Paper by International Journal of Information Technology, Modeling and Computing (IJITMC)
Various algorithms are known for solving linear system of equations. Iteration methods for solvin... more Various algorithms are known for solving linear system of equations. Iteration methods for solving the
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
Bookmarks Related papers MentionsView impact
In this paper we consider influence of overgrowth of doped by diffusion and ion implantation area... more In this paper we consider influence of overgrowth of doped by diffusion and ion implantation areas of heterostructures on distributions of concentrations of dopants. Several conditions to increase sharpness of p-njunctions (single and framework bipolar transistors), which were manufactured during considered technological process, have been determined. At the same time we analyzed influence of speed of overgrowth of
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
Bookmarks Related papers MentionsView impact
In a multivariable servomechanism design, it is required that the output vector tracks a certain ... more In a multivariable servomechanism design, it is required that the output vector tracks a certain reference
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
Bookmarks Related papers MentionsView impact
In this paper we generalized recently introduced approach for estimation of time scales of mass t... more In this paper we generalized recently introduced approach for estimation of time scales of mass transport.
The approach have been illustrated by estimation of time scales of relaxation of concentrations of charge
carriers in high-doped semiconductor. Diffusion coefficients and mobility of charge carriers and electric
field strength in semiconductor could be arbitrary functions of coordinate.
Bookmarks Related papers MentionsView impact
History of humanity especially post renaissance era depicts the contribution of research and its ... more History of humanity especially post renaissance era depicts the contribution of research and its output In
terms of publication, patents and technology transfer paving the way for the societal prosperity. Scientific
writing and research publication are fundamental components indicative of academic excellence and
supposedly committed to the Research and Development (R&D) funding. Thus the budget allocation and
expenditure thereof towards R&D is considered to be a vital parameter for the advancement in science and
technology and also for social and economic well being. In view of the tall aspirations of society and
government at large it becomes indispensable to investigate whether the scholastic output is going hand in
hand with the R & D budget spillover or otherwise. We present in this communication a systematic
clustering approach based on K-means algorithm to reveal the impact of R&D expenditure on the extent of
research publications. Two independent sources of data, Research and development expenditure i.e.
percentage of Gross Domestic Product (GDP) and Scientific and technical journal articles, are brought
together in this comprehensive study. From an empirical perspective, present study found that there exist a
positive linear correlation between R & D Expenditure and number of research publication.
Bookmarks Related papers MentionsView impact
In this paper, we propose a models of process chain and knowledge-based of meteorological reanaly... more In this paper, we propose a models of process chain and knowledge-based of meteorological reanalysis
datasets that help scientists, working in the field of climate and in particular of the rainfall evolution, to
solve uncertainty of spatial resources (data, process) to monitor the rainfall evolution. Indeed, rainfall
evolution mobilizes all research, various methods of meteorological reanalysis datasets processing are
proposed. Meteorological reanalysis datasets available, at present, are voluminous and heterogeneous in
terms of source, spatial and temporal resolutions. The use of these meteorological reanalysis datasets may
solve uncertainty of data. In addition, phenomena such as rainfall evolution require the analysis of time
series of meteorological reanalysis datasets and the development of automated and reusable processing
chains for monitoring rainfall evolution. We propose to formalize these processing chains from modeling
an abstract and concrete models based on existing standards in terms of interoperability. These processing
chains modelled will be capitalized, and diffusible in operational environments. Our modeling approach
uses Work-Context concepts. These concepts need organization of human resources, data, and process in
order to establish a knowledge-based connecting the two latter. This knowledge based will be used to solve
uncertainty of meteorological reanalysis datasets resources for monitoring rainfall evolution.
Bookmarks Related papers MentionsView impact
We are interested in a course scheduling strategy in academic backwardness context. Our aim is to... more We are interested in a course scheduling strategy in academic backwardness context. Our aim is to find a
course scheduling model that will solve the problem of delays in the context of insufficient infrastructure
resources and teaching staff. We use juggling theory and multiprocessor scheduling to arrive at our
approach. Thus, we have created a course scheduling algorithm that allows maximum use of available
infrastructure and staff resources. Courses are scheduled in sequence by analogy to a juggling notation
that describes the rhythm of throws and thus the objects trajectory in space in juggling (siteswap).
Bookmarks Related papers MentionsView impact
The utilization of robotics in supply chain management is a complex and quickly evolving field. T... more The utilization of robotics in supply chain management is a complex and quickly evolving field. This study
investigated how robotics can be utilized to further develop efficiency, accuracy, and speed in supply chain
operations. The study found that robotics can possibly change supply chain tasks, like warehousing,
inventory management, request satisfaction, and logistics. The study likewise featured the ascent of
patterns like independent vehicles, mechanical sorting systems, and prescient investigation for demand
forecasting. The study reasoned that embracing mechanical innovations isn't just a need yet additionally a
chance for supply chains to turn out to be more dexterous and responsive.
Bookmarks Related papers MentionsView impact
In this paper we introduce an approach to increase integration rate of field-effect heterotransis... more In this paper we introduce an approach to increase integration rate of field-effect heterotransistors in the
framework of an operational transresistance amplifier. In the framework of the approach we consider a
heterostructure with special configuration. Several specific areas of the heterostructure should be doped by
diffusion or ion implantation. Annealing of dopant and/or radiation defects should be optimized.
Bookmarks Related papers MentionsView impact
We are enhancing our high performance tool research to include a mix of MPI (Message Passing
Inte... more We are enhancing our high performance tool research to include a mix of MPI (Message Passing
Interface) and CUDA (Compute Unified Device Architectecture) programming, in order to speed up the
processing time. Using these new processes, we have seen tremendous speed-up in spatio-temporal
kriging. The NVIDIA graphics cards provide the vehicle for the latest version of CUDA. We can use a
Windows laptop, with the Windows Subsystem for Linux (WSL 2), utilizing the Ubuntu 22.04 software. We
see that not only does the processing time is significantly reduced, but larger data sets are able to be
accommodated. Adding the CUDA subroutines greatly enhances spatio-temporal kriging model building.
Bookmarks Related papers MentionsView impact
A mobile ad-hoc network (MANET) is a collection of wireless mobile nodes that dynamically self-or... more A mobile ad-hoc network (MANET) is a collection of wireless mobile nodes that dynamically self-organize
to form an arbitrary and temporary network. The mobile nodes can communicate with each other without
any fixed infrastructure. MANET can be set up quickly to facilitate communication in a hostile environment
such as battlefield or emergency situation. The various severe security threats are increasing on the
MANET. One of these security threats is black hole attack which drops all received data packets intended
for forwarding. In this paper, we are simulating and analyzing the impact of black hole attack on Ad Hoc
On-Demand Distance Vector (AODV) protocol. The simulation is carried on NS-2 and the simulation
results are analyzed on various network performance metrics such as packet delivery ratio, normalized
routing overhead and average end-to-end delay.
Bookmarks Related papers MentionsView impact
Since the computerized applications are used all around the world, there occurs the collection of... more Since the computerized applications are used all around the world, there occurs the collection of a vast
amount of data. The important information hidden in vast data is attracting the researchers of multiple
disciplines to make study in developing effective approaches to derive the hidden knowledge within them.
Data mining may be considered to be the process of extracting or mining the useful and valuable
knowledge from large amounts of data. There are various different domains in data mining such as text
mining, image mining, sequential pattern mining, web mining and etc. Among these, sequence mining is
one of the most important research area which helps to finding the sequential relationships found in the
data. Sequence mining is applied in wide range of application areas such as the analysis of customer
purchase patterns, web access patterns, weather observations, protein sequencing, DNA sequencing, etc. In
protein and DNA analysis, sequence mining techniques are used for sequence alignment, sequence
searching and sequence classification. In the area of protein sequence analysis, the researchers are
showing their interest in the field of protein sequence classification. It has the ability to discover the
recurring structures that exist in the protein sequences. This paper explains various techniques used by
different researchers in classifying the proteins and also provides an overview of different protein sequence
classification methods.
Bookmarks Related papers MentionsView impact
Energy consumption is a significant issue in ad hoc networks since mobile nodes are battery power... more Energy consumption is a significant issue in ad hoc networks since mobile nodes are battery powered. In
order to prolong the lifetime of ad hoc networks, it is the most critical issue to minimize the energy
consumption of nodes. In this paper, we propose an energy efficient multipath routing protocol for
choosing energy efficient path. This system also considers transmission power of nodes and residual energy
as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile
nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while
choosing a route to transfer data packets. This system is implemented by using NS-2.34. Simulation results
show that the proposed routing protocol with transmission power and residual energy control mode can
extend the life-span of network and can achieve higher performance when compared to traditional ad-hoc
on-demand multipath distance vector (AOMDV) routing protocol.
Bookmarks Related papers MentionsView impact
In this paper we presenta key management approach for wireless sensor networks. This approach
fac... more In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Bookmarks Related papers MentionsView impact
In this work, we present a new digital signature protocol based on the discrete logarithm problem... more In this work, we present a new digital signature protocol based on the discrete logarithm problem and
computing square roots modulo a large composite number. This method can be used as an alternative if
known systems are broken.
Bookmarks Related papers MentionsView impact
Web mediated crowd funding is a talented paradigm used by project launcher to solicit funds from ... more Web mediated crowd funding is a talented paradigm used by project launcher to solicit funds from backers
to realize projects. Kickstarter is one such largest funding platform for creative projects. However, not all
the campaigns in Kickstarter attain their funding goal and are successful. It is therefore important to know
about campaigns’ chances of success. As a broad goal, authors intended in extraction of the hidden
knowledge from the Kickstarter campaign database and classification of these projects based on their
dependency parameters. For this authors have designed a classification model for the analysis of
Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids to identify
the possibility of success of a campaign.
Bookmarks Related papers MentionsView impact
In this paper we compare distributions of concentrations of dopants in an implanted-junction rect... more In this paper we compare distributions of concentrations of dopants in an implanted-junction rectifiers in a
heterostructures with an overlayer and without the overlayer. Conditions for decreasing of depth of the
considered p-n-junction have been formulated.
Bookmarks Related papers MentionsView impact
The differences between countries go far beyond the physical and territorial aspects. Hence, for ... more The differences between countries go far beyond the physical and territorial aspects. Hence, for analytical
purposes, it is essential to classify countries in groups based on some of their attributes. Investment in
Research and Development (R&D) influences innovations which in turn stimulates growth of a country. In
this context the productivity of the R&D expenditure is analysed pragmatically. Present study aims to
discover impact of R&D expenditure on its productivity in terms of number of journal articles published,
patent applications filed and trademark applications registered. A more significant analysis by means of
designing prominent clusters of countries by applying unsupervised learning has been presented. In this
division, percentage of Gross Domestic Product (GDP) spending on R&D and its productivity are
considered.
Bookmarks Related papers MentionsView impact
In this paper we consider influence of overgrowth of doped by diffusion and ion implantation area... more In this paper we consider influence of overgrowth of doped by diffusion and ion implantation areas of heterostructures on distributions of concentrations of dopants. Several conditions to increase sharpness of p-njunctions (single and framework bipolar transistors), which were manufactured during considered technological process, have been determined. At the same time we analyzed influence of speed of overgrowth of
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
Bookmarks Related papers MentionsView impact
In a multivariable servomechanism design, it is required that the output vector tracks a certain ... more In a multivariable servomechanism design, it is required that the output vector tracks a certain reference
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
Bookmarks Related papers MentionsView impact
Uploads
Paper by International Journal of Information Technology, Modeling and Computing (IJITMC)
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
The approach have been illustrated by estimation of time scales of relaxation of concentrations of charge
carriers in high-doped semiconductor. Diffusion coefficients and mobility of charge carriers and electric
field strength in semiconductor could be arbitrary functions of coordinate.
terms of publication, patents and technology transfer paving the way for the societal prosperity. Scientific
writing and research publication are fundamental components indicative of academic excellence and
supposedly committed to the Research and Development (R&D) funding. Thus the budget allocation and
expenditure thereof towards R&D is considered to be a vital parameter for the advancement in science and
technology and also for social and economic well being. In view of the tall aspirations of society and
government at large it becomes indispensable to investigate whether the scholastic output is going hand in
hand with the R & D budget spillover or otherwise. We present in this communication a systematic
clustering approach based on K-means algorithm to reveal the impact of R&D expenditure on the extent of
research publications. Two independent sources of data, Research and development expenditure i.e.
percentage of Gross Domestic Product (GDP) and Scientific and technical journal articles, are brought
together in this comprehensive study. From an empirical perspective, present study found that there exist a
positive linear correlation between R & D Expenditure and number of research publication.
datasets that help scientists, working in the field of climate and in particular of the rainfall evolution, to
solve uncertainty of spatial resources (data, process) to monitor the rainfall evolution. Indeed, rainfall
evolution mobilizes all research, various methods of meteorological reanalysis datasets processing are
proposed. Meteorological reanalysis datasets available, at present, are voluminous and heterogeneous in
terms of source, spatial and temporal resolutions. The use of these meteorological reanalysis datasets may
solve uncertainty of data. In addition, phenomena such as rainfall evolution require the analysis of time
series of meteorological reanalysis datasets and the development of automated and reusable processing
chains for monitoring rainfall evolution. We propose to formalize these processing chains from modeling
an abstract and concrete models based on existing standards in terms of interoperability. These processing
chains modelled will be capitalized, and diffusible in operational environments. Our modeling approach
uses Work-Context concepts. These concepts need organization of human resources, data, and process in
order to establish a knowledge-based connecting the two latter. This knowledge based will be used to solve
uncertainty of meteorological reanalysis datasets resources for monitoring rainfall evolution.
course scheduling model that will solve the problem of delays in the context of insufficient infrastructure
resources and teaching staff. We use juggling theory and multiprocessor scheduling to arrive at our
approach. Thus, we have created a course scheduling algorithm that allows maximum use of available
infrastructure and staff resources. Courses are scheduled in sequence by analogy to a juggling notation
that describes the rhythm of throws and thus the objects trajectory in space in juggling (siteswap).
investigated how robotics can be utilized to further develop efficiency, accuracy, and speed in supply chain
operations. The study found that robotics can possibly change supply chain tasks, like warehousing,
inventory management, request satisfaction, and logistics. The study likewise featured the ascent of
patterns like independent vehicles, mechanical sorting systems, and prescient investigation for demand
forecasting. The study reasoned that embracing mechanical innovations isn't just a need yet additionally a
chance for supply chains to turn out to be more dexterous and responsive.
framework of an operational transresistance amplifier. In the framework of the approach we consider a
heterostructure with special configuration. Several specific areas of the heterostructure should be doped by
diffusion or ion implantation. Annealing of dopant and/or radiation defects should be optimized.
Interface) and CUDA (Compute Unified Device Architectecture) programming, in order to speed up the
processing time. Using these new processes, we have seen tremendous speed-up in spatio-temporal
kriging. The NVIDIA graphics cards provide the vehicle for the latest version of CUDA. We can use a
Windows laptop, with the Windows Subsystem for Linux (WSL 2), utilizing the Ubuntu 22.04 software. We
see that not only does the processing time is significantly reduced, but larger data sets are able to be
accommodated. Adding the CUDA subroutines greatly enhances spatio-temporal kriging model building.
to form an arbitrary and temporary network. The mobile nodes can communicate with each other without
any fixed infrastructure. MANET can be set up quickly to facilitate communication in a hostile environment
such as battlefield or emergency situation. The various severe security threats are increasing on the
MANET. One of these security threats is black hole attack which drops all received data packets intended
for forwarding. In this paper, we are simulating and analyzing the impact of black hole attack on Ad Hoc
On-Demand Distance Vector (AODV) protocol. The simulation is carried on NS-2 and the simulation
results are analyzed on various network performance metrics such as packet delivery ratio, normalized
routing overhead and average end-to-end delay.
amount of data. The important information hidden in vast data is attracting the researchers of multiple
disciplines to make study in developing effective approaches to derive the hidden knowledge within them.
Data mining may be considered to be the process of extracting or mining the useful and valuable
knowledge from large amounts of data. There are various different domains in data mining such as text
mining, image mining, sequential pattern mining, web mining and etc. Among these, sequence mining is
one of the most important research area which helps to finding the sequential relationships found in the
data. Sequence mining is applied in wide range of application areas such as the analysis of customer
purchase patterns, web access patterns, weather observations, protein sequencing, DNA sequencing, etc. In
protein and DNA analysis, sequence mining techniques are used for sequence alignment, sequence
searching and sequence classification. In the area of protein sequence analysis, the researchers are
showing their interest in the field of protein sequence classification. It has the ability to discover the
recurring structures that exist in the protein sequences. This paper explains various techniques used by
different researchers in classifying the proteins and also provides an overview of different protein sequence
classification methods.
order to prolong the lifetime of ad hoc networks, it is the most critical issue to minimize the energy
consumption of nodes. In this paper, we propose an energy efficient multipath routing protocol for
choosing energy efficient path. This system also considers transmission power of nodes and residual energy
as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile
nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while
choosing a route to transfer data packets. This system is implemented by using NS-2.34. Simulation results
show that the proposed routing protocol with transmission power and residual energy control mode can
extend the life-span of network and can achieve higher performance when compared to traditional ad-hoc
on-demand multipath distance vector (AOMDV) routing protocol.
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
computing square roots modulo a large composite number. This method can be used as an alternative if
known systems are broken.
to realize projects. Kickstarter is one such largest funding platform for creative projects. However, not all
the campaigns in Kickstarter attain their funding goal and are successful. It is therefore important to know
about campaigns’ chances of success. As a broad goal, authors intended in extraction of the hidden
knowledge from the Kickstarter campaign database and classification of these projects based on their
dependency parameters. For this authors have designed a classification model for the analysis of
Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids to identify
the possibility of success of a campaign.
heterostructures with an overlayer and without the overlayer. Conditions for decreasing of depth of the
considered p-n-junction have been formulated.
purposes, it is essential to classify countries in groups based on some of their attributes. Investment in
Research and Development (R&D) influences innovations which in turn stimulates growth of a country. In
this context the productivity of the R&D expenditure is analysed pragmatically. Present study aims to
discover impact of R&D expenditure on its productivity in terms of number of journal articles published,
patent applications filed and trademark applications registered. A more significant analysis by means of
designing prominent clusters of countries by applying unsupervised learning has been presented. In this
division, percentage of Gross Domestic Product (GDP) spending on R&D and its productivity are
considered.
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
The approach have been illustrated by estimation of time scales of relaxation of concentrations of charge
carriers in high-doped semiconductor. Diffusion coefficients and mobility of charge carriers and electric
field strength in semiconductor could be arbitrary functions of coordinate.
terms of publication, patents and technology transfer paving the way for the societal prosperity. Scientific
writing and research publication are fundamental components indicative of academic excellence and
supposedly committed to the Research and Development (R&D) funding. Thus the budget allocation and
expenditure thereof towards R&D is considered to be a vital parameter for the advancement in science and
technology and also for social and economic well being. In view of the tall aspirations of society and
government at large it becomes indispensable to investigate whether the scholastic output is going hand in
hand with the R & D budget spillover or otherwise. We present in this communication a systematic
clustering approach based on K-means algorithm to reveal the impact of R&D expenditure on the extent of
research publications. Two independent sources of data, Research and development expenditure i.e.
percentage of Gross Domestic Product (GDP) and Scientific and technical journal articles, are brought
together in this comprehensive study. From an empirical perspective, present study found that there exist a
positive linear correlation between R & D Expenditure and number of research publication.
datasets that help scientists, working in the field of climate and in particular of the rainfall evolution, to
solve uncertainty of spatial resources (data, process) to monitor the rainfall evolution. Indeed, rainfall
evolution mobilizes all research, various methods of meteorological reanalysis datasets processing are
proposed. Meteorological reanalysis datasets available, at present, are voluminous and heterogeneous in
terms of source, spatial and temporal resolutions. The use of these meteorological reanalysis datasets may
solve uncertainty of data. In addition, phenomena such as rainfall evolution require the analysis of time
series of meteorological reanalysis datasets and the development of automated and reusable processing
chains for monitoring rainfall evolution. We propose to formalize these processing chains from modeling
an abstract and concrete models based on existing standards in terms of interoperability. These processing
chains modelled will be capitalized, and diffusible in operational environments. Our modeling approach
uses Work-Context concepts. These concepts need organization of human resources, data, and process in
order to establish a knowledge-based connecting the two latter. This knowledge based will be used to solve
uncertainty of meteorological reanalysis datasets resources for monitoring rainfall evolution.
course scheduling model that will solve the problem of delays in the context of insufficient infrastructure
resources and teaching staff. We use juggling theory and multiprocessor scheduling to arrive at our
approach. Thus, we have created a course scheduling algorithm that allows maximum use of available
infrastructure and staff resources. Courses are scheduled in sequence by analogy to a juggling notation
that describes the rhythm of throws and thus the objects trajectory in space in juggling (siteswap).
investigated how robotics can be utilized to further develop efficiency, accuracy, and speed in supply chain
operations. The study found that robotics can possibly change supply chain tasks, like warehousing,
inventory management, request satisfaction, and logistics. The study likewise featured the ascent of
patterns like independent vehicles, mechanical sorting systems, and prescient investigation for demand
forecasting. The study reasoned that embracing mechanical innovations isn't just a need yet additionally a
chance for supply chains to turn out to be more dexterous and responsive.
framework of an operational transresistance amplifier. In the framework of the approach we consider a
heterostructure with special configuration. Several specific areas of the heterostructure should be doped by
diffusion or ion implantation. Annealing of dopant and/or radiation defects should be optimized.
Interface) and CUDA (Compute Unified Device Architectecture) programming, in order to speed up the
processing time. Using these new processes, we have seen tremendous speed-up in spatio-temporal
kriging. The NVIDIA graphics cards provide the vehicle for the latest version of CUDA. We can use a
Windows laptop, with the Windows Subsystem for Linux (WSL 2), utilizing the Ubuntu 22.04 software. We
see that not only does the processing time is significantly reduced, but larger data sets are able to be
accommodated. Adding the CUDA subroutines greatly enhances spatio-temporal kriging model building.
to form an arbitrary and temporary network. The mobile nodes can communicate with each other without
any fixed infrastructure. MANET can be set up quickly to facilitate communication in a hostile environment
such as battlefield or emergency situation. The various severe security threats are increasing on the
MANET. One of these security threats is black hole attack which drops all received data packets intended
for forwarding. In this paper, we are simulating and analyzing the impact of black hole attack on Ad Hoc
On-Demand Distance Vector (AODV) protocol. The simulation is carried on NS-2 and the simulation
results are analyzed on various network performance metrics such as packet delivery ratio, normalized
routing overhead and average end-to-end delay.
amount of data. The important information hidden in vast data is attracting the researchers of multiple
disciplines to make study in developing effective approaches to derive the hidden knowledge within them.
Data mining may be considered to be the process of extracting or mining the useful and valuable
knowledge from large amounts of data. There are various different domains in data mining such as text
mining, image mining, sequential pattern mining, web mining and etc. Among these, sequence mining is
one of the most important research area which helps to finding the sequential relationships found in the
data. Sequence mining is applied in wide range of application areas such as the analysis of customer
purchase patterns, web access patterns, weather observations, protein sequencing, DNA sequencing, etc. In
protein and DNA analysis, sequence mining techniques are used for sequence alignment, sequence
searching and sequence classification. In the area of protein sequence analysis, the researchers are
showing their interest in the field of protein sequence classification. It has the ability to discover the
recurring structures that exist in the protein sequences. This paper explains various techniques used by
different researchers in classifying the proteins and also provides an overview of different protein sequence
classification methods.
order to prolong the lifetime of ad hoc networks, it is the most critical issue to minimize the energy
consumption of nodes. In this paper, we propose an energy efficient multipath routing protocol for
choosing energy efficient path. This system also considers transmission power of nodes and residual energy
as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile
nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while
choosing a route to transfer data packets. This system is implemented by using NS-2.34. Simulation results
show that the proposed routing protocol with transmission power and residual energy control mode can
extend the life-span of network and can achieve higher performance when compared to traditional ad-hoc
on-demand multipath distance vector (AOMDV) routing protocol.
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
computing square roots modulo a large composite number. This method can be used as an alternative if
known systems are broken.
to realize projects. Kickstarter is one such largest funding platform for creative projects. However, not all
the campaigns in Kickstarter attain their funding goal and are successful. It is therefore important to know
about campaigns’ chances of success. As a broad goal, authors intended in extraction of the hidden
knowledge from the Kickstarter campaign database and classification of these projects based on their
dependency parameters. For this authors have designed a classification model for the analysis of
Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids to identify
the possibility of success of a campaign.
heterostructures with an overlayer and without the overlayer. Conditions for decreasing of depth of the
considered p-n-junction have been formulated.
purposes, it is essential to classify countries in groups based on some of their attributes. Investment in
Research and Development (R&D) influences innovations which in turn stimulates growth of a country. In
this context the productivity of the R&D expenditure is analysed pragmatically. Present study aims to
discover impact of R&D expenditure on its productivity in terms of number of journal articles published,
patent applications filed and trademark applications registered. A more significant analysis by means of
designing prominent clusters of countries by applying unsupervised learning has been presented. In this
division, percentage of Gross Domestic Product (GDP) spending on R&D and its productivity are
considered.
doped areas and mechanical stress in the considered heterostructure on distribution of concentrations of
dopants in the structure.
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
a forum for presenting new advances and research results in the fields of digital image processing. The
conference will bring together leading researchers, engineers and scientists in the domain of interest from
around the world. The scope of the conference covers all theoretical and practical aspects of the signal,
image processing & pattern recognition, from basic research to development of application. Authors are
solicited to contribute to the conference by submitting articles that illustrate research results, projects,
surveying works and industrial experiences.
and Applications (ITCCMA 2024) will provide an excellent international forum for sharing
knowledge and results in the fields of Information Technology, Control Systems, Chaos,
Computer Modelling, Computer Science and applications. The Conference looks for
significant contributions to all major fields of the Information Technology, Control Systems,
Chaos and Modelling in theoretical and practical aspects. The aim of the conference is to
provide a platform to the researchers and practitioners from both academia as well as industry
to meet and share cutting-edge development in the field.
excellent international forum for sharing knowledge and results in theory, methodology and
applications of VLSI. Original, unpublished papers, describing research in the general area
of VLSI are solicited. Both theoretical and experimental research results are welcome in the
following areas, but are not limited to.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe
significant advances in the following areas, but are not limited to.
th International Conference on Soft Computing, Mathematics and Control (SMC
2024) will provide an excellent international forum for sharing knowledge and results in
theory, methodology and applications impacts and challenges of Soft Computing,
Mathematics and Control. The conference documents practical and theoretical results which
make a fundamental contribution for the development of Soft Computing, Mathematics and
Control. The aim of the conference is to provide a platform to the researchers and
practitioners from both academia as well as industry to meet and share cutting-edge
development in the field.
th International Conference on Big Data, IOT & NLP (BINLP 2024) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and applications of Big
Data, IoT and NLP. Authors are solicited to contribute to the conference by submitting articles that
illustrate research results, projects, surveying works and industrial experiences that describe
significant advances in the areas of Big Data, Internet of Things and NLP.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in the
and Applications (ITCCMA 2023) will provide an excellent international forum for sharing
knowledge and results in the fields of Information Technology, Control Systems, Chaos,
Computer Modeling, Computer Science and applications. The Conference looks for
significant contributions to all major fields of the Information Technology, Control Systems,
Chaos and Modeling in theoretical and practical aspects. The aim of the conference is to
provide a platform to the researchers and practitioners from both academia as well as industry
to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the following areas, but are not limited to.
an excellent international forum for sharing knowledge and results in theory, methodology and
applications of Instrumentation and Control Systems and Applications.
terms of publication, patents and technology transfer paving the way for the societal prosperity. Scientific
writing and research publication are fundamental components indicative of academic excellence and
supposedly committed to the Research and Development (R&D) funding. Thus the budget allocation and
expenditure thereof towards R&D is considered to be a vital parameter for the advancement in science and
technology and also for social and economic well being. In view of the tall aspirations of society and
government at large it becomes indispensable to investigate whether the scholastic output is going hand in
hand with the R & D budget spillover or otherwise. We present in this communication a systematic
clustering approach based on K-means algorithm to reveal the impact of R&D expenditure on the extent of
research publications. Two independent sources of data, Research and development expenditure i.e.
percentage of Gross Domestic Product (GDP) and Scientific and technical journal articles, are brought
together in this comprehensive study. From an empirical perspective, present study found that there exist a
positive linear correlation between R & D Expenditure and number of research publication.
datasets that help scientists, working in the field of climate and in particular of the rainfall evolution, to
solve uncertainty of spatial resources (data, process) to monitor the rainfall evolution. Indeed, rainfall
evolution mobilizes all research, various methods of meteorological reanalysis datasets processing are
proposed. Meteorological reanalysis datasets available, at present, are voluminous and heterogeneous in
terms of source, spatial and temporal resolutions. The use of these meteorological reanalysis datasets may
solve uncertainty of data. In addition, phenomena such as rainfall evolution require the analysis of time
series of meteorological reanalysis datasets and the development of automated and reusable processing
chains for monitoring rainfall evolution. We propose to formalize these processing chains from modeling
an abstract and concrete models based on existing standards in terms of interoperability. These processing
chains modelled will be capitalized, and diffusible in operational environments. Our modeling approach
uses Work-Context concepts. These concepts need organization of human resources, data, and process in
order to establish a knowledge-based connecting the two latter. This knowledge based will be used to solve
uncertainty of meteorological reanalysis datasets resources for monitoring rainfall evolution.
computing square roots modulo a large composite number. This method can be used as an alternative if
known systems are broken.
heterostructures with an overlayer and without the overlayer. Conditions for decreasing of depth of the
considered p-n-junction have been formulated.
Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence
of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control
named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by
coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on three performance
metrics and taking into account the number of black hole malicious nodes.
Derived from a variant of ElGamal signature protocol and the RSA algorithm, this method can be seen as
an alternative protocol if known systems are broken.
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
amount of interesting data patterns and winnows the malicious data entering in any field of concern. It has
become indispensible to build not only a robust and a generalised model for anomaly detection but also to
dress the same model with extra features like utmost accuracy and precision. Although the K-means
algorithm is one of the most popular, unsupervised, unique and the easiest clustering algorithm, yet it can
be used to dovetail PCA with hubness and the robust model formed from Guassian Mixture to build a very
generalised and a robust anomaly detection system. A major loophole of the K-means algorithm is its
constant attempt to find the local minima and result in a cluster that leads to ambiguity. In this paper, an
attempt has done to combine K-means algorithm with PCA technique that results in the formation of more
closely centred clusters that work more accurately with K-means algorithm .This combination not only
provides the great boost to the detection of outliers but also enhances its accuracy and precision.
large sparse linear systems are recommended. But in the case of general n× m matrices the classic
iterative algorithms are not applicable except for a few cases. The algorithm presented here is based on the
minimization of residual of solution and has some genetic characteristics which require using Genetic
Algorithms. Therefore, this algorithm is best applicable for construction of parallel algorithms. In this
paper, we describe a sequential version of proposed algorithm and present its theoretical analysis.
Moreover we show some numerical results of the sequential algorithm and supply an improved algorithm
and compare the two algorithms.
Derived from a variant of ElGamal signature protocol and the RSA algorithm, this method can be seen as
an alternative protocol if known systems are broken.
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved.
less device count in inverter topology and fewer losses in the semiconductor switches. The earlier reported
less device count topology by many research groups are facing the problem of Total Harmonic Distortion
(THD). The imperfect design value of DC link capacitor is the main reason of Harmonic Distortion (THD)
problem. The ripple in the dc link voltages of Voltage Source Inverter (VSI) is leads to additional
harmonics distortion. This paper present the simulative view of minimization of the harmonic reduction in
proposed topology using improved DC link capacitor. The said approach is verified using PSIM (Power
Simulator) software.
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.