Interpretable online updated weights: Optimized square envelope spectrum for machine condition monitoring and fault diagnosis
Bearings are key components of rotating machines, and their condition monitoring and fault
diagnosis have received much attention from academia and industry in recent years …
diagnosis have received much attention from academia and industry in recent years …
Vessel trajectory prediction using historical automatic identification system data
For maritime safety and security, vessels should be able to predict the trajectories of nearby
vessels to avoid collision. This research proposes three novel models based on similarity …
vessels to avoid collision. This research proposes three novel models based on similarity …
An adaptive Markov strategy for defending smart grid false data injection from malicious attackers
We present a novel defending strategy, adaptive Markov strategy (AMS), to protect a smart-
grid system from being attacked by unknown attackers with unpredictable and dynamic …
grid system from being attacked by unknown attackers with unpredictable and dynamic …
Certain inequalities pertaining to some new generalized fractional integral operators
In this paper, we introduce the generalized left-side and right-side fractional integral
operators with a certain modified ML kernel. We investigate the Chebyshev inequality via …
operators with a certain modified ML kernel. We investigate the Chebyshev inequality via …
Results on Minkowski-type inequalities for weighted fractional integral operators
This article considers a general family of weighted fractional integral operators and utilizes
this general operator to establish numerous reverse Minkowski inequalities. When it comes …
this general operator to establish numerous reverse Minkowski inequalities. When it comes …
How the degeneracy helps for triangle counting in graph streams
We revisit the well-studied problem of triangle count estimation in graph streams. Given a
graph represented as a stream of m edges, our aim is to compute a (1+-ε)-approximation to …
graph represented as a stream of m edges, our aim is to compute a (1+-ε)-approximation to …
Severity: a QoS-aware approach to cloud application elasticity
A Tsagkaropoulos, Y Verginadis… - Journal of Cloud …, 2021 - Springer
While a multitude of cloud vendors exist today offering flexible application hosting services,
the application adaptation capabilities provided in terms of autoscaling are rather limited. In …
the application adaptation capabilities provided in terms of autoscaling are rather limited. In …
Sampled‐data control for cyber physical systems via identifying false data injection attacks
P Yu, J Wei, R Jia, J Wang, J Guo - International Journal of …, 2023 - Wiley Online Library
In this paper, we discuss the security control problem of cyber physical systems based on
identifying false data injection attacks. First, the unknown adversary randomly attacks the …
identifying false data injection attacks. First, the unknown adversary randomly attacks the …
One-Parameter Statistical Methods to Recognize DDoS Attacks
Within our academic high-speed network infrastructure which is used for connecting all
universities and high schools in our country to the Internet, there are thousands of …
universities and high schools in our country to the Internet, there are thousands of …
Noise-resistant quantum state compression readout
C Ding, XY Xu, YF Niu, S Zhang, WS Bao… - Science China Physics …, 2023 - Springer
Qubit measurement is generally the most error-prone operation that degrades the
performance of near-term quantum devices, and the exponential decay of readout fidelity …
performance of near-term quantum devices, and the exponential decay of readout fidelity …