805 research outputs found

    Assessing system architectures: the Canonical Decomposition Fuzzy Comparative methodology

    Get PDF
    The impacts of decisions made during the selection of the system architecture propagate throughout the entire system lifecycle. The challenge for system architects is to perform a realistic assessment of an inherently ambiguous system concept. Subject matter expert interpretations, intuition, and heuristics are performed quickly and guide system development in the right overall direction, but these methods are subjective and unrepeatable. Traditional analytical assessments dismiss complexity in a system by assuming severability between system components and are intolerant of ambiguity. To be defensible, a suitable methodology must be repeatable, analytically rigorous, and yet tolerant of ambiguity. The hypothesis for this research is that an architecture assessment methodology capable of achieving these objectives is possible by drawing on the strengths of existing approaches while addressing their collective weaknesses. The proposed methodology is the Canonical Decomposition Fuzzy Comparative approach. The theoretical foundations of this methodology are developed and tested through the assessment of three physical architectures for a peer-to-peer wireless network. An extensible modeling framework is established to decompose high-level system attributes into technical performance measures suitable for analysis via computational modeling. Canonical design primitives are used to assess antenna performance in the form of a comparative analysis between the baseline free space gain patterns and the installed gain patterns. Finally, a fuzzy inference system is used to interpret the comparative feature set and offer a numerical assessment. The results of this experiment support the hypothesis that the proposed methodology is well suited for exposing integration sensitivity and assessing coupled performance in physical architecture concepts --Abstract, page iii

    Understanding System of Systems Development Using an Agent- Based Wave Model

    Get PDF
    System of Systems (SoS) development is a complex process that depends on the cooperation of various independent Systems[1]. SoS acquisition and development differs from that typical for a single System; it has been shown to follow a wave paradigm known as the Wave Model[2]. Agent based models (ABMs) consist of a set of abstracted entities referred to as agents, and a framework using simplified rules for simulating agent decisions and interactions. Agents have their own goals and are capable of perceiving changes in the environment. Systemic (global) behavior emerges from the decisions and interactions of the agents. This research provides a generic model of SoS development with a genetic algorithm and fuzzy assessor implemented in an agent based model. The generic SoS development follows the Wave Model. The genetic algorithm provides an initial SoS meta- architecture. The fuzzy assessor qualitatively evaluates SoS meta-architectures. The agent-based model implements the generic SoS development, the genetic algorithm, the fuzzy assessor, and independent SoS and system agents and shows the SoS development based on an initial set of conditions. A prototype model is developed to test the concept on a sample from the DoD Intelligence, Surveillance, and Reconnaissance (ISR) domain

    Data Mining in Smart Grids

    Get PDF
    Effective smart grid operation requires rapid decisions in a data-rich, but information-limited, environment. In this context, grid sensor data-streaming cannot provide the system operators with the necessary information to act on in the time frames necessary to minimize the impact of the disturbances. Even if there are fast models that can convert the data into information, the smart grid operator must deal with the challenge of not having a full understanding of the context of the information, and, therefore, the information content cannot be used with any high degree of confidence. To address this issue, data mining has been recognized as the most promising enabling technology for improving decision-making processes, providing the right information at the right moment to the right decision-maker. This Special Issue is focused on emerging methodologies for data mining in smart grids. In this area, it addresses many relevant topics, ranging from methods for uncertainty management, to advanced dispatching. This Special Issue not only focuses on methodological breakthroughs and roadmaps in implementing the methodology, but also presents the much-needed sharing of the best practices. Topics include, but are not limited to, the following: Fuzziness in smart grids computing Emerging techniques for renewable energy forecasting Robust and proactive solution of optimal smart grids operation Fuzzy-based smart grids monitoring and control frameworks Granular computing for uncertainty management in smart grids Self-organizing and decentralized paradigms for information processin

    Design and Implementation of Legal Protection for Trade Secrets in Cloud Brokerage Architectures relying on Blockchains

    Get PDF
    Data Protection legislation has evolved around the globe to maximize legal protection of trade secrets. However, in an online cross-jurisdiction environment of cloud computing and blockchains, it is becoming increasingly difficult to maximize retribution for trade secret misappropriation. This multidisciplinary Ph.D. research proposes a model for legal protection for trade secrets in the cloud and over blockchains. Two QoS based datasets were used for evaluation of proposed model. The prior dataset i.e., feedback from customers, was compiled using leading review websites such as Cloud Hosting Reviews, Best Cloud Computing Providers, and Cloud Storage Reviews and Ratings. The later dataset i.e., feedback from servers, was generated from Cloud brokerage architecture that was emulated using high performance computing (HPC) cluster at University of Luxembourg (HPC @ Uni.lu). The simulation runs in the stable environment i.e. when uncertainty is low, show better results of proposed model as compared to its counterparts in the field. In particular, the results have implications for enterprises that view trade secrets misappropriation as a limiting factor for acquisition of Cloud services. For legal validation of the results, questionnaires were sent to law and ICT experts. There were total of six respondents (two from the field of ICT, two from the field of law, and two from the field of ICT and Law). The sample (5 out of 6 respondents) agreed with the findings of this PhD research
    • …
    corecore