3220 Slices
  Title Author Publisher Format Buy Remix
Medium 9781601323255

Author Index

Hamid R. Arabnia, Leonidas Deligiannidis, Jane You, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF
Medium 9781601323262

Improved conformational search for protein-ligand docking based on optimal arrangement of multiple small search grids

Hamid R. Arabnia, Lou D'Alotto, Hiroshi Ishii, Minoru Ito, Kazuki Joe, Hiroaki Nishikawa, Georgios Sirakoulis, William Spataro, Giuseppe A. Trunfio, George A. Gravvanis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

176

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'14 |

Improved conformational search for protein-ligand docking based on optimal arrangement of multiple small search grids

Tomohiro Ban1,2 , Takashi Ishida1 , and Yutaka Akiyama1,2 of Computer Science, Graduate School of Information Science,

Tokyo Institute of Technology, W8-76, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, JAPAN

2 Education Academy of Computational Life Sciences,

Tokyo Institute of Technology, W8-93, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, JAPAN

1 Department

Abstract— The Glide protein-ligand docking algorithm often fails to find the correct binding mode. This is because the search process can easily fall into local minima when the search target area is widely distributed across the protein’s surface and the search grid is relatively large. In this research, we propose a novel method that improves the search efficiency in such cases by dividing a single, large search grid into multiple small search grids. In addition, we propose a method to minimize the number of small grids by converting the problem into a set cover problem. We present experimental results to compare the performance of the proposed approach with that of the standard protocol under two different settings.

See All Chapters
Medium 9781601322586

A Load Balancing Schema for Agent-based SPMD Applications

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

10

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

A Load Balancing Schema for Agent-based SPMD Applications

Claudio Márquez, Eduardo César, and Joan Sorribes

Computer Architecture and Operating Systems Department (CAOS),

Universitat Autònoma de Barcelona, 08193 Bellaterra, Spain

Email: claudio.marquez@caos.uab.es, {eduardo.cesar,joan.sorribes}@uab.cat

Abstract— Agent based applications are used for large simulations of complex systems. When large number of agents and complex interaction rules are required, an HPC infrastructure can be helpful for executing such simulations in a reasonable time. However, complex interaction rules usually cause workload imbalances that negatively affect the simulation time. In this paper, we propose a load balancing schema that tries to find a reduced combination of exchanges to balance the computing time of the processes. The method adjusts the computational load within a certain range of tolerance, computing the global reconfiguration of the workload using computing time, and the number of agents.

See All Chapters
Medium 9781601323279

Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

246

Int'l Conf. Security and Management | SAM'14 |

Privacy-Preserving Protocol for Reduced Cancer

Risk on Daily Physical Activity

Hiroaki Kikuchi

School of Interdisciplinary

Mathematical Sciences,

Meiji University

4-21-1 Nakano, Nakano Ku,

Tokyo, 164-8525

Shigeta Ikuji

Cyber Communications Inc.

2-14-1, Higashi-shimbashi,

Minato-ku, Tokyo, Japan

Manami Inoue

National Cancer Center,

5-1-1 Tsukiji, Chuo-ku,

Tokyo 104-0045, Japan

s.ikuji@cci.co.jp

mnminoue@gan2.res.ncc.go.jp

kikn@meiji.ac.jp

Abstract—In a field of medical information, an integration of multiple data sets will lead more accurate and effective results in comparison to the research using one data set. Medical information integration has a risk of disclosure of confidential information and hence datasets don’t have the common identification information in order to reduce possible risk factor to determine the identity of an individual.

In this paper, we will examine the condition of privacypreserving data mining for the actual cohort, studied in the

National Cancer Center. We study the necessary condition for data sets without common identification information to be integrated and generating more accurate and effective results.

See All Chapters
Medium 9781601323149

Using Linked Open Data to Enrich a Corporate Memory of Universities

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

184

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 |

Using Linked Open Data to Enrich a Corporate

Memory of Universities

Cristal Karina Galindo Durán1, R. Carolina Medina-Ramírez2 and Mihaela Juganaru-Mathieu3

1, 2

Departamento de Ingeniería Eléctrica, Universidad Autónoma Metropolitana, Unidad Iztapalapa, D.F.

México.

3

Institut H. Fayol, École Nationale Supérieure des Mines de Saint Étienne, Saint Étienne, France.

Abstract - In this work we describe a proposal for managing educational resources produced by three high level educational institutions. Our approach takes into account not only the meta informations inside educational resources but also the meta informations extracted from linked open data in the web associated to massive open online courses (MOOCs).

We visualize educational resources as a semantic corporate memory where semantic technologies and Linked Open Data approaches can improve the information integration. Text mining takes an important part in our approach for generating links between concepts and detecting some important associations.

See All Chapters
Medium 9788131804803

pragmc-11

R. K. Jangda Laxmi Publications PDF

11

FILES

11.1 THE CONCEPT

Till now we have worked with the standard input and standard output devices. In all practical situations, user doesn’t interact with the computer for control of operations as many of these are automatic or user doesn’t give data every time the program executes. For efficient operations the program should be able to store the data permanently and retrieve whenever required. This capability makes a program to work even in the absence of the operator. The area, where the program stores the information or from where, it is supposed to read the information is called a file. It is implemented as shown in the following figure:

Monitor

Output Memory

Buffer Area

User

Program Source

Code

Keyboard

Input Memory

Buffer Area

Files on Disk or

Floppy

Fig. 11.1

When program interacts with any input or output device it interacts through memory areas called Input stream or Output stream respectively.

To a C programmer, a file is a stream or a sequence of bytes. Each byte has a unique offset (distance) from the beginning of the file. A file is a logical concept, which has been implemented through a standard interface in . Physically, it might represent any

See All Chapters
Medium 9781601323279

Session - Security Education

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF
Medium 9781601323286

Self-optimization in Autonomic Computing Systems based on the Methodology of Bees Swarm Intelligence

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

120

Int'l Conf. Software Eng. Research and Practice | SERP'14 |

Self-optimization in Autonomic Computing Systems based on the

Methodology of Bees Swarm Intelligence

Anselmo Leonardo O. Nhane1 , Mark A. J. Song2

Computer Science Department, Pontificial Catholic University of Minas Gerais,Belo Horizonte, MG, Brasil

1 Computer Science Department and Information System, National Statistical Institute, Mozambique

2 Computer Science Department, Centro Universitario UNA, Belo Horizonte, Brasil

Abstract— This paper proposes a mechanism for selfoptimization in autonomic computing systems, inspired in the functioning of the bees swarm in the process of searching for food sources, exchanging information about the located sources and in the allocation of bees to such sources.

This analogy is applicable to autonomic computing systems, on which we also seek to continually optimize the system operation by monitoring and adjusting its parameters and evaluating the fitness of proposed solutions. The goal is try to meet 100 Percent of the Demand while minimizing

See All Chapters
Medium 9781601323255

Using Video Modeling in Virtual Learning Environment to Develop some of Mathematical Skills among Children with Down Syndrome in the State of Kuwait

Hamid R. Arabnia, Leonidas Deligiannidis, Jane You, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

40

Int'l Conf. Modeling, Sim. and Vis. Methods | MSV'14 |

Using Video Modeling in Virtual Learning

Environment to Develop some of Mathematical

Skills among Children with Down Syndrome in the

State of Kuwait

Muntaha S. TH. F. ALHendal

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain m.alhindal@hotmail.com

Hamdy A. Abdulaziz

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain hamdyaaa@agu.edu.bh

Ahmed M. Nouby

Distance Teaching and Training Program

Arabian Gulf University

Manama, Kingdom of Bahrain ahmedmns@agu.edu.bh

Elsayed S. Elkhamisi

Mental Disabilities and Autism program

Arabian Gulf University

Manama, Kingdom of Bahrain saidsmk@agu.edu.bh

Abstract—The objective of this research is to investigate the effect of Using Video Modeling in a Virtual Learning

Environment to Develop some of Mathematical Skills among children with Down syndrome in some primary stage schools in the State of Kuwait. The measuring tool for the research was an achievement test and interview with the parents to assess their satisfaction. The sample was of 16 children. They were aged between 7 -13 years, in the scholastic year 2012-2013. The research designed semi-experimental, pre-test/post-test control group.

See All Chapters
Medium 9781601322586

SDBP: An easy-to-use R program package for assessing reliability of estimated phylogenetic trees based on the speedy double bootstrap method

Hamid R. Arabnia; Hiroshi Ishii; Minoru Ito; Hiroaki Nishikawa; Fernando G. Tinetti; George A. Gravvanis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

143

SDBP: An easy-to-use R program package for assessing reliability of estimated phylogenetic trees based on the speedy double bootstrap method

Aizhen Ren1 , Takashi Ishida2 , and Yutaka Akiyama2

1 Department of Mathematical and Computing Science, Tokyo Institute of Technology,

W8-76, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, JAPAN

2 Department of Computer Science, Graduate School of Information Science and Engineering,

Tokyo Institute of Technology, W8-76, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, JAPAN

Abstract— Evaluating the reliability of estimated phylogenetic trees is of critical importance in the field of molecular phylogenetics, and for other endeavors that depend on accurate phylogenetic reconstruction. The bootstrap method is a well-known computational approach to assessing phylogenetic trees, and more generally for assessing the reliability of statistical models. However, it is known to be biased under certain circumstances, calling into question the accuracy of the method. Therefore, several advanced bootstrap methods have been developed to achieve higher accuracy, one of which is the speedy double bootstrap approach (sDBPmethod). In the phylogenetic tree selection problem, it has been shown that the sDBP-method has comparable accuracy to the double bootstrap approach and is much more computationally efficient. In this study, we thus develop an

See All Chapters
Medium 9781601322449

Session - Cloud Computing and Related Issues

Hamid R. Arabnia; George A. Gravvanis; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF
Medium 9781601322432

Integrating Games Into the Computer Science Curriculum: From General Education to the Graduate Level

Hamid R. Arabnia; Azita Bahrami; Victor A. Clincy; Leonidas Deligiannidis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

321

INTEGRATING GAMES INTO THE COMPUTER

SCIENCE CURRICULUM: FROM GENERAL

EDUCATION TO THE GRADUATE LEVEL

Robert E. Marmelstein, Eun-Joo Lee

Department of Computer Science,

East Stroudsburg University

East Stroudsburg, Pennsylvania, USA

ABSTRACT - The use of game-based projects in the computer science curriculum has the potential to make the teaching of numerous computing courses more effective and interesting. In this paper, approaches are presented for using computer games to teach computer science at different educational stages: from general education through the graduate level. In each case, we examine how the game project supports the goals of the course. Potential pitfalls and lessons learned from these teaching experiences are also addressed.

x

KEY WORDS - Computer Games, Artificial Intelligence,

Computer Science Education and Curriculum

x

I.

Why Teach Computer Games?

For many of us, teaching computer game programming is not just a pedagogical exercise—it’s also personal because we love recreating the games we play. Likewise, many students become motivated to become computer scientist as a result of the computer games they play as children and teenagers. Beyond the challenge of playing the game, the underlying technology that makes these games work fascinates many students. In short, playing these games provides the motivation to learn how to program them. While most students may never become professional game programmers, it’s important for computer science educators to appreciate the power of the computer game as a mechanism for teaching many facets of the discipline. The following bullets illustrate the rationale for this assertion: x x

See All Chapters
Medium 9789381159064

Ch_1_F

Arijit Saha; Nilotpal Manna Laxmi Publications PDF

1

I NTRODUC TION

TO

1.1

OPTOELECTRONICS

INTRODUCTION

The interaction of light and optical processes with electronic processes is dealt within a separate category known as �Optoelectronics�. At the same time the devices in which such interactions take place, are called optoelectronic devices. Generally the optoelectronic devices are made with semiconductors. For the development of microelectronics the elemental semiconductors like Silicon

(Si) and Germanium (Ge) have been extensively used. But for the development of optoelectronic devices these elemental semiconductors were not at all efficient. The question arises why? To understand this, let us have a short detour on basic of solid state device theory.

According to quantum theory, electrons are located near the minimum of conduction band whereas holes are located near the maximum of valence band. Figure 1.1(a) and Fig. 1.1(b) represent variations of electron energy with momentum. In figure 1.1(a) the minima of conduction band and maxima of valence band does not occur at same momentum, thus forming indirect bandgap. On the other hand, the maxima of valence band and minima of conduction band occur at same momentum at Fig. 1.1(b) forming direct bandgap. The electrons of the conduction band have the tendency to recombine with holes of valence band and in this process, energy is released in the form of electromagnetic waves of different wavelengths.

See All Chapters
Medium 9781683921998

Scientific Computing and Engineerings

Edited by Hamid R. Arabnia, Michael R. Grimaila, Douglas D. Hodson CSREA Press PDF

Int'l Conf. Scientific Computing | CSC'17 |

97

SESSION

SCIENTIFIC COMPUTING AND ENGINEERING

Chair(s)

TBA

ISBN: 1-60132-452-9, CSREA Press ©

98

Int'l Conf. Scientific Computing | CSC'17 |

ISBN: 1-60132-452-9, CSREA Press ©

Int'l Conf. Scientific Computing | CSC'17 |

99

Application of Gain Scheduling Programming to a 6-Axis

Articulated Robot with Fuzzy Logic using LabVIEW®

Seok Jeong Kang1, Seung Kyu Park1, Won Jee Chung1, Yoo Seong Jeong1, Sung Hun Noe2

1

School of Mechatronics, Changwon National University, Changwon, The Republic of Korea

2

Youngchang Robo-tech, Gimhae, The Republic of Korea

Abstract –

As demand for industrial robots and AGVs (Automated

Guided Vehicles) increases, higher performance is also required. The existing PID control works well with linear systems, but proves ineffective for nonlinear or high-order systems. In contrast, as part of the intelligent control system, fuzzy controllers are a direct control method leveraging human knowledge and experience and then easily controlling highly nonlinear, uncertain and complex systems.

See All Chapters
Medium 9781601323200

Use of Artificial Neural Networks for Completing Data Series Streamflow Hydrologic

CSREA 2003 CSREA Press PDF

300

Int'l Conf. Artificial Intelligence | ICAI'14 |

Use of Artificial Neural Networks for Completing Data

Series Streamflow Hydrologic

Sérgio Luis Yoneda; Rogério Andrade Flauzino; Lucas Assis de Moraes; Marcel Ayres de Araújo

Department of Electrical and Computing Engineering, University of São Paulo – USP, São Carlos, Brazil

Abstract—Knowing the hydrological behavior of hydroelectric reservoirs affluent rivers is one of the main tools for managing the production of electricity. To identify the streamflow values of a river is extremely important for planning the operation and expansion of hydroelectric systems. However, in many cases there are insufficient or incomplete data for the specific location of a particular river. Concerning this situation, the research exposed in this paper applies an Artificial Neural Network to complete the missing data of a hydrological streamflow time series. Through comparison between the results obtained by correlational techniques and the proposed methodology, it is concluded that the later can complete the series in a more realistic way and with great precision.

See All Chapters

Load more