Abstract: In this paper is being described a possible use of
virtualization technology in teaching computer networks. The
virtualization can be used as a suitable tool for creating virtual
network laboratories, supplementing the real laboratories and
network simulation software in teaching networking concepts. It will
be given a short description of characteristic projects in the area of
virtualization technology usage in network simulation, network
experiments and engineering education. A method for implementing
laboratory has also been explained, together with possible laboratory
usage and design of laboratory exercises. At the end, the laboratory
test results of virtual laboratory are presented as well.
Abstract: Load balancing in distributed computer systems is the
process of redistributing the work load among processors in the
system to improve system performance. Most of previous research in
using fuzzy logic for the purpose of load balancing has only
concentrated in utilizing fuzzy logic concepts in describing
processors load and tasks execution length. The responsibility of the
fuzzy-based load balancing process itself, however, has not been
discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a
new fuzzy dynamic load balancing algorithm for homogenous
distributed systems. The proposed algorithm utilizes fuzzy logic in
dealing with inaccurate load information, making load distribution
decisions, and maintaining overall system stability. In terms of
control, we propose a new approach that specifies how, when, and by
which node the load balancing is implemented. Our approach is
called Centralized-But-Distributed (CBD).
Abstract: This article deals with the popularity of candidates for the president of the United States of America. The popularity is assessed according to public comments on the Web 2.0. Social networking, blogging and online forums (collectively Web 2.0) are for common Internet users the easiest way to share their personal opinions, thoughts, and ideas with the entire world. However, the web content diversity, variety of technologies and website structure differences, all of these make the Web 2.0 a network of heterogeneous data, where things are difficult to find for common users. The introductory part of the article describes methodology for gathering and processing data from Web 2.0. The next part of the article is focused on the evaluation and content analysis of obtained information, which write about presidential candidates.
Abstract: For future Broad band ISDN, Asynchronous Transfer
Mode (ATM) is designed not only to support a wide range of traffic
classes with diverse flow characteristics, but also to guarantee the
different quality of service QOS requirements. The QOS may be
measured in terms of cell loss probability and maximum cell delay.
In this paper, ATM networks in which the virtual path (VP)
concept is implemented are considered. By applying the Markov
Deterministic process method, an efficient algorithm to compute the
minimum capacity required to satisfy the QOS requirements when
multiple classes of on-off are multiplexed on to a single VP. Using
the result, we then proposed a simple algorithm to determine different
combinations of VP to achieve the optimum of the total capacity
required for satisfying the individual QOS requirements (loss- delay).
Abstract: An early and accurate detection of Alzheimer's disease (AD) is an important stage in the treatment of individuals suffering from AD. We present an approach based on the use of structural magnetic resonance imaging (sMRI) phase images to distinguish between normal controls (NC), mild cognitive impairment (MCI) and AD patients with clinical dementia rating (CDR) of 1. Independent component analysis (ICA) technique is used for extracting useful features which form the inputs to the support vector machines (SVM), K nearest neighbour (kNN) and multilayer artificial neural network (ANN) classifiers to discriminate between the three classes. The obtained results are encouraging in terms of classification accuracy and effectively ascertain the usefulness of phase images for the classification of different stages of Alzheimer-s disease.
Abstract: The growth of open networks created the interest to
commercialise it. The establishment of an electronic business
mechanism must be accompanied by a digital – electronic payment
system to transfer the value of transactions. Financial organizations
are requested to offer a secure e-payment synthesis with equivalent
level of security served in conventional paper-based payment
transactions. PKI, which is functioning as a chain of trust in security
architecture, can enable security services of cryptography to epayments,
in order to take advantage of the wider base either of
customer or of trading partners and the reduction of cost transaction
achieved by the use of Internet channels. The paper addresses the
possibilities and the implementation suggestions of PKI in relevance
to electronic payments by suggesting a framework that should be
followed.
Abstract: One of the major parts of a jet engine is air intake,
which provides proper and required amount of air for the engine to
operate. There are several aerodynamic parameters which should be
considered in design, such as distortion, pressure recovery, etc. In
this research, the effects of lip ice accretion on pitot intake
performance are investigated. For ice accretion phenomenon, two
supervised multilayer neural networks (ANN) are designed, one for
ice shape prediction and another one for ice roughness estimation
based on experimental data. The Fourier coefficients of transformed
ice shape and parameters include velocity, liquid water content
(LWC), median volumetric diameter (MVD), spray time and
temperature are used in neural network training. Then, the subsonic
intake flow field is simulated numerically using 2D Navier-Stokes
equations and Finite Volume approach with Hybrid mesh includes
structured and unstructured meshes. The results are obtained in
different angles of attack and the variations of intake aerodynamic
parameters due to icing phenomenon are discussed. The results show
noticeable effects of ice accretion phenomenon on intake behavior.
Abstract: This paper describes the use of artificial neural
networks (ANN) for predicting non-linear layer moduli of flexible
airfield pavements subjected to new generation aircraft (NGA)
loading, based on the deflection profiles obtained from Heavy
Weight Deflectometer (HWD) test data. The HWD test is one of the
most widely used tests for routinely assessing the structural integrity
of airport pavements in a non-destructive manner. The elastic moduli
of the individual pavement layers backcalculated from the HWD
deflection profiles are effective indicators of layer condition and are
used for estimating the pavement remaining life. HWD tests were
periodically conducted at the Federal Aviation Administration-s
(FAA-s) National Airport Pavement Test Facility (NAPTF) to
monitor the effect of Boeing 777 (B777) and Beoing 747 (B747) test
gear trafficking on the structural condition of flexible pavement
sections. In this study, a multi-layer, feed-forward network which
uses an error-backpropagation algorithm was trained to approximate
the HWD backcalculation function. The synthetic database generated
using an advanced non-linear pavement finite-element program was
used to train the ANN to overcome the limitations associated with
conventional pavement moduli backcalculation. The changes in
ANN-based backcalculated pavement moduli with trafficking were
used to compare the relative severity effects of the aircraft landing
gears on the NAPTF test pavements.
Abstract: For a spatiotemporal database management system,
I/O cost of queries and other operations is an important performance
criterion. In order to optimize this cost, an intense research on
designing robust index structures has been done in the past decade.
With these major considerations, there are still other design issues
that deserve addressing due to their direct impact on the I/O cost.
Having said this, an efficient buffer management strategy plays a key
role on reducing redundant disk access. In this paper, we proposed an
efficient buffer strategy for a spatiotemporal database index
structure, specifically indexing objects moving over a network of
roads. The proposed strategy, namely MONPAR, is based on the data
type (i.e. spatiotemporal data) and the structure of the index
structure. For the purpose of an experimental evaluation, we set up a
simulation environment that counts the number of disk accesses
while executing a number of spatiotemporal range-queries over the
index. We reiterated simulations with query sets with different
distributions, such as uniform query distribution and skewed query
distribution. Based on the comparison of our strategy with wellknown
page-replacement techniques, like LRU-based and Prioritybased
buffers, we conclude that MONPAR behaves better than its
competitors for small and medium size buffers under all used query-distributions.
Abstract: This paper presents the IP traffic analysis. The traffic
was collected from the network of Suranaree University of
Technology using the software based on the Simple Network
Management Protocol (SNMP). In particular, we analyze the
distribution of the aggregated traffic during the hours of peak load
and light load. The traffic profiles including the parameters described
the traffic distributions were derived. From the statistical analysis
applying three different methods, including the Kolmogorov Smirnov
test, Anderson Darling test, and Chi-Squared test, we found that the
IP traffic distribution is a non-normal distribution and the
distributions during the peak load and the light load are different. The
experimental study and analysis show high uncertainty of the IP
traffic.
Abstract: This paper presents an innovative computer system
that contributes to sustainable development of the enterprise. The
research refers to a rethinking of traditional systems of collaboration
and risk assessment, present in any organization, leading to a
sustainable enterprise. This concept integrates emerging tools that
allow the implementation and exploitation of the collective
intelligence of the enterprise, allowing the exchange of contextual,
agile and simplified information, and collaboration with networks of
customers and partners in an environment where risks are controlled.
Risk assessment is done in a systemic way: the enterprise as the
system compared to the contained departments and the enterprise as a
subsystem compared to: families of international standards and
sustainability-s responsibilities. The enterprise, in this systemic
vision, responds to the requirements that any existing system to
operate continuously in an indefinite future without reaching key
resource depletion. The research is done by integrating collaborative
science, engineering, management, psychology, obtaining thus a
cornerstone of sustainable development of the enterprise.
Abstract: The elution process for the removal of Co and Cu from clinoptilolite as an ion-exchanger was investigated using three parameters: bed volume, pH and contact time. The present paper study has shown quantitatively that acid concentration has a significant effect on the elution process. The favorable eluant concentration was found to be 2 M HCl and 2 M H2SO4, respectively. The multi-component equilibrium relationship in the process can be very complex, and perhaps ill-defined. In such circumstances, it is preferable to use a non-parametric technique such as Neural Network to represent such an equilibrium relationship.
Abstract: The future of business intelligence (BI) is to integrate
intelligence into operational systems that works in real-time
analyzing small chunks of data based on requirements on continuous
basis. This is moving away from traditional approach of doing
analysis on ad-hoc basis or sporadically in passive and off-line mode
analyzing huge amount data. Various AI techniques such as expert
systems, case-based reasoning, neural-networks play important role
in building business intelligent systems. Since BI involves various
tasks and models various types of problems, hybrid intelligent
techniques can be better choice. Intelligent systems accessible
through web services make it easier to integrate them into existing
operational systems to add intelligence in every business processes.
These can be built to be invoked in modular and distributed way to
work in real time. Functionality of such systems can be extended to
get external inputs compatible with formats like RSS. In this paper,
we describe a framework that use effective combinations of these
techniques, accessible through web services and work in real-time.
We have successfully developed various prototype systems and done
few commercial deployments in the area of personalization and
recommendation on mobile and websites.
Abstract: As the number of networked computers grows,
intrusion detection is an essential component in keeping networks
secure. Various approaches for intrusion detection are currently
being in use with each one has its own merits and demerits. This
paper presents our work to test and improve the performance of a
new class of decision tree c-fuzzy decision tree to detect intrusion.
The work also includes identifying best candidate feature sub set to
build the efficient c-fuzzy decision tree based Intrusion Detection
System (IDS). We investigated the usefulness of c-fuzzy decision
tree for developing IDS with a data partition based on horizontal
fragmentation. Empirical results indicate the usefulness of our
approach in developing the efficient IDS.
Abstract: Since Network-on-Chip (NoC) uses network
interfaces (NIs) to improve the design productivity, by now, there
have been a few papers addressing the design and implementation of a
NI module. However, none of them considered the difference of
address encoding methods between NoC and the traditional
bus-shared architecture. On the basis of this difference, in the paper,
we introduce a transmit mechanism to solve such a problem for global
asynchronous locally synchronous (GALS) NoC. Furthermore, we
give the concrete implementation of the NI module in this transmit
mechanism. Finally, we evaluate its performance and area overhead
by a VHDL-based cycle-accurate RTL model and simulation results
confirm the validity of this address-oriented transmit mechanism.
Abstract: According to the majority and to stereotypes in a simple everyman religious processes in the world in general, and Kazakhstan in particular, have only negative trends. The main reason for the author's opinion is seen in the fact that the media in the pursuit of ratings and sensation, more inclined to highlight the negative aspects of events in the country and the world of processes forgetting or casually mentioning the positive initiatives and achievements. That is why the article is mainly revealed positive trends in mind that the problems of fanaticism, terrorism and the confrontation of society on various issues, a lot has been written and detailed. This article describes the stages in the development of relations between religion and state, as well as institutionalization, networking and assistance in the correct orientation of religious activities in the country.
Abstract: In this work, we study the problem of determining
the minimum scheduling length that can satisfy end-to-end (ETE)
traffic demand in scheduling-based multihop WSNs with cooperative
multiple-input multiple-output (MIMO) transmission scheme. Specifically,
we present a cross-layer formulation for the joint routing,
scheduling and stream control problem by incorporating various
power and rate adaptation schemes, and taking into account an
antenna beam pattern model and the signal-to-interference-and-noise
(SINR) constraint at the receiver. In the context, we also propose
column generation (CG) solutions to get rid of the complexity
requiring the enumeration of all possible sets of scheduling links.
Abstract: An artificial neural network (ANN) approach was used to model the energy consumption of wheat production. This study was conducted over 35,300 hectares of irrigated and dry land wheat fields in Canterbury in the 2007-2008 harvest year.1 In this study several direct and indirect factors have been used to create an artificial neural networks model to predict energy use in wheat production. The final model can predict energy consumption by using farm condition (size of wheat area and number paddocks), farmers- social properties (education), and energy inputs (N and P use, fungicide consumption, seed consumption, and irrigation frequency), it can also predict energy use in Canterbury wheat farms with error margin of ±7% (± 1600 MJ/ha).
Abstract: The waves of eGovernment are rising very fast
through almost all public administration, or at least most of the
public administrations around the world, and not only the public
administration, but also the entire government and all of their
organization as a whole. The government uses information
technology, and above all the internet or web network, to facilitate
the exchange of services between government agencies and citizens,
businesses, employees and other non-governmental agencies. With
efficient and transparent information exchange, the information
becomes accessible to the society (citizens, business, employees etc.),
and as a result of these processes the society itself becomes the
information society or knowledge society. This paper discusses the
knowledge management for eGovernment development in
significance and role. Also, the paper reviews the role of virtual
communities as a knowledge management mechanism to support
eGovernment in Montenegro. It explores the need for knowledge
management in eGovernment, identifies knowledge management
technologies, and highlights the challenges for developing countries,
such as Montenegro in the implementation of eGovernment. The
paper suggests that knowledge management is needed to facilitate
information exchange and transaction processing with citizens, as
well as to enable creation of knowledge society.
Abstract: Automatic reusability appraisal is helpful in
evaluating the quality of developed or developing reusable software
components and in identification of reusable components from
existing legacy systems; that can save cost of developing the
software from scratch. But the issue of how to identify reusable
components from existing systems has remained relatively
unexplored. In this research work, structural attributes of software
components are explored using software metrics and quality of the
software is inferred by different Neural Network based approaches,
taking the metric values as input. The calculated reusability value
enables to identify a good quality code automatically. It is found that
the reusability value determined is close to the manual analysis used
to be performed by the programmers or repository managers. So, the
developed system can be used to enhance the productivity and
quality of software development.