We introduce a Horn description logic called Horn-DL, which is strictly and essentially richer than Horn-scriptSscriptRscriptOscriptIscriptQ, while still has PTime data complexity. In comparison with Horn- scriptSscri...
详细信息
In the last decade of Wireless Network security, using text and biometrics for various types of security problems has gained popularity. This research work merges both, the concepts of packet scheduling and the networ...
详细信息
In the last decade of Wireless Network security, using text and biometrics for various types of security problems has gained popularity. This research work merges both, the concepts of packet scheduling and the network security issues of the wireless data packets exchange. To achieve the high Quality-of-Service (QoS) in WLAN, we have replaced the existing Automated Security Aware Packet Scheduling Algorithm (ASPS) with novel Bio-cryptic Security-Aware Packet Scheduling-Algorithm (BSPS). This BSPS Algorithm besides assuring the best performance in packet delivery ratio, load on network switch and also intensifying the security level to the desirable WN by applying Bio-cryptographic methods in each security level. Our simulation outcome proves that our scheme is performing better than existing algorithms in terms of the quality of security.
This paper concerns multimodal transport systems (MTS) represented by a supernetworks in which several unimodal networks are connected by transfer links and focuses on the scheduling problems encountered in these syst...
详细信息
This paper concerns multimodal transport systems (MTS) represented by a supernetworks in which several unimodal networks are connected by transfer links and focuses on the scheduling problems encountered in these systems. Assuming unimodal networks are modeled as cyclic lines, i.e. the routes determining stream-like moving transportation means, a problem of an alternative itinerary selection for an origin-destination (O-D) trip in the context of emergency relief is considered. Emergency relief dealing with the contingency events and deciding on MTS robustness can be evaluated in terms of feasible itineraries for assumed (O-D) trip. Since itinerary planning problem, constitutes a common routing and scheduling decision faced by travelers, hence the main question regards of itinerary re-planning and particularly a method aimed at prototyping of mode sequences and paths selections. The declarative model of multimodal processes driven itinerary planning problem is our main contribution. Illustrative examples providing alternative itineraries in some cases of MTS malfunction are presented.
Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource dea...
详细信息
Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource deadlock avoidance policies are considered. The objective of the research is to provide a declarative model enabling to state a constraint satisfaction problem aimed at AGVs fleet scheduling subject to assumed itineraries of concurrently manufactured product types. In other words, assuming a given layout of FMS's material handling and production routes of simultaneously manufactured orders, the main objective is to provide the declarative framework aimed at conditions allowing one to calculate the AGVs fleet schedule in online mode. An illustrative example of the relevant algebra-like driven step-by-stem cyclic scheduling is provided.
With rapid increase in the deployment of high-definition surveillance cameras, the need of efficient video analytics for extracting video objects from high-resolution surveillance videos in real time has become more a...
详细信息
With rapid increase in the deployment of high-definition surveillance cameras, the need of efficient video analytics for extracting video objects from high-resolution surveillance videos in real time has become more and more demanding. Conventional background modeling methods, e.g., the Gaussian mixture modeling (GMM), although having long been proven to be effective for foreground object extraction, are actually not efficient enough for the real-time analysis of high-resolution videos. We thus propose a novel background modeling approach using nonparametric histogramming that can derive a holistic, histogram-based background model for each pixel with low computational complexity. Due to the simple algorithm design, the proposed approach can be easily implemented by fixed-point computation. Without using any accelerator (like CUDA, Intel SIMD, or Intel IPP library), multi-threading or sub-sampling technique, our implementation of the proposed algorithm achieves high efficiency for the processing of 1920×1080 color videos at ~18.81 fps on a general computer (Intel Core i7 3.4GHz CPU). In the experimental comparisons, the proposed approach is ~3.9 times faster than the GMM, while giving comparable foreground segmentation results.
Forthcoming technology nodes are posing major challenges on the manufacturing of reliable (real-time) systems: process variations, accelerated degradation aging, as well as external and internal noise are key examples...
详细信息
ISBN:
(纸本)9781450321532
Forthcoming technology nodes are posing major challenges on the manufacturing of reliable (real-time) systems: process variations, accelerated degradation aging, as well as external and internal noise are key examples. This paper focuses on real-time systems reliability and analyzes the state-of-the-art and the emerging reliability bottlenecks from three different perspectives: technology, circuit/IP and full system.
This paper spank out the enormity of unknown users hand on web service users' and their data protection level bump up as an issue in cloud users mind. Once hiring a data space in cloud it's the responsibility ...
详细信息
This paper spank out the enormity of unknown users hand on web service users' and their data protection level bump up as an issue in cloud users mind. Once hiring a data space in cloud it's the responsibility of both to accustomed the stored information's privacy and preserving it in a secret way. It is noticed by the academicians and researchers oodles and masses of privacy breaches relentlessly observable fact dealt globally. It is one of the hottest research topics. This work targets data privacy and its preservation by proposing an evolutionary approach to safeguard the confidential data stored in the cloud. It also focuses on prominent study of users' privacy need and to preserve data distorted from intermediate digital data thieves.
Five teams participated in the Multi-Agent Programming Contest in 2013: All of them gained experience in 2012 already. In order to better understand which paradigms they used, which techniques they considered importan...
详细信息
An adaptive supervisory switching control scheme for nonlinear uncertain systems is developed. Such a scheme comprises: a family of nonlinear candidate controllers, designed using a convex control design methodology;a...
详细信息
ISBN:
(纸本)9781467357159
An adaptive supervisory switching control scheme for nonlinear uncertain systems is developed. Such a scheme comprises: a family of nonlinear candidate controllers, designed using a convex control design methodology;and a Lyapunovbased switching criterion that orchestrates which of the candidate controllers should be put in feedback with the uncertain plant. The family of candidate controllers is designed in such a way that, for every portion of the uncertainty set there is one Lyapunov function whose derivative is decreasing with a prescribed rate. Such Lyapunov functions are used by the switching logic to assess which is the most suitable controller to be put in feedback. The resulting scheme guarantees semi-global stability with desired transient performance, in terms of decaying rate of the derivative of the Lyapunov function.
暂无评论