Search For:

Displaying 1-34 out of 34 total
Collaborative Parallel Local Search for Simplified Protein Structure Prediction
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Mahmood A. Rashid,M. A. Hakim Newton,Md Tamjidul Hoque,Abdul Sattar
Issue Date:July 2013
pp. 966-973
Protein structure prediction is a challenging optimisation problem to the computer scientists. A large number of existing single-point search algorithms attempt to solve the problem by exploring possible structures and finding the one with the minimum free...
 
A 15 Bit 95 dB Low Power Discrete Time Sigma Delta Modulator
Found in: 2012 International Conference on Computing Sciences (ICCS)
By Mohammed Arifuddin Sohel,K. Chenna Keshava Reddy,Syed Abdul Sattar,Salma Jabeen
Issue Date:September 2012
pp. 245-248
This paper presents a high resolution low power sigma delta modulator for analog to digital conversion (ADC) over 5 MHz band. The modulator consists of a third order design operating at a Sampling Frequency of 1 GHz, thus giving an over sampling ratio (OSR...
 
Comparative Analysis of Ontology Construction Approaches from Relational Databases
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Maruf Pasha,Abdul Sattar
Issue Date:November 2011
pp. 25-28
Ontology provides shareable and reusable knowledge about a specific domain. Domain specific relational databases are being used for constructing ontologies due to huge amounts of data on the Web. The aim of this paper is to provide an overview along with t...
 
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar
Issue Date:December 2010
pp. 484-491
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hie...
 
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks
Found in: Network and System Security, International Conference on
By Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar
Issue Date:September 2010
pp. 275-280
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for ...
 
Let's Trust Usersâ€â€?It is Their Search
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Pavel Kalinov, Bela Stantic, Abdul Sattar
Issue Date:September 2010
pp. 176-179
The current search engine model considers users not trustworthy, so no tools are provided to let them specify what they are looking for or in what context, which severely limits what they are able to achieve. Instead, search engines try to guess that, whic...
 
Trust Management Scheme for Mobile Ad-Hoc Networks
Found in: Computer and Information Technology, International Conference on
By Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar
Issue Date:July 2010
pp. 896-901
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for ...
 
Trust Formalization in Mobile Ad-Hoc Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar
Issue Date:April 2010
pp. 351-356
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed ...
 
An Efficient Algorithm for Solving Dynamic Complex DCOP Problems
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Sankalp Khanna, Abdul Sattar, David Hansen, Bela Stantic
Issue Date:September 2009
pp. 339-346
Multi Agent Systems and the Distributed Constraint Optimization Problem (DCOP) formalism offer several asynchronous and optimal algorithms for solving naturally distributed optimization problems efficiently. There has been good application of this technolo...
 
Temporalised Epistemic Logic for Reasoning about Agent-Based Systems
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ji Ma, Mehmet A. Orgun, Abdul Sattar, Kamel Adi
Issue Date:September 2009
pp. 474-477
For modelling and verifying agent systems, many researchers have proposed different logical systems. Since agent-based systems are designed to operate in dynamic environments such as the Internet, it is also important to model the temporal aspects of such ...
 
Energy Consumption & Lifetime Analysis in Cluster-Based Wireless Sensor Networks for Periodic Monitoring Applications
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Abdul Sattar Malik, Jingming Kuang, Jiakang Liu, Wang Chong
Issue Date:April 2009
pp. 657-661
Clustering is one of the most popular approaches used in wireless sensor networks to conserve energy and increase node as well as network lifetime. LEACH is among the most popular clustering protocols proposed for wireless sensor networks. In this paper we...
 
Twin Removal in Genetic Algorithms for Protein Structure Prediction Using Low-Resolution Model
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Md Tamjidul Hoque, Madhu Chetty, Andrew Lewis, Abdul Sattar
Issue Date:January 2011
pp. 234-245
This paper presents the impact of twins and the measures for their removal from the population of genetic algorithm (GA) when applied to effective conformational searching. It is conclusively shown that a twin removal strategy for a GA provides considerabl...
 
Levels of Modalities for BDI Logic
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jeff Blee, David Billington, Guido Governatori, Abdul Sattar
Issue Date:December 2008
pp. 647-650
The use of rational agents for modelling real world problems has both been heavily investigated and become well accepted, with BDI Logic being a widely used architecture to represent and reason about rational agency. However, in the real world, we often ha...
 
Solving Sum and Product Riddle via BDD-Based Model Checking
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xiangyu Luo, Kaile Su, Abdul Sattar, Yan Chen
Issue Date:December 2008
pp. 630-633
We model the Sum and Product Riddle in public announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking method to the riddle is developed by using ...
 
Temporal Reasoning: A Three Way Analysis
Found in: Temporal Representation and Reasoning, International Syposium on
By Vineet Padmanabhan, Abdul Sattar, Arun K. Pujari, Chinmoy Goswamy
Issue Date:July 2000
pp. 183
The study of Temporal Representation and Reasoning is a core area of Research in Linguistics, Philosophy and Artificial Intelligence. However, very little work has been done in analyzing the principles common to these three areas. This paper attempts to in...
 
Quality Based Jpeg Steganography Using Balanced Embedding Technique
Found in: Emerging Trends in Engineering & Technology, International Conference on
By Mohammed Ishaque, Syed Abdul Sattar
Issue Date:December 2009
pp. 215-221
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of...
 
A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Abdollah Dehzangi,Kuldip Paliwal,Alok Sharma,Omid Dehzangi,Abdul Sattar
Issue Date:May 2013
pp. 1
Better understanding of structural class of a given protein reveals important information about its overall folding type and its domain. It can also be directly used to provide critical information on general tertiary structure of a protein which has a pro...
 
A Novel Approach to Model NOW in Temporal Databases
Found in: Temporal Representation and Reasoning, International Syposium on
By Bela Stantic, John Thornton, Abdul Sattar
Issue Date:July 2003
pp. 174
In bitemporal databases, current facts and transaction states are modelled using a special value to represent the current time (such as a minimum or maximum timestamp or NULL). Previous studies indicate that the choice of value for now (i.e. the current ti...
 
Deciding consistency of a point-duration network with metric constraints
Found in: Temporal Representation and Reasoning, International Syposium on
By Isabel Navarrete, Abdul Sattar, Roque Marin
Issue Date:July 2003
pp. 147
We introduce a new model, MPDN, for quantitative temporal reasoning with points and durations, that supposes an extension of the TCSP formalism and previous point-duration network models. The problem of deciding consistency for a MPDN is shown to be NP-com...
 
A New Look At Multimedia Synchronization in Distributed Environments
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Zhonghua Yang, Chengzheng Sun, Abdul Sattar, Yanyan Yang
Issue Date:June 1999
pp. 322
A multimedia system requires to handle automatically and uniformly the generation, manipulation, presentation, storage, and communication of independent discrete and continuous media data. The synchronization between various kinds of media data is a key is...
 
A new operator for efficient stream-relation join processing in data streaming engines
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Abdul Sattar, Bela Stantic, Roozbeh Derakhshan
Issue Date:October 2013
pp. 793-798
In the last decade, Stream Processing Engines (SPEs) have emerged as a new processing paradigm that can process huge amounts of data while retaining low latency and high-throughputs. Yet, it is often necessary to join streaming data with traditional databa...
     
Incorporating NoSQL into a database course
Found in: ACM Inroads
By Abdul Sattar, Keerthi Nallamaddi, Torben Lorenzen
Issue Date:June 2013
pp. 50-53
This article introduces the concepts of Big Data and NoSQL and describes a semester long web-based project that uses both a relational database (Oracle 11g) and a NoSQL (MongoDB) database for an undergraduate database course. The relational database stores...
     
A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Abdollah Dehzangi, Alok Sharma, Kuldip Paliwal, Abdul Sattar, Omid Dehzangi
Issue Date:May 2013
pp. 564-575
Better understanding of structural class of a given protein reveals important information about its overall folding type and its domain. It can also be directly used to provide critical information on general tertiary structure of a protein which has a pro...
     
A code snippet library for CS1
Found in: ACM Inroads
By Torben Lorenzen, Abdul Sattar, Lee Mondshein, Seikyung Jung
Issue Date:March 2012
pp. N/A
The authors describe several methods they had used in an attempt to lessen the frustration of entry-level CS1 students as they learn to code. The suggested method is to use a specially designed library of code "snippets" of the control structures in the la...
     
Tools for computer architecture and organization
Found in: ACM Inroads
By Abdul Sattar, Lee Mondshein, Torben Lorenzen
Issue Date:February 2011
pp. 29-30
The constructs for loops in Scratch are presented and compared with those in mainstream programming languages like Java. There are significant differences in the semantics of loops that have the potential for causing confusion when students move from Scrat...
     
Twin Removal in Genetic Algorithms for Protein Structure Prediction Using Low-Resolution Model
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Abdul Sattar, Andrew Lewis, Madhu Chetty, Md Tamjidul Hoque
Issue Date:January 2011
pp. 234-245
This paper presents the impact of twins and the measures for their removal from the population of genetic algorithm (GA) when applied to effective conformational searching. It is conclusively shown that a twin removal strategy for a GA provides considerabl...
     
Visualizing prolog: a "jigsaw puzzle" approach
Found in: ACM Inroads
By Abdul Sattar, Lee Mondshein, Torben Lorenzen
Issue Date:December 2010
pp. 43-48
At Bridgewater State College, Prolog serves as a student's first introduction to programming in a declarative language. Students often find it difficult to understand how Prolog implements logical deduction and handles variable bindings as it processes a q...
     
An operating systems course with projects in Java
Found in: ACM Inroads
By Abdul Sattar, Lee Mondshein, Torben Lorenzen
Issue Date:June 2010
pp. 24-26
This paper describes a set of fi ve programming projects in an undergraduate Operating Systems course. The problems are designed to reinforce the fundamental concepts that are discussed in most operating systems textbooks. Students are required to write pr...
     
Develop a shopping mart web application
Found in: Working group reports on ITiCSE on Innovation and technology in computer science education (ITiCSE-WGR '06)
By Abdul Sattar, Torben Lorenzen
Issue Date:June 2006
pp. 56
The authors' junior/senior CS class at Bridgewater State College implemented a web site similar to the shopping mart found at AMAZON.COM. The application was broken into four assignments which included an email address verifier written in Java, a 5 page GU...
     
Teach graphics using excel in place of a graphing calculator
Found in: Working group reports on ITiCSE on Innovation and technology in computer science education (ITiCSE-WGR '06)
By Abdul Sattar, Torben Lorenzen
Issue Date:June 2006
pp. 56
Excel spreadsheets were developed to teach the underlying math in a computer graphics course including reviewing basic linear algebra operations, tracing a series of OpenGL transformations, and creating Bezier curves and surfaces with forward differences. ...
     
User defined monitoring strategies for BDI agent programs
Found in: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems (AAMAS '06)
By Abdul Sattar, Raihana Ferdous, Timothy William Cleaver
Issue Date:May 2006
pp. 1055-1057
An agent needs to balance its time between reflecting on its past behaviors, the execution of its current behaviors and the recognition of opportunities for future action. The optimal strategy to achieve this balance is heavily dependent on the environment...
     
The interpreted system model of knowledge, belief, desire and intention
Found in: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems (AAMAS '06)
By Abdul Sattar, Kaile Su, Mehmet A Orgun, Xiangyu Luo
Issue Date:May 2006
pp. 220-222
We present a new model of knowledge, belief, desire and intention, called the interpreted KBDI-system model (or KBDI-model for short). The key point of the interpreted KBDI-system model is that we express an agent's knowledge, belief, desire and intention ...
     
Bounded model checking knowledge and branching time in synchronous multi-agent systems
Found in: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems (AAMAS '05)
By Abdul Sattar, Guanfeng Lv, Kaile Su, Qingliang Chen, Xiangyu Luo
Issue Date:July 2005
pp. 1129-1130
We present an approach to the verification of temporal epistemic properties in synchronous multi-agent systems (MAS) via bounded model checking (BMC). Based on the semantics of synchronous interpreted system, we extend the temporal logic CTL* by incorporat...
     
A computationally grounded logic of knowledge, belief and certainty
Found in: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems (AAMAS '05)
By Abdul Sattar, Guido Governatori, Kaile Su, Qingliang Chen
Issue Date:July 2005
pp. 149-156
This paper presents a logic of knowledge, belief and certainty, which allows us to explicitly express the knowledge, belief and certainty of an agent. A computationally grounded model, called interpreted KBC systems, is given for interpreting this logic. T...
     
 1