Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG. 相似文献
In this paper, an Adaptive Hierarchical Ant Colony Optimization (AHACO) has been proposed to resolve the traditional machine
loading problem in Flexible Manufacturing Systems (FMS). Machine loading is one of the most important issues that is interlinked
with the efficiency and utilization of FMS. The machine loading problem is formulated in order to minimize the system unbalance
and maximize the throughput, considering the job sequencing, optional machines and technological constraints. The performance
of proposed AHACO has been tested over a number of benchmark problems taken from the literature. Computational results indicate
that the proposed algorithm is more effective and produces promising results as compared to the existing solution methodologies
in the literature. The evaluation and comparison of system efficiency and system utilization justifies the supremacy of the
algorithm. Further, results obtained from the proposed algorithm have been compared with well known random search algorithm
viz. genetic algorithm, simulated annealing, artificial Immune system, simple ant colony optimization, tabu search etc. In
addition, the algorithm has been tested over a randomly generated problem set of varying complexities; the results validate
the robustness and scalability of the algorithm utilizing the concepts of ‘heuristic gap’ and ANOVA analysis. 相似文献
Model predictive control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control (LMPC) schemes which make use of linear dynamic model for prediction, limit their applicability to a narrow range of operation (or) to systems which exhibit mildly nonlinear dynamics.
In this paper, a nonlinear observer based model predictive controller (NMPC) for nonlinear system has been proposed. An approach to design NMPC based on fuzzy Kalman filter (FKF) and augmented state fuzzy Kalman filter (ASFKF) has been presented. The efficacy of the proposed NMPC schemes have been demonstrated by conducting simulation studies on the continuous stirred tank reactor (CSTR). The analysis of the extensive dynamic simulation studies revealed that, the NMPC schemes formulated produces satisfactory performance for both servo and regulatory problems. Simulation results also include an inferential control case, where the reactor concentration is not measured but estimated from temperature measurement and used in the NMPC based on FKF and ASFKF formulations. 相似文献
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual
data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random
perturbation, which facilitates a systematic approach to the design of perturbation mechanisms for privacy-preserving mining.
Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation
matrix elements, and (b) a symmetric positive-definite perturbation matrix with minimal condition number can be identified,
substantially enhancing the accuracy even under strict privacy requirements. We also propose a novel perturbation mechanism
wherein the matrix elements are themselves characterized as random variables, and demonstrate that this feature provides significant
improvements in privacy at only a marginal reduction in accuracy. The quantitative utility of FRAPP, which is a general-purpose
random-perturbation-based privacy-preserving mining technique, is evaluated specifically with regard to association and classification
rule mining on a variety of real datasets. Our experimental results indicate that, for a given privacy requirement, either
substantially lower modeling errors are incurred as compared to the prior techniques, or the errors are comparable to those
of direct mining on the true database.
A partial and preliminary version of this paper appeared in the Proc. of the 21st IEEE Intl. Conf. on Data Engineering (ICDE),
Tokyo, Japan, 2005, pgs. 193–204. 相似文献
Engineers often decide to measure structures upon signs of damage to determine its extent and its location. Measurement locations, sensor types and numbers of sensors are selected based on judgment and experience. Rational and systematic methods for evaluating structural performance can help make better decisions. This paper proposes strategies for supporting two measurement tasks related to structural health monitoring - (1) installing an initial measurement system and (2) enhancing measurement systems for subsequent measurements once data interpretation has occurred. The strategies are based on previous research into system identification using multiple models. A global optimization approach is used to design the initial measurement system. Then a greedy strategy is used to select measurement locations with maximum entropy among candidate model predictions. Two bridges are used to illustrate the proposed methodology. First, a railway truss bridge in Zangenberg, Germany, is examined. For illustration purposes, the model space is reduced by assuming only a few types of possible damage in the truss bridge. The approach is then applied to the Schwandbach bridge in Switzerland, where a broad set of damage scenarios is evaluated. For the truss bridge, the approach correctly identifies the damage that represents the behaviour of the structure. For the Schwandbach bridge, the approach is able to significantly reduce the number of candidate models. Values of candidate model parameters are also useful for planning inspection and eventual repair. 相似文献
Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.
Wireless Personal Communications - Scheduling in computing environments such as homogeneous and heterogonous is very challenging and faces various difficulties computationally. This computing needs... 相似文献
Microsystem Technologies - In this paper synthesis of two wideband Metamaterial Cross Polarizer (MCPs) is proposed. The synthesis of proposed MCPs is done by using Binary Wind Driven Optimization... 相似文献
The present research is the first type of study in which the application of powder mixed electrical discharge machining (PMEDM) for the machining of β-phase titanium (β-Ti) alloy has been proposed. β-Ti alloys are new range of titanium alloys, which has a wide-spread application in dental, orthopedics, shape memory, and stents. The aim of the present study is to fabricate submicro- and nanoscale topography by PMEDM process to enhance the biocompatibility without affecting machining efficiency. The effect of Si powder concentration along with pulse current and duration on the surface and machining characteristics has been investigated. A significant decrease in surface crack density on the machined surface with 4 g/l Si powder concentration was observed. When β-Ti alloy was modified at 15 A pulse current, longer pulse interval with 8 g/l concentration of Si powder particles, the interconnected surface porosities with pore size 200–500 nm was observed. Moreover, at Si powder concentrations of 2 g/l and 4 g/l, the recast layer thickness is 8 µm and 2–3 µm, respectively. Elemental mapping analysis confirmed that PMEDM also generated carbides and oxides enriched surface, a favorable surface chemistry to enhance the biocompatibility of β-Ti alloy. Furthermore, PMEDM also enhances the machining performance by improving material removal rate and reducing tool wear rate. 相似文献
This article explains production of nickel nanoparticles through a micro-electrical discharge machining (EDM) process with a combination of different process parameters. The production of nickel nanoparticles was carried out in a dielectric medium (deionized water) with developed micro-EDM while polyvinyl alcohol worked as the stabilizing agent. The characterization of nickel nanoparticle was done by scanning electron microscope (SEM), Energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), UV–Vis spectroscopy, and Fourier transform infrared (FTIR) analysis. From this investigation, the mean crystal size of the nickel nanoparticles was found to be in the range of 15–20?mm for a pulse-on time variation of 2–0.3?µs and the crystal size was found to decrease with the decrease of pulse-on time. It was also observed that with this decrease, the shape and size of nickel nanoparticles change from spherical to needle-like. The dispersion stability of nickel nanofluid was determined by viscosity measurements and the dynamic viscosity was noted to decrease by decreasing the pulse duration. From the FTIR spectrum results, it was confirmed that the synthesized nickel nanoparticles in deionized water were pure and monolithic. UV–Vis–NIR spectroscopy depicted that the band gap energy increases with a reduction in the pulse-on time and obtains a higher band gap (5.31?eV) for 0.3?µs pulse-on time. 相似文献