Spelling suggestions: "subject:"atemsystem science"" "subject:"systsystem science""
101 |
Variable-step variable-order 3-stage Hermite-Birkhoff-Obrechkoff ODE solver of order 4 to 14 with a C programZhang, Yu January 2007 (has links)
Variable-step variable-order 3-stage Hermite-Birkhoff-Obrechkoff methods of order 4 to 14, denoted by HBO(4-14)3, are constructed for solving nonstiff systems of first-order differential equations of the form y' = f (x, y), y( x0) = y0. These methods use y' and y" as in Obrechkoff's method. Forcing a Taylor expansion of the numerical solution to agree with an expansion of the true solution leads to multistep- and Runge-Kutta-type order conditions which are reorganized into linear Vandermonde-type systems. Fast algorithms are developed for solving these systems to obtain Hermite-Birkhoff interpolation polynomials in terms of generalized Lagrange basis functions. The new methods have larger regions of absolute stability than Adams-Bashforth-Moulton methods of comparable orders in PECE mode. The order and stepsize of these methods are controlled by four local error estimators. When programmed in Matlab, HBO(4-14)3 are superior to Matlab's ode113 in solving several problems often used to test higher order ODE solvers on the basis of the number of function evaluations, CPU time, and maximum global error. It is also superior to the variable-step 3-stage HBO(14)3 of order 14 on some problems. When programmed in C, HBO(4-14)3 is superior to the Dormand-Prince Runge-Kutta nested pair DP(8,7)13M in solving expensive equations over a long period of time. HBO(4-14)3 has been implemented in C. The C program for HBO(4-14)3 is an important contribution of this thesis.
|
102 |
Multi-criteria group decision making methods using AHP and integrated Web-based decision support systemsOzer, Ibrahim January 2007 (has links)
This thesis explores different group decision making methods using the Analytical Hierarchical Process (AHP) applied to the multi-criteria decision making problem of selecting a preferred "site" and develops a support system for group decision making. The group members consider sites to have alternative and often conflicting uses. It is imperative for decision makers in the responsible group to have an appropriate combination of tools, computer software and decisions support systems in order to make the most preferred decisions as a group despite potential inherent conflict among members of the decision making group. To support this idea and facilitate decision making, alternative group multi-criteria decision making (MCDM) evaluation techniques are examined. These include; AHP, Weighted Sum Method (WSM), Weighted Product Method (WPM), AHP Combined Method, Group Evaluation Method, Fuzzy AHP, Fuzzy AHP Combined, and Fuzzy AHP Group. A web-based comparison framework is developed as a prototype to facilitate model use. These methods are applied to the evaluation of coastal zone sites for alternate marine use including aquaculture or fish farming. Aquaculture is one of the fastest growing activities among coastal nations. At the same time, companies, researchers, and coastal communities are seeking assistance in identifying appropriate coastal zone sites for commercial fishing and aquaculture activities, habitat reserves, and marine recreation. The aquaculture case study evaluates four possible fish sites in the Grand Marian Island area of Atlantic Canada.
|
103 |
Constuction des normes, entre stratégie et communication: Un cas de négotiation collectiveParent, Marc-Antonie January 2006 (has links)
Nous décrivons un processus de négociation, afin d'identifier l'interaction entre l'argumentation, basée sur des principes, et le marchandage, basé sur un rapport de force. Selon Bent Flyvbjerg, le pouvoir permet des manquements systématiques à l'éthique communicative prônée par Jurgen Habermas comme une nécessité philosophique. Selon Joseph Heath, l'exercice du pouvoir stratégique est de facto limité par les normes sociales, qui ont concrètement besoin de l'éthique communicative pour appliquer les sanctions. Nous avons procédé à une observation participante dans un cadre de la renégociation d'une convention collective, et analysons l'emploi des arguments dans nos données ethnographiques. Notre analyse montre en effet des défauts dans l'argumentation, mais qui ne sont pas explicables simplement selon le pouvoir où les normes sociales. Nous proposons une superposition des niveaux d'analyse stratégique, normative, dramaturgique et communicationnelle. Nous identifions également une collusions qui maintient certains dissensus, interprétés, selon Habermas, comme résistance à la convention comme média gouvernant.
|
104 |
Window-based stream data mining for classification of Internet trafficMumtaz, Ali January 2008 (has links)
Accurate classification of Internet applications is a fundamental requirement for network provisioning, network security, maintaining quality of services and network management. Increasingly, new applications are being introduced on the Internet. The traffic volume and patterns of some of the new applications such as Peer-to-Peer (P2P) file sharing put pressure on service providers' networks in terms of congestion and delay, to the point that maintaining Quality of Services (QoS) planned in the access network requires the provisioning of additional bandwidth sooner than planned. Peer-to-Peer applications enable users to communicate directly over the Internet, thus bypassing central server control implemented by service providers and poses threats in terms of network congestion, and creating an environment for malicious attacks on networks. One key challenge in this area is to adapt to the dynamic nature of Internet traffic. With the growth in Internet traffic, in terms of number and type of applications, traditional classification techniques such as port matching, protocol decoding or packet payload analysis are no longer effective For instance, P2P applications may use randomly selected non-standard ports to communicate which makes it difficult to distinguish from other types of traffic only by inspecting port number.
The present research introduces two new techniques to classify stream (online) data using K-means clustering and Fast Decision Tree (FDT). In the first technique, we first generate micro-clusters using k-means clustering with different values of k. Micro clusters are then merged into two clusters based on weighted averages of P2P and NonP2P population. This technique generates two merged clusters, each representing P2P or NonP2P traffic. The simulation results confirm that the two final clusters represent P2P and NonP2P traffic each with a good accuracy.
The second technique employs a two-stage architecture for classification of P2P traffic, where in the first stage, the traffic is filtered using standard port numbers and layer 4 port matching to label well-known P2P and NonP2P traffics, leaving the rest of the traffic as "Unknown". The labeled traffic generated in the first stage is used to train a Fast Decision Tree (FDT) classifier with high accuracy. The Unknown traffic is then applied to the FDT model which classifies the traffic into P2P and NonP2P with high accuracy. The two-stage architecture, therefore, not only classifies well-known P2P applications, it also classifies applications that use random or private (non standard) port numbers and can not be classified otherwise. We performed various experiments where we captured Internet traffic at a main gateway router, pre-processed the data and selected three most significant attributes, namely Packet Length, Source IP address and Destination IP address. We then applied the proposed technique to three different windows of records. Accuracy, Specificity and Sensitivity of the model are calculated. Our simulation results confirm that the predicted output represents P2P and NonP2P traffic with accuracy higher than 90%.
|
105 |
Architectures for online reputation systemsZhang, Bo January 2008 (has links)
E-commerce provides a platform where complete strangers from all over the world have the chance to transact with each other. Reputation is a key factor in the success of such transactions, therefore reputation systems are in widespread use to help participants build their online reputation. This thesis analyzes current reputation systems and studies how to design architectures for online reputation systems. Based on the shortcomings found in current reputation systems, this thesis proposes and implements a reputation architecture called ORAS (online reputation aggregation system) Plus which provides a portable reputation mechanism for Web users. With ORAS Plus, users can search others' global reputation and obtain their own reputation cards which can be displayed at any website. ORAS Plus can help users know someone's online behaviors all over the Internet. More importantly, it allows users to take their existing reputation from one website to other websites where they are unknown to others.
|
106 |
Autonomic computer network defence using risk states and reinforcement learningBeaudoin, Luc January 2009 (has links)
Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in order to limit the risk caused by malicious and accidental events. To achieve this, networks require an automated controller with a policy, which allows selecting the most appropriate action in any undesired network state. Due to the complexity and constant evolution of the Computer Network Defence environment, a-priori design of an automated controller is not effective. A solution for generating and continuously improving decision policies is needed.
A significant technical challenge in Autonomic Computer Network Defence is finding a strategy to efficiently generate, trial and compare different policies and retain the best performing one. To address this challenge, we use Reinforcement Learning to explore Computer Network Defence action and state spaces and to learn which policy optimally reduces risk. A simulated Computer Network Defence environment is implemented using Discrete Event Dynamic System simulation and a novel graph model. A network asset value assessment technique and a dynamic risk assessment algorithm are also implemented to provide evaluation metrics. This environment is used to train two Reinforcement Learning agents, one with a table policy and the other with a neural network policy. The resulting policies are then compared to three other empirical policies for their risk performances. These empirical policies serve as evaluation baseline and include: letting risk grow without any action, randomly selecting valid actions, and selecting the next action based on the pre-computed asset value of the affected assets and choosing the one with the highest value first.
We found that in all test scenarios, both Reinforcement Learning policies evaluated improved the overall risk when compared to random selection of valid actions. In one simple scenario, both Reinforcement Learning policies converged to the same optimum policy with better risk performance than other assessed policies. Generally, we found that, for the tested scenarios and training strategies, a simple policy addressing affected assets in the order of their asset values, can generally yield superior results.
|
107 |
A multiplexed feedback solution for isolated digital power suppliesHu, Zhiyuan January 2010 (has links)
As digital power supply became a significant market opportunity, manufacturers started looking at ways to control the system cost by reducing components and their technical requirements.
This thesis proposes a multiplexed digital feedback solution for isolated digital power supply systems. Several digital isolators used in existing applications can be reduced to one. The data transmission speed is greatly reduced. The communication protocol is DC-balanced; therefore pulse-transformer type digital isolators can be used resulting in further lower cost. The proposed solution also improves output accuracy over existing solutions.
Presentation of the proposed system will be in three parts: architecture, protocol, and Piece-wise Linear Feedback method.
Both theoretical analysis and practical implementation will be discussed, and the simulation results included support the theoretical analysis. A prototype board was built and its performance is promising.
|
108 |
Exploring How Model Oriented Programming Can Be Extended to the User Interface LevelSolano, Julian January 2010 (has links)
The purpose of our research is to explore the alternatives to extend well-defined UML to the user interface level. For the novice software modeler there is a gap between how the model looks and how the final product should look. The implications of some design decisions might not be easy to analyze without strategies like story boards, prototyping, etc.
A cornerstone of our work is the use of the text-based modeling language Umple (UML Programming Language) and its metamodel as input. Umple has a similar syntax to Java, but is enhanced with additional modeling constructs.
In this way our target was the creation of a code generator capable of interpreting a subset of the Umple language to produce complete working applications, by providing a translation into existing object-oriented programming languages. Using this generator, the software modeler can create working prototypes to help him to validate the correctness of the designed model.
|
109 |
Modeling Internet Penetration in CanadaAlgwaiz, Noura January 2010 (has links)
Internet penetration is an important measure for a knowledge-based economy as it indicates how connected it is to the internet. It does not spread evenly across regions and societies, which results in digital divides. Despite being one of the most connected countries, Canada suffers from uneven penetration rates across the country. In this research, we study the socio-economic factors that int1uence Internet penetration in Canada. We found that the int1uence of rurality has decreased between 2005 and 2007, which suggests that initiatives that took place in those two years were effective. We also analyze the differences among the regions of Canada and found that the regions least int1uenced by the demographic variables are not necessarily the ones with the highest penetration rates. Therefore, a mere look at the penetration rates across the regions is not enough to assess the connectivity of the region and the digital divide within.
|
110 |
A Recommender System using Tag-based Collaborative User ModelAlkhaldi, Abdulmajeed January 2011 (has links)
Internet users are overwhelmed by a huge media amount available online. Therefore there is a need of an automated way to make compelling recommendations to users according to their needs. There have been many research efforts to reduce that huge amount of content to what the user really needs or prefers. Recommender systems assisting users in easily finding the useful information, are a main research topic that serves this area. According to techniques recommender systems employ, they are mainly classified into three categories: a collaborative-based filtering, content-based filtering, and hybrid filtering. Collaborative filtering relies on the collaboration of users by capturing their judgments on items, and then recommends these items to users with similar taste. Content-based filtering takes advantage of content of a user's preferred items and recommends new items that have similar content. Hybrid filtering takes advantage of both collaborative and content- based filtering and might be in a different ways. No matter what the technique is used, recommender systems require an accurate user model that can reflect a user's characteristics, preferences, and topics of interest. In addition, the systems should take into account users who newly join the systems and thus has presented few opinions, commonly referred to as the cold start users problem. In our research, by leveraging user-generated tags, we propose the topic-driven enriched user model (EM), which is a new way of modeling a user's topics of interest in collaboration with other similar users, in order to improve the recommendation quality and alleviate the cold start user problem. We also present how the proposed model is applied to item recommendations by using locally weighted naive Bayes approach. For evaluating the performance of our model, we compare experimental results with a user model based on user-based collaborative filtering, a user model based on an item-based collaborative filtering, and a vector space model. The experimental results shows that EM outperforms the three algorithms in both recommendation quality and the cold start situation.
|
Page generated in 0.1405 seconds