Abstract: Artificial Neural Network (ANN) can be trained using
back propagation (BP). It is the most widely used algorithm for
supervised learning with multi-layered feed-forward networks.
Efficient learning by the BP algorithm is required for many practical
applications. The BP algorithm calculates the weight changes of
artificial neural networks, and a common approach is to use a twoterm
algorithm consisting of a learning rate (LR) and a momentum
factor (MF). The major drawbacks of the two-term BP learning
algorithm are the problems of local minima and slow convergence
speeds, which limit the scope for real-time applications. Recently the
addition of an extra term, called a proportional factor (PF), to the
two-term BP algorithm was proposed. The third increases the speed
of the BP algorithm. However, the PF term also reduces the
convergence of the BP algorithm, and criteria for evaluating
convergence are required to facilitate the application of the three
terms BP algorithm. Although these two seem to be closely related,
as described later, we summarize various improvements to overcome
the drawbacks. Here we compare the different methods of
convergence of the new three-term BP algorithm.
Abstract: Many wireless sensor network applications require
K-coverage of the monitored area. In this paper, we propose a
scalable harmony search based algorithm in terms of execution
time, K-Coverage Enhancement Algorithm (KCEA), it attempts to
enhance initial coverage, and achieve the required K-coverage degree
for a specific application efficiently. Simulation results show that
the proposed algorithm achieves coverage improvement of 5.34%
compared to K-Coverage Rate Deployment (K-CRD), which achieves
1.31% when deploying one additional sensor. Moreover, the proposed
algorithm is more time efficient.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: Fuzzy inference method based approach to the
forming of modular intellectual system of assessment the quality of
communication services is proposed. Developed under this approach
the basic fuzzy estimation model takes into account the
recommendations of the International Telecommunication Union in
respect of the operation of packet switching networks based on IPprotocol.
To implement the main features and functions of the fuzzy
control system of quality telecommunication services it is used
multilayer feedforward neural network.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: This paper aims to represent the commercial activity
of a city taking as source data the social network Foursquare. The
city of Murcia is selected as case study, and the location-based
social network Foursquare is the main source of information. After
carrying out a reorganisation of the user-generated data extracted
from Foursquare, it is possible to graphically display on a map the
various city spaces and venues especially those related to commercial,
food and entertainment sector businesses. The obtained visualisation
provides information about activity patterns in the city of Murcia
according to the people‘s interests and preferences and, moreover,
interesting facts about certain characteristics of the town itself.
Abstract: Underwater acoustic network is one of the rapidly
growing areas of research and finds different applications for
monitoring and collecting various data for environmental studies. The
communication among dynamic nodes and high error probability in
an acoustic medium forced to maximize energy consumption in
Underwater Sensor Networks (USN) than in traditional sensor
networks. Developing energy-efficient routing protocol is the
fundamental and a curb challenge because all the sensor nodes are
powered by batteries, and they cannot be easily replaced in UWSNs.
This paper surveys the various recent routing techniques that mainly
focus on energy efficiency.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: The use of mobile phones is growing tremendously all
over the world. In Tanzania there are a number of operators licensed
by Tanzania Communications Regulatory Authority (TCRA) aiming
at attracting customers into their networks. So far
telecommunications market competition has been very stiff. Various
measures are being taken by mobile operators to survive in the
market. Such measure include introducing of different air time
bundles on daily, weekly and monthly at lower tariffs. Other
measures include the introduction of normal tariff, tourist package
and one network. Despite of all these strategies, there is a dynamic
competition in the market which needs to be explored. Some
influences which attract customers to choose a certain mobile
operator are of particular interest. This paper is investigating if the
network effects and Quality of Services (QoS) influence mobile
customers in selection of their mobile network operators. Seventy
seven students from high learning institutions in Dodoma
Municipality in Tanzania participated in responding to prepared
questionnaires. The data was analyzed using Statistical Package for
Social Science (SPSS) Software. The results indicate that, network
coverage does influence customers in selection of mobile operators.
In addition, this paper proposes further research in some areas
especially where the study came up with different findings from what
the theory has in place.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: The Quad Tree Decomposition based performance
analysis of compressed image data communication for lossy and
lossless through wireless sensor network is presented. Images have
considerably higher storage requirement than text. While transmitting
a multimedia content there is chance of the packets being dropped
due to noise and interference. At the receiver end the packets that
carry valuable information might be damaged or lost due to noise,
interference and congestion. In order to avoid the valuable
information from being dropped various retransmission schemes have
been proposed. In this proposed scheme QTD is used. QTD is an
image segmentation method that divides the image into homogeneous
areas. In this proposed scheme involves analysis of parameters such
as compression ratio, peak signal to noise ratio, mean square error,
bits per pixel in compressed image and analysis of difficulties during
data packet communication in Wireless Sensor Networks. By
considering the above, this paper is to use the QTD to improve the
compression ratio as well as visual quality and the algorithm in
MATLAB 7.1 and NS2 Simulator software tool.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: In an urban area the location allocation of emergency
services mobile units, such as ambulances, police patrol cars must be
designed so as to achieve a prompt response to demand locations.
In this paper the partition of a given urban network into distinct
sub-networks is performed such that the vertices in each component
are close and simultaneously the sums of the corresponding
population in the sub-networks are almost uniform. The objective
here is to position appropriately in each sub-network a mobile
emergency unit in order to reduce the response time to the demands.
A mathematical model in framework of graph theory is developed.
In order to clarify the corresponding method a relevant numerical
example is presented on a small network.
Abstract: The handwriting is a physical demonstration of a
complex cognitive process learnt by man since his childhood. People
with disabilities or suffering from various neurological diseases are
facing so many difficulties resulting from problems located at the
muscle stimuli (EMG) or signals from the brain (EEG) and which
arise at the stage of writing. The handwriting velocity of the same
writer or different writers varies according to different criteria: age,
attitude, mood, writing surface, etc. Therefore, it is interesting to
reconstruct an experimental basis records taking, as primary
reference, the writing speed for different writers which would allow
studying the global system during handwriting process. This paper
deals with a new approach of the handwriting system modeling based
on the velocity criterion through the concepts of artificial neural
networks, precisely the Radial Basis Functions (RBF) neural
networks. The obtained simulation results show a satisfactory
agreement between responses of the developed neural model and the
experimental data for various letters and forms then the efficiency of
the proposed approaches.
Abstract: The reachable set bounding estimation for distributed
delay systems with disturbances is a new problem. In this paper,we
consider this problem subject to not only time varying delay and
polytopic uncertainties but also distributed delay systems which is
not studied fully untill now. we can obtain improved non-ellipsoidal
reachable set estimation for neural networks with time-varying delay
by the maximal Lyapunov-Krasovskii fuctional which is constructed
as the pointwise maximum of a family of Lyapunov-Krasovskii
fuctionals corresponds to vertexes of uncertain polytope.On the other
hand,matrix inequalities containing only one scalar and Matlabs
LMI Toolbox is utilized to give a non-ellipsoidal description of the
reachable set.finally,numerical examples are given to illustrate the
existing results.