Saudi Arabia
Saudi Arabia

Time filter

Source Type

Krishnan R.,Muscat College | Hussain A.,University of Stirling | Sherimon P.C.,Arab Open University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

Ontology together with Semantic Web has a vital role in knowledge management on a global scale. Since manual construction of ontology leads to complex, time consuming and inconsistent results, automatic construction of ontology is more preferred. This consists of two phases, such as concept based retrieval and the generation of ontology. The extraction of the semantic concept from unstructured input document is focused in this paper. Semantic concepts can be extracted based on the analysis of a set of texts and using WordNet. Challenges facing are finding of semantic relationships among concepts and elimination of irrelevant documents by identifying conceptual mismatches. For each word in the text document, corresponding synonym, hyponym, and hypernym will be extracted from the WordNet. These concepts and their relationships can be used to make the taxonomy for the automatic construction of ontology. JDK and Net Beans IDE are used with WordNet for the implementation. © 2012 Springer-Verlag.


Grant
Agency: European Commission | Branch: FP7 | Program: CSA-CA | Phase: INCO-2007-1.2 | Award Amount: 4.94M | Year: 2008

The present Coordination Action aims at developing the objectives of the INCO-Net MPC action as described in the Call for proposals, to further enhance regional S&T dialogue in the Mediterranean Region and the complementarities with activities carried out by other European Policy instruments, notably the Union for the Mediterranean (UfM). These objectives are focused on creating a dialogue platform using the state of the art of the ICT technologies, which will enable the discussion between relevant stakeholders from both sides of the Mediterranean to improve the S&T cooperation by, among other means, connecting and facilitating the interaction between the dispersed S&T cooperation initiatives already existing supported by the Member States, the European Commission and other political bodies; addressing training activities to improve the quality of the participation and management of the partners of FP7 from the MPC; creating discussion platforms and organizing meetings to monitor and discuss the content of the Thematic priorities of FP7 in term of the common interest of the EU and MPC; creating an Observatory of the EU-MPC S&T cooperation, which will agree indicators for the monitoring of RTD cooperation activities; and creating networks of research institutions and technological transfer services from both sides of the Mediterranean, to support strategic collaboration and provide a reference element for the development of the Euro-Mediterranean Innovation Space. All these activities are aimed at providing a strong institutional basis for the EU-MPC S&T cooperation. Furthermore, the mentioned objectives will be complemented with other activities, notably the development toward the common appropriation of the results of MIRA to activities on Innovation, and profiting the identification of common scientific priorities that could be used as clustering glue (Research Driven Clusters) around Projects already approved by the UfM, where business development can be foreseen using the Research potential in both sides of the Mediterranean. Supporting the activities of the UfM Programs that need the identification and development of a Research agenda in support of its objectives, notably the Program Horizon 2020 and the strengthening of the industrial cooperation through the creation of the Euro-Mediterranean Innovation Space is as well scheduled. All these activities are aimed at providing a strong institutional basis for the UfM cooperation in RTD.


Jabeur N.,Arab Open University | Sahli N.,German University of Technology in Oman | Khan I.M.,Al-Buraimi University College
Procedia Computer Science | Year: 2013

We survey the sensor network holes from a cause-effect-solution perspective. We first propose a new taxonomy (PLMS) which classifies holes into type groups according to the cause of anomaly. We discuss the effects of holes on the sensor network. Finally, we survey the different curative approaches (prevention, detection, repairing, avoidance). © 2013 The Authors. Published by Elsevier B.V.


Grant
Agency: European Commission | Branch: FP7 | Program: CSA | Phase: ICT-2013.10.3 | Award Amount: 897.95K | Year: 2014

The ClusMED project is a Support Action (SA) intended to contribute to international cooperation between EU and MED countries in the field of ICT Regulations in support of Societal Challenges.\nClusMED aims at implementing cooperative research in the ICT sector through the identification, analysis and benchmarking of national ICT regulations, taking into consideration five target MED countries (Lebanon, Egypt, Tunisia, Algeria, Morocco). The project will focus on the role of regulations as enablers of development in the ICT sector: to this end, it will assess and compare the ICT regulatory frameworks currently operating in MED countries, with the aim of identifying and sharing best practices. MED ICT regulations will also be benchmarked against some EU regulatory standards and experiences in overcoming barriers to the full exploitation of ICTs for tackling Societal Challenges. This objective will be mainly achieved through the implementation of multi-stakeholders workshops, which will also contribute to the setting up of a permanent dialogue between European and Mediterranean countries on regulatory issues in the ICT sector, as one of the key drivers of sustainable and inclusive growth.\nIn order to maximize the impact and diffusion of project results, ClusMED will build synergies with other relevant initiatives concerning international cooperation with MED countries, in particular with MOSAIC and MED Dialogue, the other two projects resulting from the call FP7-ICT-2011.10.3 International partnership building and support to dialogues and with EMERG, the Euro-Mediterranean Regulators Group initiative. ClusMED will also establish a proper exchange of information with relevant ICT European Technology Platforms.


Jabeur N.,Arab Open University | Zeadally S.,University of the District of Columbia | Sayed B.,Dhofar University
Communications of the ACM | Year: 2013

The latest advances in mobile computing, hardware, and software empower end users worldwide through a range of mobile devices with improved and novel capabilities. The result is intense competition among providers of online social services for mobile users regardless of location and profile, along with numerous mobile social networking (MSN) applications in which billions of people use their mobile devices to tap a spectrum of instant, relevant, high-quality services. MSN applications are social structures consisting of individuals or organizations connected through specific types of interdependency similar to online social networking sites (OSNS). They are based on a variety of architectures depending on whether they are extensions of existing OSNS, designed for mobile devices, focused on mobile users, or data- or service-oriented.


Abdel-jaber H.,Arab Open University
Journal of King Saud University - Computer and Information Sciences | Year: 2015

Congestion control is one of the hot research topics that helps maintain the performance of computer networks. This paper compares three Active Queue Management (AQM) methods, namely, Adaptive Gentle Random Early Detection (Adaptive GRED), Random Early Dynamic Detection (REDD), and GRED Linear analytical model with respect to different performance measures. Adaptive GRED and REDD are implemented based on simulation, whereas GRED Linear is implemented as a discrete-time analytical model. Several performance measures are used to evaluate the effectiveness of the compared methods mainly mean queue length, throughput, average queueing delay, overflow packet loss probability, and packet dropping probability. The ultimate aim is to identify the method that offers the highest satisfactory performance in non-congestion or congestion scenarios. The first comparison results that are based on different packet arrival probability values show that GRED Linear provides better mean queue length; average queueing delay and packet overflow probability than Adaptive GRED and REDD methods in the presence of congestion. Further and using the same evaluation measures, Adaptive GRED offers a more satisfactory performance than REDD when heavy congestion is present. When the finite capacity of queue values varies the GRED Linear model provides the highest satisfactory performance with reference to mean queue length and average queueing delay and all the compared methods provide similar throughput performance. However, when the finite capacity value is large, the compared methods have similar results in regard to probabilities of both packet overflowing and packet dropping. © 2015 The Author.


Elayyan H.O.,Arab Open University
2012 International Conference on Information Technology and e-Services, ICITeS 2012 | Year: 2012

Arab Open University is a pioneer educational institution in middle east and North Africa that adopted the open learning concept and has been dedicated to form this concept and present it with various layers of perfect e-course coordination and e-monitoring and e-measurement systems that fits with the Virtual learning Environment (VLE) for quality of assurance applications. This paper argues the mutual impact of e-coordination system on students of multi sections as it presents a comparative analysis depending on AOU experience e-coordination system through the VLE and other running courses in regular education without any standardization level. © 2012 IEEE.


Amaneddine N.,Arab Open University | Condotta J.-F.,University of Lille Nord de France
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We study in this paper the problem of global consistency for qualitative constraints networks (QCNs) of the Point Algebra (PA) and the Interval Algebra (IA). In particular, we consider the subclass corresponding to the set of relations of PA except the relations {<,=} and {>,=}, and the subclass corresponding to pointizable relations of IA one can express by means of relations of . We prove that path-consistency implies global consistency for QCNs defined on these subclasses. Moreover, we show that with the subclasses corresponding to convex relations, there are unique greatest subclasses of PA and IA containing singleton relations satisfying this property. © 2012 Springer-Verlag.


Amaneddine N.,Arab Open University | Condotta J.-F.,University of Lille Nord de France
FLAIRS 2013 - Proceedings of the 26th International Florida Artificial Intelligence Research Society Conference | Year: 2013

Spatial and temporal reasoning is a crucial task for certain Artificial Intelligence applications. In this context, and since two decades, various formalisms representing the information through qualitative constraint networks (QCN) have been proposed. Given a QCN, the main two problems that are facing researchers are: deciding whether this QCN is consistent or not, and, the minimal labeling problem. In this paper, we propose an efficient algorithm aiming at solving the minimal labeling problem. This algorithm is based on subclasses of relations for which the property of ◇-consistency implies the minimality of the QCN. Copyright © 2013, Association for the Advancement of Artificial Intelligence. All rights reserved.


Suwais K.,Arab Open University
WSEAS Transactions on Information Science and Applications | Year: 2014

This paper presents a new parallel model for Rabbit stream cipher. The goal of this model is to enhance the performance of Rabbit cipher by accelerating its keystream generation and encryption processes. The underlying concept of the new model was built based on utilizing multi-core processors to generate multiple keystreams simultaneously. The results showed that the new parallel model could enhance the encryption speed of Rabbit of about 1.4, 1.6 and 2.3 times on single, dual and quad core processors.

Loading Arab Open University collaborators
Loading Arab Open University collaborators