The Standardization Development, Opportunities and Challenges for Visible Light Communication
Wen-Nan Tsan, Nan-Shiun Chu, Chi Chang
With the high popularizing rate of LED lighting and the demand of mobile data, VLC became an option for network communications due to its use of vast spectrum resources and no EMI characteristics. In 2003, Japanese ICT manufacturers including Casio, NEC, Toshiba, and Sharp established Visible Light Communications Consortium. Also, IEEE set up 802.15.7 working group in January 2009 to carry out VLC standardization and technical research. Meanwhile, research institutes in North America, Japan and the EU actively work on VLC transmission and application development.
Keywords: VLC, IrDA, LED, Data transmission
Control Reconfiguration in Descriptor Systems with Distinct Finite Eigenvalues Using State Feedback
Reza Kourdy and Amir Parviz Valadbeygi
This paper proposed a new method for designing reconfigurable controller for descriptor systems which can recover the nominal closed loop performances after fault occurrence in the system. The dynamic of descriptor systems contain infinite and finite elements, so complete response of descriptor systems can be represented by eigenstructure which is involved finite and infinite elements. In this paper eigenstructure assignment is used to design reconfigurable controller in general for distinct finite eigenvalues such that the reconfigured system can recover the complete response of nominal system as much as possible. Finally an example represents the effectiveness of new method.
Keywords: Descriptor systems, Reconfigurable control, Distinct eigenvalues
Modular Simulation of Augmented fat-stack (AFS): New distributed networks Architecture
Reza Kourdy and Mohammad Reza Nouri rad
We propose the fat-stack because its structure is amenable to scaling. It turns out that the fat-stack is versatile as well. We propose a general framework for designing topology inference algorithms based on additive metrics and simulate proposed architecture with Network Simulator-2 (NS2). The simulation results reveal the applicability of the proposed architecture. We have reported the results of the fat-stack as an efficient interconnection network. The focus of this paper is to show that the universal property of the fat-stack applies to distributed networks. We also carry out the high-level simulation of on chip network using NS2 to verify the analytical analysis.
Keywords: Augmented fat-stack (AFS), Network Simulator-2 (NS2), Fat-Pyramid, Fat-Stack, Fat-tree, Hyper-tree
The Fat-Stack in Network-on-chips (NOCs): New Structure for interconnection networks
Reza Kourdy and Mohammad Reza Nouri rad
This paper shows that a novel network called the fat-stack is efficient and is suitable for use as a baseline distributed network and as crucial benchmark architecture for evaluating the performance of specific distributed networks. The fat-stack structure makes the network scalable to closely represent a distributed network. We show that the fat-stack is efficient by proving it is universal. A requirement for the fat-stack to be universal is that link capacities double up the levels of the network.
Keywords: Networks-on-Chip (NoC), Fat-stack, augmented fat-stack (AFS), general fat-stack (GFS), augmented fat-stack (AFS)
Comparison between Different Methods of Noise Cancellation
Archana Sharma, Ranjit Singh and Vikas Sharma
This paper presents performance comparison between different methods of noise cancellation. Reduction of noise from speech signals plays a vital role in modern communication systems. Adaptive filtering is a powerful technique for signal detection because of the random pattern of the noise and the non-deterministic sources of the interference. It is preferable to design a filter that is adapted to the background noise to remove interference from observations. Wavelet Transform Adaptive Filtering is modern mathematical approach for achieving and analyzing spectral components of signals. In this paper different algorithms (e.g. LMS, RLS, Thresholding etc.) are derived for noise cancellation and comparison made between them in Fourier as well as Wavelet Transform Domain.
Keywords: Wavelet transform, Adaptive Filtering, Least Mean Square Algorithm
EPSO: A Heuristic Approach Based on PSO with Effective Parameters for Independent Tasks Scheduling in Cloud Computing
Arash Ghorbannia Delavar and Batool Dashti
Finding an optimal solution for tasks scheduling problem in distributed computing systems such as cloud and grid with the aim of reducing the overall completion time of requests and appropriate load balancing is an important issue. In this work we provide the conditions to increase the efficiency of scheduling algorithm while considering effective parameters against compared algorithms which in normal conditions have failed to meet system demands properly with real effectiveness. We propose a heuristic approach based on PSO with effective parameters (EPSO) for independent tasks scheduling in cloud computing environment. We create the proper load distribution on computing nodes with integrating effective parameters in fitness function, such as request time, acknowledge time and delay between them. And we provide the conditions, that the overall completion time of requests (Makespan) and the convergence rate to the optimal response is reduced. Simulation results and comparison with other algorithms indicates EPSO has better performance in solving tasks scheduling problem. Using EPSO we have increased efficiency and dependability that help to have quick response to requests in cloud computing environments.
Keywords: Cloud computing, Independent tasks scheduling, Particle Swarm Optimization, Load balancing
Designing Classifier Ensemble through Multiple-Pheromone Ant Colony based Feature Selection
Shunmugapriya Palanisamy and Kanmani S
A Classifier Ensemble (CE) efficiently improves the generalization ability of the classifier compared to a single classifier. Feature Selection extracts the relevant features from a data set removing the irrelevant and noisy data and hence improves the accuracy of a classifier, in turn increases the overall ensemble accuracy. This paper proposes a novel hybrid algorithm CE-MPACO – the combination of Multiple Pheromone based Ant Colony Optimization algorithm (MPACO) and a classifier ensemble (CE). A classifier ensemble consisting of Support Vector Machine (SVM), Decision Tree and Naïve Bayes, performs the task of classification and MPACO is used as a feature selector to select the most important features as well as to increase the overall classification accuracy of the classifier ensemble. Four UCI (University of California, Irvine) benchmark datasets have been used for the evaluation of the proposed method. Three ensembles ACO-CE, ACO-Bagging and ACOBoosting have been constructed from the finally selected feature subsets. From the experimental results, it can be seen that these ensembles have shown up to 5% increase in the classification accuracy compared to the constituent classifiers and the standard ensembles Bagging and Boosting.
Keywords: Classifier Ensemble, Multiple Pheromone, Ant Colony Optimization Algorithm, Feature Selection, SVM, Decision Tree, Naïve Bayes
Analysis of TCP Reno with one Packet Drop and Maximum Congestion Window in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Reno Fast recovery algorithm with one packet drop and maximum congestion window limitation for increase the performance of network on chip (NoC).We simulate Ring NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Reno protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, Packet Drop, Fast recovery
GFS-Noc(general fat-stack Network-On-Chip) by independent Resources
Reza Kourdy and Mohammad Reza Nouri rad
This paper shows that a novel network called the fat-stack is universally efficient and is suitable for use as an interconnection network in parallel computers. We simulate this topology for general-purpose parallel processing applications. This paper shows that the proposed network is universally efficient when adequate capacity distribution is provided and is suitable for use as an interconnection network in parallel computers.
Keywords: Fat-stack, GFS-Noc (general fat-stack Network-On-Chip), general fat-stack (GFS), augmented fat-stack (AFS), interconnection networks
Simulation GFS-NOC by Shared resource a scalable Architectures Using Ns-2
Reza Kourdy and Mohammad Reza Nouri rad
Networks on chips (NoCs) have been introduced as a remedy for the growing problems of current interconnects in VLSI chips. Being a relatively new domain in research, simulation tools for NoCs are scarce. To fill the gap, we use network simulator NS-2 for simulating NoCs, especially at high level chip design. this paper shows that a novel network called the GFSNoc is suitable for use as an interconnection in Network-on-chips.
Keywords: GFS-Network, Network on chips (NoCs), Network Simulator (ns-2), simulation and modeling
Improvement the Reliability of 3D-Networkon- Chip by Triple modular redundancy
Reza Kourdy and Mohammad Reza Nouri rad
A new chip design paradigm called Network on Chip (NOC) offers a promising architectural choice for future systems on chips. NOC architectures offer a packet switched communication among functional cores on the chip. NOC architectures also apply concepts from computer networks and organize on-chip communication among cores in layers similar to OSI reference model. We propose an MPLS fault recovery mechanism using Triple modular redundancy (TMR) in NOC switches, in order to increase fault tolerance permanent and transient faults in NOC.
Keywords: integrated circuit (IC), Systems-on-chip (SOC), MPSoC, Network on Chip (NOC), Processing Element (PE), Triple modular redundancy (TMR), MPLS, fault tolerance
AFS-NOC by Shared resource: New Architecture for Network on chip
Reza Kourdy and Mohammad Reza Nouri rad
In recent years, researchers have proposed a wide variety of topologies for data-center networks, all with the goal of providing high bisection bandwidth at low cost. In this paper we focus on a novel network called the Augmented Fat Stack- Network on chip (AFS-NOC) is efficient and is suitable for use in Network on chips. In this structure to support the redundancy, a common resource is used for neighboring switches. This architecture, in which shared resources are used for switches, is very suitable for applications which the redundancy is very important and three copies of the packets can be sent for switches where are connected to the resource.We also carry out the high-level simulation of on chip network using NS-2 to verify the analytical analysis.
Keywords: augmented fat-stack (AFS) Network-on-Chip (NoC), System-on-Chip (SoC)
Analysis of TCP Tahoe with Multiple Fast Retransmission in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with multiple fast retransmissions, that resulting from losses in one window of data for increase the performance of network on chip (NoC).We simulate Ring NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, Retransmissions, Ring NoC
Fingerprint Enhancement and its features purification
Raju Rajkumar, Th. Churjit Meetei, Shahin Ara Begum, K Hemachandra
It is difficult to extract only genuine minutiae from fingerprints. Enhancement techniques are being used as preprocessing methods for minutiae extraction. The fingerprint enhancement is a challenging process. To overcome the adverse effect caused by spurious minutiae in fingerprint matching, a new method for fingerprint enhancement is proposed. Since some of the spurious minutiae in the boundary region cannot be remove in the minutiae purification, we draw a region of interest in the fingerprint image to remove the remaining boundary minutiae which exists as a ridge ending. These boundary minutiae affect the accuracy in fingerprint matching. Experimental result shows that the proposed method can eliminate the effect caused by spurious minutiae.
Keywords: Boundary minutiae, genuine minutiae, spurious minutiae, fingerprint enhancement, FAR, FRR
A Speed Efficient RNS to Binary Converter for the Moduli Set
Edem Kwedzo Bankas, and Kazeem Alagbe Gbolagade
In this paper, we present a novel high speed reverse converter for the moduli set f2n; 2n + 1; 2n ???? 1g. The proposed converter is obtained by simplifying the traditional Chinese Remainder Theorem. Just as in other state of the art converters, the proposed converter is purely adder-based. Our proposal is approximately twice faster than the best known equivalent state of the art reverse converter.
Keywords: Adder-based, Chinese Remainder Theorem, High Speed, Reverse Converter
An Internet Based Model for Students Submission to Iraqi Universities
Loay E. George and Hayder K. Mohammed
Students admission to the Iraqi educational institutions suffers continually from being a slow paced process, in which, students have to do lots of paper work that requires them to be precise and careful not to make any mistakes. Additionally, the process is time and effort consuming for the employees involved in the preparation and organization of the required materials, as well as, being money consuming for the Ministry of Higher Education. This research addresses the problem statement, and provides an internet based solution, that aims to facilitate admissions by fully automating the whole process, and eliminating the paper work needed by system users. The developed solution is given the abbreviation OASIS which stands for (Online Admission System for Iraqi Students). The established automation system is in the form of a Rich Internet Application, which is considered to be a new category of applications that resembles to desktop applications. It is supposed to enhance user experience by providing him with the feeling that the application behaves like a typical desktop application where no page refreshes are required. The development of the proposed system was conducted using Adobe Flash Platform, which is an integrated set of tools and technologies from Adobe Corporation. OASIS was developed using Adobe Flash Builder 4.0 Premium, with ActionScript 3.0 and MXML as the main programming languages, and an architectural framework called Swiz, for architecting the application.
Keywords: Rich Internet Application, Adobe Flash Platform, ICONIX, Swiz Architectural Framework, Object Oriented Analysis & Design, Online Admission System
Simulation of different levels of Redundant-NOC topologies
Reza Kourdy and Mohammad Reza Nouri rad
Networks on chips (NoCs) have been introduced as a remedy for the growing problems of current interconnects in VLSI chips. Being a relatively new domain in research, simulation tools for NoCs are scarce. To fill the gap, we use network simulator NS-2 for simulating NoCs, especially at high level chip design. The huge library of network elements along with its flexibility to accommodate customized designs, NS-2 becomes a viable choice for NoCs. We have used NS-2 to simulate our prototype of a fault tolerant protocol for NoCs. We simulated our NoC architecture using the widely used network simulator ns-2 and have obtained good performance.
Keywords: integrated circuit (IC), Systems-on-chip (SOC), MPSoC, Network on Chip (NOC), Reliability, Redundant- Topologies
Improvement NOC Reliability by NOC-7MR (NOC-septuple-Modular-Redundancy)
Reza Kourdy and Mohammad Reza Nouri rad
A new chip design paradigm called Network on Chip (NOC) offers a promising architectural choice for future systems on chips. NOC architectures offer a packet switched communication among functional cores on the chip. NOC architectures also apply concepts from computer networks and organize on-chip communication among cores in layers similar to OSI reference model. A fault tolerant network on chip (FT-NoC) system with redundant architecture for reliable applications is proposed. Applying different types of redundancy on chip increases reliability, efficiency and effectiveness of the NoC and, at large, the aircraft control system itself.
Keywords: integrated circuit (IC), Systems-on-chip (SOC), Network on Chip (NOC), fault tolerance, very large scale integration (VLSI) and deep submicron domain (DSM)
NOC-HoneyComb : A New structure for Network-On-Chip
Reza Kourdy and Mohammad Reza Nouri rad
The future of on-chip communication is Networks-on-Chip (NoC), meaning that on-chip communication is done through packet based networks. Today System-on-Chips (SoC) uses shared buses as on-chip interconnection architecture. Networks-on-Chip (NoCs) have been suggested as a promising solution to the scalability problem of SoCs. The honeycomb mesh, based on hexagonal plane tessellation, is considered as a multiprocessor interconnection network. Vertex and edge symmetric honeycomb torus network is obtained by adding wraparound edges to the honeycomb mesh. The network cost, defined as the product of degree and diameter, is better for honeycomb networks than for the two other families based on square (mesh-connected computers and tori) and triangular (hexagonal meshes and tori) tessellations.
Keywords: honeycomb mesh, honeycomb torus, Network on Chip, System on Chip, NoC Architecture
NOC- honeycomb-torus: A New topology for interconnections
Reza Kourdy and Mohammad Reza Nouri rad
Rectangular mesh and torus are the mostly used topologies in network-on-chip (NoC) based systems. In this paper, we illustrate that the honeycomb topology is an advantageous design alternative in terms of network cost which is one of the most important parameters that reflects both network performance and implementation cost.the honeycomb topologies are feasible to be implemented with rectangular devices. We also propose a 3D honeycomb topology since 3D IC has become an emerging and promising technique. A methodology to support NOC is presented. This methodology outlines steps from requirements down to implementation. As an illustration of the concepts, a plausible mapping of an entire base station on hypothetical NOC is discussed.
Keywords: Network on Chip (NOC), Honeycomb, Honeycomb Mesh and Torus, virtual circuit (VC)
Comparative analysis of Optical Networks and ATM Networks for Multimedia Communication - A survey
Farwida Javed
Multimedia communications is considered as the modern way of communication, even within the field of data communications and network, primarily due to its demanding nature and ever increasing utilization world?wide. For multimedia communications, optical and ATM networks are considered as basic and efficient network paradigms with diversity inherent in both architectures. The paper presents the comparative analysis of optical network with respect to ATM network for the multimedia communications, based on the previously conducted research in this domain. The comparison is based on the five pivotal factors, which are not only considered important for discussion of any comparative analysis but even are also covered in discussion of any new and vital work in the field of networks and communications. The study encompasses the essential knowledge, innovative architectures and the empirical efforts done for the efficient delivery of multimedia in both of the architectures.
Keywords: Optical Network, ATM Network, Multimedia Communication
Rule Acquisition in Data Mining Using Genetic Algorithm
K. Indira and S. Kanmani
Association Rule mining is a technique of data mining that is very widely used in many areas. It is used to deduce results that prove to be very helpful in the field as they provide some inferences from possibly large databases. These inferences cannot be noticed without data mining. It is seen that by altering representations and operators the Genetic algorithm could be applied for any fields without compromising the efficiency.
Keywords: Association rule mining, Genetic algorithm, Crossover, Mutation
Repository-Based Architecture to support System of Systems Interoperability
Houda Benali, Narjès Bellamine-Ben Saoud and Mohamed Ben Ahmed
Interoperability is the most important challenge when dealing with system of systems (SoS) architecting. Interoperability became more challenging when dealing with evolving architectures such as SoS architecture. In this paper we present our solution to support two levels of SoSI (SoS Interoperability) Model: programmatic, and constructive. We introduce an architecture that performs the integration of various stakeholders providing programmatic interoperability, and is repositorybased architecture (blackboard architecture) providing constructive interoperability.
Keywords: System of Systems; Meta-Architecting; Repository-based architecture; Interoperability; Semantic Modeling
Combination of LPC and ANN for Speaker Recognition
Rohini B. Shinde and V. P. Pawar
Speech processing system plays vital role in man-machine-interface. Speaker Recognition technology can be used for restricting services to authorized persons. This technique is used for identification of speaker’s voice. It is used to control display of information, reservation services, financial transactions, entrance into reserved areas, buildings etc. This paper deals with technique for developing continuous speech database of Marathi Language for speaker recognition. For the experiment speech of speaker is recorded in Marathi Language. We have also discussed design and methodology of collection of database for speaker’s recognition. We have tested recognition rate of speaker through Linear Prediction Coefficient. As a result recognition rate is 98.5%.
Keywords: ANN (Artificial Neural Network), Discrete Cosine Transform (DCT), Fast Fourier Transform (FFT), Linear Predictor Coefficients (LPC), Speaker Recognition System (SRS)
Analysis of TCP Tahoe with one packet drop in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with single packet drop, and we show the effect of Slow start and Congestion avoidance algorithm for increase the reliability of network on chip (NoC).We simulate 3D Mesh 3*3 NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, Congestion avoidance, Slow start
Analysis of TCP Tahoe with Multiple Packet Drops in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with multiple packet drops, and we show the effect of Slow start and Congestion avoidance algorithm for increase the reliability of network on chip (NoC).We simulate Mesh 3*3 NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of Tcp Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, Slow start,NS-2
Combined use of Community Detection and Particle Swarm Optimization to Support Decision Making
Nesrine Ben Yahia, Narjès Bellamine and Henda Ben Ghésala
Decision making whenever and wherever it is happening is crucial to organizations success. In this paper, we suggest a multimodal decision making (MDM) process where decision may be made by three possible modes: individual, collective or hybrid. In order to support multimodal DM process, we combine the use of a graph clustering technique i.e. community detection and a meta-heuristic optimization technique i.e. particle swarm optimization (PSO). At the beginning, a community detection thresholding algorithm based on both structural and attribute clustering is advanced to compute nodes and edges weights. In order to measure the performance of clustering, we use network modularity, a metric that considers cohesion and coupling of communities. Then, PSO is employed to maximize network modularity by finding out the threshold that leads to cluster the network into two communities with high cohesion and weak coupling. Finally, we evaluate the proposed algorithm with an example of application.
Keywords: Decision making, multimodal process, community detection, particle swarm optimization
Using a Mapping to determine the relationship between Personality Traits and Engineering Knowledge
Jalal Laassiri, Salah-ddine Krit and Said El Hajji
The process of interpreting raw information from the data set to valuable information can be used to forecast new Engineering Knowledge. Clustering technique is used to determine the similarity in the dataset based on the nature of the personality traits and Engineering Knowledge, Each cluster reveals the identity based on its learning by observation such as extraversion, neuroticism, psychoticism and Engineering Knowledge, which are categorized based on descriptive modeling. The Multilayer Perceptron (MLP) technique classifies the personality traits of engineers and their Engineering Knowledge based on learning by example. This paper determines the relationship between personality traits and Engineering Knowledge, using mapping or function. The relationship derived could help the industry to fit the right personality candidate for the right post.
Keywords: Engineering Knowledge, Cluster, Multi Layer Perceptron, K-Means, Artificial Neural Networks, computer programming
Information Extraction: A wrapper Approach
Samir K Amin, Khairuddin Bin Omar and Dinesh Kumar Saini
In this paper an attempt is made to study the concept of information (IE) to be to locate specific pieces of text in arbitrary struc-tured documents, using wrapper approach which relies on the semi-structuredness of the documents. Wrappers are special programs which are applied to documents and extract information out of it. Documents about patients in health care systems are good examples of such types. In the context of information extraction from semi-structured documents, several scenarios of interaction are identified and analyzed with respect to their adequacy for cooperative problem solving. The theoretical considerations are illustrated by a particular interaction ap-proach called consistency queries. The paper aims to initiate a design process and investigation of interaction scenarios which enable hu-mans and machines to collaboratively solve problems.
Keywords: Information Extraction, Wrapper, document, health systems, scenario
A very low computational resource flipping based architecture for 3D Wavelet Transform
Zahra ZareMojtahedi and Farzad Zargari
Wavelet Transform (WT) is among the most employed transforms in image and video coding. Lifting scheme is proposed to reduce the computational load of WT. In spite of the advantages of lifting scheme, its hardware realization suffers from high critical path latency. As a result, Flipping scheme has been proposed to reduce the critical path latency in the hardware realization of WT. Even though, there are proposed architectures for hardware realization of 1D and 2D flipping based WT, there are not proposed any architecture for 3D flipping based WT. In this study we propose a serial architecture for hardware implementation of the 3D flipping scheme WT. The proposed architecture has lower critical path latency and also employs very lower computational resources compared to the other proposed architectures for 3D WT. Moreover besides the 3D WT, 1D and 2D WTs are supported by the proposed architecture as well.
Keywords: 3D Wavelet Transform, Computational resources, Critical path, Flipping Scheme, Image compression, Lifting Scheme
Study to compute the current by applying nested grid technique
Duong Thi Thuy Nga, Nguyen Ky Phung
Current model is an important model in modelling. It helps us to predict the current and to solve some other problems in environment such as: computing and predicting the sediment transport, the oil spill, the accretion, erosion at the estuary. This model is based on a 2D finite-difference grid. It takes a lot of time to compute the current in a large area in several days. We apply nested grid technique to the model to improve the speed of computing. The computational results in study area are agreement to our experimental results and the real data in Ca Mau coastal zone. It shows that the model is faster than the old one.
Keywords: current model, velocity, nested grid
ORGIssues concerning the life expectancy and the retiring age within the current retiring pension systems
Colomeischi Tudor
The paper analyzes issues related to the progress in time of life expectancy on birth, as well as the retiring age in countries within The Organization of Economic Cooperation and Development. The impact that life expectancy has over the retiring age ascertaining, as well as the relationship between life expectancy and appointing the retiring pension level within the current retiring pension systems are approached in this paper.
Keywords: life expectance, people aging, retiring pension, retiring age, retiring pension contributions
Analysis of TCP Tahoe with Delayed ACK and Retransmission in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with delayed acknowledgment and retransmission that cannot get three duplicate Acknowledgments(ACKs), and wait for the retransmission timeout when a packet lost, and we show the effect of Slow start and retransmission algorithm for increase the reliability of network on chip (NoC).We simulate Octagon NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, Retransmission, Octagon NoC
FRUIT-DETECTOOLS: Leafs Identification Using Image Processing Approach for Recognize the Fruit Trees
M. Mustafa, M.R.M. Shafry, A.J. Masita, S. Ghazali, M.Z. N. Azlin, W.A.B.W. Aezwani and M. Masri
Image processing has been widely applied in many fields of study such as medicine, construction and safety. Applying these techniques for plant recognition has also been practiced by many previous researchers. Plants could be identified traditionally by the structure of the leaves. However, applying image processing technique for these identifications has recently become a research issue. Focus of this research paper is to identify local fruit trees by using this image processing method. The methodology involves three stages of images processing which are pre-processing, feature extraction and leaves recognition. The image pre-processing begins with converting the RGB image to the grey-scale image by applying thresholding technique before removing the noise. Sobel operator is applied to the binary image to recognize the edge of that image before thinning the edges. The feature extraction process is then conducted by using the chain code technique. The features that had been extracted were the length, width, perimeter and the shapes of the leaves. The last stage is to recognize the leaves feature by using Linear Comparison technique. An experiment is carried out to 150 self-generated leaf images as the training and test data. The results have shown that the accuracy rate of 80 percent is recorded.
Keywords: Image Processing, Leaves Structutes, Sobel Operator, Linear Comparisons and Chain Code Technique
Experimented Goodput Measurement of Standard TCP Versions over Large-Bandwidth Low-Latency Bottleneck
Ghassan A. Abed, Mahamod Ismail, and Kasmiran Jumari
Goodput of Transmission Control Protocol (TCP) is the number of useful data bits, transferred by the network elements to a certain destinations, per unit of time. In communications networks, network layer, transport layer, and occasionally data link layer protocol overhead is involved in the throughput, but is excluded from the goodput. Goodput is constantly lesser than the throughput where the throughput means the gross bits rate which is physically transmitted, that mostly is lesser than network access connections rapidity (the link bandwidth or the link capacity). In other side, TCP flow control, congestion avoidance, and slow-start may possibly cause a poorer goodput than the maximum throughput. This article provide an experimented results to the goodput measurement for six TCP source variants, Tahoe, Reno, Newreno, Sack, Fack, and Vegas. The goodput analysis based on using a specific network topology with large-bandwidth and low-latency bottleneck using Network Simulator 2 (NS-2). The obtained results showed the huge differences among the measured goodput for these TCP’s.
Keywords: Goodput, TCP, NS-2, MSS
Green Computing Endeavor in Higher Educational Institutes – a noble initiative towards Sustainable IT Infrastructure
Shalabh Agarwal, Archana Vimal, Saima Ghosh, Asoke Nath
Computers are one of the fastest growing electrical loads in the Educational and Business world. Each year more and more computers are procured and put to use. But it’s not just the number of computers that is driving energy consumption upward. The way that we use computers also adds to the increasing energy burden. Research reveals that most personal desktop computers are not being used the majority of the time they are running and many personal computers worldwide are needlessly left on continuously. Increasing awareness of climate change and concern for the environment, has forced a variety of industries including the educational institutes to review their environmental credentials. Colleges and universities throughout the world are now paying more attention to Green Computing as an initiative towards a greener environment and cost savings. Institutions of higher education (IHEs) can decrease their carbon footprints and save costs when they embed energy-saving programs in their IT policy. Many institutions have chosen to include information on their websites about green computing efforts and how to reduce carbon footprints. In addition use of thin-client and virtualization is also being adapted as efforts towards sustainable computing. This article discusses the ways that individuals and institutions can decrease energy use with sensible use of computers and IT infrastructure.
Keywords: Green Computing, Energy Efficiency, Thin-client, Virtualization
Fibrewise Near Topological Spaces
A. A. Abo Khadra, S. S. Mahmoud and Y. Y. Yousif
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near topological spaces over B. Also, we introduce the concepts of fibrewise near closed and near open topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Keywords: Fibrewise topological spaces, Fibrewise near topological spaces, Fibrewise near closed and near open topological spaces
Analysis of TCP Tahoe with slow start and Multiple packet drop in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with Fast retransmission, slow start with multiple packet drop, and we show the effect of Slow start and Congestion avoidance algorithm for increase the reliability of network on chip (NoC).We simulate Octagon NoC architecture with Network Simulator 2 (NS2).
Keywords: Network-on-Chip, TCP Tahoe
Analysis of TCP Tahoe with Delayed ACK and Multiple Packet Drop in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with Delayed acknowledgment and retransmission with multiple packet drop, for increase the reliability of network on chip (NoC).We simulate Butterfly NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe
Analysis of TCP Tahoe with Different Propagation Delay in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with phase effects and different propagation delay in network on chip (NoC). We simulate Butterfly NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, propagation delay
EPIC Architecture Evaluation and Comparison With Other Architectures
Majid Meghdadi, Ali Akbar Arjomand Hashjin, Yaghoob Gharani Bonab, and Behzad Gaffari
HP and Intel, recently have been introduced a new method of instruction set called EPIC (Explicitly Parallel Instruction Computation) and also a specific structure, called IPF (Itanium Processor Family). This paper aims to identify the differences between the structures of EPIC and methods of the previous instruction set such as VLIW and Super Oscar. Different aspects of the EPIC has been seen in computer design and the records are listed. A collection of old instructions for maximize use of EPIC performance have also been studied.
Keywords: EPIC architecture ? Itanium Processor Family? VLIW?Memory Latencies
Resource Leasing Cloud Computing Model: A Win-Win Strategy for Resource Owners and Cloud Service Providers
John Thomas, Kalyana Raman, Vijay K. Chaurasiya, Santanu Das
Investment on computing resources are pricey for any business, which holds the capacity to serve their clients require extensive resource outfit such as CPU, Storage, Memory, Software etc. In this context cloud computing is a paradigm which resolved the upfront cost on resources by its elastically scalable, economically saleable and globally located resources called cloud without investing more into hardware and software. The problem vested not in availing the resources through either cloud or the other; instead it vests in utilising the acquired computing resources optimally without being kept it idle. In this paper we analyse the serious issue of wastage of computing resources of an individual user or organization during the idle hours and propose a model for leasing their computing resource to cloud service provider for better utilisation of the same. In this resource leasing cloud model the owner of the computing resource lease his computing resource during the idle hours to the cloud service provider. It will enhance the resource utilization of the organization by augmenting the resource capacity of cloud service provider with minimal cloud upfront cost incurring by the cloud service provider. Also the model proposed an incentive scheme which will encourage organizations to participate in the process to augment the resource capacity of cloud service providers.
Keywords: Distributed Architectures, Emerging Technologies
Analysis of TCP Tahoe with Different Queue Size and Different Propagation Delay in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with different queue size and different propagation delay in network on chip (NoC). We simulate Torus 3*3 NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe, queue size, propagation delay
Analysis of TCP Tahoe with Different Round Trip Time in Network on Chip
Mohammad Reza Nouri Rad and Reza Kourdy
This paper shows the behavior of TCP Tahoe with very different round trip (RTT) time in network on chip (NoC). The connection with a shortest RTT will get more packets sent and less packet loss compared to a connection with a longer RTT. We simulate Torus NoC architecture with Network Simulator 2 (NS2). The simulation results reveal the applicability of TCP Tahoe protocol in Congestion Control in proposed architecture.
Keywords: Network-on-Chip, TCP Tahoe
Design Methodology of Energy Consumption for Wireless Sensor Networks using Renewable Energy
Krit Salah-Ddine, Laassiri Jalal and El Hajji Said
In recent years, the number of wireless sensor networks (WSNs) deployments for real life applications has rapidly increased. Still, the energy problem remains one of the major barrier somehow preventing the complete exploitation of this technology. WSN uses a software technique to monitor device usage patterns, and combines it with hardware power information in runtime. Hardware systems have been recently proposed to increase the autonomy of embedded systems. WSNs are typically powered by batteries with a limited lifetime and, even when additional energy can be harvested from the external environment (e.g., through solar cells or photovoltaic mechanisms), it remains a limited resource to be consumed judiciously. Efficient energy management is thus a key requirement for a credible design of a wireless sensor networks. One key design challenge is how to optimize the efficiency of WSNs. This paper proposes a new design architecture and implementations of power management dc-dc buck-boost converter targeted for optimization of consumption of wireless sensor network applications. Key issues in WSNs are discussed. We operated real applications on the WSNs, The proposed system can operate at 2.4GHz and dissipates a power of 15 and 25 uW, respectively, from a 2.5 V supply. The noise performance at input, output and the frequency response is presented.
Keywords: Wireless Sensor Network (WSNs), Software, Hardware, Embedded Systems, Power Management, dc-dc buck-boost converter
A Novel Approach to Detect Online Pirated Movies Based on Scale Invariant Feature Transform (SIFT)
B. Srinivas, K. Venkata Rao and P. Suresh Verma
Advancements in technology have brought many great things to the movie industry. There are better special effects, better animations, and better viewing quality. But along with these advancements there is an improvement in movie piracy which affects the economy and the repudiation of the industry. Now-a-days, there are many warez groups in the internet all over the globe to promote these pirated movies. We proposed a new system to detect these pirated movies from the websites which offers copyright infringement of original movies. And then we compare the suspected movies against the legitimate movies that are stored in our trained system using Scale Invariant Feature Transform (SIFT) algorithm and then rationalize whether the suspected movie is pirated or not. As these pirated movies are of cheap print which is taken under dim light or under high contrast, we trained our system by applying different transformations on a movie or video clip and then compared with the original print of the movie. Our system generated efficient results even if the print is with high or with low contrast or even if there is a change in the angle or scale or even if there is an additional noise is added.
Keywords: Pirated Movie, Piracy, SIFT
A Novel Approach to Protect Web Content using Barcode
S. Govinda Rao, B. Srinivas, P. Satheesh and A Govardhan
Information can be termed as the root of any action as well as performance. It is the door that breaks the inertia of plans to actions in an appropriate manner. In these leading times with the usage of e-format, a mandatory agent for thousands of transactions, it becomes very important to simultaneously develop the corresponding measures for the security of information that in other words enhances the confidentiality, security and a promise of scope for furnished development. Phishing is a form of online theft, which is used to steal the user's information such as email id's and passwords. This type of fraud has grown into one of the most effective scams over the time producing a huge amount of fraud in the phishing attacks where 90% filtered by spam filters, 50% of people who get the email and eventually open it, 10% of phishers read the email and click on the link to attack the web page thereby breaching the door to security and destroying the security of all the information existing on the respective affected system. Many anti-phishing solutions have been developed like content analysis and html analysis, however these techniques were failed to investifate nowadays phishers are composing phishing with no analyzable elements like, images, layouts and URLs.
Keywords: webpage Protection, MD5, Barcode, Phishing
Plagiarized WebPage Detection by Measuring the Dissimilarities Using SIFT
B. Srinivas, M. V. Pratyusha, S. Govinda Rao and K. V. Subba Raju
Phishing is a very common network attack, where the attacker creates a replica of an existing Web page to fool users. In this paper, we propose an effective anti-phishing solution, by combining image based visual similarity based approach with digital signatures to detect plagiarized web pages. We implemented two effective algorithms for our detection mechanism, one is Scale Invariant Featured Transform (SIFT) algorithm in order to generate signature based on extracting stable key points from the screen shot of the web page and the other algorithm is the MD5 hash algorithm in order to generate digital signature based on the content of the web page. When a legitimate web page is registered with our system these two algorithms are implemented on that web page in order to generate signatures, and these signatures are stored in the database of our trained system. When there is a suspected web page, these algorithms are applied to generate both the signatures of the suspected page and are verified against our database of corresponding legitimate web pages. Our results verified that our proposed system is very effective to detect the mimicked web pages with minimal false positives.
Keywords: Plagiarized webpages, MD5, Phishing, SIFT