Multi-Agent systems (MAS) are collection of loosely coupled intelligent agents. These systems operate in a distributed, highly dynamic, unpredictable and unreliable environment in order to meet their overall goals. Ag...
详细信息
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The successof any gas recognition system depends on its computationalcomplexity and its robustness. In this work,...
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The success
of any gas recognition system depends on its computational
complexity and its robustness. In this work, we propose a
new low-complexity recognition method which is tested and
successfully validated for tin-oxide gas sensor array chip. The
recognition system is based on a vector angle similarity measure
between the query gas and the representatives of the different gas
classes. The latter are obtained using a clustering algorithm based
on the same measure within the training data set. Experimented results on our in-house gas sensors array show more than 98 % of correct recognition. The robustness of the proposed method
is tested by recognizing gas measurements with simulated drift.
Less than 1 % of performance degradation is noted at the worst case
scenario which represents a significant improvement when
compared to the current state-of-the-art.
This paper will study and evaluate watermarking technique by Zain and Fauzi [1]. Recommendations will then be made to enhance the technique especially in the aspect of recovery or reconstruction rate for medical image...
详细信息
In July 2007 Carnegie Mellon University (Carnegie Mellon®) hosted its sixth annual offering of the Information Assurance Capacity Building Program (IACBP). The goal of the intensive in-residence summer program is...
详细信息
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the gen...
详细信息
ISBN:
(纸本)9783540730934
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the generation of the reachability graph and the theory of regions was proposed. In this paper, we propose a new synthesis method based on the composition of Petri net modules, avoiding the exploration of the reachability graph. The behavior of ACMs is formally defined and correctness properties are specified in CTL. Model checking is used to verify the correctness of the Petri net models. The algorithms to generate the Petri net models are presented. Finally, a method to automatically generate C++ source code from the Petri net model is described.
Agents' pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural and satisfying formalization of these ...
详细信息
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to ...
详细信息
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to provide decision-making help to re-assign methods and attributes to classes in a class diagram. Our solution is based on a multi-objective genetic algorithm (MOGA) and uses class coupling and cohesion measurement. Our MOGA takes as input a class diagram to be optimized and suggests possible improvements to it. The choice of a MOGA stems from the fact that there are typically many evaluation criteria that cannot be easily combined into one objective, and several alternative solutions are acceptable for a given OO domain model. This article presents our approach in detail, our decisions regarding the multi-objective genetic algorithm, and reports on a case study. Our results suggest that the MOGA can help correct suboptimal class responsibility assignment decisions.
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infrastructure-based networks to be compatible with the characteristics of MANET. Moreover, we add some new features and their associated measurements that we believe important for testing new proposed IDS. The modified measurements with the new added ones form a set of measurements that will be used throughout the testing process. To the best of our knowledge, there has not been any work done for testing IDS in MANET. Simulators are the most common tools used for testing the IDS. Therefore, we add some precautions for choosing a simulator and a list of available simulators. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs. Finally, we present some input parameter precautions that help on having more trustworthy testing results.
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications ...
详细信息
ISBN:
(纸本)9781595932594
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications for educators. Copyright 2006 ACM.
暂无评论