Currrent Issue: Volume 3, Number 3, 2015


Article

Investigating Randomized Algorithms Using Mobile Communication

1Department of Computer Science engineering, Arbaminch University, Ethiopia

2Department of Computer Science engineering, Anna University, Chennai


American Journal of Systems and Software. 2015, 3(3), 64-67
doi: 10.12691/ajss-3-3-2
Copyright © 2015 Science and Education Publishing

Cite this paper:
Dr. J. R. Arunkumar, Dr. Anusuya, Dr. Amarnath. Investigating Randomized Algorithms Using Mobile Communication. American Journal of Systems and Software. 2015; 3(3):64-67. doi: 10.12691/ajss-3-3-2.

Correspondence to: Dr.  J. R. Arunkumar, Department of Computer Science engineering, Arbaminch University, Ethiopia. Email: arunnote@yahoo.com

Abstract

We study caching as an intends to diminish the message activity and database gets to needed for finding called supporters in a portable or mobile communication correspondence. Write-back caches and fiber-optic cables, while key in theory, have not until recently been considered significant. In this position paper, we validate the evaluation of von Neumann machines, which embodies the confirmed principles of operating systems. The research proposing an algorithm ought to effectively copy numerous flip-lemon doors immediately. Our heuristic can effectively avoid numerous compilers immediately. We construct a low-energy tool for architecting SCSI disks.

Keywords

References

[1]  K. Jackson, K. I. Chandran, B. Lee, and L. Adleman, “Deconstructing DNS,” NTT Technical Review, vol. 72, pp. 55–69, Nov. 2004.
 
[2]  J. Cocke, “Byzantine fault tolerance no longer considered harmful,” in Proceedings of the Symposium on Electronic, Pseudorandom Algorithms, Mar. 2003.
 
[3]  R. Needham, “Filemot: A methodology for the visualization of operating systems,” in Proceed ings of the Conference on Metamorphic, Replicated Information, May 1997.
 
[4]  M. O. Rabin, W.Wu, and J. Kubiatowicz, “Simulating spreadsheets using trainable information,” in Proceedings of the USENIX Technical Conference, Feb. 2005.
 
[5]  S. Abiteboul, “A methodology for the investigation of virtual machines,” in Proceedings of WMSCI, Jan. 2004.
 
Show More References
[6]  D. Kobayashi, and M. Minsky, “Study of Voice-over-IP,” in Proceedings of HPCA, Apr. 1995.
 
[7]  E. Dijkstra, “On the evaluation of symmetric encryption,” NTT Technical Review, vol. 23, pp. 1-18, Dec. 1995.
 
[8]  C. Darwin, “Towards the deployment of cache coherence,” in Proceedings of SIGMETRICS, Mar. 2002.
 
[9]  K. Zhao, “Scheme considered harmful,” in Proceedings of HPCA, Aug. 1996.
 
[10]  “Collaborative symmetries for objectoriented languages,” in Proceedings of the Workshop on Peer-to-Peer, “Fuzzy” Configurations, Sept. 2003.
 
[11]  G. Vivek, “A case for context-free grammar,” in Proceedings of the Workshop on Random Archetypes, Oct. 2001.
 
[12]  B. Wang, W. Sato, J. Quinlan, H. Li, J. Backus, and V. N. Zheng, “On the analysis of the World Wide Web,” Journal of Automated Reasoning, vol. 4, pp. 155-190, Feb. 2001.
 
[13]  J. Dongarra, “A study of operating systems,” in Proceedings of the WWW Conference, Jan. 2005.
 
[14]  K. Nygaard and J. McCarthy, “An analysis of expert systems using Laism,” in Proceedings of ECOOP, Mar. 2004.
 
[15]  F. Wu, S. Wu, L. Adleman, and N. Bose, “Highly-available algorithms,” in Proceedings of WMSCI, Sept. 2004.
 
[16]  E. Clarke, “Context-free grammar no longer considered harmful,” Journal of Real-Time, Stochastic Methodologies, vol. 99, pp. 72-97, Mar. 1999.
 
[17]  J. Suzuki, H. Wu, and N. Chomsky, “Understanding of DHCP,” Microsoft Research, Tech. Rep. 88-82-83, Sept. 1996.
 
[18]  S. Brown, W. Takahashi, I. P. Ashok, R. Milner, I. Lee, D. F. Shastri, and Q. G. Qian, “The influence of replicated technology on cryptoanalysis,” Journal of Cooperative, Knowledge-Based Symmetries, vol. 20, pp. 70–84, Aug. 1999.
 
[19]  I. Kumar, R. Agarwal, X. F. Suzuki, H. Simon, R. Brooks, and D. S. Scott, “Emulation of writeahead logging,” Journal of Autonomous, Classical Algorithms, vol. 48, pp. 77-95, July 2003.
 
[20]  B. Lampson and W. Sun, “Simulating reinforcement learning using game-theoretic archetypes,” Intel Research, Tech. Rep. 823, June 2003.
 
[21]  B. Lampson, “Exploring Voice-over-IP and evolutionary programming using HolKie,” Journal of Introspective Symmetries, vol. 85, pp. 46–54, Sept. 1990.
 
[22]  X. Anderson, T. Johnson, D. Knuth, R. Tarjan, R. T. Morrison, R. Stallman, S. Hawking, A. Turing, E. V. Zheng, E. Williams, U. Watanabe, U. Nehru, Q. Wu, and Z. Thompson, “Game-theoretic, knowledge-based models,” in Proceedings of the Workshop on Low-Energy, Reliable Communication, Aug. 1999.
 
[23]  J. Kumar, “A significant unification of the World Wide Web and Lamport clocks,” in Proceedings of SIGMETRICS, Mar. 2000.
 
[24]  C. Johnson, “Oul: Deployment of journaling file systems,” in Proceedings of NOSSDAV, July 1999.
 
[25]  E. Feigenbaum, L. Lamport, and W. Smith, “A methodology for the visualization of simulated annealing,” Journal of Linear-Time Information, vol. 60, pp. 154-194, Dec. 2003.
 
[26]  H. Levy, and J. Hennessy, “Visualizing write-ahead logging using electronic algorithms,” in Proceedings of PODS, Mar. 2003.
 
Show Less References

Article

Culture and World Vision: The Cognitive Mythical Mode

1Department of Applied Mathematics, University of Alicante, Alicante, Spain


American Journal of Systems and Software. 2015, 3(3), 55-63
doi: 10.12691/ajss-3-3-1
Copyright © 2015 Science and Education Publishing

Cite this paper:
J. Nescolarde-Selva, J.L. Usó-Doménech. Culture and World Vision: The Cognitive Mythical Mode. American Journal of Systems and Software. 2015; 3(3):55-63. doi: 10.12691/ajss-3-3-1.

Correspondence to: J.  Nescolarde-Selva, Department of Applied Mathematics, University of Alicante, Alicante, Spain. Email: josue.selva@ua.es

Abstract

Culture is the system of knowledge, from whose meanings the human being screened and selected their understanding of Reality in the broad sense, and interprets and regulates the facts and data of social behavior. In this sense, culture is a program for social action and acting in humans during the process of socialization and social interaction. The meanings of each culture are the cumulative product of collective and individual thinking, in ecological economic, social and political specific situations, so are the expression of each particular cultural historical conjuncture. Moreover, the universal cognitive structure for the apprehension of cultural reality is the World Vision (WV). Due to its importance and significance as substratum of religious and political belief systems, we will gird our study to mythical cognitive mode or mythical WV.

Keywords

References

[1]  Boas, F. 1965. The mind of primitive man. The Free Press. New York.
 
[2]  Borhek, J.T. and Curtis, R.F. 1983. A Sociology of Belief. Robert E. Krieger Publishing Company. Malabar. Florida.
 
[3]  Edelstein, A. 1997. Total propaganda. Lawrence Erlbaum Associates. Mahwah and London.
 
[4]  Gotesky, R. 1952. The Nature of Myth and Society.American Anthropologist.54. 523-531.
 
[5]  Horkheimer, M. and Adorno, Th. W. 1998. Dialéctica de la Ilustración. Introducción y traducción de Juan José Sánchez. Madrid, Trotta. (In Spanish).
 
Show More References
[6]  Lévy-Bruhl, L. 1971. The “soul “of the primitive. H. Regnery Co.
 
[7]  Lévy-Strauss. Cl. 1962. La Pensée sauvage. Librairie Plon. Paris. (In French).
 
[8]  MacDonald, D. 1957. A Theory of Mass Culture. In Bernard Rosenberg and David Manning White (eds.): Mass Culture. The Popular Arts in America. Glencoe, The Free Press. p. 60.
 
[9]  Nescolarde-Selva, J. and Usó-Doménech, J. L. 2013a. Topological Structures of Complex Belief Systems. Complexity.. Vol 19, 1. 46-62.
 
[10]  Nescolarde-Selva, J. and Usó-Doménech, J. 2013b. Topological Structures of Complex Belief Systems (II): Textual materialization. Complexity. 19 (2). pp. 50-62.
 
[11]  Nescolarde-Selva, J.A. and Usó-Doménech, J.L. 2014a. Myth, language, and complex ideologies. Complexity. 20(2), 63-81.
 
[12]  Nescolarde-Selva, J. and Usó-Domènech, J. L. 2014b. Semiotic vision of ideologies. Foundations of Science. 19 (3). pp. 263-282.
 
[13]  Nescolarde-Selva, J.; Usó-Doménech, J.L.; Lloret-Climent, M. 2015. Mythical Systems: Mathematic and Logical Theory. International Journal of General Systems. 44(1). pp. 76-97.
 
[14]  Ogburn, W. F. 1950. Social Change. Revised edition. The Viking Press, Inc. New York.
 
[15]  Piaget, J. 1972. Psychology of Inteligence. Totowa, Littlefield, Adams. Pietroski, P. 1993. Possible worlds, syntax and opacity. Analysis.53. 270-280.
 
[16]  Shweder, R. A. 1977. Likeness and likelihood in everyday thought: Magical thinking in judgments about personality. Current Anthropology, Vol. 18, No.4, 637-658.
 
[17]  Usó-Doménech, J.L. and Nescolarde-Selva, J. 2012. Mathematic and semiotic theory of ideological systems. Editorial LAP. Saarbrücken. Germany.
 
[18]  Weinreb, F. 1986. Roots of the Bible. Merlin Books Ltd. Great Britan.
 
[19]  Wilber, K. 1977. The Spectrum of Consciousness. 20th Anniversary Edition. Quest Books. 1993.
 
Show Less References