Since the invention of Fuzzy logic and fuzzy control, the latter has been growing in spread
and importance in many applications and devices in many life aspects. This maybe due to
the easy use of a fuzzy control system, and for being far of math co
mplications. Even if the
plant model is unknown, a self-organizing fuzzy controller (SOFC) can improve the
response of an already exist linear control table, or even can build a control table from
scratch, by assessing current performance of the controller and adjusting the control table
accordingly. This paper provides a simple article that shows how to design and use a self organizing
fuzzy controller, through a simulation example using MATLAB & Simulink
in which a variable torque loaded DC motor speed regulation is done. The simulation
showed the ability of the controller to provide a good response and decrease speed error by
a notable amount at load torque changing times. This paper can be used as textbook
material for students or researchers interested in the field of adaptive control, especially
self-organizing fuzzy control.
The graph-theoretical thickness (shortly thickness)of graph G,
denoted by Φ(G), is the minimum number of planar subgraphs into
which the graph can be decomposed, and a graph that can be
drawn in the plane without any of its edges intersecting is c
alled a
planar graph. determining the thickness of a given graph is known
to be an NP-complete problem.
In this paper we introduce an application heuristic algorithm for
determining the thickness. Our algorithm is based on simulated
annealing optimization scheme which provide the results of the
New-thick (1). We show that the simulated annealing is a efficient
method to obtain good approximation for the thickness when the
number vertices are at most 30 otherwise it is slower.
Finally, we apply this algorithm on the heuristic algorithm Newthick
and we show that the algorithm produces a good
approximation and optimization solution for the thickness, and we
program this algorithm with C++, and running it by laptop has
RAM 2GB and CPU 2.27GHZ.
تحليل الخوارزميات Big-Oh notation
This paper presents a study on current trends in the development
of cross-platform mobile applications in order to provide an
overview of the actual situation of this area. The research mainly
focuses on several things: first of all, it clarifies
the full landscape
of the cross-platform development by reviewing the most
important various types of cross-platform apps, which are: Web
applications, hybrid applications, interpreted applications and
generated (cross-compiled) applications. Secondly, it presents
basic issues for each kind of application and it performs
comparative analysis to highlight the advantages and
disadvantages of each type. Thirdly, it highlights the fallacies and
pitfalls in various multi-platform development approaches to raise
awareness about such issues and to assist in the selection of an
appropriate way. In the end it presents some conclusions about
cross-platform mobile app development approaches.
We aimed to distinguish between them and the other research areas such as information retrieval and data mining. we tried to determine the general structure of such systems which form a part of larger systems that have a mission to answer user querie
s based on the extracted information. we reviewed the different types of these systems, used techniques with them and tried to define the current and future challenges and the consequent research problems.
Finally we tried to discuss the details of the various
implementations of these systems by explaining two platforms Gate and OpenCalais and comparing between their information
extraction systems and discuss the results.
This Paper discusses the mathematical modeling of the source traffic using Poisson, Pareto, and Weibull distributions along with performance comparison considering these three types of traffic generators: (1) Poisson distribution for modeling the BL
( Pos BL ) and Exponential distribution for modeling the GT ( Exp GT ), the corresponding traffic generator represented by / Pos Exp BL GT ; (2) Pareto distribution for modeling the BL ( Par BL ) and Pareto distribution for modeling the GT ( Par GT ), the corresponding traffic
generator represented by / Par Par BL GT ; and (3) Pareto distribution for modeling the BL ( Par BL ) and Weibull distribution for modeling the GT ( Wb GT ), the traffic generator represented by / Par Wb BL GT . Nonbursty traffic was modeled vsing Poisson distribution for burst length and exponential distribution for gap
time whereas bursty traffic modeling was achieved through heavy tailed Pareto and Weibull distributions.
The comparison between the three traffic generators has been verified through simulation for six sources Examining the simulation results for Allowed Cell Rate (ACR) and Memory Access which indicate the performance of the switch under / Pos Exp BL GT , / Par Par BL GT , and / Par Wb BL GT traffic generators, It is seen that the switch offers best performance under / Par Wb BL GT traffic generators.
An increasingly common requirement in distributed network environments is the need to distribute security mechanisms across several network components. This includes both cryptographic key
distribution and cryptographic computation. Most proposed se
curity mechanisms are based on threshold cryptography, which allows a cryptographic computation to be shared amongst network
components in such a way that a threshold of active components are required for the security operation to be successfully enabled. Although there are many different proposed techniques available, we feel that the practical issues that determine both what kind of technique is selected for implementation and how it is implemented are often glossed over. In this paper we thus establish a new framework for network security architects to apply when considering adoption of such mechanisms. This framework identifies the critical design decisions that need to be taken into account and is intended to aid both design and implementation. As part of this framework we propose a taxonomy of management models and application environments. We also demonstrate the utility of the framework by applying it to a VPN environment.