In many applications one is faced with the problem that multiple objectives have to be optimized at the same time. Since typically the solution set of such multi-objective optimization problems forms a manifold which ...
详细信息
ISBN:
(纸本)9783319011271
In many applications one is faced with the problem that multiple objectives have to be optimized at the same time. Since typically the solution set of such multi-objective optimization problems forms a manifold which cannot be computed analytically, one is in many cases interested in a suitable finite size approximation of this set. One widely used approach is to find a representative set that maximizes the dominated hypervolume that is defined by the images in objective space of these solutions and a given reference point. In this paper, we propose a new point-wise iterative search procedure, Hypervolume Directed Search (HVDS), that aims to increase the hypervolume of a given point in an archive for bi-objective unconstrained optimization problems. We present the HVDS both as a standalone algorithm and as a local searcher within a specialized evolutionary algorithm. Numerical results confirm the strength of the novel approach.
This paper presents the design and in vitro evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors, shaped like stent cells, are fabricate...
详细信息
ISBN:
(纸本)9781467356541
This paper presents the design and in vitro evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors, shaped like stent cells, are fabricated from 28-μm thick foils of magnetoelastic Ni-Fe alloy and are conformally integrated with the stent. The typical sensitivity to viscosity is 427 ppm/cP over a 1.1-8.6 cP range. The sensitivity to mass loading is typically 63,000-65000 ppm/mg with resonant frequency showing an 8.1% reduction for an applied mass that is 15% of the unloaded mass of the sensor.
This position paper outlines the innovative probabilistic approach being taken by the EU Integrated Project PROXIMA to the analysis of the timing behaviour of mixed criticality real-time systems. PROXIMA supports mult...
详细信息
This position paper outlines the innovative probabilistic approach being taken by the EU Integrated Project PROXIMA to the analysis of the timing behaviour of mixed criticality real-time systems. PROXIMA supports multi-core and mixed criticality systems timing analysis via the use of probabilistic techniques and hardware/software architectures that reduce dependencies which affect timing. The approach is being applied to DO-178B/C and IS026262.
The role and importance of information technology and computers cannot be ignored due to their extensive usages in different application areas. Along with easier access to the Internet and computers, education has bec...
详细信息
The role and importance of information technology and computers cannot be ignored due to their extensive usages in different application areas. Along with easier access to the Internet and computers, education has become one of the foremost areas benefiting from this progress. Minimizing geographical barriers and facilitating knowledge sharing between people are some of the outcomes of this progress. Because of the advances in information technology, needs for minimizing geographical barriers and facilitating knowledge sharing, computer-supported collaborative learning (CSCL) has emerged. In this study, types of communication tools used by students to share their knowledge during their group projects were analyzed (excluding the e-mail service) in terms of preference. A survey containing questions about demographic information and preferences of communication tools used by students during their group projects was conducted to a reasonable number of students and results are presented in this study.
The increasing complexity of regulations governing and tracking the special education process made it ever more difficult for all parties which may be special education centers (SECs), individuals, educators, parents,...
详细信息
The increasing complexity of regulations governing and tracking the special education process made it ever more difficult for all parties which may be special education centers (SECs), individuals, educators, parents, government and healthcare centers. Since there are many difficulties in the management of special education, SECs cannot easily process their essence aim. In this manner, information technologies help these parties to participate equally for managing special education. Modular web based systems are one of the information technology solutions to overcome these problems. In this paper, the goal is to show the fundamental advantages and also discuss the challenges in developing such a modular web based system for special education. If the advantages of the system can be understood and the challenges of the system can be properly addressed, the development of a modular web based system for special education, in our opinion, can be promoted *** and peer review under responsibility of Prof. Dr. Hafize Keser.
We address the problem of formal and automated security verification of transport protocols for wireless sensor networks (WSN) that may perform cryptographic operations. The verification of this class of protocols is ...
We address the problem of formal and automated security verification of transport protocols for wireless sensor networks (WSN) that may perform cryptographic operations. The verification of this class of protocols is difficult because they typically consist of complex behavioral characteristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem, we propose a probabilistic timed calculus for cryptographic protocols and demonstrate how to use this formal language for proving security or vulnerability of protocols. The main advantage of the proposed language is that it supports an expressive syntax and semantics, allowing for studying real-time, probabilistic, and cryptographic issues at the same time. Hence, it can be used to verify systems that involve these three properties in a convenient way. In addition, we propose an automatic verification method, based on the well-known PAT process analysis toolkit, for this class of protocols. For demonstration purposes, we apply the proposed manual and automatic proof methods for verifying the security of DTSN and SDTP, which are two of the recently proposed WSN transport protocols.
Recently, the authors described a new algorithm for ultrasonic Doppler imaging and velocity estimation using log-step multicarrier signals. The algorithm achieved a velocity estimation precision that was some 20 times...
详细信息
ISBN:
(纸本)9781467356855
Recently, the authors described a new algorithm for ultrasonic Doppler imaging and velocity estimation using log-step multicarrier signals. The algorithm achieved a velocity estimation precision that was some 20 times better than that using an existing method, but the problem of estimation deficiency in low-SNR conditions remained. In this work, we improve the availability of the algorithm in low-SNR conditions by utilizing the systematic temporal shift of the log-step multicarrier signals, which expresses approximately the amount of Doppler shift in the sensed signal. A computer simulation shows high availability for the algorithm, even for SNR values below -10 dB.
In this paper, we present a model-based testing tool resulting from a research project, named TASCCC. This tool is a complete tool chain dedicated to property-based testing in UML/OCL, that integrates various technolo...
详细信息
ISBN:
(纸本)9781467359610
In this paper, we present a model-based testing tool resulting from a research project, named TASCCC. This tool is a complete tool chain dedicated to property-based testing in UML/OCL, that integrates various technologies inside a dedicated Eclipse plug-in. The test properties are expressed in a dedicated language based on property patterns. These properties are then used for two purposes. First, they can be employed to evaluate the relevance of a test suite according to specific coverage criteria. Second, it is possible to generate test scenarios that will illustrate or exercise the property. These test scenarios are then unfolded and animated on the Smartesting's CertifyIt model animator, that is used to filter out infeasible sequences. This tool has been used in industrial partnership, aiming at providing an assistance for Common Criteria evaluations, especially by providing test generation reports used to show the link between the test cases and the Common Criteria artefacts.
暂无评论