10,006 research outputs found
Investigating the performance of Correspondence Algorithms in Vision based Driver-assistance in Indoor Environment
This paper presents the experimental comparison of fourteen stereo matching
algorithms in variant illumination conditions. Different adaptations of global
and local stereo matching techniques are chosen for evaluation The variant
strength and weakness of the chosen correspondence algorithms are explored by
employing the methodology of the prediction error strategy. The algorithms are
gauged on the basis of their performance on real world data set taken in
various indoor lighting conditions and at different times of the dayComment: 7 pages, 9 figures,Published with International Journal of Computer
Applications (IJCA
Improved detection of Probe Request Attacks : Using Neural Networks and Genetic Algorithm
The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resources. The vulnerability is amplified due to clear beacon, probe request and probe response frames. The research is to detect PRFA of Wireless Local Area Networks (WLAN) using a Supervised Feedforward Neural Network (NN). The NN converged outstandingly with train, valid, test sample percentages 70, 15, 15 and hidden neurons 20. The effectiveness of an Intruder Detection System depends on its prediction accuracy. This paper presents optimisation of the NN using Genetic Algorithms (GA). GAs sought to maximise the performance of the model based on Linear Regression (R) and generated R > 0.95. Novelty of this research lies in the fact that the NN accepts user and attacker training data captured separately. Hence, security administrators do not have to perform the painstaking task of manually identifying individual frames for labelling prior training. The GA provides a reliable NN model and recognises the behaviour of the NN for diverse configurations
A Low Cost Two-Tier Architecture Model For High Availability Clusters Application Load Balancing
This article proposes a design and implementation of a low cost two-tier
architecture model for high availability cluster combined with load-balancing
and shared storage technology to achieve desired scale of three-tier
architecture for application load balancing e.g. web servers. The research work
proposes a design that physically omits Network File System (NFS) server nodes
and implements NFS server functionalities within the cluster nodes, through Red
Hat Cluster Suite (RHCS) with High Availability (HA) proxy load balancing
technologies. In order to achieve a low-cost implementation in terms of
investment in hardware and computing solutions, the proposed architecture will
be beneficial. This system intends to provide steady service despite any system
components fails due to uncertainly such as network system, storage and
applications.Comment: Load balancing, high availability cluster, web server cluster
Comparative Study on Agile software development methodologies
Today-s business environment is very much dynamic, and organisations are
constantly changing their software requirements to adjust with new environment.
They also demand for fast delivery of software products as well as for
accepting changing requirements. In this aspect, traditional plan-driven
developments fail to meet up these requirements. Though traditional software
development methodologies, such as life cycle-based structured and object
oriented approaches, continue to dominate the systems development few decades
and much research has done in traditional methodologies, Agile software
development brings its own set of novel challenges that must be addressed to
satisfy the customer through early and continuous delivery of the valuable
software. It is a set of software development methods based on iterative and
incremental development process, where requirements and development evolve
through collaboration between self-organizing, cross-functional teams that
allows rapid delivery of high quality software to meet customer needs and also
accommodate changes in the requirements. In this paper, we significantly
identify and describe the major factors, that Agile development approach
improves software development process to meet the rapid changing business
environments. We also provide a brief comparison of agile development
methodologies with traditional systems development methodologies, and discuss
current state of adopting agile methodologies. We speculate that from the need
to satisfy the customer through early and continuous delivery of the valuable
software, Agile software development is emerged as an alternative to
traditional plan-based software development methods. The purpose of this paper,
is to provide an in-depth understanding, the major benefits of agile
development approach to software development industry, as well as provide a
comparison study report of ASDM over TSDM.Comment: 25 pages, 25 images, 86 references used, with authors biographie
Non-parabolicity of the conduction band of wurtzite GaN
Using cyclotron resonance, we measure the effective mass, *, of electrons
in AlGaN/GaN heterostructures with densities, cm. From our extensive data, we extrapolate a band edge
mass of . By comparing our * data with the results of a
multi-band \textbf{k.p} calculation we infer that the effect of remote bands is
essential in explaining the observed conduction band non-parabolicity (NP). Our
calculation of polaron mass corrections -- including finite width and screening
- suggests those to be negligible. It implies that the behavior of
can be understood solely in terms of NP. Finally, using our NP and polaron
corrections, we are able to reduce the large scatter in the published band edge
mass values
Non-Local Deformation of a Supersymmetric Field Theory
In this paper, we will analyse a supersymmetric field theory deformed by
generalized uncertainty principle and Lifshitz scaling. It will be observed
that this deformed supersymmetric field theory contains non-local fractional
derivative terms. In order to construct such deformed N=1 supersymmetric
theory, a harmonic extension of functions will be used. However, the
supersymmetry will be only preserved for a free theory and will be broken by
the inclusion of interaction terms.Comment: 12 pages, pulished versio
Suppression of Higgsino mediated proton decay by cancellations in GUTs and strings
A mechanism for the enhancement for proton lifetime in
supersymmetric/supergravity (SUSY/SUGRA) grand unified theories (GUTs) and in
string theory models is discussed where Higgsino mediated proton decay arising
from color triplets (anti-triplets) with charges and
is suppressed by an internal cancellation due to contributions
from different sources. We exhibit the mechanism for an SU(5) model with
Higgs multiplets in addition to the usual Higgs structure of
the minimal model. This model contains both and
Higgs color triplets (anti-triplets) and simple constraints allow for a
complete suppression of Higgsino mediated proton decay. Suppression of proton
decay in an SU(5) model with Planck scale contributions is also considered. The
suppression mechanism is then exhibited for an SO(10) model with a unified
Higgs structure involving representations.The SU(5)
decomposition of contains and
and the cancellation mechanism arises among these
contributions which mirrror the SU(5) case. The cancellation mechanism appears
to be more generally valid for a larger class of unification models.
Specifically the cancellation mechanism may play a role in string model
constructions to suppress proton decay from dimension five operators. The
mechanism allows for the suppression of proton decay consistent with current
data allowing for the possibility that proton decay may be visible in the next
round of nucleon stability experiment.Comment: 26 pages, no figures. Revtex 4. To appear in Physical Review
ANALISIS YURIDIS TERHADAP PENETAPAN TENTANG PERMOHONAN ASAL USUL ANAK OLEH SUAMI ISTRI YANG SUAMINYA BERSTATUS WNA PADA AWAL PERNIKAHANNYA DALAM PENETAPAN NO. 1374/Pdt. P/ 2011/ PA SURABAYA
Skripsi ini adalah hasil penelitian di Pengadilan Agama Surabaya tentang permohonan asal usul anak oleh suami istri yang suaminya berstatus warganegara asing pada awal pernikahannya. Sehingga dalam skripsi ini, mencoba menjawab pertanyaan tentang sejauhmana keabsahan atas penetapan yang dilakukan hakim terhadap permohonan asal usul anak oleh suami istri yang suaminya berstatuswarganegara asing pada awal pernikahannya?
Data penelitian ini dihimpun melalui observasi terhadap berkas penetapan perkara permohonan asal usul anak No. 1374/Pdt. P/2011/PA.Srb dan wawancara dari hakim yang bertugas di Pengadilan Agama Surabaya. Selanjutnya penelitian ini dianalisis dengan teknik deskriptis analisis. Dalam hasil penetapan hakim tentang perkara permohonan asal usul anak oleh suami istri yang suaminya berstatuswarganegara asing dalam penetapan No. 1374/Pdt. P/2011/PA. Srb ini, Majelis Hakim mengabulkan permohonan pemohon, meski pada kenyataanya pemohon tersebut masih berstatuswarganegara asing pada awal pernikahannya, yang kesannya akan melegalkan istbat nikah bagi yang melanggar Undang-undang tentang pernikahan campuran maupun perzinaan. Tetapi Majelis hakim mengabulkan permohonan tersebut dengan alasan lebih mementingkan kesejahteraan anak di masa akan dating apabila sudah memiliki akta kelahiran yang tercantum nama orang tualaki-laki.
Hasil penelitian ini menyimpulkan bahwa penetapan hakim atas permohonan asal usul anak yang diajukan oleh suami istri yang suaminya berstatus WNA dalam penetapan No. 1374/Pdt. P/2011/PA. Sby harus memenuhi perundang-undangan yang berlaku, yakni dalam Undang-undang Perkawinan Nomor 1 Tahun 1974 pasal 57 tentang perkawinan campuran maupun pada pasal 43 ayat (1) Undang-undang Nomor 1 Tahun 1974 tentang Perkawinan. Bahawasanya salah satu persyaratan perkawinan campuran adalah harus tunduk pada hukum yang berlaku di Indonesia
- …
