المستودع الرقمي لـكلية تقنية المعلومات

احصائيات كلية تقنية المعلومات

  • Icon missing? Request it here.
  • 50

    مقال في مؤتمر علمي

  • 24

    مقال في مجلة علمية

  • 1

    كتاب

  • 4

    فصل من كتاب

  • 0

    رسالة دكتوراة

  • 1

    رسالة ماجستير

  • 0

    مشروع تخرج بكالوريوس

  • 0

    تقرير علمي

  • 0

    عمل غير منشور

  • 0

    وثيقة

  • 0

    براءة إختراع

Fault Tolerance Capabilities In C Language A Case Analysis

Abstract : This thesis presents a fault models for C programming (Turbo C, version 3.0) in run-time of programs. The fault models provide a fault/failure analysis of how a fault in C programming can cause a data state change in the program to become corrupted, and how that erroneous data can propagate to the final state of the program, thereby manifesting a failure. The fault models also include a catalog of fault types that are believed to represent faults likely to be introduced in programs by programmers writing C code. Each type of fault is described in terms of how it appears syntactically in source code as well as in how it can cause an infection of program state. The fault types are identified from a careful analysis of the syntaxes and the semantics of C programs. The fault models can help testers and programmers identify places in a program where faults are most likely to appear, and identify what kinds of faults to look out for when using certain feature in C language. The fault models is claimed to be a good foundation for fault seeding, mutation testing, program inspections, and evaluation of testing strategies for C programs. Examples are given that demonstrate the model’s suitability for these purposes. وفاء حسين محمود المصباحي (2010)
wafa hussien mahmoud elmisbahi(6-2010)

Performance Evaluation of Multimedia over MPLS VPN and IPSec Networks

In this paper multimedia streaming applications is performance is evaluated over MPLS network using two VPN techniques MPLS VPN and IPSec using OPNET simulation tool. However, to make the analysis study more realistic HTTP and FTP traffics are also injected into the tested scenarios and measured. VPN exploits encryption to provide data’s confidentiality transmitted through the VPN tunnels. MPLS VPN connects sites over public networks using private labeled switched paths (LSPs) established on MPLS networks. IPSec certifying sender authentication, keeping data’s confidentiality by encryption, and provides data integrity. The experimental results showed that IPSec is performed better than MPLS VPN in terms of end-to-end delay and packet delay variation. Moreover, OSPF protocol is employed as routing protocol also incurred more traffic in MPLS VPN than IPSec scenario. In addition, H.323 as a multimedia protocol is also recorded longer setup time in the case of MPLS VPN than IPSec scenario.
Azeddien M S Sllame(5-2022)
عرض موقع المنشور

Evaluating the Fast Rerouting with MPLS Networks as a Fault Tolerance Mechanism with OSPF and IS-IS routing protocols

In this paper an analysis study is carried out by GNS3 as a modeling and simulation environment with a Wireshark tool to investigate the reactions taken inside MPLS networks such as path reestablishment and timing (network convergence) of fail/reconnection/rerouting. However, two practical scenarios have been built with MPLS network; one employs OSPF while the other works with IS-IS as routing protocols to examine their responses and behaviors during link and node failure. The results showed that IS-IS is recorded better results than OSPF in network convergence with MPLS networks
Azeddien M S Sllame, Abdelrahman AboJreeda, Mohamed Hasaneen(5-2022)
عرض موقع المنشور

A CURRICULUM MODEL FOR POSTGRADUATE INFORMATION TECHNOLOGY PROGRAM THREADS

The forces of technology, information, telecommunications and globalization are restructuring every aspect of engineering, business and society. The combination of these factors is the key player in this transformation and needs advanced IT professionals with breadth IT knowledge and specialized depth into one of its evolving threads, to drive this evolution. We propose a set of Master programs specifically designed to develop IT leadership at large, and strategic expertise into selected threads of IT, in particular. We have selected the areas of networking, information security, e-business, IT management and software engineering as specialization threads. The proposed program provides competence in broad IT and responds to strategic needs in specific IT sectors. We describe our curriculum-design approach and explain the rationale of our proposed model.
Harmain, H., Y. Atif, K. Shuaib, Z. Trabelsi(3-2012)
موقع المنشور

UTalk: an Arabic Talking Browser

In today’s information era, the World Wide Web has become a major source of information which people can access via Web browsers. While Web browsers are readily available to all ordinary computer users, most blind computer users use screen readers to access this information. These screen readers usually read out textual Web page contents in sequential order. In many cases this approach hides the page structures and did not give blind users a clear idea on the page layout. This paper discusses an innovative webpage reader called Universal Talk (UTalk). This webpage reader has the capabilities to retain the structure of the important Web page elements such as tables, lists, and forms. UTalk is designed with the Arabic speaking users in mind so it can recognize and interpret both Arabic and English texts. We have adapted a user-cantered design approach with the main aim for producing software that truly meets the needs of its users.
Harmain, H., Alshareif, A., Kamel, H. Guerchi, D.(3-2014)
موقع المنشور

ARABIC MORPHOLOGY ASSISTANT

Computer Assisted Language Learning (CALL) has received a great research attention in the past three decades. This fact can be attributed to the wide spread of the educational technology tools. Numerous number of applications have been marketed to assist in language teaching and self-study. These applications can be classified into two main categories: Multimedia-based Applications and Language Technology Based Applications. This paper presents a Computer Assisted Language Learning tool for Arabic morphology. The tool is mainly intended to be used by non-native speaker who are learning Arabic. At the same time, it can also be used by high school and university native students to understand the complex nature of the Arabic language. It supplies a self-learning environment to the learners where they can experiment with Arabic word production and analysis at their own time with or without the supervision. We describe some aspects of Arabic morphology, the learning environment, and the underlying computational framework.
Harmain, H., Alshareif, A.(7-2015)
موقع المنشور

Detecting Misogyny in Arabic Tweets

Systems that can automatically detect offensive content are of great value, for example, to provide protective settings for users or assist social media supervisors with removal of odious language. In this paper, we present three machine learning models developed at University of Tripoli, Libya, for the detection of misogyny in Arabic colloquial tweets. We present the results obtained with these models in the first Arabic Misogyny Identification shared task ArMI’21, a sub track of HASOC@FIRE2021. With our first model (optimized BERT-based pipelines), we placed as the second-ranked team on sub-task A: Misogyny Content Identification, and as the third-ranked team on sub-task B: Misogyny Behavior Identification.
Nwesri, A., Wu, S, Harmain, H.(12-2021)
موقع المنشور

E-School Management Systems, In Fong M.W. “E-Collaboration and Virtual Organization”

Access to the Internet is spreading very fast global wide. Through the internet, information is no longer constrained by distance, time, or volume. The internet has become an essential media in many aspects of our everyday life. It is being increasingly used in education, research, news, entertainment, business, sport, and communications. This paper describes a design and implementation of a new electronic school administration system (E-SAS). E-SAS can facilitate electronic communication channel between principals, advisors, teachers, students and their parents. They can communicate students’ issues, progress, assignments, and grades. This would satisfy the overall requirements by public and private schools. Principals, teachers, and administrative staff from various local schools were interviewed and consulted towards formalizing the E-SAS specifications.
Radaideh, M, AlHorani, S., Harmain, M.(1-2004)
موقع المنشور