Thi. research proposes the swappi.g algori.hm a new algori.hm for solv.0}g the n-queens problem, and prov.0}es data from experi.ental performance results of thi. new algori.hm. A summary i. also prov.0}ed of v.ri.us meta...
详细信息
Thi. research proposes the swappi.g algori.hm a new algori.hm for solv.0}g the n-queens problem, and prov.0}es data from experi.ental performance results of thi. new algori.hm. A summary i. also prov.0}ed of v.ri.us meta-heuri.ti. approaches whi.h hav. been used to solv. the n-queens problem i.cludi.g neural networks, ev.luti.nary algori.hms, geneti. programmi.g, and recently i.peri.li.t Competi.i.e Algori.hm (i.A). Currently the Cooperati.e PSO algori.hm i. the best algori.hm i. the li.erature for fi.di.g the fi.st v.li. soluti.n. Also the research looks i.to the effect of the number of hi.den nodes and layers wi.hi. neural networks and the effect on the ti.e taken to fi.d a soluti.n. Thi. paper proposes a new swappi.g algori.hm whi.h swaps the posi.i.n of queens.
The paper presents the problem of ti.hten cybersecuri.y of i.strumentati.n and control (i.amp;C) systems by mean of formal securi.y models. The formal securi.y models were dev.loped for i. sector and may be used wi.h ...
详细信息
ISBN:
(纸本)9781467368575
The paper presents the problem of ti.hten cybersecuri.y of i.strumentati.n and control (i.C) systems by mean of formal securi.y models. The formal securi.y models were dev.loped for i. sector and may be used wi.h some care for assessi.g the cybersecuri.y i.i.C systems. When the formal securi.y models are assessed i.tri.si.ally, i.i. assumed that the mai. securi.y axi.m as i. was formulated for computer securi.y i. true. The i.terpretati.n of thi. axi.m should consi.er the di.ferences i. securi.y poli.y for i.C and general i.systems. The mai. goal for cybersecuri.y i. av.i.abi.i.y whi.h normally has mi.or i.portance for i. and therefore omi.ted i. securi.y models. We propose usi.g the addi.i.nal model for assessi.g the av.i.abi.i.y v.0} ti.i.g relati.n between objects i. the model. The i.tegri.y goal has also di.ferent i.terpretati.n i.i. and i.C cybersecuri.y. i. the last case the i.tegri.y of data and methods of processi.g hav. equal i.portance. Thi. feature also should be reflected i. formal securi.y models.
The paper consi.ers the formal hi.rarchi.al model of the (cyber)securi.y poli.y for i.strumentati.n and controls system (i.amp;C) by use of an example of the di.i.al upper uni. lev.l i.amp;C system (UULS) of a nuclear...
详细信息
ISBN:
(纸本)9781467368575
The paper consi.ers the formal hi.rarchi.al model of the (cyber)securi.y poli.y for i.strumentati.n and controls system (i.C) by use of an example of the di.i.al upper uni. lev.l i.C system (UULS) of a nuclear power plant (NPP). Also i. the paper we present a tool for fast prototypi.g and v.ri.i.ati.n of the i.C securi.y poli.y. The use case of the formal securi.y model for the UULS securi.y poli.y v.ri.i.ati.n i. presented and di.cussed. The relati.ns and transfer of the access ri.hts between the subjects and objects of the model are analyzed. The standard NPP UULS i. characteri.ed by the way of an example of the UULS dev.loped at the Trapezni.ov.i.sti.ute of control Sci.nces of the Russi.n Academy of Sci.nces.
暂无评论