When solving a single objective optimization problem, a user desires an accurate solution, but may be computationally constrained in terms of the number of objective function evaluations (OFEs) that can be afforded. T...
详细信息
ISBN:
(纸本)9781424478354
When solving a single objective optimization problem, a user desires an accurate solution, but may be computationally constrained in terms of the number of objective function evaluations (OFEs) that can be afforded. The OFE budget is application specific, varying depending on the time, computing resources, and the nature of the optimization problem. Control parameter value sensitivity to this OFE budget constraint is investigated for the particle swarm-and differential evolution optimization algorithms. The algorithms are tuned to selected testing problems under different OFE budget constraints, and then their performance is assessed at different OFE budgets from what they were tuned for. The results give evidence that combinations of optimization algorithm control parameter values which perform well for high OFE budgets do not perform well for low OFE budgets and vice versa. This indicates that when selecting control parameter values for these two algorithms, not only should the optimization problem characteristics be taken into account, but also the computational constraints.
Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process;however, ICS are ex...
详细信息
ISBN:
(纸本)9781479980369
Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process;however, ICS are exposed to the same security vulnerabilities associated with enterprise networks. Cryptography has been deployed to overcome the associated data communication weaknesses between each ICS node through the use of block ciphers;however, the drawback of applying cryptographic algorithms to ICS is the additional communication latency. This paper investigates the relationship between security constructs and latency for closed loop control system with test conducted in a simulated environment. A case scenario is illustrated to demonstrate the impact of the results obtained to a real world context.
暂无评论