The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new concept of composition is proposed in the framework of the Graph Model for Conflict Resolution. Two graph models whose sets of decision makers are identical are composed into one graph model. The composition is interpreted as a situation in which the same decision makers are involved in two independent conflicts at the same time. Relationships between stabilities of states in a composed graph...
In polytopic model-based controller synthesis, the vertices of the model determine the achievable performance characteristics. This paper introduces a new concept, that allows for the sophisticated construction of non-simplex enclosing polytopes. The non-simplex structures in general, have much better descriptor properties than the simplex one that leads to less conservative synthesis. The paper demonstrates...
The 1956 nationalization of the Suez Canal dispute, between Egypt and an alliance between the United States (US) and Britain, is modeled and analyzed within the paradigm of a first-level hypergame in graph form. The results reveal that Britain and US encountered a strategic surprise in the dispute on account of their failure to predict Egypt's action in nationalizing the Suez Canal. The equilibrium...
This paper proposes a new method to analyze driver behavior. Analysis of the behavior is done through the observation of the time-evolution of parameters of simple driver models. The behavior analysis is decomposed in two steps. First the driver model have to be selected or designed to represent the average behavior of a large sample of drivers. Then personal driver's behavior evolution can be analyzed...
This paper introduces a case study at Dean East Clinic to model patient flow with joint visits by provider and medical assistant (MA). To reduce the state space dimension, a convergent iterative procedure based on Markov chain model of patient flow is proposed. The study is extended to non-Markovian case by introducing an empirical formula based on the mean and coefficient of variation (CV) of service...
Threshold graphs are recursive deterministic network models that capture properties of certain social and economic interactions. One drawback of these graph families is that they they have limited constrained generative attachment rules. To mitigate this problem, we introduce a new class of graphs termed Doubly Threshold (DT) graphs which may be succinctly described through vertex weights that govern...
The paper addresses the problem of power distribution grids optimization in terms of reducing costs related to undelivered energy due to network failures. Grid optimization is realized by allocating the cut points that may limit the effects of the failure on the network operation. A possible method of allocating these points, explored in this work, is the optimization of the grid structure using evolutionary...
Enormous commercial value brought by big data analysis promotes the vigorous development of big data analysis industry. Due to the difficulties existed in the modeling process, reusing existing analysis experiences becomes a good choice to find an optimal way from problem domain to solution domain efficiently. To help data analysts reuse previous experiences to elicit and model analysis requirements...
The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and running...
Requirements Engineering (RE) and all its underlying activities, such as requirements identification, evolution, validation, communication, and management, are still the key factors in successful product development. Therefore, proper implementation of this process is necessary to obtain a quality product. A better understanding of the most challenging RE-related topics for practitioners will greatly...
Scripts have been used in different disciplines to characterize how individuals conceptualize the conduct of goal-oriented tasks. Cornish introduced this modelling approach to the field of environmental criminology as a more systematic way to identify offenders’ decisions during the commission of crime. Despite the growing number of articles about crime scripts, there is limited information about...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
The total number of webpages has grown substantially since the birth of the Internet. So too have the number of webpages dedicated to radical yet subtle content. As these new circumstances have necessitated a guided data collection method, one that can sidestep the laborious manual methods that have been classically utilized, simple keyword analysis has not been sufficient to identify radical sites...
The command and control behavior modeling is an important part of military analytical simulation. However, weaknesses including hard modeling, poor expansibility and little flexibility still exist in current command and control behavior models. In this paper, a mission-based command and control behavior model is designed, which consists of a Compound Mission Module as well as a General Mission Management...
Recently, social event recommendation, which is to recommend a list of upcoming events to a user, has attracted a lot of research interests. In this paper, we first construct a heterogeneous graph to express the interactions among different types of entities in event-based social network. Based on the constructed graph, we propose a novel recommendation algorithm called reverse random walk with restart...
Heterogeneous cellular networks have received considerable attention in the literature owing to increased data demands of cellular network users. Recently, Poisson Point processes (PPPs) are vastly used for modeling and analyzing cellular networks because of their accuracy and tractability. However, results in this area suffer from a big drawback. They considered a saturated load model in their analysis...
Elastic Optical Networks (EONs) have the potential to improve the fiber spectrum utilization by allocating spectrum resources to multiple traffic requests proportionally to the amount of carried traffic. However, achieving high spectrum utilization in this elastic scenario is hindered by the resulting spectrum fragmentation. A number of studies have addressed and made attempts to mitigate spectrum...
FinFET is the dominating technology for short-channel devices due to its better gate control over the flow of electrons. In this work, the temperature dependence of drain current (ID) and short channel effects of Bulk FinFET is observed. The FinFET showed ID variation with respect to temperature. The drain current and short channel effects like subthreshold swing (SS), drain induced barrier lowering...
Cognitive radio technology is a new network technology that aims to utilize unused or rarely used spectrum bands efficiently. The main objective of cognitive radio networks is that secondary users sense the frequency band with available spectrum detection techniques and utilize unused parts of the spectrum. While secondary users use the empty spectrum bands; if primary users want to use their own...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.