Romanbaun2566

Z Iurium Wiki

We evaluated these improved processes by carrying out four objective tests (PESQ, LSD, Bit-error-rate, and accuracy of frame synchronization) to determine whether inaudibility and blind-detectability could be satisfied. We also evaluated all combinations with the two forms of data embedding for blind detection with frame synchronization by carrying out BER tests to determine whether confidentiality could be satisfied. Finally, we comparatively evaluated the proposed method by carrying out ten robustness tests against various processing and attacks. Epigenetics inhibitor Our findings showed that an inaudible, robust, blindly detectable, and confidential speech watermarking method based on the proposed LP-DSS scheme could be achieved.In this study, the relationship between cardiovascular signal entropy and the risk of seven-year all-cause mortality was explored in a large sample of community-dwelling older adults from The Irish Longitudinal Study on Ageing (TILDA). The hypothesis under investigation was that physiological dysregulation might be quantifiable by the level of sample entropy (SampEn) in continuously noninvasively measured resting-state systolic (sBP) and diastolic (dBP) blood pressure (BP) data, and that this SampEn measure might be independently predictive of mortality. Participants' date of death up to 2017 was identified from official death registration data and linked to their TILDA baseline survey and health assessment data (2010). BP was continuously monitored during supine rest at baseline, and SampEn values were calculated for one-minute and five-minute sections of this data. In total, 4543 participants were included (mean (SD) age 61.9 (8.4) years; 54.1% female), of whom 214 died. Cox proportional hazards regression models were used to estimate the hazard ratios (HRs) with 95% confidence intervals (CIs) for the associations between BP SampEn and all-cause mortality. Results revealed that higher SampEn in BP signals was significantly predictive of mortality risk, with an increase of one standard deviation in sBP SampEn and dBP SampEn corresponding to HRs of 1.19 and 1.17, respectively, in models comprehensively controlled for potential confounders. The quantification of SampEn in short length BP signals could provide a novel and clinically useful predictor of mortality risk in older adults.The preprocessing of data is an important task in rough set theory as well as in Entropy. The discretization of data as part of the preprocessing of data is a very influential process. Is there a connection between the segmentation of the data histogram and data discretization? The authors propose a novel data segmentation technique based on a histogram with regard to the quality of a data discretization. The significance of a cut's position has been researched on several groups of histograms. A data set reduct was observed with respect to the histogram type. Connections between the data histograms and cuts, reduct and the classification rules have been researched. The result is that the reduct attributes have a more irregular histogram than attributes out of the reduct. The following discretization algorithms were used the entropy algorithm and the Maximal Discernibility algorithm developed in rough set theory. This article presents the Cuts Selection Method based on histogram segmentation, reduct of data and MD algorithm of discretization. An application on the selected database shows that the benefits of a selection of cuts relies on histogram segmentation. The results of the classification were compared with the results of the Naïve Bayes algorithm.As communication systems evolve to better cater to the needs of machine-type applications such as remote monitoring and networked control, advanced perspectives are required for the design of link layer protocols. The age of information (AoI) metric has firmly taken its place in the literature as a metric and tool to measure and control the data freshness demands of various applications. AoI measures the timeliness of transferred information from the point of view of the destination. In this study, we experimentally investigate AoI of multiple packet flows on a wireless multi-user link consisting of a transmitter (base station) and several receivers, implemented using software-defined radios (SDRs). We examine the performance of various scheduling policies under push-based and pull-based communication scenarios. For the push-based communication scenario, we implement age-aware scheduling policies from the literature and compare their performance with those of conventional scheduling methods. Then, we investigate the query age of information (QAoI) metric, an adaptation of the AoI concept for pull-based scenarios. We modify the former age-aware policies to propose variants that have a QAoI minimization objective. We share experimental results obtained in a simulation environment as well as on the SDR testbed.A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different attacks can occur in the IoT network. The parameters of the Bayesian network are estimated with the maximum likelihood method applied to a data set obtained from the simulation of attacks, in five simulation scenarios. For the risk assessment, inferences in the Bayesian network and the impact of the attacks are considered, focusing on DoS attacks, MitM attacks and both at the same time to the devices that allow the automation of the smart home and that are generally the ones that individually have lower levels of security.This article proposes the Bayesian surprise as the main methodology that drives the cognitive radar to estimate a target's future state (i.e., velocity, distance) from noisy measurements and execute a decision to minimize the estimation error over time. The research aims to demonstrate whether the cognitive radar as an autonomous system can modify its internal model (i.e., waveform parameters) to gain consecutive informative measurements based on the Bayesian surprise. By assuming that the radar measurements are constructed from linear Gaussian state-space models, the paper applies Kalman filtering to perform state estimation for a simple vehicle-following scenario. According to the filter's estimate, the sensor measures the contribution of prospective waveforms-which are available from the sensor profile library-to state estimation and selects the one that maximizes the expectation of Bayesian surprise. Numerous experiments examine the estimation performance of the proposed cognitive radar for single-target tracking in practical highway and urban driving environments. The robustness of the proposed method is compared to the state-of-the-art for various error measures. Results indicate that the Bayesian surprise outperforms its competitors with respect to the mean square relative error when one-step and multiple-step planning is considered.Even though there is a pressing interest in clean energy sources, compression ignition (CI) engines, also called diesel engines, will remain of great importance for transportation sectors as well as for power generation in stationary applications in the foreseeable future. In order to promote applications dealing with complex diesel alternative fuels by facilitating their integration in numerical simulation, this paper targets three objectives. First, generate novel diesel fuel surrogates with more than one component. Here, five surrogates are generated using an advanced chemistry solver and are compared against three mechanisms from the literature. Second, validate the suggested reaction mechanisms (RMs) with experimental data. For this purpose, an engine configuration, which features a reacting spray flow evolving in a direct-injection (DI), single-cylinder, and four-stroke motor, is used. The RNG k-Epsilon coupled to power-law combustion models is applied to describe the complex in-cylinder turbulent reacting flow, while the hybrid Eulerian-Lagrangian Kelvin Helmholtz-Rayleigh Taylor (KH-RT) spray model is employed to capture the spray breakup. Third, highlight the impact of these surrogate fuels on the combustion properties along with the exergy of the engine. The results include distribution of temperature, pressure, heat release rate (HRR), vapor penetration length, and exergy efficiency. The effect of the surrogates on pollutant formation (NOX, CO, CO2) is also highlighted. The fifth surrogate showed 47% exergy efficiency. The fourth surrogate agreed well with the maximum experimental pressure, which equaled 85 Mpa. The first, second, and third surrogates registered 400, 316, and 276 g/kg fuel, respectively, of the total CO mass fraction at the outlet. These quantities were relatively higher compared to the fourth and fifth RMs.Preserving confidentiality of individuals in data disclosure is a prime concern for public and private organizations. The main challenge in the data disclosure problem is to release data such that misuse by intruders is avoided while providing useful information to legitimate users for analysis. We propose an information theoretic architecture for the data disclosure problem. The proposed framework consists of developing a maximum entropy (ME) model based on statistical information of the actual data, testing the adequacy of the ME model, producing disclosure data from the ME model and quantifying the discrepancy between the actual and the disclosure data. The architecture can be used both for univariate and multivariate data disclosure. We illustrate the implementation of our approach using financial data.In the era of the Internet of Things, there are many applications where numerous devices are deployed to acquire information and send it to analyse the data and make informed decisions. In these applications, the power consumption and price of the devices are often an issue. In this work, analog coding schemes are considered, so that an ADC is not needed, allowing the size and power consumption of the devices to be reduced. In addition, linear and DFT-based transmission schemes are proposed, so that the complexity of the operations involved is lowered, thus reducing the requirements in terms of processing capacity and the price of the hardware. The proposed schemes are proved to be asymptotically optimal among the linear ones for WSS, MA, AR and ARMA sources.In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era. Then, we will describe the positioning of mathematical cryptography and quantum cryptography, that are currently being researched and developed. Quantum cryptography includes QKD and quantum stream cipher, but we point out that the latter is expected as the core technology of next-generation communication systems. Various ideas have been proposed for QKD quantum cryptography, but most of them use a single-photon or similar signal. Then, although such technologies are applicable to special situations, these methods still have several difficulties to provide functions that surpass conventional technologies for social systems in the real environment. Thus, the quantum stream cipher has come to be expected as one promising countermeasure, which artificially creates quantum properties using special modulation techniques based on the macroscopic coherent state.

Autoři článku: Romanbaun2566 (Bradley Ralston)