The portfolio optimization/rebalancing problem is to determine a proportion-weighted combination in a portfolio in order to achieve certain investment targets. For this problem, many researchers have used various evol...
详细信息
The portfolio optimization/rebalancing problem is to determine a proportion-weighted combination in a portfolio in order to achieve certain investment targets. For this problem, many researchers have used various evolutionary methods and models such as genetic algorithms and simulated annealing. On the other hand, the portfolio optimization/rebalancing problem can be viewed as a multi-dimensional problem because its solution is a proportion-weighted combination for the given assets. The previous works, however, have not taken into account the multi-dimensional aspect of the problem. In order to approach this problem from the multi-dimensional aspect, we propose a model based on the probabilistic model-building genetic algorithm with narrower width histograms (PMBGA-NWH), and then apply it to optimize the constrained index funds with the given rebalancing cost in this paper. In the numerical experiments, we show that our model has better ability to make optimal index funds than the traditional genetic algorithm (GA).
The artificial society modeling approach for studying the behavior of complex systems has gained wide applications in recent years. The integration of this approach with geographical theories provides an inter-discipl...
详细信息
ISBN:
(纸本)9781424455850
The artificial society modeling approach for studying the behavior of complex systems has gained wide applications in recent years. The integration of this approach with geographical theories provides an inter-disciplinary approach to the study of complex human-nature interactions. By deploying widely applied RePast and Eclipse as basic tools, this study develops an artificial society model that is able to capture the characteristics of geographical systems. Consequently, DLA (diffusion limited aggregation) algorithms are applied to generate and record each agent's pathway. The simulated results demonstrate that the transportation networks produced with DLA algorithms have a spatial pattern very similar to the form of urban areas exhibited in real world.
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza...
详细信息
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimization obtained, the robust schedule is more stable in execution. The vast majority of the researches on robust scheduling concentrate on the development of the robustness and stabilization with an optimization target that minimizes makespan. However, other optimization targets are needed in reality, and in this paper, we introduce another optimization target that maximizes the payload of the machine, which can reflect the capacity of machine. This work applies a two-step way to achieve a robust schedule. A baseline schedule in the deterministic environment is generated first, which pursues standard optimization criterions, and then the temporal buffers are inserted into the baseline schedule which make the schedule absorb some level of unexpected disruption without rescheduling. According to the payload of each machine which should be close to the maximum at any time in execution, we can get each size of the temporal buffers inserted into the different operations. An extensive experiment is used to show the relative performance of the proposed robust schedule. It is shown that the schedule is robust and stable under the stochastic disturbance coupling with minimal makespan tardiness and symmetry payload.
Low-power design has become a challenge of test. We propose an effective low-power scan architecture named PowerSluice to minimize power consumption during scan test, which is based on scan chain modifications. On one...
详细信息
Low-power design has become a challenge of test. We propose an effective low-power scan architecture named PowerSluice to minimize power consumption during scan test, which is based on scan chain modifications. On one hand, a kind of blocking logic is inserted into the scan chain to reduce the dynamic power and two kinds of controlling units are also inserted to decrease the leakage power during the shift cycle. On the other hand, using genetic algorithm, the exact values of control signals are found out to control the process. Experiments results indicate that this architecture can effectually reduce power during scan test with probably minimum area cost.
A low cost battery charger is introduced in this paper. The charging feature meets the requirement of a Li-Ion rechargeable cell designed for electric vehicles and manufactured by E company. The charger is capable of ...
详细信息
The constantly rising threats in IT infrastructure raise many concerns for an organization, altering security requirements according to dynamically changing environment, need of midcourse decision management and delib...
详细信息
ISBN:
(纸本)9781605584126
The constantly rising threats in IT infrastructure raise many concerns for an organization, altering security requirements according to dynamically changing environment, need of midcourse decision management and deliberate evaluation of security measures are most striking. Common Criteria for IT security evaluation has long been considered to be victimized by uncertain IT infrastructure and considered resource hungry, complex and time consuming process. Considering this aspect we have continued our research quest for analyzing the opportunities to empower IT security evaluation process using Real Options thinking. The focus of our research is not only the applicability of real options analysis in IT security evaluation but also observing its implications in various domains including IT security investments and risk management. We find it motivating and worth doing to use an established method from corporate finance i.e. real options and utilize its rule of thumb technique as a road map to counter uncertainty issues for evaluation of IT products. We believe employing options theory in security evaluation will provide the intended benefits. i.e. i) manage dynamically changing security requirements ii) accelerating evaluation process iii) midcourse decision management. Having all the capabilities of effective uncertainty management, options theory follows work procedures based on mathematical calculations quite different from information security work processes. In this paper, we will address the diversities between the work processes of security evaluation and real options analysis. We present an adaptability infrastructure to bridge the gap and make them coherent with each other. This liaison will transform real options concepts into a compatible mode that provides grounds to target IT security evaluation and common criteria issues. We will address ESAM1 system as an example for illustrations and applicability of the concepts. Copyright 2009 ACM.
This paper presents a novel method to implement an interactive mobile robot. The proposed mobile robot is implemented under the technique of mixed reality. The mixed reality technique is realized by both the Virtools ...
详细信息
Hard constrained optimization problems in science and engineering are common computationally very expensive. This leads to serious impediment to the successful application of evolutionary optimization techniques. A mo...
详细信息
By the reason of some renewable energy sources not controlled by human begins but natural environment. Especially, wind power and PV generation controlled by the nature, and therefore PV or wind power is difficult to ...
详细信息
ISBN:
(纸本)9789604741137
By the reason of some renewable energy sources not controlled by human begins but natural environment. Especially, wind power and PV generation controlled by the nature, and therefore PV or wind power is difficult to estimate the output. It is useless for engineering system that the system has lower controllability and cannot estimate the operation. The natural energy sources are not control and difficult of estimation. In this paper represents the PV system output model. PV system output models are two types. One is monthly model, and the other is daily model. These model uses sunlight time and angle of the sun and PV cells. To verify these model, apply the 10 kW PV system and compare estimate output with real generation.
暂无评论