Longest edge (nested) algorithms for triangulation refinement in two dimensions are able to produce hierarchies of quality and nested irregular triangulations as needed both for adaptive finite element methods and for...
详细信息
Intermittent networks (IntNET) are networks where all the links in a path may not be available concurrently. Finding routes on such a network is hard. No trivial extension of classical routing protocols is known to pr...
详细信息
In this paper, new computational methods for solving fully fuzzy linear systems (FFLS) when the coefficient matrix is negative are proposed. The proposed methods are very easy to understand and to apply for solving fu...
详细信息
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack a...
详细信息
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack against primary victim systems. In this paper we propose a new countermeasure to mitigate DoS using sensing keys, which does not require human intervention.
In this paper, a case study on the application of Naïve Bayes dichotomizer in clinical decision supporting systems is described. The case study is about the diagnosis of the possibility of having Pervasive Develo...
详细信息
In this paper, a case study on the application of Naïve Bayes dichotomizer in clinical decision supporting systems is described. The case study is about the diagnosis of the possibility of having Pervasive Developmental Disorder (PDD) in a child. The age group selected for the study is in between 2 and 3 years. Pervasive developmental Disorder is a neuro disorder that affects the social functioning, behavioural functioning and communication in a child. Conventional diagnosis is based on the scores obtained on checklists like DSM-IV Criteria. As Bayesian reasoning uses probability inferences, it is usually applied on decision making systems. Here for the study a Naive Bayes probabilistic dichotomizer was implemented. This dichotomizer calculates the most probable output depending on the inputs given to it, by applying the Bayes rule. Since the classifier is considering only two classes, the classifier is called as dichotomizer. The minimum expected risk and positive discriminant functions are also calculated, which again supports the decision of Naive Bayes dichotomizer. Implementation of Maximum A Priori Hypothesis and Maximum Likelihood Hypothesis are also discussing on the case study for a comparison. The main goal of this research work was to study the application of some probabilistic reasoning techniques in clinical decision supporting systems, where classification is more important. Based on the implementation of our case study, the findings shown that Naive Bayes dichitomizer supported with minimum expected risk and positive discriminant function, classifies correctly in clinical decision supporting systems.
Most of the neural networks in initial stage of enthusiasm, the field survived a period of frustration and disrepute. The reason for this is previous neuron doesn't do anything that conventional computers don'...
详细信息
The present world has been dominated by wireless ad hoc communication network. Having understood the purpose of ad hoc scenario in this real world, the establishment of network without clustering will not fall down to...
详细信息
The present world has been dominated by wireless ad hoc communication network. Having understood the purpose of ad hoc scenario in this real world, the establishment of network without clustering will not fall down to the line of expectation. Thus, the cluster formation algorithm has been an essential step towards making the network to perform efficiently. This paper proposes Ex-PAC as a cluster formation procedure and its performance has been compared against K-means. The programming language C++ has been used to implement these two algorithms and the results are tabulated. Obviously the findings say, Ex-PAC has an edge over K-means in terms of computation time and handling large sets of data in the process of making clusters.
The variations of March tests are extensively used for functional test of SRAMs and DRAMs. This work proposes hardware realization of March C - to enable efficient fault detection in memories. The properties of singl...
详细信息
ISBN:
(纸本)9781467347044
The variations of March tests are extensively used for functional test of SRAMs and DRAMs. This work proposes hardware realization of March C - to enable efficient fault detection in memories. The properties of single length cycle attractor cellular automata are exploited to memorize the status (faulty/non-faulty) of memory words during read (r0/r1) operation of the March C - algorithm. It effectively reduces the overhead of comparison that is required in a conventional test structure, to take decision on the faults in memory.
Obstructive Sleep Apnea Syndrome (OSAS) is a widespread sleep-disordered breathing disease, which leads to repetitive hypoxemia, hypercapnia and interruptions of the normal sleep pattern. Considering its severe negati...
详细信息
A critical issue in Wimax network where the data can hack by the person, and hence we add a novel encryption mechanism to protect the data transfer from client to server and vice versa. We present a Queuing model of a...
详细信息
A critical issue in Wimax network where the data can hack by the person, and hence we add a novel encryption mechanism to protect the data transfer from client to server and vice versa. We present a Queuing model of an client and server that uses for bulk arrival service. The arrivals of data requests are assumed to markov Poisson distributed process (MPDP) and the events are considered in the server for process sharing. We obtain the parameter of service rate, Arrival rate, expected waiting time and expected busy period. The total number of packets request are processed, there is no time limited to arrivals, while compared to m/m/1 model our model m/m(1,b)/1 is more efficient to find response and request time in between client and server. We also derive the expression for the data value of threshold. In addition to that we perform simulation model has been validated through Java programming.
暂无评论