作者:
Liu, HongjianWang, ZidongShen, BoAlsaadi, Fuad E.[a] School of Information Science and Technology
Donghua University Shanghai China.[b] Department of Computer Science Brunel University London Uxbridge United Kingdom.[c] Communication Systems and Networks (CSN) Research Group Faculty of Engineering King Abdulaziz University Jeddah Saudi Arabia.[d] School of Mathematics Anhui Polytechnic University Wuhu China.
This paper deals with the robust [Formula omitted.] state estimation problem for a class of memristive recurrent neural networks with stochastic time-delays. The stochastic time-delays under consideration are governed...
详细信息
This paper deals with the robust [Formula omitted.] state estimation problem for a class of memristive recurrent neural networks with stochastic time-delays. The stochastic time-delays under consideration are governed by a Bernoulli-distributed stochastic sequence. The purpose of the addressed problem is to design the robust state estimator such that the dynamics of the estimation error is exponentially stable in the mean square, and the prescribed [Formula omitted.] performance constraint is met. By utilizing the difference inclusion theory and choosing a proper Lyapunov-Krasovskii functional, the existence condition of the desired estimator is derived. Based on it, the explicit expression of the estimator gain is given in terms of the solution to a linear matrix inequality. Finally, a numerical example is employed to demonstrate the effectiveness and applicability of the proposed estimation approach.
Business analytics is an important means of gaining new insights and understanding of business performance. Data mining technology provides information needed by business analytics based on data. But due to the barrie...
详细信息
ISBN:
(纸本)9781509034857
Business analytics is an important means of gaining new insights and understanding of business performance. Data mining technology provides information needed by business analytics based on data. But due to the barriers of skill, resource and cost, business analytics is hard to carry out and put into practice for small and even medium sized enterprises. This paper presents a novel concept named Highly Consumable Business Analytics (HCBA) aiming to improve consumability of business analytics. We discuss the ways to simplify the use of data mining algorithms, establish end-to-end integrated lifecycle management of model and ultimately wrap models into web service to provide model-wise services. We propose a general reference architecture of HCBA. And a prototype is designed and implemented based on this architecture.
In interactive metaheuristic search, the human helps to steer the trajectory of the search by providing qualitative evaluation to assist in the selection of solution individuals. It can be challenging to design mechan...
详细信息
This study will shed light on the opportunities for improvements in the function of interaction between Interactive art installations and the spectators. Where a synthesis of the analysis and evaluation of sensory, co...
详细信息
Compression and encryption are widely used in network traffic in order to improve efficiency and security of some *** propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstr...
详细信息
Compression and encryption are widely used in network traffic in order to improve efficiency and security of some *** propose a scheme to concatenate both functions and run them in a paralle pipelined fashion,demonstrating both a hardware and a software *** minor modifications to the hardware accelerators,latency can be reduced to ***,we also propose a seminal and more efficient scheme,where we integrate the technology of encryption into the compression *** new integrated optimization scheme reaches an increase of 1.6X by using parallel software scheme However,the security level of our new scheme is not desirable compare with previous ***,we prove that this does not affect the application of our schemes.
This paper presents an approach for modelling and generating Context-Aware and Mobile (CAM) applications based on (i) Model-Driven engineering and (ii) context acquisition middleware concepts. Our approach allows soft...
详细信息
This paper presents an approach for modelling and generating Context-Aware and Mobile (CAM) applications based on (i) Model-Driven engineering and (ii) context acquisition middleware concepts. Our approach allows software engineers to build CAM applications by modelling contextual information and rule-based behaviour on a visual notation. These graphical models are transformed into an Android-based code, targeted for a context-aware middleware called LoCCAM, which encapsulates device sensors access. An initial user evaluation conducted with a group of fourteen computer science volunteers was implemented and indicates time reduction gains in the middleware configuration process and that the complexity in the writing of contextual behaviour of applications is also decreased.
An indeterminate string (or, more simply, just a string) x=x[1.n] on an alphabet Σ is a sequence of nonempty subsets of Σ. We say that x[i1] and x[i2] match (written x[i1]≈x[i2]) if and only if x[i1]∩x[i2]∗. A fea...
详细信息
In this paper, a review on radio-over-fiber (RoF) technology is conducted to support the exploding growth of mobile broadband. An RoF system will provide a platform for distributed antenna system (DAS) as a fronthaul ...
详细信息
ISBN:
(纸本)9781509025275
In this paper, a review on radio-over-fiber (RoF) technology is conducted to support the exploding growth of mobile broadband. An RoF system will provide a platform for distributed antenna system (DAS) as a fronthaul of long term evolution (LTE) technology. A higher splitting ratio from a macrocell is required to support large DAS topology, hence higher optical launch power (OLP) is the right approach. However, high OLP generates undesired nonlinearities, namely the stimulated Brillouin scattering (SBS). Three different aspects of solving the SBS process are covered in this paper, where the solutions ultimately provided an additional 4 dB link budget.
The main quest for cloud stakeholders is to find an optimal deployment architecture for cloud applications that maximizes availability, minimizes cost, and addresses portability and scalability. Unfortunately, the lac...
详细信息
The main quest for cloud stakeholders is to find an optimal deployment architecture for cloud applications that maximizes availability, minimizes cost, and addresses portability and scalability. Unfortunately, the lack of a unified definition and adequate modeling language and methodologies that address the cloud domain specific characteristics makes architecting efficient cloud applications a daunting task. This paper introduces Stratus ML: a technology agnostic integrated modeling framework for cloud applications. Stratus ML provides an intuitive user interface that allows the cloud stakeholders (i.e., providers, developers, administrators, and financial decision makers) to define their application services, configure them, specify the applications' behaviour at runtime through a set of adaptation rules, and estimate cost under diverse cloud platforms and configurations. Moreover, through a set of model transformation templates, Stratus ML maintains consistency between the various artifacts of cloud applications. This paper presents Stratus ML and illustrates its usefulness and practical applicability from different stakeholder perspectives. A demo video, usage scenario and other relevant information can be found at the Stratus ML webpage.
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems again...
详细信息
ISBN:
(纸本)9781467387163
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems against cyber attacks. An Intrusion Tolerance Systems play a crucial role in maintaining the service continuity and enhancing the security compared with the traditional security. In this paper, we propose to combine a preventive maintenance with existing intrusion tolerance system to improve the system security. We use a semi-Markov process to model the system behavior. We quantitatively analyze the system security using the measures such as system availability, Mean Time To Security Failure and cost. The numerical analysis is presented to show the feasibility of the proposed approach.
暂无评论