Current Issue : January - March Volume : 2015 Issue Number : 1 Articles : 6 Articles
Resource allocation is an important subject in Grid computing environment. Many types of non-similar\nresources exist in the grid computing environment which can also be considered from economics� point of\nview. Moreover, suppliers and customers are independent subjects with two very different environments in\nthe grid computing environment. Therefore negotiations are considered very important. Bargaining is one\nof the most functional methods of negotiation in economic grid. In this paper a new resource allocation\nalgorithm based on bargaining in a competitive market is proposed. The presented paper tries to increase\nthe number and speed of successful negotiation by considering the meaning of competition in the market\nand deadline in the bargaining model. The proposed model is suitable for real-time software\nimplementation to illustrate the concept of buying from seller�s competitive market. The Simulation results\non prototype data show the effectiveness of the proposed method....
Web directory is a concept it lists web sites by category and subcategory. The web content into thematic hierarchies these are known as web directories. Web personalization is a technique websites are personalized based on the interests of an individual, group or organization. In context previous work the web directory is viewed as a thematic hierarchy and personalization on the basis of usage data. In dissimilarity to most of the work on web usage mining, the usage data that are analyzed here communicate to user navigation throughout the web, to a certain extent than a particular web site exhibit as a result a high amount of thematic diversity. The concept of a community web directory used as that specializes to the needs and interests of particular user communities. Two hash tables primary and secondary hash tables are used in which primary is used to store sessions and pointers to secondary table which is having a complete path navigation....
A novel idea to combine agent technology and cloud computing for monitoring a plant floor system is presented. Cloud infrastructure\nhas been leveraged as the main mechanism for hosting the data and processing needs of a modern industrial information\nsystem. The cloud offers unlimited storage and data processing in a near real-time fashion. This paper presents a software as-\na-service (SaaS) architecture for augmenting industrial plant-floor reporting capabilities. This reporting capability has been\narchitected using networked agents, worker roles, and scripts for building a scalable data pipeline and analytics system....
This paper proposes a multiobjective application mapping technique targeted for large-scale network-on-chip (NoC). As the\nnumber of intellectual property (IP) cores inmultiprocessor system-on-chip (MPSoC) increases, NoC application mapping to find\noptimum core-to-topology mapping becomes more challenging. Besides, the conflicting cost and performance trade-off makes\nmultiobjective application mapping techniques even more complex. This paper proposes an application mapping technique that\nincorporates domain knowledge into genetic algorithm (GA). The initial population of GA is initialized with network partitioning\n(NP) while the crossover operator is guided with knowledge on communication demands. NP reduces the large-scale application\nmapping complexity and providesGAwith a potential mapping search space.The proposed genetic operator is comparedwith stateof-\nthe-art genetic operators in terms of solution quality. In this work, multiobjective optimization of energy and thermal-balance\nis considered.Through simulation, knowledge-based initial mapping shows significant improvement in Pareto front compared to\nrandom initial mapping that is widely used. The proposed knowledge-based crossover also shows better Pareto front compared to\nstate-of-the-art knowledge-based crossover....
Permanent brushless dc motors have been used in many areas. Considering to their vast advantages,\nresearchers have studied extensively for speed control and reducing the torque ripple of this motors. But a\nlittle study was done for both speed control and optimum design of them. This paper presents for the\noptimal design of a PMBLDC motor with goal of reducing volume and building cost. In addition the speed\ncontrol aim is considered using a multi-objective nonlinear cost function which is solved by fuzzy particle\nswarm optimization. First characteristics of motor are expressed as functions of motor geometries. Then\ncost function which combines the step response characteristic of motor speed, building cost and its volume\nis constructed and minimized. To reach this goal in this application the new improved fuzzy particle swam\noptimization is used for the first time. The results of simulations show that this method has good ability\nand efficiency in reaching global best point in compare of GA and PSO methods....
Malware detection done at the network infrastructure level is still an open research problem ,considering the evolution ofmalwares\nand high detection accuracy needed to detect these threats. Content based classification techniques have been proven capable of\ndetecting malware without matching for malware signatures. However, the performance of the classification techniques depends\non observed training samples. In this paper, a new detection method that incorporates Snort malware signatures into Naive Bayes\nmodel training is proposed. Through experimental work, we prove that the proposed work results in low features search space for\neffective detection at the packet level. This paper also demonstrates the viability of detecting malware at the stateless level (using\npackets) as well as at the stateful level (using TCP byte stream).The result shows that it is feasible to detect malware at the stateless\nlevel with similar accuracy to the stateful level, thus requiring minimal resource for implementation on middleboxes. Stateless\ndetection can give a better protection to end users by detecting malware on middleboxes without having to reconstruct stateful\nsessions and before malwares reach the end users....
Loading....