In this work we deal with a group of heterogeneous robots that cooperatively accomplish a task in a common area. For such a system, we develop a distributed control mechanism that ensures the correct coordination of t...
详细信息
In this work we deal with a group of heterogeneous robots that cooperatively accomplish a task in a common area. For such a system, we develop a distributed control mechanism that ensures the correct coordination of their concurrent motion in the shared workspace. The concept assumes an additional level of robot motion control, that enforces temporary velocity reductions in order to avoid collisions as well as deadlocks and livelocks among the robots. The event-driven mechanism underlying the developed model ensures a robust coordination of mutually asynchronous robot controllers, and the mathematical character of the employed abstraction formally guarantees the control correctness.
In the paper we explore relationships between autonomy, cooperation and dependability in wireless sensors network (WSN). We consider WSN as a set of sensors deployed insome area. These sensors must act autonomously an...
In the paper we explore relationships between autonomy, cooperation and dependability in wireless sensors network (WSN). We consider WSN as a set of sensors deployed insome area. These sensors must act autonomously and cooperatively to achieve both their particular self-interested and global goals. In proposed approach we determine cooperation and autonomy abstractions and consider them in the context of three basic relations (sub-ordination, tolerance, collision). In such way we expand 2D space (autonomy, cooperation) onto 3D partially or totally ordered relational space. Proposed conceptual framework provides a powerful paradigm to conceive, model, support and manage dynamically organising complex systems.
The paper presents a method of analyzing functionality aspects of complex information systems. The system analysis is based on integrating different computer system models, the networked systems and applications model...
详细信息
The paper presents a method of analyzing functionality aspects of complex information systems. The system analysis is based on integrating different computer system models, the networked systems and applications model, clients behavior model and collaboration between services in the analyzed system, into one coherent functionality based view suitable for system simulation. Modeling process incorporates hierarchical approach, i.e. the system is decomposed into groups of hosts and therefore groups of services, called molecules. The model is described in design by authors XML Domain Modeling Language (XDML). The integrated model is automatically transformed into an input file for modified SSFNet simulator. Additional information on input models could be read from other models or the user could play with all parameters of the XDML model. The paper presents developed software which implements described methodology and results of analysis for an exemplar information system.
A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability a...
A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability and average availability of the system - defined in a functional way - is discussed as a function of different essential parameters when the DTS is organized. The proposed analysis is based on the modeling and simulating of the system behavior. Monte Carlo simulation is used to encourage reliability and stochastic functional parameters. The simulator is built using scalable simulation framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling and results.
This paper deals with an intelligent algorithm dedicated for the use in manufacturing systems. Particularly, it develops the fast parallel tabu search algorithm to minimize sum of job completion times in the flow shop...
详细信息
This paper deals with an intelligent algorithm dedicated for the use in manufacturing systems. Particularly, it develops the fast parallel tabu search algorithm to minimize sum of job completion times in the flow shop scheduling problem. So called multimoves are used, that consist in performing several independent moves simultaneously, which allow one to guide very quickly the search process to promising areas of the solutions space, where good solutions can be found. Besides, an adaptable dynamic tabu list and varying neighborhood are proposed to avoid being trapped at a local optimum. The proposed algorithms are experimentally evaluated on a personal computer with duo-core processor and found to be relatively more effective in finding solutions of quality better than other leading approaches, and also it makes in a much shorter time. The presented ideas can be extended to cover search methods for other hard problems.
The self-adaptive model of a XCS-based ensemble machine solving data-mining tasks has been presented. The results of experiments have shown the ability of the architecture to adapt the parameters of single XCS: the mu...
详细信息
The self-adaptive model of a XCS-based ensemble machine solving data-mining tasks has been presented. The results of experiments have shown the ability of the architecture to adapt the parameters of single XCS: the mutation rate mu and the tournament size t s - separately and/or together.
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the...
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification *** this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
Learning classifier systems (LCSs) have gained increasing interest in the genetic and evolutionary computation literature. Many real-world problems are not conveniently expressed using the ternary representation typic...
详细信息
Learning classifier systems (LCSs) have gained increasing interest in the genetic and evolutionary computation literature. Many real-world problems are not conveniently expressed using the ternary representation typically used by LCSs and for such problems an interval-based representation is preferable. The new model of LCS - so-called rGCS - is used to classify real-valued data. In order to handle effectively with complex 3D functions, rGCS was extended by the covering technique and the co-populations in environment probing rules.
Extended classifier systems (XCS) introduced by Wilson became popular instrument used to solve many real-world problems possible to express with ternary representation. Our new model of real-valued LCS - the rGCS - is...
详细信息
Extended classifier systems (XCS) introduced by Wilson became popular instrument used to solve many real-world problems possible to express with ternary representation. Our new model of real-valued LCS - the rGCS - is designed to classify real valued data. rGCS is based on grammar-based classifier system (GCS), which was originally used to process context free grammar sentences. To improve 3D function approximation a covering technique was developed. This procedure replenishes the population of system classifiers with new ones created on the fly to satisfy current state of grammar evolution. As a result there is no need to employ a genetic algorithm.
This work is devoted to events monitoring in complex information systems. Authors depict some aspects of nowadays monitoring systems that make them ineffective. Next, research areas are presented. It is followed by a ...
详细信息
This work is devoted to events monitoring in complex information systems. Authors depict some aspects of nowadays monitoring systems that make them ineffective. Next, research areas are presented. It is followed by a proposition of a new technique of monitoring based on agents and idea of the molecule. Then system architecture is discussed. Lastly, the advantages of agents based approach is revealed.
暂无评论