3225 Chapters
  Title Author Publisher Format Buy Remix
Medium 9781601323101

Spatial Association Mining of Focal Events in Cloud Computing

Hamid R. Arabnia, Mary Q. Yang, George Jandieri, James J. (Jong Hyuk) Park, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. on Advances in Big Data Analytics | ABDA'14 |

157

Spatial Association Mining of Focal Events in Cloud Computing

Sang Jun Park and Jin Soung Yoo†

Department of Computer Science

Indiana University-Purdue University, Fort Wayne, Indiana, USA

{parks07,yooj@ipfw.edu}

Abstract—Spatial association mining is the process of discovering interesting relationship and correlation patterns from spatial and spatiotemporal data. This work concerns finding the spatial association patterns of a certain focal event from massive spatial data. Explosive growths in geospatial data, followed by the emergence of social media and location sensing technologies, have emphasized the need to develop new and computationally efficient methods for analyzing big spatial data.

To carry out computationally expensive spatial association mining tasks, we used modern computational frameworks facilitating the distributed executions of massive tasks. This work presents a

MapReduced-based parallel and distributed algorithm to discover the association patterns of a focal spatial event in a cloud computing environment. The performance of the proposed algorithm was extensively evaluated on real clusters with Hadoop run-time environment. The experimental result shows that the proposed method is scalable with respect to various workload factors including data size and neighborhood size, and achieves a significant improvement in computational speed with an increase of cluster nodes.

See All Chapters
Medium 9781601322586

Parallel Asynchronous Modelization and Execution of Cholesky Algorithm using Petri Nets

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

52

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

Parallel Asynchronous Modelization and Execution of Cholesky Algorithm using Petri Nets

Gustavo Wolfmann

Armando De Giusti

Laboratorio de Computaci´on

Fac. Cs. Exactas F´ısicas y Naturales

Universidad Nacional de C´ordoba

Av. V´elez S´arsfield 1611 - C´ordoba - Argentina gwolfmann@efn.uncor.edu

III LIDI

Fac. Inform´atica

Universidad Nacional de La Plata

50 y 120 - La Plata - Argentina degiusti@lidi.info.unlp.edu.ar

Abstract—PDPTA 2013 - Parallelization of algorithms with hard data dependency has a need of task synchronization.

Synchronous parallel versions are simple to model and program, but inefficient in terms of scalability and processors use rate. The same problem for Asynchronous versions with elemental static task scheduling. Efficient Asynchronous algorithms implement out-of-order execution and are complex to model and execute.

In this paper we introduce Petri Nets as a tool for simplifying the modeling and execution of parallel asynchronous versions of this kind of algorithms, while using an efficient dynamic task scheduling implementation. The Cholesky factorization algorithm was used as testbed. Simulations were carried out as a proof of concept, based on real execution times on GPGPU’s, and have shown excellent performances.

See All Chapters
Medium 9789381159064

Ch_8_F

Arijit Saha; Nilotpal Manna Laxmi Publications PDF

8

INTRODUC TION TO OPTICAL

FIBER COMMUNICATION

8.1

INTRODUCTION

The transfer of information from one point to another is the basic concept of communication. There are different modes of communication. Perhaps the optical mode of communication is the most ancient form of communication. Simple systems such as signal fires, reflecting mirror, signaling lamps, etc. proved to be quite well to convey information form one end to the other within short distance. But when the information is to be sent to a greater distance a proper communication system is required. Within a communication system the information to be transferred is superimposed on a carrier which is an electromagnetic wave of higher frequency. The modulated carrier is then transmitted through the information channel to the receiver, where it is demodulated and the original signal is retrieved. If the carrier is chosen from optical frequency range, the communication is termed to be optical communication. The electromagnetic spectrum is shown in Fig. 8.1.

See All Chapters
Medium 9781601323170

Decimal to Binary Number Conversion can be Fun

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'14 |

381

Decimal to Binary Number Conversion can be Fun

Irene Polycarpou1

School of Sciences, University of Central Lancashire Cyprus, Larnaka, Cyprus

1

Abstract - Numbering systems are of great importance in

Computer Science and Engineering education. The binary numbering system can be considered as one of the most fundamental, since its understanding is essential for the understanding of other Computer Science and Engineering concepts, such as data representation, data storage, computer architecture, networking, and many more. Yet, students are having difficulties understanding it. One approach which has been shown to improve learning of different science and mathematics concepts is the use of educational games.

Educational games have the potential to engage and motivate learners through fun activities. This paper presents a small exploratory survey on an electronic educational game for practicing decimal to binary number conversions.

Keywords: undergraduate Computer Science and

See All Chapters
Medium 9781601322340

A Novel Mathematical Model of Targeted Cancer Therapy along p53 Proteasomal Degradation Pathways

Hamid R. Arabnia; Quoc-Nam Tran (Editors) Mercury Learning and Information PDF

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'13 |

A Novel Mathematical Model of Targeted Cancer Therapy along p53 Proteasomal Degradation Pathways

Prem Talwai

Department of Mathematics, American River College, Sacramento, CA, USA

Mira Loma High School, Sacramento, CA, USA

Abstract— Overzealous MDM2-mediated ubiquitination of p53 characterizes and sustains over 50% of all human cancers. Targeted cancer therapy hinges on a thorough understanding of the ubiquitination process. Unfortunately, existing mathematical models inaccurately describe the ubiquitin-proteasome system, due to the underlying assumptions of steady-state and constant cellular concentrations of the ubiquitin-conjugating and ubiquitin ligase enzymes.

This paper derives a novel non-steady-state mathematical model of sequential bi-substrate enzyme kinetics, which can be used to simulate the behavioral response of the ubiquitinproteasome system to specific variations in the cellular concentrations of p53, MDM2, and ubiquitin-conjugated

See All Chapters
Medium 9781601323224

A Review of Handover Schemes in Overlaid Macrofemto Cellular Networks

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Wireless Networks | ICWN'14 |

261

A Review of Handover Schemes in Overlaid Macrofemto Cellular Networks

Suman Deswal, Anita Singhrova

Department of Computer Science & Engineering, Deenbandhu Chhotu Ram University of Science &

Technology, Murthal, India

Abstract: In today’s scenario, large number of disparate wireless technologies account for heterogeneity of the access environment. For seam less mobility in such networks the handover plays an important role. In cellular a network, which is an integral part of heterogeneous environment, coverage and subsequently QoS (Quality of

Service) are the main issues. Femtocells have emerged as the most promising solution by improving coverage and the

Quality of Service to users on one hand and by offloading the macrocells and thus benefitting the service providers on the other hand. Femtocells are the small, low power base stations deployed inside the homes or buildings to provide better coverage in those regions and to increase the capacity of the networks. This paper presents works on the handover management between macrocells and overlaid femtocells.

See All Chapters
Medium 9781601322425

On the Expressiveness of Monadic Higher Order Safe Ambient Calculus

Hamid R. Arabnia; George A. Gravvanis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Foundations of Computer Science | FCS'13 |

81

On the Expressiveness of Monadic Higher Order Safe Ambient

Calculus

Zining Cao1,2

1 State Key Laboratory for Civil Aircraft Flight Simulation

Shanghai Aircraft Design and Research Institute

Shanghai 201210, China

2 Department of Computer Science and Technology

Nanjing University of Aeronautics & Astronautics

Nanjing 210016, China

Email: caozn@nuaa.edu.cn

Abstract— In this paper, we propose a monadic higher order safe ambient calculus. The expressiveness of this calculus is studied. We showed that polyadic higher order safe ambient calculus, first order safe ambient calculus with capability-passing, first order safe ambient calculus with name-passing, and polyadic π-calculus can all be encoded in monadic higher order ambient calculus. At last, we show that synchronous monadic higher order ambient calculus can be encoded in asynchronous monadic higher order ambient calculus.

Keywords: Process Calculus; Higher Order Safe Ambient Calculus; Expressiveness.

See All Chapters
Medium 9781601322432

The Design of Open Learner Model to Improve Interaction of Peer Assessment in Learning

Hamid R. Arabnia; Azita Bahrami; Victor A. Clincy; Leonidas Deligiannidis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

121

The Design of Open Learner Model to Improve

Interaction of Peer Assessment in Learning

Qingchun Hu1, Yong Huang2

School of Information Science & Engineering, East China University of Science and Technology

2

Shanghai Audio-video Education Center, Shanghai Distance Education Group, Shanghai, China

1

Abstract - Peer assessment has been reported as an effective collaborative learning approach. However, it is very difficult to encourage students to engage in reviewing activities. This study puts forward an open learner model approach that helps students’ peer interaction in the context of online peer assessment. A framework is proposed which structures and represents the information of peer interaction including Issue,

Position, Argument and Feedback. These characteristics aim to support students to recognize and target problem areas.

Once targeted, on the one hand, the system can suggest strategies to help students collaborate more effectively with their peers, maximizing students’ learning performance. On the other hand, students can access peers’ learner models and look for feedback on their work in a group. The result will provide strategies and suggestions to encourage peer interaction in the context of online peer assessment effectively.

See All Chapters
Medium 9781601323279

A Framework for Leveraging Cloud Computing to Facilitate Biometrics at Large-Scale

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

344

Int'l Conf. Security and Management | SAM'14 |

A Framework for Leveraging Cloud Computing to

Facilitate Biometrics at Large-Scale

John K. Mitchell III and Syed S. Rizvi

Department of Information Sciences and Technology

Pennsylvania State University, Altoona, PA 16601

Email: {jkm5270, srizvi}@psu.edu

Submitted to 2014 International Conference on Security and Management (SAM'14), Track: Biometrics & Forensics

Abstract—The cloud computing paradigm provides an efficient environment for the large-scale use of biometric identification systems. However, there is no established standard for the configuration of the cloud or the type of components necessary to achieve optimal biometric performance. In this paper, we present a conceptual framework which addresses the challenges and the requirements of the biometrics at large-scale while dramatically increasing the performance. In this paper, our contributions are three-fold. First, we describe the related work pertaining to biometric integration with cloud computing.

See All Chapters
Medium 9781601323170

Web Programming Curriculum: What Changes, What Remains the Same Over Time

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

�'��

��

��

�������������

�������

���

���

�����

��"���

����

����������

��������� �"

����'�� ������ �

+�������

����������������#�������������

�������"�

��

����

����,� ����������

-���

�,����

��"�(� )�

�������

��"������������

��

����

��

��

�������

��"��������������������

����

���������

�����

��������

�����

��������

����� ��

�������

��

"���������

�������

���

��

����

��������

��""

��

����������%�"����������

������ ���

���� �����

��

���

��"����

�����-�

��������

�./�0!����

�����"����

��

����

��������

���������

�����

��

����

���

�����

12������4/�0!���������

���������

�����

�"������"���

""

����

��

���

��12���

-�

��������

�����

�� ��������

��� ������"����

��

�������

��

����

��������

�������

��� ��

���

��

���

�����

���������

��

��� �����

�����������

�����

����

������

��

������� �����

%��������

������

�"������������5

�����

���������

��������

�"�������

�������

������

��

���

����6

�����

������

�������������

���"����������

��

����� ��

����

��������

��

������

�������

�����

����

����� �����

��������

����� ��

���������

���

��

��������"���

������

�����"���

������

����

������

������

���������5

���

������

��#���������

See All Chapters
Medium 9781601322586

Optimization of TSV-based Crossbars for a 3D Memory-Centric Network-on-Chip

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

442

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

Optimization of TSV-based Crossbars for a 3D MemoryCentric Network-on-Chip

Hossam H. Sarhan1 and Amr G. Wassal2

School of ICT, Nile University, Cairo, Egypt

2

Computer Engineering Department, Cairo University, Cairo, Egypt

1

Abstract - Large and complex system-on-chip devices are becoming common in the semiconductor industry nowadays.

To communicate, these processing elements need to have a network-on-chip (NoC) that is scalable enough to support a large number of elements. Many NoC topologies have been examined in the literature, including 3D NoC architectures. In particular, the 3D memory-centric NoC topology utilizes the memory-shared NoC topology and the 3D technology. The crossbar is the central communication component in most 3D

NoC architectures. This paper proposes efficient architectures and topologies for the 3D crossbar. Different cross-point implementations, which vary in their use of pass-logic and buffer insertion, are examined and compared. The architecture scalability is evaluated. An analytical model for the power and delay of the crossbar has been developed and validated.

See All Chapters
Medium 9789381159682

Blank Page

Prof. Rachna Sharma and Prof. Sudipto Das Laxmi Publications PDF
Medium 9781601322340

Simulating Spiking Neurons by Hodgkin Huxley Model

Hamid R. Arabnia; Quoc-Nam Tran (Editors) Mercury Learning and Information PDF

292

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'13 |

Simulating Spiking Neurons by Hodgkin Huxley

Model

Terje Kristensen1 and Donald MacNearney2

Department of Computing, Bergen University College, Bergen, Norway, tkr@hib.no

2

Electrical Systems Integration, Aspin Kemp and Associates, Stratford, PE, Canada, donaldmacnearney@aka-group.com

1

Abstract - The Hodgkin Huxley model of the biological neuron is numerically solved in Java, using both an Euler and a 4th order Runge Kutta method. The theory behind the

Hodgkin Huxley model is described and the basic spikes are investigated using a graphical program developed by the authors. This is the first step in a long-term goal to develop a tool in Java to simulate neuron interactions on a larger scale. In the future, the authors would like to simulate interactions between multiple neurons, with the aspiration to investigate large-scale neural behavior with visualization and total control of all parameters involved.

Keywords: Hodgkin-Huxley, Java, simulation, spiking neuron, numerical integration

See All Chapters
Medium 9781601323194

The Parallelization of Two Constrained Optimization Problems Using Evolutionary Algorithms

Hamid R. Arabnia, Ray R. Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Genetic and Evolutionary Methods | GEM'14 |

51

The Parallelization of Two Constrained Optimization Problems

Using Evolutionary Algorithms

Michael Scherger

Department of Computer Science

Texas Christian University

Fort Worth, TX, 76129, USA

Email: m.scherger@tcu.edu

Roja Ramani Molupoju

Department of Computing Science

Texas A&M University – Corpus Christi

Corpus Christi, TX, 78412, USA rmolupoju@tamucc.edu

Abstract – (GEM’14) This research discusses the parallelization of two constrained optimization problems:

Rosenbrock’s function and the Benacer-Tau function.

The general nonlinear programming (NLP) problem requires finding the optimum point (minimum or maximum) of a function of n real variables subjected to some given constraints. There are numerous situations in science and engineering where the optimum is bounded adding complexity to the optimization problem. An approach used in this research by [31] uses evolves two populations. One population is evolved inside the feasible domain of the design space and the second population is evolved outside this feasible domain. In this research a parallelized version of this algorithm was implemented. The results of this research show that this parallel technique is both effective and accurate.

See All Chapters
Medium 9781601323118

Predicting the Co-receptors (CCR5 and CXCR4) of the Viruses R5, X4 and R5X4 that Cause AIDS (HIV-1) in Cells CD4 Using The Bayes Classifier

Hamid R. Arabnia, Quoc-Nam Tran, Mary Q. Yang, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

��GLVHDVH�WKDW�

LV�ZLGHVSUHDG�WKURXJKRXW��WKH�SODQHW��,Q�SDUWLFXODU��WKH�5��

+,9��� YLUXVHV� XVH� &&5�� DV� FR�UHFHSWRU� IRU� WKH� YLUXV�

HQWUDQFH�� WKH� ;�� YLUXV� +,9��� XVH� WKH� &;&5��� ZKLOH� VRPH�

VWUDQJH�YLUXVHV�NQRZQ�DV�5�;��RU�'�WURSLF��KDYH�WKH�DELOLW\�

WR� XVH� ERWK� FR�UHFHSWRUV�� $� VHULHV� RI� H[SHULPHQWV� ZHUH�

SHUIRUPHG� LQ� WKLV� DUWLFOH� WR� LPSOHPHQW� D� %D\HV� &ODVVLILHU�

WKDW� DOORZV� WR� DVVHV� GLIIHUHQW� SDWWHUQV� WKDW� HQDEOH� XV� WR�

SUHGLFW�WKH�FR�UHFHSWRU�RI�WKH�PXWDWHG�5�;���

.H\ZRUGV��&R�UHFHSWRUV��9LUXVHV��$,'6��%D\HV�&ODVVLILHU��

�� ,QWURGXFWLRQ�

7KH� EUHDVW�� OXQJ�� FRORQ� DQG� SURVWDWH� FDQFHU� DUH� WKH� PRVW�

FRPPRQ�WRGD\�>�@��EXW�WKH�IUHTXHQF\�RI�FDVHV�RI�RWKHU�W\SHV�

RI�FDQFHU�KDV�LQFUHDVHG��WKDW�LV�WKH�FDVH�RI�FDQFHU�LQ�EORRG��

O\PSKDWLF� V\VWHP�� VNLQ�� GLJHVWLYH� V\VWHP� DQG� WKH� XULQDU\�

V\VWHP�� $W� WKH� VDPH� WLPH�� ZLWK� WKH� H[LVWHQFH� RI� VHYHUDO�

W\SHV� RI� FDQFHU�� PXOWLSOH� IDFWRUV� H[LVW� WKDW� IDYRU� WKH�

DSSHDUDQFH�RI�FDQFHU�LQ�GLIIHUHQW�SDUWV�RI�WKH�KXPDQ�ERG\��

See All Chapters

Load more