{"title":"Delay tolerant network: routing issues and performance","authors":"A. Fatimah, R. Johari","doi":"10.1504/IJAC.2016.10002934","DOIUrl":"https://doi.org/10.1504/IJAC.2016.10002934","url":null,"abstract":"Delay tolerant networks (DTNs) are deployed in long distance data communications where delay is permissible like in interplanetary networks (IPNs). For the transfer of messages in a DTN, various routing schemes have been proposed but there has not been an umpteen amount of work related to their comparisons. Therefore, a study of the routing techniques, issues in DTN connectivity and performance analysis of routing algorithms in DTN have been showcased in the current work. This analysis would help the researchers in identifying the most efficient routing scheme amongst well known routing algorithms.","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Boughton, Mingyi Zhang, W. Powley, Patrick Martin, Paul Bird, Randy Horman
{"title":"Using economic models to capture importance policy for tuning in autonomic database management systems","authors":"H. Boughton, Mingyi Zhang, W. Powley, Patrick Martin, Paul Bird, Randy Horman","doi":"10.1504/IJAC.2016.10002935","DOIUrl":"https://doi.org/10.1504/IJAC.2016.10002935","url":null,"abstract":"A key advantage of autonomic database management systems will be their ability to manage according to business policies. Translating high-level business policies into low-level tuning actions and parameters is, however, a non-trivial problem as there is little similarity in the metrics used for measuring database performance and business performance. These translations can be simplified, however, by having a model that reflects the business policies. In this paper, we utilise an economic model to implement importance policy as a parameter for the allocation of system resources. The relative importance of the workloads can therefore be utilised in allocating system resources, such as main memory for buffer space and shares of the CPU. We simulate the model in order to demonstrate the effectiveness of the approach. We present experiments to show the impact of the relative importance of workloads on the allocation of resources, specifically buffer area and CPU.","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive mining for stock market based on live news TF-IDF features","authors":"V. Ingle, S. Deshmukh","doi":"10.1504/IJAC.2017.10010803","DOIUrl":"https://doi.org/10.1504/IJAC.2017.10010803","url":null,"abstract":"The various machine learning algorithms are used for prediction of stock market movement. The data collected for stock market is in the form of breaking news from various finance websites. The TF-IDF features extracted from online news data are used for creation of HMM model along with log likelihood values. The next day's stock price is predicted as either higher or lower than current day's stock price. Results obtained from proposed model is compared with results from other machine learning predictive techniques such as random forest, KNN, multiple regression, bagging and boosting. The proposed model produces approximately 70% of accurate prediction. The captured features are graphically represented with word cloud. The results can be further improved with the use of deep learning ensemble methods.","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130630962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of a 10 Gbps-60 GHz high speed RoF transmission system","authors":"D. Jain, B. Iyer","doi":"10.1504/IJAC.2020.10037091","DOIUrl":"https://doi.org/10.1504/IJAC.2020.10037091","url":null,"abstract":"","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125510661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of reverse tracing algorithm for the detection of DOS attacks in MANET","authors":"P. Hemalatha, J. Ananthi, R. Kalaivani","doi":"10.1504/IJAC.2017.10010767","DOIUrl":"https://doi.org/10.1504/IJAC.2017.10010767","url":null,"abstract":"Nowadays, successful communication was provided by the wireless network with high data rate services. The major strategies in wireless network were security and trustworthiness. Due to the denial of the service attacks, most of the communication was disrupted. That was overcome by a new proposed algorithm called reverse tracing algorithm, which helps to find the attackers through reverse tracing messages. If the acknowledgment is received after every successful transmission, that was considered a secure communication. If it did not receive the acknowledgement properly, that will be considered as an unsuccessful transmission. By using this reverse tracing algorithm, we can identify the attacks. Simulation were performed using network simulator tool and then parameters such as throughput, delay, drop rate, goodput and packet delivery ratio was analysed. Compared to the previous approaches, the proposed reverse tracing algorithm achieves good performance.","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AIR-IA: an analogous image removal approach using the intelligent archive","authors":"Jyoti Malhotra, J. Bakal","doi":"10.1504/IJAC.2020.10037083","DOIUrl":"https://doi.org/10.1504/IJAC.2020.10037083","url":null,"abstract":"","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-based retrieval system for surgery videos","authors":"M. Banwaskar, A. Rajurkar","doi":"10.1504/IJAC.2020.10037103","DOIUrl":"https://doi.org/10.1504/IJAC.2020.10037103","url":null,"abstract":"","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding mode approach for performance improvement of slow and fast dynamic uncertain systems","authors":"S. S. Sankeswari, Rajan H. Chile","doi":"10.1504/IJAC.2018.10016146","DOIUrl":"https://doi.org/10.1504/IJAC.2018.10016146","url":null,"abstract":"In this paper, an extended sliding mode control (SMC) method is proposed for applications to general class of control systems. The proposed method is based on lower order models obtained from slow or fast dynamical systems. In the proposed method, the sliding mode controllers (SMCr) are designed based on the three term controller (PID) with first order filter sliding surface. The motivation for the proposed work in this paper is that the methodology adopted for controller design is applicable to general unknown class of SISO systems. This systems having lower or higher order dynamics, oscillatory or monotonic behavior and with or without time delay. The performance of designed controller is excellent for variation in parametric and unmodeled uncertainty in the system. The robust property of the proposed method is verified by applying an external load disturbances (fixed and variable). The stability and robustness of the proposed controller are investigated using Lyapunov stability theorem. The high frequency chattering phenomenon which commonly occurs in SMC controller, is significantly reduced by adopting the switching gain with the known parameters of the system. The performance of the proposed SM control method is validated with the help of simulation examples and results are compared with other control methods available in the literature.","PeriodicalId":374882,"journal":{"name":"Int. J. Auton. Comput.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}