The failure probability of a system can be expressed as an integral of the joint probability density function within the failure domain defined by the limit state functions of the system. Generally, it is very difficu...
详细信息
The failure probability of a system can be expressed as an integral of the joint probability density function within the failure domain defined by the limit state functions of the system. Generally, it is very difficult to solve this integral directly. The evaluation of system reliability has been the active research area. Some methods were developed to solve system reliability analysis, such as Monte Carlo method, importance sampling method, bounding techniques and probability network evaluation technique (PNET). This paper presents the implementation of several optimization algorithms, modified method of feasible direction (MFD), sequential linear programming (SLP) and sequential quadratic programming (SQP), in order to demonstrate the convergence abilities and robust nature of the optimization technique when applied to series system reliability analysis. Examples taken from the published references were calculated and the results were compared with the answers of various other methods and the exact solution. Results indicate the optimization technique has a wide range of application with good convergence ability and robustness, and handle problems under generalized conditions or cases.
The efficiency of transferring a pack of small-sized flies or a large-sized file is very low in FTP based file transfer system. To solve this problem, we have studied the optimized method of different types of file tr...
详细信息
The efficiency of transferring a pack of small-sized flies or a large-sized file is very low in FTP based file transfer system. To solve this problem, we have studied the optimized method of different types of file transfer and present an adaptive transfer algorithm. Based on this algorithm. We design and implement the file transfer subsystem of global distributed storage system.
Data mining has become of great importance owing to ever-increasing amounts of data collected by large organizations. This paper propose an data mining algorithm called ant-miner (I),which is based on an improvement o...
详细信息
Data mining has become of great importance owing to ever-increasing amounts of data collected by large organizations. This paper propose an data mining algorithm called ant-miner (I),which is based on an improvement of ant colony system (ACS) algorithm. Experimental results show that ant-miner (I) has a higher predictive accuracy and much smaller rule list than the original ant-miner algorithm.
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. Ho...
详细信息
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. However, the agent-based computation and high-level interaction protocols foster the modern computation and distributed information processing successfully. The multi-agent system (MAS) plays an important role in the analysis of the human-interaction theory and model building. This study focuses on the formal description of MAS, the conflict-resolving mechanisms and the negotiation in MAS. In this paper, we present a formalism for reasoning about the interaction of multi-agent system, which is MAS model based on negotiation axiom system of capability and thought (CTN system). We first present the semantic frame and define the global states, the class of the CTN system, the running and reachable states for the CTN system. Then we present the axiomatic of negotiating logic. We also prove the Logical Consistency and Completeness of the CTN system and discuss the conflict-resolving mechanisms. The semantic of CTN model is intuitive, rational and natural, and the CTN model is a formal description by integrated the ability and thought status of Agent.
We present a grammar based approach for specifying a transformation as a sequence of transformation operations that operate on an intermediate representation. The transformation sequence is specified in the semantic a...
详细信息
We present a grammar based approach for specifying a transformation as a sequence of transformation operations that operate on an intermediate representation. The transformation sequence is specified in the semantic actions of an abstract attribute grammar. The mapping between the object-oriented design of the intermediate representation and the abstract grammar directly reflects the object-oriented design in the structure of the grammar. It has properties that permit utilizing grammar based tools at arbitrary abstraction levels of the language representation. The program fragments can be both source strings and fragments of the intermediate representation that can be used interchangeably in the specification. We demonstrate the applicability of the approach by using available attribute grammar tools and the source-to-source infrastructure ROSE for specifying and performing transformations of C+ + programs. The results of data flow analysis tools using fixed point algorithms is integrated as available attributes that can be used for enabling or disabling transformation sequences. With the abstract attribute grammar the transformation is computed as an attribute value that represents a sequence of restructure operations. The composition of different transformation sequences permits the reuse of sub-transformation specifications. Eventually we discuss the correspondence to rewrite tools permitting a pattern based restructuring of the program representation.
This paper presents an overview of roadmapping methodologies and introduces a recent initiative to develop a roadmap for technology-enhanced professional training, as part of the European IST PROLEARN Network of Excel...
详细信息
ISBN:
(纸本)1920017119
This paper presents an overview of roadmapping methodologies and introduces a recent initiative to develop a roadmap for technology-enhanced professional training, as part of the European IST PROLEARN Network of Excellence. A detailed presentation of the roadmapping phases is given and the nature and context of the anticipated results are outlined. The proposed methodology involves the key phases of scenario-building, paradigm identification and gap analysis.
For many years discrete-event simulation has been used to analyse production and logistics problems in manufacturing and defence. In the early 1980s, visual interactive modelling environments were created that support...
详细信息
ISBN:
(纸本)9781622761418
For many years discrete-event simulation has been used to analyse production and logistics problems in manufacturing and defence. In the early 1980s, visual interactive modelling environments were created that supported the development, experimentation and visualisation of simulation models. Today these environments are termed Commercial-off-the-shelf Simulation Packages (CSPs). With the advent of distributed simulation and, later, the High Level Architecture, the possibility existed to link together these CSPs and their models to simulate larger problems within enterprises (e.g. multiple production lines) and across supply chains. However, the problem of standardising the use of the HLA and its constituent parts in this domain exists. The solution of this problem is the work of the CSP Interoperability Product Development Group (CSPI-PDG). The purpose of this paper is to introduce the CSPI-PDG and to review for the first time in a SISO Workshop the suite of standards proposed by the group and the current progress.
The high Level Architecture (HLA) is an IEEE standard for interoperating simulation federates. In this paper, we describe a set of requirements that simulation packages need to satisfy in order to be made interoperabl...
详细信息
ISBN:
(纸本)9780780395190
The high Level Architecture (HLA) is an IEEE standard for interoperating simulation federates. In this paper, we describe a set of requirements that simulation packages need to satisfy in order to be made interoperable using the HLA standard. AutoSched AP, a commercial off-the-shelf simulation package (CSP) which is widely used in the semiconductor industry, was used as a case study for this interoperation exercise. We demonstrated that a straightforward customization of the CSP through a middleware that provides standard functions for interoperation may not provide a satisfactory solution. A specially optimized time synchronization mechanism needs to be installed to ensure good execution efficiency. Experimental results using a Borderless Fab model that comprises of two factory models show that an optimized time synchronization mechanism results in an execution time that is ten times better than a straightforward application of the HLA runtime infrastructure's time synchronization mechanism.
The book introduces a hot topic of novel and emerging computing paradigms and architectures -computation by travelling waves in reaction-diffusion media. A reaction-diffusion computer is a massively parallel computing...
详细信息
ISBN:
(数字)9780080461274
ISBN:
(纸本)9780444520425
The book introduces a hot topic of novel and emerging computing paradigms and architectures -computation by travelling waves in reaction-diffusion media. A reaction-diffusion computer is a massively parallel computing device, where the micro-volumes of the chemical medium act as elementary few-bit processors, and chemical species diffuse and react in parallel. In the reaction-diffusion computer both the data and the results of the computation are encoded as concentration profiles of the reagents, or local disturbances of concentrations, whilst the computation per se is performed via the spreading and interaction of waves caused by the local disturbances. The monograph brings together results of a decade-long study into designing experimental and simulated prototypes of reaction-diffusion computing devices for image processing, path planning, robot navigation, computational geometry, logics and artificial intelligence. The book is unique because it gives a comprehensive presentation of the theoretical and experimental foundations, and cutting-edge computation techniques, chemical laboratory experimental setups and hardware implementation technology employed in the development of novel nature-inspired computing devices. Key Features: - Non-classical and fresh approach to theory of computation. - In depth exploration of novel and emerging paradigms of nature-inspired computing. - Simple to understand cellular-automata models will help readers/students to design their own computational experiments to advance ideas and concepts described in the book . - Detailed description of receipts and experimental setups of chemical laboratory reaction-diffusion processors will make the book an invaluable resource in practical studies of non-classical and nature-inspired computing architectures . - Step by step explanations of VLSI reaction-diffusion circuits will help students to design their own types of wave-based processors.
The paper studies the packet delay distribution of the IEEE 802.11 distributed coordination function (DCF) protocol. DCF treats packets in an unfair manner. Results indicate that, in large networks, most packets have ...
详细信息
The paper studies the packet delay distribution of the IEEE 802.11 distributed coordination function (DCF) protocol. DCF treats packets in an unfair manner. Results indicate that, in large networks, most packets have very low time delays, some packets have delays close to the average value and a small number of packets experience extremely high delays. We study the DCF delay distribution by developing a mathematical model that calculates the important properties of the constituent curves of the delay distribution curve, namely the probability that a packet is successfully transmitted from a particular backoff stage and the average delay of the successfully transmitted packets from this backoff stage. The model is simple, gives an insight into the internal mechanisms of DCF and applies to both basic and RTS/CTS access mechanisms. The accuracy of the analytical model is verified by simulations. Analytical results are presented that explore the effect of network size and of the initial contention window size on the fairness of DCF regarding the distribution of packet delays.
暂无评论