We consider a dynamic continuous gas production at a deposit. We set and solve the optimization control problem for maximum profit, taking into account the discount factor. The problem posed relates to some optimal co...
详细信息
The objective of this paper is to develop a new solution methodology for matrix games, in which goals are viewed as intuitionistic fuzzy sets (IFSs) and the elements of the pay-off matrix are represented by triangular...
详细信息
The objective of this paper is to develop a new solution methodology for matrix games, in which goals are viewed as intuitionistic fuzzy sets (IFSs) and the elements of the pay-off matrix are represented by triangular intuitionistic fuzzy numbers (TIFNs). In this methodology, a suitable ranking function is defined to establish an order relation between two TIFNs, and the concept of intuitionistic fuzzy (I-fuzzy) inequalities is interpreted. Utilizing these inequality relations and ranking functions, a pair of linear programming models is derived from a pair of auxiliary intuitionistic fuzzy programming models. Based on the aspiration levels, this pair of linear programming models is solved to determine the optimal strategies for both players of the game. The proposed method in this paper is illustrated with a voting share problem to demonstrate the validity and applicability of the method.
Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a che...
Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a cheap and inexpensive way. The advantage of our proposal is the possibility of building and testing new networks using dynamicist approach in artificial intelligence.
High-dimensional torus networks are becoming common in flagship HPC systems, with five of the top ten systems in June 2014 having networks with more than three dimensions. Although such networks combine performance wi...
详细信息
High-dimensional torus networks are becoming common in flagship HPC systems, with five of the top ten systems in June 2014 having networks with more than three dimensions. Although such networks combine performance with scalability at reasonable cost, the challenge of how to achieve optimal performance remains. Tools are needed to help understand how well the traffic is distributed among the many dimensions. This involves not only capturing network traffic but also its comprehensible visualization. However, visualizing such networks requires projecting multiple dimensions onto a two-dimensional screen, which is naturally challenging. To tackle this problem, in this position paper, we propose a visualization technique which can display traffic on torus networks with up to six dimensions. Our fundamental approach is to simultaneously present multiple views of the same network section, with each view visualizing different dimensions. Furthermore, we leverage the multiple-coordinate system concept and combine it with a customized polygon view to provide both a global and a zoomed-in perspective of the network. By interactively linking all the views, our technique makes it possible to analyze how the communication pattern of an application is mapped onto a network.
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinu...
详细信息
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.
This paper puts forward the Graphical Interactive Diagnosing, Testing and Slicing System (GIDTS) which is a graphical programming environment for PROLOG programs. The IDTSpart of the system integrates Shapiro's In...
ISBN:
(纸本)9781581131376
This paper puts forward the Graphical Interactive Diagnosing, Testing and Slicing System (GIDTS) which is a graphical programming environment for PROLOG programs. The IDTSpart of the system integrates Shapiro's Interactive Diagnosis Algorithm with the Category Partition Testing Method (CPM) and a slicing technique performing the algorithmic debugging and functional testing of PROLOG programs. The integration of IDTS with a graphical user interface (GUI) supports the whole functionality of IDTS and provides a user-friendly environment giving the user more information on the state of the debugging process. GIDTS extends IDTS to a complete programming environment. It allows one to handle the debugging of complex programs using the extended syntax and semantics of PROLOG in a very flexible way. A static code diagnosis has also been implemented. In addition GIDTS supports debugging-directed editing of the source program, and a quick source code navigation via any of the tools (for example: the debugger, the static call graph and the information retriever). All these features are supported by the graphical user interface.
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
Multiple petaflops-lass machines will appear during the coming year, and many multipetaflops machines are on the anvil. It will be a substantial challenge to make existing parallel CSE applications run efficiently on ...
The environment protection is one of the most actual problems, because of the fact that the pollution became a major danger for the planet life. The environment pollution is caused because some pollution agents are in...
详细信息
The environment protection is one of the most actual problems, because of the fact that the pollution became a major danger for the planet life. The environment pollution is caused because some pollution agents are in a too big quantity and for la long time that they become dangerous for the human health, for the flora, for the fauna and for the constructions too. The pollution sources can be classified in natural and artificial sources. The quality of the environment from a specific area at a certain time can be appreciated by: a) the air quality;b) the water quality;c) the soil quality;d) the health level of the population;e) the deficit of animals and plants species that are accounted for. In the paper there are given the urban traffic on the principal routs inside the Cluj-Napoca municipality. The traffic is the constituent part of the research activity of the national project having the destination the monitoring of the noise and vibrations into an urban agglomeration, applied to the Cluj-Napoca town. This study is the first step for the "noise map" asked for the Romania integration in the European Union for the team researchers of TUCN under the direction of the prof. dr. ing. Mariana ARGHIR.
暂无评论