895 resultados para multi-agent incremental negotiation scheme


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We demonstrate light pulse combining and pulse compression using a continuous-discrete nonlinear system implemented in a multi-core fiber (MCF). It is shown that the pulses initially injected into all of the cores of a ring MCF are combined by nonlinearity into a small number of cores with simultaneous pulse compression. We demonstrate the combining of 77% of the energy into one core with pulse compression over 14× in a 20-core MCF. We also demonstrate that a suggested scheme is insensitive to the phase perturbations. Nonlinear spatio-temporal pulse manipulation in multi-core fibers can be exploited for various applications, including pulse compression, switching, and combining.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper investigates the power management issues in a mobile solar energy storage system. A multi-converter based energy storage system is proposed, in which solar power is the primary source while the grid or the diesel generator is selected as the secondary source. The existence of the secondary source facilitates the battery state of charge detection by providing a constant battery charging current. Converter modeling, multi-converter control system design, digital implementation and experimental verification are introduced and discussed in details. The prototype experiment indicates that the converter system can provide a constant charging current during solar converter maximum power tracking operation, especially during large solar power output variation, which proves the feasibility of the proposed design. © 2014 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The papers is dedicated to the questions of modeling and basing super-resolution measuring- calculating systems in the context of the conception “device + PC = new possibilities”. By the authors of the article the new mathematical method of solution of the multi-criteria optimization problems was developed. The method is based on physic-mathematical formalism of reduction of fuzzy disfigured measurements. It is shown, that determinative part is played by mathematical properties of physical models of the object, which is measured, surroundings, measuring components of measuring-calculating systems and theirs cooperation as well as the developed mathematical method of processing and interpretation of measurements problem solution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have devised a general scheme that reveals multiple duality relations valid for all multi-channel Luttinger Liquids. The relations are universal and should be used for establishing phase diagrams and searching for new non-trivial phases in low-dimensional strongly correlated systems. The technique developed provides universal correspondence between scaling dimensions of local perturbations in different phases. These multiple relations between scaling dimensions lead to a connection between different inter-phase boundaries on the phase diagram. The dualities, in particular, constrain phase diagram and allow predictions of emergence and observation of new phases without explicit model-dependent calculations. As an example, we demonstrate the impossibility of non-trivial phase existence for fermions coupled to phonons in one dimension. © 2013 EPLA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background/aims: Retinal screening programmes in England and Scotland have similar photographic grading schemes for background (non-proliferative) and proliferative diabetic retinopathy, but diverge over maculopathy. We looked for the most cost-effective method of identifying diabetic macular oedema from retinal photographs including the role of automated grading and optical coherence tomography, a technology that directly visualises oedema. Methods: Patients from seven UK centres were recruited. The following features in at least one eye were required for enrolment: microaneurysms/dot haemorrhages or blot haemorrhages within one disc diameter, or exudates within one or two disc diameters of the centre of the macula. Subjects had optical coherence tomography and digital photography. Manual and automated grading schemes were evaluated. Costs and QALYs were modelled using microsimulation techniques. Results: 3540 patients were recruited, 3170 were analysed. For diabetic macular oedema, England's scheme had a sensitivity of 72.6% and specificity of 66.8%; Scotland 's had a sensitivity of 59.5% and specificity of 79.0%. When applying a ceiling ratio of £30 000 per quality adjusted life years (QALY) gained, Scotland's scheme was preferred. Assuming automated grading could be implemented without increasing grading costs, automation produced a greater number of QALYS for a lower cost than England's scheme, but was not cost effective, at the study's operating point, compared with Scotland's. The addition of optical coherence tomography, to each scheme, resulted in cost savings without reducing health benefits. Conclusions: Retinal screening programmes in the UK should reconsider the screening pathway to make best use of existing and new technologies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Visible light communications is a technology with enormous potential for a wide range of applications within next generation transmission and broadcasting technologies. VLC offers simultaneous illumination and data communications by intensity modulating the optical power emitted by LEDs operating in the visible range of the electromagnetic spectrum (~370-780 nm). The major challenge in VLC systems to date has been in improving transmission speeds, considering the low bandwidths available with commercial LED devices. Thus, to improve the spectral usage, the research community has increasingly turned to advanced modulation formats such as orthogonal frequency-division multiplexing. In this article we introduce a new modulation scheme into the VLC domain; multiband carrier-less amplitude and phase modulation (m-CAP) and describe in detail its performance within the context of bandlimited systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Automated negotiation systems can do better than human being in many aspects, and thus are applied into many domains ranging from business to computer science. However, little work about automating negotiation of complex business contract has been done so far although it is a kind of the most important negotiation in business. In order to address this issue, in this paper we developed an automated system for this kind of negotiation. This system is based on the principled negotiation theory, which is the most effective method of negotiation in the domain of business. The system is developed as a knowledge-based one because a negotiating agent in business has to be economically intelligent and capable of making effective decisions based on business experiences and knowledge. Finally, the validity of the developed system is shown in a real negotiation scenario where on behalf of human users, the system successfully performed a negotiation of a complex business contract between a wholesaler and a retailer. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Switched reluctance motors (SRMs) can provide an attractive traction drive for electric vehicle applications. To lower the investment in the off-board charging station facilities, a multi-functional switched reluctance motor topology is proposed on the basis of the traditional asymmetrical half-bridge converter. The SRM phase windings are employed as input filter inductors and centre-tapped windings are also developed to form symmetrical inductors for three-phase grid supply. Owing to the varying rotor position, phase inductors are unequal between one another. A hysteresis control scheme is therefore developed for grid-connection operation. In addition to AC supplies, the proposed topology can also supports the DC-source charging. A new current sharing strategy is employed to diminish the influence of the unequal winding inductances. The simulation and experimental tests are carried out to verify the proposed topology and control methods. Since this work eliminates the need for building charging station infrastructure, its potential economic impact on the automotive market can be significant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The phenomenonal growth of the Internet has connected us to a vast amount of computation and information resources around the world. However, making use of these resources is difficult due to the unparalleled massiveness, high communication latency, share-nothing architecture and unreliable connection of the Internet. In this dissertation, we present a distributed software agent approach, which brings a new distributed problem-solving paradigm to the Internet computing researches with enhanced client-server scheme, inherent scalability and heterogeneity. Our study discusses the role of a distributed software agent in Internet computing and classifies it into three major categories by the objects it interacts with: computation agent, information agent and interface agent. The discussion of the problem domain and the deployment of the computation agent and the information agent are presented with the analysis, design and implementation of the experimental systems in high performance Internet computing and in scalable Web searching. ^ In the computation agent study, high performance Internet computing can be achieved with our proposed Java massive computation agent (JAM) model. We analyzed the JAM computing scheme and built a brutal force cipher text decryption prototype. In the information agent study, we discuss the scalability problem of the existing Web search engines and designed the approach of Web searching with distributed collaborative index agent. This approach can be used for constructing a more accurate, reusable and scalable solution to deal with the growth of the Web and of the information on the Web. ^ Our research reveals that with the deployment of the distributed software agent in Internet computing, we can have a more cost effective approach to make better use of the gigantic scale network of computation and information resources on the Internet. The case studies in our research show that we are now able to solve many practically hard or previously unsolvable problems caused by the inherent difficulties of Internet computing. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation discussed resource allocation mechanisms in several network topologies including infrastructure wireless network, non-infrastructure wireless network and wire-cum-wireless network. Different networks may have different resource constrains. Based on actual technologies and implementation models, utility function, game theory and a modern control algorithm have been introduced to balance power, bandwidth and customers' satisfaction in the system. ^ In infrastructure wireless networks, utility function was used in the Third Generation (3G) cellular network and the network was trying to maximize the total utility. In this dissertation, revenue maximization was set as an objective. Compared with the previous work on utility maximization, it is more practical to implement revenue maximization by the cellular network operators. The pricing strategies were studied and the algorithms were given to find the optimal price combination of power and rate to maximize the profit without degrading the Quality of Service (QoS) performance. ^ In non-infrastructure wireless networks, power capacity is limited by the small size of the nodes. In such a network, nodes need to transmit traffic not only for themselves but also for their neighbors, so power management become the most important issue for the network overall performance. Our innovative routing algorithm based on utility function, sets up a flexible framework for different users with different concerns in the same network. This algorithm allows users to make trade offs between multiple resource parameters. Its flexibility makes it a suitable solution for the large scale non-infrastructure network. This dissertation also covers non-cooperation problems. Through combining game theory and utility function, equilibrium points could be found among rational users which can enhance the cooperation in the network. ^ Finally, a wire-cum-wireless network architecture was introduced. This network architecture can support multiple services over multiple networks with smart resource allocation methods. Although a SONET-to-WiMAX case was used for the analysis, the mathematic procedure and resource allocation scheme could be universal solutions for all infrastructure, non-infrastructure and combined networks. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Acknowledgements The authors would like to thank staff at Marine Scotland Science Patricia White, Rebecca McIntosh, Julia Black and Mark Fordyce for their technical assistance and invaluable feedback on the project. Thanks also go to Alex Douglas at the University of Aberdeen for his advice on data analysis and statistics. For feedback on the manuscript thanks to Lesley McEvoy and Rhiannon Inkster at the NAFC Marine Centre. The study was supported by the Marine Collaborations Forum (MarCRF) which aims to develop cross-disciplinary research between the University of Aberdeen and Marine Scotland Science. Finally, thanks are also due to Scottish Fishermen's Trust for a student support bursary.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multiuser selection scheduling concept has been recently proposed in the literature in order to increase the multiuser diversity gain and overcome the significant feedback requirements for the opportunistic scheduling schemes. The main idea is that reducing the feedback overhead saves per-user power that could potentially be added for the data transmission. In this work, the authors propose to integrate the principle of multiuser selection and the proportional fair scheduling scheme. This is aimed especially at power-limited, multi-device systems in non-identically distributed fading channels. For the performance analysis, they derive closed-form expressions for the outage probabilities and the average system rate of the delay-sensitive and the delay-tolerant systems, respectively, and compare them with the full feedback multiuser diversity schemes. The discrete rate region is analytically presented, where the maximum average system rate can be obtained by properly choosing the number of partial devices. They optimise jointly the number of partial devices and the per-device power saving in order to maximise the average system rate under the power requirement. Through the authors’ results, they finally demonstrate that the proposed scheme leveraging the saved feedback power to add for the data transmission can outperform the full feedback multiuser diversity, in non-identical Rayleigh fading of devices’ channels.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels. In particular, we introduce a joint secure transmission scheme that adopts transmit antenna selection (TAS) at the BS and explores threshold-based selection diversity (tSD) scheduling over legitimate users to achieve a good secrecy performance while maintaining low implementation complexity. More specifically, in an effort to quantify the secrecy performance of the considered system, two practical scenarios are investigated, i.e., Scenario I: the eavesdropper’s channel state information (CSI) is unavailable at the BS, and Scenario II: the eavesdropper’s CSI is available at the BS. For Scenario I, novel exact closed-form expressions of the secrecy outage probability are derived, which are valid for general networks with an arbitrary number of legitimate users, antenna configurations, number of eavesdroppers, and the switched threshold. For Scenario II, we take into account the ergodic secrecy rate as the principle performance metric, and derive novel closed-form expressions of the exact ergodic secrecy rate. Additionally, we also provide simple and asymptotic expressions for secrecy outage probability and ergodic secrecy rate under two distinct cases, i.e., Case I: the legitimate user is located close to the BS, and Case II: both the legitimate user and eavesdropper are located close to the BS. Our important findings reveal that the secrecy diversity order is AAmA and the slope of secrecy rate is one under Case I, while the secrecy diversity order and the slope of secrecy rate collapse to zero under Case II, where the secrecy performance floor occurs. Finally, when the switched threshold is carefully selected, the considered scheduling scheme outperforms other well known existing schemes in terms of the secrecy performance and complexity tradeoff

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The selection of a set of requirements between all the requirements previously defined by customers is an important process, repeated at the beginning of each development step when an incremental or agile software development approach is adopted. The set of selected requirements will be developed during the actual iteration. This selection problem can be reformulated as a search problem, allowing its treatment with metaheuristic optimization techniques. This paper studies how to apply Ant Colony Optimization algorithms to select requirements. First, we describe this problem formally extending an earlier version of the problem, and introduce a method based on Ant Colony System to find a variety of efficient solutions. The performance achieved by the Ant Colony System is compared with that of Greedy Randomized Adaptive Search Procedure and Non-dominated Sorting Genetic Algorithm, by means of computational experiments carried out on two instances of the problem constructed from data provided by the experts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this contribution, a system identification procedure of a two-input Wiener model suitable for the analysis of the disturbance behavior of integrated nonlinear circuits is presented. The identified block model is comprised of two linear dynamic and one static nonlinear block, which are determined using an parameterized approach. In order to characterize the linear blocks, an correlation analysis using a white noise input in combination with a model reduction scheme is adopted. After having characterized the linear blocks, from the output spectrum under single tone excitation at each input a linear set of equations will be set up, whose solution gives the coefficients of the nonlinear block. By this data based black box approach, the distortion behavior of a nonlinear circuit under the influence of an interfering signal at an arbitrary input port can be determined. Such an interfering signal can be, for example, an electromagnetic interference signal which conductively couples into the port of consideration. © 2011 Author(s).