236 research outputs found
A Fuzzy Nonlinear Programming Approach for Optimizing the Performance of a Four-Objective Fluctuation Smoothing Rule in a Wafer Fabrication Factory
In theory, a scheduling problem can be formulated as a mathematical programming problem. In practice, dispatching rules are considered to be a more practical method of scheduling. However, the combination of mathematical programming and fuzzy dispatching rule has rarely been discussed in the literature. In this study, a fuzzy nonlinear programming (FNLP) approach is proposed for optimizing the scheduling performance of a four-factor fluctuation smoothing rule in a wafer fabrication factory. The proposed methodology considers the uncertainty in the remaining cycle time of a job and optimizes a fuzzy four-factor fluctuation-smoothing rule to sequence the jobs in front of each machine. The fuzzy four-factor fluctuation-smoothing rule has five adjustable parameters, the optimization of which results in an FNLP problem. The FNLP problem can be converted into an equivalent nonlinear programming (NLP) problem to be solved. The performance of the proposed methodology has been evaluated with a series of production simulation experiments; these experiments provide sufficient evidence to support the advantages of the proposed method over some existing scheduling methods
Short Papers of the 8th Conference on Cloud Computing Conference, Big Data & Emerging Topics (JCC-BD&ET 2020)
Compilación de los short papers presentados en las 8vas Jornadas de Cloud Computing, Big Data & Emerging Topics (JCC-BD&ET2020), llevadas a cabo en modalidad virtual durante septiembre de 2020 y organizadas por el Instituto de Investigación en Informática LIDI (III-LIDI) y la Secretaría de Posgrado de la Facultad de Informática de la UNLP en colaboración con universidades de Argentina y del exterior.Facultad de Informátic
Fuzzy Sets, Fuzzy Logic and Their Applications 2020
The present book contains the 24 total articles accepted and published in the Special Issue “Fuzzy Sets, Fuzzy Logic and Their Applications, 2020” of the MDPI Mathematics journal, which covers a wide range of topics connected to the theory and applications of fuzzy sets and systems of fuzzy logic and their extensions/generalizations. These topics include, among others, elements from fuzzy graphs; fuzzy numbers; fuzzy equations; fuzzy linear spaces; intuitionistic fuzzy sets; soft sets; type-2 fuzzy sets, bipolar fuzzy sets, plithogenic sets, fuzzy decision making, fuzzy governance, fuzzy models in mathematics of finance, a philosophical treatise on the connection of the scientific reasoning with fuzzy logic, etc. It is hoped that the book will be interesting and useful for those working in the area of fuzzy sets, fuzzy systems and fuzzy logic, as well as for those with the proper mathematical background and willing to become familiar with recent advances in fuzzy mathematics, which has become prevalent in almost all sectors of the human life and activity
Recommended from our members
Robust behavioral malware detection
Computer security attacks evolve to evade deployed defenses. Recent attacks have ranged from exploiting generic software vulnerabilities in memory-unsafe languages such as buffer overflows and format string vulnerabilities to exploiting logic errors in web applications, through means such as SQL injection and cross-site scripting. Furthermore, recent attacks have focused on escalating privileges
and stealing sensitive information by exploiting new hardware or operating system (OS) interfaces. Computer security attacks are also now relying on social engineering techniques to run malicious programs on victims' machines; instances of such abuse include phishing and watering hole attacks, both of which trick people into running malicious code or divulging confidential information. Thus, traditional computer security methods, such as OS confinement and program analysis, will not prevent new attacks that do not violate OS confinement or present illegal program behaviors.
Another challenge is that traditional security approaches have large trusted code bases (TCBs), which include hardware, OSs, and other software components that implement authentication and authorization logic across a distributed system. This is a vulnerable area because these components are complex and often contain vulnerabilities that undermine the overall system's integrity or confidentiality.
Evasive attacks on vulnerable systems -- especially in instances where trusted components turn malicious -- inspire the creation of defenses that can augment formally specified mechanisms against known threats. Specifically, this thesis advances the state of the art in behavioral malware detection -- detecting previously unknown malware in the very early stages of infection within an enterprise network.
Here we assess three fundamental insights of modern-day attacks and then describe a cross-layer defense against such attacks. First, we make a low-level machine state visible to behavioral analysis, significantly minimizing the TCB and its associated vulnerabilities. Specifically, our behavioral detector utilizes an executable code's dynamic properties, with architectural and micro-architectural states as input. Second, we evaluate behavioral detectors against adaptive adversaries. For this purpose, we introduce a new metric to determine a detector's robustness against malware modifications, which serves as a step toward explainability of machine learning-based malware detectors. Finally, we exploit the fact that attacks spread through only a limited number of vectors and propose new techniques to analyze the resulting dynamic correlations created among machines. These insights show that behavioral detectors can efficiently protect both individual devices and end hosts within enterprise networks. We present three types of such behavioral detectors.
Sherlock protects resource-constrained devices, such as mobile phones and Internet-of-things (IoT) devices, without modifying the software/hardware stack. Sherlock's supervised and unsupervised versions outperform prior work by 24.7% and 12.5% (area under the curve (AUC) metric), respectively, and detects stealthy malware that often evades static analysis tools.
The second behavioral detector, Shape-GD, protects devices within an enterprise network. It monitors devices on the network, aggregates data from weak local detectors, overlays that with network-level information, and then makes early, robust predictions regarding malicious activity. Shape-GD achieves its goals by exploiting latent attack semantics. Specifically, it analyzes communication patterns across multiple devices, partitioning them into neighborhoods. Devices within the same neighborhood are likely to be exposed to the same attack vector. Furthermore, we hypothesize that the conditional distribution of false positives is different from that of true positives; i.e., given a neighborhood of nodes, we can compute the aggregate distributional shape of alert feature vectors from the neighborhood itself and provide robust labels.
We evaluate Shape-GD by emulating a large community of Windows systems using the system call traces from a few thousand malicious and benign applications; we simulate both a phishing attack in a corporate email network as well as a watering hole attack through a popular website. In both scenarios, Shape-GD identifies malware early on (~100 infected nodes in a ~100K-node system for watering hole attacks, and ~10 of ~1,000 for phishing attacks) and robustly (with ~100% global true-positive and ~1% global false-positive rates).
The third behavioral detector, Centurion, detects malware across machines monitored by an anti-virus company. It is able to analyze behavior from 5 million Symantec client machines in real time and discovers malware by correlating file downloads across multiple machines. Compared with a recent local detector that analyzes metadata from file downloads, Centurion reduced the number of false positives from ~1M to ~110K and increased the true-positive rate by a factor of ~2.5. In addition, on average, Centurion detects malware 345 days earlier than commercial anti-virus products.Electrical and Computer Engineerin
Smart Sustainable Manufacturing Systems
With the advent of disruptive digital technologies, companies are facing unprecedented challenges and opportunities. Advanced manufacturing systems are of paramount importance in making key enabling technologies and new products more competitive, affordable, and accessible, as well as for fostering their economic and social impact. The manufacturing industry also serves as an innovator for sustainability since automation coupled with advanced manufacturing technologies have helped manufacturing practices transition into the circular economy. To that end, this Special Issue of the journal Applied Sciences, devoted to the broad field of Smart Sustainable Manufacturing Systems, explores recent research into the concepts, methods, tools, and applications for smart sustainable manufacturing, in order to advance and promote the development of modern and intelligent manufacturing systems. In light of the above, this Special Issue is a collection of the latest research on relevant topics and addresses the current challenging issues associated with the introduction of smart sustainable manufacturing systems. Various topics have been addressed in this Special Issue, which focuses on the design of sustainable production systems and factories; industrial big data analytics and cyberphysical systems; intelligent maintenance approaches and technologies for increased operating life of production systems; zero-defect manufacturing strategies, tools and methods towards online production management; and connected smart factories
Energy Concerns with HPC Systems and Applications
For various reasons including those related to climate changes, {\em energy}
has become a critical concern in all relevant activities and technical designs.
For the specific case of computer activities, the problem is exacerbated with
the emergence and pervasiveness of the so called {\em intelligent devices}.
From the application side, we point out the special topic of {\em Artificial
Intelligence}, who clearly needs an efficient computing support in order to
succeed in its purpose of being a {\em ubiquitous assistant}. There are mainly
two contexts where {\em energy} is one of the top priority concerns: {\em
embedded computing} and {\em supercomputing}. For the former, power consumption
is critical because the amount of energy that is available for the devices is
limited. For the latter, the heat dissipated is a serious source of failure and
the financial cost related to energy is likely to be a significant part of the
maintenance budget. On a single computer, the problem is commonly considered
through the electrical power consumption. This paper, written in the form of a
survey, we depict the landscape of energy concerns in computer activities, both
from the hardware and the software standpoints.Comment: 20 page
Intelligent Circuits and Systems
ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society. This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering
Knowledge Representation in Engineering 4.0
This dissertation was developed in the context of the BMBF and EU/ECSEL funded
projects GENIAL! and Arrowhead Tools. In these projects the chair examines methods
of specifications and cooperations in the automotive value chain from OEM-Tier1-Tier2.
Goal of the projects is to improve communication and collaborative planning, especially
in early development stages. Besides SysML, the use of agreed vocabularies and on-
tologies for modeling requirements, overall context, variants, and many other items, is
targeted. This thesis proposes a web database, where data from the collaborative requirements elicitation is combined with an ontology-based approach that uses reasoning
capabilities.
For this purpose, state-of-the-art ontologies have been investigated and integrated that
entail domains like hardware/software, roadmapping, IoT, context, innovation and oth-
ers. New ontologies have been designed like a HW / SW allocation ontology and a
domain-specific "eFuse ontology" as well as some prototypes. The result is a modular
ontology suite and the GENIAL! Basic Ontology that allows us to model automotive
and microelectronic functions, components, properties and dependencies based on the
ISO26262 standard among these elements. Furthermore, context knowledge that influences design decisions such as future trends in legislation, society, environment, etc. is
included. These knowledge bases are integrated in a novel tool that allows for collabo-
rative innovation planning and requirements communication along the automotive value
chain. To start off the work of the project, an architecture and prototype tool was developed. Designing ontologies and knowing how to use them proved to be a non-trivial
task, requiring a lot of context and background knowledge. Some of this background
knowledge has been selected for presentation and was utilized either in designing models
or for later immersion. Examples are basic foundations like design guidelines for ontologies, ontology categories and a continuum of expressiveness of languages and advanced
content like multi-level theory, foundational ontologies and reasoning.
Finally, at the end, we demonstrate the overall framework, and show the ontology with
reasoning, database and APPEL/SysMD (AGILA ProPErty and Dependency Descrip-
tion Language / System MarkDown) and constraints of the hardware / software knowledge base. There, by example, we explore and solve roadmap constraints that are coupled
with a car model through a constraint solver.Diese Dissertation wurde im Kontext des von BMBF und EU / ECSEL gefördertem
Projektes GENIAL! und Arrowhead Tools entwickelt. In diesen Projekten untersucht der
Lehrstuhl Methoden zur Spezifikationen und Kooperation in der Automotive Wertschöp-
fungskette, von OEM zu Tier1 und Tier2. Ziel der Arbeit ist es die Kommunikation
und gemeinsame Planung, speziell in den frühen Entwicklungsphasen zu verbessern.
Neben SysML ist die Benutzung von vereinbarten Vokabularen und Ontologien in der
Modellierung von Requirements, des Gesamtkontextes, Varianten und vielen anderen
Elementen angezielt. Ontologien sind dabei eine Möglichkeit, um das Vermeiden von
Missverständnissen und Fehlplanungen zu unterstützen. Dieser Ansatz schlägt eine Web-
datenbank vor, wobei Ontologien das Teilen von Wissen und das logische Schlussfolgern
von implizitem Wissen und Regeln unterstützen.
Diese Arbeit beschreibt Ontologien für die Domäne des Engineering 4.0, oder spezifischer,
für die Domäne, die für das deutsche Projekt GENIAL! benötigt wurde. Dies betrifft
Domänen, wie Hardware und Software, Roadmapping, Kontext, Innovation, IoT und
andere. Neue Ontologien wurden entworfen, wie beispielsweise die Hardware-Software
Allokations-Ontologie und eine domänen-spezifische "eFuse Ontologie". Das Ergebnis war
eine modulare Ontologie-Bibliothek mit der GENIAL! Basic Ontology, die es erlaubt, automotive und mikroelektronische Komponenten, Funktionen, Eigenschaften und deren
Abhängigkeiten basierend auf dem ISO26262 Standard zu entwerfen. Des weiteren ist
Kontextwissen, welches Entwurfsentscheidungen beinflusst, inkludiert. Diese Wissensbasen sind in einem neuartigen Tool integriert, dass es ermöglicht, Roadmapwissen und
Anforderungen durch die Automobil- Wertschöpfungskette hinweg auszutauschen. On
tologien zu entwerfen und zu wissen, wie man diese benutzt, war dabei keine triviale
Aufgabe und benötigte viel Hintergrund- und Kontextwissen. Ausgewählte Grundlagen
hierfür sind Richtlinien, wie man Ontologien entwirft, Ontologiekategorien, sowie das
Spektrum an Sprachen und Formen von Wissensrepresentationen. Des weiteren sind fort-
geschrittene Methoden erläutert, z.B wie man mit Ontologien Schlußfolgerungen trifft.
Am Schluss wird das Overall Framework demonstriert, und die Ontologie mit Reason-
ing, Datenbank und APPEL/SysMD (AGILA ProPErty and Dependency Description
Language / System MarkDown) und Constraints der Hardware / Software Wissensbasis
gezeigt. Dabei werden exemplarisch Roadmap Constraints mit dem Automodell verbunden und durch den Constraint Solver gelöst und exploriert
- …