This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Handwritten documents generated in our day-to-day office work, class room and other sectors of society carry vital information. Automatic processing of these documents is a pipeline of many challenging steps. The very...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by patient *** third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer *** ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and *** using all three approaches have not been examined till *** researchers found that Machine Learning(ML)techniques can improve ECG *** study will compare popular machine learning techniques to evaluate ECG *** algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization *** plus prior knowledge has the highest accuracy(99%)of the four ML *** characteristics failed to identify signals without chaos *** 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
Online shopping platforms are experiencing rapid growth, necessitating effective product recommendation systems to enhance customer satisfaction by recommending visually similar products. Traditional statistical techn...
详细信息
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa...
详细信息
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ...
详细信息
Blockchain as a decentralized storage technology is widely used in many *** has extremely strict requirements for reliability because there are many potentially malicious ***,blockchain is a chain storage structure fo...
详细信息
Blockchain as a decentralized storage technology is widely used in many *** has extremely strict requirements for reliability because there are many potentially malicious ***,blockchain is a chain storage structure formed by interconnecting blocks1),which are stored by full replication method,where each node stores a replica of all blocks and the data consistency is maintained by the consensus *** decrease the storage overhead,previous approaches such as BFT-Store and Partition Chain store blocks via erasure ***,existing erasure coding based methods utilize static encoding schema to tolerant f malicious nodes,but in the typical cases,the number of malicious nodes is much smaller than f as described in previous *** redundant parities to tolerate excessive malicious nodes introduces unnecessary storage *** solve the above problem,we propose Dynamic-EC,which is a Dynamic Erasure Coding method in permissioned blockchain *** key idea of Dynamic-EC is to reduce the storage overhead by dynamically adjusting the total number of parities according to the risk level of the whole system,which is determined by the number of perceived malicious nodes,while ensuring the system *** demonstrate the effectiveness of Dynamic-EC,we conduct several experiments on an open source blockchain software *** results show that,compared to the state-of-the-art erasure coding methods,Dynamic-EC reduces the storage overhead by up to 42%,and decreases the average write latency of blocks by up to 25%,respectively.
Cloud computing (CC) stores and accesses data over the internet, posing security risks from within the cloud service provider (CSP) or outsiders, especially in medical systems. Cryptography is crucial for security, bu...
详细信息
暂无评论