Now showing items 1-20 of 49

    • Expert personalized e-learning recommender system 

      OTAIR, DR. MOHAMMED A.; HAMAD, AHMED Q. AL (2005-05)
      E-learning environments are based on a range of delivery and collaborative services. Introducing personalized recommender system in e-learning environment can support learning recommendations to learners. This paper ...
    • Non-monotonic Negation in Hybrid Probabilistic Logic Programs 

      Saad Emad; Pontelli Enrico (2006)
      In [23], a new Hybrid Probabilistic Logic Programs framework has been proposed, and a new semantics has been developed to enable encoding and reasoning about real-world applications. In this paper, the language of Hybrid ...
    • Comments on the Channel Capacity of Ethernet 

      Heal Maher H. (2006)
      Abstract-Ethernet is the most widely used network and many analytical models were developed to predict its capacity. Usually in these models assumptions like infinite population, no back-off algorithm and slotted channel ...
    • A Comment on the Throughput of Non-persistent CSMA 

      Maher H. Heal (Citeseer, 2006)
      A better estimate of the throughput of nonpersistent CSMA without collision detection protocol is obtained by using a bus-star model. A bus when a station initiates transmission and a star when the transmission ends
    • Information sharing for social inclusion in England: A review of activities, barriers and future directions 

      Foley Paul; Alfonso Ximena; Sakka Al Mohammed (Emerald, 2006)
      A number of central government policy initiatives in the UK are encouraging the sharing of information between government and other partners. A relatively large amount of information is available to enhance social inclusion ...
    • Context-Aware Telephony: Privacy Preferences and Sharing Patterns. 

      Connelly Kay; Khalil Ashraf (ACM, 2006)
      The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has ...
    • Logics in Artificial Intelligence 

      Steffen Hölldobler; Carsten Lutz; Heinrich Wansing; J.G. Carbonell; J. Siekmann (Springer, 2006)
      Situated at the intersection of machine learning and logic programming, inductive logic programming (ILP) has been concerned with finding patterns expressed as logic programs. While ILP initially focussed on automated program ...
    • A Framework for Visualizing Association Mining Results 

      Gural Ertek; Ayhan Demiriz (2006)
      Association mining is one of the most used data mining techniques due to interpretable and actionable results. In this study we propose a framework to visualize the association mining results, specifically frequent itemsets ...
    • Achieving Usability Within E-Government Web Sites Illustrated by a Case Study Evaluation 

      Basil Soufi; Martin Maguire (Springer, 2007)
      Local government in the UK has made progress towards the delivery of services online. However individual local authorities do not necessarily have the experience or infrastructure to develop web sites that are usable and ...
    • EGovernment interoperability issues in Lithuania 

      Vitkauskaitė Elena; R Gatautis (proceeding of the Eight International Conference on Electronic Business, 2008)
      A survey for success factors of Web application development reveals that development methodologies, tools, and techniques are not considered as important by developers for the success of Web application development. Rapid ...
    • Integrating ‘learning style’information into personalized e-learning system 

      Hamad, Ahmed Al-; Yaacob, Norlaily; Zoubi, AY Al- (2008-03)
      E-Learning environments are based on a range of delivery and collaborative services. Introducing personalized recommender system in e-Learning environments can support learning recommendations to students. The main aim ...
    • Exploring uae women’s experiences with IT 

      Shakir Maha; Shen, Kathy; Vodanovich, Shahper; Urquhart, Cathy (Citeseer, 2008-05-25)
      This study explores the ways UAE women are using, benefiting from, and are affected by information technology (IT). IT has an important role for individuals, businesses, and societies. However, a great deal of published ...
    • Internet usage among young Arab students: preliminary finding 

      Shen Kathy Ning; Shakir Maha (European, Mediterranean and Middle Eastern Conference on Information System, 2009)
      Internet has profoundly transformed almost all aspects of our society. As a global phenomenon, Internet also bears distinct regional and cultural profiles. Much research has documented the Internet usage in Western world ...
    • A Collaborative Approach to Minimize Cellphone Interruptions 

      Khalil Ashraf; Connelly Kay (Springer, 2009)
      In this paper, we present a collaborative approach to minimizing in- appropriate cellphone interruptions. The approach uses Bluetooth technology to discover and communicate with the surrounding cell phones in order to read ...
    • A neural network for diagnosing multiprocessor and multicomputer systems 

      Elhadef Mourad (Emerald Group Publishing Limited, 2009)
      Purpose – The purpose of this paper is to describe a novel diagnosis approach, using neural networks (NNs), which can be used to identify faulty nodes in distributed and multiprocessor systems. Design/methodology/approach – ...
    • A crash faults detection service for wireless and mobile ad hoc networks 

      Elhadef Mourad (Emerald Group Publishing Limited, 2009)
      Purpose – The purpose of this paper is to describe an adaptive approach for diagnosing faulty nodes in a wireless mobile environment. Design/methodology/approach – Based on a diagnosis approach that has been previously ...
    • Challenges in "mobilizing" desktop applications: a new methodology for requirements engineering 

      Mizouni, Rabeb; Serhani, Adel; Dssouli, Rachida; Benharref Abdelghani (IEEE, 2009)
      With the proliferation of mobile devices, the challenge today is to provide users with applications that are of real value. These applications are, in most of the cases, mobilized versions of desktop applications that fit ...
    • The leapfrog effects of wireless networks for smes: preliminary findings from a community hospital 

      Chen Wenshin (The 9th International Conference on Electronic Business, Macau, 2009-01)
      This article briefly summarizes a case study that investigates how wireless networks renovate a community hospital’s competitive operations. Due to limited resources, this small community hospital failed to follow ...
    • Web 2.0 and e-governments: an exploration of potentials & realities in the arab world 

      Abdallah Salam; Khalil Ashraf (European and Mediterranean Conference on Information System, 2009-07)
      The emergence of Web 2.0 applications, or social media, is changing the social life of people and beginning to infiltrate and impact governments in the Western World. There, the emergence of a new government paradigm is ...
    • Internet as an Empowerment Tool in Conflict Zones. 

      Khalil Ashraf; Abdallah Salam (Inderscience publishers, 2010)
      The proliferation of the internet has become an integral part of our daily life serving multiple purposes. The internet has become a major channel for education, business, communication and entertainment. The far-reaching ...