Unmanned Aerial Vehicles (UAVs) are being developed and researched to be used in different areas and diverse use cases. The delivery of medical parcels is an emergency service that avails from the air traffic for the ...
详细信息
The use of fragment insertion in the protein structure prediction problem can be considered one of the most successful strategies to add problem-dependent information. The well known Rosetta suite provides two protoco...
详细信息
One of the most challenging problems in Bioinformatics is the finding of a protein conformation and it is known as the Protein Structure Prediction (PSP) problem. The main feature present in the AB off-lattice model i...
详细信息
The connectivity requirements brought by Industry 4.0 pose new challenges for cyber-physical systems (CPS), such as the strengthening of their resilience against cyberattacks. In this paper, we use the discrete event ...
详细信息
The connectivity requirements brought by Industry 4.0 pose new challenges for cyber-physical systems (CPS), such as the strengthening of their resilience against cyberattacks. In this paper, we use the discrete event systems (DES) formalism to develop an approach that aims to protect CPS from covert actuator attacks using event permutation maps. In this approach, properly selected controllable events are permuted on the plant's site so that attacks on actuators do not have the impact on the plant as expected by the intruder and unsafe states are avoided. Furthermore, a property termed AE-protectability is presented to characterize the necessary and sufficient conditions for the system to be protected against such attacks through event permutations. The proposed approach is applied to a case study where the Identification of the attack is done without causing damage while maintaining the integrity of the system.
The 5G Quality-of-Service (QoS) objectives con-tributed to the Heterogeneous Cellular Network (HCN) evolution, dictating that applications can rely on low-latency and high-bandwidth networks. However, concurrent reque...
详细信息
ISBN:
(数字)9781665497923
ISBN:
(纸本)9781665497930
The 5G Quality-of-Service (QoS) objectives con-tributed to the Heterogeneous Cellular Network (HCN) evolution, dictating that applications can rely on low-latency and high-bandwidth networks. However, concurrent requests of large amount of multimedia data generate a burden on the backhaul and fronthaul networks due to redundant retransmissions and pose challenges for achieving the QoS objectives. Although mobile network operators can place content closer to the HCN edge to improve the overall QoS indicators, there are still challenges to design a cache policy aware of limited storage capacity, different content popularity, device mobility, and network congestion. This work innovates by introducing a cooperative policy to join caches placement and routing users' requests atop an HCN. By combining networking and cache QoS requirements, the policy balances the fronthaul network load and dynamically maps the caches to HCN resources. We formulated the cache policy through linear programming and in-depth evaluated its performance using extensive simulation scenarios. The results indicate that the proposed network-aware policy decreases the network latency, even when subject to changes in content popularity distribution and total HCN storage capacity.
Equipment monitoring for failure prediction is receiving attention from different sectors of society, such as industry, healthcare, and defense. In the defense domain, assets like military vehicles generate data that ...
详细信息
Over the past decade, there has been a steady increase in health security breaches. Therefore, healthcare organizations must protect their sensitive information such as test results, diagnoses, prescriptions, research...
Over the past decade, there has been a steady increase in health security breaches. Therefore, healthcare organizations must protect their sensitive information such as test results, diagnoses, prescriptions, research, and customer personal information. A leak of sensitive data can result in significant economic loss and damage to the organization’s image. In this sense, Data Leakage Prevention (DLP) systems can help to identify, monitor, protect, and reduce the risks of leaking sensitive data. However, state-of-the-art DLP solutions only use signature comparisons and static comparisons. Therefore, we propose to develop the ARTERIAL model based on Natural Language Processing (NLP), Entity Recognition (NER), and Artificial Neural Networks (ANN) to be more assertive in extracting information and recognizing entities from Electronic Health Records (EHR). Different from the current literature, ARTERIAL considers semantic features present in the EHR. Three approaches were implemented and tested, two based on ANN and the following based on machine learning algorithms. As a result, the approach taken in its implementation using a machine learning algorithm reached 98.0% of Precision, 86.0% of Recall, and 91.0% of F1-Score.
Protein structure prediction in three dimensions represents a fundamental challenge in Structural Bioinformatics. Leveraging problem-specific information such as fragment insertion, secondary structure, and contact ma...
详细信息
ISBN:
(数字)9798350356632
ISBN:
(纸本)9798350356649
Protein structure prediction in three dimensions represents a fundamental challenge in Structural Bioinformatics. Leveraging problem-specific information such as fragment insertion, secondary structure, and contact maps can significantly enhance the exploration of the search space. In this study, an evolutionary algorithm is introduced, which incorporates such problem information for protein structure prediction. The proposed method employs a dynamic speciation technique alongside fragment insertion to foster population diversity. To ensure a rich variety of fragments, a fragment library is constructed using the Rosetta Quota protocol. Additionally, information from contact maps and secondary structure is integrated into two selection strategies to facilitate a more thorough exploration of the conformational search space. The results of an experimental evaluation involving 9 proteins are presented, demonstrating competitive performance compared to existing literature. Evaluation metrics include RMSD, GDT, and processing time.
Computer games continue to present challenging experimental fields for developing Artificial Intelligence (AI) models. With Case-Based Reasoning and Clustering, this work proposes novel cases and clusters-based reuse ...
详细信息
Language differences are one of the obstacles to communication. Especially if you use certain regional languages such as Banjar Language. Banjar Language is the mother tongue used by the Banjar tribe in South Kalimant...
详细信息
暂无评论