2017-06-23T11:27:27Z
http://jacr.iausari.ac.ir/?_action=export&rf=summon&issue=597
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
Modeling Cooperation between Nodes in Wireless Networks by APD Game
Abbas
Arghavani
Abdorasoul
Ghasemi
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whether to cooperate with its neighbor or not and performs something that benefits it. We have used Alternative Prisoner’s Dilemma game which is one of the classic games in the field of game theory, to model node's behavior in a nontraditional network. Then, by providing an approach based on Learning Automata, we've tried to encourage the nodes to cooperate with each other.
Wireless Network
Cooperation
Game Theory
Prisoner’s Dilemma
APD Game
2013
01
01
1
12
http://jacr.iausari.ac.ir/article_2512_ae07ffd62ffcb9045aa5ed203362352a.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
Pre-scheduling and Scheduling of Task Graph on Homogeneous Multiprocessor Systems
Marjan
Abdeyazdan
Saeed
Parsa
Amir Masoud
Rahmani
Task graph scheduling is a multi-objective optimization and NP-hard problem. In this paper a new algorithm on homogeneous multiprocessors systems is proposed. Basically, scheduling algorithms are targeted to balance the two parameters of time and energy consumption. These two parameters are up to a certain limit in contrast with each other and improvement of one causes reduction in the other one. The problem is to achieve the trade-off between these two parameters. Pre-scheduling algorithms are mainly aimed at modifying the structure of task graph to gain optimal scheduling. In the proposed algorithm the suitable number of processors for scheduling the task graph is computed. The idea of Nash equilibrium is mainly applied to compute the appropriate number of processors in such a way that the idle time of the processors is reduced while their processing power is increased. Also, considering the communication costs and interdependencies, the tasks are merged as their earliest start time is reduced. In this way, the length of the critical path is reduced while the degree of parallelism is increased and ultimately the completion time is reduced.Our experimental result on a number of known benchmark graphs demonstrates the effect of our proposed algorithm.
schedule
pre-schedule
Task Graph
Game Theory
Optimization
Nash equilibrium
2013
01
01
13
29
http://jacr.iausari.ac.ir/article_2524_43c019431670d74c4167cfe38747aa65.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
VRED: An improvement over RED algorithm by using queue length growth velocity
Shahram
Jamali
Bita
Alipasandi
Neda
Alipasandi
Active Queue Management (AQM) plays an important role in the Internet congestion control. It tries to enhance congestion control, and to achieve tradeoff between bottleneck utilization and delay. Random Early Detection (RED) is the most popular active queue management algorithm that has been implemented in the in Internet routers and is trying to supply low delay and low packet loss. RED algorithm uses only the average queue length as a congestion meter to trigger packet dropping or packet marking as a congestion feedback. Since the average queue length considers only long–term behavior of any queue, this approach fails to see instantaneous changes of the queue length and hence its reaction is not fast enough. This paperincludes another meter i.e. queue length growth velocity to measure congestion level in the router. This leads to fast reaction to the congestion and hence improves the network performance. Simulation results show that the proposed algorithm outperforms RED algorithm in terms of number of dropped packets and bottleneck utilization.
Congestion Control
active queue management
Random Early Detection
packet dropping
Utilization
2013
01
01
31
38
http://jacr.iausari.ac.ir/article_2510_962b60d94170e8445aaf4a8b997a5407.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
An Improved Shuffled Frog Leaping Algorithm for Simultaneous Design of Power System Stabilizer and Supplementary Controller for SVC
Leila
Esteki
Maryam
Shahriari-kahkeshi
Ehsan
Bijami
This paper presents a new Modified Shuffled Frog Leaping Algorithm (MSFLA) applied to design simultaneous coordinated tuning of damping controllers to damp the power system low frequency oscillations. For this, a new frog leaping rule is proposed to improve the local exploration and performance of the original SFLA and the genetic mutation operator is employed for new frog generation instead of random frog generation to improve the performance and quicker algorithm convergence. In order to verify the effectiveness of the proposed method, a 2-area-4-machine and a 5-area-16-machine power system are considered which two power system stabilizers (PSSs) are designed coordinately for the first system and one PSS for a generator and one supplementary controller for a Static Var Compensator (SVC) are designed simultaneously for the second system. To show the effectiveness of the designed controllers, study systems are tested under two different operating conditions and simulation studies are presented.
Shuffled Frog Leaping Algorithm
Low frequency Oscillation
SVC
2013
01
01
39
53
http://jacr.iausari.ac.ir/article_2960_c5dcd40d5d5d891b24a8166e9c465b92.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
A Recursive Formula for the Number of Fuzzy
Subgroups of Finite Cyclic Groups
Mahdi
Imanparast
Hamid
Darabi
Fuzzy groups and fuzzy theory have a lot of applications in several sciences such as mathematics, computer science, computer and electrical engineering. Hence, counting the number of fuzzy subgroups of finite groups to classify them is an important issue in fuzzy theory. The Main goal of this paper is to give an explicit formula for the number of fuzzy subgroups of a finite cyclic group G Z p1 Z p 2 Z p 3 Z pk = ´ ´ ´´ , where k p , p ,..., p 1 2 are distinct prime numbers. We introduce a very simple recursive formula to count the number of subgroups of G.
Fuzzy groups
Lattice
Finite cyclic groups
Chains
2013
01
01
55
63
http://jacr.iausari.ac.ir/article_2961_02dc5efc0373ca5fb564e81b05039638.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test
S.Mobarakeh
Moosavirad
Peyman
Kabiri
Hamidreza
Mahini
Intrusion detection in wireless networks has been a challenging research problem in network security for more than half a century. This paper presents a novel intrusion detection method based on Received Signal Strength Acceptance Test (RSSAT) to improve the IDS capabilities in anomaly-based Host-based Intrusion Detection Systems (HIDS). The new system can identify suspicious behaviors detecting anomalies in the received signal strength from the access points. Several scenarios are implemented in Omnet++ environment to evaluate the performance of the proposed scheme. A test criterion is used to improve accuracy in detecting forged signal powers and at the same time to reduce number of the false positives i.e. number of false attack alerts resulted from the legitimate signal powers.
Intrusion Detection System
Wireless
WIDS
security
2013
01
01
65
80
http://jacr.iausari.ac.ir/article_2962_e15701c043a07a264222939a5de2a617.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
Optimized Reversible Programmable Logic Array (PLA)
Aliakbar
Niknafs
Reversible logic circuits have found emerging attentions in nanotechnology, optical computing, quantum computing and low power design. A programmable logic array (PLA) is a universal circuit which is used to implement combinational logic circuits. The main part of a PLA is its AND array. In this study we propose two types of optimized reversible programmable logic array (RPLA) circuits. The first type is based on a “2-to-4” AND array, and is proposed for the first time. The second type is based on a “3-to-8” AND array. For each type, we bring some different designs. These circuits are compared with the existing counterparts in terms of number of constant inputs and garbage outputs, delay and the quantum cost and are shown that all parameters in proposed circuits are improved.
Optimization
Reversible logic
PLA
genetic algorithm
2013
01
01
81
88
http://jacr.iausari.ac.ir/article_2963_fe62c57510297ee06f9aa39a60fdfeac.pdf
Journal of Advances in Computer Research
JACR
2345-606X
2345-606X
2013
4
1
Solving the Capacitated Clustering Problem by a
Combined Meta-Heuristic Algorithm
Narges
Mahmoodi Darani
Vahid
Ahmadi
Zahra
Saadati Eskandari
Majid
Yousefikhoshbakht
The capacitated clustering problem (CCP) is one of the most important combinational optimization problems that nowadays has many real applications in industrial and service problems. In the CCP, a given n nodes with known demands must be partitioned into k distinct clusters in which each cluster is detailed by a node acting as a cluster center of this cluster. The objective is to minimize the sum of distances from all cluster centers to all other nodes in their cluster, such that the sum of the corresponding node weights does not exceed a fixed capacity and every node is allocated to exactly one cluster. This paper presents a hybrid three-phase meta-heuristic algorithm (HTMA) including sweep algorithm (SA), ant colony optimization (ACO) and two local searches for the CCP. At the first step, a feasible solution of CCP is produced by the SA, and at the second step, the ACO, insert and swap moves are used to improve solutions. Extensive computational tests on standard instances from the literature confirm the effectiveness of the presented approach compared to other meta-heuristic algorithms.
Capacitated Clustering Problem
NP-hard Problems
Ant Colony Optimization
Sweep Algorithm
Local Search
2013
01
01
89
100
http://jacr.iausari.ac.ir/article_2964_ac89a21ab33eabe70518e773ccb08738.pdf