Search Results - "2014 24th International Conference on Computer Theory and Applications (ICCTA)"
-
1
Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Social media contains a lot of useful information that express different aspects of the society using unstructured and temporal data. The main challenge with…”
Get full text
Conference Proceeding -
2
A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency Centers
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Nurse scheduling is a very complex task for the human resource director in the health organizations due to the numerous requirements, limitations and rules…”
Get full text
Conference Proceeding -
3
Analytical Model for Service Response Time in Distributed Systems
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such…”
Get full text
Conference Proceeding -
4
Process Algebras, Reasoning, And Validation
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Process algebras model concurrent systems, and hence permit system reasoning or validation of concurrent programs. These are bottom up paradigms that start…”
Get full text
Conference Proceeding -
5
Multi-Agent based University Advising System
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Providing accurate advice to undergraduate students during their undergraduate program and directing them towards proper course selection is the means by which…”
Get full text
Conference Proceeding -
6
Prevention Of DOM Based XSS Attacks Using A White List Framework
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Web applications are not guaranteed to be safe for both clients and servers since many vulnerabilities can be exploited in a web application to reach a…”
Get full text
Conference Proceeding -
7
An Advanced Data Security Algorithm Using cryptography and DNA-Based steganography
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…nowadays, data security has become one of the most important branches of computer sciences because of the great development in the Internet field and the great…”
Get full text
Conference Proceeding -
8
Power System Disturbance Suppression Using Interval Type-2 Fuzzy Logic Stabilizer
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Low frequency oscillations (LFOs) have a dramatic effect on small signal stability of a power system. As power system started to operate near its stability…”
Get full text
Conference Proceeding -
9
Aggregating Local Metrics for Global Trust Calculations in the TOR Network
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…This paper discusses the design and implementation of a distributed trust calculation mechanism that allows users in the peer-to-peer TOR anonymity network to…”
Get full text
Conference Proceeding -
10
Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA)
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Wireless networks applications are growing very fast although their nodes suffer from limited bandwidth, memory, and processing capabilities. They operate on…”
Get full text
Conference Proceeding -
11
Students' Attitudes toward Mobile Learning Adoption in Private University in Egypt
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…To solve the problem of Education in Egypt keep in mind no. of mobiles (%70) [18]. Mobile Learning not only effective tool for distance learning but also…”
Get full text
Conference Proceeding -
12
Performance Analysis of Selective Authentication Schemes for IPTV Networks
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…The growing demand on IPTV as well as the strong adoption of smart devices as tablets and smartphones in presence of broadband wireless technologies as LTE,…”
Get full text
Conference Proceeding -
13
Biologically Inspired Hierarchical Model for Traffic Sign Recognition
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…In this research, a study of the Hierarchical Temporal Memory (HTM) model using the Numenta Implementation "Nupic v1.7" and an investigation of its performance…”
Get full text
Conference Proceeding -
14
GIS-Based Decision Support System Using Analytical Hierarchy Process for Solar Cells Site Selection in Sinai Peninsula, Egypt
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…During the few recent decades, the demand for solar energy has increased and has been widely implemented around the world to replace the conventional…”
Get full text
Conference Proceeding -
15
Intelligent Look-ahead Controllers for Nonholonomic Mobile Robot Manipulator
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…This paper presents a planning and control algorithm for nonholonomic mobile robots (NMRs). The proposed controller uses the Look-ahead method that is based on…”
Get full text
Conference Proceeding -
16
Using Genetic Algorithm to Improve the Performance of Sigma-Delta Converter Used on Earthquake Monitoring Systems
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…An earthquake monitoring system consists of many electronic devices, one of this vital device is the digitizer which converts the analogue signal coming from…”
Get full text
Conference Proceeding -
17
Tracing Origins Of Unknown DNA/Protein Offspring Sequences On Multi-Processors
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…One of the main problems for an evolutionary biologist is tracing the modifications of ancestors in offspring sequences. The Gene Tracer application was…”
Get full text
Conference Proceeding -
18
Integrated Inductor Class-D Audio Amplifier Modeling & Simulation
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…during the last few years, there has been a growing market demand for audio amplifiers with a high output power and a large number of channels. This requires…”
Get full text
Conference Proceeding -
19
Hybrid Trust Management Model for Cloud Computing
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques…”
Get full text
Conference Proceeding -
20
Measuring Organizations' readiness for Customer Relationship Management (CRM): A Comparative Study
Published in 2014 24th International Conference on Computer Theory and Applications (ICCTA) (25-10-2014)“…Since 1990, Customer relationship management (CRM) has become an important subject for many organizations in different industries. CRM is a business strategy…”
Get full text
Conference Proceeding