Current Search: Computer networks (x)
View All Items
Pages
- Title
- Information Propagation Algorithms for Consensus Formation in Decentralized Multi-Agent Systems.
- Creator
-
Hollander, Christopher, Wu, Annie, Shumaker, Randall, Wiegand, Rudolf, Turgut, Damla, Song, Zixia, University of Central Florida
- Abstract / Description
-
Consensus occurs within a multi-agent system when every agent is in agreement about the value of some particular state. For example, the color of an LED, the position or magnitude of a vector, a rendezvous location, the most recent state of data within a database, or the identity of a leader are all states that agents might need to agree on in order to execute their tasking.The task of the decentralized consensus problem for multi-agent systems is to design an algorithm that enables agents to...
Show moreConsensus occurs within a multi-agent system when every agent is in agreement about the value of some particular state. For example, the color of an LED, the position or magnitude of a vector, a rendezvous location, the most recent state of data within a database, or the identity of a leader are all states that agents might need to agree on in order to execute their tasking.The task of the decentralized consensus problem for multi-agent systems is to design an algorithm that enables agents to communicate and exchange information such that, in finite time, agents are able to form a consensus without the use of a centralized control mechanism. The primary goal of this research is to introduce and provide supporting evidence for Stochastic Local Observation/Gossip (SLOG) algorithms as a new class of solutions to the decentralized consensus problem for multi-agent systems that lack a centralized controller, with the additional constraints that agents act asynchronously, information is discrete, and all consensus options are equally preferable to all agents. Examples of where these constraints might apply include the spread of social norms and conventions in artificial populations, rendezvous among a set of specific locations, and task assignment.This goal is achieved through a combination of theory and experimentation. Information propagation process and an information propagation algorithm are derived by unifying the general structure of multiple existing solutions to the decentralized consensus problem. They are then used to define two classes of algorithms that spread information across a network and solve the decentralized consensus problem: buffered gossip algorithms and local observation algorithms. Buffered gossip algorithms generalize the behavior of many push-based solutions to the decentralized consensus problem. Local observation algorithms generalize the behavior of many pull-based solutions to the decentralized consensus problem. In the language of object oriented design, buffered gossip algorithms and local observation algorithms are abstract classes; information propagation processes are interfaces. SLOG algorithms combine the transmission mechanisms of buffered gossip algorithms and local observation algorithms into a single "hybrid" algorithm that is able to push and pull information within the local neighborhood. A common mathematical framework is constructed and used to determine the conditions under which each of these algorithms are guaranteed to produce a consensus, and thus solve the decentralized consensus problem. Finally, a series of simulation experiments are conducted to study the performance of SLOG algorithms. These experiments compare the average speed of consensus formation between buffered gossip algorithms, local observation algorithms, and SLOG algorithms over four distinct network topologies.Beyond the introduction of the SLOG algorithm, this research also contributes to the existing literature on the decentralized consensus problem by: specifying a theoretical framework that can be used to explore the consensus behavior of push-based and pull-based information propagation algorithms; using this framework to define buffered gossip algorithms and local observation algorithms as generalizations for existing solutions to the decentralized consensus problem; highlighting the similarities between consensus algorithms within control theory and opinion dynamics within computational sociology, and showing how these research areas can be successfully combined to create new and powerful algorithms; and providing an empirical comparison between multiple information propagation algorithms.
Show less - Date Issued
- 2015
- Identifier
- CFE0005629, ucf:50229
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005629
- Title
- COMPUTATIONAL STUDY OF THE NEAR FIELD SPONTANEOUS CREATION OF PHOTONIC STATES COUPLED TO FEW LEVEL SYSTEMS.
- Creator
-
Tafur, Sergio, Leuenberger, Michael, University of Central Florida
- Abstract / Description
-
Models of the spontaneous emission and absorption of photons coupled to the electronic states of quantum dots, molecules, N-V (single nitrogen vacancy) centers in diamond, that can be modeled as artificial few level atoms, are important to the development of quantum computers and quantum networks. A quantum source modeled after an effective few level system is strongly dependent on the type and coupling strength the allowed transitions. These selection rules are subject to the Wigner-Eckert...
Show moreModels of the spontaneous emission and absorption of photons coupled to the electronic states of quantum dots, molecules, N-V (single nitrogen vacancy) centers in diamond, that can be modeled as artificial few level atoms, are important to the development of quantum computers and quantum networks. A quantum source modeled after an effective few level system is strongly dependent on the type and coupling strength the allowed transitions. These selection rules are subject to the Wigner-Eckert theorem which specifies the possible transitions during the spontaneous creation of a photonic state and its subsequent emission. The model presented in this dissertation describes the spatio-temporal evolution of photonic states by means of a Dirac-like equation for the photonic wave function within the region of interaction of a quantum source. As part of this aim, we describe the possibility to shift from traditional electrodynamics and quantum electrodynamics, in terms of electric and magnetic fields, to one in terms of a photonic wave function and its operators. The mapping between these will also be presented herein. It is further shown that the results of this model can be experimentally verified. The suggested method of verification relies on the direct comparison of the calculated density matrix or Wigner function, associated with the quantum state of a photon, to ones that are experimentally reconstructed through optical homodyne tomography techniques. In this non-perturbative model we describe the spontaneous creation of photonic state in a non-Markovian limit which does not implement the Weisskopf-Wigner approximation. We further show that this limit is important for the description of how a single photonic mode is created from the possibly infinite set of photonic frequencies $\nu_k$ that can be excited in a dielectric-cavity from the vacuum state. We use discretized central-difference approximations to the space and time partial derivatives, similar to finite-difference time domain models, to compute these results. The results presented herein show that near field effects need considered when describing adjacent quantum sources that are separated by distances that are small with respect to the wavelength of their spontaneously created photonic states. Additionally, within the future scope of this model,we seek results in the Purcell and Rabi regimes to describe enhanced spontaneous emission events from these few-level systems, as embedded in dielectric cavities. A final goal of this dissertation is to create novel computational and theoretical models that describe single and multiple photon states via single photon creation and annihilation operators.
Show less - Date Issued
- 2011
- Identifier
- CFE0003881, ucf:48739
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003881
- Title
- Investigating The Relationship Between Adverse Events and Infrastructure Development in an Active War Theater Using Soft Computing Techniques.
- Creator
-
Cakit, Erman, Karwowski, Waldemar, Lee, Gene, Thompson, William, Mikusinski, Piotr, University of Central Florida
- Abstract / Description
-
The military recently recognized the importance of taking sociocultural factors into consideration. Therefore, Human Social Culture Behavior (HSCB) modeling has been getting much attention in current and future operational requirements to successfully understand the effects of social and cultural factors on human behavior. There are different kinds of modeling approaches to the data that are being used in this field and so far none of them has been widely accepted. HSCB modeling needs the...
Show moreThe military recently recognized the importance of taking sociocultural factors into consideration. Therefore, Human Social Culture Behavior (HSCB) modeling has been getting much attention in current and future operational requirements to successfully understand the effects of social and cultural factors on human behavior. There are different kinds of modeling approaches to the data that are being used in this field and so far none of them has been widely accepted. HSCB modeling needs the capability to represent complex, ill-defined, and imprecise concepts, and soft computing modeling can deal with these concepts. There is currently no study on the use of any computational methodology for representing the relationship between adverse events and infrastructure development investments in an active war theater. This study investigates the relationship between adverse events and infrastructure development projects in an active war theater using soft computing techniques including fuzzy inference systems (FIS), artificial neural networks (ANNs), and adaptive neuro-fuzzy inference systems (ANFIS) that directly benefits from their accuracy in prediction applications. Fourteen developmental and economic improvement project types were selected based on allocated budget values and a number of projects at different time periods, urban and rural population density, and total adverse event numbers at previous month selected as independent variables. A total of four outputs reflecting the adverse events in terms of the number of people killed, wounded, hijacked, and total number of adverse events has been estimated. For each model, the data was grouped for training and testing as follows: years between 2004 and 2009 (for training purpose) and year 2010 (for testing). Ninety-six different models were developed and investigated for Afghanistan and the country was divided into seven regions for analysis purposes. Performance of each model was investigated and compared to all other models with the calculated mean absolute error (MAE) values and the prediction accuracy within (&)#177;1 error range (difference between actual and predicted value). Furthermore, sensitivity analysis was performed to determine the effects of input values on dependent variables and to rank the top ten input parameters in order of importance.According to the the results obtained, it was concluded that the ANNs, FIS, and ANFIS are useful modeling techniques for predicting the number of adverse events based on historical development or economic projects' data. When the model accuracy was calculated based on the MAE for each of the models, the ANN had better predictive accuracy than FIS and ANFIS models in general as demonstrated by experimental results. The percentages of prediction accuracy with values found within (&)#177;1 error range around 90%. The sensitivity analysis results show that the importance of economic development projects varies based on the regions, population density, and occurrence of adverse events in Afghanistan. For the purpose of allocating resources and development of regions, the results can be summarized by examining the relationship between adverse events and infrastructure development in an active war theater; emphasis was on predicting the occurrence of events and assessing the potential impact of regional infrastructure development efforts on reducing number of such events.
Show less - Date Issued
- 2013
- Identifier
- CFE0004826, ucf:49757
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004826
- Title
- YOU'VE GOT MAIL: THE STUDY OF THE ATTORNEY-CLIENT PRIVILEGE AND THE USE OF ELECTRONIC MAIL.
- Creator
-
McConnell, Justin, Cook, Kathy, University of Central Florida
- Abstract / Description
-
The prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles,...
Show moreThe prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles, statutes, and texts, this thesis concluded that an attorney's communication through e-mail warrants a reasonable expectation of privacy, permitting the attorney to speak in reasonable confidence to clients through the web. However, attorneys, ethically, should consider the strong repercussions for using such a potentially transparent medium for communication. By examining the relationship between current law, the application of the attorney-client privilege, and a reasonable expectation of privacy, this study provides a comprehensive analysis for attorneys concerned with electronic mail usage. Lastly, this thesis provides attorneys with best practices for their electronic mail communications.
Show less - Date Issued
- 2011
- Identifier
- CFH0003832, ucf:44756
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0003832
- Title
- Resource Management in Large-scale Systems.
- Creator
-
Paya, Ashkan, Marinescu, Dan, Wocjan, Pawel, Bassiouni, Mostafa, Mucciolo, Eduardo, University of Central Florida
- Abstract / Description
-
The focus of this thesis is resource management in large-scale systems. Our primary concerns are energy management and practical principles for self-organization and self-management. The main contributions of our work are:1. Models. We proposed several models for different aspects of resource management, e.g., energy-aware load balancing and application scaling for the cloud ecosystem, hierarchical architecture model for self-organizing and self-manageable systems and a new cloud delivery...
Show moreThe focus of this thesis is resource management in large-scale systems. Our primary concerns are energy management and practical principles for self-organization and self-management. The main contributions of our work are:1. Models. We proposed several models for different aspects of resource management, e.g., energy-aware load balancing and application scaling for the cloud ecosystem, hierarchical architecture model for self-organizing and self-manageable systems and a new cloud delivery model based on auction-driven self-organization approach.2. Algorithms. We also proposed several different algorithms for the models described above. Algorithms such as coalition formation, combinatorial auctions and clustering algorithm for scale-free organizations of scale-free networks.3. Evaluation. Eventually we conducted different evaluations for the proposed models and algorithms in order to verify them. All the simulations reported in this thesis had been carried out on different instances and services of Amazon Web Services (AWS).All of these modules will be discussed in detail in the following chapters respectively.
Show less - Date Issued
- 2015
- Identifier
- CFE0005862, ucf:50913
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005862