Volume 3 Number 2 August 2012

    
Performance Enhancement of AODV Routing Protocol in Mobile Ad hoc Networks

Zouhair El-Bazzal, Khaldoun El-Ahmadieh, Ali Chamas Al Ghouwayel

https://doi.org/

Abstract Ad-hoc On Demand Distance Vector (AODV) routing protocol has been one of the prominent routing protocols for Mobile Ad hoc Networks. AODV uses the hop count as a path selection metric. However, routing based on the hop count may not lead to optimal route selection. In this paper we propose a cross layered based routing protocol called Turbo-AODV (TAODV) where... Read More


Modeling and Analyzing IEEE 802.11n MAC Frame Aggregation Techniques

Nazeeruddin Mohammad, Shahabuddin Muhammad

https://doi.org/

Abstract To meet the increased expectations and demand for higher data rates in Wireless LANs (WLANs) several new physical layer technologies were developed. However, the actual achievable throughput of WLANs is restricted by the overheads of IEEE 802.11 medium access control (MAC) layer. Several frame aggregation mechanisms have been proposed to improve the MAC layer performance in 802.11n. This paper models... Read More


Data Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection

Iwan Syarif , Adam Prugel-Bennett, Gary Wills

https://doi.org/

Abstract This paper describes the use of data mining techniques to solve three important issues in network intrusion detection problems. The first goal is finding the best dimensionality reduction algorithm which reduces the computational cost while still maintains the accuracy. We implement both feature extraction (Principal Component Analysis and Independent Component Analysis) and feature selection (Genetic Algorithm and Particle Swarm Optimization)... Read More


Understanding Children Arabic Educational Texts through Keywords Extraction, Ontology and Multimedia Elements

Jihad M. Alja’am, Masoud Udi Mwinyi, Sami Abdelrahim Elzeiny, Ali M. Jaoua

https://doi.org/

Abstract Teaching children with intellectual disabilities is a challenging task. Instructors should repeat the same lessons several times. They should use also different methodologies to introduce the concepts and motivate the children and keep them engaged. These methodologies include: reading texts, showing images, touching items, taking children to sites, and even using the taste and smell senses. The objective of this... Read More


The Impact of Configurations on the Performance of Server Based Computing

Renatus Michael, Faith Shimba, Daniel Koloseni

https://doi.org/

Abstract Server based computing performance can be affected by several factors. Some previous researches on performance of Server based computing came up with factors which falls to the category of server itself and on the network infrastructure. This research explores the performance behaviour of Thin Client terminals by measuring the performance while changing the performance optimisation configurations on the client side.... Read More