3225 Slices
  Title Author Publisher Format Buy Remix
Medium 9781601323217

Session - Mobile Computing and Applications

Hamid R. Arabnia, Leonidas Deligiannidis, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF
Medium 9781601322470

A Framework for Multi-source Semantic Information Extraction & Fusion for Collaborative Threat Assessment (SIFT)

Hamid R. Arabnia; David de la Fuente; Elena B. Kozerenko; Peter M. LaMonica; Raymond A. Liuzzi; Todd Waskiewicz; George Jandieri; Ashu M. G. Solo; Ivan Nunes da Silva; Fernando G. Tinetti; and Fadi Thabtah (Editors) Mercury Learning and Information PDF

Int'l Conf. Artificial Intelligence | ICAI'13 |

163

A Framework for Multi-source Semantic Information

Extraction & Fusion for Collaborative Threat

Assessment (SIFT)

Perakath Benjamin, Karthic Madanagopal, Kalyan Vadakkeveedu, Satheesh Ramachandran, and Paul Koola

Knowledge Based Systems, Inc., College Station, TX, U.S.A.

Abstract: This paper describes the motivations, methods, and automation architecture of a framework for multisource Semantic Information extraction & Fusion for collaborative Threat assessment (SIFT).

First, the technical and pragmatic challenges that motivate the research ideas are summarized. Next, a characterization of the activities for generating decision enabling information from multi-source data is provided. This characterization, called the ‘SIFT Method,’ specifies the SIFT automation support requirements. The SIFT architecture is described next. Finally, the paper summarizes the significance and benefits of the SIFT solution and outlines key areas that would benefit from additional research and development.

See All Chapters
Medium 9781601322586

A Fault-Tolerant Approach to Distributed Applications

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

23

A Fault-Tolerant Approach to Distributed Applications

T. Nguyen1, J-A. Desideri2, and L. Trifan1

INRIA, Grenoble Rhône-Alpes, Montbonnot, Saint-Ismier, France

2

INRIA, Sophia-Antipolis Méditerranée, Sophia-Antipolis, France

1

Abstract - Distributed computing infrastructures support system and network fault-tolerance, e.g., grids and clouds.

They transparently repair and prevent communication and system software errors. They also allow duplication and migration of jobs and data to prevent hardware failures.

However, only limited work has been done so far on application resilience, i.e., the ability to resume normal execution after errors and abnormal executions in distributed environments. This paper addresses issues in application resilience, i.e., fault-tolerance to algorithmic errors and to resource allocation failures. It addresses solutions for error detection and management. It also overviews a platform used to deploy, execute, monitor, restart and resume distributed applications on grids and cloud infrastructures in case of unexpected behavior.

See All Chapters
Medium 9781601322494

A Mechanism to Prevent Side Channel Attacks in Cloud Computing Environments

Hamid R. Arabnia; Victor A. Clincy; Leonidas Deligiannidis; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Internet Computing and Big Data | ICOMP'13 |

229

A Mechanism to Prevent Side Channel Attacks in Cloud Computing

Environments

Tzong-An Su

Fenh Chia University

Taichung, Taiwan

Abstract - Cloud computing provides

the benefits of scalability, agility, reliability, security, performance, and maintenance to enterprises and has emerged to become a reality. While cloud computing brings in many benefits it also introduces several security issues. One of the most serious security issues is the side channel attacks which are attacks based on information gained from the physical implementation of a machine. In this paper, we aim at providing a platform to prevent various types of side channel attacks, e.g., cache-based and timing attacks.

Keywords – Side Channel Attack,

Cloud Computing, Hardware

Virtualization, Virtual Machine

1

1.1

Introduction

Background

Cloud Computing has been a buzzword for the pass few years. The concept combined technologies in networking and computing to provide various services to individuals and organizations. Services like SaaS (Software as a Service), Uaas

See All Chapters
Medium 9781601323200

Implementation of an Evolutionary Algorithm Using the Node-Depth-Degree Encoding in a Nios II processor in FPGA

CSREA 2003 CSREA Press PDF

314

Int'l Conf. Artificial Intelligence | ICAI'14 |

Implementation of an Evolutionary Algorithm Using the Node-Depth-Degree Encoding in a Nios II processor in FPGA

Gustavo Siqueira Vinhal,

Anderson da Silva Soares,

Telma Woerle de Lima and

Gustavo Teodoro Laureano

Clarimar Jos´e Coelho

Computer Science Departament

Pontifical University Catholic of Goi´as

Goiˆania, GO, Brazil

Intitute of Informatics

Federal University of Goi´as

Goiˆania, GO, Brazil

Abstract—Many problems relevant to NP-Hard class are present in the real world. Among them we can mention the problems of network design (PNDs) that involve electricity distribution, vehicle traffic, and others. Do not exist efficient algorithms that provide an exact solution for these types of problems. Over the years research has been developed used evolutionary algorithms (EAs) to provide an efficient solution for these problems. In addition, appropriate data structures may further improve the performance of EAs to PNDs. The node-depth-degree encoding (NDDE) shows significant results for

See All Chapters
Medium 9781601323279

Session - Information Assurance

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF
Medium 9781601322548

Object-Level Saliency Detection Combining the Contrast and Spatial Compactness Hypothesis

Hamid R. Arabnia; Leonidas Deligiannidis; Joan Lu; Fernando G. Tinetti; Jane You; George Jandieri; Gerald Schaefer; Ashu M. G. Solo; and Vladimir Volkov (Editors) Mercury Learning and Information PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'13 |

307

Object-Level Saliency Detection Combining the Contrast and Spatial Compactness Hypothesis

Chi Zhang1, Weiqiang Wang1, 2, and Xiaoqian Liu1

School of Computer and Control Engineering, University of Chinese Academy of Sciences, Beijing, China

2

Key Lab of intelligence information Processing, Institute of Computing Technology, CAS, Beijing, China

1

Abstract - Object-level saliency detection is an important branch of visual saliency. Most previous methods are based on the contrast hypothesis which regards the regions presenting high contrast in a certain context as salient.

Although the contrast hypothesis is valid in many cases, it can’t handle some difficult cases, especially when the salient object is large. To make up for the deficiencies of contrast hypothesis, we incorporate a novel spatial compactness hypothesis which can effectively handle those tough cases. In addition, we propose a unified framework which integrates multiple saliency maps generated on different feature maps built on different hypotheses. Our algorithm can automatically select saliency maps of high quality according to the quality evaluation score defined in this paper. The experimental results demonstrate that each key component of our method contributes to the final performance and the full version of our method outperforms all state-of-the-art methods on the most popular dataset.

See All Chapters
Medium 9781601323286

Relational Metrics Model for Software Configuration Management

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

84

Int'l Conf. Software Eng. Research and Practice | SERP'14 |

Relational Metrics Model for Software

Configuration Management

Charles Donald Carson, Jr.

Hassan Pournaghshband

Department of Computer Science and Software Engineering

Southern Polytechnic State University

Abstract - Changes during a software products life cycle are inevitable. These changes can correct or enhance software functionality and/or reduce costs associated with the software product. However, changes can also introduce added risks and unknowns during a software products life cycle and can result in unpredictable software behavior.

Software configuration management (SCM) is a part of configuration management (CM) which supports a complex framework for monitoring, managing, and controlling changes to a software products configuration during its life cycle. In this paper, we introduce the development of a relational metrics model as a possible means for better managing and controlling software configuration change during a software products life cycle from the SCM activities, software engineering measures, and any available

See All Chapters
Medium 9788131805374

Ch_5

Hari Mohan Pandey Laxmi Publications PDF

5

I NTRODUCTION TO

L OOPING STR

UCTURE IN ‘C’

TRUCTURE

T

he Chapter takes you to a long journey of one of the most important and very useful programming construct, the loop. A basic introduction to loop is given in the beginning of the Chapter.

Introduction to all different types of loops while, for and do-while available in C is given.

While loop is explained in detail with the help of lot of programming examples in the step-by-step manner i.e., starting from basic small programs up to complex programs have been explained in a lucid manner. Common programming errors in the usage are also pin pointed through small programs. Use of break and continue statement is illustrated with examples.

The most frequently used for loop is explained in greater length with programming examples ranging from factorial, prime number, to pattern displaying programs with the help of nesting of for loops. Additional programming examples have been given as two parts. In the section 5.10 do-while loop is discussed with its unique features of executing at least once even condition is false. Differences between do-while loop and while loop are discussed.

See All Chapters
Medium 9781601323255

Using Video Modeling in Virtual Learning Environment to Develop some of Mathematical Skills among Children with Down Syndrome in the State of Kuwait

Hamid R. Arabnia, Leonidas Deligiannidis, Jane You, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

40

Int'l Conf. Modeling, Sim. and Vis. Methods | MSV'14 |

Using Video Modeling in Virtual Learning

Environment to Develop some of Mathematical

Skills among Children with Down Syndrome in the

State of Kuwait

Muntaha S. TH. F. ALHendal

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain m.alhindal@hotmail.com

Hamdy A. Abdulaziz

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain hamdyaaa@agu.edu.bh

Ahmed M. Nouby

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain ahmedmns@agu.edu.bh

Elsayed S. Elkhamisi

Mental Disabilities and Autism program

Arabian Gulf University

Manama, Kingdom of Bahrain saidsmk@agu.edu.bh

Abstract—The objective of this research is to investigate the effect of Using Video Modeling in a Virtual Learning

Environment to Develop some of Mathematical Skills among children with Down syndrome in some primary stage schools in the State of Kuwait. The measuring tool for the research was an achievement test and interview with the parents to assess their satisfaction. The sample was of 16 children. They were aged between 7 -13 years, in the scholastic year 2012-2013. The research designed semi-experimental, pre-test/post-test control group.

See All Chapters
Medium 9781601322388

Application of LabVIEW and SoildWorks - based Simulation Technique to Hybrid Motion Blending of a 6-axis Articulated Robot

Hamid R. Arabnia; George A. Gravvanis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

10

Int'l Conf. Scientific Computing | CSC'13 |

Application of LabVIEW® and SoildWorks®- based

Simulation Technique to Hybrid Motion Blending of a 6axis Articulated Robot

1

Dong Sun Lee1, Won Jee Chung1, and Jun Ho Jang1

School of Mechatronics, Chansgwon National University, Changwon-si, Gyeongsangnam-do, South Korea

Abstract - In general, the movement strategy of industrial robots can be divided into two kinds, PTP (Point to Point) and

CP (Continuous Path). In order to cope with high-speed handling of the cooperation of industrial robots with machine tools or other devices, CP should be implemented so as to reduce vibration and noise, as well as decreasing travel time.

In this paper, we will realize CP motion (especially hybrid motion) blending in 3-dimensional space for a 6-axis articulated (lab-manufactured) robot (called as “RS2”) by using LabVIEW® programming, based on a parametric interpolation. . Another major contribution of this paper is the proposal of motion blending simulation technique based on LabVIEW® and SolidWorks®, in order to figure out whether the hybrid motion blending can be realized before actual implementation. In order to evaluate the performance of hybrid motion blending, simple PTP (i.e., linear-linear) is physically implemented on RS2 as well as hybrid motion

See All Chapters
Medium 9781601323118

A Comparative Analysis of Computational Indel Calling Pipelines for Next Generation Sequencing Data

Hamid R. Arabnia, Quoc-Nam Tran, Mary Q. Yang, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

!-&$�$)���) �%,%)#��$�)#

�@>AFE6C�(4:6?46� +:C8:?:2�)649� �=24

�./-��/ � �&*�)+#'&*��&����$�+#'&* �#&��$*����)��'&��' �+"��%'*+

�'%%'&� �$�**� ' � %,+�+#'&*� #&� +"�� ",%�&� !�&'%���

'))��+$0

��+��+#&!� �&�� #��&+# 0#&!� #&��$*� #*� #%(')+�&+� #&� +"�� *+,�0� '

",%�&�!�&�+#�*��&���#*��*��������-�$,�+�� +"��()��#*#'&��&�

)���$$� ' � �'%�#&�+#'&*� ' � )���� %�((#&!� �&�� #&��$� ��$$#&!

*' +.�)��'&���$$#&!�*"')+��&��$'&!�)�#&��$*�.#+"�-�)#��$��)���

�'-�)�!�� '&� *#%,$�+��� ��+��� � ��� �/�%#&�� +"�� ('(,$�)� )���

%�((�)*� ����� '.+#���� ���� �&�� �")#%(� �&�� +"� #&��$

��$$�)*��#&��$�� )�� �0�*���&������)����&+�)�*+#&!$0�+"�)� .�)�

#&+�)��+#'&* ��+.��&� )���� %�((�)*� �&�� #&��$ ��$$�)*�� � �&

*#%,$�+�����+���+"�� �����#&��$��&���")#%(�����)�(#(�$#&�*

*"'.�� *,(�)#')�(�) ')%�&���#&�%'*+���*�*������$���+�� )'%

",%�&� �")'%'*'%�� ��� .#+"� #&��$*� ��+�)%#&��� )'%� �&

�$+�)&�+#-�� #&��$� (#(�$#&�� .�)�� ,*��� +'� -�$#��+�� +"�

�'%(,+�+#'&�$�(#(�$#&�*��&��+'��**�**�),&�+#%�����"���")#%(�

����)� (#(�$#&� .�*� +"� %'*+� ���,)�+�� ."#$� (#(�$#&�*� .#+"

See All Chapters
Medium 9781939902016

Chapter 4: Views

Casey Foster, Aidan Feldman, David Tonge, Phil Freo and Tim Branyen Bleeding Edge Press ePub

A View encapsulates a visual region of a web application and constrains all plugins, events, interactivity, and logic inside to this region. Views allow you to take advantage of reusable components and provide a more modular infrastructure.

Views are often managed within a Router or a parent View and can either be long lived like a persistant shopping cart in the header, for example, or short lived like the items in the cart as you expand it.

When working with regions of a web application, it is often desirable to isolate and contextualize logic and rendering. Imagine a shopping cart web application that has an interface that positions navigation at the top, categories on the left, and the shopping cart on the right. The shopping cart is composed of details about each item.

You can think of breaking down this application into the following views:

Each view represents a unique or repeatable region in the application. By representing our application in this manner, we are able to adopt patterns and best practices that have existed in application development for decades. Since Views are visual representations of data, there is no querying the DOM to determine what the state is. The idea here is that you do logic and calculations (shopping cart totals, position, etc.) within the View and render that.

See All Chapters
Medium 9789381159415

pldnc-con.pdf

Sharad Chauhan Laxmi Publications PDF

(vi)

Some Important Terms

Review Questions

CHAPTER 3: Syntax and Semantics

3.1.

3.2.

3.3.

3.4.

3.5.

Syntax and Semantics

The General Problem of Describing Syntax

Formal Methods of Describing Syntax

Attribute Grammars

Dynamic Semantics

Some Important Terms

Review Questions

CHAPTER 4: Structured Data Objects

4.1.

4.2.

4.3.

4.4.

4.5.

4.6.

4.7.

4.8.

4.9.

4.10.

4.11.

4.12.

4.13.

Structured Data Objects and Data Types

Declaration and Type Checking of Structured Data Objects

Vectors and Arrays

Multidimensional Arrays

Records

Slices

Character String Types

Variable Size Data Structures

Union

Pointers and Programmer-constructed Data Objects

Sets

Lists

Files

Some Important Terms

Review Questions

CHAPTER 5: Subprograms and Programmer Defined Data Types

5.1.

5.2.

5.3.

5.4.

5.5.

5.6.

5.7.

5.8.

5.9.

Data Type Concept

The Concept of Abstraction

Abstract Data Types

Encapsulation and Information Hiding

Encapsulation by Subprograms

Polymorphism

Overloaded Subprogram

Generic Subprograms

Type Definitions

Some Important Terms

Review Questions

34

35

37—70

37

38

40

58

62

69

70

71—100

See All Chapters
Medium 9781601322616

Session Posters and Short Papers

Hamid R. Arabnia; Leonidas Deligiannidis; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Load more