Database watermarking plays an irreplaceable role in copyright authentication and data integrity protection, but the robustness of the watermark and the resulting data distortion are a pair of contradictory objects th...
Database watermarking plays an irreplaceable role in copyright authentication and data integrity protection, but the robustness of the watermark and the resulting data distortion are a pair of contradictory objects that cannot be ignored. To solve this problem, a reversible database watermarking method, named IGADEW, is proposed to balance the relationship between them. The biggest difference from previous research is that IGADEW synthesizes the optimization objects and obtain various parameters through genetic algorithm (GA). Second, the fitness function considers the weights of robustness and distortion, aiming to find the optimal balance between the two. IGADEW uses the Hash-based Message Authentication Code (HMAC) algorithm to encrypt the experimental parameters and uses the primary key hash algorithm for data grouping, both to ensure robustness. And the data distortion is limited with the help of threshold constraints. Finally, experiments using the UCI dataset demonstrate the effectiveness of IGADEW. Experimental results show that, compared with existing methods, IGADEW is more robust against common attacks, with lower data distortion.
We consider the initial value problem for a new two-component Sasa–Satsuma equation associated with 4 × 4 Lax pair with decaying initial data on the line. By utilizing the spectral analysis, the solution of the ...
详细信息
Utility mining is a popular research field in data mining. It uses item utilities and quantities to fit more into real applications. Fuzzy utility mining has also been proposed to reflect the linguistics of human perc...
Utility mining is a popular research field in data mining. It uses item utilities and quantities to fit more into real applications. Fuzzy utility mining has also been proposed to reflect the linguistics of human perceptron for item association. In the past, we proposed a fast-up date-based (FUP-based) approach to maintain high fuzzy utility itemsets for continuously coming transaction data. This paper proposes an algorithm that applies the pre-large strategy on fuzzy utility mining to raise the maintenance performance. Nine cases are considered to maintain the current high fuzzy utility itemsets based on the fuzzy upper-bound utility. The results of the numerical experiments show that our proposed algorithm has better efficiency than the batch and the FUP-based approach in the execution time.
In this paper, we investigate the issues of real-time sensor scheduling and state estimator design within large-scale sensor network systems. Specifically, data redundancy sometimes occurs in large-scale sensor arrays...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
In this paper, we investigate the issues of real-time sensor scheduling and state estimator design within large-scale sensor network systems. Specifically, data redundancy sometimes occurs in large-scale sensor arrays due to the excessive proximity of sensing units in the spatial domain, leading to high similarity in their measurement data. Currently, it is difficult to account for such redundancy in sensor scheduling algorithms found in existing literature, where the optimal subset of sensors is generally selected by optimizing objective functions formulated from certain performance criteria. To tackle this problem, we introduce an event-based sensor scheduling strategy, the triggering condition of which is designed founded on the similarity of sensor data, so as to identify the most informative subset of sensors for state estimation. To evaluate the impact of the sensor scheduling protocol on system observability, we propose a new notion of $\mathscr{E}(\varepsilon)$-observability, based on which an observability criterion is derived. In addition, we have designed a set-valued state estimation algorithm, which takes into account the intricate measurement information structure inherent within the sensor selection mechanism. The performance enhancement of the proposed estimator is also investigated. Finally, numerical experiments are conducted to validate the effectiveness of the proposed estimation algorithm and to verify the performance improvement.
The 2020 Covid-19 pandemic caused a sudden and massive change in work organizations. One of the major consequences of the crisis was the acceleration towards teleworking, through the specific phenomenon of Mandatory W...
详细信息
ISBN:
(纸本)9781665480468
The 2020 Covid-19 pandemic caused a sudden and massive change in work organizations. One of the major consequences of the crisis was the acceleration towards teleworking, through the specific phenomenon of Mandatory Work From Home: the situations in which workers overnight found themselves to work seven days a week from their home environment, constantly online, often without adequate equipment and little to no preparation. Different workers reacted in different way to this important change, depending on age, gender, family characteristics and other impacting factors. Mandatory work from home and these other variables impacted employees’ physical and mental health, triggering or increasing symptoms of overwork and emotional exhaustion among others. This paper contributes to the literature on the impact of the pandemic on workers’ health by giving an overview of the effects of MWFH on university staff, using Politecnico di Torino as a case study.
Sampled-data control is continually under research exploration and development to optimally coordinate the limited communication resources in networked control systems. In this paper, a novel switching asynchronous sa...
详细信息
ISBN:
(数字)9798350382655
ISBN:
(纸本)9798350382662
Sampled-data control is continually under research exploration and development to optimally coordinate the limited communication resources in networked control systems. In this paper, a novel switching asynchronous sampleddata framework with double-checking consisting of two distinct sampling schemes is proposed. An established method involves designing the switching sampling scheme with event-triggered and time-triggered mechanisms. We also introduce the concept of switching event-triggered control (SETC), by which a positive minimum sampling interval can be guaranteed effectively. By an integral method and Barbalat's Lemma, sufficient conditions that ensure the stability of interconnected linear systems are derived under the SETC. Numerical examples are presented to demonstrate the effectiveness of the proposed methodology.
The paper proposes an interdisciplinary approach including methods from disciplines such as history of concepts, linguistics, natural language processing (NLP) and Semantic Web, to create a comparative framework for d...
详细信息
Accurate measurement of bed temperature is a prerequisite for ensuring the safe and stable operation of circulating fluidized beds.A temperature measurement method of circulating fluidized beds based on cloud model sp...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Accurate measurement of bed temperature is a prerequisite for ensuring the safe and stable operation of circulating fluidized beds.A temperature measurement method of circulating fluidized beds based on cloud model spatiotemporal fusion is proposed,according to the layout characteristics of measurement points in the circulating fluidized bed temperature measurement *** one-dimensional forward cloud generator is used to generate normal cloud droplet distribution curves for the bed temperature of the front and rear walls,after the gross errors are eliminated by data consistency testing,the bed temperature data of the front and rear walls in time and space is fused by the cloud model *** effectiveness of the method proposed in this paper is verified through simulation analysis of actual operating data of a circulating fluidized bed power *** simulation results show that the method proposed in this paper significantly improves the accuracy of circulating fluidized bed temperature measurement,which can effectively reduce the safety hazards caused by boiler bed temperature being too high or too low.
Since the cumbersome collection process and high cost, the collected degradation of the product is basically small samples, which will affect the accuracy of reliability evaluation. It is necessary to expand the degra...
Since the cumbersome collection process and high cost, the collected degradation of the product is basically small samples, which will affect the accuracy of reliability evaluation. It is necessary to expand the degradation to improve the accuracy of later reliability assessment. Therefore, a degradation generation and prediction method is proposed combining the time series generator adversarial network (TimeGAN) and stochastic process. Firstly, the input degradation is expanded by the sliding window to improve the later training accuracy; Then, the construction of the generator in TimeGAN is linked with the stochastic process to make the generation data more realistic. Finally, the results of degradation prediction by the Gated Recurrent Unit (GRU) can be obtained. Two datasets and different generation methods are adopted to evaluate the effectiveness of the proposed method. The results shows that the Kullback-Leibler(KL) divergence is the smallest, and the prediction error is the smallest compared with the other methods. So, the proposed method is proved that it is valid in the degradation generation and prediction, and can be used for the further reliability assessment of the product in the industrial system.
This paper considers risk-averse learning in convex games involving multiple agents that aim to minimize their individual risk of incurring significantly high costs. Specifically, the agents adopt the conditional valu...
详细信息
ISBN:
(数字)9798350382655
ISBN:
(纸本)9798350382662
This paper considers risk-averse learning in convex games involving multiple agents that aim to minimize their individual risk of incurring significantly high costs. Specifically, the agents adopt the conditional value at risk (CVaR) as a risk measure with possibly different risk levels. To solve this problem, we propose a first-order risk-averse leaning algorithm, in which the CVaR gradient estimate depends on an estimate of the Value at Risk (VaR) value combined with the gradient of the stochastic cost function. Although estimation of the CVaR gradients using finitely many samples is generally biased, we show that the accumulated error of the CVaR gradient estimates is bounded with high probability. Moreover, assuming that the risk-averse game is strongly monotone, we show that the proposed algorithm converges to the risk-averse Nash equilibrium. We present numerical experiments on a Cournot game example to illustrate the performance of the proposed method.
暂无评论