The purpose of this work is to compare two forms of the Erlang distribution law: ordinary and normalized. The ordinary Erlang distribution is a special case of a more general gamma distribution and its mathematical ex...
详细信息
The remaining risk of safety-instrumented systems is an important non-functional requirement that is regulated by international standards. Several ways towards computing the safety as a function of its relevant design...
The remaining risk of safety-instrumented systems is an important non-functional requirement that is regulated by international standards. Several ways towards computing the safety as a function of its relevant design parameters have been studied in the literature. However, the standard approach only covers two special cases of high or low demand, which simplify the treatment by either ignoring the effects of demand rate or test interval on the safety. More detailed treatments in the literature derive Markov models, which can be numerically analyzed, or approximate solutions using Taylor series expansions etc. This paper introduces closed-form exact formulas for the average probability of failure on demand (PFD) and the resulting hazardous event frequency (HEF, or accident rate), taking into account demand rate and test interval. It integrates all cases of low, high and medium demand in one formula. The derivation is based on an analysis of the cyclostationary semi-Markov stochastic process of the safety-integrated system and its symbolic transient analysis over the test interval.
The sizes of regions of interest (ROI) obtained from images captured by cameras in palmprint recognition may vary depending on the camera specifications and the position of the hand. The regions of interest that recog...
详细信息
ISBN:
(数字)9798331531492
ISBN:
(纸本)9798331531508
The sizes of regions of interest (ROI) obtained from images captured by cameras in palmprint recognition may vary depending on the camera specifications and the position of the hand. The regions of interest that recognition systems can use are typically rescaled through interpolation techniques and then defined as inputs to the system. In such cases, there may be some loss of biometric data. This study aims to enhance the quality of the palmprint ROI images, which are critical for palmprint recognition systems. To achieve this, various super-resolution techniques were employed to reconstruct low-resolution ROI images to the target sizes while preserving the distinctiveness of their biometric features. This approach is designed to optimize recognition accuracy and improve data reliability in palmprint recognition processes.
Machine learning-based intrusion detection systems (IDS) have attracted considerable attention for their role in proactively identifying intrusion attempts and facilitating swift organizational response. While numerou...
详细信息
ISBN:
(数字)9781713899310
ISBN:
(纸本)9798350350562
Machine learning-based intrusion detection systems (IDS) have attracted considerable attention for their role in proactively identifying intrusion attempts and facilitating swift organizational response. While numerous researchers have conceptually discussed the potential negative impacts of high false alarms in machine learning-based IDS on organizations and have proposed various methods to reduce them, there is a shortage of studies that explore how these false alarms can exacerbate cyberattack damage in different organizational settings and in the face of various cyberattack campaigns. This paper introduces an agent-based modeling and simulation approach to assess false alarm consequences in machine learning-based IDS during dual Denial of Service (DoS) and phishing attacks. The IDS with distinct false positive rates, constructed using the KDD Cup 1999 dataset with diverse machine learning algorithms, were simulated to analyze how these varying false alarm rates affect the extent of damage caused by phishing and DoS attacks.
Medical imagery has been increasingly used in diagnosing and treating various diseases, leading to advances in healthcare. While humans usually lead the qualitative interpretation of visual features, Automated Classif...
详细信息
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understanding existing potential, researchers can inform targeted strategies for future development. The methodology combines Logistic Regression in Orange Data Mining to enhance classification accuracy. Hierarchical Clustering is used to analyze 7,777 image results. Findings reveal that Tourism (C3) has the most potential, followed by Culinary (C2) and Culture (C4), while Handcrafts (C1) exhibit the least potential. In conclusion, logistic regression successfully identifies influential aspects of Sukabumi through Instagram images, aiding potential development
The proliferation of Deep Neural Networks has resulted in machine learning systems becoming increasingly more present in various real-world applications. Consequently, there is a growing demand for highly reliable mod...
详细信息
Automated Guided Vehicles (AGVs) are a key component of many modern industrial systems. AGVs are supposed to communicate with each other in real time using wireless networks. In this article, the advantages and disadv...
Automated Guided Vehicles (AGVs) are a key component of many modern industrial systems. AGVs are supposed to communicate with each other in real time using wireless networks. In this article, the advantages and disadvantages of the ZigBee wireless network related to the control of AGVs are considered. We analyze the performance of the ZigBee network programmed with both C# and Python libraries to control ZigBee devices. The throughput and signal strength are presented and discussed depending on the transmission speed of the serial port, the payload size, and the presence and distance from the obstacles. The results of the experiments show the effective values of these parameters, the methods of using C# and Python, and the reliability of the throughput up to a certain point in network devices.
For better protection of distributedsystems, two well-known techniques are: checkpointing and rollback recovery. While failure protection is often considered a separate issue, it is crucial for establishing better se...
详细信息
The Internet of Things (IoT) paradigm is drastically changing our world by making everyday objects an integral part of the Internet. This transformation is increasingly being adopted in the healthcare sector, where Sm...
详细信息
暂无评论