This thesis observes the emerging trend of convergence of control with computing and communication. By exploiting control and scheduling codesign, we study some practical and open problems in RTCSs from a unique viewpoint of dynamic resource management. Considering constraints on three representative kinds of resources, i.e. CPU time, energy, and network bandwidth, we present a set of feedback scheduling methods that exploit a unified technological framework. They provide enabling technologies for closed-loop dynamic resource scheduling, and tackle some essential problems in the emerging field of feedback scheduling. Meanwhile, this thesis holistically addresses the problem of dynamic allocation of bottleneck resources...
As a professor of the Operating Systems subject, I can say that for many years the book “Operating Systems Concepts” by Avi Silberschatz et al. was considered as the unquestionable number one in the subject’s bibliography. The book we are talking about now, the new edition of “Operating Systems” by William Stallings, is thought to be the possible replacement of the first one.
The book presents the treatment of advanced topics in computer networks - mainly in those of high speed - which the designer or the network manager necessarily needs to know. These topics relate to multimedia traffic support, real time traffic, and congestion control as well as the needs of providing different levels of quiality of service (QoS) according to the applications and users.
Bouchet, A.; Pastore, Juan Ignacio; Ballarín, Virginia Laura
Currently, Mathematical Morphology (MM) has become a powerful tool in Digital Image Processing (DIP). It allows processing images to enhance fuzzy areas, segment objects, detect edges and analyze structures. The techniques developed for binary images are a major step forward in the application of this theory to gray level images. One of these techniques is based on fuzzy logic and on the theory of fuzzy sets. Fuzzy sets have proved to be strongly advantageous when representing inaccuracies, not only regarding the spatial localization of objects in an image but also the membership of a certain pixel to a given class....
Nanclares, Jorge; Rapallini, Ulises Mario Alberto
A natural inference mechanism is presented : the Black Box problem is transformed into a Dirichlet's problem on the closed cube. Then it is solved in closed polynomial form, together with a Mean-Value theorem and a Maximum Principle.A generalization to Polytopes and a reduction of any Dirichlet problem on compacta is mapp ed into a unit cub e in more dimensions.An algorithm for calculating the solution is suggested.
González, Mariela A.; Rapacioli, Melina; Ballarín, Virginia Laura; Fiszer de Plazas, Sara; Flores, Vladimir
In situ hybridization (ISH) method allows to reveal specific genes expression, identify specific cell types and detect areas or tissues, displaying differential gene expression. This work describes a standardized procedure of digital image processing that allows detailed analyses of ISH preparations. We have developed a software that allows through a graphical interface (a) to reliably identify and quantify ISH labels, (b) to locate each label within the image reference system (c) to assemble the total series of images obtained from a complete histological sections of a biological structure, and d) to locate all the labels within a unique reference system...
Lou, Xuyang; Cui, Baotong
The exponential periodicity and stability of continuous nonlinear neural networks with variable coefficients and distributed delays are investigated via employing Young inequality technique and Lyapunov method.
Some new sufficient conditions ensuring existence and uniqueness of periodic solution for a general class of neural systems are obtained. Without assuming the activation functions are to be bounded, differentiable or strictly increasing. Moreover, the symmetry of the connection matrix is not also necessary. Thus, we generalize and improve some previous works, and they are easy to check and apply in practice.
Espino-Gudiño, María del Carmen; Rodríguez-Hernández, Vicente; Terol Villalobos, Iván R.; Herrera Ruiz, Gilberto
This research presents a fingerprint image processing algorithm for personal automatic identification, which has been in development since 1998. It is principally based on the comparison of the fingerprint's biometric pattern between the fingerprint captured (original) in each session and the one stored in database. It is preferable to capture the image in color. The biometric pattern is formed by the Euclidean distances based on the triangulation of only three minutiae. This methodology locates the position and the type of each minutia to perform the triangulation. The applied metric is the statistic similarity obtained by the comparison of both biometric...
Vertical partitioning, in which attributes of a relation are assigned to partitions, is aimed at improving database performance. We extend previous research that is based on a single relation to multi-relation database environment, by including referential integrity constraints, access time based heuristic, and a comprehensive cost model that considers most transaction types including updates and joins. The algorithm was applied to a real-world insurance CLAIMS database. Simulation experiments were conducted and the results show a performance improvement of 36% to 65% over unpartitioned case.
Application of our method for small databases resulted in partitioning schemes that are comparable to optimal.
Guezouri, Mustapha; Ouamri, Abdelaziz
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Routing protocols are used to discover routes between nodes.
Many mobile ad-hoc networks protocols such as AODV construct route only when desired by the source node (reactively). The advantage hereof is that no prior assumptions of the network topology are required. In highly mobile networks this is an attractive property.
Other used protocols (such as OLSR) are said proactive.
Such protocols maintain information about routes to all destinations all times....
Sharifi, Mohsen; Azizi, Hooshang
Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and...
Ardenghi, Jorge Raúl; Echaiz, Javier
Nowadays Peer-to-Peer (P2P) systems became an important part of Internet, millions of users have been attracted to use their structures and services. The popularity of Peer-to-Peer systems speed up academic research joining researchers from systems, networking and theory. The most popular P2P applications support file-sharing and content distribution, new applications are emerging in different fields, Internet telephony is an example.
This paper discusses the issues of P2P systems such as characteristics, structures, protocols, drawbacks, open problems and futures fields of development.