The growing demand for recombinant-based products has increased rapidly in recent years. One of the current market scopes is the production of recombinant scorpion antivenoms in E. coli. However, there are limitations...
详细信息
ISBN:
(纸本)9783031820724;9783031820731
The growing demand for recombinant-based products has increased rapidly in recent years. One of the current market scopes is the production of recombinant scorpion antivenoms in E. coli. However, there are limitations in real-time quantification of Critical Quality Attributes (CQAs), such as recombinant proteins or biomass concentrations. Soft sensors merge as an alternative to solve this problem. In this work, six data-driven soft sensors were developed for online monitoring of the recombinant protein concentration. First, feature selection methods were tested to determine the relevant online variables to train the soft sensors. Then, the protein experimental dataset was augmented using a hybrid model. The K-Nearest Neighbors (KNN), and the Radial Basis Function (RBF) Support Vector Machine (SVM) obtained the best results with R-2 values higher than 0.996, RMSE and MAE values less than 0.058 and 0.051. However, the KNN soft sensor was computed in less time than the RBF SVM soft sensor. These results show the feasibility of KNN and RBF soft sensors for real-time monitoring of recombinant scorpion antivenoms.
Existing work on multi-camera network mainly focused on centralized systems, the role of the cameras being limited to capture images and send them to the cloud. However, this approach is impractical when the network c...
详细信息
Existing nutrient sensors have shortcomings, such as their long measurement cycles (more than 1 h), low sensitivity, and infeasibility for use in vertical profiling systems. To deal with these drawbacks, in the curren...
详细信息
Understanding performance and provenance of task-based workflows poses significant challenges, particularly in distributed configurations where resources are shared by multiple applications. Task-based workflow manage...
详细信息
Currently, ensuring information security (IS) is one of the priorities of a state's national policy. One of the most important tasks of IS is the precise identification of users within information systems. Biometr...
详细信息
ISBN:
(纸本)9783031609930;9783031609947
Currently, ensuring information security (IS) is one of the priorities of a state's national policy. One of the most important tasks of IS is the precise identification of users within information systems. Biometric methods of identification and authentication are considered the most reliable. To address the challenge of identifying a user's identity based on acoustic signals, the utilization of existing fiber-optic communication lines with installed vibro-acoustic monitoring systems at the controlled facility has been proposed.
This research aims to propose a middleware architecture for efficient and secure communication between different microservices in a distributed system. In today's world, the user's expectation of software has ...
详细信息
This paper studies the trajectory tracking problem of the unmanned surface vehicle with sensor deviation faults. Firstly, the trajectory tracking controller based on model predictive control is designed according to t...
详细信息
With the breakthrough and development of communication technology, security of unmanned autonomous systems has become an essential problem researchers concern. This paper focuses on the problem of attack detection and...
详细信息
Any wireless sensor network can experience anomalies that can hinder performance. This work presents a distributed estimation algorithm that estimates any such anomalies using a PSO algorithm. PSO algorithms are compu...
详细信息
Decentralizing the Web is becoming an increasingly interesting endeavor that aims at improving user security and privacy as well as providing guaranteed ownership of content. One such endeavor that pushes towards this...
详细信息
ISBN:
(数字)9781665488792
ISBN:
(纸本)9781665488792
Decentralizing the Web is becoming an increasingly interesting endeavor that aims at improving user security and privacy as well as providing guaranteed ownership of content. One such endeavor that pushes towards this reality, is Protocol Labs' Inter-Planetary File System (IPFS) network, that provides a decentralized large scale file system to support the decentralized Web. To achieve this, the IPFS network leverages the Kademlia DHT to route and store pointers to content stored by network members (i.e., peers). However, due to the large number of network peers, content, and accesses, the DHT routing needs to be efficient and quick to enable a decentralized web that is competitive. In this paper, we present work in progress that aims at improving the Kademlia DHT performance through the manipulation of DHT identifiers by adding prefixes to identifiers. With this, we are able to bias the DHT topological organization towards locality (which can be either geographical or applicational), which creates partitions in the DHT and enables faster and more efficient query resolution on local content. We designed prototypes that implement our proposal, and performed a first evaluation of our work in an emulated network testbed composed of 5000 nodes. Our results show that our proposal can benefit the DHT look up on data with locality with minimal overhead.
暂无评论