-
Boundedness and Asymptotic Behaviour of the Solutions for a Third- Order Fuzzy Difference Equation
Xiaotong Jing,
Yonghong Li,
Changyou Wang
Issue:
Volume 7, Issue 1, March 2019
Pages:
1-11
Received:
21 December 2018
Accepted:
14 January 2019
Published:
30 January 2019
Abstract: Our aim in this paper is to investigate the dynamics of a third-order fuzzy difference equation. By using new iteration method for the more general nonlinear difference equations and inequality skills as well as a comparison theorem for the fuzzy difference equation, some sufficient conditions which guarantee the existence, unstability and global asymptotic stability of the equilibriums for the nonlinear fuzzy system are obtained. Moreover, some numerical solutions of the equation describing the system are given to verify our theoretical results.
Abstract: Our aim in this paper is to investigate the dynamics of a third-order fuzzy difference equation. By using new iteration method for the more general nonlinear difference equations and inequality skills as well as a comparison theorem for the fuzzy difference equation, some sufficient conditions which guarantee the existence, unstability and global a...
Show More
-
Research on the Development of Internet of Vehicles Technology
Issue:
Volume 7, Issue 1, March 2019
Pages:
12-18
Received:
24 December 2018
Accepted:
15 January 2019
Published:
4 February 2019
Abstract: Internet of vehicles (IOV) is a large interactive network composed of vehicles' position, speed, route and other information. Through global positioning system (GPS), radio frequency identification (RFID), sensor, camera image processing and other devices, the vehicle can complete its own environment and state information collection; Through Internet technology, all vehicles can transfer all kinds of information to the central processing unit (CPU). Through computer technology, this mass of vehicle information can be analyzed and processed to calculate the best route for different vehicles, timely report the road condition and so forth. The development of IOV will have a comprehensive driving effect on social construction in many aspects, such as intelligent traffic management, energy conservation, emission reduction and safe driving. In general, mature industrial base, huge consumer market and important strategic significance make the IOV become the focus of large-scale development and application of the IOV in the industry in the world, which has won strong attention from all parties. There is no strict definition for the so-called IOV. To put it simply, it is to realize the coordinated interaction of people, vehicles, roads and the environment through wireless communication and other means by taking cars as nodes in the information network, so as to realize intelligent transportation. However, since its birth, the IOV has always been faced with the lack of a unified management situation. In this paper, we studied the main technology involved in the IOV, the existing problems and so on.
Abstract: Internet of vehicles (IOV) is a large interactive network composed of vehicles' position, speed, route and other information. Through global positioning system (GPS), radio frequency identification (RFID), sensor, camera image processing and other devices, the vehicle can complete its own environment and state information collection; Through Intern...
Show More
-
Effectiveness Level of Online Plagiarism Detection Tools in Arabic
Ghadah Mohammed Abdullah Adel,
Yuping Wang
Issue:
Volume 7, Issue 1, March 2019
Pages:
19-24
Received:
10 April 2019
Published:
23 May 2019
Abstract: Plagiarism affects education quality, academic research results and publishers reputation. Consequently, many online plagiarism tools have been developed to detect and reduce such affects. However, most of these tools were evaluated according to their abilities to reveal different rates of plagiarism in English text. While evaluating their capability in detecting different plagiarism rates from different patterns in Arabic text is still vague. This paper aims to evaluate the efficiency level of online academic plagiarism detection tools (PlagScan, iThenticate and CheckForPlagiarism.net) in detecting different plagiarism patterns’ amounts in Arabic language. A comparison was made between, PlagScan, iThenticate and CheckForPlagiarism.net, detection capabilities by merging university theses and dissertations with eight plagiarism patterns (whole document, some parts, insertion, sentence split or join, phrase reordering, syntax, lexical and morpho-syntactic) with the ratio between 90% , 30% and 10% respectively. Experiment’s results showed that iThenticate is the most efficient online plagiarism detection tool in Arabic for eight plagiarism patterns between 90% and 80% ratio Arabic language. While none of the three online plagiarism detection tools are efficient for less than 80% plagiarized text from any of the eight plagiarism patterns. Hence, mechanism enhancements and consideration to the Arabic anguage structure are recommended for online plagiarism detection tool in Arabic.
Abstract: Plagiarism affects education quality, academic research results and publishers reputation. Consequently, many online plagiarism tools have been developed to detect and reduce such affects. However, most of these tools were evaluated according to their abilities to reveal different rates of plagiarism in English text. While evaluating their capabili...
Show More
-
Modifying Broker Policy for Better Distribution of the Load Over Geo-distributed Datacenters
Louai Sheikhani,
Weichao Ding,
Jonathan Talwana,
Chunhua Gu
Issue:
Volume 7, Issue 1, March 2019
Pages:
25-30
Received:
14 March 2019
Published:
15 June 2019
Abstract: As an increasing number of businesses move toward Cloud based services, issues such as reduce response time, optimize cost, and load balance over data centers are important factor that need to be studied. Selecting the suitable data center to handle the user request is affecting those factors directly. The Broker policy determines which data center should service the request from each user base; so choosing appropriate policy can improve the performance noticeably. One of the benchmarks policies is service proximity-based that routing the request to the data center, which has lowest network latency or minimum transmission delay from a user base. If there are more than one data centers in a region in close proximity, then one of the data centers is selected at random to service the incoming request. However, other factors such as cost, workload, number of virtual machines, processing time etc., are not taken into consideration. Randomly selected data center gives undesirable results in terms of response time, data processing time, cost, and other parameters. this work propose modifying that policy by applying new schedule algorithm that control the load balance. the results showed that the using of this algorithm instead of the random selection would improve the distribution of the workload over the available datacenters noticeably.
Abstract: As an increasing number of businesses move toward Cloud based services, issues such as reduce response time, optimize cost, and load balance over data centers are important factor that need to be studied. Selecting the suitable data center to handle the user request is affecting those factors directly. The Broker policy determines which data center...
Show More
-
Efficient Hardware Implementation of Modular Arithmetic and Group Operation Over Prime Field
Sakib Absar,
Md Selim Hossain,
Yinan Kong
Issue:
Volume 7, Issue 1, March 2019
Pages:
31-38
Received:
5 May 2019
Published:
15 June 2019
Abstract: The need for secure communication over the network has increased drastically over recent years, and Elliptic Curve Cryptography (ECC) carries out a significant role in moving secured information. In this work, a hardware implementation of modular arithmetic and group operations over the prime field for an Elliptic Curve Cryptography Processor (ECP) for an efficient security system is proposed. The modular addition or subtraction operation takes only one clock cycle and the modular multiplication, which is designed using the interleaved modular multiplication method, requires 257 clock cycles. For elliptic curve group operation separate point doubling (PD) and point addition (PA) architectures are implemented in Jacobean coordinates. These new architectures are simulated in a Xilinx ISE 14.7. After that, the architectures are implemented in Xilinx Virtex-7 field-programmable gate array (FPGA) with the VHDL language. Proposed modular arithmetic and group operations can be utilized to design an Elliptic Curve Point Multiplication (ECPM).
Abstract: The need for secure communication over the network has increased drastically over recent years, and Elliptic Curve Cryptography (ECC) carries out a significant role in moving secured information. In this work, a hardware implementation of modular arithmetic and group operations over the prime field for an Elliptic Curve Cryptography Processor (ECP)...
Show More