66 research outputs found

    Evolutionary Game Theoretic Multi-Objective Optimization Algorithms and Their Applications

    Get PDF
    Multi-objective optimization problems require more than one objective functions to be optimized simultaneously. They are widely applied in many science fields, including engineering, economics and logistics where optimal decisions need to be taken in the presence of trade-offs between two or more conicting objectives. Most of the real world multi-objective optimization problems are NP-Hard problems. It may be too computationally costly to find an exact solution but sometimes a near optimal solution is sufficient. In these cases, Multi-Objective Evolutionary Algorithms (MOEAs) provide good approximate solutions to problems that cannot be solved easily using other techniques. However Evolutionary Algorithm is not stable due to its random nature, it may produce very different results every time it runs. This dissertation proposes an Evolutionary Game Theory (EGT) framework based algorithm (EGTMOA) that provides optimality and stability at the same time. EGTMOA combines the notion of stability from EGT and optimality from MOEA to form a novel and promising algorithm to solve multi-objective optimization problems. This dissertation studies three different multi-objective optimization applications, Cloud Virtual Machine Placement, Body Sensor Networks, and Multi-Hub Molecular Communication along with their proposed EGTMOA framework based algorithms. Experiment results show that EGTMOAs outperform many well known multi-objective evolutionary algorithms in stability, performance and runtime

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Proceedings, MSVSCC 2016

    Get PDF
    Proceedings of the 10th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 14, 2016 at VMASC in Suffolk, Virginia

    Journal of undergraduate research and scholarly excellence

    Get PDF
    JUR publishes extraordinary undergraduate work in an easily accessible and professional peer-reviewed journal. The mission is to print outstanding undergraduate research, scholarly articles, and creative works in order to make them available to the public and connect the worldwide community of college undergraduates. http://jur.colostate.edu.Includes bibliographical references.Height variations in football shoes (cleats) for running backs and receivers may not alter ankle spatting effects in football field drills / Peyton P. Faganel, Ty C. Drake, Angela R. Dahl-Miller, ATC, David S. Senchina -- Beware thin air: altitude's influence on NBA game outcomes / Shane Moore, Jonathan Scott -- Inhibition of Human Glutaminase by 5-[3-bromo-4-(dimethylamino)phenyl]-2,3,5,6-tetrahydro-2,2-dimethylbenzo[a]phenanthridin-4(1H)-one / Paul R. West, Matthew Scholfield, Norman P. Curthoys -- From the pupil's perspective / Amanda H. Beach, Lindsay S. Leech with Tod R. Clapp -- Evaluating medical school selection criteria: are we choosing the best candidates? / Ryan Knodle -- The differentiation of radial glial cell line C6 in vitro / Kevin Christopher with Andy Cook -- The glorification of gluten-free / Kapila Pothu -- Effect of capping ligand on serum protein adsorption and cell uptake of gold nanoparticles / Catherine Kiyota and Michelle Kiyota with Christin Grabinski, Saber Hussain -- Emergence of structures and forms in complex adaptive systems in nature / Atanu Bikash Chatterjee -- Detritus, water volume, and pH in epiphytic bromeliads' central tank / Nicholas A. George -- Effects of caffeine on the growth and post-embryonic development in Manduca Sexta / Emily C. Perregaux with Nathalie Van Der Rijst, Kurt P. Vandock -- Windows & doors | Going under for the third time | My mother, I am | Shattered / Paula Giovanini-Morris -- Untitled / Frances Ritchie -- Untitled / Zachary Heil -- June 22, 2009 | Secrets | Born and raised / Adrian R. P. Brown -- Books or stories?: the changing value of social education in rural Morocco / Elena C. Robertson -- The impacts of westernization through short-term volunteer teaching in Ayutthaya, Thailand: an observational study / Elena C. Robertson -- Does race matter in international beauty pageants?: a quantitative analysis of Miss World / Selena Zhong, Rima Wilkes -- The crippling effects of labeling on the public school system / Jamie McLaughlin with Fred Ulrich -- Sovereignty and underdevelopment in China: The 1842 Treaty of Nanjing and the Unequal Treaties / Jacob R. W. Damstra -- On ice / Nicholas Kirkland -- An epiphany from one crazy time when I went to the library for the books / Elizabeth Strait.Annual

    Measuring knowledge sharing processes through social network analysis within construction organisations

    Get PDF
    The construction industry is a knowledge intensive and information dependent industry. Organisations risk losing valuable knowledge, when the employees leave them. Therefore, construction organisations need to nurture opportunities to disseminate knowledge through strengthening knowledge-sharing networks. This study aimed at evaluating the formal and informal knowledge sharing methods in social networks within Australian construction organisations and identifying how knowledge sharing could be improved. Data were collected from two estimating teams in two case studies. The collected data through semi-structured interviews were analysed using UCINET, a Social Network Analysis (SNA) tool, and SNA measures. The findings revealed that one case study consisted of influencers, while the other demonstrated an optimal knowledge sharing structure in both formal and informal knowledge sharing methods. Social networks could vary based on the organisation as well as the individuals’ behaviour. Identifying networks with specific issues and taking steps to strengthen networks will enable to achieve optimum knowledge sharing processes. This research offers knowledge sharing good practices for construction organisations to optimise their knowledge sharing processes
    corecore