{"title":"Solving Equations Systems Using Artificial Intelligence - a Survey","authors":"Liviu Octavian Mafteiu-Scai, Roxana Mafteiu-Scai Emanuela Mafteiu","doi":"10.17781/P002446","DOIUrl":"https://doi.org/10.17781/P002446","url":null,"abstract":"","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURITY METHOD: CLOUD COMPUTING APPROACH BASED ON MOBILE AGENTS","authors":"A. Alwesabi, K. Okba","doi":"10.17781/P002","DOIUrl":"https://doi.org/10.17781/P002","url":null,"abstract":"The cloud computing is a new computer model that provide computer services in the form of services on demand, accessible from anywhere, anytime and by anyone, the cloud computing are mainly used for the treatment of loads computer work very intensive and provide very large storage of data, these two objectives are combined with the third goal of potentially reducing management costs and use. In this paper, we present an architecture based on mobile agent for cloud computing, today most applications of cloud computing use the model \"client / server\" where the exchange is done by sending messages across the network , this model has the disadvantage of increasing the traffic on the network and requires a permanent connection. In this paper, we propose a new approach that uses mobile agents in cloud computing, our architecture is based on mobile agents that have kept the goal of security communication in cloud computing, we are relying on the ability of security of agents.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Design Space Exploration Methodology for Application Specific System Design","authors":"K. Balasubadra","doi":"10.17781/p002363","DOIUrl":"https://doi.org/10.17781/p002363","url":null,"abstract":"During the application specific system design process, the designer has to take early decisions for selecting the optimal system components from the available huge design alternatives. To obtain the optimal design configuration from the available design alternatives, an efficient Design Space Exploration (DSE) process is required. This paper extends our previous work by integrating Bayesian Belief Network (BBN) based design space pruning methodology with the proposed heuristic algorithm for appropriate selection of memory configuration during the system design process. A complete and well structured DSE strategy has been formulated through the combination of BBN and heuristic approaches. The BBN performs design space pruning from the available huge design alternatives, resulting in near Pareto-optimal solution. The proposed heuristic algorithm performs the selection of the most optimal cache options. This paper mainly focuses on integrating the BBN with the proposed heuristic algorithm for providing efficient DSE strategy that aids the system designers during the application specific system design process. The experimental results in support of the proposed heuristic show a considerable reduction in the number of simulations required for covering the design space and also the algorithm finds the most optimal cache configurations for the given application with less number of iterations.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Redwan A. Al-dilami, Ammar Thabit Zahary Adnan Zain Al-Saqqaf
{"title":"An Enhanced Algorithm for Cloud Scheduling with Setup Cost","authors":"Redwan A. Al-dilami, Ammar Thabit Zahary Adnan Zain Al-Saqqaf","doi":"10.17781/P002468","DOIUrl":"https://doi.org/10.17781/P002468","url":null,"abstract":"The study aimed at investigating the problem of online task scheduling of identifying job of MapReduce on cloud computing infrastructures. It was proposed that the virtualized cloud computing setup comprised machines that host multiple identical virtual machines (VMs) under pay-as-you-go charging and booting a VM requires a constant setup time. The problem occurs when the VMs turning off after finishing processing a task and running it again for another. The goal is to limit the delay resulted from setting up the VMs, and to minimize the idle cost (VM does not find any task to possess) when VM is continuing in an active state without processing tasks. It was a constant number of VMs in an activation state continuity, and the cost of idle was distributed over existing tasks where the cost should be less than the cost of setting up one VM. The researchers' algorithm limited the delay resulted from setting up the VMs, the cost resulted from the continuing VMs in an active state without processing tasks was distributed to the current tasks fairly. The known cases was discussed where the duration of each task was known upon its arrival.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Owayjan, Hasan A. Ezzidine Fady C. Elias-Sleiman, Nourhane Haidar
{"title":"Interactive Face Robot","authors":"M. Owayjan, Hasan A. Ezzidine Fady C. Elias-Sleiman, Nourhane Haidar","doi":"10.17781/P002435","DOIUrl":"https://doi.org/10.17781/P002435","url":null,"abstract":"The interaction between humans and robots has increased and become more personalized in this century. Robots are being used in various fields such as medicine, manufacturing, automation, etc.; however, they lack the interaction capability that is found in a human mainly because more than 60% of human communication is non-verbal, and thus, is hard to replace him. This project presents an interactive face robot which is able to mimic the six universal human facial expressions: happiness, surprise, fear, sadness, anger, and disgust. It can interact with the user using speech recognition in order to mimic a career/major adviser. The Interactive Face Robot is made out of a rubber mask to simulate the skin. Facial expressions are created by moving muscle-like structures based on a facial mass-spring model. Nine servo motors move the different action units in the face to create the different expressions. The Interactive Face Robot mimics a career/major adviser using speech recognition software, the BitVoicer, which recognizes the user’s speech and communicates with a LabVIEWTM program that evaluates the answers and calculates the best career/major choice. The LabVIEWTM program, which runs on a laptop computer, also converts the pre-defined questions that the robot asks into voice, and communicates with an Arduino Mega the expression that the face is to generate. Using pulse-width modulation, the Arduino Mega controls the needed servo motors to create the necessary facial expression. The Interactive Face Robot has proven to be user-friendly, and interacted with humans as pre-programmed. Facial expressions provide robots with more capabilities for human-like interactions, making them more adequate for applications requiring interactions with humans. This Interactive Face Robot can replace a career/major adviser, and can be programmed as a receptionist, front-desk operator, or can be used in therapeutic applications. Keywords—HCI; Facial Expressions; Interactive Robot","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware-based scheduling and synchronization for light-weight, fine-grained\u0000multi-threading","authors":"S. Haddad, Jeanine E. Cook","doi":"10.17781/P002649","DOIUrl":"https://doi.org/10.17781/P002649","url":null,"abstract":"","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127139271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}