This study proposes an algorithm where edge shape information is retrieved using a vote based rearranged chain code. The proposed algorithm rearranges and normalizes the chain code of edges to create a maximum vote based normalization chain code whose correlativity is reinforced. As it obtains cyclical maximum values from the chain code, rearranges them and flips code values according to the frequency, it is resilient against rotation and scaling noise and its retrieval speed is fast. As a result of a test, it was demonstrated that the proposed algorithm can retrieve rotated images better than the existing chain code based algorithm.
{"title":"Frequency Based Rearranged Chain Code","authors":"Youngeun An, Jinim Lee, Jonghun Chun, Jongan Park","doi":"10.1109/ISMS.2011.77","DOIUrl":"https://doi.org/10.1109/ISMS.2011.77","url":null,"abstract":"This study proposes an algorithm where edge shape information is retrieved using a vote based rearranged chain code. The proposed algorithm rearranges and normalizes the chain code of edges to create a maximum vote based normalization chain code whose correlativity is reinforced. As it obtains cyclical maximum values from the chain code, rearranges them and flips code values according to the frequency, it is resilient against rotation and scaling noise and its retrieval speed is fast. As a result of a test, it was demonstrated that the proposed algorithm can retrieve rotated images better than the existing chain code based algorithm.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We study a parallel K-pipeline HFJ (Homogeneous Fork/Join queueing) system in which each pipeline has two identical exponential first-in-first-out services where each service has an infinite capacity queue. Jobs arrive with Poisson arrival distribution. Upon arrival, a job forks into K tasks. Task k, k = 1, 2, ..., K, is assigned to the kth pipeline. A job leaves the HFJ system as soon as all its tasks complete their service. We call the system M/2M/2 HFJ pipelines. In this paper, we present a speed and memory solution to simulate thousands of pipelines in minutes for the mean response time, which we denote by T_K. On a regular DELL INSPIRON 1464-138 laptop with 2G memory, the simulation for 10,000 M/2M/2 HFJ pipelines lasts only 36 minutes for 5 million warm-up jobs and 20 million analysis jobs. As an application, we compare simulation results for K = 2,000 with two mean response time solutions in [1] and [2]. Reusable source code is also offered for others to use.
{"title":"A Fast Simulation for Thousands of M/2M/2 Parallel Homogeneous Fork/Join Pipelines","authors":"R. Chen, Muchenxuan Tong, Chuan Jiang","doi":"10.1109/ISMS.2011.48","DOIUrl":"https://doi.org/10.1109/ISMS.2011.48","url":null,"abstract":"We study a parallel K-pipeline HFJ (Homogeneous Fork/Join queueing) system in which each pipeline has two identical exponential first-in-first-out services where each service has an infinite capacity queue. Jobs arrive with Poisson arrival distribution. Upon arrival, a job forks into K tasks. Task k, k = 1, 2, ..., K, is assigned to the kth pipeline. A job leaves the HFJ system as soon as all its tasks complete their service. We call the system M/2M/2 HFJ pipelines. In this paper, we present a speed and memory solution to simulate thousands of pipelines in minutes for the mean response time, which we denote by T_K. On a regular DELL INSPIRON 1464-138 laptop with 2G memory, the simulation for 10,000 M/2M/2 HFJ pipelines lasts only 36 minutes for 5 million warm-up jobs and 20 million analysis jobs. As an application, we compare simulation results for K = 2,000 with two mean response time solutions in [1] and [2]. Reusable source code is also offered for others to use.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information Technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors too use a tablet PC or a palmtop for complete patient's record retrieval and for diagnosis and treatment. No more files needs to be managed for individual patients. Thus, the hospital server is most vulnerable to all the threats pertaining to information thefts, frauds, unauthorized modification or any other crime. In such a scenario, the server and its information safety is a crucial concern for all the hospital management, as any invalid access can cost a life or even more.
{"title":"A Secure Multiparty Computation Solution to Healthcare Frauds and Abuses","authors":"Priyanka Jangde, D. Mishra","doi":"10.1109/ISMS.2011.75","DOIUrl":"https://doi.org/10.1109/ISMS.2011.75","url":null,"abstract":"Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information Technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors too use a tablet PC or a palmtop for complete patient's record retrieval and for diagnosis and treatment. No more files needs to be managed for individual patients. Thus, the hospital server is most vulnerable to all the threats pertaining to information thefts, frauds, unauthorized modification or any other crime. In such a scenario, the server and its information safety is a crucial concern for all the hospital management, as any invalid access can cost a life or even more.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Alam, Md. Nazmus Sakib, A. Sazzad, Imranul Kabir Chowdhury
At the present time, considering cost factors, environmental viability and unlimited resource of power, nuclear is one of the best options and in this era of energy crisis. The initiating postulate of energy has hairsplitting the prerequisite of alternative reservoirs of energies other than fossil fuels. In this paper, Characteristic features of gen-4 nuclear reactors and simulation and analysis of nuclear reactor and kinetics model has been discussed.
{"title":"Simulation and Analysis of Advanced Nuclear Reactor and Kinetics Model","authors":"S. Alam, Md. Nazmus Sakib, A. Sazzad, Imranul Kabir Chowdhury","doi":"10.1109/ISMS.2011.79","DOIUrl":"https://doi.org/10.1109/ISMS.2011.79","url":null,"abstract":"At the present time, considering cost factors, environmental viability and unlimited resource of power, nuclear is one of the best options and in this era of energy crisis. The initiating postulate of energy has hairsplitting the prerequisite of alternative reservoirs of energies other than fossil fuels. In this paper, Characteristic features of gen-4 nuclear reactors and simulation and analysis of nuclear reactor and kinetics model has been discussed.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a combination of techniques of systems biology and immunoinformatics to simulate the immune response. Amino acid sequences representing molecular binding sites and bioinformatics based predictions of T and B cell epitopes become components of an agent-based simulator. To determine the immunogenic parts of the invading antigen, we resort to existing prediction methods together with a method, which uses Miyazawa and Jernigan protein–protein potential measurements, for assessing molecular binding. A classical immunization experiment is used as benchmark of the resulting model. We also reproduce the affinity maturation phenomena by the emergence of one or more dominating clones of lymphocytes in the situation of chronic exposure to the immunogenic molecule. These results show that the simulator produces a dynamics that is stable and consistent with basic immunological knowledge.
{"title":"Epitope Screening and Cell Cooperation in the Immune Response","authors":"F. Castiglione, M. Bernaschi","doi":"10.1109/ISMS.2011.30","DOIUrl":"https://doi.org/10.1109/ISMS.2011.30","url":null,"abstract":"We present a combination of techniques of systems biology and immunoinformatics to simulate the immune response. Amino acid sequences representing molecular binding sites and bioinformatics based predictions of T and B cell epitopes become components of an agent-based simulator. To determine the immunogenic parts of the invading antigen, we resort to existing prediction methods together with a method, which uses Miyazawa and Jernigan protein–protein potential measurements, for assessing molecular binding. A classical immunization experiment is used as benchmark of the resulting model. We also reproduce the affinity maturation phenomena by the emergence of one or more dominating clones of lymphocytes in the situation of chronic exposure to the immunogenic molecule. These results show that the simulator produces a dynamics that is stable and consistent with basic immunological knowledge.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}