Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithms (2)
- Bioinformatics (2)
- Computational Intelligence (2)
- Data Mining (2)
- Fuzzy logic (2)
-
- Granular Computing (2)
- Security visualization (2)
- Semantic Web services (2)
- Web crawler (2)
- SVM (Support Vector Machine) (1)
- 4.311 Primal (1)
- AODV (1)
- Ad hoc network (1)
- Adder (1)
- Algorithm (1)
- Anomalies (1)
- Ant Colony Algorithms (1)
- Ants (1)
- Architecture (1)
- Assistive technology (1)
- Atomicity (1)
- Bagging (1)
- Battlefiled Management Simulation (1)
- Benes Network (1)
- Best first crawler (1)
- Binary Classification (1)
- Bioinformatics applications (1)
- Biology (1)
- BondFlow (1)
- Boosting (1)
- Publication
- Publication Type
Articles 31 - 37 of 37
Full-Text Articles in Entire DC Network
Simulating A Pipelined Reconfigurable Mesh On A Linear Array With A Reconfigurable Pipelined Bus System, Mathura Gopalan
Simulating A Pipelined Reconfigurable Mesh On A Linear Array With A Reconfigurable Pipelined Bus System, Mathura Gopalan
Computer Science Theses
Due to the unidirectional nature of propagation and predictable delays, optically pipelined buses have been gaining more attention. There have been many models proposed over time that use reconfigurable optically pipelined buses. The reconfigurable nature of the models makes them capable of changing their component’s functionalities and structure that connects the components at every step of computation. There are both one dimensional as well as k –dimensional models that have been proposed in the literature. Though equivalence between various one dimensional models and equivalence between different two dimensional models had been established, so far there has not been any attempt …
A System For Rapid Configuration Of Distributed Workflows Over Web Services And Their Handheld-Based Coordination, Jaimini Joshi
A System For Rapid Configuration Of Distributed Workflows Over Web Services And Their Handheld-Based Coordination, Jaimini Joshi
Computer Science Theses
Web services technology has lately stirred tremendous interest in industry as well as the academia. Web services are self-contained, platform independent functionality which is available over the internet. Web services are defined, discovered & accessed using a standard protocols like WSDL, UDDI & SOAP. With the advent of Service-Oriented Architecture and need for more complex application, it became eminent to have a way in which these independent entities could collaborate in a coherent manner to provide a high level functionality. But the problem of service composition is not an easy one. One reason being the self-contained and loosely coupled interaction …
Interval Neutrosophic Sets And Logic: Theory And Applications In Computing, Haibin Wang
Interval Neutrosophic Sets And Logic: Theory And Applications In Computing, Haibin Wang
Computer Science Dissertations
A neutrosophic set is a part of neutrosophy that studies the origin, nature, and scope of neutralities, as well as their interactions with different ideational spectra. The neutrosophic set is a powerful general formal framework that has been recently proposed. However, the neutrosophic set needs to be specified from a technical point of view. Here, we define the set-theoretic operators on an instance of a neutrosophic set, and call it an Interval Neutrosophic Set (INS). We prove various properties of INS, which are connected to operations and relations over INS. We also introduce a new logic system based on interval …
Upper Bound Analysis And Routing In Optical Benes Networks, Jiling Zhong
Upper Bound Analysis And Routing In Optical Benes Networks, Jiling Zhong
Computer Science Dissertations
Multistage Interconnection Networks (MIN) are popular in switching and communication applications. It has been used in telecommunication and parallel computing systems for many years. The new challenge facing optical MIN is crosstalk, which is caused by coupling two signals within a switching element. Crosstalk is not too big an issue in the Electrical Domain, but due to the stringent Bit Error Rate (BER) constraint, it is a big major concern in the Optical Domain. In this research dissertation, we will study the blocking probability in the optical network and we will study the deterministic conditions for strictly non-blocking Vertical Stacked …
An Improved Ant Colony Algorithm With Diversified Solutions Based On The Immune Strategy, Ling Qin, Yi Pan, Ling Chen, Yixin Chen
An Improved Ant Colony Algorithm With Diversified Solutions Based On The Immune Strategy, Ling Qin, Yi Pan, Ling Chen, Yixin Chen
Computer Science Faculty Publications
Background: Ant colony algorithm has emerged recently as a new meta- heuristic method, which is inspired from the behaviours of real ants for solving NP-hard problems. However, the classical ant colony algorithm also has its defects of stagnation and premature. This paper aims at remedying these problems.
Results: In this paper, we propose an adaptive ant colony algorithm that simulates the behaviour of biological immune system. The solutions of the problem are much more diversified than traditional ant colony algorithms.
Conclusion: The proposed method for improving the performance of traditional ant colony algorithm takes into account the polarization of the …
A Novel Approach To Phylogenetic Tree Construction Using Stochastic Optimization And Clustering, Ling Qin, Yixin Chen, Yi Pan, Ling Chen
A Novel Approach To Phylogenetic Tree Construction Using Stochastic Optimization And Clustering, Ling Qin, Yixin Chen, Yi Pan, Ling Chen
Computer Science Faculty Publications
Background: The problem of inferring the evolutionary history and constructing the phylogenetic tree with high performance has become one of the major problems in computational biology.
Results: A new phylogenetic tree construction method from a given set of objects (proteins, species, etc.) is presented. As an extension of ant colony optimization, this method proposes an adaptive phylogenetic clustering algorithm based on a digraph to find a tree structure that defines the ancestral relationships among the given objects.
Conclusion: Our phylogenetic tree construction method is tested to compare its results with that of the genetic algorithm (GA). Experimental results show that …
Zsbt: A Novel Algorithm For Tracing Dos Attackers In Manets, Xin Jin, Yaoxue Zhang, Yi Pan, Yuezhi Zhou
Zsbt: A Novel Algorithm For Tracing Dos Attackers In Manets, Xin Jin, Yaoxue Zhang, Yi Pan, Yuezhi Zhou
Computer Science Faculty Publications
Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with traditional Internet, the resources, such as bandwidth, memory, and battery power, of each node are more limited in mobile ad hoc networks (MANETs). Therefore, nodes in MANETs are more vulnerable to DoS attacks. Moreover, attackers in MANETs cannot only use IP spoofing to conceal their real identities but also move arbitrarily, which makes it a challenging task to trace a remote attacker in MANETs. In this paper, …