Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    1-12
Measures: 
  • Citations: 

    0
  • Views: 

    316
  • Downloads: 

    90
Abstract: 

Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered. Which means that each node itself can decide whether to cooperate with its neighbor or not and performs something that benefits it. We have used Alternative Prisoner's Dilemma game which is one of the classic games in the field of game theory, to model node's behavior in a nontraditional network. Then, by providing an approach based on Learning Automata, we've tried to encourage the nodes to cooperate with each other.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 316

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 90 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    13-29
Measures: 
  • Citations: 

    0
  • Views: 

    480
  • Downloads: 

    133
Abstract: 

Task graph scheduling is a multi-objective optimization and NP-hard problem. In this paper a new algorithm on homogeneous multiprocessors systems is proposed. Basically, scheduling algorithms are targeted to balance the two parameters of time and energy consumption. These two parameters are up to a certain limit in contrast with each other and improvement of one causes reduction in the other one. The problem is to achieve the trade-off between these two parameters. Pre-scheduling algorithms are mainly aimed at modifying the structure of task graph to gain optimal scheduling.In the proposed algorithm the suitable number of processors for scheduling the task graph is computed. The idea of Nash equilibrium is mainly applied to compute the appropriate number of processors in such a way that the idle time of the processors is reduced while their processing power is increased. Also, considering the communication costs and interdependencies, the tasks are merged as their earliest start time is reduced. In this way, the length of the critical path is reduced while the degree of parallelism is increased and ultimately the completion time is reduced. Our experimental result on a number of known benchmark graphs demonstrates the effect of our proposed algorithm.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 480

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 133 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 16
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    31-38
Measures: 
  • Citations: 

    0
  • Views: 

    410
  • Downloads: 

    82
Abstract: 

Active Queue Management (AQM) plays an important role in the Internet congestion control. It tries to enhance congestion control, and to achieve tradeoff between bottleneck utilization and delay. Random Early Detection (RED) is the most popular active queue management algorithm that has been implemented in the in Internet routers and is trying to supply low delay and low packet loss. RED algorithm uses only the average queue length as a congestion meter to trigger packet dropping or packet marking as a congestion feedback. Since the average queue length considers only long–term behavior of any queue, this approach fails to see instantaneous changes of the queue length and hence its reaction is not fast enough. This paperincludes another meter i.e. queue length growth velocity to measure congestion level in the router. This leads to fast reaction to the congestion and hence improves the network performance. Simulation results show that the proposed algorithm outperforms RED algorithm in terms of number of dropped packets and bottleneck utilization.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 410

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 82 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 4
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    39-53
Measures: 
  • Citations: 

    0
  • Views: 

    339
  • Downloads: 

    111
Abstract: 

This paper presents a new Modified Shuffled Frog Leaping Algorithm (MSFLA) applied to design simultaneous coordinated tuning of damping controllers to damp the power system low frequency oscillations. For this, a new frog leaping rule is proposed to improve the local exploration and performance of the original SFLA and the genetic mutation operator is employed for new frog generation instead of random frog generation to improve the performance and quicker algorithm convergence. In order to verify the effectiveness of the proposed method, a 2-area-4-machine and a 5-area-16-machine power system are considered which two power system stabilizers (PSSs) are designed coordinately for the first system and one PSS for a generator and one supplementary controller for a Static Var Compensator (SVC) are designed simultaneously for the second system. To show the effectiveness of the designed controllers, study systems are tested under two different operating conditions and simulation studies are presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 339

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 111 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 11
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    55-63
Measures: 
  • Citations: 

    0
  • Views: 

    325
  • Downloads: 

    104
Abstract: 

Fuzzy groups and fuzzy theory have a lot of applications in several sciences such as mathematics, computer science, computer and electrical engineering. Hence, counting the number of fuzzy subgroups of finite groups to classify them is an important issue in fuzzy theory. The Main goal of this paper is to give an explicit formula for the number of fuzzy subgroups of a finite cyclic group G=Zp1×Zp2×Zp3×…×Zpk, where p1, p2, …, pk are distinct prime numbers. We introduce a very simple recursive formula to count the number of subgroups of G.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 325

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 104 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 2
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    65-80
Measures: 
  • Citations: 

    0
  • Views: 

    376
  • Downloads: 

    96
Abstract: 

Intrusion detection in wireless networks has been a challenging research problem in network security for more than half a century. This paper presents a novel intrusion detection method based on Received Signal Strength Acceptance Test (RSSAT) to improve the IDS capabilities in anomaly-based Host-based Intrusion Detection Systems (HIDS). The new system can identify suspicious behaviors detecting anomalies in the received signal strength from the access points. Several scenarios are implemented in Omnet++ environment to evaluate the performance of the proposed scheme. A test criterion is used to improve accuracy in detecting forged signal powers and at the same time to reduce number of the false positives i.e. number of false attack alerts resulted from the legitimate signal powers.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 376

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 96 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 10
Author(s): 

NIKNAFAS ALIAKBAR

Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    81-88
Measures: 
  • Citations: 

    0
  • Views: 

    290
  • Downloads: 

    161
Abstract: 

Reversible logic circuits have found emerging attentions in nanotechnology, optical computing, quantum computing and low power design. A programmable logic array (PLA) is a universal circuit which is used to implement combinational logic circuits. The main part of a PLA is its AND array. In this study we propose two types of optimized reversible programmable logic array (RPLA) circuits. The first type is based on a “2-to-4” AND array, and is proposed for the first time. The second type is based on a “3-to-8” AND array. For each type, we bring some different designs. These circuits are compared with the existing counterparts in terms of number of constant inputs and garbage outputs, delay and the quantum cost and are shown that all parameters in proposed circuits are improved.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 290

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 161 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 7
Issue Info: 
  • Year: 

    2013
  • Volume: 

    4
  • Issue: 

    1 (11)
  • Pages: 

    89-100
Measures: 
  • Citations: 

    1
  • Views: 

    555
  • Downloads: 

    214
Abstract: 

The capacitated clustering problem (CCP) is one of the most important combinational optimization problems that nowadays has many real applications in industrial and service problems. In the CCP, a given n nodes with known demands must be partitioned into k distinct clusters in which each cluster is detailed by a node acting as a cluster center of this cluster. The objective is to minimize the sum of distances from all cluster centers to all other nodes in their cluster, such that the sum of the corresponding node weights does not exceed a fixed capacity and every node is allocated to exactly one cluster. This paper presents a hybrid three-phase meta-heuristic algorithm (HTMA) including sweep algorithm (SA), ant colony optimization (ACO) and two local searches for the CCP. At the first step, a feasible solution of CCP is produced by the SA, and at the second step, the ACO, insert and swap moves are used to improve solutions. Extensive computational tests on standard instances from the literature confirm the effectiveness of the presented approach compared to other meta-heuristic algorithms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 555

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 214 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 16
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button