Search results for " Programming"
showing 10 items of 1616 documents
Dynamic goal programming synthetic indicator: an application for water companies sustainability assessment
2018
ABSTRACTThis study proposes to evaluate the sustainability of water companies through time by using a new approach, one that involves a dynamic synthetic indicator derived from goal programming techniques. This dynamic indicator approach incorporates catch-up and innovation indices, which enables one to identify the main factors that drive changes in sustainability through time. We used a case study approach to clarify this dynamic approach by evaluating indicator values from a sample of 129 Portuguese water companies over the 2012 to 2015 time period. For most of the water companies we evaluated, sustainability values changed over time, which illustrates the importance of evaluating dynami…
Applications of Evolutionary Computation
2011
EvoCOMPLEX Contributions.- Coevolutionary Dynamics of Interacting Species.- Evolving Individual Behavior in a Multi-agent Traffic Simulator.- On Modeling and Evolutionary Optimization of Nonlinearly Coupled Pedestrian Interactions.- Revising the Trade-off between the Number of Agents and Agent Intelligence.- Sexual Recombination in Self-Organizing Interaction Networks.- Symbiogenesis as a Mechanism for Building Complex Adaptive Systems: A Review.- EvoGAMES Contributions.- Co-evolution of Optimal Agents for the Alternating Offers Bargaining Game.- Fuzzy Nash-Pareto Equilibrium: Concepts and Evolutionary Detection.- An Evolutionary Approach for Solving the Rubik's Cube Incorporating Exact Met…
Robust Network Agreement on Logical Information
2011
Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
Distributed adaptive leader–follower and leaderless consensus control of a class of strict-feedback nonlinear systems : a unified approach
2020
In this paper, distributed adaptive consensus for a class of strict-feedback nonlinear systems under directed topology condition is investigated. Both leader–follower and leaderless cases are considered in a unified framework. To design distributed controller for each subsystem, a local compensatory variable is generated based on the signals collected from its neighbors. Such a technique enables us to solve the leader–follower consensus and leaderless consensus problems in a unified framework. And it further allows us to treat the leaderless consensus as a special case of the leader–follower consensus. For leader–follower consensus, the assumption that the leader trajectory is linearly para…
Security Assessment of a Distributed, Modbus-based Building Automation System
2017
Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target organization or even the residents of the building. This work presents an approach to apply a method of data flow recognition and environment analysis to building automation through a case study on a distributed building automation system utilizing the Modbus protocol at the sites and presents s…
Collaborative engineering decision-making for building information channels and improving Web visibility of product manufacturers
2018
Abstract Product manufacturers have spent the last years improving productivity and process efficiency in order to face increasingly competitive markets. Today, the visibility of technological innovations has become essential to achieve the targeted market. It is now very difficult for a product manufacturer to reach customers without owning a website that is visible on search engine results pages. The goal of this paper is to build information channels between a company and its customers through improving both a company’s content of information on the Web and its website rank on the Internet through search engine results pages. Company information and knowledge are distributed through mult…
Regenerative scheduling problem in engineer to order manufacturing: an economic assessment
2021
The dynamic production scheduling is a very complex process that may arise from the occurrence of unpredictable situations such as the arrival of new orders besides the ones already accepted. As a consequence, companies may often encounter several difficulties to make decisions about the new orders acceptance and sequencing along with the production of the existing ones. With this recognition, a mathematical programming model for the regenerative scheduling problem with deterministic processing times is formulated in the present paper to evaluate the economic advantage of accepting a new order in an engineer to order (ETO) manufacturing organization. The real case of an Italian ETO company …
Robotic geometric and volumetric inspection of high value and large scale aircraft wings
2019
Increased demands in performance and production rates require a radical new approach to the design and manufacturing of aircraft wings. Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. The geometric assessment of the parts is carried out with a robotised dynamic laser scanner encoded through an absolute laser tracker. This method allows scanning speeds up to 330mm/s at 1mm pitch. State of the art ultrasonic ins…
Decorous combinatorial lower bounds for row layout problems
2020
Abstract In this paper we consider the Double-Row Facility Layout Problem (DRFLP). Given a set of departments and pairwise transport weights between them the DRFLP asks for a non-overlapping arrangement of the departments along both sides of a common path such that the weighted sum of the center-to-center distances between the departments is minimized. Despite its broad applicability in factory planning, only small instances can be solved to optimality in reasonable time. Apart from this even deriving good lower bounds using existing integer programming formulations and branch-and-cut methods is a challenging problem. We focus here on deriving combinatorial lower bounds which can be compute…