Data Structures and Algorithms

1601 Submissions

[12] viXra:1601.0264 [pdf] submitted on 2016-01-24 10:49:06

Sisyphus Work

Authors: Pavlova Sobakevich
Comments: 2 Pages.

We show that Albert Camus was right when depicting modern people work as a Sisypus work. Data structures and algorithms can be used in different directions. One direciton is to create imitation of a "work" by this raising the suffer and noise of everyone. Another direction is to not imitate any work because no one can walk against the river too long but rather go straight to the point - lessening suffer and then raising the pleasure. In ther words, the first thing should be always first: pamper yourself and then help others. It was needed to pass several thousands years till it is now proved mathematically so that there is no one now who can create so much chaotical noise in the people's mind and vision of the reality that noone sees anything anymore. This article is a cleaning instrument that helps to overcome this confuse happened due to a mischief. Dr. Watson (recall computer project called Watson) can learn from Sherlock and do not seat in prostration anymore. If any questions Dr. Watson the address of Sherlock: B 221.
Category: Data Structures and Algorithms

[11] viXra:1601.0196 [pdf] submitted on 2016-01-17 18:07:24

Information = Energy

Authors: Janis Belov
Comments: 5 Pages.

Richard P. Feynman in His book "Six easy steps" was telling about energy supplies in the nature and finally He wrote “Therefore it is up to the physicists to figure out how to liberate us from the need for having energy. It can be done”. This article suggests a way for such liberation. The opposite is well-known - the delta of information is always a money that used only for one goal - create more money. "Those who own the delta of information own the World".
Category: Data Structures and Algorithms

[10] viXra:1601.0098 [pdf] submitted on 2016-01-09 22:08:59

Preserving Privacy in Data Mining using Data Distortion Approach

Authors: Mrs. Prachi Karandikar, Sachin Deshpande
Comments: 8 Pages.

Data mining, the extraction of hidden predictive information from large databases, is nothing but discovering hidden value in the data warehouse. Because of the increasing ability to trace and collect large amount of personal information, privacy preserving in data mining applications has become an important concern. Data distortion is one of the well known techniques for privacy preserving data mining. The objective of these data perturbation techniques is to distort the individual data values while preserving the underlying statistical distribution properties. These techniques are usually assessed in terms of both their privacy parameters as well as its associated utility measure. In this paper, we are studying the use of non-negative matrix factorization (NMF) with sparseness constraints for data distortion.
Category: Data Structures and Algorithms

[9] viXra:1601.0097 [pdf] submitted on 2016-01-09 22:10:00

Secured Transfer of Messages Against Malicious Attacks Using Efficient Algorithm

Authors: F. Emily Manoz, Priya, P.s. Ramesh, B.shanthi
Comments: 5 Pages.

Wireless Sensor Network (WSN) is a new class of networking technology .When we use sensor network in brutal environment, security is most important concern. The technology may face against various attacks. These attacks produce vulnerability against authentication, confidentiality and trustworthiness. This paper introduces an adaptive method for securing the transformation of messages in wireless sensor networks in the harsh environment. The light weight protocols are highly suitable for achieving authentication. The efficient matching algorithm will be used for performing packet matching and also it detects the malicious attack efficiently within the transformation of data. Finally, the encryption/decryption algorithm secures our original data.
Category: Data Structures and Algorithms

[8] viXra:1601.0096 [pdf] submitted on 2016-01-09 22:12:21

Human Head Effects on the Planar Inverted-F Antenna Performances

Authors: Saida Ibnyaich, Raefat Jalila El Bakouchi, Samira Chabaa, Abdelilah Ghammaz, Moha M’rabet Hassani
Comments: 8 Pages.

With the current expansion and the anticipated further increase in the use of cellular telephones and other wireless communication devices, considerable research effort is devoted to investigations of interactions between antennas on handsets and the human body. This interaction significantly changes the antenna characteristics from that in free space or even on the device (handset, laptop). In this paper and in order to study this problem, firstly a planar inverted-F antenna (PIFA) was designed and simulated to operate over the frequency 2,45 GHz , then the influence of the human head on the return loss and on the radiation efficiency of the antenna has been studied.
Category: Data Structures and Algorithms

[7] viXra:1601.0095 [pdf] submitted on 2016-01-09 22:13:17

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Authors: Sharma Shelja, Kumar Suresh, Rathy R. K.
Comments: 13 Pages.

Ad hoc networks are infrastructure-less collection of mobile nodes, characterized by wireless links, dynamic topology and ease of deployment. Proactive routing protocols maintain the network topology information in the form of routing Tables, by periodically exchanging the routing information. Mobility of nodes leads to frequent link breaks, resulting in loss of communication and thus the Information in the Table may become stale after some time. DSDV routing protocol follows proactive approach for routing and uses stale routes in case of link break, which is the major cause of its low performance as mobility increases. We have focused on two variants of DSDV namely Eff-DSDV and I-DSDV, which deals with the broken link reconstruction and discussed in these protocols, the process of route reconstruction due to broken links. To analyze this route reconstruction mechanism, we have used a terrain of size 700m × 800 m with 8 nodes placed randomly. Analysis shows that both Eff-DSDV & I-DSDV, perform better than DSDV in Packet Delivery Ratio and Packet Loss with slight increase in Routing Overheads.
Category: Data Structures and Algorithms

[6] viXra:1601.0094 [pdf] submitted on 2016-01-09 22:14:17

Synthesizable Implementation of Safety Fuzzy Logic Controller of 1oo2 Architecture in Fpga

Authors: Mohammed Bsiss, Amami Benaissa
Comments: 8 Pages.

Currently, the achievements of security systems is becoming more and more ground in different areas not only through the development of new technologies of programmable circuits, with the ability to achieve very complex systems in a single chip but thanks also a common and coherent organization of the different safety standard.This paper describes the implementation for a safety fuzzy logic controller (SFLC) on the basis of Safety Norm 61508. The SFLC is programmed with the hardware description language VHDL and implemented in FPGA.
Category: Data Structures and Algorithms

[5] viXra:1601.0093 [pdf] submitted on 2016-01-09 22:15:09

Vectored Interrupt Controller Implementation of Advanced Bus Architecture on FPGA

Authors: Vasanth H, A.R.Aswath
Comments: 8 Pages.

Interrupt controller is designed with the concept of priority based selection of peripherals which requires immediate attention or service. Here AHB is optimized to interface with VIC to initiate data transfer on the AHB. Both read and write cycles are designed with AHB bus.
Category: Data Structures and Algorithms

[4] viXra:1601.0092 [pdf] submitted on 2016-01-09 22:15:59

A Comparative Analysis of GA-PID, Fuzzy and PID for Water Bath System

Authors: Sarita Rani, Sanju Saini, Sanjeeta Rani
Comments: 6 Pages.

Temperature is a very important parameter in industrial production. Recently, lots of researches have been investigated for the temperature control system based on various control strategies. This paper presents the comparison of GA-PID, fuzzy and PID for temperature control of water bath system. Different control schemes namely PID, PID tuning using Genetic Algorithms(GA-PID), and Fuzzy Logic Control, have been compared through experimental studies with respect to set-points regulation, influence of impulse noise and sum of absolute error. The new algorithm based on GA-PID improve the performance of the system. Also, it's fit for the complicated variable temperature control system. The simulation results show that the validity of the proposed strategy is more effective to control temperature.
Category: Data Structures and Algorithms

[3] viXra:1601.0091 [pdf] submitted on 2016-01-09 22:17:06

Envision of Student’s Concert Using Supervised Learning Techniques

Authors: S. Anupama Kumar, Vijayalakshmi M.N
Comments: 7 Pages.

Educational data mining is an emerging technology concerned with developing methods for exploring the various unique data that exists in the educational settings and uses them to understand the students as well as the domain in which they learn. Educational domain consists of a lot of data related to students, teachers and other learning strategies. Classification algorithms can be used on various educational data to mine the academic records. It can be used to predict student‘s outcome based on their previous academic performance. The various predictive algorithms like, C4.5, Random tree are applied on student‘s previous academic results to predict the outcome of the students in the university examination. The prediction would help the tutor in understanding the progress and attitude of the student towards the studies. It would also help them to identify the students who are constantly improving in their studies and help them to achieve a higher percentage. It also helps them to identify the underperformers so that extra effort can be taken to achieve a better result. The algorithms are analyzed based on their accuracy of predicting the result, the recall and the precision values. The accuracy of the algorithm is predicted by comparing the output generated by the algorithm with the original result obtained by the students in the university examination.
Category: Data Structures and Algorithms

[2] viXra:1601.0090 [pdf] submitted on 2016-01-09 22:17:56

Propagation Assessment of MB-OFDM Ultrawide Band (UWB) MIMO Based Communication in Fading Channels

Authors: Affum Emmanuel, Edward Ansong
Comments: 14 Pages.

Ultra wideband (UWB) technology is one of the promising solutions for future short-range communication which has recently received a great attention by many researchers. However, interest in UWB devices prior to 2001 was primarily limited to radar systems, mainly for military applications due to bandwidth resources becoming increasingly scarce and also its interference with other commutation networks. This research work provides performance analysis of multiband orthogonal frequency division multiplexing (MB-OFDM) UWB MIMO system in the presence of binary phase-shift keying time-hopping (BPSK-TH) UWB or BPSKDS UWB interfering transmissions under Nakagami-m and Lognormal fading channels employing various modulation schemes using MATLAB simulations. The research work indicates that it is totally impossible to predict the performance of UWB system in Lognormal channel.
Category: Data Structures and Algorithms

[1] viXra:1601.0089 [pdf] submitted on 2016-01-09 22:32:00

Fault Tolerant Hierarchical Interconnection Network for Parallel Computers (FTH)

Authors: Rajashree Sukla, Chinmaya Kumar Nayak
Comments: 8 Pages.

In this paper we introduce a new interconnection network Fault Tolerant Hierarchical Interconnection network for parallel Computers denoted by FTH(k, 1).This network has fault tolerant hierarchical structure which overcomes the fault tolerant properties of Extended hypercube(EH).This network has low diameter, constant degree connectivity and low message traffic density in comparisons with other hypercube type networks like extended hypercube and hypercube. In this network we proposed the fault tolerant algorithm for node fault and also we introduce the hamiltonian Circuit for the proposed network FTH(k,2).
Category: Data Structures and Algorithms