Search results for "Computer science"

showing 10 items of 22367 documents

Heuristics for the min–max arc crossing problem in graphs

2018

Abstract In this paper, we study the visualization of complex structures in the context of automatic graph drawing. Constructing geometric representations of combinatorial structures, such as networks or graphs, is a difficult task that requires an expert system. The automatic generation of drawings of graphs finds many applications from software engineering to social media. The objective of graph drawing expert systems is to generate layouts that are easy to read and understand. This main objective is achieved by solving several optimization problems. In this paper we focus on the most important one: reducing the number of arc crossings in the graph. This hard optimization problem has been…

021103 operations researchTheoretical computer scienceOptimization problemComputer scienceHeuristic0211 other engineering and technologiesGeneral Engineering0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesGraphExpert systemComputer Science ApplicationsVisualization010201 computation theory & mathematicsArtificial IntelligenceGraph drawingHeuristicscomputerExpert Systems with Applications
researchProduct

Variable neighborhood descent for the incremental graph drawing

2017

Abstract Graphs are used to represent reality in several areas of knowledge. Drawings of graphs have many applications, from project scheduling to software diagrams. The main quality desired for drawings of graphs is readability, and crossing reduction is a fundamental aesthetic criterion for a good representation of a graph. In this paper we target the edge crossing reduction in the context of incremental graph drawing, in which we want to preserve the layout of a graph over successive drawings. We propose a hybrid method based on the GRASP (Greedy Randomized Adaptive Search Procedure) and VND (Variable Neighborhood Descent) methodologies and compare it with previous methods via simulation.

021103 operations researchTheoretical computer sciencebusiness.industryApplied MathematicsGRASP0211 other engineering and technologies010103 numerical & computational mathematics02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesReadabilitySoftwareGraph drawingDiscrete Mathematics and CombinatoricsArtificial intelligenceForce-directed graph drawing0101 mathematicsbusinessGraph operationsMetaheuristiccomputerGreedy randomized adaptive search procedureMathematicsofComputing_DISCRETEMATHEMATICSMathematicsElectronic Notes in Discrete Mathematics
researchProduct

Improving the performance of embedded systems with variable neighborhood search

2017

Graphical abstractDisplay Omitted Embedded systems have become an essential part of our lives, mainly due to the evolution of technology in the last years. However, the power consumption of these devices is one of their most important drawbacks. It has been proven that an efficient use of the memory of the device also improves its energy performance. This work efficiently solves the dynamic memory allocation problem, which can be formally defined as follows: given a program that has to be executed by a circuit, the objective is to fit that program in memory in such a way that the computing time required to execute it is minimized. In this work, we propose a parallel variable neighborhood se…

021103 operations researchbusiness.industryComputer scienceC dynamic memory allocationEmbedded systemsWork (physics)0211 other engineering and technologies02 engineering and technologyMetaheuristics[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]Static memory allocationMemoryEmbedded system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDynamic memory allocationbusinessMetaheuristicSoftwareVariable neighborhood searchVariable neighborhood search
researchProduct

DESDEO : An Open Framework for Interactive Multiobjective Optimization

2018

We introduce a framework for interactive multiobjective optimization methods called DESDEO released under an open source license. With the framework, we want to make interactive methods easily accessible to be applied in solving real-world problems. The framework follows an object-oriented software design paradigm, where functionalities have been divided to modular, self-contained components. The framework contains implementations of some interactive methods, but also components which can be utilized to implement more interactive methods and, thus, increase the applicability of the framework. To demonstrate how the framework can be used, we consider an example problem where the pollution of…

021103 operations researchbusiness.industryComputer scienceDistributed computing0211 other engineering and technologies02 engineering and technologyModular designOpen frameworkMulti-objective optimizationmonitavoiteoptimointiOpen source licenseavoin lähdekoodioptimointiDESDEO0202 electrical engineering electronic engineering information engineeringSoftware design020201 artificial intelligence & image processingmultiobjective optimizationongelmanratkaisubusinessImplementationoptimization
researchProduct

Evaluation of Coded Excitations for Autonomous Airborne Ultrasonic Inspection

2019

Unmanned Aerial Vehicles (UAVs) are receiving increasing attention for use in Non-Destructive Testing due to their ability to access areas where manual inspection is not practical. Contact-based UAV ultrasonic inspections grant the opportunity to remotely monitor the structural health of an industrial asset with enhanced internal integrity information. Ultrasonic inspection is a Non-Destructive Testing (NDT) method conventionally used in corrosion mapping. Surface contacting ultrasonic transducers provide enhanced structural integrity information. However, due to near-surface aerodynamic effects, angular sensitivity of the ultrasound probe and alignment error during autonomous inspections, …

021103 operations researchbusiness.industryComputer scienceTKUAVAcousticsUltrasonic testing0211 other engineering and technologies02 engineering and technology01 natural sciencesSignalCorrosionSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineTransducerUltrasound probeSignal-to-noise ratioUltrasonic InspectionNondestructive testing0103 physical sciencesUltrasonic sensorCoded Excitationbusiness010301 acoustics2019 IEEE International Ultrasonics Symposium (IUS)
researchProduct

Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems

2018

Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…

021110 strategic defence & security studies020301 aerospace & aeronauticsComputer sciencebusiness.industryAir traffic managementControl (management)0211 other engineering and technologiesCivil aviationComputerApplications_COMPUTERSINOTHERSYSTEMSJamming02 engineering and technologyAir traffic controlCommunications systemComputer securitycomputer.software_genre0203 mechanical engineeringWirelessbusinesscomputerDe facto standard
researchProduct

The ELECTRE I method to support the FMECA

2018

Abstract In traditional Failure Modes, Effects and Criticality Analysis (FMECA), risk priorities of failure modes are determined through the Risk Priority Number (RPN), which is a function of the three risk parameters Occurrence (O), Severity (S), and Detection (D). In the present paper, an alternative approach to RPN is proposed for the criticality assessment of system failure modes. Particularly, the Multi-Criteria Decision Making (MCDM) method ELECTRE I is proposed to select the most critical failure mode in the set of the failure modes charactering a complex system. The method has been applied to a case study previously proposed by Zammori and Gabrielli (2012).

021110 strategic defence & security studies021103 operations researchComputer science0211 other engineering and technologies02 engineering and technologyFunction (mathematics)Multiple-criteria decision analysisReliability engineeringSet (abstract data type)Failure mode effects and criticality analysisSystem failureControl and Systems EngineeringELECTREFailure mode and effects analysisIFAC-PapersOnLine
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct