12,200 research outputs found

    Detection of Buried Inhomogeneous Elliptic Cylinders by a Memetic Algorithm

    Get PDF
    The application of a global optimization procedure to the detection of buried inhomogeneities is studied in the present paper. The object inhomogeneities are schematized as multilayer infinite dielectric cylinders with elliptic cross sections. An efficient recursive analytical procedure is used for the forward scattering computation. A functional is constructed in which the field is expressed in series solution of Mathieu functions. Starting by the input scattered data, the iterative minimization of the functional is performed by a new optimization method called memetic algorithm. (c) 2003 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works

    Quantifying Social Network Dynamics

    Full text link
    The dynamic character of most social networks requires to model evolution of networks in order to enable complex analysis of theirs dynamics. The following paper focuses on the definition of differences between network snapshots by means of Graph Differential Tuple. These differences enable to calculate the diverse distance measures as well as to investigate the speed of changes. Four separate measures are suggested in the paper with experimental study on real social network data.Comment: In proceedings of the 4th International Conference on Computational Aspects of Social Networks, CASoN 201

    Genetic Programming for Smart Phone Personalisation

    Full text link
    Personalisation in smart phones requires adaptability to dynamic context based on user mobility, application usage and sensor inputs. Current personalisation approaches, which rely on static logic that is developed a priori, do not provide sufficient adaptability to dynamic and unexpected context. This paper proposes genetic programming (GP), which can evolve program logic in realtime, as an online learning method to deal with the highly dynamic context in smart phone personalisation. We introduce the concept of collaborative smart phone personalisation through the GP Island Model, in order to exploit shared context among co-located phone users and reduce convergence time. We implement these concepts on real smartphones to demonstrate the capability of personalisation through GP and to explore the benefits of the Island Model. Our empirical evaluations on two example applications confirm that the Island Model can reduce convergence time by up to two-thirds over standalone GP personalisation.Comment: 43 pages, 11 figure

    An asteroseismic test of diffusion theory in white dwarfs

    Full text link
    The helium-atmosphere (DB) white dwarfs are commonly thought to be the descendants of the hotter PG1159 stars, which initially have uniform He/C/O atmospheres. In this evolutionary scenario, diffusion builds a pure He surface layer which gradually thickens as the star cools. In the temperature range of the pulsating DB white dwarfs (T_eff ~ 25,000 K) this transformation is still taking place, allowing asteroseismic tests of the theory. We have obtained dual-site observations of the pulsating DB star CBS114, to complement existing observations of the slightly cooler star GD358. We recover the 7 independent pulsation modes that were previously known, and we discover 4 new ones to provide additional constraints on the models. We perform objective global fitting of our updated double-layered envelope models to both sets of observations, leading to determinations of the envelope masses and pure He surface layers that qualitatively agree with the expectations of diffusion theory. These results provide new asteroseismic evidence supporting one of the central assumptions of spectral evolution theory, linking the DB white dwarfs to PG1159 stars.Comment: 7 pages, 3 figures, 3 tables, accepted for publication in A&

    Horizontal gene transfer contributed to the evolution of extracellular surface structures

    Get PDF
    The single-cell layered ectoderm of the fresh water polyp Hydra fulfills the function of an epidermis by protecting the animals from the surrounding medium. Its outer surface is covered by a fibrous structure termed the cuticle layer, with similarity to the extracellular surface coats of mammalian epithelia. In this paper we have identified molecular components of the cuticle. We show that its outermost layer contains glycoproteins and glycosaminoglycans and we have identified chondroitin and chondroitin-6-sulfate chains. In a search for proteins that could be involved in organising this structure we found PPOD proteins and several members of a protein family containing only SWT (sweet tooth) domains. Structural analyses indicate that PPODs consist of two tandem β-trefoil domains with similarity to carbohydrate-binding sites found in lectins. Experimental evidence confirmed that PPODs can bind sulfated glycans and are secreted into the cuticle layer from granules localized under the apical surface of the ectodermal epithelial cells. PPODs are taxon-specific proteins which appear to have entered the Hydra genome by horizontal gene transfer from bacteria. Their acquisition at the time Hydra evolved from a marine ancestor may have been critical for the transition to the freshwater environment

    Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence

    Get PDF
    Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks
    • …
    corecore