Volume 2 Number 1 April 2013

    
Case Study: Comparison Between Traditional Indexing and Columnstore Indexes in SQL Server 2012

Anas A. Amro, Mohammed Abutaha

https://doi.org/

Abstract The SQL Server 2012 has a new feature to improve performance of data warehouse queries called Columnstore index, stores data by columns instead of by rows. This paper discusses the new type of index in some details, what is a column store, how and why improves the speed up and performance of the same queries that processing in SQL Server... Read More


Context-Aware Handover for Video Applications in Wireless Networks

Nadine Akkari, Hanan Al Hazmi

https://doi.org/

Abstract Next Generation Wireless Networks (NGWN) is a ubiquitous environment that integrates various wireless technologies such as WLAN, 3G, and WiMAX based on IP. One of the most challenging issues of NGWN is providing seamless service continuity while user roaming among different wireless access networks. Context awareness has showed a significant effect to guarantee services continuity. In this paper, we will... Read More


An Ontology-Based Context Model for Ubiquitous Applications

Boudjemaa Boudaa, Slimane Hammoudi, Mohammed Amine Chikh

https://doi.org/

Abstract The development of context-aware ubiquitous ap-plications has been an emergent subject of several researches in pervasive computing. In different context modelling proposed approaches, we notice that there is still no consensus and their context models are either incomplete or domain specific. This paper aims to summarize these approaches and proposes a context model which should be common to be used... Read More


New Learning Approach by Co-training for Complex Data Classification

Salma Kammoun Jarraya, Rania Rebai Boukhriss, Emna Jammouci Fendri, Mohamed Hammami Hanêne Ben-Abdallah

https://doi.org/

Abstract The complexity, abundance and diversity of data (text, images, sound and video) are at the origin of new software solutions for their exploitation. These solutions make use of learning techniques. Among of these techniques, we distinguish learning through co-training, which turned out to be a very exploited by researchers thanks to its low sensitivity to noise, robustness and rapidity. However,... Read More