3225 Chapters
  Title Author Publisher Format Buy Remix
Medium 9781601322586

History-Aware Adaptive Routing Algorithm For Energy Saving in Interconnection Networks

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

463

History-Aware Adaptive Routing Algorithm For Energy Saving in

Interconnection Networks

Hai Nguyen, Gonzalo Zarza, Daniel Franco and Emilio Luque

Computer Architecture & Operating Systems Department

Universitat Autònoma de Barcelona,08193 Bellaterra, Spain hai.nguyen@caos.uab.es, gonzalo.zarza@uab.es, daniel.franco@uab.es, emilio.luque@uab.es

Abstract— The increase of link speeds in the interconnection networks is evident both inside and outside of a datacenter. Thus it contributes an increasing portion of the power budget of the interconnection system. Link power management has been receiving more attention and many mechanisms were proposed. The emerging bit-serial link technology allows the links to work with different numbers of lanes & speeds. When the traffic load is slight, links are put in low-speed mode and consume less energy. However, links working in the low speed mode result in the increase in serialization latency. We propose a routing algorithm that takes into account the history usage of the links to focus network traffic in a small subset of high-speed links. It keeps high-speed links busier and leaves low-speed links with more idle time. Thus the mechanism saves energy and reduces the incurred serialization latency.

See All Chapters
Medium 9781601323279

An Interoperability Framework for Security Policy Languages

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |

283

An Interoperability Framework for Security Policy Languages

Amir Aryanpour, Edmond Parkash, University of Bedfordshire, UK

Andrew Harmel-Law , Scott Davies , Technology Service, Capgemini UK

Abstract— In today’s economy, whilst corporations are looking to control costs and still driving productivity, the cost of acquiring and maintaining a company’s software is under the spotlight. IT departments are under pressure to deliver more services, in shorter amounts of time, and with ever decreasing budgets; hence, IT departments are willing to invest in and choose technologies that provide more business value at a lower cost. Taking these facts into account, and bearing in mind that a number of security policy languages available and the majority of scenarios covered by them are similar, this paper proposes a framework that understands security domains and provides users with an abstract security policy language, which can be translated into the desired policy language as per framework’s configuration.

See All Chapters
Medium 9781601323200

SPSO-TVAC Congestion Management in a Practical Electricity Market Based Generator Sensitivity

CSREA 2003 CSREA Press PDF

Int'l Conf. Artificial Intelligence | ICAI'14 |

173

SPSO-TVAC Congestion Management in a Practical

Electricity Market Based Generator Sensitivity

H. A. Shayanfar*

H. Shayeghi

A. Ghasemi

Department of Electrical Engineering

College of Technical and Engineering

South Tehran Branch

Islamic Azad University, Tehran, Iran

Technical Engineering Department

Technical Engineering Department

University of Mohaghegh Ardabili

University of Mohaghegh Ardabili

Ardabil, Iran

Ardabil, Iran

hashayanfar@gmail.com, hshayeghi@gmail.com, ghasemi.agm@gmail.com

Abstract- Congestion management is one of the major tasks performed by system operators to ensure the operation of transmission system within operating limits. In the emerging electric power market, the congestion management becomes extremely important and it can impose a barrier to the electricity trading. This paper presents a new method of Speed

Particle Swarm Optimization with Time-Varying Acceleration

Coefficients (SPSO-TVAC)-based Congestion Management

(CM) by optimal rescheduling of active powers of generators.

See All Chapters
Medium 9781601322548

MRI Abdominal Organ Tissue Identification using Statistical Distance in Color Space

Hamid R. Arabnia; Leonidas Deligiannidis; Joan Lu; Fernando G. Tinetti; Jane You; George Jandieri; Gerald Schaefer; Ashu M. G. Solo; and Vladimir Volkov (Editors) Mercury Learning and Information PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'13 |

MRI Abdominal Organ Tissue Identification using Statistical Distance in Color Space

Arend Castelein1, Terrance Weeden2, Xiuping Tao3, H. Keith Brown2, Yong Wei1

1. Department of Computer Science, University of North Georgia, Dahlonega, GA 30597, USA

2. Department of Clinical Anatomy, Philadelphia College of Osteopathic Medicine-Georgia, Suwanee, GA

30024, USA

3. Department of Chemistry, Winston Salem State University, Winston Salem, NC 27110, USA

Submitted to: IPCV'13: The 2013 International Conference on Image Processing,

Computer Vision and Pattern Recognition

Abstract

Magnetic resonance imaging (MRI) is a powerful medical imaging technique to provide detailed images of soft abdomen organ tissues. An automatic organ tissue identification algorithm is useful for physicians to perform initial reading and interpret MRI images. The algorithm presented in the paper uses the distance in color space between centers of organ tissues to identify abdominal organs in MRI images. Experimental results show the algorithm is effective in the

See All Chapters
Medium 9781601322340

HapMaker: Synthetic Haplotype Generator

Hamid R. Arabnia; Quoc-Nam Tran (Editors) Mercury Learning and Information PDF

370

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'13 |

HapMaker: Synthetic Haplotype Generator

N. Okuda1 , P. Bodily1 , J. Price1 , M. Clement1 , and Q. Snell1

1 Computer Science Department, Brigham Young University, Provo, UT, U.S.A.

Abstract— HapMaker is a simple program that generates a variant DNA sequence based on an input DNA sequence.

Its purpose is to aid in the investigation of algorithms for heterozygous genome assemblers. In order to verify that HapMaker could accomplish its goal, we designed an experiment to test its accuracy in simulating haplotypes. We found that HapMaker meets our standard of accuracy in two of the three experiments. Where HapMaker seems to have failed to meet our standard of accuracy, we find insights not only in how to improve HapMaker but also in how different genome assemblers behave when given DNA data sampled from a simulated heterozygous homologous pair.

The HapMaker source code is available at https:// github.com/nOkuda/hapmaker.

that such data will give software developers the information they need to validate their heterozygous genome assemblers.

See All Chapters
Medium 9781683921837

Poster and Position Papers

Edited by Ken Ferens, Hamid R. Arabnia, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. on Advances on Applied Cognitive Computing | ACC'17 |

SESSION

POSTER AND POSITION PAPERS

Chair(s)

Dr. Ken Ferens

ISBN: 1-60132-449-9, CSREA Press ©

71

72

Int'l Conf. on Advances on Applied Cognitive Computing | ACC'17 |

ISBN: 1-60132-449-9, CSREA Press ©

Int'l Conf. on Advances on Applied Cognitive Computing | ACC'17 |

73

Improving cognitively impaired people by innovative technologies

L. Spiru1,2, I. Turcu1, M. Marzan1, S. A. Sterea1,2

Memory Clinic and Rehabilitation Centre, Ana Aslan International Foundation, Bucharest, Romania

2

Elias University Clinic of Geriatrics-Gerontology and Old Age Psychiatry, Carol Davila University of

Medicine and Pharmacy, Bucharest, Romania

1

Abstract - There is a constant concern for innovative solutions able to meet the special motor and/or cognitive needs of old persons. Since 2006, the AAIF’s R&D department is involved in this research area as medical partner and end-user organization. For testing, evaluating and validating advanced-technology-based platform, AAIF has run the local field trials with primary end-users (PEUs)persons with Mild-to-Moderate Dementia (Confidence project), Parkinson Disease (Live Well) or elderly with compensated motor and/or sensory disabilities (Senior TV,

See All Chapters
Medium 9781601322500

Towards Spectrum Resource Management in Cognitive Radio Networks via Intrusion Detection and Response Model

Hamid R. Arabnia; Victor A. Clincy; Leonidas Deligiannidis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

14

Int'l Conf. Wireless Networks | ICWN'13 |

Towards Spectrum Resource Management in Cognitive Radio Networks via

Intrusion Detection and Response Model

Obeten O. Ekabua

Department of Computer Science

North-West University, Mafikeng Campus,

Private Bag X2046, Mmabatho 2735, South Africa

(obeten.ekabuao@nwu.ac.za)

Abstract: Cognitive Radio Network (CRNs) was innovated as a means to solve the problem of spectrum scarcity. CRNs are able to detect and utilize vacant spectrum by means of dynamic spectrum access (DSS) without interfering to the primary licensed users. This has led to the increase in vulnerabilities and threats to the

CRNs. The steady increase in attacks against cognitive radio network and its resources has caused a necessity to protect to these valuable assets. Among existing problems in CRNs resource management is the issues of security and privacy. CRNs are wireless in nature, they face all common security threats found in the traditional wireless networks and other new security threats and challenges that have arisen due to their unique cognitive (selfconfiguration, self-healing, self-optimization, and selfprotection) characteristics. Traditional security measures would be inadequate to combat these challenges. There is a need to advance and improve the security standard and level for cognitive radio networks. Therefore, this research paper proposes an intrusion detection and response model (IDRM) to enhance and advance security for spectrum resource management in cognitive radio networks. IDRM monitors all the activities in order to detect the intrusion. It searches for security violation incidents, recognizes unauthorized accesses, and identifies information leakages. Unfortunately, system administrators neither can keep up with the pace that an intrusion detection system is delivering responses or alerts, nor can they react within adequate time limits.

See All Chapters
Medium 9781601323101

Estimating the Visit and Content Association of Websites with their Weblogs

Hamid R. Arabnia, Mary Q. Yang, George Jandieri, James J. (Jong Hyuk) Park, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. on Advances in Big Data Analytics | ABDA'14 |

63

Estimating the Visit and Content Association of

Websites with their Weblogs

Hyun-Ho Lee,

Yeonsung University

South Korea, hhlee@yeonsung.ac.kr

Jong-Min Lee,

Hanyang University

South Korea, jmlee@visionlab.or.kr

Abstract—Recently, big data has been spotlighted as an important emerging issue. As a case study of big data analysis, this paper estimates websites by analyzing their weblogs and content metadatabase (meta-DB). As one of the representative types of big data, a weblog keeps track of users’ click streams. The analysis goal is to derive the possible integration (or cooperative utilization) implications of websites by measuring their association aspects, such as content association and visit association. In particular, while estimating websites through the available practical records of their users, in order to extract statistical information, the proposed technique will incorporate data mining (association rule) methods to extract statistical information.

See All Chapters
Medium 9781601323125

Session - Posters

Hamid R. Arabnia, George A. Gravvanis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF
Medium 9781601322593

SSDP Covert Channel

Kevin Daimi; Hamid R. Arabnia; Michael R. Grimaila; Kathy Liszka; George Markowsky; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

460

Int'l Conf. Security and Management | SAM'13 |

SSDP Covert Channel

Wesly Delva and Daryl Johnson

Department of Computing Security

Rochester Institute of Technology

Rochester, New York USA wxd5947@rit.eu, daryl.johnson@rit.edu

Abstract—A network covert channel provides a means of confidentiality with the intent to allow two nodes to communicate on a network with stealth. Simple Service Discovery Protocol is an Internet Protocol Suite that is capable of both discovering and advertising network services. This paper describes a method of using this discovery protocol as a means of sending covert messages between two nodes through steganography.

I. I NTRODUCTION

OK would contain the entity-header fields that correspond to the request.

The purpose of SSDP was to build a protocol so that computer users would have an easy, quick, and dynamic way to discover services or resources without any prior knowledge.

Therefore, SSDP only performs discovery and leaves any service description and/or negotiation to a higher layer servicespecific protocol [1].

See All Chapters
Medium 9781601324191

Simulations, Numerical Methods, and Applications

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti (Editors) CSREA Press PDF

Int'l Conf. Modeling, Sim. and Vis. Methods | MSV'15 |

55

Towards an Agent-Based Simulation of

Predators Developing a Search Image

Chris Scogings

Computer Science

Massey University - Albany Campus

North Shore 102-904, Auckland

New Zealand email: c.scogings@massey.ac.nz

ABSTRACT

Predators build a “search image” to rapidly detect common prey and exclude other possibilities. Prey respond with “apostatic selection” and produce mutations with previously unknown color variations. This process has been observed since the 1960s but is difficult to validate with real populations.

The use of agent-based simulations presents the opportunity to explore specific changes to predators and/or prey in a controlled environment using artificial animals. This article investigates the effects on predator and prey populations of specific changes in behaviour and finds that search images may actually be detrimental to predator success and that prey color mutation may benefit the overall predator population.

See All Chapters
Medium 9781601322388

A combined algorithm for analyzing structural controllability and observability of complex networks

Hamid R. Arabnia; George A. Gravvanis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

172

Int'l Conf. Scientific Computing | CSC'13 |

A combined algorithm for analyzing structural controllability and observability of complex networks

Luis Úbeda1,2 , Carlos Herrera1,2,3 , Iker Barriales1,2 , Pedro J. Zufiria1,2 , and Mariluz Congosto4

1 Depto. Matemática Aplicada a las Tecnologías de la Información, ETSI Telecomunicación,

Universidad Politécnica de Madrid (UPM), Spain

2 Cátedra Orange. ETSI Telecomunicación, Universidad Politécnica de Madrid (UPM), Spain

3 Dept. Civil and Environmental Engineering. Massachusetts Institute of Technology, USA

4 Departamento de Telemática. Universidad Carlos III de Madrid, Spain

E-mail: lubeme23@gmail.com, chyague@gmail.com, ibarriales@ono.com, pedro.zufiria@upm.es, mariluz.congosto@gmail.com

Abstract— In this paper a combined algorithm for analyzing structural controllability and observability of complex networks is presented. The algorithm addresses the two fundamental properties to guarantee structural controllability of a system: the absence of dilations and the accessibility of all nodes. The first problem is reformulated as a Maximum

See All Chapters
Medium 9781601323200

A Pong Game Agent Using the Neuronal Network Model

CSREA 2003 CSREA Press PDF

200

Int'l Conf. Artificial Intelligence | ICAI'14 |

A Pong Game Agent Using the Neuronal Network Model

Robert Hercus and Hong-Shim Kong

Neuramatix Sdn. Bhd., No. 27-9 Level 9, Signature Office Bandar Mid-Valley,

59200 Kuala Lumpur, Malaysia

Abstract - This paper presents an alternative approach to intelligent agent development in video games through the use of the Neuronal Network Model (NNM). The NNM is an integrated network of multiple networks of neurons capable of learning from and adapting to its environment. The pong game is simulated to evaluate the feasibility of implementing the NNM as an agent controller. The goal of the controller is to place the agent which is the paddle, in the correct position to return the pong ball. The learning process of the model is based solely on its failures in predicting the correct motor actions to return the pong ball. Experimental results show that the NNM is capable of acting as an intelligent agent controller.

Keywords: agent, control, game, neuronal network, pong

See All Chapters
Medium 9781601322418

Session - Micro-Controllers And Embedded Systems + Network On Chip Systems And Applications

Hamid R. Arabnia; Leonidas Deligiannidis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF
Medium 9781601322470

Intelligent Agent-based Framework for Project Integration Management

Hamid R. Arabnia; David de la Fuente; Elena B. Kozerenko; Peter M. LaMonica; Raymond A. Liuzzi; Todd Waskiewicz; George Jandieri; Ashu M. G. Solo; Ivan Nunes da Silva; Fernando G. Tinetti; and Fadi Thabtah (Editors) Mercury Learning and Information PDF

56

Int'l Conf. Artificial Intelligence | ICAI'13 |

Intelligent Agent-based Framework for Project

Integration Management

Ogechikanma Linda Ihekweaba1, Chukwugoziem Ihekweaba1, Prof. H.C Inyiama2

1

Computer Engineering Dept. Michael Okpara University of Agriculture, Umudike, Abia State Nigeria.

2

Department of Computer Electronics, Nnamadi Azikiwe University, Awka, Nigeria.

Abstract - The dynamism required in the continuous aggregation of the results of all subsidiary planning activities in a project into a consistent document(the project plan), the effective and progressive elaboration of such a document with updates ,the continuous communication requirement during project execution activities coupled with the computational effort required for various ongoing performance evaluation analysis and the constant coordination of changes across the entire elements of a project is definitely overwhelming to the project manager using conventional Project Management

Information System. This paper proposes the exploitation of the dynamism of intelligent agents to support project integration management, a core knowledge area of project management. Using the Belief-Desire-Intention

See All Chapters

Load more