Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in ...
详细信息
Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.
Different types of e-assessment systems that are recognized at universities and based on the campus wireless have been developed. These systems help the students to use their Mobile Phones as learning media to access ...
详细信息
Different types of e-assessment systems that are recognized at universities and based on the campus wireless have been developed. These systems help the students to use their Mobile Phones as learning media to access the information more easily from anywhere and at anytime. Seppala and Alamaki developed a mobile learning project for teacher training. Their study compared the effectiveness of internet, face-to-face and mobile based instructions. Al Masri has proposed a study to compare the effective strategy in paper-based assessment with mobile-based assessment for assessing university students in English literature. It has been found that students gained better scores in mobile phone-based test than in paper-based test. This paper aims to determine and measure the effects of mobile-based assessments on the perception, achievement levels and performance of the students in internet-assisted courses. The main functionalities and features of this paper are: Knowledge evaluation, automatic generation of exams, exam grading, communication, course management, and questions-bank database.
Environmental exposure to toxicants is very important as it become part of our daily life. Therefore, it is necessary to investigate the toxic effects of chemical substances before consuming it. The best choice for pe...
详细信息
ISBN:
(纸本)9781509002764
Environmental exposure to toxicants is very important as it become part of our daily life. Therefore, it is necessary to investigate the toxic effects of chemical substances before consuming it. The best choice for performing this test is by applying the toxicants to different animals. The zebrafish embryos are the most suitable animal for this test. In this paper, a fully-automated system is proposed to classify zebrafish embryos to alive or coagulant (i.e. dead due to exposing to toxic compound). The embryos' images are used to extract some features using the Segmentation-based Fractal Texture Analysis (SFTA) technique. Moreover, Bat algorithm is used to select the most discriminative features and then AdaBoost classifier is used to match between testing and training features (i.e. to classify alive and coagulant embryos). The experiments have proved that choosing threshold value of SFTA technique and the selected features have a great impact on the classification accuracy. With classification rate around 98.15%, the experimental results have showed that the proposed model is a very promising step toward a fully-automated toxicity test using zebrafish embryos.
We describe the problem of estimating a length of a regular parameterized curve from an ordered sample of interpolation points in arbitrary Euclidean space by modified complete spline. The corresponding tabular parame...
We describe the problem of estimating a length of a regular parameterized curve from an ordered sample of interpolation points in arbitrary Euclidean space by modified complete spline. The corresponding tabular parameters are assumed to be unknown and are approximated by the exponential parameterization (controlled by the parameter λ ∈ [0, 1]). In this paper the numerical verification of asymptotic orders α(λ) in length estimation is performed for curves sampled more-or-less uniformly. The numerical experiments confirm a slow linear convergence orders α(λ) = 1 for all λ ∈ [0, 1) and a quartic order α(1) = 4 once modified complete spline is used.
The ignition delay period for a compression ignition engine fueled alternatively with pure diesel and with biodiesel B20 has been experimentally and numerically investigated. The engine was operated under full load co...
The ignition delay period for a compression ignition engine fueled alternatively with pure diesel and with biodiesel B20 has been experimentally and numerically investigated. The engine was operated under full load conditions for two speeds, 1400 rpm speed for maximum brake torque and 2400 rpm speed for maximum brake power. Different parameters suggested as important to define the start of combustion have been considered before the acceptance of a certain evaluation technique of ignition delay. Correlations between these parameters were analyzed and concluded about the best method to identify the start of combustion. The experimental results were further compared with the ignition delay predicted by some correlations. The results showed that the determined ignition delays are in good agreement with those of the Arrhenius type expressions for pure diesel fuel, while for biodiesel B20 the correlation results are significantly different than the experimental results.
This work introduces a new methodology for the early detection of epileptic seizure based on the WiSARD weightless neural network model and a new approach in terms of preprocessing the electroencephalogram (EEG) data....
详细信息
This work introduces a new methodology for the early detection of epileptic seizure based on the WiSARD weightless neural network model and a new approach in terms of preprocessing the electroencephalogram (EEG) data. WiSARD has, among other advantages, the capacity of perform the training phase in a very fast way. This speed in training is due to the fact that WiSARD's neurons work like Random Access Memories (RAM) addressed by input patterns. Promising results were obtained in the anticipation of seizure onsets in four representative patients from the European Database on Epilepsy (EPILEPSIAE). The proposed seizure early detection WNN architecture was explored by varying the detection anticipation (δ) in the 2 to 30 seconds interval, and by adopting 2 and 3 seconds as the width of the Sliding Observation Window (SOW) input. While in the most challenging patient (A) one obtained accuracies from 99.57% (δ=2s; SOW=3s) to 72.56% (δ=30s; SOW=2s), patient D seizures could be detected in the 99.77% (δ=2s; SOW=2s) to 99.93% (δ=30s; SOW=3s) accuracy interval.
The medieval Church of Zelemér was located in the Great Hungarian Plain, approximately 200 km to the east of Budapest, the capital of Hungary. Nowadays, only the ruins of the church exist and there is no accurate...
详细信息
Dynamic spectrum reallocation, under which the spectrum owners temporarily share the underutilized spectrum to secondary users for economic profit, is an important approach to improve the spectrum utilization ratio. A...
详细信息
ISBN:
(纸本)9781479959532
Dynamic spectrum reallocation, under which the spectrum owners temporarily share the underutilized spectrum to secondary users for economic profit, is an important approach to improve the spectrum utilization ratio. Auction is believed to be a natural marketing tool to incentivize the spectrum owners, and thus redistribute the idle spectrum efficiently. Extensive researches have been done in the problem of truthful spectrum auction, in which the bidders bid based on their true valuations of the spectrum. The true valuation of the individual bidder, however, is a private information which should be protected against exposure. In this paper, we propose a privacy preserving truthful spectrum auction scheme by utilizing homomorphic encryption. The proposed scheme reveals the group bids but hides the users' bids even from the auctioneer. The evaluation results show that the proposed scheme achieves good spectrum utilization efficiency with low communication and computation overheads.
暂无评论