Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Computer Modeling and Simulation, 2008. EMS '08. Second UKSIM European Symposium on

Date 8-10 Sept. 2008

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (245 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Chair's Welcome Message

    Publication Year: 2008 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organization

    Publication Year: 2008 , Page(s): xiii - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (104 KB)  
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • Trends in Discrete Event Simulations

    Publication Year: 2008 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    Discrete event simulation technologies have been up and down as global manufacturing industries went through radical changes. The changes have created new problems, challenges and opportunities to the discrete event simulation. On manufacturing applications, it is no longer an isolated model but the distributed modeling and simulation along the supply chain. In order to study the hybrid manufactur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in High-Speed Real-Time Simulation

    Publication Year: 2008 , Page(s): 2 - 8
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    The demands of modern applications for ever increasing performance for real-time simulations have posed considerable challenges to simulation developers which are still not fully met. An effective response to these challenges has involved an interesting combination of a return to old-style programming techniques such as multi-rate simulation and low-level program design with a focus on individual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Optimisation of Reheat Furnace

    Publication Year: 2008 , Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (244 KB) |  | HTML iconHTML  

    Some problems are known to have computationally demanding objective function, which could turn to be infeasible when large problems are considered. Therefore, fast approximations to the objective function are required. This paper employs portfolio of intelligent systems algorithms for optimising a metal reheat furnace scheduling problem. The proposed system has been evaluated for different techniq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Model for Decision Taking of Technologies in Home and Building Electronic Systems

    Publication Year: 2008 , Page(s): 15 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1208 KB) |  | HTML iconHTML  

    Many systems of automation, energy management, and security for housings and buildings exist nowadays, and the determination of the most appropriate one depends on multiple factors. This work, based on a previous analysis, presents a fuzzy model that allows evaluating these different systems in order to choose automatically one of them. The model considers the most outstanding factors for the sele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability Analysis and Parameter Selection of a Particle Swarm Optimizer in a Dynamic Environment

    Publication Year: 2008 , Page(s): 21 - 27
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (288 KB) |  | HTML iconHTML  

    The paper addresses the issues of parameter selection of a particle swarm optimization algorithm by a thorough stability analysis of the swarm dynamics. The effectiveness of the work lies in considering the dynamic behavior of the local and the global best particle positions, which usually are treated as constant in the existing analysis. The behavior of an individual particle here is modeled as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lyapunov-Based Extension to PSO Dynamics for Continuous Function Optimization

    Publication Year: 2008 , Page(s): 28 - 33
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    The paper proposes three alternative extensions to the classical global-best particle swarm optimization dynamics, and compares their relative performance with the classical particle swarm optimization algorithm. The first extension, which readily follows from the well-known Lyapunov's stability theorem, provides a mathematical basis of the particle dynamics with a guaranteed convergence at an opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Parameters Optimisation for an Industrial Application: A Comparison between Traditional Approaches and Genetic Algorithms

    Publication Year: 2008 , Page(s): 34 - 39
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    Model parameters optimisation is a very common problem when dealing with mathematical models. These models are often designed from theoretical considerations on the physics phenomena and afterwards adapted in order to fit the experimental data that are collected on the real operating scenario. The paper compares different approaches to the problem of finding the optimal values of four parameters c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vibration and Input Tracking Control of Flexible Manipulator Using LQR with Non-Collocated PID Controller

    Publication Year: 2008 , Page(s): 40 - 45
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    This paper presents investigations into the development of control schemes for end-point vibration suppression and input tracking of a flexible manipulator. A constrained planar single-link flexible manipulator is considered and the dynamic model of the system is derived using the assumed mode method. To study the effectiveness of the controllers, initially a Linear Quadratic Regulator (LQR) is de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Atmospheric Dispersion from Point Source

    Publication Year: 2008 , Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    This paper deals with numerical approach to modeling of atmospheric dispersion of pollutant caused by a point source. The modeling of a pollution in the atmosphere has a long history and has gone throw great improvements over the last century. Two main methods can be distinguished from the modeling point of view: the analytical and the numerical methods. Both methods have their advantages and disa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise Removal Using Hopfield Neural Network in Message Transmission Systems

    Publication Year: 2008 , Page(s): 52 - 57
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    In this paper, a novel approach of two-tier encryption is proposed with the removal of noise generated during transmission based on Hopfield neural networks (HNN). The proposed system reduces the complexity of recognition of characters due to external distortion or diffusion. Though there are many error correction and detection codes, these codes request retransmission when there is an error. If t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pareto Dominance-Based Approach for the Component Selection Problem

    Publication Year: 2008 , Page(s): 58 - 63
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (167 KB) |  | HTML iconHTML  

    Component selection is a crucial problem in component based software engineering (CBSE). CBSE is concerned with the assembly of pre-existing software components that leads to a software system that responds to client-specific requirements. We are approaching the component selection problem. We formulate the problem as multiobjective, involving 2 objectives: the number of used components and the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Channel Assignment Problem in Mobile Networks Using Particle Swarm Optimization

    Publication Year: 2008 , Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    The problem of optimal channel assignment has become increasingly important because of available frequency spectrum and increasing demand for cellular communication services. This has been shown to be an Np complete optimization problem. Many heuristic approaches including neural network, simulated annealing and genetic algorithm have been used to solve it. In this paper we propose a novel and eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Objective Pareto-Optimal Solution to the Box-Pushing Problem by Mobile Robots

    Publication Year: 2008 , Page(s): 70 - 75
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    The paper provides a new formulation of the well-known box-pushing problem by robots as a multi-objective optimization problem, and presents Pareto-optimal solutions to the problem. The proposed method allows both turning and translation of the box, while shifting it to a desired goal position. Local planning scheme is employed here to determine the magnitude of the forces applied by two mobile ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evolutionary Algorithm for Uniform Parallel Machines Scheduling

    Publication Year: 2008 , Page(s): 76 - 80
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    Scheduling problems are very important for many (research) fields. However only for few instances there are polynomial time optimization algorithms, because the vast majority of scheduling problem instances is NP-hard. In such cases heuristic and/or stochastic algorithm are used which tend toward but do not guarantee the finding of optimal solution. The aim of our paper is to investigate the perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Glial Reservoir Computing

    Publication Year: 2008 , Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (378 KB) |  | HTML iconHTML  

    In trying to mimic biological functions of the brain, artificial neural network (ANN) research has, out of computational necessity, made a number of assumptions. Firstly, it is assumed that the complexity of biological processes can be usefully replicated artificially by abstracting a relatively few key or essential characteristics from the biological system. Secondly, it is often assumed that a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Weighted Utility Framework for Mining Association Rules

    Publication Year: 2008 , Page(s): 87 - 92
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of occurrence in a record i.e. their weight and utility is the same (weight=1 and utility=1) which is not always the case. However, items are actually different in many aspects in a number of real applications such as retail m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threat Modeling Revisited: Improving Expressiveness of Attack

    Publication Year: 2008 , Page(s): 93 - 98
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (908 KB) |  | HTML iconHTML  

    Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing techniques lack adequate semantics and expressiveness. This paper reviews the existing techniques and proposes threat net; a technique based on information and causality theory concepts which offers improved expressivene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.