Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani ...
Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani et. al. [22] and [25] has shown that in superior orbit, logistic map is stable for larger values of r than that of Picard orbit. In this paper, we have attempted to make the map stable for further larger values of r via I-superior iterates.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS n...
详细信息
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS n...
详细信息
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
The design and deployment of efficient vehicle-to-vehicle (V2V) communications systems require the knowledge of the propagation channel in which it will operate. Due to the mobility of the transmitter/receiver termina...
详细信息
The design and deployment of efficient vehicle-to-vehicle (V2V) communications systems require the knowledge of the propagation channel in which it will operate. Due to the mobility of the transmitter/receiver terminals as well as the existence of dynamic scatterers, the V2V channel is nonstationary. To account for the nonstationarity, channel characterization methods that employs the non wide-sense stationary uncorrelated scattering (non-WSSUS) approach are often desired. More also the inadequacy of the Doppler shift operator to properly account for frequency variation effects by the wideband channel operator implies that the time-frequency characterization methods that employ the Doppler shift operator are not appropriate for wideband V2V channels. In this paper we present the time-scale domain characterization of the non-WSSUS channel which employs time scaling operator to account for frequency variation and also emphasizes on the non-stationary property of the channel. The non-WSSUS statistical property termed local sense stationary uncorrelated scattering (LSSUS) is employed. The effect of the channel nonstationarity on the channel capacity is also addressed. From the simulated example, it is inferred that the assumption of ergodic capacity depend on the number of available independent fades which invariably depend on the degree of the V2V channel nonstationarity.
This paper discusses signal integrity (SI) issues and signalling techniques for Through Silicon Via (TSV) interconnects in 3-D Integrated Circuits (ICs). Field-solver extracted parasitics of TSVs have been employed in...
详细信息
ISBN:
(纸本)9783981080162
This paper discusses signal integrity (SI) issues and signalling techniques for Through Silicon Via (TSV) interconnects in 3-D Integrated Circuits (ICs). Field-solver extracted parasitics of TSVs have been employed in Spice simulations to investigate the effect of each parasitic component on performance metrics such as delay and crosstalk and identify a reduced-order electrical model that captures all relevant effects. We show that in dense TSV structures voltage-mode (VM) signalling does not lend itself to achieving high data-rates, and that current-mode (CM) signalling is more effective for high throughput signalling as well as jitter reduction. Data rates, energy consumption and coupled noise for the different signalling modes are extracted.
E-Appointment Scheduling (EAS) has been developed to handle appointment for UMP students, lecturers in faculty of computersystems & softwareengineering (FCSSE) and Student Medical Center. The schedules are based...
详细信息
E-Appointment Scheduling (EAS) has been developed to handle appointment for UMP students, lecturers in faculty of computersystems & softwareengineering (FCSSE) and Student Medical Center. The schedules are based on the timetable and university activities. Constraints Logic Programming (CLP) has been implemented to solve the scheduling problems by giving recommendation to the users in part of determining any available slots from the lecturers and doctors' timetable. By using this system, we can avoid wasting time and cost because this application will set an appointment by auto-generated. In addition, this system can be an alternative to the lecturers and doctors to make decisions whether to approve or reject the appointments.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server,and then network systems communicate with wrong destinations. So requests with different destination DNS IP addresses...
详细信息
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server,and then network systems communicate with wrong destinations. So requests with different destination DNS IP addresses can be redirected toward a fake DNS server by a *** type of attack is detectable by neither the IDS nor any anti spoofing software.
This paper presents the utilization of super resolution algorithms for the indoor positioning applications in order to estimate Time Difference of Arrival (TDOA) and distances using Orthogonal Frequency Division Multi...
详细信息
The aim of this paper is to present the role of Artificial Intelligence techniques to enhance reflective e-portfolios quality. Some AI techniques such as expert system; scheduling; Data Mining can support us to enhanc...
详细信息
The aim of this paper is to present the role of Artificial Intelligence techniques to enhance reflective e-portfolios quality. Some AI techniques such as expert system; scheduling; Data Mining can support us to enhance our reflective e-portfolios quality. To get better result the designed portfolio has been supported by Problem Based Learning as an effective educational method. These tools together will define new intelligent Reflective e-portfolio that provides intelligent and customized learning method for each student based on their backgrounds and their realities. The final vision of intelligent reflective e-portfolio is to act as an expert to consult students and support them to make Right decisions for their learning complexities.
The Association for the Advancement of Artificial Intelligence was pleased to present the 2009 Fall Symposium Series, held Thursday through Saturday, November 5-7, at the Westin Arlington Gateway in Arlington, Virgini...
详细信息
暂无评论