The paper presents a method of analyzing functionality aspects of complex information systems. The system analysis is based on integrating different computer system models, the networked systems and applications model...
详细信息
The paper presents a method of analyzing functionality aspects of complex information systems. The system analysis is based on integrating different computer system models, the networked systems and applications model, clients behavior model and collaboration between services in the analyzed system, into one coherent functionality based view suitable for system simulation. Modeling process incorporates hierarchical approach, i.e. the system is decomposed into groups of hosts and therefore groups of services, called molecules. The model is described in design by authors XML Domain Modeling Language (XDML). The integrated model is automatically transformed into an input file for modified SSFNet simulator. Additional information on input models could be read from other models or the user could play with all parameters of the XDML model. The paper presents developed software which implements described methodology and results of analysis for an exemplar information system.
A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability a...
A paper presents an approach to availability calculation of discrete transport system (DTS). The system is described by the formal model, which includes reliability and functional parameters of DTS. The availability and average availability of the system - defined in a functional way - is discussed as a function of different essential parameters when the DTS is organized. The proposed analysis is based on the modeling and simulating of the system behavior. Monte Carlo simulation is used to encourage reliability and stochastic functional parameters. The simulator is built using scalable simulation framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling and results.
This paper deals with an intelligent algorithm dedicated for the use in manufacturing systems. Particularly, it develops the fast parallel tabu search algorithm to minimize sum of job completion times in the flow shop...
详细信息
This paper deals with an intelligent algorithm dedicated for the use in manufacturing systems. Particularly, it develops the fast parallel tabu search algorithm to minimize sum of job completion times in the flow shop scheduling problem. So called multimoves are used, that consist in performing several independent moves simultaneously, which allow one to guide very quickly the search process to promising areas of the solutions space, where good solutions can be found. Besides, an adaptable dynamic tabu list and varying neighborhood are proposed to avoid being trapped at a local optimum. The proposed algorithms are experimentally evaluated on a personal computer with duo-core processor and found to be relatively more effective in finding solutions of quality better than other leading approaches, and also it makes in a much shorter time. The presented ideas can be extended to cover search methods for other hard problems.
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the...
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification *** this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
Learning classifier systems (LCSs) have gained increasing interest in the genetic and evolutionary computation literature. Many real-world problems are not conveniently expressed using the ternary representation typic...
详细信息
Learning classifier systems (LCSs) have gained increasing interest in the genetic and evolutionary computation literature. Many real-world problems are not conveniently expressed using the ternary representation typically used by LCSs and for such problems an interval-based representation is preferable. The new model of LCS - so-called rGCS - is used to classify real-valued data. In order to handle effectively with complex 3D functions, rGCS was extended by the covering technique and the co-populations in environment probing rules.
The self-adaptive model of a XCS-based ensemble machine solving data-mining tasks has been presented. The results of experiments have shown the ability of the architecture to adapt the parameters of single XCS: the mu...
详细信息
The self-adaptive model of a XCS-based ensemble machine solving data-mining tasks has been presented. The results of experiments have shown the ability of the architecture to adapt the parameters of single XCS: the mutation rate mu and the tournament size t s - separately and/or together.
This work is devoted to events monitoring in complex information systems. Authors depict some aspects of nowadays monitoring systems that make them ineffective. Next, research areas are presented. It is followed by a ...
详细信息
This work is devoted to events monitoring in complex information systems. Authors depict some aspects of nowadays monitoring systems that make them ineffective. Next, research areas are presented. It is followed by a proposition of a new technique of monitoring based on agents and idea of the molecule. Then system architecture is discussed. Lastly, the advantages of agents based approach is revealed.
Extended classifier systems (XCS) introduced by Wilson became popular instrument used to solve many real-world problems possible to express with ternary representation. Our new model of real-valued LCS - the rGCS - is...
详细信息
Extended classifier systems (XCS) introduced by Wilson became popular instrument used to solve many real-world problems possible to express with ternary representation. Our new model of real-valued LCS - the rGCS - is designed to classify real valued data. rGCS is based on grammar-based classifier system (GCS), which was originally used to process context free grammar sentences. To improve 3D function approximation a covering technique was developed. This procedure replenishes the population of system classifiers with new ones created on the fly to satisfy current state of grammar evolution. As a result there is no need to employ a genetic algorithm.
Proposed framework provides methodologies and tools for enhancing information systems dependability by assisting in planning the system operations. For that reason the following steps are taken: model the system, anal...
Proposed framework provides methodologies and tools for enhancing information systems dependability by assisting in planning the system operations. For that reason the following steps are taken: model the system, analyze its expected behaviour to identify potential problems and weaknesses, and finally automatically generate the system configurations according to various operational modes. The approach postulate for creating: the models and tools to express the policies (dependability, detection and reaction) as well as for describing the target system, its operation modes and threats.
The paper presents an approach to a problem of emitters localization. The emitters are localized in the sense of direction from which a signal arrives to a receiver. The advantage of the approach is that signals arriv...
详细信息
The paper presents an approach to a problem of emitters localization. The emitters are localized in the sense of direction from which a signal arrives to a receiver. The advantage of the approach is that signals arriving from different sources can be received concurrently. An object reflecting a signal returning to a receiver can be also treated as an emitter. Therefore solution of the problem is very important in robotics. It can be used for obstacle detection. This is the essential problem of mobile robot navigation. This technique can be also very useful to support mobility of blind persons. In the paper the most important features of the approach are discussed and preliminary experimental results are presented.
暂无评论