Search results for "SYSTEMS"

showing 10 items of 11952 documents

The minimum mean cycle-canceling algorithm for linear programs

2022

Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceLinear programmingDegenerate energy levels0211 other engineering and technologiesPhase (waves)0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchResidualFlow network01 natural sciencesIndustrial and Manufacturing EngineeringDual (category theory)010201 computation theory & mathematicsModeling and SimulationCoefficient matrixRowAlgorithmMathematicsEuropean Journal of Operational Research
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Comparing interactive evolutionary multiobjective optimization methods with an artificial decision maker

2021

AbstractSolving multiobjective optimization problems with interactive methods enables a decision maker with domain expertise to direct the search for the most preferred trade-offs with preference information and learn about the problem. There are different interactive methods, and it is important to compare them and find the best-suited one for solving the problem in question. Comparisons with real decision makers are expensive, and artificial decision makers (ADMs) have been proposed to simulate humans in basic testing before involving real decision makers. Existing ADMs only consider one type of preference information. In this paper, we propose ADM-II, which is tailored to assess several …

021103 operations researchPerformance comparison0211 other engineering and technologiesevoluutiolaskentapäätöksentukijärjestelmät02 engineering and technologymonitavoiteoptimointiMany-objective optimizationComputational MathematicsArtificial Intelligenceinteraktiivisuus0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingEngineering (miscellaneous)Interactive methodsInformation SystemsComplex & Intelligent Systems
researchProduct

Learning automata-based solutions to the optimal web polling problem modelled as a nonlinear fractional knapsack problem

2011

We consider the problem of polling web pages as a strategy for monitoring the world wide web. The problem consists of repeatedly polling a selection of web pages so that changes that occur over time are detected. In particular, we consider the case where we are constrained to poll a maximum number of web pages per unit of time, and this constraint is typically dictated by the governing communication bandwidth, and by the speed limitations associated with the processing. Since only a fraction of the web pages can be polled within a given unit of time, the issue at stake is one of determining which web pages are to be polled, and we attempt to do it in a manner that maximizes the number of ch…

021103 operations researchTheoretical computer scienceLearning automataComputer scienceContinuous knapsack problem0211 other engineering and technologies02 engineering and technologyAutomatonArtificial IntelligenceControl and Systems EngineeringKnapsack problemWeb page0202 electrical engineering electronic engineering information engineeringResource allocation020201 artificial intelligence & image processingStochastic optimizationElectrical and Electronic EngineeringPollingEngineering Applications of Artificial Intelligence
researchProduct

Improving the performance of embedded systems with variable neighborhood search

2017

Graphical abstractDisplay Omitted Embedded systems have become an essential part of our lives, mainly due to the evolution of technology in the last years. However, the power consumption of these devices is one of their most important drawbacks. It has been proven that an efficient use of the memory of the device also improves its energy performance. This work efficiently solves the dynamic memory allocation problem, which can be formally defined as follows: given a program that has to be executed by a circuit, the objective is to fit that program in memory in such a way that the computing time required to execute it is minimized. In this work, we propose a parallel variable neighborhood se…

021103 operations researchbusiness.industryComputer scienceC dynamic memory allocationEmbedded systemsWork (physics)0211 other engineering and technologies02 engineering and technologyMetaheuristics[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]Static memory allocationMemoryEmbedded system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDynamic memory allocationbusinessMetaheuristicSoftwareVariable neighborhood searchVariable neighborhood search
researchProduct

Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems

2018

Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…

021110 strategic defence & security studies020301 aerospace & aeronauticsComputer sciencebusiness.industryAir traffic managementControl (management)0211 other engineering and technologiesCivil aviationComputerApplications_COMPUTERSINOTHERSYSTEMSJamming02 engineering and technologyAir traffic controlCommunications systemComputer securitycomputer.software_genre0203 mechanical engineeringWirelessbusinesscomputerDe facto standard
researchProduct

The ELECTRE I method to support the FMECA

2018

Abstract In traditional Failure Modes, Effects and Criticality Analysis (FMECA), risk priorities of failure modes are determined through the Risk Priority Number (RPN), which is a function of the three risk parameters Occurrence (O), Severity (S), and Detection (D). In the present paper, an alternative approach to RPN is proposed for the criticality assessment of system failure modes. Particularly, the Multi-Criteria Decision Making (MCDM) method ELECTRE I is proposed to select the most critical failure mode in the set of the failure modes charactering a complex system. The method has been applied to a case study previously proposed by Zammori and Gabrielli (2012).

021110 strategic defence & security studies021103 operations researchComputer science0211 other engineering and technologies02 engineering and technologyFunction (mathematics)Multiple-criteria decision analysisReliability engineeringSet (abstract data type)Failure mode effects and criticality analysisSystem failureControl and Systems EngineeringELECTREFailure mode and effects analysisIFAC-PapersOnLine
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct