A bayesian regression approach to seasonal prediction of tropical cyclones affecting the Fiji region
- Authors: Chand, Savin , Walsh, Kevin , Chan, Johnny
- Date: 2010
- Type: Text , Journal article
- Relation: Journal of Climate Vol. 23, no. 13 (2010), p. 3425-3445
- Full Text: false
- Reviewed:
- Description: This study presents seasonal prediction schemes for tropical cyclones (TCs) affecting the Fiji, Samoa, and Tonga (FST) region. Two separate Bayesian regression models are developed: (i) for cyclones forming within the FST region (FORM) and (ii) for cyclones entering the FST region (ENT). Predictors examined include various El Niño-Southern Oscillation (ENSO) indices and large-scale environmental parameters. Only those predictors that showed significant correlations with FORM and ENT are retained. Significant preseason correlations are found as early as May-July (approximately three months in advance). Therefore, May-July predictors are used to make initial predictions, and updated predictions are issued later using October-December early-cyclone-season predictors. A number of predictor combinations are evaluated through a cross-validation technique. Results suggest that a model based on relative vorticity and the Niño-4 index is optimal to predict the annual number of TCs associated with FORM, as it has the smallest RMSE associated with its hindcasts (RMSE = 1.63). Similarly, the all-parameter-combined model, which includes the Niño-4 index and some large-scale environmental fields over the East China Sea, appears appropriate to predict the annual number of TCs associated with ENT (RMSE = 0.98). While the all-parameter-combined ENT model appears to have good skill over all years, the May-July prediction of the annual number of TCs associated with FORM has two limitations. First, it underestimates (overestimates) the formation for years where the onset of El Niño (La Niña) events is after the May-July preseason or where a previous La Niña (El Niño) event continued through May-July during its decay phase. Second, its performance in neutral conditions is quite variable. Overall, no significant skill can be achieved for neutral conditions even after an October-December update. This is contrary to the performance during El Niño or La Niña events, where model performance is improved substantially after an October-December early-cyclone-season update. © 2010 American Meteorological Society.
A Bend in the Yarra : A History of the Merri Creek Protectorate Station and Merri Creek Aboriginal School 1841-1851
- Authors: Clark, Ian , Heydon, Toby
- Date: 2004
- Type: Text , Book
- Full Text:
- Reviewed:
- Description: A1
- Description: 2003000768
A benign approach to the preparation of freshwater bryozoan statoblasts for scanning electron microscopy (SEM) imaging
- Authors: Mitra, Robin , Crawford, Simon , Barton, Andrew , Briggs, Steven , Orbell, John
- Date: 2013
- Type: Text , Journal article
- Relation: New Zealand Journal of Zoology Vol. 40, no. 2 (2013), p. 154-159
- Full Text: false
- Reviewed:
- Description: Several different species of freshwater Bryozoa, belonging to the genera Plumatella, Rumarcanella and Fredericella, were detected within the Northern Mallee Pipeline (NMP) system in Victoria, Australia, that required definitive identification. These organisms produce asexual buds called statoblasts, with valves composed of sclerotised chitin that bear minute micro-ornamentations of considerable taxonomical significance. Imaging and analysis of these distinctive micro-ornamentations using scanning electron microscopy (SEM) is often employed for species identification. Meticulous preparation of statoblast samples is therefore required that necessitates the removal of adhering debris, dehydration and drying - whilst mitigating specimen damage and distortion. This technical note describes an approach whereby each of these three steps have been individually designed to be as benign as possible, using mild detergent/sonication to remove debris, a gradual and gentle dehydration procedure using ethanol, and critical point drying. For the overall process, these methods are chosen to optimise control and to minimise the use of harsh and hazardous chemicals. © 2013 The Royal Society of New Zealand.
A bi-objective dynamic model for multi-state weighted k-out-of-n system reliability
- Authors: Khorshidi, Hadi , Gunawan, Indra , Ibrahim, Yousef
- Date: 2015
- Type: Text , Conference paper
- Relation: 25th European Safety and Reliability Conference, ESREL 2015; Zurich, Switzerland; 7th-10th September 2015 p. 2229-2234
- Full Text: false
- Reviewed:
- Description: Nowadays, improving system reliability is becoming an important criterion for engineering industries. Many studies have been developed to evaluate the reliability of the systems which is the first step in system improvement. Most of these studies have been done in non-dynamic conditions in which the components have the constant reliability values during functioning periods. However, the components' reliability level varies over time due to both failures and maintenance actions. Therefore, time dimension should be added into system reliability evaluation. In this paper, a dynamic assessment is presented for multi-state weighted k-out-of-n systems. The k-out-of-n system is a popular structure in fault-tolerant systems in which n components work in parallel form with a pre-defined k as a condition. This dynamic assessment considers the reliability variation of the components over finite and discrete time periods. It provides an opportunity to assign decision variables for each functioning period, and analyze the impact of each decision on the whole system reliability. In addition, the income generated during each period is defined as an importance weight of the components. Therefore, the present value of the system is obtained by Universal Generating Function (UGF) and engineering economics' tools. Furthermore, an optimization model is developed to find optimal decisions based on system reliability and cost. Since the system reliability is estimated by money, the expected profit of the system can be as the objective function. As a result, the objective function can maximize system reliability and minimize system cost simultaneously. A Matlab programming is created for a numerical example to illustrate the proposed model. © 2015 Taylor & Francis Group, London.
A bio-inspired computational language for kinesin nanomotor
- Authors: Khataee, H. , Ibrahim, Yousef
- Date: 2012
- Type: Text , Conference proceedings
- Relation: Industrial Technology (ICIT), 2012 IEEE International Conference, Athens, Greece, 19-21 March 2012
- Full Text: false
- Reviewed:
- Description: Kinesin nanomotor is a tiny vehicle that transports molecular cargoes within the cells. Many kinesin nanomotors can attach to a single cargo and coordinate their behaviors to transport the cargo. This behavioral coordination of kinesin nanomotors can be defined through a communicational language that kinesin nanomotors follow to transport the cargo. This paper proposes a computational language for kinesin nanomotor which is inspired by the nanomotor's natural behavior. In this technique, we have used behavioral Deterministic Finite Automaton (DFA) model of kinesin nanomotor which indicated internal intelligent and autonomous decision-making process of the nanomotor in response to its cell. In addition, the behavioral responses of kinesin nanomotor to its cell, behavioral DFA model of the nanomotor, were mapped to a computational regular language for the nanomotor. The proposed computational language for kinesin nanomotor was acceptable by the behavioral DFA model and also in good agreement with the natural behavior of the nanomotor. The development of such computational languages among intelligent and autonomous nanoparticles in nature paves the way for constructing potential bio-inspired nanorobotic systems as well as designing of some computational languages for their controlling.
A bioarchaeological analysis of oral and physiological health on the south coast of New Guinea
- Authors: Kinaston, Rebecca , Roberts, Georgia , Buckley, Hallie , Oxenham, Marc
- Date: 2016
- Type: Text , Journal article
- Relation: American Journal of Physical Anthropology Vol. 160, no. 3 (2016), p. 414-426
- Full Text: false
- Reviewed:
- Description: Objectives: The south coast of New Guinea has a complex prehistory known for its exchange systems that linked distinct cultural groups living along the coast, inland, and on offshore islands. Here we compare the palaeohealth of two relatively contemporaneous skeletal samples from the south coast of New Guinea (850–200 BP) that were from two ecologically different sites (one inland and one offshore island) and likely represent distinct cultural groups. We aim to elucidate health patterns that may provide information about the specific lifeways and quality of life of each community. Materials and Methods: Oral conditions (caries, calculus, alveolar lesions, and antemortem tooth loss [AMTL]) were analyzed macroscopically to assess possible intra- and inter-population variation in oral and physiological health. The frequency of linear enamel hypoplasia (LEH) was also used as a nonspecific indicator of stress to assess childhood health at each site. Results: The inhabitants from the small offshore island of Motupore, thought to be associated with Austronesian-speaking Motu tribes, displayed different patterns of oral pathological conditions (more carious lesions on the tooth crown and calculus) and LEH (lower frequencies) compared with inland people residing at the site of Nebira. Discussion: It is suggested that the causes for the variation in oral and physiological health were likely multifactorial and potentially associated with variables such as the ecological and geographical settings of the sites, cultural differences, infectious disease, differential fertility and, potentially, diet. This research provides previously unknown information about possible culturally-moderated practices that affected health in the past. Am J Phys Anthropol 160:414–426, 2016. © 2016 Wiley Periodicals, Inc.
A biomechanical comparison of controlled versus explosive back squats
- Authors: Young, Warren , O'Grady, Mathew
- Date: 2014
- Type: Text , Journal article
- Relation: Journal of Australian Strength and Conditioning Vol. 22, no. 5 (2014), p. 87-90
- Full Text: false
- Reviewed:
A biometric based authentication and encryption Framework for Sensor Health Data in Cloud
- Authors: Sharma, Surender , Balasubramanian, Venki
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms. © 2014 IEEE.
A blockchain based privacy-preserving system for electric vehicles through local communication
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: In this study, we propose a privacy preservation and efficient distributed searching and matching of Electric Vehicles (EVs) charging demander with suppliers based on reputation. Partially homomorphic encryption-based on reputation computation using local communication is used in the implementation, while hiding EVs users' location. A private blockchain is incorporated in the system to verify and permit secure trading of energy among the EVs' demander and suppliers. The results of the simulation show that the proposed privacy preserved algorithm converges more faster as compared to Bichromatic Mutual Nearest Neighbor (BMNN) algorithm. © 2020 IEEE.
A blockchain model for fair data sharing in deregulated smart grids
- Authors: Samuel, Omaji , Javaid, Nadeem , Awais, Muhammad , Ahmed, Zeeshan , Imran, Muhammad , Guizani, Mohsen
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa 9-13 December 2019
- Full Text: false
- Reviewed:
- Description: The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced. © 2019 IEEE.
A blockchain-based decentralized energy management in a P2P trading system
- Authors: Khalid, Rabiya , Javaid, Nadeem , Javaid, Sakeena , Imran, Muhammad , Naseer, Nidal
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: Local energy generation and peer to peer (P2P) energy trading in the local market can reduce energy consumption cost, emission of harmful gases (as renewable energy sources (RESs) are used to generate energy at user's premises) and increase smart grid resilience. In this paper, to implement a hybrid P2P energy trading market, a blockchain-based solution is proposed. A blockchain-based system is fully decentralized and it allows the market members to interact with each other and trade energy without involving any third party. Smart contracts play a very important role in the blockchain-based energy trading market. They contain all the necessary rules for energy trading. We have proposed three smart contracts to implement the hybrid electricity trading market. The market members interact with main smart contract which requests P2P smart contract and prosumer to grid (P2G) smart contract for further processing. The main objectives of this paper are to propose a model to implement an efficient hybrid energy trading market while reducing cost and peak to average ratio (PAR) of electricity. © 2020 IEEE.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
A blockchain-based framework for automatic SLA management in fog computing environments
- Authors: Battula, Sudheer , Garg, Saurabh , Naha, Ranesh , Amin, Muhammad , Kang, Byeong , Aghasian, Erfan
- Date: 2022
- Type: Text , Journal article
- Relation: The Journal of supercomputing Vol. 78, no. 15 (2022), p. 16647-16677
- Full Text: false
- Reviewed:
- Description: Fog computing has become a prominent paradigm in providing shared resources to serve different applications near the edge. Similar to other computing paradigms such as cloud and grid, in fog computing, service-level agreements (SLAs) are essential between fog providers and end-users to guarantee the quality of service (QoS). However, due to the unique characteristics of fog resources, such as being highly distributed and heterogeneous, with their dynamic nature having nonrestrictive provider participation, SLA management techniques and frameworks, which are available for Clouds and Grids, are not directly applicable. The availability of the resources in the cloud is much more controllable and predictable compared to fog. Moreover, due to the multiple ownership of fog infrastructure and unrestricted environment, autonomous end-devices are allowed to participate with different SLAs to serve the applications near the edge as a result is a lack of trust exists between the entities and managing and enforcing SLAs according to the application QoS in this environment is a complex task. Thus, the SLA management must be undertaken in a more trustworthy manner to ensure that agreement. To fill this gap, this paper proposes an automated SLA management framework for fog computing that utilizes Smart contracts and blockchain technology to monitor and enforce SLAs in a more trustworthy manner. The results obtained from the experiments, which were conducted in the blockchain private network, show that the framework can ensure precise and efficient SLAs enforcement in the fog. The performance of the proposed framework is better than existing work in terms of transaction cost and time.
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Authors: Yahaya, Adamu , Javaid, Nadeem , Khalid, Rabiya , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, 7 to 11 June, IEEE International Conference on Communications Vol. 2020-June
- Full Text: false
- Reviewed:
- Description: The high penetration of renewable energy resources into the distributed system and their intermittent behavior of the non-dispatchable generation causes issues of demand supply mismatch and serious security and privacy concerned in the system. It is believed that incorporating blockchain will reduce costs, enhance data security, and improve the system efficiency. However, privacy issues are not completely eliminated and can hinder the wide applications of blockchain. In the study, we present a Reputation Based Starvation Free Energy Allocation Policy (Reputation-SFEAP) in a decentralized and distributed blockchain-based energy trading; while keeping Aggregator as Common Communication Point. In addition, Identity-Based encryption (ID-Based encryption) technique is added that improves transactional information privacy. According to the research analysis, it is observed that the proposed system model has optimal and fair energy allocation algorithms, which prevent all the energy users from energy starvation and share the available energy accordingly. Moreover, the incorporated encryption system has greater security-privacy level, which protects passive attacker and disguises attacker from penetration. © 2020 IEEE.
A blockchain-based solution for enhancing security and privacy in smart factory
- Authors: Wan, Jafu , Li, Jiapeng , Imran, Muhammad , Li, Di
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 6 (2019), p. 3652-3660
- Full Text: false
- Reviewed:
- Description: Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development. © 2005-2012 IEEE.
A BMI approach to guaranteed cost control of discrete-time uncertain system with both state and input delays
- Authors: Zhou, Xiaojun , Dong, Tianxue , Tang, Xiaolin , Yang, Chunhua , Gui, Weihua
- Date: 2015
- Type: Text , Journal article
- Relation: Optimal Control Applications and Methods Vol. 36, no. 6 (2015), p. 844-852
- Full Text: false
- Reviewed:
- Description: In this study, the guaranteed cost control of discrete time uncertain system with both state and input delays is considered. Sufficient conditions for the existence of a memoryless state feedback guaranteed cost control law are given in the bilinear matrix inequality form, which needs much less auxiliary matrix variables and storage space. Furthermore, the design of guaranteed cost controller is reformulated as an optimization problem with a linear objective function, bilinear, and linear matrix inequalities constraints. A nonlinear semi-definite optimization solver - PENLAB is used as a solution technique. A numerical example is given to demonstrate the effectiveness of the proposed method. Copyright © 2014 John Wiley & Sons, Ltd.
A borehole stability study by newly designed laboratory tests on thick-walled hollow cylinders
- Authors: Hashemi, Sam , Melkoumian, Nouné , Taheri, Abbas
- Date: 2015
- Type: Text , Journal article
- Relation: Journal of Rock Mechanics and Geotechnical Engineering Vol. 7, no. 5 (2015), p. 519-531
- Full Text:
- Reviewed:
- Description: At several mineral exploration drilling sites in Australia, weakly consolidated formations mainly consist of sand particles that are poorly bonded by cementing agents such as clay, iron oxide cement or calcite. These formations are being encountered when drilling boreholes to the depth of up to 200 m. To study the behaviour of these materials, thick-walled hollow cylinder (TWHC) and solid cylindrical synthetic specimens were designed and prepared by adding Portland cement and water to sand grains. The effects of different parameters such as water and cement contents, grain size distribution and mixture curing time on the characteristics of the samples were studied to identify the mixture closely resembling the formation at the drilling site. The Hoek triaxial cell was modified to allow the visual monitoring of grain debonding and borehole breakout processes during the laboratory tests. The results showed the significance of real-time visual monitoring in determining the initiation of the borehole breakout. The size-scale effect study on TWHC specimens revealed that with the increasing borehole size, the ductility of the specimen decreases, however, the axial and lateral stiffnesses of the TWHC specimen remain unchanged. Under different confining pressures the lateral strain at the initiation point of borehole breakout is considerably lower in a larger size borehole (20 mm) compared to that in a smaller one (10 mm). Also, it was observed that the level of peak strength increment in TWHC specimens decreases with the increasing confining pressure. © 2015 Institute of Rock and Soil Mechanics, Chinese Academy of Sciences.
A boundary element analysis of fatigue crack growth for welded connections under bending
- Authors: Chen, Tao , Xiao, Zhigang , Zhao, Xiao , Gu, Xianglin
- Date: 2013
- Type: Text , Journal article
- Relation: Engineering Fracture Mechanics Vol. 98, no. (2013), p. 44-51
- Full Text: false
- Reviewed:
- Description: Transverse fillet welded joints and circular hollow section (CHS)-to-plate welded connections were analyzed to obtain crack growth life under bending. Based on a 3D boundary element model, an initial semi-elliptical surface crack was embedded at the weld toe. Thereafter, crack propagation was performed with Paris’ law and strain energy density criterion. This method discards the assumption of constant aspect ratio of crack shape during propagation stage. Numerical results were compared with the experimental results in the literature. It is found that numerical analysis is reliable and the boundary element method is suitable for estimating the fatigue crack growth life.
A boundary element analysis of non-load-carrying cruciform welded joints strengthened with FRP materials
- Authors: Chen, Tao , Zhao, Xiao , Gu, Xianglin , Xiao, Zhigang
- Date: 2012
- Type: Text , Conference paper
- Relation: International Conferences on Advances in Steel Structures 2012 p. 1405 - 1412
- Full Text: false
- Reviewed:
A brief guide to multi-objective reinforcement learning and planning JAAMAS track
- Authors: Hayes, Conor , Bargiacchi, Eugenio , Källström, Johan , Macfarlane, Matthew , Reymond, Mathieu , Verstraeten, Timothy , Zintgraf, Luisa , Dazeley, Richard , Heintz, Frederik , Howley, Enda , Irissappane, Aathirai , Mannion, Patrick , Nowé, Ann , Ramos, Gabriel , Restelli, Marcello , Vamplew, Peter , Roijers, Diederik
- Date: 2023
- Type: Text , Conference paper
- Relation: 22nd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, London, 29 May to 2 June 2023, Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS Vol. 2023-May, p. 1988-1990
- Full Text:
- Reviewed:
- Description: Real-world sequential decision-making tasks are usually complex, and require trade-offs between multiple - often conflicting - objectives. However, the majority of research in reinforcement learning (RL) and decision-theoretic planning assumes a single objective, or that multiple objectives can be handled via a predefined weighted sum over the objectives. Such approaches may oversimplify the underlying problem, and produce suboptimal results. This extended abstract outlines the limitations of using a semi-blind iterative process to solve multi-objective decision making problems. Our extended paper [4], serves as a guide for the application of explicitly multi-objective methods to difficult problems. © 2023 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved.