A New Approach for Solving N-Queens Problem with Combination of PMX and OX Crossover Operators
The optimization of the complicated computational problems using algorithms based on population is increased, considerably. In this paper, we use Genetic Algorithm (GA) with a new structure to optimize the optimal solutions to solve N-Queens which is one of the combinatorial optimization problems. For increase the efficiency of GA and prevent from premature convergence, it is used crossover operator. So, to keep the primary population and optimal solution in each generation, it is selected the most fitness population. By performing operations, it is created chromosomes with less conflict. In this case, not only we prevent premature convergence, but also keep the population variety in a balanced scale. In this way, not only we prevent from premature convergence, but also keep the variety of population in balanced way. So, more parts of search space will be explored. The experiment results showed that GA has high efficiency to find optimal solution by combining crossover operators.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A review on software project reliability estimation
Despite the increased importance of the role that reliability plays in commercial product development, most companies are still unable to produce reliable software. The mission of organizations is to provide innovative products at a competitive price to fulfill the needs of very high expectations highly reliable software products for its customers and to do so ahead of its competitors. This requires focus on customer’s satisfaction and software reliability to ensure that desired factor is built into the software product and enable reliable software to be produced. By optimizing best practices for defect removal, organizations can produce high reliability software. In this paper we focus on some research efforts directed at gaining a deeper understanding of the reliability estimation using different algorithms, approaches, simulation methods for software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Trouble shoot hardware compatibilities of diagnostic card with solution techniques for mother board repair
There are millions of computer users around word but only few people have knowledge about diagnostic card, on the other hand if someone has theoretical knowledge then don’t know/understand about the language of diagnostic card. In this piece of work we have tried to resolve issues related to diagnostic card and provided much solution related to routine problems of motherboard. The objective of this research is to provide easily knowledge about the language of diagnostic card so that common user can easily knew that what type of code diagnostic card generated and can resolve the problem in motherboard at its own without consulting to hardware engineer. We have given at home simple solutions about problems related to heating issue of main chip, power supply problem, beep problem, hanging problem, red light problem and processor problem through this diagnostic card.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A low-cost built-in redundancy-analysis scheme for word-oriented RAMs with 2-D redundancy
Built-in self-repair (BISR) techniques are widely used for repairing embedded random access memories (RAMs). One key component of a BISR module is the built-in redundancy-analysis (BIRA) design. This paper presents an effective BIRA scheme which executes the 2-D redundancy allocation based on a 1-D local bitmap. Two BIRA algorithms for supporting two different redundancy organizations are also proposed. Simulation results show that the proposed BIRA scheme can provide high repair rate (i.e., the ratio of the number of repaired memories to the number of defective memories) for the RAMs with different fault distributions. Experimental results show that the hardware overhead of the BIRA design is only about 2.9% for an 8192 64-bit RAM with two spare rows and two spare columns. Also, the ratio of the BIRA analysis time to the test time is only about 0.02% if the March-CW test is performed. Furthermore, a simulation flow is proposed to determine the size of the 1-D local bitmap such that the BIRA algorithm can provide the best repair rate using the smallest-size 1-D local bitmap.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A new solutions for continuous optimization functions by using bacterial foraging optimization and particle swarm optimization algorithms
Nowadays, optimization algorithm has good efficiency in solving complicated optimization problems. The main capabilities of theses algorithms are the ability to search in very big spaces in short time, escape from local optimal points, low computational costs and easy implementation. Therefore, one of the popular methods for solve complicated optimization is to use optimization method based on swarm intelligence. In this paper, we discuss about Bacterial Foraging Optimization Algorithm (BFOA) and Particle Swarm Optimization (PSO) in continuous optimization area and use them in minimizing the number of continuous functions. The obtained results indicated that PSO had better efficiency to solve continuous optimization problems.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Traffic density estimation, vehicle classification and stopped vehicle detection for traffic surveillance system using predefined traffic videos
In this paper we present vehicle density estimation, vehicle classification and stopped vehicle detection system for outdoor traffic surveillance is presented. It is important to know the road traffic density in predefined traffic videos especially in mega cities for signal control and effective traffic management. In recent years, video monitoring and surveillance systems have been widely used in traffic surveillance system. Hence, traffic density estimation and vehicle classification can be achieved using video monitoring systems. In vehicle detection methods for several review of literature, only the detection of vehicles in frames of the given video. The stopped vehicle detection is based on the pixel history. This methodology has proved to be quite robust in terms of different weather conditions, lighting and image quality. Some experiments carried out on some highway scenarios demonstrate the robustness of the proposed solution.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Calculation of degree of difficulty and measurement of readability of Italian texts of the KPG
In the context of this article, the construction of software for language proficiency level and difficulty measurement of language proficiency tests was sought. The main software goal can not help with identification issues, and also the recognition of the text can not be mitigated by using common scoring systems, including the types of recognition calculations. This software accepts various Italian language test subjects whether they are graded or not, and after analyzing the text, ranks these texts at the corresponding Italian language proficiency levels and calculates the degree of difficulty of the test. The selection of subjects and their inclusion is of course done by the sampling method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
E-governance applications in public healthcare for rural areas of Uttarakhand
Current scenario in healthcare sector in Uttarakhand is disappointing. Public health service run by Government is overburdened and collapsing. Hilly geographical size, increase population density, lack of transport, inaccessibility, illiteracy, poverty, poor nutritional status, diversity in food habit and life style are various impediments. Government priorities for providing health service to rural areas is yet to be fulfilled. At this stage low budget from state for health, lack of funds and coordination have triggered down trend in health services in rural and hilly areas. As medical science is fast developing and information resource is pouring in, there is urgent need for dissemination knowledge by interlinking primary, secondary and tertiary level health centers using the ICT and e-Governance applications. This will help health personal to deliver high quality services. IT giants are experimenting for e-Governance application in health sector both in Government and private hospitals, This paper reviews use of e-Governance through ICT applications at National Level and also in Uttarakhand province. It presents facts on tele-medicine, tele-referal services and health information dissemination by Video conferencing, Some suggested services using ICT in healthcare are explained in this paper also. Use of Mobile phone to communicate health related alerts using SMS services in rural areas suggested here in this paper.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of Essbase application using oracle Hyperion
Essbase is multidimensional database software that is optimized for planning, analysis, and management-reporting applications. Essbase uniquely blends an innovative technical design with an open, client-server architecture. The product enables you to extend decision support systems beyond ad hoc queries and reports on historical performance to dynamic, operational systems that combine historical analysis and future planning .Oracle Hyperion Essbase is the industry-leading multi-dimensional online analytical processing server, providing a rich environment for effectively developing custom analytic and enterprise performance management applications. By leveraging its self-managed, rapid application development capabilities, business users can quickly model complex business scenarios. In this paper we see how Oracle Hyperion Essbase supports extremely fast query response times for vast numbers of users, large data sets, and complex business models.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A systematic approach and model generation for preventing phishing attacks
Phishing is one kind of Cyber crime in which phisher is doing online theft of secret information like username, password, credit card numbers etc. from the user. This type of crime growing everyday and also creates lot of social and financial issues. Such type of crime causes the direct or indirect damage to the victim. There are number of anti-phishing solution available today, yet the cases of phishing attacks cannot be removed because of several reasons. Here in this paper the model generated namely Phishing Prevention Model which explain what the causes of phishing are, how the phishing attack has been taken place and how we can prevent it using Cyber law.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]