1,104,608 research outputs found

    Incorporating the Basic Elements of a First-degree Fuzzy Logic and Certain Elments of Temporal Logic for Dynamic Management Applications

    Get PDF
    The approximate reasoning is perceived as a derivation of new formulas with the corresponding temporal attributes, within a fuzzy theory defined by the fuzzy set of special axioms. For dynamic management applications, the reasoning is evolutionary because of unexpected events which may change the state of the expert system. In this kind of situations it is necessary to elaborate certain mechanisms in order to maintain the coherence of the obtained conclusions, to figure out their degree of reliability and the time domain for which these are true. These last aspects stand as possible further directions of development at a basic logic level. The purpose of this paper is to characterise an extended fuzzy logic system with modal operators, attained by incorporating the basic elements of a first-degree fuzzy logic and certain elements of temporal logic.Dynamic Management Applications, Fuzzy Reasoning, Formalization, Time Restrictions, Modal Operators, Real-Time Expert Decision System (RTEDS)

    A centralized feedback control model for resource management in wireless networks

    Get PDF
    In a wireless environment, guaranteeing QoS is challenging because applications at multiple devices share the same limited radio bandwidth. In this paper we introduce and study a resource management model for centralized wireless networks, using feedback control theory. Before applying in practice, the proposed model is evaluated using the well-known 20-sim dynamic system simulator. The experimental results show that flexible and efficient resource allocation can be achieved for a variety of system parameters and WLAN scenarios; however, care should be taken in setting the control parameters and coefficients

    A Shannon's theory of knowledge

    Get PDF
    Our so-called "Information Society", is gradually changing into a "Knowledge Society". The Shannons Theory provided a formal and mathematical framework for information. It was very fruitful for avoiding ambiguity on the concept of information. This paper proposes a transposition of this theory for knowledge. From the three axes of a formal model designed for knowledge engineering (information, sense and context), three quantitative measures are proposed to get a measure of the quantity of knowledge of a system. This notion permits to consider applications as the cognitive measure of a web site, a knowledge community (community of practiceÂ…).Knowledge, Knowledge management, Shannon's theory

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page

    Meta-heuristic algorithms in car engine design: a literature survey

    Get PDF
    Meta-heuristic algorithms are often inspired by natural phenomena, including the evolution of species in Darwinian natural selection theory, ant behaviors in biology, flock behaviors of some birds, and annealing in metallurgy. Due to their great potential in solving difficult optimization problems, meta-heuristic algorithms have found their way into automobile engine design. There are different optimization problems arising in different areas of car engine management including calibration, control system, fault diagnosis, and modeling. In this paper we review the state-of-the-art applications of different meta-heuristic algorithms in engine management systems. The review covers a wide range of research, including the application of meta-heuristic algorithms in engine calibration, optimizing engine control systems, engine fault diagnosis, and optimizing different parts of engines and modeling. The meta-heuristic algorithms reviewed in this paper include evolutionary algorithms, evolution strategy, evolutionary programming, genetic programming, differential evolution, estimation of distribution algorithm, ant colony optimization, particle swarm optimization, memetic algorithms, and artificial immune system

    CS 790-01: Information Security

    Get PDF
    This course gives a comprehensive study of security vulnerabilities in information systems and the basic techniques for developing secure applications and practicing safe computing. Topics include: Conventional encryption; Data Encryption Standard; Advanced Encryption Standard; Hashing functions and data integrity; Basic Number Theory; Public-key encryption (RSA); Digital signature; Security standards and applications; Access Control; Management and analysis of security. After taking this course, students will have the knowledge of several well-known security standards and their applications; and the students should be able to increase system security and develop secure applications

    CEG 7200-01: Information Security

    Get PDF
    This course gives a comprehensive study of security vulnerabilities· in information systems and the basic techniques for developing secure applications and practicing safe computing. Topics include: Conventional encryption; Data Encryption Standard; Advanced Encryption Standard; Hashing functions and data integrity; Basic Number Theory; Public-key encryption (RSA); Digital signature; Security standards and applications; Access Control; Management and analysis of security. After taking this course, students will have the knowledge of several well-known security standards and their applications; and the students should be able to increase system security and develop secure applications

    HSPM 7236-A - Health Informatics

    Get PDF
    This course presents the knowledge, infrastructure, functions, and tools of health informatics. It explores technology, planning and management and applications in public health and health care. The emphasis is on conceptual frameworks as well as a deeper level of engagement on system applications. It focuses on the application of health technology, with a particular emphasis on the private/public sector of health management. It is designed to familiarize students with core concepts and issues confronting managers in the health sector associated with planning, implementation and evaluation of information systems. The course provides an overview of the theory, processes and applications of information systems and how they relate to health policy and management. It also provides a basic understanding of data standards and requirements, and the critical concepts and practice in mapping and interpreting health information

    Space station advanced automation

    Get PDF
    In the development of a safe, productive and maintainable space station, Automation and Robotics (A and R) has been identified as an enabling technology which will allow efficient operation at a reasonable cost. The Space Station Freedom's (SSF) systems are very complex, and interdependent. The usage of Advanced Automation (AA) will help restructure, and integrate system status so that station and ground personnel can operate more efficiently. To use AA technology for the augmentation of system management functions requires a development model which consists of well defined phases of: evaluation, development, integration, and maintenance. The evaluation phase will consider system management functions against traditional solutions, implementation techniques and requirements; the end result of this phase should be a well developed concept along with a feasibility analysis. In the development phase the AA system will be developed in accordance with a traditional Life Cycle Model (LCM) modified for Knowledge Based System (KBS) applications. A way by which both knowledge bases and reasoning techniques can be reused to control costs is explained. During the integration phase the KBS software must be integrated with conventional software, and verified and validated. The Verification and Validation (V and V) techniques applicable to these KBS are based on the ideas of consistency, minimal competency, and graph theory. The maintenance phase will be aided by having well designed and documented KBS software
    • …
    corecore