Welcome to the twelfth issue of 2023 in the IEEE/CAA Journal of Automatica Sinica(JAS).In the sixth issue of2023,I systematically addressed the latest development of Meta Vehicles,and sorted out some important contrib...
详细信息
Welcome to the twelfth issue of 2023 in the IEEE/CAA Journal of Automatica Sinica(JAS).In the sixth issue of2023,I systematically addressed the latest development of Meta Vehicles,and sorted out some important contributions published in the IEEE/CAA JAS focusing on control,estimation,and optimization of automated vehicles with reliability,security,efficiency,and intelligence.
This work focuses on the temporal average of the backward Euler-Maruyama(BEM)method,which is used to approximate the ergodic limit of stochastic ordinary differential equations(SODEs).We give the central limit theorem...
详细信息
This work focuses on the temporal average of the backward Euler-Maruyama(BEM)method,which is used to approximate the ergodic limit of stochastic ordinary differential equations(SODEs).We give the central limit theorem(CLT)of the temporal average of the BEM method,which characterizes its asymptotics in *** the deviation order is smaller than the optimal strong order,we directly derive the CLT of the temporal average through that of original equations and the uniform strong order of the BEM *** the case that the deviation order equals to the optimal strong order,the CLT is established via the Poisson equation associated with the generator of original *** experiments are performed to illustrate the theoretical *** main contribution of this work is to generalize the existing CLT of the temporal average of numerical methods to that for SODEs with super-linearly growing drift coefficients.
This study investigates the design and execution of an automated attendance tracking system using facial recognition CCTV based. Facial recognition technology and CCTV cameras are integrated in this system to provide ...
详细信息
The quality of air and water is essential for human health, environmental sustainability, and ecosystem balance. However, pollution from industrial activities, urbanization, and agricultural practices has made effecti...
详细信息
Estimating the suitability of individuals for a vocation via leveraging the knowledge within cognitive factors comes with numerous applications: employment resourcing, occupation counseling, and workload management. A...
详细信息
This research paper explores the application of pre-trained ResNet-18 with transfer learning for the classification of yoga postures. The study utilizes a dataset comprising images of various yoga poses taken from Kag...
详细信息
Qatar is a small country with limited land resources for agriculture and thus it is essential to ensure food security by utilizing available resources efficiently. PPS provides a way to achieve this by using data from...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC technology and cloud security to improve data protection, authentication, and access control. The unchangeable and decentralized nature of BC suggestions a strong foundation for safeguarding cloud-based systems, reducing the vulnerabilities linked to centralized storage and single points of failure. This research investigates the fundamental principles and mechanisms of blockchain-based cloud security, such as encryption, access control, smart contracts, and disseminated mechanism. The employment of BC technology to safeguard data and transactions in cloud-based environments is referred to as blockchain security in cloud computing (CC). To defend the veracity and security of data stored in the cloud, encryption and decentralised consensus processes are *** cloud provides decentralized service and communication all over the world through internet services. By increasing open service accessibility and sharing, the personalized information and sensitive data get unauthorized access leads security breaches, data leakage due to improves security concerns. So the security in the sense, the privacy preservation based security is an important concern to protect the sensitive data from unauthorized access. Most existing security failed in cryptographic approaches doe to key leakages and authenticity failures. To resolve this problem we provide a consensus proof of work based block chain principle (CPoW-BCP) based on provable partitioned encryption is implemented to secure the cloud environment in this research demystifying cryptographic hash function (DCHF) is applied to create portioned data block to make encryption using provable partitioned folding encryption (PPFE). With the support of post quantum chain links (PQCL) the block are stamped with randomiz
Hybrid power systems need frequent voltage regulation to handle fluctuations in load profile and renewable energy output, ensuring effective voltage management. This increased need for regulation extends the operating...
详细信息
1 Introduction Recently,multiple synthetic and real-world datasets have been built to facilitate the training of deep single-image reflection removal(SIRR)***,diverse testing sets are also provided with different type...
详细信息
1 Introduction Recently,multiple synthetic and real-world datasets have been built to facilitate the training of deep single-image reflection removal(SIRR)***,diverse testing sets are also provided with different types of reflections and ***,the non-negligible domain gaps between training and testing sets make it difficult to learn deep models generalizing well to testing *** diversity of reflections and scenes further makes it a mission impossible to learn a single model being effective for all testing sets and real-world *** this paper,we tackle these issues by learning SIRR models from a domain generalization perspective.
暂无评论