As concurrent software systems become larger, the interaction of their components is becoming more complex. This interaction may limit reuse, making it difficult to validate design and correctness and perhaps forcing ...
详细信息
ISBN:
(纸本)0769510809
As concurrent software systems become larger, the interaction of their components is becoming more complex. This interaction may limit reuse, making it difficult to validate design and correctness and perhaps forcing reengineering of these systems in order to meet future requirements. In order to reduce this complexity and to build stable and adaptable concurrent software systems, we present an approach that emphasizes the separation of interaction components from the functional components.
Integrating electrophysiological signals in larger systems is getting wider due to the fact that such modalities facilitate the daily tasks of users. However, the high cost of monitoring systems (e.g., oscilloscopes) ...
详细信息
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinu...
详细信息
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.
In this paper, we investigate six new transportation models with breakability and vehicle cost under some restriction on transported amount. An extra constraint on the total budget at each destination is imposed. Here...
详细信息
In this paper, we investigate six new transportation models with breakability and vehicle cost under some restriction on transported amount. An extra constraint on the total budget at each destination is imposed. Here six models are formulated under different environments such as crisp, stochastic and fuzzy. Using expected value of fuzzy number and chance constraint programming technique, we convert the respective fuzzy and random Models into its crisp equivalent. To get the preference of the objective function, we apply weighted sum method and a gradient based optimisation technique-generalised reduced gradient (GRG) method are applied and using LINGO-13 software to get the optimal solutions.
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more...
详细信息
We address the problem of performing a pipelined broadcast on a mesh architecture. Meshes require a different approach than other topologies, and their very nature puts a tighter bound on the performance that one can ...
详细信息
We address the problem of performing a pipelined broadcast on a mesh architecture. Meshes require a different approach than other topologies, and their very nature puts a tighter bound on the performance that one can hope to achieve. By using the appropriate techniques, however, one can obtain excellent performance for sufficiently long messages. The resulting algorithm will work on meshes of any dimension with any number of nodes. Our model assumes that the mesh is a torus and/or that it has bidirectional links and uses wormhole routing. Performance data from the Cray T3D are included.
Machine learning technique is full-fledged as a boosting sector to develop modeling and forecasting of complex time series observations in the present environment. This study made an attempt to inspect the future perf...
详细信息
An adaptive algorithm for LD converter steel refining control is presented. Avoiding the traditionally used balance approach, here a real-time process parameters estimation and control is applied. A Recursive Least Sq...
详细信息
An adaptive algorithm for LD converter steel refining control is presented. Avoiding the traditionally used balance approach, here a real-time process parameters estimation and control is applied. A Recursive Least Squares method is used and a minimum variance control strategy is realized. The original idea is that the converter steel making process| is considered as a continuous process which is sampled and one heat time is considered as one sample time. So, the process model parameters are adjusted after each heat and the algorithm adapts very fast to the technological conditions chanson. A distributed PS/XT computer two-leves control system is realized. Successful industrial results are obtained.
This book is an authoritative collection of contributions in the field of soft-computing. Based on selected works presented at the 6th World Conference on Soft Computing, held on May 22-25, 2016, in Berkeley, USA, it ...
详细信息
ISBN:
(数字)9783319754086
ISBN:
(纸本)9783319754079;9783030092238
This book is an authoritative collection of contributions in the field of soft-computing. Based on selected works presented at the 6th World Conference on Soft Computing, held on May 22-25, 2016, in Berkeley, USA, it describes new theoretical advances, as well as cutting-edge methods and applications. Theories cover a wealth of topics, such as fuzzy logic, cognitive modeling, Bayesian and probabilistic methods, multi-criteria decision making, utility theory, approximate reasoning, human-centric computing and many others. Applications concerns a number of fields, such as internet and semantic web, social networks and trust, control and robotics, computer vision, medicine and bioinformatics, as well as finance, security and e-Commerce, among others. Dedicated to the 50th Anniversary of Fuzzy Logic and to the 95th Birthday Anniversary of Lotfi A. Zadeh, the book not only offers a timely view on the field, yet it also discusses thought-provoking developments and challenges, thus fosteringnew research directions in the diverse areas of soft computing.
In the present work, we developed a mathematical model for dengue-Chikungunya co-infection to analyze the disease transmission dynamics and interrelationship. We considered the essence of time dependent optimal contro...
详细信息
暂无评论