Search Results - "2017 International Conference on Engineering & MIS (ICEMIS)"

Refine Results
  1. 1

    Internet of Things: Survey and open issues of MQTT protocol by Yassein, Muneer Bani, Shatnawi, Mohammed Q., Aljwarneh, Shadi, Al-Hatmi, Razan

    “…Internet of Things (IoT) is based on a wireless network that connects a huge number of smart objects, products, smart devices, and people. It has another name…”
    Get full text
    Conference Proceeding
  2. 2

    Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function by Radhakrishna, Vangipuram, Kumar, P. V., Aljawarneh, Shadi A., Janaki, V.

    “…Earlier research works addressing the problem of mining time profiled temporal association patterns did not address the possibility of using new similarity…”
    Get full text
    Conference Proceeding
  3. 3

    Extending the Gaussian membership function for finding similarity between temporal patterns by Aljawarneh, Shadi A., Radhakrishna, V., Cheruvu, Aravind

    “…In this paper, the basic Gaussian membership function is extended to design the dissimilarity measure. We extend the dissimilarity measure proposed in the…”
    Get full text
    Conference Proceeding
  4. 4

    Looking into the possibility for designing normal distribution based dissimilarity measure to discover time profiled association patterns by Radhakrishna, Vangipuram, Aljawarneh, Shadi A., Janaki, Vinjamuri, Kumar, P. V.

    “…This research addresses the design of a novel dissimilarity measure for mining similar patterns from time stamped temporal databases applying the concept of…”
    Get full text
    Conference Proceeding
  5. 5

    A fuzzy measure for intrusion and anomaly detection by Aljawarneh, Shadi A., RadhaKrishna, V., Kumar, G. Rajesh

    “…Finding intrusion and anomalies in networks is a problem of wide research interest both from academia and software industry. This work has three contributions…”
    Get full text
    Conference Proceeding
  6. 6

    A survey on attacks in Internet of Things based networks by Benzarti, Sana, Triki, Bayrem, Korbaa, Ouajdi

    “…Nowadays, the study of the security of IoT has caught many attentions of researchers. Improving our world to be a better environment building a city of dreams…”
    Get full text
    Conference Proceeding
  7. 7

    A survey of attacks in mobile ad hoc networks by Meddeb, Rahma, Triki, Bayrem, Jemili, Farah, Korbaa, Ouajdi

    “…The vulnerabilities of Mobile Ad Hoc Networks (MANETs) are subject of numerous kinds of attacks. Many classification schemas and taxonomies of MANET attacks…”
    Get full text
    Conference Proceeding
  8. 8

    A genetic algorithm optimized MPPT controller for a PV system with DC-DC boost converter by Badis, Afef, Mansouri, Mohamed Nejib, Boujmil, Mohamed Habib

    “…Because of the non-linearity of the P-V characteristic of the Photovoltaic (PV) panel, a power electronic interface is mandatory to reach the desired fixed…”
    Get full text
    Conference Proceeding
  9. 9

    Using normal distribution to retrieve temporal associations by Euclidean distance by Cheruvu, Aravind, Radhakrishna, V., Rajasekhar, N.

    “…Euclidean distance measure is widely adopted distance measure to find the distance between any two vectors. In this paper, we extend the use of Euclidean…”
    Get full text
    Conference Proceeding
  10. 10

    How to stop spread of misinformation on social media: Facebook plans vs. right-click authenticate approach by Pourghomi, Pardis, Safieddine, Fadi, Masri, Wassim, Dordevic, Milan

    “…One of the key features of social networks is that users are able to share information, and through cascades of sharing information, this information may reach…”
    Get full text
    Conference Proceeding
  11. 11

    Internet of Things: An exploration study of opportunities and challenges by Al-Shargabi, Bassam, Sabri, Omar

    “…Internet of Things (IoT) has drawn great attention in industry, academia, and research As the IoT technology still in beginning of its implementation in all…”
    Get full text
    Conference Proceeding
  12. 12

    Fuzzy logic controller (FLC): Application to control DC-DC buck converter by Bendaoud, K., Krit, S., Kabrane, M., Ouadani, H., Elaskri, M., Karimi, K., Elbousty, H., Elmaimouni, L.

    “…Nowadays, DC-DC converters circuits are widely used in electronics systems in order to obtain a stabilized output voltage from a given input DC Voltage…”
    Get full text
    Conference Proceeding
  13. 13

    Evolutionary approach for intrusion detection by Kumar, Gunupudi Rajesh, Mangathayaru, Nimmala, Narsimha, Gugulothu, Reddy, Gali Suresh

    “…In this work, we design and propose an improved fuzzy membership function to detect anomalies and intrusions. The objective of the present approach is to…”
    Get full text
    Conference Proceeding
  14. 14

    Arabic sarcasm detection in Twitter by Al-Ghadhban, Dana, Alnkhilan, Eman, Tatwany, Lamma, Alrazgan, Muna

    “…Sarcasm is a special form of irony or satirical wit in which people convey the opposite of what they mean. Sarcasm largely increases in social networks,…”
    Get full text
    Conference Proceeding
  15. 15

    Finding similar patterns in time stamped temporal datasets by Aljawarneh, Shadi A., Krishna, V. Radha, Cheruvu, Aravind

    “…The research objective in this paper is to address the scope for research to design dissimilarity measure which uses the standard score and normal probability…”
    Get full text
    Conference Proceeding
  16. 16

    Mobility management of Internet of Things: Protocols, challenges and open issues by Yassein, Muneer Bani, Aljawarneh, Shadi, Al-Sarayrah, Walaa

    “…Present day applications and technologies are continuing to drive the growth and demand in existing, and emerging fields of research. The largest change…”
    Get full text
    Conference Proceeding
  17. 17

    A mutlipath routing algorithm for wireless sensor networks under distance and energy consumption constraints for reliable data transmission by Benaddy, M., El Habil, B., El Ouali, M., El Meslouhi, O., Krit, S.

    “…Many applications of wireless sensor networks are critical such as, medical, crisis management, environmental, military, transportation, emergency, security…”
    Get full text
    Conference Proceeding
  18. 18

    Modeling and simulation of photovoltaic module based on one diode model using Matlab/Simulink by Belkassmi, Y., Rafiki, A., Gueraoui, K., Elmaimouni, L., Tata, O., Hassanain, N.

    “…Solar energy is one of the most important types of renewable energies. In this paper, the solar cell model with only one exponential is presented. We have…”
    Get full text
    Conference Proceeding
  19. 19

    Genetic algorithm for friendship selection in social IoT by Mardini, Wail, Khamayseh, Yaser, Khatatbeh, Montaha Hani

    “…The rapid and unprecedented technological advancements are currently dominated by two technologies. At one hand, we witness the rise of the Internet of Things…”
    Get full text
    Conference Proceeding
  20. 20

    Recommended architecture for car parking management system based on cyber-physical system by ur Rehman, Shafiq, Gruhn, Volker

    “…A joint combination of interacting network of physical components and computational algorithms form cyber-physical system (CPS). Cyber-physical systems are…”
    Get full text
    Conference Proceeding