In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a pe...
详细信息
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a permutation of integer. Although the final form of chromosome is the same as the existing form, the decoding process is different. In our decoding process, every permutation of integer is transformed into an ordered set of all edges in the stability-directed graph, and then the ordered set of edges is transform into an ordered set of assembly states. The correctness of this method is proved, the combination of this method and the existing genetic algorithm is discussed, and an example is presented to show the effectiveness of our encoding method.
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination ...
详细信息
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. This paper proposes a secure interoperation architecture to facilitate the establishment of secure...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. This paper proposes a secure interoperation architecture to facilitate the establishment of secure interoperability in multidomain environments, which employ Usage Control (UCON) policies, followed with the attribute management to support usage control in multidomain environment. The study of the instance shows the validity of the proposed architecture, which can address the requirements of access policy representation for temporal and time consuming problems.
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are desig...
详细信息
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are designed to implement the asymptotic stabilization of this kind of new hyperchaotic system by choosing appropriate controller structure and parametric updating law, respectively. The effectiveness of the proposed adaptive control method is verified by simulation results.
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables ...
详细信息
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables of the drive system and the state variables of the response system, the hyperchaotic synchronization problem is transformed into the stabilization control problem of the origin of the synchronization error system. Based on the Lyapunov stability, a new adaptive synchronization controller is designed and the asymptotic stability of the origin of the synchronization error system is proved, simulation results illustrate the correctness of the proposed generalized synchronization method.
Users have vast amounts of information at their disposal and access to many tools that can compute on that data. Often, no particular program can fulfill a user's needs; or, when such a program exists, it may be t...
详细信息
Users have vast amounts of information at their disposal and access to many tools that can compute on that data. Often, no particular program can fulfill a user's needs; or, when such a program exists, it may be too obscure for the user to find. When users encounter this problem, they resort to ad-hoc approaches, such as importing and exporting data to different file formats, as a way to piece together disparate features from several different programs. As a result, users end up manually entering and manipulating data, defeating the purpose of automatic computing machines. In this paper, we introduce the concept of a Creativity Engine, which is like a search engine over the possible links between software libraries. A Creativity Engine can be used to bring together libraries that were never intended to work together, in way that can bring within users' reach the almost infinite flexibility their machines have to transform data.
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec...
详细信息
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as economically sustainable for all organizations. Furthermore, studies have found that Recurrent Neural Network out-performs Feed-forward Neural Network, and Elman Network. This paper, therefore, proposes a scalable application-based model for detecting attacks in a communication network using recurrent neural network architecture. Its suitability for online real-time applications and its ability to self-adjust to changes in its input environment cannot be over-emphasized.
Due to global communication systems, the borders are no longer important, and knowledge can be spread over continents, countries, cultures and languages. Sharing knowledge with people all over the world is one of the ...
详细信息
Due to global communication systems, the borders are no longer important, and knowledge can be spread over continents, countries, cultures and languages. Sharing knowledge with people all over the world is one of the challenges of the project ELLEIEC, which objective is to establishing a Virtual Centre of Entrepreneurship (VCE), offering e-learning courses (in foreign languages) for developing entrepreneurial skills and competencies. Elearning courses provide learners with the opportunity for developing technical and linguistic competences in a single emodule. In the development phase, we encountered four “variables”, which need to be harmonized in the best possible way to enable a successful learning process: professional content, e-learning environment, foreign language and different cultures. The main part of the paper focuses on the analysis of cultural and linguistic influences on designing and implementing an e-learning module.
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis...
详细信息
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered discrete-time system. Firstly, the T-S fuzzy representation for the discrete-time hyperchaotic system is presented. Then, a state feedback controller is designed based on the parallel distributed compensation technique. According to the linear matrix inequality method and exact linearization technique, two kinds of approaches are given to solve the controller gain matrices. Finally, the validity of the proposed chaotic suppression method is illustrated by a numerical example.
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p...
详细信息
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering privacy and confidentiality, etc. To describe the uncertainty in data, probabilistic approaches are widely used among other approaches. This paper gives a survey study on some probabilistic approaches in database fields as well as in semi-structured datasets, especially in XML datasets.
暂无评论