paes_method_t2p_and_security.adb:365:The initial_task_set_file_name is test_Unifast.xmlv3 paes_method_t2p_and_security.adb:311:Number of task = 41 paes_method_t2p_and_security.adb:315:Number of partitions = 2 paes_method_t2p_and_security.adb:319:Number of applications = 6 paes_method_t2p_and_security.adb:368:The number of iterations = 2000 paes_method_t2p_and_security.adb:333:The scheduler is HOP paes_method_t2p_and_security.adb:398:The list of selected fitness functions is f12 f13 f14 paes_method_t2p_and_security.adb:355:The Selection Strategy is LOCAL paes_method_t2p_and_security.adb:389:The exploration is : Mix_grain algorithm based paes_method_t2p_and_security.adb:371:intra_partition_safe = 0 paes_method_t2p_and_security.adb:453:List of fitness functions paes_method_t2p_and_security.adb:467: f12 => f12 = missedDeadlines paes_method_t2p_and_security.adb:467: f13 => f13 = bellViolations paes_method_t2p_and_security.adb:467: f14 => f14 = bibaViolations 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 3 3 3 3 3 3 3 4 4 4 4 4 5 5 5 5 5 6 6 6 6 6 Initial_task_set_file_name : test_Unifast.xmlv3 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:2:9: No DTD defined for this document, at test_Unifast.xmlv3:2:9) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:4:14: [VC] No attribute allowed for element core_unit, at test_Unifast.xmlv3:4:14) xml_generic_parsers-architecture.adb:1781:Add core unit core1 id_1 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:26:24: [VC] No attribute allowed for element mono_core_processor, at test_Unifast.xmlv3:26:24) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:31:10: [VC] No attribute allowed for element core, at test_Unifast.xmlv3:31:10) xml_generic_parsers-architecture.adb:1824:Add monocore processor processor1 id_2 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:36:18: [VC] No attribute allowed for element address_space, at test_Unifast.xmlv3:36:18) xml_generic_parsers-architecture.adb:1449:Add address space addr1 id_3 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:63:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:63:18) xml_generic_parsers-architecture.adb:1346:Add task 1 id_5 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:93:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:93:18) xml_generic_parsers-architecture.adb:1346:Add task 10 id_14 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:123:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:123:18) xml_generic_parsers-architecture.adb:1346:Add task 11 id_15 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:153:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:153:18) xml_generic_parsers-architecture.adb:1346:Add task 12 id_16 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:183:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:183:18) xml_generic_parsers-architecture.adb:1346:Add task 13 id_17 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:213:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:213:18) xml_generic_parsers-architecture.adb:1346:Add task 14 id_18 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:243:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:243:18) xml_generic_parsers-architecture.adb:1346:Add task 15 id_19 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:273:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:273:18) xml_generic_parsers-architecture.adb:1346:Add task 16 id_141 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:303:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:303:18) xml_generic_parsers-architecture.adb:1346:Add task 17 id_142 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:333:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:333:18) xml_generic_parsers-architecture.adb:1346:Add task 18 id_143 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:363:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:363:18) xml_generic_parsers-architecture.adb:1346:Add task 19 id_144 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:393:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:393:18) xml_generic_parsers-architecture.adb:1346:Add task 2 id_6 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:423:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:423:18) xml_generic_parsers-architecture.adb:1346:Add task 20 id_20 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:453:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:453:18) xml_generic_parsers-architecture.adb:1346:Add task 21 id_21 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:483:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:483:18) xml_generic_parsers-architecture.adb:1346:Add task 22 id_22 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:513:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:513:18) xml_generic_parsers-architecture.adb:1346:Add task 23 id_23 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:543:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:543:18) xml_generic_parsers-architecture.adb:1346:Add task 24 id_24 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:573:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:573:18) xml_generic_parsers-architecture.adb:1346:Add task 25 id_25 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:603:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:603:18) xml_generic_parsers-architecture.adb:1346:Add task 26 id_27 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:633:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:633:18) xml_generic_parsers-architecture.adb:1346:Add task 9 id_13 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:663:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:663:18) xml_generic_parsers-architecture.adb:1346:Add task 40 id_162 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:693:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:693:18) xml_generic_parsers-architecture.adb:1346:Add task 39 id_161 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:723:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:723:18) xml_generic_parsers-architecture.adb:1346:Add task 3 id_7 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:753:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:753:18) xml_generic_parsers-architecture.adb:1346:Add task 27 id_149 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:783:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:783:18) xml_generic_parsers-architecture.adb:1346:Add task 28 id_150 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:813:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:813:18) xml_generic_parsers-architecture.adb:1346:Add task 29 id_151 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:843:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:843:18) xml_generic_parsers-architecture.adb:1346:Add task 31 id_153 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:873:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:873:18) xml_generic_parsers-architecture.adb:1346:Add task 30 id_152 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:903:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:903:18) xml_generic_parsers-architecture.adb:1346:Add task 32 id_154 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:933:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:933:18) xml_generic_parsers-architecture.adb:1346:Add task 33 id_155 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:963:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:963:18) xml_generic_parsers-architecture.adb:1346:Add task 34 id_156 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:993:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:993:18) xml_generic_parsers-architecture.adb:1346:Add task 35 id_157 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1023:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1023:18) xml_generic_parsers-architecture.adb:1346:Add task 37 id_159 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1053:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1053:18) xml_generic_parsers-architecture.adb:1346:Add task 4 id_8 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1083:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1083:18) xml_generic_parsers-architecture.adb:1346:Add task 36 id_158 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1113:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1113:18) xml_generic_parsers-architecture.adb:1346:Add task 38 id_160 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1143:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1143:18) xml_generic_parsers-architecture.adb:1346:Add task 5 id_9 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1173:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1173:18) xml_generic_parsers-architecture.adb:1346:Add task 6 id_10 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1203:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1203:18) xml_generic_parsers-architecture.adb:1346:Add task 7 id_11 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1233:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1233:18) xml_generic_parsers-architecture.adb:1346:Add task 8 id_12 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1263:18: [VC] No attribute allowed for element periodic_task, at test_Unifast.xmlv3:1263:18) xml_generic_parsers-architecture.adb:1346:Add task 41 id_163 xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1297:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1297:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1299:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1299:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1304:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1304:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1306:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1306:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1311:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1311:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1313:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1313:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1318:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1318:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1320:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1320:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1325:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1325:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1327:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1327:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1332:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1332:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1334:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1334:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1339:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1339:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1341:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1341:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1346:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1346:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1348:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1348:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1353:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1353:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1355:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1355:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1360:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1360:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1362:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1362:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1367:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1367:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1369:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1369:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1374:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1374:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1376:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1376:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1381:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1381:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1383:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1383:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1388:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1388:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1390:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1390:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1395:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1395:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1397:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1397:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1402:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1402:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1404:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1404:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1409:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1409:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1411:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1411:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1416:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1416:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1418:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1418:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1423:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1423:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1425:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1425:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1430:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1430:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1432:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1432:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1437:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1437:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1439:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1439:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1444:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1444:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1446:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1446:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1451:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1451:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1453:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1453:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1458:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1458:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1460:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1460:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1465:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1465:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1467:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1467:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1472:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1472:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1474:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1474:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1479:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1479:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1481:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1481:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1486:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1486:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1488:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1488:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1493:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1493:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1495:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1495:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1500:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1500:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1502:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1502:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1507:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1507:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1509:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1509:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1514:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1514:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1516:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1516:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1521:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1521:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1523:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1523:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1528:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1528:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1530:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1530:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1535:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1535:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1537:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1537:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1542:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1542:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1544:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1544:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1549:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1549:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1551:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1551:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1556:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1556:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1558:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1558:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1563:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1563:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1565:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1565:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1570:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1570:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1572:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1572:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1577:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1577:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1579:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1579:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1584:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1584:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1586:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1586:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1591:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1591:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1593:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1593:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1598:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1598:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1600:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1600:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1605:21: [VC] No attribute allowed for element precedence_sink, at test_Unifast.xmlv3:1605:21) xml_generic_parsers.adb:170:Xml parser warning (test_Unifast.xmlv3:1607:23: [VC] No attribute allowed for element precedence_source, at test_Unifast.xmlv3:1607:23) xml_generic_parsers-architecture.adb:1482:Add a dependency PRECEDENCE_DEPENDENCY paes_method_t2p_and_security.adb:698:Nb_NonSecure_low 16 paes_method_t2p_and_security.adb:699:genes_com 45 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes_method_t2p_and_security.adb:706:The initial design is schedulable The actual processor utilization is : 0.61549997paes_method_t2p_and_security.adb:729: paes_method_t2p_and_security.adb:732:The hyperperiod of the initial task set = 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:398:===============c================ 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:401:===============sol_init1================ 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:403:===============sol_init2================ 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 NOSECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 NOSECURE 8_11 NORISK 11_14 NOSECURE 9_13 NORISK 13_15 NORISK 12_9 NOSECURE 15_1 NOSECURE 20_21 NOSECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 NOSECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 NOSECURE 28_29 NORISK 29_30 NOSECURE 30_31 NORISK 32_33 NOSECURE 33_34 NORISK 34_35 NOSECURE 35_36 NORISK 37_38 NOSECURE 38_39 NORISK 39_40 NOSECURE 40_41 NOSECURE 26_27 NOSECURE 26_32 NOSECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:405:===============sol_init3================ 1 1 1 1 1 1 2 2 1 2 1 1 1 2 2 2 2 2 2 2 1 1 1 2 1 2 1 2 1 1 2 1 2 1 1 2 1 2 1 1 2 NOSECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 NOSECURE 8_11 NORISK 11_14 NOSECURE 9_13 NORISK 13_15 NORISK 12_9 NOSECURE 15_1 NOSECURE 20_21 NOSECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 NOSECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 NOSECURE 28_29 NORISK 29_30 NOSECURE 30_31 NORISK 32_33 NOSECURE 33_34 NORISK 34_35 NOSECURE 35_36 NORISK 37_38 NOSECURE 38_39 NORISK 39_40 NOSECURE 40_41 NOSECURE 26_27 NOSECURE 26_32 NOSECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:407:===============sol_init4================ 1 1 1 1 1 1 2 2 1 2 1 1 1 2 2 2 2 2 2 2 1 1 1 2 1 2 1 2 1 1 2 1 2 1 1 2 1 2 1 1 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:409:===============sol_init5================ 1 1 1 1 1 1 1 2 2 1 1 2 1 1 1 1 1 1 1 1 2 2 2 2 1 2 1 1 2 2 1 1 1 2 2 1 1 1 2 2 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 NOSECURE 8_11 NORISK 11_14 NOSECURE 9_13 NORISK 13_15 NORISK 12_9 NOSECURE 15_1 NOSECURE 20_21 NOSECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 NOSECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 NOSECURE 28_29 NORISK 29_30 NOSECURE 30_31 NORISK 32_33 NOSECURE 33_34 NORISK 34_35 NOSECURE 35_36 NORISK 37_38 NOSECURE 38_39 NORISK 39_40 NOSECURE 40_41 NOSECURE 26_27 NOSECURE 26_32 NOSECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:411:===============sol_init6================ 1 1 1 1 1 1 1 2 2 1 1 2 1 1 1 1 1 1 1 1 2 2 2 2 1 2 1 1 2 2 1 1 1 2 2 1 1 1 2 2 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 ===============sol_init1 evaluation ================ paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation archive is empty arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-chromosome_data_manipulation_t2p_and_security.adb:434:sol1 2.00000E+00 0.00000E+00 0.00000E+00 sol1 2.00000E+00 0.00000E+00 0.00000E+00 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-chromosome_data_manipulation_t2p_and_security.adb:444:=============== end sol_init1 evaluation ================ paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation paes-chromosome_data_manipulation_t2p_and_security.adb:542:===============c evaluation finish================ arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-general_form.adb:135:==iter 1 ==iter 1 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 2 ==iter 2 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 6 The randomly chosen application is : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 3 ==iter 3 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 4 ==iter 4 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 5 ==iter 5 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 6 ==iter 6 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 7 ==iter 7 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 7 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 4 The chosen configuration is : 4paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 43 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_27 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-security_implementation.adb:667:Hash is added for partitionaddr2 paes-security_implementation.adb:707:Hash is added for partitionaddr1 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.90000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 8 ==iter 8 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 8 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 6 The randomly chosen application is : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-security_implementation.adb:242:Downgrader (Encrypter & Decrypter): 42 is added paes-security_implementation.adb:254:Upgrader : 43 is added paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.70000E+01 0.00000E+00 0.00000E+00 paes-general_form.adb:135:==iter 9 ==iter 9 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 9 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 1 The randomly chosen application is : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 10 ==iter 10 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 10 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 11 ==iter 11 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 11 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 12 ==iter 12 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 12 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 13 ==iter 13 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 13 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: A_task_source : 26 A_task_sink : 32 paes-security_implementation.adb:314:Downgrader (Encrypter): 42 is added paes-security_implementation.adb:338:New downgrading task (Decrypter): 43 is added paes-security_implementation.adb:364:New key set up task for encrypter: 44 is added paes-security_implementation.adb:386:New key set up task for decrypter: 45 is added A_task_source : 26 A_task_sink : 32 paes-security_implementation.adb:434:Hash at emission : 46 is added paes-security_implementation.adb:460:Hash at reception : 47 is added paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.90000E+01 0.00000E+00 0.00000E+00 paes-general_form.adb:135:==iter 14 ==iter 14 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 14 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 4 The chosen configuration is : 4paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 43 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_27 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.20000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 15 ==iter 15 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 15 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 16 ==iter 16 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 16 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 17 ==iter 17 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 17 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 6 The randomly chosen application is : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 45 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 NOSECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 NOSECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.30000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 18 ==iter 18 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 18 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 19 ==iter 19 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 19 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 6 The randomly chosen application is : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 20 ==iter 20 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 20 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 43 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_27 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: A_task_source : 26 A_task_sink : 32 paes-security_implementation.adb:314:Downgrader (Encrypter): 42 is added paes-security_implementation.adb:338:New downgrading task (Decrypter): 43 is added paes-security_implementation.adb:364:New key set up task for encrypter: 44 is added paes-security_implementation.adb:386:New key set up task for decrypter: 45 is added A_task_source : 26 A_task_sink : 32 paes-security_implementation.adb:434:Hash at emission : 46 is added paes-security_implementation.adb:460:Hash at reception : 47 is added A_task_source : 26 A_task_sink : 37 paes-security_implementation.adb:314:Downgrader (Encrypter): 48 is added paes-security_implementation.adb:338:New downgrading task (Decrypter): 49 is added paes-security_implementation.adb:364:New key set up task for encrypter: 50 is added paes-security_implementation.adb:386:New key set up task for decrypter: 51 is added A_task_source : 26 A_task_sink : 37 paes-security_implementation.adb:434:Hash at emission : 52 is added paes-security_implementation.adb:460:Hash at reception : 53 is added paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.30000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 21 ==iter 21 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 21 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 22 ==iter 22 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 22 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 23 ==iter 23 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 23 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 4 The chosen configuration is : 4paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 44 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_32 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 NOSECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 NOSECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.50000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 24 ==iter 24 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 24 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 25 ==iter 25 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 25 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 43 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_27 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 NOSECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.20000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 26 ==iter 26 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 26 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 27 ==iter 27 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 27 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 1 The randomly chosen application is : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 4 The chosen configuration is : 4 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 28 ==iter 28 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 28 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 29 ==iter 29 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 29 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 1 The randomly chosen application is : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 30 ==iter 30 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 30 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 31 ==iter 31 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 31 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 32 ==iter 32 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 32 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 33 ==iter 33 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 33 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 6 The randomly chosen application is : 6 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 34 ==iter 34 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 34 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 2 The randomly chosen application is : 2 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 1.30000E+01 0.00000E+00 0.00000E+00 paes-general_form.adb:135:==iter 35 ==iter 35 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 35 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 4 The randomly chosen application is : 4 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 36 ==iter 36 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 36 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 3 The randomly chosen application is : 3 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3paes-chromosome_data_manipulation_t2p_and_security.adb:713:The randomly chosen communication is : 44 paes-chromosome_data_manipulation_t2p_and_security.adb:714:This chosen communication is : SECURE 26_32 paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 NOSECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 NOSECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: A_task_source : 26 A_task_sink : 27 paes-security_implementation.adb:314:Downgrader (Encrypter): 42 is added paes-security_implementation.adb:338:New downgrading task (Decrypter): 43 is added paes-security_implementation.adb:364:New key set up task for encrypter: 44 is added paes-security_implementation.adb:386:New key set up task for decrypter: 45 is added A_task_source : 26 A_task_sink : 27 paes-security_implementation.adb:434:Hash at emission : 46 is added paes-security_implementation.adb:460:Hash at reception : 47 is added A_task_source : 26 A_task_sink : 37 paes-security_implementation.adb:314:Downgrader (Encrypter): 48 is added paes-security_implementation.adb:338:New downgrading task (Decrypter): 49 is added paes-security_implementation.adb:364:New key set up task for encrypter: 50 is added paes-security_implementation.adb:386:New key set up task for decrypter: 51 is added A_task_source : 26 A_task_sink : 37 paes-security_implementation.adb:434:Hash at emission : 52 is added paes-security_implementation.adb:460:Hash at reception : 53 is added paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.30000E+01 1.00000E+00 1.00000E+00 paes-general_form.adb:135:==iter 37 ==iter 37 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 37 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 5 The randomly chosen application is : 5 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 38 ==iter 38 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 1 The randomly chosen partition is : 1 iterrrrrrrrrrr : 38 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 1 The randomly chosen application is : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 3 The chosen configuration is : 3 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 2250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 2.00000E+00 0.00000E+00 0.00000E+00 paes.adb:680: mutant is not dominated by archive arclength : 1 arc(a) 2.00000E+00 0.00000E+00 0.00000E+00 square : 32768 paes-general_form.adb:135:==iter 39 ==iter 39 half_iter: 1000 paes-chromosome_data_manipulation_t2p_and_security.adb:618:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:619:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:620:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:622:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:623:The 1 attempt of the mutation procedure paes-chromosome_data_manipulation_t2p_and_security.adb:624:................................................................ paes-chromosome_data_manipulation_t2p_and_security.adb:634:The randomly chosen partition is : 2 The randomly chosen partition is : 2 iterrrrrrrrrrr : 39 paes-chromosome_data_manipulation_t2p_and_security.adb:642:The randomly chosen application is : 1 The randomly chosen application is : 1 paes-chromosome_data_manipulation_t2p_and_security.adb:683:The chosen configuration is : 2 The chosen configuration is : 2 No inter partition communications choosed to be secured paes-chromosome_data_manipulation_t2p_and_security.adb:767: paes-chromosome_data_manipulation_t2p_and_security.adb:768:The mutated solution is : 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:770: paes-chromosome_data_manipulation_t2p_and_security.adb:773: paes-chromosome_data_manipulation_t2p_and_security.adb:774:After normalization the candidate solution is : After normalization the candidate solution is : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 paes-chromosome_data_manipulation_t2p_and_security.adb:777: paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes-objective_functions-t2p_and_security.adb:251:==Check the schedulability through scheduling simulation== paes-objective_functions-t2p_and_security.adb:254:Hyperperiod_of_Initial_Taskset: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:785: The candidate solution is feasible paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f12 = missedDeadlines paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f13 = bellViolations paes-objective_functions-t2p_and_security.adb:396:FitnessFunctions: f14 = bibaViolations paes-objective_functions-t2p_and_security.adb:448:end_evaluation solution m evaluted 0.00000E+00 0.00000E+00 0.00000E+00 s dominate first time Paes_runtime : 48.80373300 secondspaes_method_t2p_and_security.adb:756: paes_method_t2p_and_security.adb:769:====================================================================================================== paes_method_t2p_and_security.adb:770: The final Archive length = 1 paes_method_t2p_and_security.adb:771: The final Archive is now... paes_method_t2p_and_security.adb:785:------------------------------------------------------------------------------------------------------- Solution 1: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 SECURE 14_1 NORISK 1_2 NORISK 1_3 NORISK 1_4 NORISK 1_5 NORISK 1_6 NORISK 2_7 NORISK 3_8 NORISK 4_8 NORISK 5_8 NORISK 4_9 NORISK 6_9 NORISK 7_8 NORISK 10_7 SECURE 8_11 NORISK 11_14 SECURE 9_13 NORISK 13_15 NORISK 12_9 SECURE 15_1 SECURE 20_21 SECURE 20_22 NORISK 21_23 NORISK 22_23 NORISK 23_24 SECURE 24_25 NORISK 25_26 NORISK 16_17 NORISK 17_18 NORISK 18_19 NORISK 27_28 SECURE 28_29 NORISK 29_30 SECURE 30_31 NORISK 32_33 SECURE 33_34 NORISK 34_35 SECURE 35_36 NORISK 37_38 SECURE 38_39 NORISK 39_40 SECURE 40_41 SECURE 26_27 SECURE 26_32 SECURE 26_37 security configuration: 2Hyperperiod: 4250 paes-chromosome_data_manipulation_t2p_and_security.adb:1106:end_transform paes_method_t2p_and_security.adb:812:Objectives of solution 1 : | f12 = missedDeadlines = 0.00000 | f13 = bellViolations = 0.00000 | f14 = bibaViolations = 0.00000paes_method_t2p_and_security.adb:849: | paes_method_t2p_and_security.adb:850:------------------------------------------------------------------------------------------------------- paes_method_t2p_and_security.adb:875: ==================================================== ================================================== paes_method_t2p_and_security.adb:891:The hyperperiod of initial solution: 4250 paes_method_t2p_and_security.adb:892:The maximum hyperperiod of candidate solution: 2250