This paper proposes a bimodal urban traffic control strategy based on a multi-agent model. We call bimodal traffic a traffic which takes into account private vehicles and public transport vehicles such as buses. The o...
详细信息
ISBN:
(纸本)9783642198748
This paper proposes a bimodal urban traffic control strategy based on a multi-agent model. We call bimodal traffic a traffic which takes into account private vehicles and public transport vehicles such as buses. The objective of this research is to improve global traffic and reduce the time spent by buses in traffic jams so that buses cope with their schedule. Reducing bus delays is done by studying time length of traffic lights and giving priority to buses, more precisely to buses running late. Regulation is obtained thanks to communication, collaboration and negotiation between the agents of the system. The implementation was done using the JADE platform. We tested our strategy on a small network of six junctions. The first results of the simulation are presented. They show that our MAS control strategy improves both bus traffic and private vehicle traffic, decreases bus delays and improves its regularity compared to a classical strategy called fixed-time control.
In this paper, we developed softcomputing models for on-line automatic speech recognition (ASR) based on Bayesian on-line inference techniques. Bayesian on-line inference for change point detection (BOCPD) is tested ...
详细信息
ISBN:
(纸本)9783642196430
In this paper, we developed softcomputing models for on-line automatic speech recognition (ASR) based on Bayesian on-line inference techniques. Bayesian on-line inference for change point detection (BOCPD) is tested for on-line environmental learning using highly non-stationary noisy speech samples from the Aurora2 speech database. Significant improvement in predicting and adapting to new acoustic conditions is obtained for highly non-stationary noises. The simulation results show that the Bayesian on-line inference-based softcomputing approach would be one of the possible solutions to on-line ASR for real-time applications.
In [1], we have published the results of our analysis of software and services research in Bulgaria during the 2004-2008 time period. This analysis was part of the activities performed within the EU FP7 SISTER project...
详细信息
ISBN:
(纸本)9783642231629
In [1], we have published the results of our analysis of software and services research in Bulgaria during the 2004-2008 time period. This analysis was part of the activities performed within the EU FP7 SISTER project. By using the same methodology, which is expanded now with some new features, we started analyzing a new period - 2009-2010. In this paper we compare the results obtained for both periods (overcoming their different duration trough a simple data transformation). The first results obtained show an intensification of the research work in the majority of the subject areas in view with a few new appearing now. The analysis is planned to be finalized in the next few months.
In this paper, an innovative approach to perform distributed Bayesian inference using a multi-agent architecture is presented. The final goal is dealing with uncertainty in network diagnosis, but the solution can be o...
详细信息
ISBN:
(纸本)9783642198748
In this paper, an innovative approach to perform distributed Bayesian inference using a multi-agent architecture is presented. The final goal is dealing with uncertainty in network diagnosis, but the solution can be of applied in other fields. The validation testbed has been a P2P streaming video service. An assessment of the work is presented, in order to show its advantages when it is compared with traditional manual processes and other previous systems.
17 cluster analysis techniques proposed for document clustering in terms of internal and external quality measures of clustering and computing time demands are compared. These are combinations of three basic methods (...
详细信息
ISBN:
(数字)9783642180293
ISBN:
(纸本)9783642180286
17 cluster analysis techniques proposed for document clustering in terms of internal and external quality measures of clustering and computing time demands are compared. These are combinations of three basic methods (direct, repeated bisection and agglomerative) and five clustering criterion functions for solution assessment (two intra-cluster, one inter-cluster, and two complex ones);all implemented in the CLUTO software package. Furthermore, in the case of the agglomerative method we also applied a single linkage and complete linkage clustering as a criterion function. Collection 20 Newsgroups, a binary vector representation of e-mail messages, was used for comparing the methods. Experiments with document clustering have proved that, from the point of view of entropy and purity, the direct method provides the best results. As regards computing time, the repeated bisection (divisive) method has been the fastest.
In modern container terminals, efficiently managing the transit of the containers becomes more and more of a challenge. Due to the progressive evolution of container transport, traffic management within container port...
详细信息
ISBN:
(纸本)9783642205040
In modern container terminals, efficiently managing the transit of the containers becomes more and more of a challenge. Due to the progressive evolution of container transport, traffic management within container ports is still an evolving problem. To provide adequate strategy for the increased traffic, ports must either expand facilities or improve efficiency of operations. In investigating ways in which ports can improve efficiency, this paper proposes a Markov Decision Process (MDP) for loading and unloading operations within a container terminal. The proposed methodology allows an easy modeling for optimizing complex sequences of decisions that are to be undertaken at each time. The goal is to minimize the total waiting time of quay cranes and vehicles, which are allocated to service a containership. In this paper, reinforcement learning, which consists of solving learning problems by studying the system through mathematical analysis or computational experiments, is considered to be the most adequate approach.
This paper presents a concept for deploying wireless in the enterprise infrastructure, especially intended for companies that are usually considered conservative and have strict information security policies. These co...
详细信息
ISBN:
(纸本)9783642286636
This paper presents a concept for deploying wireless in the enterprise infrastructure, especially intended for companies that are usually considered conservative and have strict information security policies. These companies are usually careful while introducing new technologies, so our discussion presents a wireless concept that we believe can satisfy such requirements. The network will run business-critical application and data, voice and video applications, which will extend the wired network. The paper presents comparative analysis for the options that are currently available for wireless networks, while the claims are discussed through live implementation of the proposed concept in a financial institution with commercially available wireless products, produced results from technical point of view and quality of experience (QoE) for the end-users.
Communication in ad hoc network, such as Wireless Sensor Networks (WSN), needs the use of decentralised routing algorithms requiring that several sensors behave in an expected way. This introduces a vulnerability as t...
详细信息
ISBN:
(纸本)9783642198748
Communication in ad hoc network, such as Wireless Sensor Networks (WSN), needs the use of decentralised routing algorithms requiring that several sensors behave in an expected way. This introduces a vulnerability as the global issue of decentralized tasks depends on local behaviors and is compromised in case of failures or malicious intrusions. We propose here an adaptation of a routing protocol for WSN, the MWAC model, that introduces trust decisions to detect and avoid sensors that exhibit an incorrect behavior. The proposed trusted routing algorithms takes into account the low energy, communication and memory capacity of sensors to provide a realistic improvement of the routing robustness.
Permanent Magnet Synchronous Motors (PMSM) are immensely popular because they can meet the huge capacity needs of industrial applications. Speed regulation of PMSM Drives with conventional Proportional-Integral (PI) r...
详细信息
ISBN:
(纸本)9783642196430
Permanent Magnet Synchronous Motors (PMSM) are immensely popular because they can meet the huge capacity needs of industrial applications. Speed regulation of PMSM Drives with conventional Proportional-Integral (PI) regulator reduces the speed control precision because of the disturbances in Motor and load characteristics, leading to poor performance of whole system. The values so obtained may not give satisfactory results in a wide range of speed. In this research, we considered the Mathematical model of speed controller for controlling the speed, which can be formulated as an optimization problem subject to various constraints imposed due to motor and other limitation factors. For solving this problem we used a modified version of Artificial Bee Colony (ABC) algorithm known as Cauchy Mutation ABC (C-ABC). We first illustrate the proposed method using various standard benchmark functions and then it is used for tuning PI controller for speed regulation in PMSM drive. Empirical results obtained are compared with the basic version of ABC, which clearly indicates the superior performance of the C-ABC algorithm.
In this paper we present SOA (Service oriented architecture) that we are developing to enable interoperability between Macedonian Ministry of Defence (MoD) and NATO. First we give a brief overview of Service-Oriented ...
详细信息
ISBN:
(纸本)9783642231629
In this paper we present SOA (Service oriented architecture) that we are developing to enable interoperability between Macedonian Ministry of Defence (MoD) and NATO. First we give a brief overview of Service-Oriented Architecture (SOA) and an explanation of how it can be used for the Ministry of Defense purposes. MoD uses IEEE 1472 definition of an architecture description to define a standard approach to describing, presenting, and integrating a defense architecture that can be used with a service oriented approach to capability based planning. The principal objective of our work is to ensure that architecture descriptions can be compared and related across organizational boundaries, including NATO and multi-national boundaries. SOA can provide easier identifying of required capabilities, the ways (operational activities), the means (human or system services) and the conditions (under which capability is required).
暂无评论