microRNAs play an important role in post-transcriptional gene regulation. Recently, viral microRNAs have been discovered in several viruses, including Hepatitis B virus. This brief work explores bioinformatics tools f...
详细信息
This study investigates the relationship between the diameter of a D-shaped plastic optical fiber (POF) sensor and its optical response as a function of varying salt concentrations. A simple and efficient dry etching ...
详细信息
control of users' access to the information system is the main part of the security system. Moreover, it must work in real time and be easily reconfigured. Such controller can be built by using fuzzy logic. In thi...
详细信息
When studying string vibrations, the linear wave equation is most often used. This does not take into account the dependence of the string tension force on the amplitude. For metals, even with a slight elongation, the...
详细信息
This paper addresses the task of learning periodic information using deep neural networks to achieve real-time, environment-independent sound source localization. Previous papers showed phase data is the most signific...
详细信息
The Light-Fidelity (Li-Fi) is a wireless communication technology that is light-based and can complete wireless fidelity (Wi-Fi) technologies for many applications. Li-Fi technology which uses light spectrum is a tech...
The Light-Fidelity (Li-Fi) is a wireless communication technology that is light-based and can complete wireless fidelity (Wi-Fi) technologies for many applications. Li-Fi technology which uses light spectrum is a technology for solving the lack of radio spectrum at Wi-Fi. One of the main benefits of Li-Fi technology is the ability to communicate by light with a high level of safety. However, the signal of Li-Fi technology is the same as other signals that are susceptible to eavesdropping because no security system is infallible. The objective of this paper is to decrease the computational cost of encryption and decryption and keep the security of transformed data when transmitted via Li-Fi technology. This study proposes the advanced Rivest Cipher 4 (ARC4) algorithm that will be used in the physical layer of Li-Fi applications. The novelty will be in the pseudo-random generation algorithm (PRGA) which is part of Rivest Cipher 4 (RC4). The data will become an index of the s-array and get the value of that index in the s-array instead of using the XOR operation. The proposed ARC4 was evaluated by the National Institute of Science and Technology (NIST) test. The obtained results illustrate that ARC4 is more robust and effective than RC4 when the data is transformed by Li-Fi communication.
We propose an online identification scheme for discrete-time piece-wise affine state-space models based on a system of adaptive algorithms running in two timescales. A stochastic approximation algorithm implements an ...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
We propose an online identification scheme for discrete-time piece-wise affine state-space models based on a system of adaptive algorithms running in two timescales. A stochastic approximation algorithm implements an online deterministic annealing scheme at a slow timescale, estimating the partition of the augmented state-input space that defines the switching signal. At the same time, an adaptive identification algorithm, running at a higher timescale, updates the parameters of the local models based on the estimate of the switching signal. Identifiability conditions for the switched system are discussed and convergence results are given based on the theory of two-timescale stochastic approximation. In contrast to standard identification algorithms for piece-wise affine systems, the proposed approach progressively estimates the number of modes needed and is appropriate for online system identification using sequential data acquisition. This progressive nature of the algorithm improves computational efficiency and provides real-time control over the performance-complexity trade-off, desired in practical applications. Experimental results validate the efficacy of the proposed methodology.
Multipliers can be used to guarantee both the Lyapunov stability and input-output stability of Lurye systems with time-invariant memoryless slope-restricted nonlinearities. If a dynamic multiplier is used there is no ...
The increasing adoption of machine learning and deep learning models in critical applications raises the issue of ensuring their trustworthiness, which can be addressed by quantifying the uncertainty of their predicti...
详细信息
Despite the drug approval process consists of extremely rigorous clinical and preclinical studies, not all side effects are identified before its marketing, posing a significant risk to public health. Furthermore, con...
详细信息
暂无评论