sayed nouh - Academia.edu (original) (raw)
IJCSIS Papers by sayed nouh
An online blogs provide facility to its users to write and read text-based posts known as "articl... more An online blogs provide facility to its users to write and read text-based posts known as "articles". It became one of the most commonly used social networks. However, an important problem arises is that the returned articles, when searching for a topic phrase, are only sorted by recently not relevancy. This makes the user to manually read through the articles in order to understand what are primarily saying about the particular topic. Some strategies were developed for clustering English text but Arabic text clustering is still an active research area. A major challenge in article clustering is the extremely high dimensionality. In this paper we proposed the new method for features reduction using stemming, (Arabic WordNet) (Arabic Word Net) dictionary and Arabic diacritics, Also, new method in measuring similarity by using (Arabic WordNet) relations to enhance accuracy of clustering.
Papers by sayed nouh
Journal of Al-Azhar University Engineering Sector, Sep 30, 2023
International journal of computer networks and applications, Dec 26, 2023
Zede Journal, 2009
Mobile Agent computing is a paradigm of distributed computing, that has generated considerable ex... more Mobile Agent computing is a paradigm of distributed computing, that has generated considerable excitement in the research community. Despite that, it has not been translated into a significant number of real-world applications due to a new dimensionality of security problem it brings along with it. In this paper familiarization to Mobile Agent technology and threat of hostile host towards a visiting agent is given due diligence: Malicious host problem. The threats are identified and a modified mobile computing model is proposed to prevent some of the threats. A prototype that realizes the concept is implemented using IBM's Mobile Agent platform, Aglets.
Zede Journal, 2009
Three new variants of continuum-based models for an elastic subgrade are proposed. The subgrade i... more Three new variants of continuum-based models for an elastic subgrade are proposed. The subgrade is idealized as a homogenous, isotropic elastic layer of thickness H overlying a firm stratum. All components of the stress tensor in the subgrade are taken into account. Reasonable assumptions are made regarding the depth-wise variation of the vertical shear stress components and of the horizontal-to-vertical normal stress ratios to simplify mathematical work. The assumptions are based on observation of available analytical results of stress distributions and on knowledge of lateral earth pressure theories. The resulting differential equations are similar in form and order to a high-order model developed earlier by Reissner based on a number of simplifying assumptions, but with different coefficients dependant on Poisson ratio. With the help of appropriately selected mechanical models, it has been shown that all of the new model variants consistently give larger effective vertical stiffn...
Zede Journal, 2011
Most of the secret key encryption algorithms in use today are designed based on either the feiste... more Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full period pseudo random multiplicative LCG. Then, multi-scroll chaotic attractors are generated using a hysteresis switched, second order linear system. The bits of the image of the chaotic attractors are mixed with a plaintext to obtain a ciphertext. The plaintext can be recovered from the ciphertext during the deciphering process only by mixing the cipher with a chaos generated using the same secret key. As validated by a functional, NIST randomness, and Monte Carlo simulation tests, the cipher is very much diffused and not prone to statistical or selected cipher attacks. In addition, the performance is measured and analyzed using such metrics as encryption time,...
Zede Journal, 2011
Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime ... more Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their energy consumption. The proposed solution is based on incorporating energy information into Greedy Perimeter Stateless Routing (GPSR) Protocol. The proposed solution performs better in energy consumption, network lifetime and packet delivery ratio, with a performance gain of Network Lifetime 45.9% - 78.69%. However, the performance is comparatively low in average delay because of computational complexity. Key Words: Wireless Sensor Networks, GPSR protocol, Geographical routing protocol, `Energy aware routing protocol
Journal of Al-Azhar University Engineering Sector, 2020
Vehicular Ad Hoc Networks (VANETs) are networks that deal with transferring data between moving v... more Vehicular Ad Hoc Networks (VANETs) are networks that deal with transferring data between moving vehicles in order to avoid accidents and to provide journey comfort and traffic safety. Like all other networks it is subjects to vulnerable attacks, hence, security is a hot topic to consider. This article provides a review on the researches and publications focusing on how to secure the communication between vehicles while transferring the data. Different attacks could take place within the communication scenario; the most harmful of them is Sybil attack. Therefore, in this paper, we shed lights on the researches dealing with the different types of attacks with a focus on Sybil attacks. Sybil detection and defense techniques and methodologies are reviewed in more details.
Mobile Ad Hoc Network (MANET) have many complex problems, one of this problems is routing. The ma... more Mobile Ad Hoc Network (MANET) have many complex problems, one of this problems is routing. The main sources of routing complexity come from nodes mobility, limited power source and bandwidth, and jamming that lead to frequent changed topology of network. Many research articles have been done to mitigate the effect of the dynamic topology on the route stability among nodes of network. One of the well-known routing protocols of MANET is Dynamic Source Routing protocol (DSR). It is reactive routing scheme, where the route is selected based on the minimum hop counts, as a metric, between the source and destination node. In this context, most research papers showed that the route selection based on minimum hop counts, as a criteria, have little positive effect on the route stability of DSR protocol. Therefore, there are various enhancements have been carried out on the original DSR protocol to obtain more stable routes among the nodes in the dynamic environment of MANET. This paper prese...
Journal of Al-Azhar University Engineering Sector, 2021
Vehicular ad-hoc network (VANET) are designed to aid in avoiding many of the traffic problems, su... more Vehicular ad-hoc network (VANET) are designed to aid in avoiding many of the traffic problems, such as accidents, traffic jams, traffic status broadcast, etc. This article proposes two possible configurations as VANET applications to aid in solving two traffic issues namely, parking, and after-accident management. These two models of VANET are designed with the objective of improving traffic fluidity. However, VANETs are special types of Mobile Ad Hoc Networks (MANETs) with moving nodes (Vehicles) and stand still nodes Roadside Units (RSUs). Likewise, all MANETs. The network nodes can move freely within the network coverage yet stay connected. Therefore, VANETS are subject to vulnerable attacks. Sybil attacks are the most threatening VANET attacks that may lead to death. Therefore, this article proposes a three-stage technique for detection, prevention, and avoidance of Sybil attacks. It also presents a methodology for analyzing the algorithms of VANET applications to identify predi...
Critical MANET environments such as military battlefields and disaster recovery operations impose... more Critical MANET environments such as military battlefields and disaster recovery operations impose a number of requirements (such as the need for robustness and performance within a high mobility scenarios), and constraints (such as Hostile attacks, RF range and cost, battery limitations). Many studies proved that PUMA (Protocol for Unified Multicasting through Announcements) is superior compared to other multicast and core-based routing protocols like DCMP, MAODV and ODMRP where in addition to providing the lowest control overhead compared to ODMRP and MAODV, PUMA provides a very tight bound for the control overhead [1]. So we studied PUMA and its drawbacks while working in critical MANETs which leaded us to propose a novel routing protocol named Adaptive Secure Headship Following Induction Keeping (ASHFIK) to work ideally in critical MANETs scenarios.In this paper we discuss the structure of ASHFIK which uses a new mechanism called the Headship Mechanism which provides always a sta...
Mobile ad hoc networking is a concept in computer communications, which means that if users want ... more Mobile ad hoc networking is a concept in computer communications, which means that if users want to communicate with each other, they can form a temporary network with out any pre-existing communication infrastructure. Each node participating in the networks acts as host and router in order to transmit, receive and forward packets. In mobile ad hoc networks [MANETs], the wireless mobile nodes may dynamically enter the network as well as leave the network. Due to the dynamic nature of MANET, nodes are typically distinguished by their high degree of mobility and route failure due to frequent link breakages, which affects the end-to-end transmission of data. In order to increase the reliability of data transmission and to reduce delay due to route recomputation, some routing protocols, such as Temporally Ordered Routing Algorithm (TORA), maintain multiple routes between a senderreceiver pair, and use multi-path route to transmit packets. In such a case, packets coming from different pa...
E-learning offers advantages for E-learners by making access to learning objects at any time or p... more E-learning offers advantages for E-learners by making access to learning objects at any time or place ,very fast, just-in-time and relevance, However, with the rapid increase of learning objects and it is syntactically structured it will be time-consuming to find contents they really need to study, in this paper we design and implementation of knowledge-based industrial reusable, interactive web-based training and use semantic web based e-learning to deliver learning contents to learner in flexible, interactive, adaptive way. The semantic and recommendation and personalized search of Learning objects is based on comparison of the learner profile and learning objects to determine a more suitable relationship between learning objects and learner profiles. Therefore, it will advise the e-learner with most suitable learning objects using the semantic similarity.
International Journal of Management, Technology, and Social Sciences, 2018
E-learning offers advantages for E-learners by making access to learning objects at any time or p... more E-learning offers advantages for E-learners by making access to learning objects at any time or place, very fast, just-in-time and relevance. However, with the rapid increase of learning objects and it is syntactically structured it will be time-consuming to find contents they really need to study.In this paper, we design and implementation of knowledge-based industrial reusable, interactive web-based training and use semantic web based e-learning to deliver learning contents to the learner in flexible, interactive, and adaptive way. The semantic and recommendation and personalized search of Learning objects is based on the comparison of the learner profile and learning objects to determine a more suitable relationship between learning objects and learner profiles. Therefore, it will advise the e-learner with most suitable learning objects using the semantic similarity.
International Journal of Computer Networks And Applications, Oct 30, 2017
This article presents a framework for performance comparison between Long Term Evolution (LTE) an... more This article presents a framework for performance comparison between Long Term Evolution (LTE) and WiMAX technologies, depended on link level simulation, under different conditions (e.g. a mixture of channel models and modulation coding schemes (MCS)). Two performance metrics have been used: throughput against SNR for both downlink (DL) and uplink (UL) and block error rate (BLER) against SNR for both DL and UL. Simulation results, conducted in network simulator OPNET Modeler ver. 17.1, show that the throughput and the BLER increases as the MCS increase (i.e. MCS=5, 15, 24).
The Egyptian Journal of Language Engineering, Sep 23, 2019
Careful learning and understanding of Arabic content are extremely important because of its conti... more Careful learning and understanding of Arabic content are extremely important because of its continuous growing. There are many types of text learning. It includes summarization, translation, and classification. The choice of the Arabic language in this research came from the lack of modern research such as deep learning. Although deep learning of Arabic is not a goal in this research, the main goal was to remove ambiguity in the Arabic language, since Arabic has more words than meaning, according to diacritics and the grammar of the text. The research idea is based on deep text learning, text analysis and removing of the ambiguity. In this paper, we proposed a new method for Arabic text learning by using deep learning methods. we use in this method the learning word vectors as weights by using 2000000-word vectors. The language model and the word analysis were also used to analyze the text and to detect the ambiguous words. Additionally, the learning results from the deep learning were compared with other researches of text from an accuracy perspective.
International Conference on Aerospace Sciences and Aviation Technology, 1995
A potential problem with DQDB network is the achievement of fair sharing of bandwidth in terms of... more A potential problem with DQDB network is the achievement of fair sharing of bandwidth in terms of the location of the access node. For the sake of compensating this unfairness, the IEEE 802.6 Standard recommends to utilize a Bandwidth Balancing (BWB) Mechanism. This paper deals with the implementation of BWB mechanism using the modified DQDB method. We focus on the behavior of this protocol when the network is Heavy load. The effect of BWB mechanism on the fairness problems suffered by a DQDB network with two stations for three different scenarios is investigated analytically through using a graph model which is based on the space time diagram. Simulation is used when the number of active stations is larger than two. Our results provide a deep insight into the equilibrium access of data channel by all the active stations. They also show that the station throughputs are independent on the state of the network when overload occurs.
International Journal of Computer Networks And Applications, 2018
Mobile Ad Hoc Network" (MANET) is composed of a set of wireless mobile nodes, it is a self-organi... more Mobile Ad Hoc Network" (MANET) is composed of a set of wireless mobile nodes, it is a self-organized environment which does not need any infrastructure. The topology of this type of network is formed dynamically and the mobility feature of the nodes causes rapid, unpredictable and frequent network topology changes. All nodes in this network are mobile in nature and driven by batteries, that could cause link breakage if a battery of a node goes empty. Rapid topology change and the limited resources in these networks made designing an efficient routing protocol a challenging problem. In this paper, we propose a new route discovery scheme of AODV that reduces routing overhead, prolong route life time, and relatively minimum hop counts. The suggested scheme is called EDA-AODV, where the route is selected using two main metrics: node energy factor and node distance from its transmitting predecessor node. The proposed scheme has been implemented using network simulator (NS2. Ver.2.31). The emulation results indicate that, the performance of EDA-AODV outperforms the original AODV from point of view: throughput, number of alive nodes, normalized routing load and overall hop count.
International Journal of Computer Networks And Applications, 2016
International Journal of Computer Networks And Applications, 2019
Mobile ad hoc network, MANET, is a group of several nodes connected in dispersed way to enabling ... more Mobile ad hoc network, MANET, is a group of several nodes connected in dispersed way to enabling wireless communications. All nodes being moveable and are dynamically connected in a random way. MANETs can be used in many applications such as military battles, WSN, in areas where it is difficult to build wired network. Due to dynamic topology of MANET, restricted battery power, and limited capacity of wireless channels, it becomes design of routing mechanism is one of the master affronts in MANET. MANET routing protocols could be categorized into two classes: table-driven (e.g. DSDV) and on demand routing (e.g. AODV and DSR), many studies prove that reactive routing protocols are outperform proactive protocols. Therefore, this article concerned with performance enhancement of DSR which is the most famous reactive routing protocols. Standard DSR is multi hop in its nature where route selection between any two communicating nodes is only based on minimum hop count as a metric, regardless another metrics such as energy of nodes, traffic load on nodes and power transmission of packets which may have negative effects on performance of the standard DSR. This paper presents new version of standard DSR, called (APEE-DSR), through modification of both route discovery phase and route maintenance phase, in such a way that minimize energy consumption of nodes and realization of balanced traffic load of nodes, in addition to adaptation of transmission power of exchanged data packets among communicating nodes, resulting in prolong life time of nodes, thence increase life time of the routes and relative stability of network. In proposed scheme, route choice depending on two combined metrics: energy of nodes and their traffic load. Moreover, transmission power of packets among nodes through the selected route will be adaptive. Performance assessment and comparison between suggested schema (APEE-DSR) and standard DSR has been carried out utilizing simulation gadget NS2. Simulation results proved that performance of proposed protocol better than original DSR with respect to: successful packet delivery percentage, total delay time, normalized overhead, and nodes energy consumption.
An online blogs provide facility to its users to write and read text-based posts known as "articl... more An online blogs provide facility to its users to write and read text-based posts known as "articles". It became one of the most commonly used social networks. However, an important problem arises is that the returned articles, when searching for a topic phrase, are only sorted by recently not relevancy. This makes the user to manually read through the articles in order to understand what are primarily saying about the particular topic. Some strategies were developed for clustering English text but Arabic text clustering is still an active research area. A major challenge in article clustering is the extremely high dimensionality. In this paper we proposed the new method for features reduction using stemming, (Arabic WordNet) (Arabic Word Net) dictionary and Arabic diacritics, Also, new method in measuring similarity by using (Arabic WordNet) relations to enhance accuracy of clustering.
Journal of Al-Azhar University Engineering Sector, Sep 30, 2023
International journal of computer networks and applications, Dec 26, 2023
Zede Journal, 2009
Mobile Agent computing is a paradigm of distributed computing, that has generated considerable ex... more Mobile Agent computing is a paradigm of distributed computing, that has generated considerable excitement in the research community. Despite that, it has not been translated into a significant number of real-world applications due to a new dimensionality of security problem it brings along with it. In this paper familiarization to Mobile Agent technology and threat of hostile host towards a visiting agent is given due diligence: Malicious host problem. The threats are identified and a modified mobile computing model is proposed to prevent some of the threats. A prototype that realizes the concept is implemented using IBM's Mobile Agent platform, Aglets.
Zede Journal, 2009
Three new variants of continuum-based models for an elastic subgrade are proposed. The subgrade i... more Three new variants of continuum-based models for an elastic subgrade are proposed. The subgrade is idealized as a homogenous, isotropic elastic layer of thickness H overlying a firm stratum. All components of the stress tensor in the subgrade are taken into account. Reasonable assumptions are made regarding the depth-wise variation of the vertical shear stress components and of the horizontal-to-vertical normal stress ratios to simplify mathematical work. The assumptions are based on observation of available analytical results of stress distributions and on knowledge of lateral earth pressure theories. The resulting differential equations are similar in form and order to a high-order model developed earlier by Reissner based on a number of simplifying assumptions, but with different coefficients dependant on Poisson ratio. With the help of appropriately selected mechanical models, it has been shown that all of the new model variants consistently give larger effective vertical stiffn...
Zede Journal, 2011
Most of the secret key encryption algorithms in use today are designed based on either the feiste... more Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full period pseudo random multiplicative LCG. Then, multi-scroll chaotic attractors are generated using a hysteresis switched, second order linear system. The bits of the image of the chaotic attractors are mixed with a plaintext to obtain a ciphertext. The plaintext can be recovered from the ciphertext during the deciphering process only by mixing the cipher with a chaos generated using the same secret key. As validated by a functional, NIST randomness, and Monte Carlo simulation tests, the cipher is very much diffused and not prone to statistical or selected cipher attacks. In addition, the performance is measured and analyzed using such metrics as encryption time,...
Zede Journal, 2011
Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime ... more Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their energy consumption. The proposed solution is based on incorporating energy information into Greedy Perimeter Stateless Routing (GPSR) Protocol. The proposed solution performs better in energy consumption, network lifetime and packet delivery ratio, with a performance gain of Network Lifetime 45.9% - 78.69%. However, the performance is comparatively low in average delay because of computational complexity. Key Words: Wireless Sensor Networks, GPSR protocol, Geographical routing protocol, `Energy aware routing protocol
Journal of Al-Azhar University Engineering Sector, 2020
Vehicular Ad Hoc Networks (VANETs) are networks that deal with transferring data between moving v... more Vehicular Ad Hoc Networks (VANETs) are networks that deal with transferring data between moving vehicles in order to avoid accidents and to provide journey comfort and traffic safety. Like all other networks it is subjects to vulnerable attacks, hence, security is a hot topic to consider. This article provides a review on the researches and publications focusing on how to secure the communication between vehicles while transferring the data. Different attacks could take place within the communication scenario; the most harmful of them is Sybil attack. Therefore, in this paper, we shed lights on the researches dealing with the different types of attacks with a focus on Sybil attacks. Sybil detection and defense techniques and methodologies are reviewed in more details.
Mobile Ad Hoc Network (MANET) have many complex problems, one of this problems is routing. The ma... more Mobile Ad Hoc Network (MANET) have many complex problems, one of this problems is routing. The main sources of routing complexity come from nodes mobility, limited power source and bandwidth, and jamming that lead to frequent changed topology of network. Many research articles have been done to mitigate the effect of the dynamic topology on the route stability among nodes of network. One of the well-known routing protocols of MANET is Dynamic Source Routing protocol (DSR). It is reactive routing scheme, where the route is selected based on the minimum hop counts, as a metric, between the source and destination node. In this context, most research papers showed that the route selection based on minimum hop counts, as a criteria, have little positive effect on the route stability of DSR protocol. Therefore, there are various enhancements have been carried out on the original DSR protocol to obtain more stable routes among the nodes in the dynamic environment of MANET. This paper prese...
Journal of Al-Azhar University Engineering Sector, 2021
Vehicular ad-hoc network (VANET) are designed to aid in avoiding many of the traffic problems, su... more Vehicular ad-hoc network (VANET) are designed to aid in avoiding many of the traffic problems, such as accidents, traffic jams, traffic status broadcast, etc. This article proposes two possible configurations as VANET applications to aid in solving two traffic issues namely, parking, and after-accident management. These two models of VANET are designed with the objective of improving traffic fluidity. However, VANETs are special types of Mobile Ad Hoc Networks (MANETs) with moving nodes (Vehicles) and stand still nodes Roadside Units (RSUs). Likewise, all MANETs. The network nodes can move freely within the network coverage yet stay connected. Therefore, VANETS are subject to vulnerable attacks. Sybil attacks are the most threatening VANET attacks that may lead to death. Therefore, this article proposes a three-stage technique for detection, prevention, and avoidance of Sybil attacks. It also presents a methodology for analyzing the algorithms of VANET applications to identify predi...
Critical MANET environments such as military battlefields and disaster recovery operations impose... more Critical MANET environments such as military battlefields and disaster recovery operations impose a number of requirements (such as the need for robustness and performance within a high mobility scenarios), and constraints (such as Hostile attacks, RF range and cost, battery limitations). Many studies proved that PUMA (Protocol for Unified Multicasting through Announcements) is superior compared to other multicast and core-based routing protocols like DCMP, MAODV and ODMRP where in addition to providing the lowest control overhead compared to ODMRP and MAODV, PUMA provides a very tight bound for the control overhead [1]. So we studied PUMA and its drawbacks while working in critical MANETs which leaded us to propose a novel routing protocol named Adaptive Secure Headship Following Induction Keeping (ASHFIK) to work ideally in critical MANETs scenarios.In this paper we discuss the structure of ASHFIK which uses a new mechanism called the Headship Mechanism which provides always a sta...
Mobile ad hoc networking is a concept in computer communications, which means that if users want ... more Mobile ad hoc networking is a concept in computer communications, which means that if users want to communicate with each other, they can form a temporary network with out any pre-existing communication infrastructure. Each node participating in the networks acts as host and router in order to transmit, receive and forward packets. In mobile ad hoc networks [MANETs], the wireless mobile nodes may dynamically enter the network as well as leave the network. Due to the dynamic nature of MANET, nodes are typically distinguished by their high degree of mobility and route failure due to frequent link breakages, which affects the end-to-end transmission of data. In order to increase the reliability of data transmission and to reduce delay due to route recomputation, some routing protocols, such as Temporally Ordered Routing Algorithm (TORA), maintain multiple routes between a senderreceiver pair, and use multi-path route to transmit packets. In such a case, packets coming from different pa...
E-learning offers advantages for E-learners by making access to learning objects at any time or p... more E-learning offers advantages for E-learners by making access to learning objects at any time or place ,very fast, just-in-time and relevance, However, with the rapid increase of learning objects and it is syntactically structured it will be time-consuming to find contents they really need to study, in this paper we design and implementation of knowledge-based industrial reusable, interactive web-based training and use semantic web based e-learning to deliver learning contents to learner in flexible, interactive, adaptive way. The semantic and recommendation and personalized search of Learning objects is based on comparison of the learner profile and learning objects to determine a more suitable relationship between learning objects and learner profiles. Therefore, it will advise the e-learner with most suitable learning objects using the semantic similarity.
International Journal of Management, Technology, and Social Sciences, 2018
E-learning offers advantages for E-learners by making access to learning objects at any time or p... more E-learning offers advantages for E-learners by making access to learning objects at any time or place, very fast, just-in-time and relevance. However, with the rapid increase of learning objects and it is syntactically structured it will be time-consuming to find contents they really need to study.In this paper, we design and implementation of knowledge-based industrial reusable, interactive web-based training and use semantic web based e-learning to deliver learning contents to the learner in flexible, interactive, and adaptive way. The semantic and recommendation and personalized search of Learning objects is based on the comparison of the learner profile and learning objects to determine a more suitable relationship between learning objects and learner profiles. Therefore, it will advise the e-learner with most suitable learning objects using the semantic similarity.
International Journal of Computer Networks And Applications, Oct 30, 2017
This article presents a framework for performance comparison between Long Term Evolution (LTE) an... more This article presents a framework for performance comparison between Long Term Evolution (LTE) and WiMAX technologies, depended on link level simulation, under different conditions (e.g. a mixture of channel models and modulation coding schemes (MCS)). Two performance metrics have been used: throughput against SNR for both downlink (DL) and uplink (UL) and block error rate (BLER) against SNR for both DL and UL. Simulation results, conducted in network simulator OPNET Modeler ver. 17.1, show that the throughput and the BLER increases as the MCS increase (i.e. MCS=5, 15, 24).
The Egyptian Journal of Language Engineering, Sep 23, 2019
Careful learning and understanding of Arabic content are extremely important because of its conti... more Careful learning and understanding of Arabic content are extremely important because of its continuous growing. There are many types of text learning. It includes summarization, translation, and classification. The choice of the Arabic language in this research came from the lack of modern research such as deep learning. Although deep learning of Arabic is not a goal in this research, the main goal was to remove ambiguity in the Arabic language, since Arabic has more words than meaning, according to diacritics and the grammar of the text. The research idea is based on deep text learning, text analysis and removing of the ambiguity. In this paper, we proposed a new method for Arabic text learning by using deep learning methods. we use in this method the learning word vectors as weights by using 2000000-word vectors. The language model and the word analysis were also used to analyze the text and to detect the ambiguous words. Additionally, the learning results from the deep learning were compared with other researches of text from an accuracy perspective.
International Conference on Aerospace Sciences and Aviation Technology, 1995
A potential problem with DQDB network is the achievement of fair sharing of bandwidth in terms of... more A potential problem with DQDB network is the achievement of fair sharing of bandwidth in terms of the location of the access node. For the sake of compensating this unfairness, the IEEE 802.6 Standard recommends to utilize a Bandwidth Balancing (BWB) Mechanism. This paper deals with the implementation of BWB mechanism using the modified DQDB method. We focus on the behavior of this protocol when the network is Heavy load. The effect of BWB mechanism on the fairness problems suffered by a DQDB network with two stations for three different scenarios is investigated analytically through using a graph model which is based on the space time diagram. Simulation is used when the number of active stations is larger than two. Our results provide a deep insight into the equilibrium access of data channel by all the active stations. They also show that the station throughputs are independent on the state of the network when overload occurs.
International Journal of Computer Networks And Applications, 2018
Mobile Ad Hoc Network" (MANET) is composed of a set of wireless mobile nodes, it is a self-organi... more Mobile Ad Hoc Network" (MANET) is composed of a set of wireless mobile nodes, it is a self-organized environment which does not need any infrastructure. The topology of this type of network is formed dynamically and the mobility feature of the nodes causes rapid, unpredictable and frequent network topology changes. All nodes in this network are mobile in nature and driven by batteries, that could cause link breakage if a battery of a node goes empty. Rapid topology change and the limited resources in these networks made designing an efficient routing protocol a challenging problem. In this paper, we propose a new route discovery scheme of AODV that reduces routing overhead, prolong route life time, and relatively minimum hop counts. The suggested scheme is called EDA-AODV, where the route is selected using two main metrics: node energy factor and node distance from its transmitting predecessor node. The proposed scheme has been implemented using network simulator (NS2. Ver.2.31). The emulation results indicate that, the performance of EDA-AODV outperforms the original AODV from point of view: throughput, number of alive nodes, normalized routing load and overall hop count.
International Journal of Computer Networks And Applications, 2016
International Journal of Computer Networks And Applications, 2019
Mobile ad hoc network, MANET, is a group of several nodes connected in dispersed way to enabling ... more Mobile ad hoc network, MANET, is a group of several nodes connected in dispersed way to enabling wireless communications. All nodes being moveable and are dynamically connected in a random way. MANETs can be used in many applications such as military battles, WSN, in areas where it is difficult to build wired network. Due to dynamic topology of MANET, restricted battery power, and limited capacity of wireless channels, it becomes design of routing mechanism is one of the master affronts in MANET. MANET routing protocols could be categorized into two classes: table-driven (e.g. DSDV) and on demand routing (e.g. AODV and DSR), many studies prove that reactive routing protocols are outperform proactive protocols. Therefore, this article concerned with performance enhancement of DSR which is the most famous reactive routing protocols. Standard DSR is multi hop in its nature where route selection between any two communicating nodes is only based on minimum hop count as a metric, regardless another metrics such as energy of nodes, traffic load on nodes and power transmission of packets which may have negative effects on performance of the standard DSR. This paper presents new version of standard DSR, called (APEE-DSR), through modification of both route discovery phase and route maintenance phase, in such a way that minimize energy consumption of nodes and realization of balanced traffic load of nodes, in addition to adaptation of transmission power of exchanged data packets among communicating nodes, resulting in prolong life time of nodes, thence increase life time of the routes and relative stability of network. In proposed scheme, route choice depending on two combined metrics: energy of nodes and their traffic load. Moreover, transmission power of packets among nodes through the selected route will be adaptive. Performance assessment and comparison between suggested schema (APEE-DSR) and standard DSR has been carried out utilizing simulation gadget NS2. Simulation results proved that performance of proposed protocol better than original DSR with respect to: successful packet delivery percentage, total delay time, normalized overhead, and nodes energy consumption.
Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime ... more Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their energy consumption. The proposed solution is based on incorporating energy information into Greedy Perimeter Stateless Routing Protocol (GPSR). The proposed solution performs better in energy consumption, network lifetime and packet delivery ratio, with a performance gain of Network Lifetime 45.9 %- 78.69%. However, the performance is comparatively low in average delay because of computational complexity.