1,481 research outputs found

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    Evolvable Embryonics: 2-in-1 Approach to Self-healing Systems

    Get PDF
    This paper covers the authors’ recent research in the area of evolutionary design optimisation in electronic application domain (Evolvable Hardware). This will be also presented in the context of biologically inspired systems where Evolvable Hardware is concerned with evolutionary synthesis of self-healing systems and potentially hardware capable of online adaptation to dynamically changing environment. We will also illustrate how EAs can produce novel and unintuitive design solutions, and possibly new design principles. The novelty of this research project addresses this compelling change in the traditional landscape of the associated research disciplines by seeking to provide a novel biologically inspired mechanism to support the design optimisation of self-healing architectures, that is Evolvable-Embryonics

    An architectural framework for self-configuration and self-improvement at runtime

    Get PDF
    [no abstract

    Forecast based traffic signal coordination using congestion modelling and real-time data

    Get PDF
    This dissertation focusses on the implementation of a Real-Time Simulation-Based Signal Coordination module for arterial traffic, as proof of concept for the potential of integrating a new generation of advanced heuristic optimisation tools into Real-Time Traffic Management Systems. The endeavour represents an attempt to address a number of shortcomings observed in most currently marketed on-line signal setting solutions and provide better adaptive signal timings. It is unprecedented in its use of a Genetic Algorithm coupled with Continuous Dynamic Traffic Assignment as solution evaluation method, only made possible by the recently presented parallelisation strategies for the underlying algorithms. Within a fully functional traffic modelling and management framework, the optimiser is developed independently, leaving ample space for future adaptations and extensions, while relying on the best available technology to provide it fast and realistic solution evaluation based on reliable real-time supply and demand data. The optimiser can in fact operate on high quality network models that are well calibrated and always up-to-date with real-world road conditions; rely on robust, multi-source network wide traffic data, rather than being attached to single detectors; manage area coordination using an external simulation engine, rather than a na¨ıve flow propagation model that overlooks crucial traffic dynamics; and even incorporate real-time traffic forecast to account for transient phenomena in the near future to act as a feedback controller. Results clearly confirm the efficacy of the proposed method, by which it is possible to obtain relevant and consistent corridor performance improvements with respect to widely known arterial bandwidth maximisation techniques under a range of different traffic conditions. The computational efforts involved are already manageable for realistic real-world applications, and future extensions of the presented approach to more complex problems seem within reach thanks to the load distribution strategies already envisioned and prepared for in the context of this work

    Identifying and Detecting Attacks in Industrial Control Systems

    Get PDF
    The integrity of industrial control systems (ICS) found in utilities, oil and natural gas pipelines, manufacturing plants and transportation is critical to national wellbeing and security. Such systems depend on hundreds of field devices to manage and monitor a physical process. Previously, these devices were specific to ICS but they are now being replaced by general purpose computing technologies and, increasingly, these are being augmented with Internet of Things (IoT) nodes. Whilst there are benefits to this approach in terms of cost and flexibility, it has attracted a wider community of adversaries. These include those with significant domain knowledge, such as those responsible for attacks on Iran’s Nuclear Facilities, a Steel Mill in Germany, and Ukraine’s power grid; however, non specialist attackers are becoming increasingly interested in the physical damage it is possible to cause. At the same time, the approach increases the number and range of vulnerabilities to which ICS are subject; regrettably, conventional techniques for analysing such a large attack space are inadequate, a cause of major national concern. In this thesis we introduce a generalisable approach based on evolutionary multiobjective algorithms to assist in identifying vulnerabilities in complex heterogeneous ICS systems. This is both challenging and an area that is currently lacking research. Our approach has been to review the security of currently deployed ICS systems, and then to make use of an internationally recognised ICS simulation testbed for experiments, assuming that the attacking community largely lack specific ICS knowledge. Using the simulator, we identified vulnerabilities in individual components and then made use of these to generate attacks. A defence against these attacks in the form of novel intrusion detection systems were developed, based on a range of machine learning models. Finally, this was further subject to attacks created using the evolutionary multiobjective algorithms, demonstrating, for the first time, the feasibility of creating sophisticated attacks against a well-protected adversary using automated mechanisms

    Advances in Evolutionary Algorithms

    Get PDF
    With the recent trends towards massive data sets and significant computational power, combined with evolutionary algorithmic advances evolutionary computation is becoming much more relevant to practice. Aim of the book is to present recent improvements, innovative ideas and concepts in a part of a huge EA field
    • …
    corecore