Do you want to publish a course? Click here

Since the invention of Fuzzy logic and fuzzy control, the latter has been growing in spread and importance in many applications and devices in many life aspects. This maybe due to the easy use of a fuzzy control system, and for being far of math co mplications. Even if the plant model is unknown, a self-organizing fuzzy controller (SOFC) can improve the response of an already exist linear control table, or even can build a control table from scratch, by assessing current performance of the controller and adjusting the control table accordingly. This paper provides a simple article that shows how to design and use a self organizing fuzzy controller, through a simulation example using MATLAB & Simulink in which a variable torque loaded DC motor speed regulation is done. The simulation showed the ability of the controller to provide a good response and decrease speed error by a notable amount at load torque changing times. This paper can be used as textbook material for students or researchers interested in the field of adaptive control, especially self-organizing fuzzy control.
The graph-theoretical thickness (shortly thickness)of graph G, denoted by Φ(G), is the minimum number of planar subgraphs into which the graph can be decomposed, and a graph that can be drawn in the plane without any of its edges intersecting is c alled a planar graph. determining the thickness of a given graph is known to be an NP-complete problem. In this paper we introduce an application heuristic algorithm for determining the thickness. Our algorithm is based on simulated annealing optimization scheme which provide the results of the New-thick (1). We show that the simulated annealing is a efficient method to obtain good approximation for the thickness when the number vertices are at most 30 otherwise it is slower. Finally, we apply this algorithm on the heuristic algorithm Newthick and we show that the algorithm produces a good approximation and optimization solution for the thickness, and we program this algorithm with C++, and running it by laptop has RAM 2GB and CPU 2.27GHZ.
This paper presents a study on current trends in the development of cross-platform mobile applications in order to provide an overview of the actual situation of this area. The research mainly focuses on several things: first of all, it clarifies the full landscape of the cross-platform development by reviewing the most important various types of cross-platform apps, which are: Web applications, hybrid applications, interpreted applications and generated (cross-compiled) applications. Secondly, it presents basic issues for each kind of application and it performs comparative analysis to highlight the advantages and disadvantages of each type. Thirdly, it highlights the fallacies and pitfalls in various multi-platform development approaches to raise awareness about such issues and to assist in the selection of an appropriate way. In the end it presents some conclusions about cross-platform mobile app development approaches.
We aimed to distinguish between them and the other research areas such as information retrieval and data mining. we tried to determine the general structure of such systems which form a part of larger systems that have a mission to answer user querie s based on the extracted information. we reviewed the different types of these systems, used techniques with them and tried to define the current and future challenges and the consequent research problems. Finally we tried to discuss the details of the various implementations of these systems by explaining two platforms Gate and OpenCalais and comparing between their information extraction systems and discuss the results.
This Paper discusses the mathematical modeling of the source traffic using Poisson, Pareto, and Weibull distributions along with performance comparison considering these three types of traffic generators: (1) Poisson distribution for modeling the BL ( Pos BL ) and Exponential distribution for modeling the GT ( Exp GT ), the corresponding traffic generator represented by / Pos Exp BL GT ; (2) Pareto distribution for modeling the BL ( Par BL ) and Pareto distribution for modeling the GT ( Par GT ), the corresponding traffic generator represented by / Par Par BL GT ; and (3) Pareto distribution for modeling the BL ( Par BL ) and Weibull distribution for modeling the GT ( Wb GT ), the traffic generator represented by / Par Wb BL GT . Nonbursty traffic was modeled vsing Poisson distribution for burst length and exponential distribution for gap time whereas bursty traffic modeling was achieved through heavy tailed Pareto and Weibull distributions. The comparison between the three traffic generators has been verified through simulation for six sources Examining the simulation results for Allowed Cell Rate (ACR) and Memory Access which indicate the performance of the switch under / Pos Exp BL GT , / Par Par BL GT , and / Par Wb BL GT traffic generators, It is seen that the switch offers best performance under / Par Wb BL GT traffic generators.
An increasingly common requirement in distributed network environments is the need to distribute security mechanisms across several network components. This includes both cryptographic key distribution and cryptographic computation. Most proposed se curity mechanisms are based on threshold cryptography, which allows a cryptographic computation to be shared amongst network components in such a way that a threshold of active components are required for the security operation to be successfully enabled. Although there are many different proposed techniques available, we feel that the practical issues that determine both what kind of technique is selected for implementation and how it is implemented are often glossed over. In this paper we thus establish a new framework for network security architects to apply when considering adoption of such mechanisms. This framework identifies the critical design decisions that need to be taken into account and is intended to aid both design and implementation. As part of this framework we propose a taxonomy of management models and application environments. We also demonstrate the utility of the framework by applying it to a VPN environment.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا