Data warehouses are large repositories designed to enable the knowledge workers to take better and faster decisions. Due to its significance in strategic decisions, there is a need to assure data warehouse quality. On...
详细信息
Genetic algorithm (GA) is widely used for embedded system design optimization. GA needs repeated evaluation of fitness function, but for complex embedded systems fitness function evaluation is costly as it includes mu...
详细信息
Genetic algorithm (GA) is widely used for embedded system design optimization. GA needs repeated evaluation of fitness function, but for complex embedded systems fitness function evaluation is costly as it includes multiple objectives. A recently proposed Cuckoo Search (CS) method does not require repeated evaluation of fitness function and can provide a set of optimal solutions within a reasonable time. This paper compares the application of GA and CS algorithm to the problem of design space exploration and discusses their empirical comparison.
World Wide Web is today the most important media for collecting, sharing and distributing information. Education is one of the fields where web-based technology has been quickly and successfully adopted. Web mining is...
详细信息
World Wide Web is today the most important media for collecting, sharing and distributing information. Education is one of the fields where web-based technology has been quickly and successfully adopted. Web mining is active research area which involves transformation and interpretation of web data to find out the hidden information by using various data mining techniques which will be useful in enhancing E learning environment. Web usage mining for e learning environment can mine the server logs to find the user usage pattern so that users can be provided with more personalized services. WUM is one of the latest techniques in web data mining which can provide an effective platform to the learner. We focus on identifying learning pattern of learners. This paper introduces how by using WUM techniques we can make e learning environment more effective. Based on WUM technique how we can design an effective e learning environment and implementation of the model builds more intelligent system and can promote interest of learners or learning environment is modifying its behavior to reflect learning style.
The paper discusses about the application of PID controller and fuzzy controller in reactive distillation column. A generic mathematical model of reactive distillation has been taken for simulation. The PID and fuzzy ...
详细信息
The paper discusses about the application of PID controller and fuzzy controller in reactive distillation column. A generic mathematical model of reactive distillation has been taken for simulation. The PID and fuzzy controllers are designed for the process and then the overall process is controlled by using conventional (PID) and intelligent (fuzzy) controllers separately. Conventional PID controller is used to control the temperature of the column and then it is replaced by fuzzy controller and then the results from both the controllers are compared.
This paper attempts to find the rational approximation of fractional order differentiators and integrators and their discretized transfer functions by using continued fraction expansion (CFE) based indirect discretiza...
详细信息
This paper attempts to find the rational approximation of fractional order differentiators and integrators and their discretized transfer functions by using continued fraction expansion (CFE) based indirect discretization scheme. Schnieder 2 nd order rule and Al-alaoui's 2-segment rule are considered for indirect discretization approach and differentiators and integrators of order ½ and ¼ based on these two rules are presented. The rational transfer functions are first tested for minimum phase and stability then the resultant rational approximations are discretized by using s to z transforms. These discretized transfer functions are checked for stability again after performing approximation process. Simulation resultant curves are drawn with the help of MATLAB for the magnitude responses, absolute magnitude errors and the phase responses of the stabilized discrete transfer functions. These curves are then compared with each other and the corresponding ideal characteristics of differentiators and integrators.
This paper looks into the problems faced by Underwater Sensor Networks (UWSNs), with regard to energy optimization and efficient data delivery. A new algorithm is proposed which uses the properties of a "Parabola...
详细信息
This paper looks into the problems faced by Underwater Sensor Networks (UWSNs), with regard to energy optimization and efficient data delivery. A new algorithm is proposed which uses the properties of a "Parabola" in order to transmit data packets from source to destination. The scheme is called the "Parabola-based Routing"(PBR) algorithm. The algorithm is adaptive, and transmits packets in hop-by-hop fashion. Each node in the scenario is aware of its location in the form of its Cartesian coordinates. These coordinates help the nodes in the formation of the parabola for packet sending, as well as in knowing the location of other nodes. The best suited node is selected every time so as to maintain low probability of data transmission failure and optimum energy consumption thereby, using greedy approach every time in selecting the node for packet transmission. In order, to maintain the packet delivery ratio, a hop-by-hop "acknowledgement process" has also been devised. We have validated the efficiency of our algorithm through simulation analysis. The simulation results indicate a better performance of PBR over DSR in both mobile and static scenarios.
This paper introduces a novel approach which uses a Hidden Markov Model (HMM) based Artificial Neural Networks (ANN) for prediction of systems that are non deterministic, dynamical and chaotic in nature. The HMM is us...
详细信息
This paper introduces a novel approach which uses a Hidden Markov Model (HMM) based Artificial Neural Networks (ANN) for prediction of systems that are non deterministic, dynamical and chaotic in nature. The HMM is used for shape based batch creation of training data, which is then processed one batch at a time by an ANN. The weights and Learning Rate of the ANN are tweaked to predict the correct output for an input dataset. The novel Prediction method used here exploits the Pattern Identification prowess of the HMM for batch selection and the ANNs of each batch to predict the output of the system. The Standard application of the Sun-Spot Data (SSD) was used for testing the competence of this method.
In recent time, Internet or network services has gain popularity due to rapid growth in information and telecommunication technologies. Internet or network services become the mean for finance management, education, a...
详细信息
In recent time, Internet or network services has gain popularity due to rapid growth in information and telecommunication technologies. Internet or network services become the mean for finance management, education, and global information service center for news, advertisements and many others. Denial of service attack and most particularly the distributed denial of service attack (DDoS) is most common and harmful threat to the Internet or network services. In order to design and develop reliable and secure network services, rapid detection and quick response to these attacks are major concern. In practice, there is no scheme that completely detects or prevents the DDoS attack. Predicting number of zombies in a DDoS attack is helpful to suppress the effect of DDoS attack by filtering and rate limiting the most suspicious attack sources or improve DDoS response system. In this paper, we present machine learning approach based on support vector machine for regression to predict the number of zombies in a DDoS attack. MATLAB implementation of support vector machine for regression and datasets generated using NS-2 network simulators running on Linux platform are used for training and testing. SVM for regression with various kernel function and other parameters are compared for their prediction performance using mean square error (MSE). Results show SVM based scheme have promising prediction performance for small dataset.
Recently, current feedback operational amplifier (CFOA) and analog multiplier-(AM-) based-voltage controlled oscillators (VCOs) have been published in the literature which require 2 CFOAs and 2 AMs for linear tuning l...
Recently, current feedback operational amplifier (CFOA) and analog multiplier-(AM-) based-voltage controlled oscillators (VCOs) have been published in the literature which require 2 CFOAs and 2 AMs for linear tuning law between control voltage and frequency of oscillation. In this paper, a family of eight new voltage-controlled oscillators (VCOs), with linear tuning laws, employing only a single CFOA in conjunction with two analog multipliers (AMs), has been derived through a systematic state-variable methodology. This has been made possible by exploiting the voltage summing property of the multiplier chosen which has never been done in the literature earlier. The workability of the presented VCOs has been verified by experimental results based on AD844 type CFOAs and AD534 type AMs, and the advantages of new circuits over the previously known CFOA-AM-based VCOs have been highlighted.
Securing the transfer of data in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes a method for providing message security in MANETs when nodes cooperate in routing. Our approach combin...
详细信息
Securing the transfer of data in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes a method for providing message security in MANETs when nodes cooperate in routing. Our approach combines a trust-based multipath routing scheme and a real-time recurrent neural network-based (RRNN) cipher (yielding our so-called TR-RRNN scheme) to deal with the issues underlying message confidentiality, integrity, and access control. Simulation experiments using QualNet were conducted, showing that the proposed scheme is much more secured compared to the traditional multi-path routing algorithms and a recently proposed message security scheme for MANETs (our so- called Original Trust-based Multi-path Routing scheme (OTMR)). The route selection time and trust compromise are used as the performance criteria.
暂无评论