This paper addresses the leader-follower flocking problem with a moving leader for networked Lagrange systems with parametric uncertainties under a proximity graph. Here a group of followers move cohesively with the m...
详细信息
With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one o...
详细信息
This paper investigates the problem of H∞ filter design for a class of nonlinear networked system based on T-S fuzzy model. Multiple stochastic time-varying delays and some incomplete information are considered simul...
详细信息
ISBN:
(纸本)9781467374439
This paper investigates the problem of H∞ filter design for a class of nonlinear networked system based on T-S fuzzy model. Multiple stochastic time-varying delays and some incomplete information are considered simultaneously. Incomplete information includes randomly occurring sensor saturation and packet dropouts. Stochastic time-varying delays are depicted as a sequence of stochastic and independent variables, which take values on 0 and 1. Two sets of Bernoulli distributed white noises are introduced to describe randomly occurring sensor saturation and packet dropouts. system conservatism is reduced due to introduce an approach of piecewise quadratic Lyapunov function. By solving a set of linear matrix inequalities(LMIs), the filter parameters are obtained. Finally, a simulation example is provided to illustrate the effectiveness of the proposed filter design approach.
With increasing deployment of Web services, the research on the dependability and availability of Web service composition becomes more and more active. Since unexpected faults of Web service composition may occur in d...
详细信息
With increasing deployment of Web services, the research on the dependability and availability of Web service composition becomes more and more active. Since unexpected faults of Web service composition may occur in different levels at runtime, log analysis as a typical data- driven approach for fault diagnosis is more applicable and scalable in various architectures. Considering the trend that more and more service logs are represented using XML or JSON format which has good flexibility and interoperability, fault classification problem of semi-structured logs is considered as a challenging issue in this area. However, most existing approaches focus on the log content analysis but ignore the structural information and lead to poor performance. To improve the accuracy of fault classification, we exploit structural similarity of log files and propose a similarity based Bayesian learning approach for semi-structured logs in this paper. Our solution estimates degrees of similarity among structural elements from heterogeneous log data, constructs combined Bayesian network (CBN), uses similarity based learning algorithm to compute probabilities in CBN, and classifies test log data into most probable fault categories based on the generated CBN. Experimental results show that our approach outperforms other learning approaches on structural log datasets.
ETL (Extract-Transform-Load) usually includes three phases: extraction, transformation, and loading. In building data warehouse, it plays the role of data injection and is the most time-consuming activity. Thus it ...
详细信息
ETL (Extract-Transform-Load) usually includes three phases: extraction, transformation, and loading. In building data warehouse, it plays the role of data injection and is the most time-consuming activity. Thus it is necessary to improve the performance of ETL. In this paper, a new ETL approach, TEL (Transform-Extract-Load) is proposed. The TEL approach applies virtual tables to realize the transformation stage before extraction stage and loading stage, without data staging area or staging database which stores raw data extracted from each of the disparate source data systems. The TEL approach reduces the data transmission load, and improves the performance of query from access layers. Experimental results based on our proposed benchmarks show that the TEL approach is feasible and practical.
Cloud computing facilitates convenient and on-demand network access to a centralized pool of ***,many users prefer to outsource data to the cloud in order to mitigate the burden of local ***,storing sensitive data on ...
详细信息
Cloud computing facilitates convenient and on-demand network access to a centralized pool of ***,many users prefer to outsource data to the cloud in order to mitigate the burden of local ***,storing sensitive data on remote servers poses privacy challenges and is currently a source of ***(Searchable Encryption)is a positive way to protect users sensitive data,while preserving search ability on the server *** allows the server to search encrypted data without leaking information in plaintext *** two main branches of SE are SSE(Searchable Symmetric Encryption)and PEKS(Public key Encryption with keyword Search).SSE allows only private key holders to produce ciphertexts and to create trapdoors for search,whereas PEKS enables a number of users who know the public key to produce ciphertexts but allows only the private key holder to create *** article surveys the two main techniques of SE:SSE and *** SE schemes are categorized and compared in terms of functionality,efficiency,and ***,we point out some valuable directions for future work on SE schemes.
The first affiliation of the first author was incorrect in the published paper and should be revised as “1. College of Biological and Agricultural Engineering, Jilin University, Changchun 130022, China”.
The first affiliation of the first author was incorrect in the published paper and should be revised as “1. College of Biological and Agricultural Engineering, Jilin University, Changchun 130022, China”.
Wireless smart home system is to facilitate people's lives and it trend to adopt a more intelligent way to provide services. It is very desirable in the recent SH market for the system to recognize users' beha...
详细信息
Wireless smart home system is to facilitate people's lives and it trend to adopt a more intelligent way to provide services. It is very desirable in the recent SH market for the system to recognize users' behaviors and automatically response the corresponding activities to satisfy users' actual demands. However, activity models in the existing approaches are usually defined separately through knowledge-driven methods. These approaches cause that the activity models can't be matched with the services dynamically. To address the problem, we develop the semantic association model and a novel approach of activity recognition and guidance is presented. In our approach, the smart devices and users' requirements are described by semantic models. When the requirements are detected and understood, smart gateway can provide appropriate services, achieving activity assistance. The semantic association model allows all related elements in smart home connect with each other logically. The approach has been implemented and the results show that the success rate of the approach based on semantic association model is higher than 33% at average as compared to the approach based on predefined models. The proposed approach can effectively help people who are in trouble with learning or remembering in the common life.
Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fa...
详细信息
暂无评论