In this research work, we present a flexible iridium oxide (IrOx) extended-gate field-effect transistor (EGFET) biosensor for label-free detection of the epidermal growth factor receptor (EGFR) biomarker. IrOx was emp...
详细信息
The internet of things (IoT) enables heterogeneous devices to independently participate in global communications; however, it exposes the low power devices with minimum capabilities to vulnerability. This has led to t...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
The internet of things (IoT) enables heterogeneous devices to independently participate in global communications; however, it exposes the low power devices with minimum capabilities to vulnerability. This has led to the rise of attackers who leverage their attacks on low power devices to collect private data, without the user knowledge. In this paper, we look at the possibility of creating a supervised machine learning mechanism that autonomously detects packet being sent over the systems before it has reached the internet. The proposed model is trained to identify distributed denial of service (DDoS) attacks for outgoing packets, and subsequently inform and send the detected data to a monitoring node. Considering the low power devices, the proposed solution enables a rule-based system where packets can be detected with binary decisions. However, the rules and detection requires decision tree model training with appropriate datasets. Our evaluations show that the proposed mechanism can detect malicious packets without incurring additional delays in the communication by forwarding all packets to intermediate routers or fog nodes for inspection.
Available methods for identification of stochastic dynamical systems from input-output data generally impose restricting structural assumptions on either the noise structure in the data-generating system or the possib...
详细信息
Highway vehicular traffic is an inherently multi-agent problem. Traffic jams can appear and disappear mysteriously. We develop a method for traffic flow control that is applied at the vehicular level via mean-field ga...
详细信息
This paper proposes an observer-based formation tracking control approach for multi-vehicle systems with second-order motion dynamics, assuming that vehicles’ relative or global position and velocity measurements are...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This paper proposes an observer-based formation tracking control approach for multi-vehicle systems with second-order motion dynamics, assuming that vehicles’ relative or global position and velocity measurements are unavailable. It is assumed that all vehicles are equipped with sensors capable of sensing the bearings relative to neighboring vehicles and only one leader vehicle has access to its global position. Each vehicle estimates its absolute position and velocity using relative bearing measurements and the estimates of neighboring vehicles received over a communication network. A distributed observer-based controller is designed, relying only on bearing and acceleration measurements. This work further explores the concept of the Bearing Persistently Exciting (BPE) formation by proposing new algorithms for bearing-based localization and state estimation of second-order systems in centralized and decentralized manners. It also examines conditions on the desired formation to guarantee the exponential stability of distributed observer-based formation tracking controllers. In support of our theoretical results, some simulation results are presented to illustrate the performance of the proposed observers as well as the observer-based tracking controllers.
With the increasing amount of digital data, data deduplication has become an increasingly popular method for reducing data in large-scale storage systems. Generalized deduplication is an alternative technique for redu...
With the increasing amount of digital data, data deduplication has become an increasingly popular method for reducing data in large-scale storage systems. Generalized deduplication is an alternative technique for reducing the cost of data storage by identifying similar data chunks. This paper proposes TL-GD, a method for improving cloud storage efficiency using generalized deduplication focusing on textual datasets. The core concept of this study is to develop an efficient deduplication system that combines an alternative technique for splitting data into smaller pieces and a new approach for transforming data pieces into bases and deviations. The performance of the system has been validated using two real-world datasets. We also compare the results to state-of-the-art deduplication methods. Our evaluation results show that TL-GD achieves nearly 67% lossless compression for textual navigation instructions datasets, which is a 25% improvement on average compared to existing deduplication techniques.
Macular edema is a primary cause of blindness and loss of vision in people with visual retinal disorders. An insufficient dataset may result in overfitting, reducing the model’s ability for generalize the diverse cas...
详细信息
Digital image processing aims to improve the quality of an original image so that it can display an image that is relatively better than the original image, so as to obtain the detailed information needed for an analy...
详细信息
Bus-clamping Pulse Width Modulation (PWM) is an effective method to reduce the switching loss in a three-phase voltage source inverter (VSI). In bus-clamping PWM scheme, the phase legs are switched using high frequenc...
详细信息
We introduce a class of first-order methods for smooth constrained optimization that are based on an analogy to non-smooth dynamical systems. Two distinctive features of our approach are that (i) projections or optimi...
详细信息
We introduce a class of first-order methods for smooth constrained optimization that are based on an analogy to non-smooth dynamical systems. Two distinctive features of our approach are that (i) projections or optimizations over the entire feasible set are avoided, in stark contrast to projected gradient methods or the Frank-Wolfe method, and (ii) iterates are allowed to become infeasible, which differs from active set or feasible direction methods, where the descent motion stops as soon as a new constraint is encountered. The resulting algorithmic procedure is simple to implement even when constraints are nonlinear, and is suitable for large-scale constrained optimization problems in which the feasible set fails to have a simple structure. The key underlying idea is that constraints are expressed in terms of velocities instead of positions, which has the algorithmic consequence that optimizations over feasible sets at each iteration are replaced with optimizations over local, sparse convex approximations. In particular, this means that at each iteration only constraints that are violated are taken into account. The result is a simplified suite of algorithms and an expanded range of possible applications in machine learning.
暂无评论