Skip to main content
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties.... more
    • by 
    •   20  
      Electrical EngineeringComputer ScienceInformaticsNetwork Security
Current cellular networks support video streaming over unicast or multicast. However, there exists a tradeoff between utilizing the two: i) unicast leads to higher network load, but lower energy consumption of mobile devices, and ii)... more
    • by 
    •   3  
      EngineeringComputer ScienceComputer Network
The purpose of this paper is to increase the efficiency of functionality and reliability of Complex Recycling Technical Systems (CRTS) community, by improving the control quality of their life cycle. Automated Control System (ACS) on the... more
    • by 
    •   5  
      EngineeringComputer ScienceArtificial Neural Networkservice Business
Abstract: This paper introduces theoretical results of research oriented on development object-oriented models of filter systems of attention. The diagrammatical language UML is used as a means of modeling of attentional systems. Two... more
    • by 
    •   5  
      Computer ScienceObject Oriented Software ModelingObject Oriented ModelUnified Modeling Language
Abstract: This paper depicts theoretical results obtained in the line of projects related to constructing dialogue applications based on a formal cognitive model of a human-machine dialogue. One of the aims of the paper is to propose an... more
    • by 
    •   3  
      Computer ScienceProcedural KnowledgeKnowledge base
The paper is an attempted to discuss one of the must important components in the architecture of personalized teaching systems-the testing system. One of the aims of the paper is to propose a definition of cognitive state, which can be... more
    • by 
    •   6  
      Computer ScienceComputers in EducationTeaching MethodsMH
This article presents results of a theoretical investigation of the application of the objectoriented Unified Modelling Language to a formal description of Neisser's cycle of perception. The article includes class diagrams, modelling the... more
    • by 
    •   5  
      Computer ScienceUnified Modelling LanguageClass DiagramObject Oriented
During the last decade, many of the Intelligent Tutoring Systems (ITS) have been developed in different domains. ITS deliver important learning gains outside classroom environments. Expert systems have been extensively used to implement... more
    • by 
    •   6  
      MathematicsComputer ScienceArtificial IntelligenceMathematics Education
Computer-Aided Learning (CAL) tools could offer a better learning environment for computer science students. This paper presents a CAL tool that helps students understand the essential knowledge about networking design. The aim of the CAL... more
    • by 
    •   3  
      Computer ScienceEngineering DrawingEngineering and Applied Sciences
This paper aims at improving web server performance by establishing a middleware layer between web and database servers, which minimizes the overload on the database server. A middleware system has been developed as a service mainly to... more
    • by 
    •   6  
      Computer ScienceWorld Wide WebServerWeb Server