The problem of mutual exclusion arises in distributed systems whenever shared resources are concurrently accessed by several sites. For correctness, it is required that shared resource must be accessed by a single site at a time. To decide, which site execute the critical section next, each site communicate with a set of other sites. A systematic approach is essential to formulate an accurate speciation. Formal methods are mathematical techniques that provide systematic approach for building and verification of model. We have used Event-B as a formal technique for construction of our model. Event-B is event driven approach which
is used to develop formal models of distributed systems .It supports generation and discharge of proof obligations arising due to consistency checking. In this paper, we outline a formal construction of model of Lamport's mutual exclusion algorithm for distributed system using Event-B. We have considered vector clock instead of using Lam-port's scalar clock for the purpose of message's time stamping
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
The intelligent agent based model is a popular approach in constructing Distributed Data Mining (DDM) systems to address scalable mining over large scale and ever increasing distributed data. In an agent based
distributed system, variety of agents coordinate and communicate with each other to perform the various
tasks of the Data Mining (DM) process. In this study a serial computing mode of a multi-agent system
(MAS) called Agent enabled Mining of Globally Strong Association Rules (AeMGSAR) is presented based
on the serial itinerary of the mobile agents. A Running environment is also designed for the implementation and performance study of AeMGSAR system.
Probability-Based Analysis to Determine the Performance of Multilevel Feedbac...Eswar Publications
Operating System may work on different types of CPU scheduling algorithms with different mechanism and concepts. The Multilevel Feedback Queue (MLFQ) Scheduling manages a variety of processes among various queues in a better and efficient manner. CPU scheduler appears transition mechanism over various queues. This paper is presented with various schemes of under a probability-based model. The scheduler has random movement over queues with given time quantum. This paper designs general transition model for its functioning
and justifying comparison under different scheduling schemes through a simulation study applied on different data sets in particular cases.
Experimental study of Data clustering using k- Means and modified algorithmsIJDKP
The k- Means clustering algorithm is an old algorithm that has been intensely researched owing to its ease
and simplicity of implementation. Clustering algorithm has a broad attraction and usefulness in
exploratory data analysis. This paper presents results of the experimental study of different approaches to
k- Means clustering, thereby comparing results on different datasets using Original k-Means and other
modified algorithms implemented using MATLAB R2009b. The results are calculated on some performance
measures such as no. of iterations, no. of points misclassified, accuracy, Silhouette validity index and
execution time
A novel nonlinear missile guidance law against maneuvering targets is designed based on the principles of partial stability. It is demonstrated that in a real approach which is adopted with actual situations, each state of the guidance system must have a special behavior and asymptotic stability or exponential stability of all states is not realistic. Thus, a new guidance law is developed based on the partial stability theorem in such a way that the behaviors of states in the closed-loop system are in conformity with a real guidance scenario that leads to collision. The performance of the proposed guidance law in terms of interception time and control effort is compared with the sliding mode guidance law by means of numerical simulations.
Developing Scheduler Test Cases to Verify Scheduler Implementations In Time-T...ijesajournal
Despite that there is a “one-to-many” mapping between scheduling algorithms and scheduler implementations, only a few studies have discussed the challenges and consequences of translating between these two system models. There has been an argument that a wide gap exists between scheduling theory and scheduling implementation in practical systems, where such a gap must be bridged to obtain an effective validation of embedded systems. In this paper, we introduce a technique called “Scheduler Test Case” (STC) aimed at bridging the gap between scheduling algorithms and scheduler implementations in single-processor embedded systems implemented using Time-Triggered Co-operative (TTC) architectures. We will demonstrate how the STC technique can provide a simple and systematic way for documenting, verifying (testing) and comparing various TTC scheduler implementations on particular hardware. However, STC is a generic technique that provides a black-box tool for assessing and predicting the behaviour of representative implementation sets of any real-time scheduling algorithm.
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
The intelligent agent based model is a popular approach in constructing Distributed Data Mining (DDM) systems to address scalable mining over large scale and ever increasing distributed data. In an agent based
distributed system, variety of agents coordinate and communicate with each other to perform the various
tasks of the Data Mining (DM) process. In this study a serial computing mode of a multi-agent system
(MAS) called Agent enabled Mining of Globally Strong Association Rules (AeMGSAR) is presented based
on the serial itinerary of the mobile agents. A Running environment is also designed for the implementation and performance study of AeMGSAR system.
Probability-Based Analysis to Determine the Performance of Multilevel Feedbac...Eswar Publications
Operating System may work on different types of CPU scheduling algorithms with different mechanism and concepts. The Multilevel Feedback Queue (MLFQ) Scheduling manages a variety of processes among various queues in a better and efficient manner. CPU scheduler appears transition mechanism over various queues. This paper is presented with various schemes of under a probability-based model. The scheduler has random movement over queues with given time quantum. This paper designs general transition model for its functioning
and justifying comparison under different scheduling schemes through a simulation study applied on different data sets in particular cases.
Experimental study of Data clustering using k- Means and modified algorithmsIJDKP
The k- Means clustering algorithm is an old algorithm that has been intensely researched owing to its ease
and simplicity of implementation. Clustering algorithm has a broad attraction and usefulness in
exploratory data analysis. This paper presents results of the experimental study of different approaches to
k- Means clustering, thereby comparing results on different datasets using Original k-Means and other
modified algorithms implemented using MATLAB R2009b. The results are calculated on some performance
measures such as no. of iterations, no. of points misclassified, accuracy, Silhouette validity index and
execution time
A novel nonlinear missile guidance law against maneuvering targets is designed based on the principles of partial stability. It is demonstrated that in a real approach which is adopted with actual situations, each state of the guidance system must have a special behavior and asymptotic stability or exponential stability of all states is not realistic. Thus, a new guidance law is developed based on the partial stability theorem in such a way that the behaviors of states in the closed-loop system are in conformity with a real guidance scenario that leads to collision. The performance of the proposed guidance law in terms of interception time and control effort is compared with the sliding mode guidance law by means of numerical simulations.
Developing Scheduler Test Cases to Verify Scheduler Implementations In Time-T...ijesajournal
Despite that there is a “one-to-many” mapping between scheduling algorithms and scheduler implementations, only a few studies have discussed the challenges and consequences of translating between these two system models. There has been an argument that a wide gap exists between scheduling theory and scheduling implementation in practical systems, where such a gap must be bridged to obtain an effective validation of embedded systems. In this paper, we introduce a technique called “Scheduler Test Case” (STC) aimed at bridging the gap between scheduling algorithms and scheduler implementations in single-processor embedded systems implemented using Time-Triggered Co-operative (TTC) architectures. We will demonstrate how the STC technique can provide a simple and systematic way for documenting, verifying (testing) and comparing various TTC scheduler implementations on particular hardware. However, STC is a generic technique that provides a black-box tool for assessing and predicting the behaviour of representative implementation sets of any real-time scheduling algorithm.
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...ijseajournal
Shortest path (SP) algorithms, such as the popular Dijkstra algorithm has been considered as the “basic
building blocks” for many advanced transportation network models. Dijkstra algorithm will find the
shortest time (ST) and the corresponding SP to travel from a source node to a destination node.
Applications of SP algorithms include real-time GPS and the Frank-Wolfe network equilibrium.
For transportation engineering students, the Dijkstra algorithm is not easily understood. This paper
discusses the design and development of a software that will help the students to fully understand the key
components involved in the Dijkstra SP algorithm. The software presents an intuitive interface for
generating transportation network nodes/links, and how the SP can be updated in each iteration. The
software provides multiple visual representations of colour mapping and tabular display. The software can
be executed in each single step or in continuous run, making it easy for students to understand the Dijkstra
algorithm. Voice narratives in different languages (English, Chinese and Spanish) are available.A demo
video of the Dijkstra Algorithm’s animation and result can be viewed online from any web browser using
the website: http://www.lions.odu.edu/~imako001/dijkstra/demo/index.html.
Approaches to online quantile estimationData Con LA
Data Con LA 2020
Description
This talk will explore and compare several compact data structures for estimation of quantiles on streams, including a discussion of how they balance accuracy against computational resource efficiency. A new approach providing more flexibility in specifying how computational resources should be expended across the distribution will also be explained. Quantiles (e.g., median, 99th percentile) are fundamental summary statistics of one-dimensional distributions. They are particularly important for SLA-type calculations and characterizing latency distributions, but unlike their simpler counterparts such as the mean and standard deviation, their computation is somewhat more expensive. The increasing importance of stream processing (in observability and other domains) and the impossibility of exact online quantile calculation together motivate the construction of compact data structures for estimation of quantiles on streams. In this talk we will explore and compare several such data structures (e.g., moment-based, KLL sketch, t-digest) with an eye towards how they balance accuracy against resource efficiency, theoretical guarantees, and desirable properties such as mergeability. We will also discuss a recent variation of the t-digest which provides more flexibility in specifying how computational resources should be expended across the distribution. No prior knowledge of the subject is assumed. Some familiarity with the general problem area would be helpful but is not required.
Speaker
Joe Ross, Splunk, Principal Data Scientist
RELIABILITY ASSESSMENT OF EMBEDDED SYSTEMS USING STOPWATCH PETRI NETSIJCSEA Journal
In this paper, we propose a reliability approach in which feared events define reliability requirements and
taking them into account allows to design systems which will be able to avoid the drift towards a feared
state. The description of feared scenarios since the system design phase enables us to understand the
reasons of the feared behavior in order to envisage the necessary reconfigurations and choose safe
architectures. In order to face the increasing complexity of embedded systems and to represent the
suspension and resumption of task execution we propose to extract directly feared scenarios from
Stopwatch Petri net model avoiding the generation of the associated reachability graph and the eternal
combinative explosion problem.
Automatic time series forecasting using nonlinear autoregressive neural netwo...journalBEEI
This study aims to determine an automatic forecasting method of univariate time series, using the nonlinear autoregressive neural network model with exogenous input (NARX). In this automatic setting, users only need to supply the input of time series. Then, an automatic forecasting algorithm sets up the appropriate features, estimate the parameters in the model, and calculate forecasts, without the users’ intervention. The algorithm method used include preprocessing, tests for trends, and the application of first differences. The time series were tested for seasonality, and seasonal differences were obtained from a successful analysis. These series were also linearly scaled to [−1, +1]. The autoregressive lags and hidden neurons were further selected through the stepwise and optimization algorithms, respectively. The 20 NARX models were fitted with different random starting weights, and the forecasts were combined using the ensemble operator, in order to obtain the final product. This proposed method was applied to real data, and its performance was compared with several available automatic models in the literature. The forecasting accuracy was also measured by mean squared error (MSE) and mean absolute percent error (MAPE), and the results showed that the proposed method outperformed the other automatic models.
Using queuing theory to describe adaptive mathematical models of computing sy...journalBEEI
The article describes the issues of preparation and verification of mathematical models of computing systems with resource virtualization. The object of this study is to verify of mathematical models of computer systems with virtualization experimentally by creating a virtual server on the host platform and monitoring its characteristics under load. Known models cannot be applied to the aircraft with virtualization, because they do not allow a comprehensive analysis to determine the most effective option for the implementation of the initial allocation of resources and its optimization for a specific sphere and task of use. The article for the study used a closed queueing network. Simple models for the analysis of various structures of computer systems are experimentally obtained. To implement the properties of adaptability in the models, triggers are used that monitor and adjust the power of the processing channel in individual Queuing systems, depending on the specified conditions. Experiments prove the obtained results reliable and usable as a flexible tool for studying the virtualization properties when structuring computing systems. This knowledge could be of use for businesses interested in optimizing the server configuration for their IT infrastructure.
Adaptive Control of a Robotic Arm Using Neural Networks Based ApproachWaqas Tariq
A new neural networks and time series prediction based method has been discussed to control the complex nonlinear multi variable robotic arm motion system in 3d environment without engaging the complicated and voluminous dynamic equations of robotic arms in controller design stage, the proposed method gives such compatibility to the manipulator that it could have significant changes in its dynamic properties, like getting mechanical loads, without need to change designs of the controller.
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the
context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities
market trading operations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
Selection of inputs is one of the most substantial components of classification algorithms for data mining and pattern recognition problems since even the best classifier will perform badly if the inputs are not selected very well. Big data and computational complexity are main cause of bad performance and low accuracy for classical classifiers. In other words, the complexity of classifier method is inversely proportional with its classification efficiency. For this purpose, two hybrid classifiers have been developed by using both type-1 and type-2 fuzzy c-means clustering with cascaded a classifier. In this proposed classifier, a large number of data points are reduced by using fuzzy c-means clustering before applied to a classifier algorithm as inputs. The aim of this study is to investigate the effect of fuzzy clustering on well-known and useful classifiers such as artificial neural networks (ANN) and support vector machines (SVM). Then the role of positive effects of these proposed algorithms were investigated on applied different data sets.
A TALE of DATA PATTERN DISCOVERY IN PARALLELJenny Liu
In the era of IoTs and A.I., distributed and parallel computing is embracing big data driven and algorithm focused applications and services. With rapid progress and development on parallel frameworks, algorithms and accelerated computing capacities, it still remains challenging on deliver an efficient and scalable data analysis solution. This talk shares a research experience on data pattern discovery in domain applications. In particular, the research scrutinizes key factors in analysis workflow design and data parallelism improvement on cloud.
With the development of information security, the traditional image encryption methods have become
outdated. Because of amply using images in the transmission process, it is important to protect the confidential image
data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve
the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random
appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel
values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both
position and pixel values. Experimental results show that the new algorithm improves the image security effectively to
avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image
safe and reliable transmission.
Formal Verification of Distributed Checkpointing Using Event-Bijcsit
The development of complex system makes challenging task for correct software development. Due to faulty
specification, software may involve errors. The traditional testing methods are not sufficient to verify the
correctness of such complex system. In order to capture correct system requirements and rigorous
reasoning about the problems, formal methods are required. Formal methods are mathematical techniques
that provide precise specification of problems with their solutions and proof of correctness. In this paper,
we have done formal verification of check pointing process in a distributed database system using Event B.
Event-B is an event driven formal method which is used to develop formal models of distributed database
systems. In a distributed database system, the database is stored at different sites that are connected
together through the network. Checkpoint is a recovery point which contains the state information about
the site. In order to do recovery of a distributed transaction a global checkpoint number (GCPN) is
required. A global checkpoint number decides which transaction will be included for recovery purpose. All
transactions whose timestamp are less than global checkpoint number will be marked as before checkpoint
transaction (BCPT) and will be considered for recovery purpose. The transactions whose timestamp are
greater than GCPN will be marked as after checkpoint transaction (ACPT) and will be part of next global
checkpoint number.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Grid computing is a modularized way of structuring network resources so as to share the information and resources, to perform heavily intense problems. Grid computing is a part of distributed processing which allows the distribution of the problem over multiple computational resources. The formation of grid decides the computation cost, the performance metrics of the operation to be carried out. The grid computing favours the formation of an adhoc structure formed at the time of request (it does not hold an infrastructure) that is termed as virtual organization. This paper presents dynamic source routing for modeling virtual organization.
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...ijseajournal
Shortest path (SP) algorithms, such as the popular Dijkstra algorithm has been considered as the “basic
building blocks” for many advanced transportation network models. Dijkstra algorithm will find the
shortest time (ST) and the corresponding SP to travel from a source node to a destination node.
Applications of SP algorithms include real-time GPS and the Frank-Wolfe network equilibrium.
For transportation engineering students, the Dijkstra algorithm is not easily understood. This paper
discusses the design and development of a software that will help the students to fully understand the key
components involved in the Dijkstra SP algorithm. The software presents an intuitive interface for
generating transportation network nodes/links, and how the SP can be updated in each iteration. The
software provides multiple visual representations of colour mapping and tabular display. The software can
be executed in each single step or in continuous run, making it easy for students to understand the Dijkstra
algorithm. Voice narratives in different languages (English, Chinese and Spanish) are available.A demo
video of the Dijkstra Algorithm’s animation and result can be viewed online from any web browser using
the website: http://www.lions.odu.edu/~imako001/dijkstra/demo/index.html.
Approaches to online quantile estimationData Con LA
Data Con LA 2020
Description
This talk will explore and compare several compact data structures for estimation of quantiles on streams, including a discussion of how they balance accuracy against computational resource efficiency. A new approach providing more flexibility in specifying how computational resources should be expended across the distribution will also be explained. Quantiles (e.g., median, 99th percentile) are fundamental summary statistics of one-dimensional distributions. They are particularly important for SLA-type calculations and characterizing latency distributions, but unlike their simpler counterparts such as the mean and standard deviation, their computation is somewhat more expensive. The increasing importance of stream processing (in observability and other domains) and the impossibility of exact online quantile calculation together motivate the construction of compact data structures for estimation of quantiles on streams. In this talk we will explore and compare several such data structures (e.g., moment-based, KLL sketch, t-digest) with an eye towards how they balance accuracy against resource efficiency, theoretical guarantees, and desirable properties such as mergeability. We will also discuss a recent variation of the t-digest which provides more flexibility in specifying how computational resources should be expended across the distribution. No prior knowledge of the subject is assumed. Some familiarity with the general problem area would be helpful but is not required.
Speaker
Joe Ross, Splunk, Principal Data Scientist
RELIABILITY ASSESSMENT OF EMBEDDED SYSTEMS USING STOPWATCH PETRI NETSIJCSEA Journal
In this paper, we propose a reliability approach in which feared events define reliability requirements and
taking them into account allows to design systems which will be able to avoid the drift towards a feared
state. The description of feared scenarios since the system design phase enables us to understand the
reasons of the feared behavior in order to envisage the necessary reconfigurations and choose safe
architectures. In order to face the increasing complexity of embedded systems and to represent the
suspension and resumption of task execution we propose to extract directly feared scenarios from
Stopwatch Petri net model avoiding the generation of the associated reachability graph and the eternal
combinative explosion problem.
Automatic time series forecasting using nonlinear autoregressive neural netwo...journalBEEI
This study aims to determine an automatic forecasting method of univariate time series, using the nonlinear autoregressive neural network model with exogenous input (NARX). In this automatic setting, users only need to supply the input of time series. Then, an automatic forecasting algorithm sets up the appropriate features, estimate the parameters in the model, and calculate forecasts, without the users’ intervention. The algorithm method used include preprocessing, tests for trends, and the application of first differences. The time series were tested for seasonality, and seasonal differences were obtained from a successful analysis. These series were also linearly scaled to [−1, +1]. The autoregressive lags and hidden neurons were further selected through the stepwise and optimization algorithms, respectively. The 20 NARX models were fitted with different random starting weights, and the forecasts were combined using the ensemble operator, in order to obtain the final product. This proposed method was applied to real data, and its performance was compared with several available automatic models in the literature. The forecasting accuracy was also measured by mean squared error (MSE) and mean absolute percent error (MAPE), and the results showed that the proposed method outperformed the other automatic models.
Using queuing theory to describe adaptive mathematical models of computing sy...journalBEEI
The article describes the issues of preparation and verification of mathematical models of computing systems with resource virtualization. The object of this study is to verify of mathematical models of computer systems with virtualization experimentally by creating a virtual server on the host platform and monitoring its characteristics under load. Known models cannot be applied to the aircraft with virtualization, because they do not allow a comprehensive analysis to determine the most effective option for the implementation of the initial allocation of resources and its optimization for a specific sphere and task of use. The article for the study used a closed queueing network. Simple models for the analysis of various structures of computer systems are experimentally obtained. To implement the properties of adaptability in the models, triggers are used that monitor and adjust the power of the processing channel in individual Queuing systems, depending on the specified conditions. Experiments prove the obtained results reliable and usable as a flexible tool for studying the virtualization properties when structuring computing systems. This knowledge could be of use for businesses interested in optimizing the server configuration for their IT infrastructure.
Adaptive Control of a Robotic Arm Using Neural Networks Based ApproachWaqas Tariq
A new neural networks and time series prediction based method has been discussed to control the complex nonlinear multi variable robotic arm motion system in 3d environment without engaging the complicated and voluminous dynamic equations of robotic arms in controller design stage, the proposed method gives such compatibility to the manipulator that it could have significant changes in its dynamic properties, like getting mechanical loads, without need to change designs of the controller.
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the
context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities
market trading operations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
Selection of inputs is one of the most substantial components of classification algorithms for data mining and pattern recognition problems since even the best classifier will perform badly if the inputs are not selected very well. Big data and computational complexity are main cause of bad performance and low accuracy for classical classifiers. In other words, the complexity of classifier method is inversely proportional with its classification efficiency. For this purpose, two hybrid classifiers have been developed by using both type-1 and type-2 fuzzy c-means clustering with cascaded a classifier. In this proposed classifier, a large number of data points are reduced by using fuzzy c-means clustering before applied to a classifier algorithm as inputs. The aim of this study is to investigate the effect of fuzzy clustering on well-known and useful classifiers such as artificial neural networks (ANN) and support vector machines (SVM). Then the role of positive effects of these proposed algorithms were investigated on applied different data sets.
A TALE of DATA PATTERN DISCOVERY IN PARALLELJenny Liu
In the era of IoTs and A.I., distributed and parallel computing is embracing big data driven and algorithm focused applications and services. With rapid progress and development on parallel frameworks, algorithms and accelerated computing capacities, it still remains challenging on deliver an efficient and scalable data analysis solution. This talk shares a research experience on data pattern discovery in domain applications. In particular, the research scrutinizes key factors in analysis workflow design and data parallelism improvement on cloud.
With the development of information security, the traditional image encryption methods have become
outdated. Because of amply using images in the transmission process, it is important to protect the confidential image
data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve
the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random
appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel
values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both
position and pixel values. Experimental results show that the new algorithm improves the image security effectively to
avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image
safe and reliable transmission.
Formal Verification of Distributed Checkpointing Using Event-Bijcsit
The development of complex system makes challenging task for correct software development. Due to faulty
specification, software may involve errors. The traditional testing methods are not sufficient to verify the
correctness of such complex system. In order to capture correct system requirements and rigorous
reasoning about the problems, formal methods are required. Formal methods are mathematical techniques
that provide precise specification of problems with their solutions and proof of correctness. In this paper,
we have done formal verification of check pointing process in a distributed database system using Event B.
Event-B is an event driven formal method which is used to develop formal models of distributed database
systems. In a distributed database system, the database is stored at different sites that are connected
together through the network. Checkpoint is a recovery point which contains the state information about
the site. In order to do recovery of a distributed transaction a global checkpoint number (GCPN) is
required. A global checkpoint number decides which transaction will be included for recovery purpose. All
transactions whose timestamp are less than global checkpoint number will be marked as before checkpoint
transaction (BCPT) and will be considered for recovery purpose. The transactions whose timestamp are
greater than GCPN will be marked as after checkpoint transaction (ACPT) and will be part of next global
checkpoint number.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Grid computing is a modularized way of structuring network resources so as to share the information and resources, to perform heavily intense problems. Grid computing is a part of distributed processing which allows the distribution of the problem over multiple computational resources. The formation of grid decides the computation cost, the performance metrics of the operation to be carried out. The grid computing favours the formation of an adhoc structure formed at the time of request (it does not hold an infrastructure) that is termed as virtual organization. This paper presents dynamic source routing for modeling virtual organization.
A Model of Local Area Network Based Application for Inter-office Communicationtheijes
In most organizations, information circulation within offices poses a problem because clerical officers and office messengers usually dispatch letters and memos from one office to another manually. Sequel to this circulation procedure, implementation of decisions is always difficult and slow. On one hand, clerical officers sometimes divulge confidential information during the process of receiving and sending of mails and other documents. On the other hand, money is wasted on the purchase of paper for printing. However, it is cheerful to learn that technology has made it possible for staff, structures and infrastructures to control and share organization resources; hardware; software and knowledge by means of modern electronic communication. One cannot deny the fact that the flow of information is very imperative in every organization as it determines the effectiveness of decision-making and implementation. This feat can be achieved using Object-Oriented System Analysis and Design Methodology (OSADM). This is structurally analyzed with Use Case Diagram (UCD), Class Diagram, Sequence Diagram, State Transition Diagram, and Activity Diagram. Moreover, the system is coded with Java 1.6 version, in a client-server network running on star topology in LAN environment. This is the concept of this paper. The system is designed to work in two parts – the control part that is installed on the server; and the messenger part that is installed in the clients. This research work integrates the utility and organization resources into a shared center for all users to have access to; and for free communication during office hours.
Checkpoint and recovery protocols are commonly used in distributed applications for providing fault
tolerance. A distributed system may require taking checkpoints from time to time to keep it free of arbitrary
failures. In case of failure, the system will rollback to checkpoints where global consistency is preserved.
Checkpointing is one of the fault-tolerant techniques to restore faults and to restart job fast. The algorithms
for checkpointing on distributed systems have been under study for years.
It is known that checkpointing and rollback recovery are widely used techniques that allow a distributed
computing to progress inspite of a failure.There are two fundamental approaches for checkpointing and
recovery.One is asynchronus approach, process take their checkpoints independenty.So,taking checkpoints
is very simple but due to absence of a recent consistent global checkpoint which may cause a rollback of
computation.Synchronus checkpointing approach assumes that a single process other than the application
process invokes the checkpointing algorithm periodically to determine a consistent global checkpoint.
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
Since the inception of internet many methods have been devised to keep untrusted and malicious packets away
from a user’s system . The traffic / packet classification can be used
as an important tool to detect intrusion in the system. Using Machine Learning as an efficient statistical based
approach for classifying packets is a novel method in practice today . This paper emphasizes upon using an
advanced string kernel method within a support vector machine to classify packets .
There exists a paper related to a similar problem using Machine Learning [2]. But the researches mentioned in
their paper are not up-to date and doesn’t account for modern day
string kernels that are much more efficient . My work extends their research by introducing different approaches
to classify encrypted / unencrypted traffic / packets .
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETScsandit
Multi-agent systems are asynchronous and distributed computer systems. These characteristics make them also a discrete-event dynamic system. It is, therefore, important to analyze the behavior of such systems to ensure that they terminate correctly and satisfy other important properties. This paper presents a formal modeling and analysis of MAS, based on Well-formed Nets, in order to ensure the absence of any undesired or unexpected behavior. To validate our ontribution, we consider the timetable problem, which is a multi-agent resource allocation problem.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...ijceronline
The focus of the paper is to generate an advance algorithm of resource allocation and load balancing that can deduced and avoid the dead lock while allocating the processes to virtual machine. In VM while processes are allocate they executes in queue , the first process get resources , other remains in waiting state .As rest of VM remains idle . To utilize the resources, we have analyze the algorithm with the help of First-Come, First-Served (FCFS) Scheduling, Shortest-Job-First (SJR) Scheduling, Priority Scheduling, Round Robin (RR) and CloudSIM Simulator.
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. 478 Computer Science & Information Technology (CS & IT)
In this paper, formal construction of non token based mutual exclusion algorithm for distributed
system is outlined. We have considered Lamport's algorithm [1], [3] for formal development of
our model. In this algorithm, each site maintains a request queue, which contains its own times
tamped request for mutual exclusion and also request messages received from other sites [3]. If
any site Sx wants to enter the critical section, it broadcasts a time stamped request message
REQUEST-X to all the sites and makes an entry for request message REQUEST-X in its request
queue. When a site Sy receives the request message REQUEST-X sent by site Sx, It makes an
entry of Sx's request( REQUEST-X)in its request queue and returns a time stamped reply message
REPLY-Y to site Sx. After receiving the time stamped reply messages from all the sites, there
questing site Sx enters the critical section if following conditions hold :
1. Time stamp of all received messages are greater than time stamp of request
message REQUEST-X.
2. Time stamp of REQUEST-X is minimum among all requests present in
request queue of site Sx.
After executing the critical section site Sx removes the entry of request message (REQUEST-X)
from its request queue and broadcasts a time stamped release message RELEASE-X to all the
sites. When a site Sy receives the release message RELEASE-X from site Sx, It removes Sx's
request REQUEST-X from its request queue. When a site removes a request from its request
queue then it may possible that next minimum times tamped request is own request, enabling
it to enter the critical section. This algorithm executes critical section requests in the increasing
order of timestamps.
A functional specification of system describes its behavior. A specification contains significant
information about the system. The B Method provides a systematic approach to formulate an
accurate specification. we develop our model in the spirit embedded in Event-B. The model
contains a BROADCAST-REQ event that models the event for requesting critical section. In this
event a requesting site broadcasts a time stamped request message to all sites. Delivery of time
stamped request message is shown by DELIVER-REQ event. The event REPLY models the event
for sending time stamped reply message from a site (receiver of request message) to requesting
site. The event REPLY-RECEIVE models the receiving of time stamped reply message at the
requesting site. At the same time this event also count how many sites have sent the reply
messages. The execution and releasing of critical section is shown by the event EXECUTE-CS
and RELEASE-CS respectively. After the execution of critical section, the requesting site
broadcasts a timestamped release message to all sites. The broadcasting of time stamped release
message is shown by the event BROADCAST-RELEASE. The event DELIVER-RELEASE models
the delivery of times tamped release message at all sites.
The remainder of this paper is organized as follows: Section 2 briefly outline Event B and Rodin
platform, Section 3 describes system model and informal description about events, Section 4
presents Event−B Model of mutual exclusion for distributed system. Section 5 concludes the
paper
3. Computer Science & Information Technology (CS & IT) 479
2. EVENT-B AND RODIN PLATFORM
The B Method [5], [6], [7] is a model oriented state based method. It represent the complete
mathematical development of a Discrete Transition System. Event-B represents a further
evolution of the B method, which has been simplified and is now centered around the general
notion of events. Event-B [8], [9],[10], [11], [12],[13], [14], [15], [16], [17] is event driven
approach used to develop formal models of distributed systems. It is made of several components
of two kinds: machines and contexts. Machines represent the dynamic part of model. This part is
used to provide behavioral properties of model. It contains the variables, invariants, theorems,
and events of a project. A machine is made of a state, which is defined by means of variables.
Variables correspond to mathematical objects: sets, binary relations, functions, numbers, etc.
These variables are constrained by invariants and these invariants are to be preserved while
change the value of variables. The theorem of machine must follow from the context and the
invariants of that machine. Moreover, a machine can be refined by other machines, but each
machine can refine only one machine. Contexts contain the static part of model. It contains sets,
constants, axioms, theorems. Sets may be enumerated or carrier. Axioms are used to describe the
properties of those sets and constants. The context may be seen by machine directly or indirectly.
Besides its state, a machine contains a number of events which specify how the state may evolve.
An event is made up of three elements its name, guards and actions. The guards are the necessary
conditions for the event to occur. An event known as initialization event has no guard and it gives
initial position of the model. An event can be specified in one of following three forms:
Where k denotes parameters that are local to event, v denotes variable of machine containing the
event, P(...) is a predicate denoting the guards of event and S(...) denotes the actions that updates
some variables. Event-B notations are set theoretic notations. The syntax and description of
notations are outlined in [10].
The Event-B Method requires the discharge of proof obligations for consistency checking. What
is to be proved is stated in terms of proof obligations of a model. Proof obligations serve to verify
properties of a model. They also serve to demonstrate that a model is sound with respect to some
behavioral semantics. In this work, we have used Rodin platform. It is an open extensible tool for
specification and verification of Event-B. The tool provides a seamless integration between
modeling and proving. It also provide an environment for generation and discharge of proof
obligations. It is embedded by various plugins such as proof-obligation generator, model
checkers, provers, UML transformers, etc.
3. SYSTEM MODEL
We have considered a distributed system having a set of sites where every site maintains a request
queue. The request queue contains timestamped request messages. In our model, time stamping of
messages are done through vector clock [18]. In a system of vector clock, every site maintains a
4. 480 Computer Science & Information Technology (CS & IT)
vector of size N to represent what that site believes to be the logical time at all other sites (N is
the total number of sites in the system). Assume each site Si maintains a vector clock VTSi, where
VT Si (i)represents a local logical time at Si while VTSi(j) represents the site Si's latest knowledge of the
time at site Sj . Precisely VTSi(j) ( i ≠j )represents the local time at site Sj when the most recent
message was sent from Sj to Si directly or indirectly. Each time when a message is sent by any
particular site a vector time stamp is assigned to message. While sending a message M from site
Si to Sj , sender process Si updates its own time (ith entry of vector) by updating VTSi(i)as
VTSi(i):= VTSi(i)+ 1. The message time stamp VTM of message M is generated as VTM(k) :=
VTSi(k), ∀ k ∈ ( 1..N),,where N is the number of sites in system. A site Si increments its own local
time VTSi(i)only at the time of sending a message.
When a recipient site Sj receives a time stamped message it updates its knowledge by updating
own vector clock. Site Sj updates its vector clock VTSj afterthe delivery of message M as VTSj(k)
:= Max (VTSj(k),VTM(k)). Therefore, inthe vector clock of site Sj , VTSj(i) indicates the number of
messages delivered to site Sj sent by site Si. The delivery order of messages between every pair of
sites must follow FIFO order. The FIFO ordering property says that: If a particular site
broadcasts a message M1 before it broadcast a message M2, then each recipient process delivers
M1 before M2. The informal description of events are as follows:
1. Request for Critical Section: Any site which wants to enters the critical section, broadcasts a
time stamped request message to all the sites. When a site broadcasts a message it increments its
own vector time stamp by one and modified vector time stamp is assigned to message. It also
creates an entry of time stamped request message in its request queue.
2. Delivery of Request Message: When a site receives the time stamped request message, it makes
an entry of received request in its request queue. The delivery order of request message must
follow the FIFO order. This ensures that all the messages which are previously sent by requesting
site before the request message have already been delivered. During the delivery of request
message receiving site also updates its knowledge by updating own vector time stamp with the
time stamp of request message.
3. Reply to Requesting Site: After the delivery of timestamped request message at any site, it
sends a corresponding time stamped reply message to requesting site. For assigning time stamp to
message, a receiving site increments its own vector time stamp by one and modified vector time
stamp is assigned to reply message.
4. Receive Reply Message: The requesting site receives the times tamped reply message sent by
all sites. It makes an entry for each received reply message.The requesting site also count the total
number of replied site. Each time when it receives a reply message it increments the value of total
number of replied site by one. The requesting site also updates its vector time stamp with the time
stamp of replied messages.
5. Execution of Critical Section: After receiving the reply messages from all sites, a requesting
site enters critical section if the time stamp of all received messages are greater than time stamp
of its request message and also the time stamp of own request message is minimum among all
request messages present in request queue.
5. Computer Science & Information Technology (CS & IT) 481
6. Release Critical Section: After performing execution of critical section the requesting site
release it and removes the entry of request message from its request queue.
7. Broadcast Release Message: The requesting site broadcasts a time stamped release message to
all the sites so that they can also remove the entry of request message (which is previously sent by
it) from their request queue.
8. Receive Release Message: After the delivery of timestamped release message at any site, it
removes the entry of corresponding request message from its request queue and updates its vector
time stamp with the time stamp of release message.
4. EVENT-B MODEL OF MUTUAL EXCLUSION FOR DISTRIBUTED
SYSTEM
Our Event-B model contains a context and a machine having eight events. In a context seen by
machine SITE and MESSAGE represent carrier set. The status is defined as enumerated set
containing the element pending, reqcs, execs, releasecs. The type is also defined as enumerated
set and contains the element request, reply, release. Variable sender is defined as a partial
function from MESSAGE to SITE. A mapping of the form (m7→s)∈ sender indicates that
message m was sent by a site s. The variable msgsend is subset of MESSAGE and it contains only
those messages which are sent by any site. The variable reqsites is subset of SITE and it contains
only those sites which have sent request messages. The variable vtss represents vector time stamp
of site. It is declared as:
vtss ∈ SITE → (SITE → Natural)
It is a total function which maps every site to a vector function. The vector function maps each
site to a natural number. The 'Natural' represents a set of natural numbers in B. Therefore, vector
time stamp of any site Si, vtss(Si) is a vector. The length of vector depends on number of sites
present in the set SITE. Assume there are K sites in the system then vtss(Si) is a vector of
((S17→N1),(S27→ N2), (S37→ N3).........(Si7→ Ni)........(Sk7→ Nk)).
Every time when a message is sent by site Si, it increments its own clock value vtss(Si)(Si) by
one. Therefore, vector time stamp of site Si after sending single message is
((S17→N1),(S27→ N2), (S37→ N3)........(Si7→ Ni + 1)........(Sk7→ Nk)).
The variable vtsm represents vector time stamp of message. It is defined as:
6. 482 Computer Science & Information Technology (CS & IT)
It is a total function which maps every message to a vector function. Vector time stamp of any
message mm (vtsm(mm)) is also a vector. Every time when a message mm is sent by site Si, it
increments its own clock value by one and modified vector timestamp of site is assigned to
message mm. This creates thevector timestamp of message mm. The vtss(Si)(Si) represents the
number of messages sent by site Si. The description of other variables are as follows (see Fig. 1):
(i) The variable sitestatus is defined as a total function which maps each site to status. Thus every
site in the set SITE will have one of the following states;pending, reqcs, execs, releasecs.
(ii) The variable messagetype is defined as:
messagetype ∈ msgsend → type
It is a total function which maps every sent message to type. This ensures that every sent message
will have one of the following states; request, reply,release.
(iii) The variable requestqueue is declared as:
The operator ↔ defines the set of relations between SITE and request messages sent by
corresponding sites. A mapping of the form
7. Computer Science & Information Technology (CS & IT) 483
Fig. 2. Broadcasting of request message
requestqueue indicates that request queue of site ss has a request message m sent by site s.
Relational image of site Si under the relation requestqueue is represented by requestqueue[{Si}]
and it contains all request messages sent by corresponding sites i.e., if site Si receives three
request messages M1, M2,M3 sent by sites S1, S2, S3 respectively then requestqueue[{Si}]
contains The vector time stamp of messages can be
found from the variable vtsm.
(iv) When a site receives a request message it sends a corresponding reply message to requesting
site. A reply of request message sent by a site is represented by variable replymsgsent. It is
defined as:
A mapping indicates that a reply message m of a
request message mm has been sent by a site ss.
(v) The variable replymsgrec represents receiving of reply message of a request
message at requesting site.
(vi) The variable deliver represents delivery of message at a site. A mapping of form
deliver represents that a site s has delivered message m.
8. 484 Computer Science & Information Technology (CS & IT)
Fig. 3. Delivery of request message
(vii) The variable delorder represents delivery order of messages at a site. A mapping
indicate that site s has delivered m1 before m2.
(viii) The variable totalrepliedsite maps each site to 'Natural' number. Variable counter is a
integer type which is used to count number of sites from which requesting site has received the
reply messages. A mapping totalrepliedsite represents that 'n' number of sites has sent
reply message to site s. Each time when a requesting site receives a reply message from other
sites the value of counter is incremented by one. Initially, the status of all site is set to as pending
and the value of variable counter is zero. The vector time stamp of all sites and messages are
initialized with zero. The remaining variables contain null values.
Broadcasting and Delivery of Request Message : The event BROADCAST-REQ models the
broadcasting of request message (see Fig. 2). A site ss which wants to enters critical section,
broadcasts a timestamped request message mm to all site. The guard grd6 & grd7 ensures that
message mm has not been sent previously. At the time of broadcasting a message mm, site ss
increments its own clock value vtss(ss)(ss) by one (grd9). The modified vector timestamp of site
is assigned to message mm(act1). The guard grd10 is written as:
9. Computer Science & Information Technology (CS & IT) 485
Fig. 4. Sending of Reply Message
It ensures that request queue of site ss does not contain a request message mm which is sent by it.
The action act2 ensures broadcasting of message mm by site ss and actions act3, act4 add the site
ss and message mm in the set reqsites and msgsend repectively. The type of message mm is set to
as a request through the action act5. The action act6 adds the message mm sent by site ss in the
request queue of ss. The action act7 changes the status of site ss from pending to reqcs.
The event DELIVER-REQ models the delivery of request message (see Fig.3).The request
message mm (grd7) which is sent by site ss (grd8) has not been delivered at site s is ensured by
guard grd10. The site ss is requesting site is ensured by guard grd2. The guard grd9 ensures that
request message mm sent by site ss is not present in the request queue of site s. The guard grd11
ensures FIFO order delivery of message. It confirms that all the messages which are sent by site
ss before message mm has been already delivered to site s. As a consequence of occurrence of this
event delivery of message mm is done at sites (act1) and request is added in the request queue of
site s (act3). The delivery order at site s is also updated such that all messages delivered at site s
must
10. 486 Computer Science & Information Technology (CS & IT)
Fig. 5. Delivery of Reply Message
precede mm (act2). For maintaining the latest knowledge about the system, site
s updates its vector time stamp. It is expressed as act4 :
The operator (overload operator) updates the values in the vector clock of site s by
corresponding values in the vector timestamp of message mm (vtsm(mm)) wherever values in the
recipient site clock (vtss(s)(k)) are less than corresponding values in the message time stamp
(vtsm(mm)(k)).
Sending and Delivery of Reply Message: The event REPLY is given in Fig.4. This event models
the sending of timestamped reply message of corresponding request message. The message mm is
request message is ensured by guard grd5. A reply message m of request message mm has not
11. Computer Science & Information Technology (CS & IT) 487
been sent is ensured by guards grd7& grd9. The guard grd8 ensures that message m is a fresh
message and has not been previously sent by any site. As a consequences of occurrence of
this event, incremented vector time stamp value of site ss is assigned to message m (act1) and it is
added in the set msgsend (act2). The type of message m is set to as reply through action act3. The
action act4 makes site ss as a sender of
m. The action act5 is written as:
It updates variable replymsgsent and creates the entry of reply message m of request message mm
sent by site ss. The event REPLY-RECEIVE models the delivery of reply message at requesting
site (see Fig. 5). Site ss is a requesting site is ensured by guard grd2.
A request message mm has already been sent by site ss is ensured by guards grd4, grd5 & grd6. A
reply mesaage m of mm has been sent by site s is ensured by guard grd10. The guard grd13
ensures that reply m of corresponding request message mm has not been received by site ss. The
guard grd14 ensures FIFO order delivery of message. The action act1 makes the delivery of
message m at sites ss and action act2 updates the delivery order of messages such that all
messages delivered at site ss must precede m. The action act3 is written as:
This makes receiving of reply message m of request message mm at site ss. This event also count
how many sites have sent the reply message to requesting site. Each time when a reply message is
received by requesting site the value of total replied site is incremented by one (act4 & act5). For
maintaining the latest knowledge about the system, site ss updates its vector time stamp through
the action act6 .
Execution and Releasing of Critical Section: The EXECUTE-CS event, given in Fig. 6, models
the execution of critical section. A requesting site ss executes the critical section if following
condition holds:
(i) Site ss has received the reply messages from all sites and time stamp of all received messages
are greater than time stamp of request message which is sent by site ss.
(ii) Time stamp of all request messages which are present in the request queue of site ss are
greater than the time stamp of request message sent by site ss. The guard grd2 ensures that site ss
is requesting site and guard grd4 ensures that status of site ss is reqcs. The message type of mm is
request is ensured by guard grd7. The guard grd8 ensures that request queue of site ss contains a
request message mm which is sent by it. The guard grd9 ensures that site ss has received the reply
messages from all the sites. The guard grd10 ensures that time stamp of request message mm is
less than time stamp of all received replied messages. The guard grd11 ensures that time stamp of
request message mm is minimum among all the requests messages present in request queue of site
ss. The status of site ss is set to as execs through the action act1.
12. 488 Computer Science & Information Technology (CS & IT)
Fig. 6. Execution and Releasing of Critical Section
The RELEASE-CS event models the releasing of critical section (see Fig.6).After performing
execution of critical section the requesting site release it and removes the entry of request
message from its request queue. The site ss is requesting site is ensured by guard grd2. The guard
grd4 ensures that status of site ss is execs. This event set the status of site ss as releasecs (act2)
and removes entry of its request from its request queue (act1).
13. Computer Science & Information Technology (CS & IT) 489
Fig. 7. Broadcasting of Release message
Broadcast and Delivery of Release message: The event BROADCAST-RELEASE is given in
Fig. 7. After releasing of critical section site ss broadcasts a time stamped release message to all
sites so that they can also remove the entry of request message previously sent by it. The guard
grd4 ensures that site ss has performed the execution of critical section. Before broadcasting a
reply message mm site ss increments its vector time stamp (grd9) and this modified vector time
stamp is assigned to the message mm (act1). The action act4 set the type of message mm as
release message. The action act5 removes site ss from request set reqcs. The status of site ss is set
to as pending through the action (act6).
The event DELIVER-RELEASE models the delivery of release message (see Fig. 8). The guard
grd3 ensures that message mm is release message. A site ss has sent the release message mm is
ensured by guard grd4. In the request queue of site s (recipient site) there is an entry of request
message m sent by site ss is ensured by guard grd9. The guard grd10 ensures FIFO order delivery
of messages. The delivery of message mm at site s is done through action act1. The action act2
updates the delivery order such that all the messages which are previously delivered to site s must
precede message mm. The action act3 updates the vector time stamp of site s. The action act4
removes the entry of request message m sent by site ss from the request queue of site s. Removing
a request from request queue makes possible that next minimum time stamped request is own
request, enabling it to enter the critical section.
14. 490 Computer Science & Information Technology (CS & IT)
Fig. 8. Delivery of Release message
5 . CONCLUSIONS
In distributed system, due to absence of global clock and shared memory traditional technique
like semaphore may not be appropriate for solving the problem of mutual exclusion. To decide
which site execute the critical section, a site communicates with other sites by sending a message.
We have considered Lamport's mutual exclusion algorithm [1], [3] for formal construction of our
model. In this algorithm, each site maintains a request queue, which contains its own
timestamped request for mutual exclusion and also request messages received from other sites
[3]. We have considered vector clock [18] instead of using Lamport's scalar clock for assigning
the time stamp to messages. In a system of vector clock, every site maintains a vector to represent
what that site believes to be the logical time at all other sites.
In this paper, modeling of distributed mutual exclusion system is specied using Event-B. This
work is carried out on Rodin tool [16], [17]. The Rodin tool is intended to support construction
and verification of Event-B models. The tool takes the formal text of model and produces proof
obligations. It provides an environment to discharge of proof obligations arising due to
consistency checking. Modeling guidelines outlined in [14] were used and these guidelines
helped us in modeling and discharging proof obligations generated due to consistency checking.
Total sixty four proof obligations were generated by the system and all of them were discharged
automatically. The proofs and invariants together helped us to reason about the system design.We
also found that vector clock can also be used to implement Lamport's mutual exclusion instead of
using scalar clock.
15. Computer Science & Information Technology (CS & IT) 491
REFERENCES
[1] Singhal, M., Shivratri, N.G.: Advanced Concepts in Operating Systems. Tata Mc- GrawHill Book
Company, India (2005)
[2] Raymond, K.: A Tree-Based algorithm for Distributed Mutual Exclusion. In: ACM transactions on
computer systems, vol.7, pp. 61-77, (1989)
[3] Lamport, L.: Time, Clocks and Ordering of Events in Distributed Systems. In:communications of the
ACM, July (1978)
[4] Ricart, G. and Agrawala, A. K.: An Optimal algorithm for Mutual Exclusion in Computer Networks.
In: communications of the ACM, (1981)
[5] Butler, M.: An Approach to Design of Distributed Systems with B AMN. In: Proc. 10th Int. Conf. of
Z Users: The Z Formal Speci_cation Notation (ZUM), LNCS1212, pp. 223-241, (1997).
[6] Butler M. and Walden, M.: Distributed System Development in B. In: Proc. of Ist Conf. in B Method,
Nantes, pp. 155-168, (1996).
[7] Rezazadeh, A. and Butler, M.: Some Guidelines for formal development of web based application in
B Method. In: Proc. of 4th Intl. Conf. of B and Z users, Guildford, LNCS, Springer, pp 472-491,
(2005).
[8] Banach, R.: Retrenchment for Event-B: UseCase-wise development and Rodin integration. Formal
Aspects of Computing, 23, pp. 113131, (2011).
[9] Hallerstede, S.: On the purpose of Event-B proof obligations. Formal Aspects of Computing, 23: pp.
133150, (2011).
[10] Yadav, D. and Butler, M.: Rigorous Design of Fault-Tolerant Transactions for Replicated Database
Systems Using Event B. In: Butler M., Jones, C.B.(eds.) LNCS, vol. 4157, Springer, Heidelberg,
pp.343-363,(2006).
[11] Hallerstede, S. and Leuschel, M.: Experiments in program veri_cation using Event-B. Formal Aspects
of Computing, 24: pp. 97125, (2012)
[12] Suryavanshi, R. and Yadav, D.:Formal Development of Byzantine Immune Total Order Broadcast
System using Event-B. In: ICDEM 2010, Andres, F. and Kannan, R. (eds.) LNCS, Vol. 6411,
Springer, pp.317-324, (2010).
[13] Yadav, D. and Butler, M.: Application of Event B to Global Causal Ordering for Fault Tolerant
Transactions. In: Proc. of REFT 2005, Newcastle upon Tyne, pp. 93-103, (2005).
[14] Butler, M. and Yadav, D.: An incremental development of the mondex system in Event-B. Formal
Aspects of Computing, 20(1):61-77, (2008).
[15] Yadav, D. and Butler, M.: Formal Development of a Total Order Broadcast for Distributed
Transactions Using Event-B. Lecture Notes in Computer Science 5454, springer-Verlag Berlin
Heidelberg, pp.152-176, (2009).
[16] Metayer, C., Abrial, J.R. and Voison, L.: Event-B language. RODIN deliverables 3.2,
http://rodin.cs.ncl.ac.uk/deliverables/D7.pdf, (2005).
[17] Abrial, J.R.: A system development process with Event-B and the Rodin platform. In: Lecture Notes
In Computer Science 4789, Springer, pp.1-3, (2007).
[18] Baldoni, R. and Raynal, M.: Fundamentals of Distributed Computing: A Practical Tour of Vector
Clock Systems. In: IEEE Distributed Systems Online, Vol. 3, no. 2,(2002)