Volume 2 Number 3 September 2011

    
A Model for Fire Spreading by Multi-Agent Systems: A RoboCup Rescue Simulation and Swarm Platform Approach

Terry L. Ruas, Maria das Graças B. Marietto, Robson dos S. França, André Filipe de M. Batista

https://doi.org/

Abstract This paper presents an analysis of the RoboCup Rescue Environment tools for simulations based on the firespread phenomenon. Its main purpose is highlighting the features of two simulation tools: the Agent Simulation and the Swarm platform, simulating a fire spread in a particular city. Two simulations had been run using the Agent Simulation unit: one with a model that gives... Read More


MHPSO: A New Method to Enhance the Particle Swarm Optimizer

BafrinZarei , Reza Ghanbarzadeh , Kiarash Shakibaei

https://doi.org/

Abstract The widespread and increasing application of Particle Swarm Optimizer (PSO) algorithms in both theoretical and practical fields leads to further considerations and new developments for improving its efficiency. To achieve this purpose in this paper a new method is introduced to enhance the convergence rate and reduce the computational time of PSO by combining the PSO including mutation concept (MPSO)... Read More


A New Dawn for the Dark Knight: Securing BATMAN

Espen Grannes Graarud, Anne Gabrielle Bowitz, Lawrie Brown, Martin Gilje Jaatun

https://doi.org/

Abstract The Better Approach To Mobile Ad-hoc Networking (BATMAN) protocol is designed as an alternative to adhoc network routing protocols such as OLSR. Like most such proposals, BATMAN does not provide any security mechanisms that could limit participation in a specific ad-hoc network. In this article we provide a brief overview of previous work on adhoc network security, identify shortcomings in... Read More


Security in Cloud Manufacturing: Forecasting and Multi-correlation Techniques for Dealing with Cyber attacks

Elvis Pontes, Anderson A. A. Silva, Adilson E. Guelfi, Sérgio T. Kofuji

https://doi.org/

Abstract With the advent of globalization and competitiveness all over the world, manufacturing systems are forced to be revised in order to meet three major qualities –data integration, distributed environment and centralized management. To cover the required qualities for the manufacturing systems, Internet based technologies were developed in the last few years. However, even thought collaboration and distributed access in Internet... Read More


Behavior of the Coordinate Ratios of the Intrusion Parameters

Besma Othmani, Mohsen Machhout, Houcine Mejr

https://doi.org/

Abstract The difficulty of copying an arbitrary quantum state is one of the basic rules governing the physics of quantum systems. Universal Quantum Copying Machine (UQCM) produces two identical copies whose quality is input-state independent. It is evident that the UQCM can be used effectively for the intrustion detection. We have used the isotrophic cloning to study the behavior of the... Read More