221 research outputs found

    Automated Deduction – CADE 28

    Get PDF
    This open access book constitutes the proceeding of the 28th International Conference on Automated Deduction, CADE 28, held virtually in July 2021. The 29 full papers and 7 system descriptions presented together with 2 invited papers were carefully reviewed and selected from 76 submissions. CADE is the major forum for the presentation of research in all aspects of automated deduction, including foundations, applications, implementations, and practical experience. The papers are organized in the following topics: Logical foundations; theory and principles; implementation and application; ATP and AI; and system descriptions

    Network Flow Techniques: An application to Integrated Energy Systems

    Get PDF
    Energy has become one of the most crucial problem in modern society which must be investigated, analyzed and solved. The main goal of this dissertation is to look at the economics of energy by analyzing the relationship between the availability of energy resources and the economic activity in a network context. The idea is to provide an efficient distribution of energy resources. The methodology that has been used is that of Network Flow optimization and it has been applied to solve Integrated Energy Systems problems

    New computational approaches for the transportation models

    Get PDF
    The Transportation model (TP) is one of the oldest practical problems in mathematical programing. This model and its relevant extensions play important roles in Operations Research for finding the optimal solutions for several planning problems in Business and Industry. Several methods have been developed to solve these models, the most known is Vogels Approximation Method (VAM). A modified version of VAM is proposed to obtain near optimal solutions or the optimum in some defined cases. Modified Vogel Method (MVM) consists iteratively in constructing a reduced cost matrix before applying VAM. Beside to MVM, another approach has been developed, namely the Zero Case Penalty, which represents different penalty computational aspects. Through the research, the results of methods-comparison studies and comparative analysis are presented. Furthermore, special classes, the Unbalanced TP and the Transshipment models, were studied and solved with different approaches. Additionally, we provide an application of MVM to Traveling Salesman Problem.Master of Science (M.Sc.) in Computational Scienc

    Automated Reasoning

    Get PDF
    This volume, LNAI 13385, constitutes the refereed proceedings of the 11th International Joint Conference on Automated Reasoning, IJCAR 2022, held in Haifa, Israel, in August 2022. The 32 full research papers and 9 short papers presented together with two invited talks were carefully reviewed and selected from 85 submissions. The papers focus on the following topics: Satisfiability, SMT Solving,Arithmetic; Calculi and Orderings; Knowledge Representation and Jutsification; Choices, Invariance, Substitutions and Formalization; Modal Logics; Proofs System and Proofs Search; Evolution, Termination and Decision Prolems. This is an open access book

    Congestion removal in the next generation internet

    Get PDF
    The ongoing development of new and demanding Internet applications requires the Internet to deliver better service levels that are significantly better than the best effort service that the Internet currently provides and was built for. These improved service levels include guaranteed delays, jitter and bandwidth. Through extensive research into Quality of Service and Differentiated Service (DiffServ) it has become possible to provide guaranteed services, however this turns out to be inadequate without the application of Traffic Engineering methodologies and principles. Traffic Engineering is an integral part of network operation. Its major goal is to deliver the best performance from an existing service provider's network resources and, at the same time, to enhance a customers' view of network performance. In this thesis, several different traffic engineering methods for optimising the operation of native IP and IP networks employing MPLS are proposed. A feature of these new methods is their fast run times and this opens the way to making them suitable for application in an online traffic engineering environment. For native IP networks running shortest path based routing protocols, we show that an LP-based optimisation based on the well known multi-commodity flow problem can be effective in removing network congestion. Having realised that Internet service providers are now moving towards migrating their networks to the use of MPLS, we have also formulated optimisation methods to traffic engineer MPLS networks by selecting suitable routing paths and utilising the feature of explicit routing contained in MPLS. Although MPLS is capable of delivering traffic engineering across different classes of traffic, network operators still prefer to rely on the proven and simple IP based routing protocols for best effort traffic and only use MPLS to route traffic requiring special forwarding treatment. Based on this fact, we propose a method that optimises the routing patterns applicable to different classes of traffic based on their bandwidth requirements. A traffic engineering comparison study that evaluates the performance of a neural network-based method for MPLS networks and LP-based weight setting approach for shortest path based networks has been performed using a well-known open source network simulator, called ns2. The comparative evaluation is based upon the packet loss probability. The final chapter of the thesis describes the software development of a network management application called OptiFlow which integrates techniques described in earlier chapters including the LP-based weight setting optimisation methodology; it also uses traffic matrix estimation techniques that are required as input to the weight setting models that have been devised. The motivation for developing OptiFlow was to provide a prototype set of tools that meet the congestion management needs of networking industries (ISPs and telecommunications companies - telcos)

    Sélection et réglage de paramètres pour l'optimisation de logiciels d'ordonnancement industriel

    Get PDF
    L’utilisation d’un logiciel d’ordonnancement industriel fait intervenir une multitude de paramètres dont le réglage influence fortement la qualité des résultats. A l’heure actuelle, ce réglage est effectué de façon manuelle, après un travail souvent fastidieux au cours de l’installation initiale du logiciel’ De plus, une fois spécifiées, les valeurs de ces paramètres sont rarement remises en cause par les utilisateurs, du fait de leur manque d’expérience et du nombre important de paramètres à ajuster. L’idée que nous développons ici consiste à utiliser des métaheuristiques pour automatiser cette tâche. Deux problèmes seront abordés : la sélection des paramètres pertinents et leur réglage en fonction des exigences de l’utilisateur. Nous proposons de résoudre ces deux problèmes de façon simultanée, en introduisant des stratégies de sélection au sein des métaheuristiques. Cette approche est appliquée au logiciel d’ordonnancement Ortems® et validée sur plusieurs cas industriels. ABSTRACT : The use of scheduling software requires to set-up a number of parameters that have a direct influence on the schedule quality. Nowadays, this set-up is obtained manually after an extensive effort during initial software installation. Moreover, this set-up is rarely called into question by users, due to their lack of experience and to the high number of parameters involved. It is suggested in this thesis the use of metaheuristics to automate this task. Two problems are considered: selection of relevant parameters and their tuning according to user requirements. We suggest here an approach to solve these problems simultaneously, based on the combination of metaheuristics with some parameter selection strategies. An implementation framework has been developed and tested on an industrial scheduler, named Ortems®. The first results of the use of this framework on real industrial databases are described and commented

    Schémas pratiques pour la diffusion (sécurisée) sur les canaux sans fils

    Get PDF
    Dans cette thèse, on s'est intéressé à l'étude des canaux de diffusion avec des contraintes de transmission pratiques. Tout d'abord, on a étudié l'impact de la contrainte pratique de l'utilisation d'un alphabet fini à l'entrée du canal de diffusion Gaussien avec deux utilisateurs. Deux modèles de canaux de diffusion sont considérés lorsqu'il y a, en plus d'un message commun pour les deux utilisateurs, (i) un message privé pour l'un des deux utilisateurs sans contrainte de sécurité (ii) un message confidentiel pour l'un des deux utilisateurs qui doit être totalement caché de l'autre utilisateur. On a présenté plusieurs stratégies de diffusion distinguées par leur complexité d'implémentation. Plus précisément, on a étudié les régions des débits atteignables en utilisant le partage de temps, la superposition de modulation et le codage par superposition. Pour la superposition de modulation et le cas général du codage par superposition, les régions des débits atteignables maximales sont obtenues en maximisant par rapport aux positions des symboles dans la constellation et la distribution de probabilité jointe. On a étudié le compromis entre la complexité d'implémentation des stratégies de transmission et leurs efficacités en termes de gains en débits atteignables. On a étudié aussi l'impact de la contrainte de sécurité sur la communication en comparant les débits atteignables avec et sans cette contrainte. Enfin, on a étudié les performances du système avec des schémas d'accusés de réception hybrides (HARQ) pour un canal à écoute à évanouissement par blocs lorsque l'émetteur n'a pas une information parfaite sur l'état instantané du canal mais connait seulement les statistiques. On a considéré un schéma adaptatif pour la communication sécurisée en utilisant des canaux de retour à niveaux multiples vers l'émetteur pour changer la longueur des sous mots de code à chaque retransmission afin que le débit utile secret soit maximisé sous des contraintes d'"outages".In this thesis, we aim to study broadcast channels with practical transmission constraints. First, we study the impact of finite input alphabet constraint on the achievable rates for the Gaussian broadcast channel with two users. We consider two models of broadcast channels, when there is in addition of a common message for two users, (i) a private message for one of them without secrecy constraint (ii) a confidential message for one of them which should be totally hidden from the other user. We present several broadcast strategies distinguished by their complexity of implementation. More precisely, we study achievable rate regions using time sharing, superposition modulation and superposition coding. For superposition modulation and superposition coding strategies, maximal achievable rate regions are obtained by maximizing over both symbol positions in the constellation and the joint probability distribution. We study the tradeoff between the complexity of implementation of the transmission strategies and their efficiency in terms of gains in achievable rates. We study also the impact of the secrecy constraint on communication by comparing the achievable rates with and without this constraint. Finally, we study the system performance using HARQ schemes for the block-fading wiretap channel when the transmitter has no instantaneous channel state information but knows channel statistics. We consider an adaptive-rate scheme for the secure communication by using multilevel feedback channels to change sub-codeword lengths at each retransmission, in order to maximize the secrecy throughput under outage probabilities constraints.PARIS11-SCD-Bib. électronique (914719901) / SudocSudocFranceF
    corecore