Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm...
详细信息
Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm it seems to have difficulties handling optimization problems of high dimension. Here we first show that dimensionality is really a problem for the classical particle swarm algorithms. We then show that increasing the swarm size can be necessary to handle problem of high dimensions but is not enough. We also show that the issue of scalability occurs more quickly on some functions.
System designs are described from object and data centric perspectives. Component-based modeling approaches are well suited to specify structure and behavior of systems in terms of objects and relationships. Ontologyb...
详细信息
ISBN:
(纸本)1565553136
System designs are described from object and data centric perspectives. Component-based modeling approaches are well suited to specify structure and behavior of systems in terms of objects and relationships. Ontologybased modeling approaches describe a system's specification using data types and relationships. The Scalable Entity Structure Modeler is a component-based modeling framework suitable for specifying alternative system designs. This approach is extended with XML Schema to support unified dynamic objects and static data specifications for system design specifications. An example illustrating mixed component and data modeling is described using an extended realization of the SESM environment.
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring tha...
详细信息
ISBN:
(纸本)9781424429165
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.
In embedded real-time systems, it is important to reduce energy consumption in order to achieve efficient energy utilization. Many investigations have focused on Quality of Service (QoS) control, which adapts the reso...
详细信息
Systems based on Service-Oriented Architecture are called service-based systems (SBS), and comprise of computing services offered by various organizations. Users of SBS often require these services to be composed into...
详细信息
Hybrid agent-landscape models are used as an environment in which to study humans, the environment, and their dynamics. To provide flexibility in model design, expressiveness, and modification, the environment models ...
详细信息
ISBN:
(纸本)1565553136
Hybrid agent-landscape models are used as an environment in which to study humans, the environment, and their dynamics. To provide flexibility in model design, expressiveness, and modification, the environment models and human agent models should be developed independently. While retaining each model's individuality, the models can be composed to create a model of a complex, hybrid agent-landscape system. This should allow for a much more in-depth analysis of each model independently, as well as a study of their interactions. To create such a modeling environment requires a look beyond a simple interface between two models. It may require that the models' formalisms be composed, their execution be synchronized, their architectures be integrated, and a common visualization be created to provide a whole-system data view during simulation. This paper discusses the complexities of such an undertaking.
In this paper, we present a novel multiple-valued logic circuits design style based on negative differential resistance (NDR) devices and the monostable-to-multistable transition logic (MML) operating principle. We in...
详细信息
The precision and reliability of the estimation of the effort of software projects is very important for the competitiveness of software companies. Good estimates play a very important role in the management of softwa...
详细信息
暂无评论