Topological data analysis (TDA) is increasingly acknowledged within financial markets for its capacity to manage complexity and discern nuanced patterns and structures. It has been applied effectively to uncover intri...
详细信息
The article deals with the approaches to the definition of online education. Its basic components are described. There is considered the experience of the training of the students in the pedagogical universities to th...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and *** the exponential growth of digital data,robust security measures are *** encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key *** their individual benefits,both require significant computational ***,performing them separately for the same data increases complexity and processing *** the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and *** on 128-bit block sizes and a 256-bit secret key *** combines Huffman coding for compression and a Tent map for ***,an iterative Arnold cat map further enhances cryptographic confusion *** analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field.
This study delves into the unique aspects of the formation of digital financial literacy among future digital consultants., particularly focusing on the modules of the training program and the structure of the module ...
详细信息
Cybersecurity is a field that unifies concepts from various fundamental areas: mathematics, physics, computerscience, electronics, sociology, and management. This field is challenging for government authorities, acad...
详细信息
Instead of the traditional 'system-environment' pair for objects of the regional economy, it is proposed to consider metasystems - these objects together with all interacting objects of the microenvironment. E...
详细信息
We explore a continuous aggregated dynamic model for developing two gas fields. The new borehole commissioning rates are the control parameters. Changes in the average flow rate of producing boreholes and current natu...
详细信息
Latent confounding bias and collider bias are two key challenges of causal inference in observational studies. Latent confounding bias occurs when failing to control the unmeasured covariates that are common causes of...
详细信息
Latent confounding bias and collider bias are two key challenges of causal inference in observational studies. Latent confounding bias occurs when failing to control the unmeasured covariates that are common causes of treatments and outcomes, which can be addressed by using the Instrumental Variable (IV) approach. Collider bias comes from non-random sample selection caused by both treatments and outcomes, which can be addressed by using a different type of instruments, i.e., shadow variables. However, in most scenarios, these two biases simultaneously exist in observational data, and the previous methods focusing on either one are inadequate. To the best of our knowledge, no approach has been developed for causal inference when both biases exist. In this paper, we propose a novel IV approach, Two-Stage Shadow Inclusion (2SSI), which can simultaneously address latent confounding bias and collider bias by utilizing the residual of the treatment as a shadow variable. Extensive experimental results on benchmark synthetic datasets and a real-world dataset show that 2SSI achieves noticeable performance improvement when both biases exist compared to existing methods. Copyright 2024 by the author(s)
This study introduces a novel control framework for human-drone interaction (HDI) in industrial warehouses, targeting pick-and-delivery operations. The goals are to enhance operator safety as well as well-being and, a...
详细信息
This study introduces a novel control framework for human-drone interaction (HDI) in industrial warehouses, targeting pick-and-delivery operations. The goals are to enhance operator safety as well as well-being and, at the same time, to improve efficiency and reduce production costs. To these aims, the speed and separation monitoring (SSM) operation method is employed for the first time in HDI, drawing an analogy to the safety requirements outlined in collaborative robots' ISO standards. The so-called protective separation distance is used to ensure the safety of operators engaged in collaborative tasks with drones. In addition, we employ the rapid upper limb assessment (RULA) method to evaluate the ergonomic posture of operators during interactions with drones. To validate the proposed approach in a realistic industrial setting, a quadrotor is deployed for pick-and-delivery tasks along a predefined trajectory from the picking bay to the palletizing area, where the interaction between the drone and a moving operator takes place. The drone navigates toward the interaction space while avoiding collisions with shelves and other drones in motion. The control strategy for the drone cruise navigation integrates simultaneously the time-variant artificial potential field (APF) technique for trajectory planning and the iterative linear quadratic regulator (LQR) controller for trajectory tracking. Differently, in the descent phase, the receding horizon LQR algorithm is employed to follow a trajectory planned in accordance with the SSM, which starts from the approach point at the border of the interaction space and ends in the volume with the operator's minimum RULA. The presented control strategy facilitates drone management by adapting the drone's position to changes in the operator's position while satisfying HDI safety requirements. The results of the proposed HDI framework simulations for the case study demonstrate the effectiveness of the method in ensuring a safe and er
暂无评论