This paper studies an k-out-of-n:G system with redundant dependency and repair equipment procurement lead time where the operating times and repair times of components follow exponential distributions and phase-type d...
详细信息
This paper studies an k-out-of-n:G system with redundant dependency and repair equipment procurement lead time where the operating times and repair times of components follow exponential distributions and phase-type distributions,*** one component breaks down,it is repaired by a repair *** repair equipment may fail during the repair period and the following repair is not‘as good as new’.After a number of repairs,it is replaced by a new *** new spare repair equipment for replacement is only available by an order,and the procurement lead time for delivering follows a phase-type ***,in the multi-component system,the redundant dependency is taken into *** the matrix-analytical method,the system availability,the rate of occurrence of failures of the system,the expected number of broken components,the availability and the rate of occurrence of failures of the repair equipment are ***,numerical examples are given to show these theoretical results.
With the rising demand for intelligent services and privacy protection in consumer artificial intelligence (AI), federated edge learning has emerged as a beacon for privacy-preserving distributed machine learning. Thi...
详细信息
Wireless Charger Network (WCN) emerges as a promising networking paradigm, employing wireless chargers with Wireless Power Transfer (WPT) technology to provide long-term and sustainable energy supply for future networ...
详细信息
Radio Frequency Identification (RFID) technology is greatly supporting a variety of life and industry. Enhanced by sensors, RFID tags can monitor real-time information about attached objects and the environment, makin...
Radio Frequency Identification (RFID) technology is greatly supporting a variety of life and industry. Enhanced by sensors, RFID tags can monitor real-time information about attached objects and the environment, making efficient collection of tag information an important task. However, most works focus on collecting all tags but lack effective mechanisms to avoid interfering from irrelevant tags when the application only cares about a part of the tags in some cases. Besides, in more common scenarios with multiple RFID readers, existing works fail to effectively determine the surrounding tags for each reader, increasing the execution time. To conquer these defects, we propose a new solution called the efficient Vector-based target tag Information Collection (VIC) protocol to accelerate the collection rate. First, we introduce a composite vector to silence irrelevant tags and determine the local tags. During this process, the expected empty slots are skipped and the useless information transmitted by tags is reduced. Second, we use an allocation vector to collect tag information by resolving tag collision, thus improving the time efficiency. Finally, we provide theoretical analyses to optimize the parameter settings. Extensive experiments prove that VIC outperforms existing solutions by up to 32% increase in time efficiency.
The transformer architecture has achieved remarkable success in medical image analysis owing to its powerful capability for capturing long-range dependencies. However, due to the lack of intrinsic inductive bias in mo...
详细信息
This paper investigates a multi-component repairable system with double threshold control *** system is composed of n identical and independent components which operate simultaneously at the beginning,and it is down w...
详细信息
This paper investigates a multi-component repairable system with double threshold control *** system is composed of n identical and independent components which operate simultaneously at the beginning,and it is down when the number of operating components decreases to k−1(k≤n).When the number of failed components is less than the value L,the repairman repairs them with a low repair *** high repair rate is activated as soon as L failed components present,and continues until the number of failed components drops to the value N−*** the matrix analytical method,the Laplace transform technique and the properties of the phase type distribution,various performance measures including the availability,the rate of occurrence of failures,and the reliability are derived in transient and stationary ***,numerical examples are reported to show the behaviour of the system.
Recently, domain-specific PLMs have been proposed to boost the task performance of specific domains (e.g., biomedical and computer science) by continuing to pre-train general PLMs with domain-specific corpora. However...
详细信息
Three-way clustering assigns highly uncertain samples to the boundary domains, effectively addressing the problem of misclassification caused by data uncertainty. In numerical attribute information systems, neighborho...
Three-way clustering assigns highly uncertain samples to the boundary domains, effectively addressing the problem of misclassification caused by data uncertainty. In numerical attribute information systems, neighborhood rough sets can effectively capture the indiscernibility relations between objects. However, the conventional neighborhood relation suffers from a one-size-fits-all issue due to the fixed neighborhood radius. To solve these issues, we propose an intuitionistic neighborhood and construct a corresponding three-way clustering model. Specifically, we first capture the dual nature and uncertainty of neighborhood relations through the construction of the intuitionistic neighborhood. Then we construct a three-way clustering model with dual and single evaluation functions based on intuitionistic neighborhoods. Finally, we adaptively obtain the optimal threshold pairs by maximizing the clustering effectiveness index. Experiments conducted on twelve datasets demonstrate that our proposed method outperforms baseline methods, showing superior capability in handling the inherent uncertainty in information systems.
g-C3N4/TiO2 composite has excellent photoelectric properties and is considered as a good carrier of nanoparticles. A novel composite of nZVI-g-C3N4/TiO2 was successfully synthesized through in-situ growth nZVI on the ...
详细信息
Androgenic hair which is also named as body hair can be used for identifying criminals and victims. It is a new soft biometric trait. Different with skin mark, tattoo, blood vessels, and so on, androgenic hair is suit...
详细信息
暂无评论