Volume 8 Number 3 September 2017


Advanced QoS Routing Algorithm in Wireless Ad-Hoc Networks

Hussein El-Attar, Mohamed Ibrahim El-Emary

https://doi.org/

Abstract QoS configuration is needed to maintain the global network needs as Maintaining Max Network Throughput, Maintaining Minimum Network Consumption, Assigning Specific Profiles upon Organization’s Request and Targeting Prioritizing Service Delivery Based On The Constraints Faced. This paper will introduce an optimization solution for multi-constrained routing problem to assess the potential benefit of QoS routing. Multi Constrained Routing Algorithm (OMCR) will... Read More


Fuzzy logic methodology for cyber security risk mitigation approach

Mansour Al-Ali, Ahmad AlMogren

https://doi.org/

Abstract This paper describes the impacts of criminal activates based on the nature of the crime, the victim, and the basis (whether short-term or longrange) of the impacts of cybercrime. Saudi Arabia faces numerous cyber threats including DoS (and DDoS), malware, website defamation, and spam and phishing email attacks. Although recent findings highlight the poor state of Saudi Arabia’s information security system, it is... Read More


Learning Influence Probabilities in Social Networks

Prathamesh Jeevan Phuke, Suresh B. Rathod

https://doi.org/

Abstract The study of spread of data is meanly expanded in online interpersonal organizations, for example, Facebook and Twitter. To use online interpersonal organizations as a promoting stage, there are loads of examinations on the best way to use the proliferation of strength for viral advertising. One of the exploration issues is influence maximization (IMAX), which plans to discover k seed clients to amplify... Read More