期刊文献+
共找到1,164,336篇文章
< 1 2 250 >
每页显示 20 50 100
A Model-free Approach to Fault Detection of Continuous-time Systems Based on Time Domain Data
1
作者 Steven X. Ding 《International Journal of Automation and computing》 EI 2007年第2期189-194,共6页
In this paper, a model-free approach is presented to design an observer-based fault detection system of linear continuoustime systems based on input and output data in the time domain. The core of the approach is to d... In this paper, a model-free approach is presented to design an observer-based fault detection system of linear continuoustime systems based on input and output data in the time domain. The core of the approach is to directly identify parameters of the observer-based residual generator based on a numerically reliable data equation obtained by filtering and sampling the input and output signals. 展开更多
关键词 Fault detection linear continuous time-invariant systems time domain data subspace methods observer-based residual generator
下载PDF
Fault reconstruction observer design for continuous-time systems with measurement disturbances via descriptor system approach 被引量:1
2
作者 Qingxian Jia Yingchun Zhang +1 位作者 Chengliang Li Xueqin Chen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第5期877-885,共9页
This paper addresses a problem of observer-based sensor fault reconstruction for continuous-time systems subject to sensor faults and measurement disturbances via a descriptor system approach. An augmented descriptor ... This paper addresses a problem of observer-based sensor fault reconstruction for continuous-time systems subject to sensor faults and measurement disturbances via a descriptor system approach. An augmented descriptor plant is first formulated, by assembling measurement disturbances and sensor faults into an auxiliary state vector. Then a novel descriptor state observer for the augmented plant is constructed such that simultaneous reconstruction of original system states, sensor faults and measurement disturbances are obtained readily. Sufficient conditions for the existence of the proposed observer are explicitly provided, and the application scope of the observer is further discussed. In addition, an extension of the proposed linear approach to a class of nonlinear systems with Lipschitz constraints is investigated. Finally, two numerical examples are simulated to illustrate the effectiveness of the proposed fault-reconstructing approaches. 展开更多
关键词 fault reconstruction descriptor system approach ob- server design measurement disturbance.
下载PDF
H_∞ deconvolution filter design for time-delay linear continuous-time systems
3
作者 尤富强 田作华 施颂椒 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期692-697,共6页
Proposes an H_∞ deconvolution design for time-delay linear continuous-time systems. We first analyze the general structure and innovation structure of the H_∞ deconvolution filter. The deconvolution filter with inno... Proposes an H_∞ deconvolution design for time-delay linear continuous-time systems. We first analyze the general structure and innovation structure of the H_∞ deconvolution filter. The deconvolution filter with innovation structure is made up of an output observer and a linear mapping, where the latter reflects the internal connection between the unknown input signal and the output estimate error. Based on the bounded real lemma, a time domain design approach and a sufficient condition for the existence of deconvolution filter are presented. The parameterization of the deconvolution filter can be completed by solving a Riccati equation. The proposed method is useful for the case that does not require statistical information about disturbances. At last, a numerical example is given to demonstrate the performance of the proposed filter. 展开更多
关键词 反褶积 滤光器 延时电路 信号
下载PDF
Discretization of Continuous-time Systems with Input Delays
4
作者 ZENG Li HU Guang-Da 《自动化学报》 EI CSCD 北大核心 2010年第10期1426-1431,共6页
关键词 自动化系统 系统稳定性 研究 发展
下载PDF
Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems
5
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 SCIE EI 2023年第9期3189-3218,共30页
Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a n... Cyber-Physical Systems are very vulnerable to sparse sensor attacks.But current protection mechanisms employ linear and deterministic models which cannot detect attacks precisely.Therefore,in this paper,we propose a new non-linear generalized model to describe Cyber-Physical Systems.This model includes unknown multivariable discrete and continuous-time functions and different multiplicative noises to represent the evolution of physical processes and randomeffects in the physical and computationalworlds.Besides,the digitalization stage in hardware devices is represented too.Attackers and most critical sparse sensor attacks are described through a stochastic process.The reconstruction and protectionmechanisms are based on aweighted stochasticmodel.Error probability in data samples is estimated through different indicators commonly employed in non-linear dynamics(such as the Fourier transform,first-return maps,or the probability density function).A decision algorithm calculates the final reconstructed value considering the previous error probability.An experimental validation based on simulation tools and real deployments is also carried out.Both,the new technology performance and scalability are studied.Results prove that the proposed solution protects Cyber-Physical Systems against up to 92%of attacks and perturbations,with a computational delay below 2.5 s.The proposed model shows a linear complexity,as recursive or iterative structures are not employed,just algebraic and probabilistic functions.In conclusion,the new model and reconstructionmechanism can protect successfully Cyber-Physical Systems against sparse sensor attacks,even in dense or pervasive deployments and scenarios. 展开更多
关键词 Cyber-physical systems sparse sensor attack non-linear models stochastic models security
下载PDF
Enhanced LMI Representations for H2 Performance of Polytopic Uncertain Systems: Continuous-time Case 被引量:1
6
作者 Ai-Guo Wu Guang-Ren Duan 《International Journal of Automation and computing》 EI 2006年第3期304-308,共5页
Based on two recent results, several new criteria of H2 performance for continuous-time linear systems are established by introducing two slack matrices. When used in robust analysis of systems with polytopic uncertai... Based on two recent results, several new criteria of H2 performance for continuous-time linear systems are established by introducing two slack matrices. When used in robust analysis of systems with polytopic uncertainties, they can reduce conservatism inherent in the earlier quadratic method and the established parameter-dependent Lyapunov function approach. Two numerical examples are included to illustrate the feasibility and advantage of the proposed representations. 展开更多
关键词 LMI representations H2 performance polytopic uncertainty continuous-time systems
下载PDF
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
7
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
Anomalous time-reversal symmetric non-Hermitian systems
8
作者 易益妃 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期162-166,共5页
The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical res... The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical responses of nonHermitian systems with anomalous time-reversal symmetry, in both one dimension and two dimensions. Specifically, we focus on whether the systems will exhibit a non-Hermitian skin effect. We employ the theory of generalized Brillouin zone and also numerical methods to show that the anomalous time-reversal symmetry can prevent the skin effect in onedimensional non-Hermitian systems, but is unable to exert the same effectiveness in two-dimensional cases. 展开更多
关键词 skin effect SYMMETRY non-Hermitian systems
下载PDF
Conventional Geothermal Systems and Unconventional Geothermal Developments: An Overview
9
作者 Maryam Khodayar Sveinbjörn Björnsson 《Open Journal of Geology》 CAS 2024年第2期196-246,共51页
This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal syste... This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development. 展开更多
关键词 Conventional Geothermal systems Unconventional Geothermal Developments Shallow and Deep Closed-Loops Enhanced Geothermal systems Supercritical and Millimeter-Wave Drilling
下载PDF
Numerical simulation for the initial state of avalanche in polydisperse particle systems
10
作者 韩韧 李亭 +2 位作者 迟志鹏 杨晖 李然 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期405-412,共8页
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,... Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,respectively.In these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse system.By examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse systems.We also consider the distribution characteristics of the average coordination number and average velocity for the moving particles.The results support that the polydisperse particle systems are more stable in the T2 stage. 展开更多
关键词 AVALANCHE initial state polydisperse particle systems PROPAGATION
下载PDF
Quantum discord and its dynamics for multipartite systems
11
作者 罗嘉欣 郭琼 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期168-175,共8页
Quantum discord, one of the famous quantum correlations, has been recently generalized to multipartite systems by Radhakrishnan et al. Here we give analytical solutions of the quantum discord for a family of N-qubit q... Quantum discord, one of the famous quantum correlations, has been recently generalized to multipartite systems by Radhakrishnan et al. Here we give analytical solutions of the quantum discord for a family of N-qubit quantum states. For the bipartite system, we derive a zero quantum discord which will remain unchanged under the phase damping channel. For multiparitite systems, it is found that the quantum discord can be classified into three categories and the quantum discord for odd-partite systems can exhibit freezing under the phase damping channel, while the freezing does not exist in the even-partite systems. 展开更多
关键词 quantum discord multipartite systems decoherence channels frozen discord
下载PDF
Analysis and Design of Time-Delay Impulsive Systems Subject to Actuator Saturation
12
作者 Chenhong Zhu Xiuping Han Xiaodi Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期196-204,共9页
This paper investigates the exponential stability and performance analysis of nonlinear time-delay impulsive systems subject to actuator saturation. When continuous dynamics is unstable, under some conditions, it is s... This paper investigates the exponential stability and performance analysis of nonlinear time-delay impulsive systems subject to actuator saturation. When continuous dynamics is unstable, under some conditions, it is shown that the system can be stabilized by a class of saturated delayed-impulses regardless of the length of input delays. Conversely, when the system is originally stable, it is shown that under some conditions, the system is robust with respect to sufficient small delayed-impulses. Moreover, the design problem of the controller with the goal of obtaining a maximized estimate of the domain of attraction is formulated via a convex optimization problem. Three examples are provided to demonstrate the validity of the main results. 展开更多
关键词 Delayed impulses impulsive control impulsive disturbance nonlinear systems SATURATION
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
13
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
14
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
A PID Tuning Approach for Inertial Systems Performance Optimization
15
作者 Irina Cojuhari 《Applied Mathematics》 2024年第1期96-107,共12页
In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented ... In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented two approaches for synthesis the proportional-integral-derivative controller to the models of objects with inertia, that offer the procedure of system performance optimization based on maximum stability degree criterion. The proposed algorithms of system performance optimization were elaborated for model of objects with inertia second and third order and offer simple analytical expressions for tuning the PID controller. Validation and verification are conducted through computer simulations using MATLAB, demonstrating successful performance optimization and showcasing the effectiveness PID controllers’ tuning. The proposed approaches contribute insights to the field of control, offering a pathway for optimizing the performance of second and third-order inertial systems through robust controller synthesis. 展开更多
关键词 PID Control Algorithm Inertial systems system Performance Optimization Maximum Stability Degree
下载PDF
Reinforcement learning based adaptive control for uncertain mechanical systems with asymptotic tracking
16
作者 Xiang-long Liang Zhi-kai Yao +1 位作者 Yao-wen Ge Jian-yong Yao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期19-28,共10页
This paper mainly focuses on the development of a learning-based controller for a class of uncertain mechanical systems modeled by the Euler-Lagrange formulation.The considered system can depict the behavior of a larg... This paper mainly focuses on the development of a learning-based controller for a class of uncertain mechanical systems modeled by the Euler-Lagrange formulation.The considered system can depict the behavior of a large class of engineering systems,such as vehicular systems,robot manipulators and satellites.All these systems are often characterized by highly nonlinear characteristics,heavy modeling uncertainties and unknown perturbations,therefore,accurate-model-based nonlinear control approaches become unavailable.Motivated by the challenge,a reinforcement learning(RL)adaptive control methodology based on the actor-critic framework is investigated to compensate the uncertain mechanical dynamics.The approximation inaccuracies caused by RL and the exogenous unknown disturbances are circumvented via a continuous robust integral of the sign of the error(RISE)control approach.Different from a classical RISE control law,a tanh(·)function is utilized instead of a sign(·)function to acquire a more smooth control signal.The developed controller requires very little prior knowledge of the dynamic model,is robust to unknown dynamics and exogenous disturbances,and can achieve asymptotic output tracking.Eventually,co-simulations through ADAMS and MATLAB/Simulink on a three degrees-of-freedom(3-DOF)manipulator and experiments on a real-time electromechanical servo system are performed to verify the performance of the proposed approach. 展开更多
关键词 Adaptive control Reinforcement learning Uncertain mechanical systems Asymptotic tracking
下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems
17
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
下载PDF
Computing large deviation prefactors of stochastic dynamical systems based on machine learning
18
作者 李扬 袁胜兰 +1 位作者 陆凌宏志 刘先斌 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期364-373,共10页
We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for m... We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for more accurate calculation of the mean exit time by computing large deviation prefactors with the aid of machine learning.More specifically,we design a neural network framework to compute quasipotential,most probable paths and prefactors based on the orthogonal decomposition of a vector field.We corroborate the higher effectiveness and accuracy of our algorithm with two toy models.Numerical experiments demonstrate its powerful functionality in exploring the internal mechanism of rare events triggered by weak random fluctuations. 展开更多
关键词 machine learning large deviation prefactors stochastic dynamical systems rare events
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
19
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
Enhancing Healthcare Data Security and Disease Detection Using Crossover-Based Multilayer Perceptron in Smart Healthcare Systems
20
作者 Mustufa Haider Abidi Hisham Alkhalefah Mohamed K.Aboudaif 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期977-997,共21页
The healthcare data requires accurate disease detection analysis,real-timemonitoring,and advancements to ensure proper treatment for patients.Consequently,Machine Learning methods are widely utilized in Smart Healthca... The healthcare data requires accurate disease detection analysis,real-timemonitoring,and advancements to ensure proper treatment for patients.Consequently,Machine Learning methods are widely utilized in Smart Healthcare Systems(SHS)to extract valuable features fromheterogeneous and high-dimensional healthcare data for predicting various diseases and monitoring patient activities.These methods are employed across different domains that are susceptible to adversarial attacks,necessitating careful consideration.Hence,this paper proposes a crossover-based Multilayer Perceptron(CMLP)model.The collected samples are pre-processed and fed into the crossover-based multilayer perceptron neural network to detect adversarial attacks on themedical records of patients.Once an attack is detected,healthcare professionals are promptly alerted to prevent data leakage.The paper utilizes two datasets,namely the synthetic dataset and the University of Queensland Vital Signs(UQVS)dataset,from which numerous samples are collected.Experimental results are conducted to evaluate the performance of the proposed CMLP model,utilizing various performancemeasures such as Recall,Precision,Accuracy,and F1-score to predict patient activities.Comparing the proposed method with existing approaches,it achieves the highest accuracy,precision,recall,and F1-score.Specifically,the proposedmethod achieves a precision of 93%,an accuracy of 97%,an F1-score of 92%,and a recall of 92%. 展开更多
关键词 Smart healthcare systems multilayer perceptron CYBERSECURITY adversarial attack detection Healthcare 4.0
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部