Search Results Collection Resources (3515)

View
Selected filters:
  • Computer Science
2&What the server does, part I
Conditions of Use:
Remix and Share
Rating

What the server does| part 1 and part 2 The first part ...

What the server does| part 1 and part 2
The first part is the status line
The second part of the response is header information| ended by a blank line

Subject:
Computer Science
Material Type:
Lecture
Provider:
King Abdulaziz University
Author:
King Abdulaziz University
كلية الحاسبات
Date created
5-جمادي الآخرة-1440
The 3D Redeployment of Nodes in Wireless Sensor Networks with Real Testbed Prototyping
Rating

In wireless sensor networks (WSNs)| prototyping systems facilitate the realization of real ...

In wireless sensor networks (WSNs)| prototyping systems facilitate
the realization of real node deployment| enabling to test new algorithms| protocols|
and networking solutions. This paper investigates the 3D indoor redeployment
problem in WSNs by finding the positions where nodes should be added in
order to improve an initial deployment while optimizing different objectives. For
this purpose| an approach based on a recent evolutionary optimization algorithm
(NSGA-III) is used. The latter algorithm is hybridized with a strategy of incorporating
of the user preferences (PI-EMO-VF). The major contributions of this
work are as follows: testing the NSGA-III efficiency in the case of real world
problems| comparing it with another recent many-objective algorithm (MOEA/
DD)| and incorporating the concept of preferences of users into NSGA-III. The
real experiments performed on our testbeds indicate that the results given by the
proposed algorithm are better than those given by other recent optimization algorithms
such as MOEA/DD.

Subject:
Computer Science
Material Type:
Data Set
Provider:
University of Tabuk
Author:
Dr. Nejah Nasri
University of Tabuk
Date created
25-جمادي الأولى-1440
ACTIVE E-MAIL SYSTEM SMTP PROTOCOL MONITORING ALGORITHM
Rating

E-mail system is one of the most ubiquitous Internet-based applications today. It ...

E-mail system is one of the most ubiquitous Internet-based applications today. It enables users
to send and receive E-mail messages among each other within and from outside of the local area
network. E-mail system is used every day in almost all organizations as a communication tool between
managers| employees| customers| and partners for better information flow and conduct business which
requires communication with people outside the organization| or from different geographical
locations. The E-mail system offers a fast| reliable and easy solution for such communication. SMTP
(Simple Mail Transfer Protocol) is a transportation protocol used to transfer E-mail messages over the
Internet. All E-mail servers use the SMTP to send E-mails from one E-mail server to another. SMTP
is also used to send E-mail messages from E-mail clients to E-mail servers. In this paper| the SMTP
E-mail system protocol will be briefly explained. New Active monitoring algorithm architecture is
also proposed to improve the current E-mail system protocol functions and detect the SMTP protocol
failure during the process of sending E-mail messages

Subject:
Computer Science
Material Type:
Lecture
Provider:
University of Tabuk
Author:
Dr. Homam El-Taj
University of Tabuk
Date created
29-جمادي الأولى-1440
AGGREGATING IDS ALERTS BASED ON TIME THRESHOLD: TESTING AND RESULTS
Rating

Every secure system has the possibility to fail. Therefore| extra effort should ...

Every secure system has the possibility to fail. Therefore| extra effort should be taken to protect these systems. Intrusion Detection Systems (IDSs) had been proposed with the aim of providing extra protection to security systems. These systems trigger thousands of alerts per day| which prompt security analysts to verify each alert for relevance and severity based on an aggregation criterion. Several aggregation methods have been proposed to collect these alerts. This paper presents our threshold aggregation system (TAS). Results shows that TAS aggregates IDS alerts accurately based on user demands and threshold value.

Subject:
Computer Science
Material Type:
Lecture
Provider:
University of Tabuk
Author:
Dr. Homam El-Taj
University of Tabuk
Date created
25-جمادي الأولى-1440
API java.
Conditions of Use:
Remix and Share
Rating

void await() Put the thread on wait set for this condition. void ...

void await()
Put the thread on wait set for this condition.
void signalAll()
Unblock all threads in the wait set for this condition.
void signal()
Unblock one random thread from the wait set for this condition

Subject:
Computer Science
Material Type:
Lecture
Provider:
King Abdulaziz University
Author:
King Abdulaziz University
قسم تقنية المعلومات،كلية الحاسبات
Date created
5-جمادي الآخرة-1440
Abstract Factory Design Pattern
Conditions of Use:
Remix and Share
Rating

This subject is made about Abstract Factory Design Pattern and public class ...

This subject is made about Abstract Factory Design Pattern and public class Green implements Color and Consequences

Subject:
Computer Science
Material Type:
Syllabus
Provider:
King Abdulaziz University
Author:
King Abdulaziz University
تقنية المعلومات بكلية الحاسبات
Date created
29-جمادي الأولى-1440