Modeling and simulation of physical security systems involves designing and analyzing security systems, protocols, and policies that aim to protect fixed-site facilities against intrusions by external threats, as well...
详细信息
ISBN:
(纸本)1595933158
Modeling and simulation of physical security systems involves designing and analyzing security systems, protocols, and policies that aim to protect fixed-site facilities against intrusions by external threats, as well as unauthorized acts by insiders. Realistic and credible simulations of such systems require incorporation of human behavior models along with cooperative engagement policies such as team formation, allocation of roles, team reorganization, and distributed decision making. In this paper, we discuss agent-based conceptual design of a physical systems security simulation within the context of a shoplifting study. The primary contributions include (1) the use of a conceptual facility configuration meta-model that is used for flexible instantiation of environmental settings in which agents (i.e.. customers, including shoplifters, workers, and security personnel) are situated, (2) a novel line-of-sight mechanism for realizing the visual perception subsystem of agents, and (3) the simulation of reactive as well as deliberate decision making processes of agents.
The field of presentation of Extended Classifier System(XCS) has undergone many fluctuations and shifts over the years to adapt different domain problems. With the increasing usage of application of artificial intelli...
详细信息
ISBN:
(纸本)9781450334884
The field of presentation of Extended Classifier System(XCS) has undergone many fluctuations and shifts over the years to adapt different domain problems. With the increasing usage of application of artificial intelligence requirements for more complexity presentations of XCS have become more critical. And learning multiple problems is a subject that was needed but few one studied. To dynamically learn multiple problems during a single learning process, we applied a novel representation of classifier conditions of the XCS, named Sensory Tag (ST) to achieve this goal. The XCS with the ST as the input representation is called XCSSTC. The experiments of the proposed method were conducted for the single step problems. The potential of XCSSTC's use in future application of artificial intelligence clearly needs further exploration.
In this work, we study the impact of a relay node to a network with a finite number of users-sources and a destination node. We assume that the users have saturated queues and the relay node does not have packets of i...
详细信息
During a competition, eSports players will experience many emotions due to the situation in the game. The generation of emotions will affect the performance of the players in the game. By monitoring players’ facial e...
详细信息
In many applications a user attempts to configure a complex object with many possible internal choices. Recommendation engines that automatically configure such objects given user preferences and constraints, may prov...
详细信息
In this paper we study a social welfare maximization problem for spectrum sharing in cognitive radio networks. To fully use the spectrum resource, the spectrum owned by the licensed primary user (PU) can be leased to ...
详细信息
In cloud computing environments, demands from different users are often handled on virtual machines (VMs) which are deployed over plenty of hosts. Huge amount of electrical power is consumed by these hosts and auxilia...
详细信息
This paper presents requirement of a system to synchronously monitor partial discharge activity with synchronized power quality (PQ) measurements from a substation. Increased use of non-linear loads in power systems l...
详细信息
The widespread dissemination of misinformation and propaganda has become a crucial issue in societal conversations. This study presents an innovative framework to counter propaganda within information warfare using a ...
详细信息
The one strong point of XML is that it allows document owners to create their own structure and tag names. It might be that some XML documents contain the same information but use a different structure and/or tag name...
详细信息
暂无评论