<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>vol. 1, nº 5, june 2012</title>
<link>https://reunir.unir.net/handle/123456789/9559</link>
<description/>
<pubDate>Fri, 08 Nov 2024 20:43:52 GMT</pubDate>
<dc:date>2024-11-08T20:43:52Z</dc:date>
<item>
<title>Performance comparison of hierarchical checkpoint protocols grid computing</title>
<link>https://reunir.unir.net/handle/123456789/9599</link>
<description>Performance comparison of hierarchical checkpoint protocols grid computing
Massata NDIAYE, Ndeye; SENS, Pierre; THIARE, Ousmane
Grid infrastructure is a large set of nodes&#13;
geographically distributed and connected by a communication. In&#13;
this context, fault tolerance is a necessity imposed by the&#13;
distribution that poses a number of problems related to the&#13;
heterogeneity of hardware, operating systems, networks,&#13;
middleware, applications, the dynamic resource, the scalability,&#13;
the lack of common memory, the lack of a common clock, the&#13;
asynchronous communication between processes. To improve the&#13;
robustness of supercomputing applications in the presence of&#13;
failures, many techniques have been developed to provide&#13;
resistance to these faults of the system. Fault tolerance is intended&#13;
to allow the system to provide service as specified in spite of&#13;
occurrences of faults. It appears as an indispensable element in&#13;
distributed systems. To meet this need, several techniques have&#13;
been proposed in the literature. We will study the protocols based&#13;
on rollback recovery. These protocols are classified into two&#13;
categories: coordinated checkpointing and rollback protocols and&#13;
log-based independent checkpointing protocols or message&#13;
logging protocols. However, the performance of a protocol&#13;
depends on the characteristics of the system, network and&#13;
applications running. Faced with the constraints of large-scale&#13;
environments, many of algorithms of the literature showed&#13;
inadequate. Given an application environment and a system, it is&#13;
not easy to identify the recovery protocol that is most appropriate&#13;
for a cluster or hierarchical environment, like grid computing.&#13;
While some protocols have been used successfully in small scale,&#13;
they are not suitable for use in large scale. Hence there is a need&#13;
to implement these protocols in a hierarchical fashion to compare&#13;
their performance in grid computing. In this paper, we propose&#13;
hierarchical version of four well-known protocols. We have&#13;
implemented and compare the performance of these protocols in&#13;
clusters and grid computing using the Omnet++ simulator.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-12-03T08:35:21Z
No. of bitstreams: 1
IJIMAI20121_5_6_0.pdf: 501573 bytes, checksum: 50f397ad789c8fa82cf3afd94c7cb7e2 (MD5); Made available in DSpace on 2019-12-03T08:35:21Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_6_0.pdf: 501573 bytes, checksum: 50f397ad789c8fa82cf3afd94c7cb7e2 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9599</guid>
</item>
<item>
<title>Approach for solving multimodal problems using Genetic Algorithms with Grouped into Species optimized with Predator-Prey</title>
<link>https://reunir.unir.net/handle/123456789/9598</link>
<description>Approach for solving multimodal problems using Genetic Algorithms with Grouped into Species optimized with Predator-Prey
Seoane, Pablo; Gestal, Marcos; Dorado, Julián
Over recent years, Genetic Algorithms have proven to be an appropriate tool for solving certain problems. However, it does not matter if the search space has several valid solutions, as their classic approach is insufficient. To this end, the idea of dividing the individuals into species has been successfully raised. However, this solution is not free of drawbacks, such as the emergence of redundant species, overlapping or performance degradation by significantly increasing the number of individuals to be evaluated. This paper presents the implementation of a method based on the predator-prey technique, with the aim of providing a solution to the problem, as well as a number of examples to prove its effectiveness.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-12-03T08:22:09Z
No. of bitstreams: 1
ijimai20121_5_1_pdf_24294.pdf: 440636 bytes, checksum: 63a237a6b427c31f75ea72be91e7d96a (MD5); Made available in DSpace on 2019-12-03T08:22:09Z (GMT). No. of bitstreams: 1
ijimai20121_5_1_pdf_24294.pdf: 440636 bytes, checksum: 63a237a6b427c31f75ea72be91e7d96a (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9598</guid>
</item>
<item>
<title>Recognizing Human Activities Userindependently on Smartphones Based on Accelerometer Data</title>
<link>https://reunir.unir.net/handle/123456789/9597</link>
<description>Recognizing Human Activities Userindependently on Smartphones Based on Accelerometer Data
Siirtola, Pekka; Röning, Juha
Real-time human activity recognition on a mobile phone is presented in this article. Unlike in most other studies, not only the data were collected using the accelerometers of a smartphone, but also models were implemented to the phone and the whole classification process (preprocessing, feature extraction and classification) was done on the device. The system is trained using phone orientation independent features to recognize five everyday activities: walking, running, cycling, driving a car and sitting/standing while the phone is in the pocket of the subject's trousers. Two classifiers were compared, knn (k nearest neighbors) and QDA (quadratic discriminant analysis). The models for real-time activity recognition were trained offline using a data set collected from eight subjects and these offline results were compared to real-time recognition rates, which are obtained by implementing models to mobile activity recognition application which currently supports two operating systems: Symbian^3 and Android. The results show that the presented method is light and, therefore, suitable for be used in real-time recognition. In addition, the recognition rates on the smartphones were encouraging, in fact, the recognition accuracies obtained are approximately as high as offline recognition rates. Also, the results show that the method presented is not an operating system dependent.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-12-02T13:43:47Z
No. of bitstreams: 1
IJIMAI20121_5_5.pdf: 384789 bytes, checksum: 3fc2de3c84520a4808e6218a437f750f (MD5); Made available in DSpace on 2019-12-02T13:43:47Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_5.pdf: 384789 bytes, checksum: 3fc2de3c84520a4808e6218a437f750f (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9597</guid>
</item>
<item>
<title>Wireless Sensor Networks and Real-Time Locating Systems to Fight against Maritime Piracy</title>
<link>https://reunir.unir.net/handle/123456789/9577</link>
<description>Wireless Sensor Networks and Real-Time Locating Systems to Fight against Maritime Piracy
García, Óscar; Alonso, Ricardo S.; Tapia, Dante I.; Guevara, Fabio
There is a wide range of military and civil applications where Wireless Sensor Networks (WSNs) and Multi-Agent Systems (MASs) can be used for providing context-awareness for troops and special corps. On the one hand, WSNs comprise an ideal technology to develop Real-Time Locating Systems (RTLSs) aimed at indoor environments, where existing global navigation satellite systems do not work properly. On the other hand, agent-based architectures allow building autonomous and robust systems that are capable of working on highly dynamic scenarios. This paper presents two piracy scenarios where the n-Core platform can be applied. n-Core is a hardware and software platform intended for developing and deploying easily and quickly a wide variety of WSNs applications based on the ZigBee standard. In the first scenario a RTLS is deployed to support boarding and rescue operations. In the second scenario a multi-agent system is proposed to detect the unloading of illegal traffic of merchandise at ports.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-11-25T13:39:30Z
No. of bitstreams: 1
IJIMAI20121_5_2.pdf: 512417 bytes, checksum: c12a838275bc55d6e9a20090acb3cc36 (MD5); Made available in DSpace on 2019-11-25T13:39:30Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_2.pdf: 512417 bytes, checksum: c12a838275bc55d6e9a20090acb3cc36 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9577</guid>
</item>
<item>
<title>Evaluation of Shelf Life of Processed Cheese by Implementing Neural Computing Models</title>
<link>https://reunir.unir.net/handle/123456789/9576</link>
<description>Evaluation of Shelf Life of Processed Cheese by Implementing Neural Computing Models
Goyal, Sumit; Kumar Goyal, Gyanendra
For predicting the shelf life of processed cheese stored at 7-8 C, Elman single and multilayer models were developed and compared. The input variables used for developing the models were soluble nitrogen, pH; standard plate count, Yeast &amp; mould count, and spore count, while output variable was sensory score. Mean Square Error, Root Mean Square Error, Coefficient of Determination and Nash - Sutcliffo Coefficient were applied in order to compare the prediction ability of the developed models. The Elman models got simulated very well and showed excellent agreement between the experimental data and the predicted values, suggesting that the Elman models can be used for predicting the shelf life of processed cheese.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-11-25T13:30:01Z
No. of bitstreams: 1
IJIMAI20121_5_8.pdf: 354637 bytes, checksum: a0f05c6bfb57dea450dca1a5de6797de (MD5); Made available in DSpace on 2019-11-25T13:30:01Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_8.pdf: 354637 bytes, checksum: a0f05c6bfb57dea450dca1a5de6797de (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9576</guid>
</item>
<item>
<title>Improved Differential Evolution Algorithm for Parameter Estimation to Improve the Production of Biochemical Pathway</title>
<link>https://reunir.unir.net/handle/123456789/9575</link>
<description>Improved Differential Evolution Algorithm for Parameter Estimation to Improve the Production of Biochemical Pathway
Khim Chong, Chuii; Saberi Mohamad, Mohd; Deris, Safaai; Shahir Shamsir, Mohd; Wen Choon, Yee; En Chai, Lian
This paper introduces an improved Differential Evolution algorithm (IDE) which aims at improving its performance in estimating the relevant parameters for metabolic pathway data to simulate glycolysis pathway for yeast. Metabolic pathway data are expected to be of significant help in the development of efficient tools in kinetic modeling and parameter estimation platforms. Many computation algorithms face obstacles due to the noisy data and difficulty of the system in estimating myriad of parameters, and require longer computational time to estimate the relevant parameters. The proposed algorithm (IDE) in this paper is a hybrid of a Differential Evolution algorithm (DE) and a Kalman Filter (KF). The outcome of IDE is proven to be superior than Genetic Algorithm (GA) and DE. The results of IDE from experiments show estimated optimal kinetic parameters values, shorter computation time and increased accuracy for simulated results compared with other estimation algorithms.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-11-25T13:22:09Z
No. of bitstreams: 1
IJIMAI20121_5_3_0.pdf: 630396 bytes, checksum: 74a0895721a42251f43ea1dc5068352c (MD5); Made available in DSpace on 2019-11-25T13:22:09Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_3_0.pdf: 630396 bytes, checksum: 74a0895721a42251f43ea1dc5068352c (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9575</guid>
</item>
<item>
<title>A Grammatical Approach to the Modeling of an Autonomous Robot</title>
<link>https://reunir.unir.net/handle/123456789/9574</link>
<description>A Grammatical Approach to the Modeling of an Autonomous Robot
López-García, Gabriel; Gallego-Sánchez, A. Javier; Dalmau-Espert, J. Luis; Molina-Carmona, Rafael; Compañ-Rosique, Patricia
Virtual Worlds Generator is a grammatical model&#13;
that is proposed to define virtual worlds. It integrates the&#13;
diversity of sensors and interaction devices, multimodality and a&#13;
virtual simulation system. Its grammar allows the definition and&#13;
abstraction in symbols strings of the scenes of the virtual world,&#13;
independently of the hardware that is used to represent the world&#13;
or to interact with it. A case study is presented to explain how to&#13;
use the proposed model to formalize a robot navigation system&#13;
with multimodal perception and a hybrid control scheme of the&#13;
robot. The result is an instance of the model grammar that&#13;
implements the robotic system and is independent of the sensing&#13;
devices used for perception and interaction. As a conclusion the&#13;
Virtual Worlds Generator adds value in the simulation of virtual&#13;
worlds since the definition can be done formally and&#13;
independently of the peculiarities of the supporting devices.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-11-25T13:11:11Z
No. of bitstreams: 1
IJIMAI20121_5_4_0.pdf: 640641 bytes, checksum: d05974c0da1f4a6c5c014e86b74d0aa9 (MD5); Made available in DSpace on 2019-11-25T13:11:11Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_4_0.pdf: 640641 bytes, checksum: d05974c0da1f4a6c5c014e86b74d0aa9 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9574</guid>
</item>
<item>
<title>Fusing Facial Features for Face Recognition</title>
<link>https://reunir.unir.net/handle/123456789/9560</link>
<description>Fusing Facial Features for Face Recognition
Ahmad Dargham, Jamal; Chekima, Ali; Gubin Moung, Ervin
Face recognition is an important biometric method&#13;
because of its potential applications in many fields, such as access&#13;
control, surveillance, and human-computer interaction. In this&#13;
paper, a face recognition system that fuses the outputs of three&#13;
face recognition systems based on Gabor jets is presented. The&#13;
first system uses the magnitude, the second uses the phase, and&#13;
the third uses the phase-weighted magnitude of the jets. The jets&#13;
are generated from facial landmarks selected using three selection&#13;
methods. It was found out that fusing the facial features gives&#13;
better recognition rate than either facial feature used individually&#13;
regardless of the landmark selection method.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-11-19T13:44:47Z
No. of bitstreams: 1
IJIMAI20121_5_7.pdf: 719614 bytes, checksum: cb284fe86989d96931d9916718c166d3 (MD5); Made available in DSpace on 2019-11-19T13:44:47Z (GMT). No. of bitstreams: 1
IJIMAI20121_5_7.pdf: 719614 bytes, checksum: cb284fe86989d96931d9916718c166d3 (MD5)
</description>
<guid isPermaLink="false">https://reunir.unir.net/handle/123456789/9560</guid>
</item>
</channel>
</rss>
