Cyborgs invoke visions of super-humans intertwined with innovative technologies able to surpass t... more Cyborgs invoke visions of super-humans intertwined with innovative technologies able to surpass the restrictions of the human body. Conventional vulnerability detection models sustain maximum false positive rates and depend upon manual participation. Machine learning (ML) and Artificial intelligence (AI) technologies are exploited in several real-time applications, like vulnerability, malware, and software function detection, for high-quality feature representation learning. In this aspect, this study introduces a hyperparameter-optimized deep belief network-enabled vulnerability and classification (HOSDBN-VC) technique on cyborgs. The presented HOSDBN-VC model aims to detect and classify the existence of vulnerabilities. The presented HOSDBN-VC model involves a Z-score normalization approach to transform the input data into a useful format. In addition, the Hypercube Optimization Search Algorithmbased feature selection (HOS-FS) method is employed for selecting feature subsets. Moreover, a flower pollination algorithm (FPA) with a deep belief network (DBN) paradigm is applied for vulnerability and classification. The metaheuristics-based FPA is exploited to choose the hyperparameters related to the DBN paradigm appropriately. A wide-ranging experiment has been conducted to investigate the results of the HOSDBN-VD model under two databases, FFmpeg and LibPNG. The experimental outcomes implied the betterment of the HOSDBN-VD algorithm over recent approaches.
Recently, human healthcare from body sensor data has gained considerable interest from a wide var... more Recently, human healthcare from body sensor data has gained considerable interest from a wide variety of human-computer communication and pattern analysis research owing to their real-time applications namely smart healthcare systems. Even though there are various forms of utilizing distributed sensors to monitor the behavior of people and vital signs, physical human action recognition (HAR) through body sensors gives useful information about the lifestyle and functionality of an individual. This article concentrates on the design of an Improved Transient Search Optimization with Machine Learning based Behavior Recognition (ITSOML-BR) technique using body sensor data. The presented ITSOML-BR technique collects data from different body sensors namely electrocardiography (ECG), accelerometer, and magnetometer. In addition, the ITSOML-BR technique extract features like variance, mean, skewness, and standard deviation. Moreover, the presented ITSOML-BR technique executes a micro neural network (MNN) which can be employed for long term healthcare monitoring and classification. Furthermore, the parameters related to the MNN model are optimally selected via the ITSO algorithm. The experimental result analysis of the ITSOML-BR technique is tested on the MHEALTH dataset. The comprehensive comparison study reported a higher result for the ITSOML-BR approach over other existing approaches with maximum accuracy of 99.60%.
The major mortality factor relevant to the intestinal tract is the growth of tumorous cells (poly... more The major mortality factor relevant to the intestinal tract is the growth of tumorous cells (polyps) in various parts. More specifically, colonic polyps have a high rate and are recognized as a precursor of colon cancer growth. Endoscopy is the conventional technique for detecting colon polyps, and considerable research has proved that automated diagnosis of image regions that might have polyps within the colon might be used to help experts for decreasing the polyp miss rate. The automated diagnosis of polyps in a computer-aided diagnosis (CAD) method is implemented using statistical analysis. Nowadays, Deep Learning, particularly through Convolution Neural networks (CNN), is broadly employed to allow the extraction of representative features. This manuscript devises a new Northern Goshawk Optimization with Transfer Learning Model for Colonic Polyp Detection and Classification (NGOTL-CPDC) model. The NGOTL-CPDC technique aims to investigate endoscopic images for automated colonic polyp detection. To accomplish this, the NGOTL-CPDC technique comprises of adaptive bilateral filtering (ABF) technique as a noise removal process and image pre-processing step. Besides, the NGOTL-CPDC model applies the Faster SqueezeNet model for feature extraction purposes in which the hyperparameter tuning process is performed using the NGO optimizer. Finally, the fuzzy Hopfield neural network (FHNN) method can be employed for colonic poly detection and classification. A widespread simulation analysis is carried out to ensure the improved outcomes of the NGOTL-CPDC model. The comparison study demonstrates the enhancements of the NGOTL-CPDC model on the colonic polyp classification process on medical test images.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchangin... more Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authenticat...
Periodicals of Engineering and Natural Sciences (PEN), 2019
Human Resources HRs are one of the most important elements in the organizations, but it is diffic... more Human Resources HRs are one of the most important elements in the organizations, but it is difficult to manage a large number of human resources, especially in large companies. For this purpose, companies have tended to manage these resources taking advantages of the technology and the Internet. In this research, we will focus on human resources management in different companies and different countries and explore the factors that motivate companies to adopt Electronic Human Resource Management E-HRM as well as the factors that affect its adoption. The results showed that HRM plays a vital role in facilitating organizational processes, save cost and time, it also beneficial for competitive advantages. The findings also explored that E-HRM aspects and factors impact E-HRM adoption are varied from firm to another and from country to another. However, the companies moved towards adopting E-HRM because it mitigates the efforts of HR managers to take a decision.
International Journal of Science and Business, 2021
The software development in different fields leads to increase the requirements for effective, ef... more The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user's requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the pro...
Academic Journal of Nawroz University (AJNU), 2018
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same ...
The software development in different fields leads to increase the requirements for effective, ef... more The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user's requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the pro...
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
IEEE Xplore 2019 International Conference on Advanced Science and Engineering (ICOASE), 2019
High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing... more High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing parallel computing by building parallel Processing Elements (PEs) called virtual processors. One important reason is that FPGAs are special purpose devices. Hence, implementing any system based on these devices will give faster and more precise results than those given by using PCs, even if parallel processing approaches been applied by PCs. In this paper, two systems based on FPGA devices have been built for High Performance Computing (HPC). Code breaking for Simplified Data Encryption Standard (DES) algorithm was depended as case study. The first system consists of one FPGA device operated in a sequential way. One FPGA device contains one PE works in sequential fashion. This PE represents one simplified DES algorithm with two complete rounds. While the second system is a parallel one, also it consists of one FPGA device, but programmed to be implemented in parallel manner. The FPGA de...
2019 International Conference on Advanced Science and Engineering (ICOASE)
High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing... more High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing parallel computing by building parallel Processing Elements (PEs) called virtual processors. One important reason is that FPGAs are special purpose devices. Hence, implementing any system based on these devices will give faster and more precise results than those given by using PCs, even if parallel processing approaches been applied by PCs. In this paper, two systems based on FPGA devices have been built for High Performance Computing (HPC). Code breaking for Simplified Data Encryption Standard (DES) algorithm was depended as case study. The first system consists of one FPGA device operated in a sequential way. One FPGA device contains one PE works in sequential fashion. This PE represents one simplified DES algorithm with two complete rounds. While the second system is a parallel one, also it consists of one FPGA device, but programmed to be implemented in parallel manner. The FPGA device contains 512 PEs operated in a parallel fashion. Each PE represents two completed rounds of simplified DES algorithm. In the second system, FPGA device works in much higher speed than the first one, because of that it works in parallel manner. Hence, reflecting great effect toward reducing the code breaking time and providing better results.
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same number of connected devices. The comparison results indicate that performance decreased when the network size increased and also show that bus topology is more effected than two other topologies.
Advances in Science, Technology and Engineering Systems Journal
Day by day, the data on the web becomes very huge which makes it difficult to find relevant infor... more Day by day, the data on the web becomes very huge which makes it difficult to find relevant information. Search engines are one of the successful factors that can retrieve information from the Web. The process of seeking information by search engines helps users find information on the internet, however it is not an easy task to find the exact information from this massive data available on the Web. Semantic Web technology has an ability to focus on metadata rather than syntax, which made the semantic search engines to search for the meaning of keywords instead of the keyword syntax. Consequently, an effective role of performance in conventional search engines can be achieved by rising the accuracy of information returned by a search query. In this paper, a survey for syntactic-based search engines and semantic-based search engines are studied, a comprehensive comparison between the two is presented, finally, their technologies are compared and discussed.
Academic Journal of Nawroz University (AJNU), 2018
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same ...
Cyborgs invoke visions of super-humans intertwined with innovative technologies able to surpass t... more Cyborgs invoke visions of super-humans intertwined with innovative technologies able to surpass the restrictions of the human body. Conventional vulnerability detection models sustain maximum false positive rates and depend upon manual participation. Machine learning (ML) and Artificial intelligence (AI) technologies are exploited in several real-time applications, like vulnerability, malware, and software function detection, for high-quality feature representation learning. In this aspect, this study introduces a hyperparameter-optimized deep belief network-enabled vulnerability and classification (HOSDBN-VC) technique on cyborgs. The presented HOSDBN-VC model aims to detect and classify the existence of vulnerabilities. The presented HOSDBN-VC model involves a Z-score normalization approach to transform the input data into a useful format. In addition, the Hypercube Optimization Search Algorithmbased feature selection (HOS-FS) method is employed for selecting feature subsets. Moreover, a flower pollination algorithm (FPA) with a deep belief network (DBN) paradigm is applied for vulnerability and classification. The metaheuristics-based FPA is exploited to choose the hyperparameters related to the DBN paradigm appropriately. A wide-ranging experiment has been conducted to investigate the results of the HOSDBN-VD model under two databases, FFmpeg and LibPNG. The experimental outcomes implied the betterment of the HOSDBN-VD algorithm over recent approaches.
Recently, human healthcare from body sensor data has gained considerable interest from a wide var... more Recently, human healthcare from body sensor data has gained considerable interest from a wide variety of human-computer communication and pattern analysis research owing to their real-time applications namely smart healthcare systems. Even though there are various forms of utilizing distributed sensors to monitor the behavior of people and vital signs, physical human action recognition (HAR) through body sensors gives useful information about the lifestyle and functionality of an individual. This article concentrates on the design of an Improved Transient Search Optimization with Machine Learning based Behavior Recognition (ITSOML-BR) technique using body sensor data. The presented ITSOML-BR technique collects data from different body sensors namely electrocardiography (ECG), accelerometer, and magnetometer. In addition, the ITSOML-BR technique extract features like variance, mean, skewness, and standard deviation. Moreover, the presented ITSOML-BR technique executes a micro neural network (MNN) which can be employed for long term healthcare monitoring and classification. Furthermore, the parameters related to the MNN model are optimally selected via the ITSO algorithm. The experimental result analysis of the ITSOML-BR technique is tested on the MHEALTH dataset. The comprehensive comparison study reported a higher result for the ITSOML-BR approach over other existing approaches with maximum accuracy of 99.60%.
The major mortality factor relevant to the intestinal tract is the growth of tumorous cells (poly... more The major mortality factor relevant to the intestinal tract is the growth of tumorous cells (polyps) in various parts. More specifically, colonic polyps have a high rate and are recognized as a precursor of colon cancer growth. Endoscopy is the conventional technique for detecting colon polyps, and considerable research has proved that automated diagnosis of image regions that might have polyps within the colon might be used to help experts for decreasing the polyp miss rate. The automated diagnosis of polyps in a computer-aided diagnosis (CAD) method is implemented using statistical analysis. Nowadays, Deep Learning, particularly through Convolution Neural networks (CNN), is broadly employed to allow the extraction of representative features. This manuscript devises a new Northern Goshawk Optimization with Transfer Learning Model for Colonic Polyp Detection and Classification (NGOTL-CPDC) model. The NGOTL-CPDC technique aims to investigate endoscopic images for automated colonic polyp detection. To accomplish this, the NGOTL-CPDC technique comprises of adaptive bilateral filtering (ABF) technique as a noise removal process and image pre-processing step. Besides, the NGOTL-CPDC model applies the Faster SqueezeNet model for feature extraction purposes in which the hyperparameter tuning process is performed using the NGO optimizer. Finally, the fuzzy Hopfield neural network (FHNN) method can be employed for colonic poly detection and classification. A widespread simulation analysis is carried out to ensure the improved outcomes of the NGOTL-CPDC model. The comparison study demonstrates the enhancements of the NGOTL-CPDC model on the colonic polyp classification process on medical test images.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchangin... more Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authenticat...
Periodicals of Engineering and Natural Sciences (PEN), 2019
Human Resources HRs are one of the most important elements in the organizations, but it is diffic... more Human Resources HRs are one of the most important elements in the organizations, but it is difficult to manage a large number of human resources, especially in large companies. For this purpose, companies have tended to manage these resources taking advantages of the technology and the Internet. In this research, we will focus on human resources management in different companies and different countries and explore the factors that motivate companies to adopt Electronic Human Resource Management E-HRM as well as the factors that affect its adoption. The results showed that HRM plays a vital role in facilitating organizational processes, save cost and time, it also beneficial for competitive advantages. The findings also explored that E-HRM aspects and factors impact E-HRM adoption are varied from firm to another and from country to another. However, the companies moved towards adopting E-HRM because it mitigates the efforts of HR managers to take a decision.
International Journal of Science and Business, 2021
The software development in different fields leads to increase the requirements for effective, ef... more The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user's requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the pro...
Academic Journal of Nawroz University (AJNU), 2018
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same ...
The software development in different fields leads to increase the requirements for effective, ef... more The software development in different fields leads to increase the requirements for effective, efficient and complicated software. Due to the huge amounts of software requirements, it is possible some errors to occur in the certain part of the programs and this means a real challenge for the software producer. The need for an effective test system is necessary for designing reliable programs and avoiding the errors that may appear during the software product. In this review, many techniques are discussed for the process of generating test cases which are a group of conditions that determine whether the designed programs are able to satisfy the user's requirements or not. Fuzzy logic utilizes an operational profile in the process of allocating test case to improve the software quality, as well as the design of fault propagation path to predicts the software defects during the test operation, also the automatic generation for PLC test cases that produce a new track through the pro...
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
The development of the microprocessor equipment is characterized by the continuous increase of th... more The development of the microprocessor equipment is characterized by the continuous increase of the integration scale of elements in integrated circuits and improvement of their operation properties: reliability, reduction of consumed power, weight and size. This paper discusses embedded systems using microcontroller. Today, using various control design and system modeling methods the embedded building management project gives an interesting insight into the world of modern control theory. Given the task to control the building management system using PIC microcontroller.
IEEE Xplore 2019 International Conference on Advanced Science and Engineering (ICOASE), 2019
High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing... more High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing parallel computing by building parallel Processing Elements (PEs) called virtual processors. One important reason is that FPGAs are special purpose devices. Hence, implementing any system based on these devices will give faster and more precise results than those given by using PCs, even if parallel processing approaches been applied by PCs. In this paper, two systems based on FPGA devices have been built for High Performance Computing (HPC). Code breaking for Simplified Data Encryption Standard (DES) algorithm was depended as case study. The first system consists of one FPGA device operated in a sequential way. One FPGA device contains one PE works in sequential fashion. This PE represents one simplified DES algorithm with two complete rounds. While the second system is a parallel one, also it consists of one FPGA device, but programmed to be implemented in parallel manner. The FPGA de...
2019 International Conference on Advanced Science and Engineering (ICOASE)
High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing... more High performance Field Programmable Gate Array (FPGA) devices have the capability of implementing parallel computing by building parallel Processing Elements (PEs) called virtual processors. One important reason is that FPGAs are special purpose devices. Hence, implementing any system based on these devices will give faster and more precise results than those given by using PCs, even if parallel processing approaches been applied by PCs. In this paper, two systems based on FPGA devices have been built for High Performance Computing (HPC). Code breaking for Simplified Data Encryption Standard (DES) algorithm was depended as case study. The first system consists of one FPGA device operated in a sequential way. One FPGA device contains one PE works in sequential fashion. This PE represents one simplified DES algorithm with two complete rounds. While the second system is a parallel one, also it consists of one FPGA device, but programmed to be implemented in parallel manner. The FPGA device contains 512 PEs operated in a parallel fashion. Each PE represents two completed rounds of simplified DES algorithm. In the second system, FPGA device works in much higher speed than the first one, because of that it works in parallel manner. Hence, reflecting great effect toward reducing the code breaking time and providing better results.
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same number of connected devices. The comparison results indicate that performance decreased when the network size increased and also show that bus topology is more effected than two other topologies.
Advances in Science, Technology and Engineering Systems Journal
Day by day, the data on the web becomes very huge which makes it difficult to find relevant infor... more Day by day, the data on the web becomes very huge which makes it difficult to find relevant information. Search engines are one of the successful factors that can retrieve information from the Web. The process of seeking information by search engines helps users find information on the internet, however it is not an easy task to find the exact information from this massive data available on the Web. Semantic Web technology has an ability to focus on metadata rather than syntax, which made the semantic search engines to search for the meaning of keywords instead of the keyword syntax. Consequently, an effective role of performance in conventional search engines can be achieved by rising the accuracy of information returned by a search query. In this paper, a survey for syntactic-based search engines and semantic-based search engines are studied, a comprehensive comparison between the two is presented, finally, their technologies are compared and discussed.
Academic Journal of Nawroz University (AJNU), 2018
Physical network topology is the configuration of computers, cables and other peripherals as a ge... more Physical network topology is the configuration of computers, cables and other peripherals as a geometrical shape. There are many types of topologies each of them has many advantages and disadvantages. For high performance Local Area Networks (LANs), the builder of a network should select the best physical network topology. This paper analyzes three basic network topologies including bus, star and ring for different number of connected nodes (various network topology size) using OPNET simulator. Four scenarios are configured for each topology with number of connected nodes equal to 5, 10, 15 and 20 for senario1, 2, 3 and 4 respectively. In this analysis, four parameters investigated in Delay (Sec.) for the complete network, Load (Bits/Sec.), Traffic Received (Bits/Sec.) and the number of Collision for single node (server). Performance comparison is made in each topology separately based on various network size and another comparison is also made between these topologies for the same ...
Uploads
Papers by bzar hussan