895 resultados para multi-agent incremental negotiation scheme


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we investigate the potential of caching to improve QoS in the context of continuous media applications over wired best-effort networks. We propose the use of a flexible caching scheme, called GD-Multi in caching continuous media (CM) objects. An important novel feature of our scheme is the provision of user or system administrator inputs in determining the cost function. Based on the proposed flexible cost function, Multi, an improvised Greedy Dual (GD) replacement algorithm called GD-multi (GDM) has been developed for layered multi-resolution multimedia streams. The proposed Multi function takes receiver feedback into account. We investigate the influence of parameters such as loss rate, jitter, delay and area in determining a proxy’s cache contents so as to enhance QoS perceived by clients. Simulation studies show improvement in QoS perceived at the clients in accordance to supplied optimisation metrics. From an implementation perspective, signalling requirements for carrying QoS feedback are minimal and fully compatible with existing RTSP-based Internet applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper will describe the key features and theoretical underpinnings of a representation-intensive pedagogy developed in a six-year research program, and its relationship to the epistemic practices of science. The pedagogy draws on socio cultural, pragmatist perspectives on learning and cognition that view knowledge as grounded in multi modal representations that are discursively generated, negotiated and coordinated in science classrooms. From this perspective, the learning challenges identified by research in the conceptual change tradition are seen as inherently representational in nature, and the central feature of the pedagogy involves students generating representations in response to structured challenges. The paper will interrogate the key aspects of the pedagogy and the way it supports learning, using evidence from a range of units designed by the researchers working in partnership with a small group of teachers. The role of representations in supporting learning will be explored in terms of the way they afford and productively constrain knowledge generation, mirroring the epistemic practices of science. Lesson transcripts, and examples of student artefacts will be presented to demonstrate significant reasoning and learning outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cloud service selection in a multi-cloud computing environment is receiving more and more attentions. There is an abundance of emerging cloud service resources that makes it hard for users to select the better services for their applications in a changing multi-cloud environment, especially for online real time applications. To assist users to efficiently select their preferred cloud services, a cloud service selection model adopting the cloud service brokers is given, and based on this model, a dynamic cloud service selection strategy named DCS is put forward. In the process of selecting services, each cloud service broker manages some clustered cloud services, and performs the DCS strategy whose core is an adaptive learning mechanism that comprises the incentive, forgetting and degenerate functions. The mechanism is devised to dynamically optimize the cloud service selection and to return the best service result to the user. Correspondingly, a set of dynamic cloud service selection algorithms are presented in this paper to implement our mechanism. The results of the simulation experiments show that our strategy has better overall performance and efficiency in acquiring high quality service solutions at a lower computing cost than existing relevant approaches.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new multi-output interval type-2 fuzzy logic system (MOIT2FLS) is introduced for protein secondary structure prediction in this paper. Three outputs of the MOIT2FLS correspond to three structure classes including helix, strand (sheet) and coil. Quantitative properties of amino acids are employed to characterize twenty amino acids rather than the widely used computationally expensive binary encoding scheme. Three clustering tasks are performed using the adaptive vector quantization method to construct an equal number of initial rules for each type of secondary structure. Genetic algorithm is applied to optimally adjust parameters of the MOIT2FLS. The genetic fitness function is designed based on the Q3 measure. Experimental results demonstrate the dominance of the proposed approach against the traditional methods that are Chou-Fasman method, Garnier-Osguthorpe-Robson method, and artificial neural network models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Designing minimum possible order (minimal) disturbance-decoupled proper functional observers for multi-input multi-output (MIMO) linear time-invariant (LTI) systems is studied. It is not necessary that a minimum-order unknown-input functional observer (UIFO) exists in our proposed design procedure. If the minimum-order observer cannot be attained, the observer's order is increased sequentially through a recursive algorithm, so that the minimal order UIFO can be obtained. To the best of our knowledge, this is the first time that this specific problem is addressed. It is assumed that the system is unknown-input functional detectable, which is the least requirement for the existence of a stable UIFO. This condition also is a certificate for the convergence of our observer's order-increase algorithm. Two methodologies are demonstrated to solve the observer design equations. The second presented scheme, is a new design method that based on our observations has a better numerical performance than the first conventional one. Numerical examples and simulation results in the MATLAB/Simulink environment describe the overall observer design procedure, and highlight the efficacy of our new methodology to solve the observer equations in comparison to the conventional one.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The direct approach in designing functional observers was first presented in [1] for estimating a single function of the states of a Linear Time-Invariant (LTI) system. One of the benefits of the direct scheme is that it does not require solving the interconnected Sylvester equations that appear in the other observer design approaches. In the present paper, the direct approach is extended to reconstruct multiple functions of the states in such a way that the minimum possible order of the observer is achieved. The observer is designed so that an asymptotic functional observer can be obtained with arbitrary convergence rate. In the proposed methodology, it is not necessary that a reduced order observer exists for the desired functions to be estimated. To release this limitation, an algorithm is employed to find some auxiliary functions in the minimum required number to be appended to the desired functions. This method assumes that the system is functional observable. This assumption however is less restrictive than the observability and detectability conditions of the system. A numerical example and simulation results explain the efficacy and the benefits of the proposed algorithm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Privacy restrictions of sensitive data repositories imply that the data analysis is performed in isolation at each data source. A prime example is the isolated nature of building prognosis models from hospital data and the associated challenge of dealing with small number of samples in risk classes (e.g. suicide) while doing so. Pooling knowledge from other hospitals, through multi-task learning, can alleviate this problem. However, if knowledge is to be shared unrestricted, privacy is breached. Addressing this, we propose a novel multi-task learning method that preserves privacy of data under the strong guarantees of differential privacy. Further, we develop a novel attribute-wise noise addition scheme that significantly lifts the utility of the proposed method. We demonstrate the effectiveness of our method with a synthetic and two real datasets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As tecnologias da informação e comunicação (TIC) estão presentes nas mais diversas áreas e atividades cotidianas, mas, em que pesem as ações de governos e instituições privadas, a informatização da saúde ainda é um desafio em aberto no Brasil. A situação atual leva a um questionamento sobre as dificuldades associadas à informatização das práticas em saúde, assim como, quais efeitos tais dificuldades têm causado à sociedade Brasileira. Com objetivo de discutir as questões acima citadas, esta tese apresenta quatro artigos sobre processo de informação da saúde no Brasil. O primeiro artigo revisa a literatura sobre TIC em saúde e baseado em duas perspectivas teóricas – estudos Europeus acerca dos Sistemas de Informação em Saúde (SIS) nos Países em Desenvolvimento e estudos sobre Informação e Informática em Saúde, no âmbito do Movimento da Reforma Sanitária –, formula um modelo integrado que combina dimensões de análise e fatores contextuais para a compreensão dos SIS no Brasil. Já o segundo artigo apresenta os conceitos e teóricos e metodológicos da Teoria Ator-Rede (ANT), uma abordagem para o estudo de controvérsias associadas às descobertas científicas e inovações tecnológicas, por meio das redes de atores envolvidos em tais ações. Tal abordagem tem embasado estudos de SI desde 1990 e inspirou as análises dois artigos empíricos desta tese. Os dois últimos artigos foram redigidos a partir da análise da implantação de um SIS em um hospital público no Brasil ocorrida entre os anos de 2010 e 2012. Para a análise do caso, seguiram-se os atores envolvidos nas controvérsias que surgiram durante a implantação do SIS. O terceiro artigo se debruçou sobre as atividades dos analistas de sistema e usuários envolvidos na implantação do SIS. As mudanças observadas durante a implantação do sistema revelam que o sucesso do SIS não foi alcançado pela estrita e técnica execução das atividades incialmente planejadas. Pelo contrário, o sucesso foi construído coletivamente, por meio da negociação entre os atores e de dispositivos de interessamento introduzidos durante o projeto. O quarto artigo, baseado no conceito das Infraestruturas de Informação, discutiu como o sistema CATMAT foi incorporado ao E-Hosp. A análise revelou como a base instalada do CATMAT foi uma condição relevante para a sua escolha durante a implantação do E-Hosp. Além disso, descrevem-se negociações e operações heterogêneas que aconteceram durante a incorporação do CATMAT no sistema E-Hosp. Assim, esta tese argumenta que a implantação de um SIS é um empreendimento de construção coletiva, envolvendo analistas de sistema, profissionais de saúde, políticos e artefatos técnicos. Ademais, evidenciou-se como os SIS inscrevem definições e acordos, influenciando as preferências dos atores na área de saúde.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This project describes an authentication technique that is shoulder-surfing resistant. Shoulder surfing is an attack in which an attacker can get access to private information by observing the user’s interaction with a terminal, or by using recording tools to record the user interaction and study the obtained data, with the objective of obtaining unauthorized access to a target user’s personal information. The technique described here relies on gestural analysis coupled with a secondary channel of authentication that uses button pressing. The thesis presents and evaluates multiple alternative algorithms for gesture analysis, and furthermore assesses the effectiveness of the technique.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aggregation theory of mathematical programming is used to study decentralization in convex programming models. A two-level organization is considered and a aggregation-disaggregation scheme is applied to such a divisionally organized enterprise. In contrast to the known aggregation techniques, where the decision variables/production planes are aggregated, it is proposed to aggregate resources allocated by the central planning department among the divisions. This approach results in a decomposition procedure, in which the central unit has no optimization problem to solve and should only average local information provided by the divisions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The application of multi-wavelength holography for surface shape measurement is presented. In our holographic setup a Bi12TiO 20 (BTO) photorefractive crystal was the holographic recording medium and a multimode diode laser emitting in the red region was the light source in a two-wave mixing scheme. The holographic imaging with multimode lasers results in multiple holograms in the BTO. By employing such lasers the resulting holographic image appears covered of interference fringes corresponding to the object relief and the interferogram spatial frequency is proportional to the diode laser free spectral range (FSR). We used a Fabry-Perot étalon at the laser output for laser mode selection. Thus, larger effective values of the laser FSR were achieved, leading to higher-spatial frequency interferograms and therefore to more sensitive and accurate measurements. The quantitative evaluation of the interferograms was performed through the phase stepping technique (PST) and the phase map unwrapping was carried out through the Cellular-Automata method. For a given surface, shape measurements with different interferogram spatial frequencies were performed and compared, concerning measurement noise and visual inspection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper describes a method for the decentralized solution of the optimal reactive power flow (ORPF) problem in interconnected power systems. The ORPF model is solved in a decentralized framework, consisting of regions, where the transmission system operator in each area operates its system independently of the other areas, obtaining an optimal coordinated but decentralized solution. The proposed scheme is based on an augmented Lagrangian approach using the auxiliary problem principle (APP). An implementation of an interior point method is described to solve the decoupled problem in each area. The described method is successfully implemented and tested using the IEEE two area RTS 96 test system. Numerical results comparing the solutions obtained by the traditional and the proposed decentralized methods are presented for validation. ©2008 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a new methodology for solving the optimal VAr planning problem in multi-area electric power systems, using the Dantzig-Wolfe decomposition. The original multi-area problem is decomposed into subproblems (one for each area) and a master problem (coordinator). The solution of the VAr planning problem in each area is based on the application of successive linear programming, and the coordination scheme is based on the reactive power marginal costs in the border bus. The aim of the model is to provide coordinated mechanisms to carry out the VAr planning studies maximizing autonomy and confidentiality for each area, assuring global economy to the whole system. Using the mathematical model and computational implementation of the proposed methodology, numerical results are presented for two interconnected systems, each of them composed of three equal subsystems formed by IEEE30 and IEEE118 test systems. © 2011 IEEE.