Abstract: Congestion control is one of the fundamental issues in computer networks. Without proper congestion control mechanisms there is the possibility of inefficient utilization of resources, ultimately leading to network collapse. Hence congestion control is an effort to adapt the performance of a network to changes in the traffic load without adversely affecting users perceived utilities. AIMD (Additive Increase Multiplicative Decrease) is the best algorithm among the set of liner algorithms because it reflects good efficiency as well as good fairness. Our control model is based on the assumption of the original AIMD algorithm; we show that both efficiency and fairness of AIMD can be improved. We call our approach is New AIMD. We present experimental results with TCP that match the expectation of our theoretical analysis.
Abstract: In this study, we present an advanced detection
technique for mass type breast cancer based on texture information
of organs. The proposed method detects the cancer areas in three
stages. In the first stage, the midpoints of mass area are determined
based on AHE (Adaptive Histogram Equalization). In the second
stage, we set the threshold coefficient of homogeneity by using
MLE (Maximum Likelihood Estimation) to compute the uniformity
of texture. Finally, mass type cancer tissues are extracted from the
original image. As a result, it was observed that the proposed
method shows an improved detection performance on dense breast
tissues of Korean women compared with the existing methods. It is
expected that the proposed method may provide additional
diagnostic information for detection of mass-type breast cancer.
Abstract: In this paper we developed the Improved Runge-Kutta Nystrom (IRKN) method for solving second order ordinary differential equations. The methods are two step in nature and require lower number of function evaluations per step compared with the existing Runge-Kutta Nystrom (RKN) methods. Therefore, the methods are computationally more efficient at achieving the higher order of local accuracy. Algebraic order conditions of the method are obtained and the third and fourth order method are derived with two and three stages respectively. The numerical results are given to illustrate the efficiency of the proposed method compared to the existing RKN methods.
Abstract: The density estimates considered in this paper comprise
a base density and an adjustment component consisting of a linear
combination of orthogonal polynomials. It is shown that, in the
context of density approximation, the coefficients of the linear combination
can be determined either from a moment-matching technique
or a weighted least-squares approach. A kernel representation of
the corresponding density estimates is obtained. Additionally, two
refinements of the Kronmal-Tarter stopping criterion are proposed
for determining the degree of the polynomial adjustment. By way of
illustration, the density estimation methodology advocated herein is
applied to two data sets.
Abstract: Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
Abstract: Equilibrium and rate based models have been applied
in the simulation of methyl tertiary-butyl ether (MTBE) synthesis
through reactive distillation. Temperature and composition profiles
were compared for both the models and found that both the profiles
trends, though qualitatively similar are significantly different
quantitatively. In the rate based method (RBM), multicomponent
mass transfer coefficients have been incorporated to describe
interphase mass transfer. MTBE mole fraction in the bottom stream is
found to be 0.9914 in the Equilibrium Model (EQM) and only 0.9904
for RBM when the same column configuration was preserved. The
individual tray efficiencies were incorporated in the EQM and
simulations were carried out. Dynamic simulation have been also
carried out for the two column configurations and compared.
Abstract: The present work describes a computational study of
aerodynamic characteristics of GLC305 airfoil clean and with 16.7
min ice shape (rime 212) and 22.5 min ice shape (glaze 944).The
performance of turbulence models SA, Kε, Kω Std, and Kω SST
model are observed against experimental flow fields at different
Mach numbers 0.12, 0.21, 0.28 in a range of Reynolds numbers
3x106, 6x106, and 10.5x106 on clean and iced aircraft airfoil
GLC305. Numerical predictions include lift, drag and pitching
moment coefficients at different Mach numbers and at different angle
of attacks were done. Accuracy of solutions with respect to the
effects of turbulence models, variation of Mach number, initial
conditions, grid resolution and grid spacing near the wall made the
study much sensitive. Navier Stokes equation based computational
technique is used. Results are very close to the experimental results.
It has seen that SA and SST models are more efficient than Kε and
Kω standard in under study problem.
Abstract: Unstructured peer-to-peer networks are popular due to
its robustness and scalability. Query schemes that are being used in
unstructured peer-to-peer such as the flooding and interest-based
shortcuts suffer various problems such as using large communication
overhead long delay response. The use of routing indices has been a
popular approach for peer-to-peer query routing. It helps the query
routing processes to learn the routing based on the feedbacks
collected. In an unstructured network where there is no global
information available, efficient and low cost routing approach is
needed for routing efficiency.
In this paper, we propose a novel mechanism for query-feedback
oriented routing indices to achieve routing efficiency in unstructured
network at a minimal cost. The approach also applied information
retrieval technique to make sure the content of the query is
understandable and will make the routing process not just based to
the query hits but also related to the query content. Experiments have
shown that the proposed mechanism performs more efficient than
flood-based routing.
Abstract: This work develops a novel intelligent “model of dynamic decision-making" usingcell assemblies network architecture in robot's movement. The “model of dynamic decision-making" simulates human decision-making, and follows commands to make the correct decisions. The cell assemblies approach consisting of fLIF neurons was used to implement tasks for finding targets and avoiding obstacles. Experimental results show that the cell assemblies approach of can be employed to efficiently complete finding targets and avoiding obstacles tasks and can simulate the human thinking and the mode of information transactions.
Abstract: A new and highly efficient architecture for elliptic curve scalar point multiplication which is optimized for a binary field recommended by NIST and is well-suited for elliptic curve cryptographic (ECC) applications is presented. To achieve the maximum architectural and timing improvements we have reorganized and reordered the critical path of the Lopez-Dahab scalar point multiplication architecture such that logic structures are implemented in parallel and operations in the critical path are diverted to noncritical paths. With G=41, the proposed design is capable of performing a field multiplication over the extension field with degree 163 in 11.92 s with the maximum achievable frequency of 251 MHz on Xilinx Virtex-4 (XC4VLX200) while 22% of the chip area is occupied, where G is the digit size of the underlying digit-serial finite field multiplier.
Abstract: In this paper, we propose a method to reduce the
various kinds of noise while gathering and recording the
electrocardiogram (ECG) signal. Because of the defects of former
method in the noise elimination of ECG signal, we use translation
invariant (TI) multiwavelet denoising method to the noise elimination.
The advantage of the proposed method is that it may not only remain
the geometrical characteristics of the original ECG signal and keep the
amplitudes of various ECG waveforms efficiently, but also suppress
impulsive noise to some extent. The simulation results indicate that the
proposed method are better than former removing noise method in
aspects of remaining geometrical characteristics of ECG signal and the
signal-to-noise ratio (SNR).
Abstract: Transient Stability is an important issue in power systems planning, operation and extension. The objective of transient stability analysis problem is not satisfied with mere transient instability detection or evaluation and it is most important to complement it by defining fast and efficient control measures in order to ensure system security. This paper presents a new Fuzzy Support Vector Machines (FSVM) to investigate the stability status of power systems and a modified generation rescheduling scheme to bring back the identified unstable cases to a more economical and stable operating point. FSVM improves the traditional SVM (Support Vector Machines) by adding fuzzy membership to each training sample to indicate the degree of membership of this sample to different classes. The preventive control based on economic generator rescheduling avoids the instability of the power systems with minimum change in operating cost under disturbed conditions. Numerical results on the New England 39 bus test system show the effectiveness of the proposed method.
Abstract: In this paper we present an extension to Vision Based
LRTA* (VLRTA*) known as Vision Based Moving Target Search
(VMTS) for capturing unknown moving target in unknown territory
with randomly generated obstacles. Target position is unknown to the
agents and they cannot predict its position using any probability
method. Agents have omni directional vision but can see in one
direction at some point in time. Agent-s vision will be blocked by the
obstacles in the search space so agent can not see through the
obstacles. Proposed algorithm is evaluated on large number of
scenarios. Scenarios include grids of sizes from 10x10 to 100x100.
Grids had obstacles randomly placed, occupying 0% to 50%, in
increments of 10%, of the search space. Experiments used 2 to 9
agents for each randomly generated maze with same obstacle ratio.
Observed results suggests that VMTS is effective in locate target
time, solution quality and virtual target. In addition, VMTS becomes
more efficient if the number of agents is increased with proportion to
obstacle ratio.
Abstract: In intensity modulated radiation therapy (IMRT)
treatment planning, beam angles are usually preselected on the basis of
experience and intuition. Therefore, getting an appropriate beam
configuration needs a very long time. Based on the present situation,
the paper puts forward beam orientation optimization using ant colony
optimization (ACO). We use ant colony optimization to select the
beam configurations, after getting the beam configuration using
Conjugate Gradient (CG) algorithm to optimize the intensity profiles.
Combining with the information of the effect of pencil beam, we can
get the global optimal solution accelerating. In order to verify the
feasibility of the presented method, a simulated and clinical case was
tested, compared with dose-volume histogram and isodose line
between target area and organ at risk. The results showed that the
effect was improved after optimizing beam configurations. The
optimization approach could make treatment planning meet clinical
requirements more efficiently, so it had extensive application
perspective.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: The great challenge of the agricultural sector is to
produce more crop from less water, which can be achieved by
increasing crop water productivity. The modernization of the
irrigation systems offers a number of possibilities to expand the
economic productivity of water and improve the virtual water status.
The objective of the present study is to assess the global water
productivity (GWP) within the major irrigation command areas of
I.R. Iran. For this purpose, fourteen irrigation command areas where
located in different areas of Iran were selected. In order to calculate
the global water productivity of irrigation command areas, all data on
the delivered water to cropping pattern, cultivated area, crops water
requirement, and yield production rate during 2002-2006 were
gathered. In each of the command areas it seems that the cultivated
crops have a higher amount of virtual water and thus can be replaced
by crops with less virtual water. This is merely suggested due to crop
water consumption and at the time of replacing crops, economic
value as well as cultural and political factors must be considered. The
results indicated that the lowest GWP belongs to Mahyar and
Borkhar irrigation areas, 0.24 kg m-3, and the highest is that of the
Dez irrigation area, 0.81 kg m-3. The findings demonstrated that
water management in the two irrigation areas is just efficient. The
difference in the GWP of irrigation areas is due to variations in the
cropping pattern, amount of crop productions, in addition to the
effective factors in the water use efficiency in the irrigation areas.
Abstract: Construction cost in India is increasing at around 50
per cent over the average inflation levels. It have registered increase
of up to 15 per cent every year, primarily due to cost of basic
building materials such as steel, cement, bricks, timber and other
inputs as well as cost of labour. As a result, the cost of construction
using conventional building materials and construction is becoming
beyond the affordable limits particularly for low-income groups of
population as well as a large cross section of the middle - income
groups. Therefore, there is a need to adopt cost-effective construction
methods either by up-gradation of traditional technologies using local
resources or applying modern construction materials and techniques
with efficient inputs leading to economic solutions. This has become
the most relevant aspect in the context of the large volume of housing
to be constructed in both rural and urban areas and the consideration
of limitations in the availability of resources such as building
materials and finance. This paper makes an overview of the housing
status in India and adoption of appropriate and cost effective
technologies in the country.
Abstract: Recently, nanomaterials are developed in the form of nano-films, nano-crystals and nano-pores. Lanthanide phosphates as a material find extensive application as laser, ceramic, sensor, phosphor, and also in optoelectronics, medical and biological labels, solar cells and light sources. Among the different kinds of rare-earth orthophosphates, yttrium orthophosphate has been shown to be an efficient host lattice for rare earth activator ions, which have become a research focus because of their important role in the field of light display systems, lasers, and optoelectronic devices. It is in this context that the 4fn- « 4fn-1 5d transitions of rare earth in insulating materials, lying in the UV and VUV, are the aim of large number of studies .Though there has been a few reports on Eu3+, Nd3+, Pr3+,Er3+, Ce3+, Tm3+ doped YPO4. The 4fn- « 4fn-1 5d transitions of the rare earth dependent to the host-matrix, several matrices ions were used to study these transitions, in this work we are suggesting to study on a very specific class of inorganic material that are orthophosphate doped with rare earth ions. This study focused on the effect of Ce3+ concentration on the structural and optical properties of Ce3+ doped YPO4 yttrium orthophosphate with powder form prepared by the Sol Gel method.
Abstract: In this paper we present a new method for over-height
vehicle detection in low headroom streets and highways using digital
video possessing. The accuracy and the lower price comparing to
present detectors like laser radars and the capability of providing
extra information like speed and height measurement make this
method more reliable and efficient. In this algorithm the features are
selected and tracked using KLT algorithm. A blob extraction
algorithm is also applied using background estimation and
subtraction. Then the world coordinates of features that are inside the
blobs are estimated using a noble calibration method. As, the heights
of the features are calculated, we apply a threshold to select overheight
features and eliminate others. The over-height features are
segmented using some association criteria and grouped using an
undirected graph. Then they are tracked through sequential frames.
The obtained groups refer to over-height vehicles in a scene.
Abstract: Cognitive Science appeared about 40 years ago,
subsequent to the challenge of the Artificial Intelligence, as common
territory for several scientific disciplines such as: IT, mathematics,
psychology, neurology, philosophy, sociology, and linguistics. The
new born science was justified by the complexity of the problems
related to the human knowledge on one hand, and on the other by the
fact that none of the above mentioned sciences could explain alone
the mental phenomena. Based on the data supplied by the
experimental sciences such as psychology or neurology, models of
the human mind operation are built in the cognition science. These
models are implemented in computer programs and/or electronic
circuits (specific to the artificial intelligence) – cognitive systems –
whose competences and performances are compared to the human
ones, leading to the psychology and neurology data reinterpretation,
respectively to the construction of new models. During these
processes if psychology provides the experimental basis, philosophy
and mathematics provides the abstraction level utterly necessary for
the intermission of the mentioned sciences.
The ongoing general problematic of the cognitive approach
provides two important types of approach: the computational one,
starting from the idea that the mental phenomenon can be reduced to
1 and 0 type calculus operations, and the connection one that
considers the thinking products as being a result of the interaction
between all the composing (included) systems. In the field of
psychology measurements in the computational register use classical
inquiries and psychometrical tests, generally based on calculus
methods. Deeming things from both sides that are representing the
cognitive science, we can notice a gap in psychological product
measurement possibilities, regarded from the connectionist
perspective, that requires the unitary understanding of the quality –
quantity whole. In such approach measurement by calculus proves to
be inefficient. Our researches, deployed for longer than 20 years,
lead to the conclusion that measuring by forms properly fits to the
connectionism laws and principles.