The rapid development of the Internet of Medical Things (IoMT) has brought about an enormous amount of healthcare data. Effectively and securely processing this sensitive data has become a significant challenge for gr...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
The rapid development of the Internet of Medical Things (IoMT) has brought about an enormous amount of healthcare data. Effectively and securely processing this sensitive data has become a significant challenge for green communication and privacy protection of the IoMT. As a decentralized learning framework, Federate learning (FL) enables model training without directly aggregating users' raw data, thus ensuring user privacy protection. Moreover, numerous studies have put forth various approaches to enhance the efficiency of FL by minimizing communication costs, yet they may not fully account for the unique characteristics of IoMT. Specifically, the efficiency and performance of model training are closely related to patient life and health. Meanwhile, existing research has indicated that reducing communication costs can result in a decline in training accuracy, which may be critical to patient health. Therefore, aimed at green communication and ensuring the model accuracy, we design a communication-efficient personalized federated learning framework, namely pFedCAS. Specifically, we introduce a control unit, which enables adaptive sparsity of local models, to reduce training costs. Furthermore, a selection unit based on communication quality is added into the global aggregation, which can select suitable clients for model updating. Simulation results validate that the proposed method can significantly reduce communication costs while ensuring the model accuracy. Additionally, The simulation results also validate the excellent robustness of our method to non-iid healthcare data.
This paper presents a novel stabilizing nonlinear PID controller with real time experimental validation on a gantry crane system. Our adaptive control technique describes the underactuated system as a nonlinear mappin...
详细信息
This paper establishes single-letter formulas for the exact entanglement cost of simulating quantum channels under free quantum operations that completely preserve positivity of the partial transpose (PPT). First, we ...
详细信息
This paper establishes single-letter formulas for the exact entanglement cost of simulating quantum channels under free quantum operations that completely preserve positivity of the partial transpose (PPT). First, we introduce the κ-entanglement measure for point-to-point quantum channels, based on the idea of the κ entanglement of bipartite states, and we establish several fundamental properties for it, including amortization collapse, monotonicity under PPT superchannels, additivity, normalization, faithfulness, and nonconvexity. Second, we introduce and solve the exact entanglement cost for simulating quantum channels in both the parallel and sequential settings, along with the assistance of free PPT-preserving operations. In particular, we establish that the entanglement cost in both cases is given by the same single-letter formula, the κ-entanglement measure of a quantum channel. We further show that this cost is equal to the largest κ entanglement that can be shared or generated by the sender and receiver of the channel. This formula is calculable by a semidefinite program, thus allowing for an efficiently computable solution for general quantum channels. Noting that the sequential regime is more powerful than the parallel regime, another notable implication of our result is that both regimes have the same power for exact quantum channel simulation, when PPT superchannels are free. For several basic Gaussian quantum channels, we show that the exact entanglement cost is given by the Holevo-Werner formula [Holevo and Werner, Phys. Rev. A 63, 032312 (2001)], giving an operational meaning of the Holevo-Werner quantity for these channels.
Active techniques have been introduced to give better detectability performance for cyber-attack diagnosis in cyber-physical systems (CPS). In this paper, switching multiplicative watermarking is considered, whereby w...
详细信息
A general upper bound for topological entropy of switched nonlinear systems is constructed, using an asymptotic average of upper limits of the matrix measures of Jacobian matrices of strongly persistent individual mod...
详细信息
We consider the problem of devising suitable quantum error correction (QEC) procedures for a generic quantum noise acting on a quantum circuit. In general, there is no analytic universal procedure to obtain the encodi...
详细信息
We consider the problem of devising suitable quantum error correction (QEC) procedures for a generic quantum noise acting on a quantum circuit. In general, there is no analytic universal procedure to obtain the encoding and correction unitary gates, and the problem is even harder if the noise is unknown and has to be reconstructed. The existing procedures rely on variational quantum algorithms (VQAs) and are very difficult to train since the size of the gradient of the cost function decays exponentially with the number of qubits. We address this problem using a cost function based on the quantum Wasserstein distance of order 1 (QW1). At variance with other quantum distances typically adopted in quantum information processing, QW1 lacks the unitary invariance property which makes it a suitable tool to avoid getting trapped in local minima. Focusing on a simple noise model for which an exact QEC solution is known and can be used as a theoretical benchmark, we run a series of numerical tests that show how, guiding the VQA search through the QW1, can indeed significantly increase both the probability of a successful training and the fidelity of the recovered state, with respect to the results one obtains when using conventional approaches.
There are many models of memristors, but there are no reports on exponential memristors. In this paper, a three- dimension memristor Rucklidge system with exponential memristor is proposed by introducing exponential f...
详细信息
In this work, a Non-Intrusive Load Monitoring (NILM) system is designed for smart homes based on smart energy meters. The proposed solution simplifies the monitoring process by using a single set of sensors, in contra...
详细信息
ISBN:
(数字)9798350361025
ISBN:
(纸本)9798350361032
In this work, a Non-Intrusive Load Monitoring (NILM) system is designed for smart homes based on smart energy meters. The proposed solution simplifies the monitoring process by using a single set of sensors, in contrast to conventional systems that call for several sensors. From different appliances and their combinations, crucial electrical information, such as voltage, current, active power, reactive power, apparent power, power factor, and frequency was gathered. Proposed intelligent data analysis employing machine learning methods, particularly Artificial Neural Networks (ANN) and Deep Neural Networks (DNN), is the key innovation. These methods accurately categorize various appliance kinds, with DNN performing best in real-time circumstances. Additionally, there is a built-in email alert system that activates whenever there are odd electrical surges. The streamlined user interface, offers accurate identification of individual appliances and combinations in real-time forecasts based on past data. Future developments include a larger appliance data-set, improved categorization methods, load forecasting, and the creation of a smartphone app for real-time energy consumption data and automatic control, among other things. In a net-shell, this study offers an effective, single-sensorbased solution for load monitoring in smart homes, representing a substantial development in NILM technology. This technology claims to improve resource utilization and energy management in both domestic and commercial settings.
In this paper, using tools from graph theory we provide verifiable necessary and sufficient conditions for the existence of a unique hydraulic equilibrium in district heating systems of meshed topology and containing ...
In this paper, using tools from graph theory we provide verifiable necessary and sufficient conditions for the existence of a unique hydraulic equilibrium in district heating systems of meshed topology and containing multiple heat sources. Even though numerous publications have addressed the design of efficient algorithms for numerically finding hydraulic equilibria in the general context of water distribution networks, this is not the case for the analysis of existence and uniqueness. Moreover, most of the existing work dealing with these aspects exploit the equivalence between the nonlinear algebraic equations describing the hydraulic equilibria and the KKT conditions of a suitably defined nonlinear convex optimization problem. Differently, this paper proposes necessary and sufficient graph-theoretic conditions on the actuator placement for the existence and uniqueness of a hydraulic equilibrium, independent of the actuators' control objective. An example based on a representative district heating network is considered to illustrate the key aspects of our contribution, and an explicit formulation of the steady state solution is given for the case in which pressure drops through pipes are linear with respect to the flow rate.
In this article, two methods of addressing path planning for a Dubins vehiclemoving on a sphere are considered, wherein either spherical coordinates or amoving frame are considered to describe the vehicle's motion...
详细信息
暂无评论