Search results for "programming."
showing 10 items of 3035 documents
Agent assisted interactive algorithm for computationally demanding multiobjective optimization problems
2015
We generalize the applicability of interactive methods for solving computationally demanding, that is, time-consuming, multiobjective optimization problems. For this purpose we propose a new agent assisted interactive algorithm. It employs a computationally inexpensive surrogate problem and four different agents that intelligently update the surrogate based on the preferences specified by a decision maker. In this way, we decrease the waiting times imposed on the decision maker during the interactive solution process and at the same time decrease the amount of preference information expected from the decision maker. The agent assisted algorithm is not specific to any interactive method or s…
Operator (Quasi-)Similarity, Quasi-Hermitian Operators and All that
2016
Motivated by the recent developments of pseudo-Hermitian quantum mechanics, we analyze the structure generated by unbounded metric operators in a Hilbert space. To that effect, we consider the notions of similarity and quasi-similarity between operators and explore to what extent they preserve spectral properties. Then we study quasi-Hermitian operators, bounded or not, that is, operators that are quasi-similar to their adjoint and we discuss their application in pseudo-Hermitian quantum mechanics. Finally, we extend the analysis to operators in a partial inner product space (pip-space), in particular the scale of Hilbert space s generated by a single unbounded metric operator.
Modal analysis for random response of MDOF systems
1990
The usefulness of the mode-superposition method of multidegrees of freedom systems excited by stochastic vector processes is here presented. The differential equations of moments of every order are written in compact form by means of the Kronecker algebra; then the method for integration of these equations is presented for both classically and non-classically damped systems, showing that the fundamental operator available for evaluating the response in the deterministic analysis is also useful for evaluating the response in the stochastic analysis.
Polaroid-Type Operators
2018
In this chapter we introduce the classes of polaroid-type operators, i.e., those operators T ∈ L(X) for which the isolated points of the spectrum σ(T) are poles of the resolvent, or the isolated points of the approximate point spectrum σap(T) are left poles of the resolvent. We also consider the class of all hereditarily polaroid operators, i.e., those operators T ∈ L(X) for which all the restrictions to closed invariant subspaces are polaroid. The class of polaroid operators, as well as the class of hereditarily polaroid operators, is very large. We shall see that every generalized scalar operator is hereditarily polaroid, and this implies that many classes of operators acting on Hilbert s…
Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system
2017
We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications
2011
Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…
Using a mobile application to support children's writing motivation
2013
PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…
An Information system design product theory for the abstract class of integrated requirements and delivery management systems
2014
Information and Communications Technology-enabled international sourcing of software-intensive systems and services (eSourcing) is increasingly used as a means of adding value, reducing costs, sharing risks, and achieving strategic aims. To maximally reap the benefits from eSourcing and to mitigate the risks, providers and clients have to be aware of and build capabilities for the eSourcing life-cycle. China is in a position to become a superpower for eSourcing service provisioning, but most Chinese eSourcing service providers are small or medium-sized and typically work for larger intermediaries instead of end-clients, limiting their business and capabilities development. The extant litera…
A Cooperative Coevolution Framework for Parallel Learning to Rank
2015
We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…