the proceedings contain 26 papers. the special focus in this conference is on Stabilization, Safety, and Security of Distributed Systems. the topics include: Marginal games and characterizations of the shapley value i...
ISBN:
(纸本)9789811067525
the proceedings contain 26 papers. the special focus in this conference is on Stabilization, Safety, and Security of Distributed Systems. the topics include: Marginal games and characterizations of the shapley value in TU games;computing the shapley value of threshold cardinality matching games;matrix analysis for the shapley value and its inverse problem;the general nucleolus of n-person cooperative games;a cooperative game approach to author ranking in coauthorship networks;a reduced harsanyi power solution for cooperative games with a weight vector;an allocation method of provincial college enrollment plan based on bankruptcy model;edgeworth equilibria of economies and cores in multi-choice NTU games;a game theory approach for deploying medical resources in emergency department;two-phase nonlinear programming models and method for interval-valued multiobjective cooperative games;models and algorithms for least square interval-valued nucleoli of cooperative games with interval-valued payoffs;interval-valued least square prenucleolus of interval-valued cooperative games with fuzzy coalitions;quadratic programming models and method for interval-valued cooperative games with fuzzy coalitions;cooperative games withthe intuitionistic fuzzy coalitions and intuitionistic fuzzy characteristic functions;a profit allocation model of employee coalitions based on triangular fuzzy numbers in tacit knowledge sharing;non-cooperative monomino games;bargaining model of mutual deterrence among three players with incomplete information;stakeholders’ behavior analysis and enterprise management strategy selection in Chinese ancient village tourism development;two bargain game models of the second-hand housing commence;some relaxed solutions of minimax inequality for discontinuous game;dynamic games of firm social media disclosure.
In order to improve the performance of the feature selection algorithm, a feature selection algorithm based on K-means clustering is designed. the algorithm makes use of the idea of K-means clustering based on cosine ...
详细信息
In order to improve the performance of the feature selection algorithm, a feature selection algorithm based on K-means clustering is designed. the algorithm makes use of the idea of K-means clustering based on cosine distance to cluster the features, so that the obtained feature subset has strong correlation and no redundancy. the experimental results show that the feature selection algorithm based on K-means clustering has high efficiency for classification tasks and has short running time, so the algorithm has strong practicability for feature selection.
the performance analysis and optimization of a hybrid robot, to maximize its speed, the natural frequency and the static stiffness is the subject of this paper. Based on delta robot, a hybrid robot with 5 degrees of f...
详细信息
the performance analysis and optimization of a hybrid robot, to maximize its speed, the natural frequency and the static stiffness is the subject of this paper. Based on delta robot, a hybrid robot with 5 degrees of freedom(DOFs) is proposed. Its performance parameters are subjected to the dimension of the hybrid robot. the speed is calculated by the kinematics. the static stiffness analysis and model analysis are done to match the performance parameters withthe structure. As to the optimization of the robot, the optimization goals are speed, natural frequency and static stiffness. the design parameters are robot dimensions. It is a multi-objective problem. the multi-objective optimization is transferred into single-objective optimization by assigning a weight to each objective function. Finally, two solutions of the design parameters are represented in this paper.
Transformers are critical assets of power system network and their adequate protection is a matter of vital importance. Modern protection relays are usually defined as intelligent electronic device (IED) s, and they p...
详细信息
Transformers are critical assets of power system network and their adequate protection is a matter of vital importance. Modern protection relays are usually defined as intelligent electronic device (IED) s, and they provide huge flexibility and enhanced protection features to assure correct operation of the equipment. Transformer protection IEDs are equipped with key features such as differential and restricted earth fault (REF) protection along with several other functionalities as per the guidelines of IEEE C37.91. these functions are available with enhanced facilities such that it can incorporate the difference in phase angle based on vector rotation, ratio correction of current transformers used, interposing CT corrections etc... the increase in flexibility of the IED has also increased the complexity of programming it where a trivial error in the configuration will result in unwarranted operation causing loss of power and reduction of equipment life. Perfect implementation of protection needs proper testing of all programming and configurations, where the complexities of transformer vector shift, magnitude compensation, 2nd harmonic interlock, differential and restrain algorithm of various manufacturer with unique characteristic complicates the testing procedure. this paper discusses about testing vector groups and the facilities in IEDs to adapt to it, along with different field cases where the IEDs have misbehaved due to improper testing, and to address the same various methodologies and features available in modern testing kits, through which the testing of IEDs is standardized ensuring proper commissioning of the system.
Modern society is increasingly mediated by computers. the quantity and diversity of data generated daily is growing at an astounding rate. While the number of people withprogramming ability is also growing, the perce...
详细信息
Modern society is increasingly mediated by computers. the quantity and diversity of data generated daily is growing at an astounding rate. While the number of people withprogramming ability is also growing, the percentage of the population with such capability remains in the single digits. this means that we are witnessing a growing gap between need and capacity. Some of the need can be met by packages and apps that provide canned or predefined analysis, but these restrict analyses to those anticipated by the creators of those packages and apps. It is essential that in a data society nearly all citizens have a capacity to program. therefore, it is critical that we find "programatic" analysis capabilty that is available and accessibly by most citizens. (C) 2016 Published by Elsevier B.V.
Automatic programming can be defined as developing software in a high abstraction level. the definition of automatic programming is not precise because what is meant by automatic programming is changing over time. the...
详细信息
ISBN:
(纸本)9781467386142
Automatic programming can be defined as developing software in a high abstraction level. the definition of automatic programming is not precise because what is meant by automatic programming is changing over time. the goal of automatic programming has the programmer set the specifications of a program and the computer generate the source code of that program. there exists a group of specification languages that vary in their properties;the Descartes specification language is known to be comprehensible and easily constructible. Descartes represents the specifications by defining a system's inputs and outputs, as well as the relationship between these as functions. Descartes has been extended to support concurrent systems. these features made Descartes to be a good basis to build this research effort on. this research effort studied automatic programming approaches and created a shortcut between specifications and implementation with all its benefits. this research created a way to transform Descartes specifications into C source code automatically. Automatic programming can apply to all fields of knowledge that can be automated;therefore, the scope of this research project was restricted to a few case studies that involve parallel programming.
Gamification and in particular game-based learning is significantly gaining ground during the latest decades. It expresses a different approach to education that is mixing education with gaming, aiming to enhance the ...
详细信息
ISBN:
(纸本)9781509034291
Gamification and in particular game-based learning is significantly gaining ground during the latest decades. It expresses a different approach to education that is mixing education with gaming, aiming to enhance the learning experience with game mechanics and rules and to provide stronger motivations for lifelong learning. Many works have illustrated the benefits of learning while playing. this work presents such a game-based approach that has been adopted and used in the development of an online multiplayer platform game, with a purpose to teach or train programming with JavaScript. In effect it is like what is usually called a serious game, or a game with a purpose. the game, jLegends, is online and available for everyone to train and test knowledge on programming and logic, within a role-playing gaming approach. jLegends is built with source-code scalability in mind, in order to be expandable or even become open-sourced in the future
We address problems of finding median and center strings for a probability distribution on a set of strings under Levenshtein distance, which are known to be NP-hard in a special case. there are many applications in v...
详细信息
Denotational semantics is an approach for giving a mathematical meaning to programming languages and systems. It gives the language designers a tool for high level abstract definitions. In aspect oriented programming,...
详细信息
ISBN:
(纸本)9781467386142
Denotational semantics is an approach for giving a mathematical meaning to programming languages and systems. It gives the language designers a tool for high level abstract definitions. In aspect oriented programming, advice is weaved in designated locations of an underlying program specified by a pointcut expression. It is the job of the language implementer to specify how weaved code gets to be inserted into the proper location. Current denotational semantics of languages do not have the necessary constructs for accepting this weaved code. In this paper, we preset a denotational semantics formal description that embodies the representation of constructs to be woven by some aspect. It illustrates the a formal description of the mechanism of where and how woven advice is inserted. the semantics presented are intended to be a general baseline for the use of any advice in any random joinpoint.
It is known that code readability has an impact on software quality. this paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of in...
详细信息
ISBN:
(纸本)9781467386142
It is known that code readability has an impact on software quality. this paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of informatics programs. In this set are included practices with both positive and negative impact, the latter mainly from bad smells. A survey was made with OOP teachers in order to assess the significance of teaching a set of good practices. the results showed that teachers consider it important to teach the defined set. Such result was statistically significant. Still, the same level of significance was not awarded to all practices. Some additional results are presented.
暂无评论