Medical centres are obliged to store past medical records, including the results of quality assurance (QA) tests of the medical equipment, which is especially useful in checking reproducibility of medical devices and ...
Medical centres are obliged to store past medical records, including the results of quality assurance (QA) tests of the medical equipment, which is especially useful in checking reproducibility of medical devices and procedures. Analysis of multivariate time series is an important part of quality control of NMR data. In this work we proposean anomaly detection tool based on Reiteration of Hankel Singular Value Decomposition method. The presented method was compared with external software and authors obtained comparable results.
In this paper we present three concepts of stability for discrete linear inclusions, i.e. uniform power equistability, power equistability and selectable stability. The main result states that first two concepts are e...
详细信息
In this paper we present three concepts of stability for discrete linear inclusions, i.e. uniform power equistability, power equistability and selectable stability. The main result states that first two concepts are equivalent. Moreover they are equivalent to the fact that a numerical quantity called generalized spectral radius is less than one. Finally, we show the relation between the joint spectral subradius and selectable stability.
Repetitive processes are a class of 2D systems that can be used to model physical systems and also there are applications, such as iterative learning control, where using a repetitive processes setting for design has ...
详细信息
Repetitive processes are a class of 2D systems that can be used to model physical systems and also there are applications, such as iterative learning control, where using a repetitive processes setting for design has advantages over alternatives. In most cases, it is discrete dynamics that are basis for design and often there will be a need to deal with uncertainty in the process model and the effects of disturbances. This paper develops new algorithms for these tasks that are computed using linear matrix inequalities when the uncertainty is modeled using two standard representations and disturbance attenuation is measured by an norm. The extension of these algorithms to control law design is also developed.
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers...
详细信息
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue. In such cases, current differential privacy mechanisms cannot inform the end user that the sanitized data might not be reliable. We propose a new differential privacy algorithm that signals the user when relative errors surpass a predefined threshold. This allows users running complex differential privacy algorithms, such as sequence processing or geographical data analysis, to improve utility through better management of large errors. We prove that our algorithm satisfies differential privacy, and perform a formal analysis of its performance. Finally, we provide guidelines on how to customize behaviour to improve results.
We investigate the numerical solution of a special type of descriptor continuous-time Riccati equation which is key to several problems in robust control formulated for a general system. We give necessary and sufficie...
详细信息
ISBN:
(纸本)9781467371605
We investigate the numerical solution of a special type of descriptor continuous-time Riccati equation which is key to several problems in robust control formulated for a general system. We give necessary and sufficient existence conditions together with computable formulas for both stabilizing and antistabilizing solutions in terms of an associated matrix pencil. Analytic formulas for computing normalized coprime factorizations of a general system are presented as a direct application.
The paper deals with an analysis of automaticcontrol system with continuous and discrete PID controllers. A method of tuning the parameters of the continuous controller is presented, which is optimal according to the...
详细信息
The paper deals with an analysis of automaticcontrol system with continuous and discrete PID controllers. A method of tuning the parameters of the continuous controller is presented, which is optimal according to the ITAE criterion. The behavior of control systems with discrete controllers whose parameters were tuned using the mentioned method are described. The impact of changes in the sampling period of controlled signal on the control quality is shown. Changes of the values of optimal parameters of discrete PID controllers in relation to changes of the sampling rate of controlled signal are characterized.
The main effects of atmospheric turbulence on the laser beams propagation are scintillation, beam wandering, and phase front distortion. The first two can be compensated simply by using aperture averaging, whereas the...
详细信息
ISBN:
(纸本)9781509025275
The main effects of atmospheric turbulence on the laser beams propagation are scintillation, beam wandering, and phase front distortion. The first two can be compensated simply by using aperture averaging, whereas the later, which is of high importance in high data rates free space optics communications, is much more complex. This paper gives a review of principal analytical methods used to simulate and characterize the optical beam propagation through the turbulence channel focussing on phase front distortion. The paper presents simple models suitable for computer simulations of beam wandering and scintillation. This is followed by more complex theoretical approaches in analysing the turbulence induced phase front distortion and the calculation of the mutual coherence function of partially coherent beams propagating through an inhomogeneous medium. The theoretical analysis of beam coherence and phase front distortion due to turbulence represents the first step for elaboration of the mitigation methods.
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the prolif...
详细信息
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the proliferation of more complex cyber threats imposes a difficult task for information security assurance. Therefore, it is clear that new solutions are required. In this paper we propose a wrapper feature selection approach that combines an improved version of the Binary Bat Algorithm with two classifiers (C4.5 and SVM). We test our proposed model on the NSL-KDD dataset and empirically prove that our method can boost the performance of the classifiers and outperforms BBA and BPSO in terms of attack detection rate and false alarm rate, obtained after a fewer number of iterations. Furthermore, we reduced the number of features with almost 64% and improved the performances of the classifier, even for unknown intrusions.
The continuous proliferation of more complex and various security threats leads to the conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent solution because they can deal with the...
详细信息
The continuous proliferation of more complex and various security threats leads to the conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent solution because they can deal with the large data volumes of logs gathered from the multitude of systems and can even identify new types of attacks if based on anomaly detection. In this paper we propose an IDS model which includes two stages: feature selection with information gain and detection with Support Vector Machines (SVM). A draw-back of SVM is that its performance results are influenced by its user input parameters. Therefore, in order to better the classifier we exploit the advantages of a recent Swarm Intelligence (SI) algorithm, the Bat Algorithm (BA), which we improve by enhancing its randomization with Lévy flights. We test our model for the NSL-KDD dataset and prove that it can outperform the original BA, ABC or the popular PSO.
The paper investigates the expressive power of the temporal query language LH. We show that First-Order Logic is unable to formulate queries such as temporal connectivity, which can be naturally expressed by LH. The p...
详细信息
The paper investigates the expressive power of the temporal query language LH. We show that First-Order Logic is unable to formulate queries such as temporal connectivity, which can be naturally expressed by LH. The paper describes in detail our application of the Ehrenfeucht-Fräýsse method, which is used to examine limitations in the expressive power of First-Order Logic.
暂无评论