Entity

Time filter

Source Type

Kuwait City, Kuwait

The American University of Kuwait is a private liberal arts institution based on the American model of higher education in Kuwait City, Kuwait. Although established in 2003, the University opened to students, faculty and the general public in September 2004. It is sister colleges with Dartmouth College, in Hanover, New Hampshire. Professor Dr. Nizar Hamzeh currently serves the office of the President. Wikipedia.


El-Abd M.,American University of Kuwait
Information Sciences | Year: 2012

The class of foraging algorithms is a relatively new field based on mimicking the foraging behavior of animals, insects, birds or fish in order to develop efficient optimization algorithms. The artificial bee colony (ABC), the bees algorithm (BA), ant colony optimization (ACO), and bacterial foraging optimization algorithms (BFOA) are examples of this class to name a few. This work provides a complete performance assessment of the four mentioned algorithms in comparison to the widely known differential evolution (DE), genetic algorithms (GAs), harmony search (HS), and particle swarm optimization (PSO) algorithms when applied to the problem of unconstrained nonlinear continuous function optimization. To the best of our knowledge, most of the work conducted so far using foraging algorithms has been tested on classical functions. This work provides the comparison using the well-known CEC05 benchmark functions based on the solution reached, the success rate, and the performance rate. © 2011 Elsevier Inc. All rights reserved. Source


Khanafer M.,American University of Kuwait | Guennoun M.,University of Ottawa | Mouftah H.T.,University of Ottawa
IEEE Communications Surveys and Tutorials | Year: 2014

IEEE 802.15.4 is the de facto standard for Wireless Sensor Networks (WSNs) that outlines the specifications of the PHY layer and MAC sub-layer in these networks. The MAC protocol is needed to orchestrate sensor nodes access to the wireless communication medium. Although distinguished by a set of strengths that contributed to its popularity in various WSNs, IEEE 802.15.4 MAC suffers from several limitations that play a role in deteriorating its performance. Also, from a practical perspective, 80.15.4-based networks are usually deployed in the vicinity of other wireless networks that operate in the same ISM band. This means that 802.15.4 MAC should be ready to cope with interference from other networks. These facts have motivated efforts to devise improved IEEE 802.15.4 MAC protocols for WSNs. In this paper we provide a survey for these protocols and highlight the methodologies they follow to enhance the performance of the IEEE 802.15.4 MAC protocol. © 2014 IEEE. Source


El-Abd M.,American University of Kuwait
Genetic and Evolutionary Computation Conference, GECCO'11 | Year: 2011

The Artificial Bee Colony (ABC) algorithm is a relatively new algorithm for function optimization. The algorithm is inspired by the foraging behavior of honey bees. In this work, the performance of ABC is enhanced by introducing the concept of opposition-based learning. This concept is introduced through the initialization step and through generation jumping. The performance of the proposed opposition-based ABC (OABC) is compared to the performance of ABC and opposition-based Differential Evolution (ODE) when applied to the Black-Box Optimization Benchmarking (BBOB) library introduced in the previous two GECCO conferences. Copyright 2011 ACM. Source


El-Khasawneh B.S.,American University of Kuwait
Journal of Manufacturing Technology Management | Year: 2012

Purpose - The paradigm shift in global competition and the resulting business challenges have led manufacturing enterprises, particularly in the developing world, to take a different look at their operations. Responding to this climate meant reassessing their competitive advantage, and re-engineering their business models and operations. The purpose of this paper is to discuss many of these new challenges and present potential solutions from the practitioner point of view. Design/methodology/approach - This paper discusses many of these new challenges and presents potential solutions. The results are from interviews with the enterprise managers and owners. Findings - The issues are divided into three categories based on who can manipulate them: regional and international, national, and enterprise factors. The level of enterprises' ability to respond to these issues varies from full control to partial or no control. Nevertheless, issues' impact could be minimized by certain adopted polices and action plans. Practical implications - The paper creates a guiding compass for developing countries' manufacturing enterprises, by which they can navigate around the arising challenges, in a well-rounded, comprehensive overview. Originality/value - The paper lays a foundation for a road map for researchers and practitioners to assist small and medium-sized enterprises in becoming more competitive and improving their survivability, in a well-rounded, comprehensive way. © 2012 Emerald Group Publishing Limited. Source


Kadry S.,American University of Kuwait
International Journal of Security and its Applications | Year: 2011

In this article, we describe the regression test process to test and verify the changes made on software. A developed technique use the automation test based on decision tree and test selection process in order to reduce the testing cost is given. The developed technique is applied to a practical case and the result show its improvement. Source

Discover hidden collaborations