T R A C K       P A P E R

Login Panel

Close tab

Password Meter

International Journal of Engineering and Advanced Research Technology

Volume 2 Issue 2 (February 2016)

S.No. Title & Authors Page No View
1

Title : Strategy and working methods of Software security testing techniques

Authors : Mubarak Elamin Elmubarak Daleel

Click Here For Abstract

Download Certificate
Abstract :

We will speak in this search for software testing, which is an activity designed to assess the ability of the program and must ensure that the desired result is also a way to reduce errors and selection of technologies to develop the software and how to enhance the quality of the software and will discuss security software testing in order to verify the implementation of a safe product and reduce security vulnerabilities and security testing to find the weaknesses and keep the final product of malicious users.

1-6
2

Title : Multiple routes routing in computer networks remote distance

Authors : Khalied Shredeh

Click Here For Abstract

Download Certificate
Abstract :

A method for increasing the efficiency of routing based on a system of agents. The analysis of the variation of the distribution network environment first and second order network topology and the location of the agents. It is shown that with a change in the topology of the density distribution varies in a nonlinear law.

7-9
3

Title : Performance Analysis Of Voip Using Udp And Tcp Protocol

Authors : Ravonimanantsoa Ndaohialy Manda-Vy, Ratiarison Adolphe

Click Here For Abstract

Download Certificate
Abstract :

This Voice over IP is a technology which consists of sending voice over the IP heterogeneous network Due to the recent technological advancement in packet switching networks, VoIP (Voice over Internet Protocol) has become an industry favourite over Public Switching Telephone Networks (PSTN) with regards to voice communication. The cheap cost of making a call through VoIP internationally and paying just one bill for data usage is a huge benefit. Although, there are huge advantages to using VoIP, there are some known issues such as, packet loss, jitter and latency due to the connection through the computer internet. The main purpose of this work consists of studying these problematic and to create a VoIP network with NS 2.35 and testing for its known faults. Through this we want to get a better understanding of the underlying layers of the network (TCP and UDP) and see if and where improvements can be made.

10-15
4

Title : Towards building standard datasets for Arabic recognition

Authors : Mohamed E. M. Musa

Click Here For Abstract

Download Certificate
Abstract :

Current Machine learning and pattern recognition method needs big dataset to produce efficient and accurate recognizers. The lack of standard big Arabic dataset is one of the big challenges that faces the research in this area. This paper presents the Arabic dataset collected and annotated by SUST-ALT (Sudan University of Science and Technology- Arabic Language Technology group) to  contribute in filling this gap. The datasets contain: numerals datasets, isolated Arabic letters datasets, Arabic names datasets. Tese datasets contain offline dataset as well as online ones.  The paper also describes some published results as well as future work.

16-19
5

Title : Simulation of Water Supply Distribution Networks Systems

Authors : Nagib Ghaleb. N. Mohammed

Click Here For Abstract

Download Certificate
Abstract :

The paper deals with the simulation of network remodeling in linear case and demonstrate how virtual distortion generated a chosen branch (e.g. in the branch No.4) can simulate the network modification due to total blocking flow in this branch. To this end, the condition of flow vanishing in the branch under remodelling should be postulated, where the resultant state of flow redistribution is calculated from the formulas superposing linear response of the original network configuration and the component induced by unknown virtual distortion. Then making use of the analytical network model [1, 3, 4] of this installation and using presented below, the so-called Virtual Distortion Method (VDM), simulation of network remodeling can be performed.

20-23