Science topics: Redundancy
Science topic
Redundancy - Science topic
Explore the latest publications in Redundancy, and find Redundancy experts.
Publications related to Redundancy (10,000)
Sorted by most recent
System rooms, which must work 24/7 uninterruptedly, are the most important elements of the informatics infrastructure. The system rooms in the data centers should have a dynamic that should work without interruption of service and data loss in the server, storage, network and intermediate components where the digitalized data is kept and processed...
Industrial Internet of Things (IIoT) is a collaboration of sensors, networking equipment, and devices to collect data from industrial operations. IIoT systems possess numerous security vulnerabilities due to inter-connectivity and limited computational power. Machine learning based intrusion detection system (IDS) is one possible security approach...
Schools and community halls are frequently chosen as disaster evacuation centres during difficult flood incidences. However, the buildings' existing designs and facilities are designed for their respective uses and are inefficient for disaster relief. Thus, the buildings' suitability as disaster evacuation centres is in doubt. It is therefore recom...
All fields of science depend on mathematical models. One of the fundamental problems with using complex nonlinear models is that data-driven parameter estimation often fails because interactions between model parameters lead to multiple parameter sets fitting the data equally well. Here, we develop a new method to address this problem, FixFit, whic...
In the Internet of Things (IoT) communications, visual data is frequently processed among intelligent devices using artificial intelligence algorithms, replacing humans for analyzing and decision-making while only occasionally requiring human’s scrutiny. However, due to high redundancy of compressive encoders, existing image coding solutions for ma...
Most existing online knowledge distillation (OKD) techniques typically require sophisticated modules to produce diverse knowledge for improving students' generalization ability. In this paper, we strive to fully utilize multi-model settings instead of well-designed modules to achieve a distillation effect with excellent generalization performance....
In order to estimate the power system accurately and identify anomaly detection in real time, an identification method of anomaly detection in power system state estimation based on Fuzzy C-means algorithm is proposed. Considering the problems of scale and redundancy of power system measurement data, effective measurement data of the power system i...
When the winding of the power transformer is short-circuited, the winding will experience constant vibration, which will cause axial instability of the winding, and then lead to winding looseness, deformation, bulge, etc., therefore, a diagnosis method based on the Improved Pelican Optimization Algorithm and Convolutional Neural Network (IPOA-CNN)...
There is increasing interest in star recruitment policies as a means to catalyze the development of clusters in targeted research areas. While there is growing evidence of positive star-arrival effects, we know less about how relatedness to the arriving star intermediates the size of the productivity effect on co-located peers. In the context of sc...
Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. First, based on the four modules of data collec...
The conventional powertrain for ultralight aviation consists of a fixed pitch propeller connected to an internal combustion engine (ICE). Since ICEs have a limited thermal efficiency (<40%), new and more efficient powerplant configurations have recently been proposed in the scientific literature by adopting hybrid electric solutions. Hybridization...
The focus of this paper is to provide a comparative analysis of various common-ground converters that serve as dual-purpose power electronic interfaces. These interfaces are designed to be used in both DC and single-phase AC grids, utilizing the same terminals for both modes of operation. The idea lies in the utilization of the same semiconductors...
As one of the more difficult problems in the field of computer vision, utilizing object image detection technology in a complex environment includes other key technologies, such as pattern recognition, artificial intelligence, and digital image processing. However, because an environment can be complex, changeable, highly different, and easily conf...
The performance growth in processors has been continuing toward increasing the number of processing cores on the chip and scaling the feature size of transistors. However, in the nanoera, side effects of the scaling, such as induced heterogeneities in the performance, power, and soft error rate of identically designed cores, prevent the potential p...
This paper verifies the applicability of the proposed code to dynamic Network on Chips that have variable faulty blocks with runtime suggesting an online error detection mechanism with adaptive routing algorithm that bypasses faulty components dynamically and the router architecture uses additional diagonal state indications for the reliable networ...
Object tracking using Hyperspectral Images (HSIs) obtains satisfactory result in distinguishing objects with similar colors. Yet, the tracking algorithm tends to fail when the target undergoes deformation. In this paper, a SiamRPN based hyperspectral tracker is proposed to deal with this problem. Firstly, a band selection method based on a genetic...
We examine the impediments to rapid recovery from a supply chain disruption through rapid supply chain growth in capacity. We explore how to minimize the effects of disruptions in supply chains that could be caused by pandemics, wars, supplier down times, absenteeism, distributor bottlenecks, etc. The tools we use include reliability theory, logic,...
Watermarking is an important copyright protection technology which generally embeds the identity information into the carrier imperceptibly. Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks. Most of the existing watermarking technologies take the nature images as carriers. D...
The availability of polygenic scores for type 2 diabetes (T2D) raises the question, whether assessing family history might become redundant. However, family history not only involves shared genetics, but also shared environment. It was the aim of this study to assess the independent and combined effects of one family risk score (FamRS) and a polyge...
Wireless sensor networks are collection of sensor nodes and sink node, where sensor node performs sensing of data and communicating it with sink node and sink node is also called as base station, which receives sensed data from sensor nodes through cluster head in a network. This type of traditional method consumes more energy, which reduces the ne...
Why are some spatial patterns remembered more easily than others? There are many possible mechanisms underlying spatial working memory function. Here, the author explores different mechanisms simultaneously in a single conceptual model. He conducts a large-scale experiment (35.4 million responses used to measure human observers’ spatial working mem...
Objective:
To promote better reporting quality regarding sham acupuncture in clinical trials for a precise appraisal of the adequacy of the sham acupuncture procedure.
Methods:
A three-stage online Delphi survey was conducted to a group of experts. Items with higher than 80% consensus from the initial checklist were selected as the final candida...
The static heat loads on the 80 K thermal shields system of SST-1 will be removed using single phase liquid nitrogen cooling at 7 bar (a). The single phase liquid nitrogen is obtained using 80 K Liquid Nitrogen booster system. The booster system is in form of three storey building as pump cryostat (at bottom), sub-cooler vessel cryostat (at middle)...
The category partition method is a widely used technique for generating test cases that cover a wide range of scenarios with minimum redundancy. This technique is particularly useful for complex software systems, such as those used in health data collection and processing, where there are many possible input combinations and scenarios to consider....
The objective of the paper is to determine the most suitable operational redundant assets and asset structure for a manufacturing enterprise. They are determined by the financial analysis of ratios, vertical and horizontal analysis, and the calculation of Altman Z-score. The recommended sizes of activity ratios are: the turnover of total assets sho...
Synchronization (insertions–deletions) errors are still a major challenge for reliable information retrieval in DNA storage. Unlike traditional error correction codes (ECC) that add redundancy in the stored information, multiple sequence alignment (MSA) solves this problem by searching the conserved subsequences. In this paper, we conduct a compreh...
Heat load prediction is essential to discover blast furnace (BF) anomalies in time and take measures in advance to reduce erosion in the ironmaking process. However, owing to the redundancy of the high dimensional data and the multi-granularity features of the state monitoring data, the general prediction model is hard to accurately predict the hea...
The abnormal wear of a rolling element bearing caused by early failures, such as pitting and spalling, will deteriorate the running state and reduce the life. This paper demonstrates the importance of oil debris monitoring and its effective feature extraction for bearing health assessment. In this paper, a rolling bearing-rotor test rig with forced...
We aimed to research the design and path-planning methods of an intelligent disinfection-vehicle system. A ROS (robot operating system) system was utilized as the control platform, and SLAM (simultaneous localization and mapping) technology was used to establish an indoor scene map. On this basis, a new path-planning method combining the A* algorit...
As natural selenium (Se)-rich soil in China is generally characterized by a high geological background of cadmium (Cd), the safe utilization of such seleniferous soil remains a challenge. The accumulating evidence shows that the threshold value of the Se:Cd ratio is a determinant of regulating Cd accumulation in plants. However, the factors modulat...
Digital image watermarking, the process of marking a host image with a watermark, is generally used to authenticate the data. In the medical field, it is of utmost importance to verify the authenticity of the data using Medical Image Watermarking (MIW), especially in e-healthcare applications. Recently, MIW with image fusion, the merging of multimo...
Sharpness is an important factor for image inpainting in future Internet, but the massive model parameters involved may produce insufficient edge consistency and reduce image quality. In this paper, we propose a two-stage transformer-based high-resolution image inpainting method to address this issue. This model consists of a coarse and a fine gene...
Quantum error correction (QEC) aims to protect logical qubits from noises by using the redundancy of a large Hilbert space, which allows errors to be detected and corrected in real time¹. In most QEC codes2–8, a logical qubit is encoded in some discrete variables, for example photon numbers, so that the encoded quantum information can be unambiguou...
Based on extant recordings of northern and southern native speakers, we found complementary patterns of vowel-coda distribution all along the Welsh initial consonant mutation system and contest phonemic vowel lengths. In brief, lenis consonants require long vowels and fortis consonants short vowels. This holds also true for -l,-n, -r, which still s...
The recent emergence of various smart wearable electronics has furnished the rapid development of human-computer interaction, medical health monitoring technologies, etc. Unfortunately, processing redundant motion and physiological data acquired by multiple wearable sensors using conventional off-site digital computers typically result in serious l...
Remote health monitoring plays a significant role in research areas related to medicine, neurology, rehabilitation, and robotic systems. These applications include Human Activity Recognition (HAR) using wearable sensors, signal processing, mathematical methods, and machine learning to improve the accuracy of remote health monitoring systems. To imp...
This paper presents the results of the regional cooperation of the Adriatic-Ionian (AI) countries (EUREKA Project Partners) aimed at the joint development and harmonization of regulations and procedures in the field of navigation safety. Specifically, the modernisation of the ADRIREP system developed through the EUREKA Project is presented, with sp...
The main objective of this research work was to develop reliable and intelligent power sources for the future. To achieve this objective, a modular stand-alone solar energy-based direct current (DC) power supply was designed and implemented. The converter topology used is a two-stage interleaved boost converter, which is monitored in closed loop. T...
Aging causes the reduction in physical and physiological strength and an increase
in the odds of afiction with chronic physical and mental diseases ultimately afecting the quality of life (QoL). So far, several primary studies have been conducted
on the impact of religious-spiritual education and care on the QoL of the elderly.
However, to the b...
Management of information systems can be divided into strategic, tactical, and operational management.
Strategic management of information systems deals with the information processing of a healthcare facility as a whole. It comprises the planning of the information system’s architecture and of the organization of information management. The tasks...
Due to the unpredictable presence of Non-Cognitive Users (NCUs) in the time and frequency domains, the number of available channels (i.e., channels where no NCUs exist) and corresponding channel indices per Cognitive User (CU) may differ. In this paper, we propose a heuristic channel allocation method referred to as Enhanced Multi-Round Resource Al...
The performance of multi-person pose estimation has been greatly improved due to the rapid development of deep learning. However, the problems of self-occlusion, mutual occlusion and complex background not only have not been effectively solved. In order to further effectively solve these problems, in this paper, we design a novel Global and Local C...
A new control algorithm was designed to solve the problems of actuator physical failure, remote network attack, and sudden change in trajectory curvature when a port’s artificial intelligence-based transportation robots track transportation in a freight yard. First of all, the nonlinear, redundant, saturated sliding surface was designed based on th...
p>Safety is critical in robotic tasks. Energy function based methods have been introduced to address the problem. To ensure safety in the presence of control limits, we need to design an energy function that results in persistently feasible safe control at all system states. However, designing such an energy function for high-dimensional nonlinear...
An unmanned aerial vehicle (UAV) swarm has broad application prospects, in which scheduling is one of the key technologies determining the completion of tasks. A market-based approach is an effective way to schedule UAVs distributively and quickly, meeting the real-time requirements of swarm scheduling without a centre. In this paper, a double-loop...
Lung and colon cancer are among humanity’s most common and deadly cancers. In 2020, there were 4.19 million people diagnosed with lung and colon cancer, and more than 2.7 million died worldwide. Some people develop lung and colon cancer simultaneously due to smoking which causes lung cancer, leading to an abnormal diet, which also causes colon canc...
We introduce a generalized frustrated Dicke trimer model where three Dicke models are coupled in sequence via direct photon hopping and investigate the stability of a recently found frustrated superradiant phase and the associated two critical scalings [Phys.\~Rev.\~Lett. 128, 163601] in the presence of two symmetry-breaking perturbations. The firs...
Genetic studies of schizophrenia (SCZ) reveal a complex polygenic risk architecture comprised of hundreds of risk variants, the majority of which are common in the population at-large and confer only modest increases in disorder risk. Precisely how genetic variants with individually small predicted effects on gene expression combine to yield substa...
Prevalent predictive coding-based video compression methods rely on a heavy encoder to reduce the temporal redundancy, which makes it challenging to deploy them on resource-constrained devices. Meanwhile, as early as the 1970s, distributed source coding theory has indicated that independent encoding and joint decoding with side information (SI) can...
Background: Congenital diaphragmatic hernia (CDH) is a rare disease associated with major nutritional and digestive morbidities. Oral feeding autonomy remains a major issue for the care and management of these patients. The aim of this study was to specify the perinatal risk factors of delayed oral feeding autonomy in patients treated for CDH. Meth...
Today’s concept of time is based on Einstein’s theories of special (SR) and general relativity (GR). Many physicists anticipate that GR has an issue since it is not compatible with quantum mechanics. Here we show: SR and GR work well for each observer describing his unique reality, but “Einstein time” (Einstein’s concept of time) has an issue. It a...
Workload prediction is essential in cloud data centers (CDCs) for establishing scalability and resource elasticity. However, the workload prediction accuracy in the cloud data center could be better due to noise, redundancy, and low performance for workload prediction. This paper designs a hierarchical tree-based deep convolutional neural network (...
Sensing forms an integral part of soft matter based robots due to their compliance, dependence on loading conditions, and virtually infinite degrees of freedom. Previous studies have developed several extrinsic sensors and embedded them into soft actuators for displacement and force estimation. What has not been investigated is whether soft robots...
A Geometrical & Spatiotemporal Correlation force effect types-based new reformulation of Newtonian dynamics is presented in which a restatement of law of inertial emerges. It makes redundant the motion type divide and also un-unifies force effect types.. This reformulation makes new admissions than Newtonian about nature of motional effects and nat...
The relative abundance of functional genes used to quantify the abundance of functional genes in communities is controversial. Quantitative PCR (qPCR) technology offers a powerful tool for quantifying functional gene abundance. However, humic substances can inhibit qPCR in sediment/soil samples. Therefore, finding a convenient and effective quantit...
In this paper, we investigate the problem of the heavy computational burden of the direction-of-arrival (DoA) estimation for the noncircular (NC) signals. A novel low-complexity direction-of-arrival estimation algorithm for NC signals via subspace rotation technique (SRT) is proposed. The proposed algorithm divides the noise subspace matrix along i...
In recent decades, the river network patterns (RNPs) in China’s Haihe River basin have changed dramatically, and the topology of the river network has become increasingly complex. It is important to quantitatively study the correlation between river network patterns and topography (CRNPT) and the changes in the correlation. In this paper, the Haihe...
Local adaptation frequently evolves in patches or environments that are connected via migration. In these cases, genomic regions that are linked to an adaptive locus experience reduced effective migration rates. Via individual-based simulations of a two-patch system, we show that this reduced effective migration results in the accumulation of condi...
In computational biology, $k$-mers and edit distance are fundamental concepts. However, little is known about the metric space of all $k$-mers equipped with the edit distance. In this work, we explore the structure of the $k$-mer space by studying its maximal independent sets (MISs). An MIS is a sparse sketch of all $k$-mers with nice theoretical p...
The benefit of Digital Twins depends to a large extent on the quality of the sensor data provided. In many cases, sensor failures are only detected late in operation which can lead to serious consequences. For this reason, one approach to reduce the resulting safety issues is to use redundant sensor systems that monitor the same measureand. However...
To study the behavior of freely moving model organisms such as zebrafish (Danio rerio) and fruit flies (Drosophila) across multiple spatial scales, it would be ideal to use a light microscope that can resolve 3D information over a wide field of view (FOV) at high speed and high spatial resolution. However, it is challenging to design an optical ins...
Penicillin-binding proteins (PBPs) play critical roles in cell wall construction, cell shape, and bacterial replication. Bacteria maintain a diversity of PBPs, indicating that despite their apparent functional redundancy, there is differentiation across the PBP family. Seemingly redundant proteins can be important for enabling an organism to cope w...
As a result of Russia’s invasion of Ukraine in February 2022, we are sitting at a crossroads where one path further weakens the prohibition of the use of force and another helps restore its integrity. In this context, this article argues it is imperative that we take all available steps to reinforce the prohibition, and that holding President Putin...