Opacity is a security and privacy property that guarantees predefined secret behavior of a cyber-physical system will not be inferred with certainty by a malicious entity. If a system is opacity-violating, extended in...
Opacity is a security and privacy property that guarantees predefined secret behavior of a cyber-physical system will not be inferred with certainty by a malicious entity. If a system is opacity-violating, extended insertion functions that insert fake symbols can be implemented to enforce opacity. By constricting the ways in which the fake symbols are inserted, this paper addresses opacity enforcement under the framework of finite state automata using extended insertion functions under event insertion constraints and limited insertion events constraints, i.e., only a limited number of symbols in a specified set can be inserted before and after an actual system output. The notion of (k b ,k a )-EIC-enforceability is proposed to describe how to enforce opacity via extended insertion functions in the presence of both event insertion constraints and limited insertion events constraints. A necessary and sufficient condition to check (k b ,k a )-EIC-enforceability is derived by constructing an appropriate verifier.
Due to intrinsic properties such as transparency, immutability, decentralization, and cryptographic security, blockchain has emerged as a revolutionary technology. Despite its widespread application, blockchain is not...
详细信息
Detailed phenotype information is fundamental to accurate diagnosis and risk estimation of diseases. As a rich source of phenotype information, electronic health records (EHRs) promise to empower diagnostic variant in...
详细信息
We have developed an innovative anti-resonant hollow-core fiber design with capillaries of alternating thicknesses. This unique arrangement, featuring six silica capillaries of two different thicknesses, effectively n...
详细信息
ISBN:
(数字)9798350377323
ISBN:
(纸本)9798350377330
We have developed an innovative anti-resonant hollow-core fiber design with capillaries of alternating thicknesses. This unique arrangement, featuring six silica capillaries of two different thicknesses, effectively narrows the transmission bandwidth while maintaining low attenuation. Validated through simulations, our design marks a significant step in developing the first in-line hollow-core bandwidth filter fiber. We envision that our novel fiber design has a variety of applications, such as suppressing non-linear effects and developing wavelength-selective components for future conventional and quantum communication networks.
The work reported in this article addresses the challenge of building models for non-trivial aerobatic aircraft maneuvers in an automated fashion. It is built using a Behavioural Cloning approach where human pilots pr...
详细信息
The COVID-19 pandemic is a virus that has disastrous effects onhuman lives globally;still spreading like wildfire causing huge losses to humanityand economies. There is a need to follow few constraints like social dis...
详细信息
The COVID-19 pandemic is a virus that has disastrous effects onhuman lives globally;still spreading like wildfire causing huge losses to humanityand economies. There is a need to follow few constraints like social distancingnorms, personal hygiene, and masking up to effectively control the virus *** proposal is to detect the face frame and confirm the faces are properly covered with masks. By applying the concepts of Deep learning, the results obtainedfor mask detection are found to be effective. The system is trained using4500 images to accurately judge and justify its accuracy. The aim is to developan algorithm to automatically detect a mask, but the approach does not facilitatethe percentage of improper usage. Accuracy levels are as low as 50% if the maskis improperly covered and an alert is raised for improper placement. It can be usedat traffic places and social gatherings for the prevention of virus transmission. Itworks by first locating the region of interest by creating a frame boundary, thenfacial points are picked up to detect and concentrate on specific features. Thetraining on the input images is performed using different epochs until the artificialface mask detection dataset is created. The system is implemented using TensorFlow with OpenCV and Python using a Jupyter Notebook simulation environment. The training dataset used is collected from a set of diverse open-sourcedatasets with filtered images available at Kaggle Medical Mask Dataset by Mikolaj Witkowski, Kera, and Prajna Bhandary. To simulate MobilNetV2 classifier isused to load and pre-process the image dataset for building a fully connectedhead. The objective is to assess the accuracy of the identification, measuringthe efficiency and effectiveness of algorithms for precision, recall, and F1 score.
A desired characteristic of future communication networks is the notion of reconfigurability. For a wireless device, this can be realized through the employment of the so-called fluid antennas (FAs). An FA consists of...
A desired characteristic of future communication networks is the notion of reconfigurability. For a wireless device, this can be realized through the employment of the so-called fluid antennas (FAs). An FA consists of a dielectric holder, in which a radiating liquid moves between pre-defined locations (called ports) that serve as the device's antennas. Therefore, due to the nature of liquids, an FA can essentially take any size and shape, making them both flexible and reconfigurable. In this paper, we study the outage probability of FAs where the scheduled port, based on selection combining, is subject to scheduling delays. An analytical framework is provided for the performance with and without estimation errors, as a result of post-scheduling delays. We show that even though FAs achieve maximum channel (spatial) diversity, this cannot be attained in the presence of delays.
Printed electronics technology offers a cost-effective and fully-customizable solution to computational needs beyond the capabilities of traditional silicon technologies, offering advantages such as on-demand manufact...
详细信息
This paper presents a novel approach for head tracking in augmented reality (AR) flight simulators using an adaptive fusion of Kalman and particle filters. This fusion dynamically balances the strengths of both algori...
详细信息
We explore the fair distribution of a set of m indivisible chores among n agents, where each agent’s costs are evaluated using a monotone cost function. Our focus lies on two fairness criteria: envy-freeness up to an...
详细信息
暂无评论