91 research outputs found
A parallel expert system for the control of a robotic air vehicle
Expert systems can be used to govern the intelligent control of vehicles, for example the Robotic Air Vehicle (RAV). Due to the nature of the RAV system the associated expert system needs to perform in a demanding real-time environment. The use of a parallel processing capability to support the associated expert system's computational requirement is critical in this application. Thus, algorithms for parallel real-time expert systems must be designed, analyzed, and synthesized. The design process incorporates a consideration of the rule-set/face-set size along with representation issues. These issues are looked at in reference to information movement and various inference mechanisms. Also examined is the process involved with transporting the RAV expert system functions from the TI Explorer, where they are implemented in the Automated Reasoning Tool (ART), to the iPSC Hypercube, where the system is synthesized using Concurrent Common LISP (CCLISP). The transformation process for the ART to CCLISP conversion is described. The performance characteristics of the parallel implementation of these expert systems on the iPSC Hypercube are compared to the TI Explorer implementation
Development of a comprehensive software engineering environment
The generation of a set of tools for software lifecycle is a recurring theme in the software engineering literature. The development of such tools and their integration into a software development environment is a difficult task because of the magnitude (number of variables) and the complexity (combinatorics) of the software lifecycle process. An initial development of a global approach was initiated in 1982 as the Software Development Workbench (SDW). Continuing efforts focus on tool development, tool integration, human interfacing, data dictionaries, and testing algorithms. Current efforts are emphasizing natural language interfaces, expert system software development associates and distributed environments with Ada as the target language. The current implementation of the SDW is on a VAX-11/780. Other software development tools are being networked through engineering workstations
Network Security Using Self Organized Multi-Agent Swarms
Computer network cyber-security is a very serious concern in many commercial, industrial, and military environments. This paper proposes a new computer network security approach defined by self organized agent swarms (SOMAS) which provides a novel computer network security management framework based upon desired overall system behaviors. The SOMAS structure evolves based upon the partially observable Markov decision process (POMDP) formal model and the more complex interactive-POMDP and decentralized-POMDP models. Example swarm specific and network based behaviors are formalized and simulated. This paper illustrates through various statistical testing techniques, the significance of this proposed SOMAS architecture
Development of a facility using robotics for testing automation of inertial instruments
The Integrated Robotics System Simulation (ROBSIM) was used to evaluate the performance of the PUMA 560 arm as applied to testing of inertial sensors. Results of this effort were used in the design and development of a feasibility test environment using a PUMA 560 arm. The implemented facility demonstrated the ability to perform conventional static inertial instrument tests (rotation and tumble). The facility included an efficient data acquisitions capability along with a precision test servomechanism function resulting in various data presentations which are included in the paper. Analysis of inertial instrument testing accuracy, repeatability and noise characteristics are provided for the PUMA 560 as well as for other possible commercial arm configurations. Another integral aspect of the effort was an in-depth economic analysis and comparison of robot arm testing versus use of contemporary precision test equipment
Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies
The underlying goal of a competing agent in a discrete real-time strategy (RTS) game is to defeat an adversary. Strategic agents or participants must define an a priori plan to maneuver their resources in order to destroy the adversary and the adversary\u27s resources as well as secure physical regions of the environment. This a priori plan can be generated by leveraging collected historical knowledge about the environment. This knowledge is then employed in the generation of a classification model for real-time decision-making in the RTS domain. The best way to generate a classification model for a complex problem domain depends on the characteristics of the solution space. An experimental method to determine solution space (search landscape) characteristics is through analysis of historical algorithm performance for solving the specific problem. We select a deterministic search technique and a stochastic search method for a priori classification model generation. These approaches are designed, implemented, and tested for a specific complex RTS game, Bos Wars. Their performance allows us to draw various conclusions about applying a competing agent in complex search landscapes associated with RTS games
Multi-objective Database Queries in Combined Knapsack and Set Covering Problem Domains
Database queries are one of the most important functions of a relational database. Users are interested in viewing a variety of data representations, and this may vary based on database purpose and the nature of the stored data. The Air Force Institute of Technology has approximately 100 data logs which will be converted to the standardized Scorpion Data Model format. A relational database is designed to house this data and its associated sensor and non-sensor metadata. Deterministic polynomial-time queries were used to test the performance of this schema against two other schemas, with databases of 100 and 1000 logs of repeated data and randomized metadata. Of these approaches, the one that had the best performance was chosen as AFIT’s database solution, and now more complex and useful queries need to be developed to enable filter research. To this end, consider the combined Multi-Objective Knapsack/Set Covering Database Query. Algorithms which address The Set Covering Problem or Knapsack Problem could be used individually to achieve useful results, but together they could offer additional power to a potential user. This paper explores the NP-Hard problem domain of the Multi-Objective KP/SCP, proposes Genetic and Hill Climber algorithms, implements these algorithms using Java, populates their data structures using SQL queries from two test databases, and finally compares how these algorithms perform
Recommended from our members
Redirecting research efforts on the diversification-performance linkage: The search for synergy
We review the literature on the diversification-performance (D-P) relationship to a) propose that the time is ripe for a renewed attack on understanding the relationship between diversification and firm performance, and b) outline a new approach to attacking the question. Our paper makes four main contributions. First, through a review of the literature we establish the inherent complexities in the D-P relationship and the methodological challenges confronted by the literature in reaching its current conclusion of a non-linear relationship between diversification and performance. Second, we argue that to better guide managers the literature needs to develop along a complementary path – whereas past research has often focused on answering the big question of does diversification affect firm performance, this second path would focus more on identifying the precise micro-mechanisms through which diversification adds or subtracts value. Third, we outline a new approach to the investigation of this topic, based on (a) identifying the precise underlying mechanisms through which diversification affects performance; (b) identifying performance outcomes that are “proximate” to the mechanism that the researcher is studying, and (c) identifying an appropriate research design that can enable a causal claim. Finally, we outline a set of directions for future research
- …