scispace - formally typeset
Search or ask a question

Showing papers in "Egyptian Informatics Journal in 2011"


Journal ArticleDOI
TL;DR: This study compares the classification accuracy among nine decision tree methods and evaluates the behaviors of these methods with/without applying attribute selection (A.S.) techniques such as Chi-square attribute selection and Gain Ratio attribute selection.

68 citations


Journal ArticleDOI
TL;DR: A hotel revenue management model based on dynamic pricing is proposed to provide hotel managers with a flexible and efficient decision support tool for room revenue maximization and shows an increase in revenue compared to the classical model used in literature.

58 citations


Journal ArticleDOI
TL;DR: An early congestion detection and adaptive routing in MANET called EDAPR, which improves performance in terms of reducing delay, routing overhead and increases packet delivery ratio without incurring any significant additional cost.

50 citations


Journal ArticleDOI
TL;DR: In this paper a proposed conceptual quality model to organize WBA quality factors in terms of its sub factors was identified and effectively reflects the main views of WBA based on the opinion of highly skilled professionals.

36 citations


Journal ArticleDOI
TL;DR: Study of the QoS of an energy-efficient cluster-based routing protocol called Energy-Aware routing Protocol (EAP) in terms of lifetime, delay, loss percentage, and throughput, and proposes some modifications on it to enhance its performance.

34 citations


Journal ArticleDOI
TL;DR: This paper performs extensive simulations using GloMoSim simulator considering 18 performance metrics of Ad hoc On-Demand Distance Vector Routing and Dynamic Source Routing to determine the impact of network size on the performance of these protocols.

33 citations


Journal ArticleDOI
TL;DR: In this article, a novel pattern based clustering algorithm that extends the k-means algorithm for clustering moving object trajectory data is presented. And the proposed algorithm uses a key feature of moving object trajectories namely, its direction as a heuristic to determine the different number of clusters for the kmeans.

33 citations


Journal ArticleDOI
TL;DR: The shapes of the positive and convex data are under discussion of the proposed spline solutions of the C 2 rational cubic spline.

29 citations


Journal ArticleDOI
TL;DR: The analysis shows that eye wrinkles which cover 30% of the facial area contain the most important aging features compared to internal face and whole face.

28 citations


Journal ArticleDOI
TL;DR: The performance of PSWWV algorithm and the solution quality prove that PSWV is highly competitive and can be considered as a viable alternative to solve optimization problems.

23 citations


Journal ArticleDOI
TL;DR: The usual Mean Square Error minimization principle is substituted by the minimization of Shannon Entropy (SE) of the differences between the multilayer perceptions output and the desired target and indicates that MSE speeds the convergence than Shannon Entropic cost functions.

Journal ArticleDOI
TL;DR: An intelligent and optimized scheme to solve parking space problem for a small city using a reactive search technique (named as Tabu Search) assisted by rough set, which could provide substantial research directions for other similar hard optimization problems.

Journal ArticleDOI
Ahmed Younes1
TL;DR: A genetic algorithm for solving multimedia multicast routing, which find the low-cost multicasting tree with bandwidth and delay constraints, using the k shortest paths from the source node to the destination nodes for genotype representation.

Journal ArticleDOI
TL;DR: Results for historical document classification of old Arabic manuscripts using texture analysis and a segmentation free approach to discriminate between historical documents of different writing styles to three different ages: Contemporary (Modern) Age, Ottoman Age and Mamluk Age.

Journal ArticleDOI
TL;DR: It is found that DSR may be secured using mobile agents with competitive performance, and Hybrid encryption technique (symmetric key encryption/public key encryption) is used to improve performance.

Journal ArticleDOI
TL;DR: A comparative study has been done between the developed SNLDD algorithm and the Longest Dynamic Critical Path algorithm and it is found that the performance of the developed algorithm provides better performance than the LDCP algorithm in terms of speedup, efficiency, complexity, and quality.

Journal ArticleDOI
TL;DR: A new algorithm is proposed to determine FMM parameters from incomplete data that has better performance than the modified EM algorithm when the dimensions containing missing values are at least moderately correlated with some of the complete dimensions.

Journal ArticleDOI
TL;DR: A channel borrowing scheme used in conjunction with a First-In-First-Out (FIFO) queue in the macrocell tier is introduced, and an iterative technique to find the steady-state probability distribution is utilized.

Journal ArticleDOI
TL;DR: An intelligent and an efficient query processing approach for semantic mediation of information systems that focuses on the exploitation of intelligent agents for query reformulation and the use of a new technology for the semantic representation.

Journal ArticleDOI
TL;DR: This paper presents PSG framework architecture that offers semantic-based grid services, originated from the integration of Peer-to-Peer computing with semantics and agents, and allows the explicit use of semantics and defining the associated grid services.

Journal ArticleDOI
Ahmed R. Abas1
TL;DR: An algorithm is proposed to integrate the unsupervised learning with the optimization of the Finite Mixture Models and shows the superiority of the proposed algorithm over the other algorithms especially with data sets that are sparsely distributed or generated from overlapped clusters.

Journal ArticleDOI
TL;DR: A novel decentralized approach enabling us to consider the heterogeneous characteristics of sensor nodes in the Adaptive Relocation Strategy and simulation results are presented to show that the proposed solution achieves the high coverage performance in few rounds with minimum energy consumption and minimum computations.

Journal ArticleDOI
TL;DR: A new algorithm for solving the watermark desynchronization attacks using a probabilistic embedding model combined with the longest common substring technique is introduced and concludes that, the attacker could not distort a big part of the watermarks.