE WEB –APPLICATION DEVELOPMENT LANGUAGE

للكاتبين : Doaa Hassan1, Sherif El-Kassas2, Ibrahim Ziedan3 1 Department of computer and Systems, National Telecommunication Institute 2 Department of computer science, American University in Cairo 3 Department of computer and Systems, Zagazig University ABSTRACT The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is …

أكمل القراءة »