Towards a Comprehensive Framework for Climate Change Multi-Risk Assessment in the Mining Industry
Changing climate conditions affect mining operations all over the world, but so far, the mining sector has focused primarily on mitigation actions. Nowadays, there exists increasing recognition of the need for planned adaptation actions. To this end, the
Evangelos Mavrommatis +2 more
doaj +1 more source
Energy conservation is one of the main challenges hindering the advancement of Wireless Sensor Networks (WSNs) in the Internet of Things (IoT). Although various approaches including probabilistic, deterministic, and mixed model based solutions have been ...
Walid Osamy, Ahmed M. Khedr
doaj +1 more source
A State Recognition Approach for Complex Equipment Based on a Fuzzy Probabilistic Neural Network
Due to the traditional state recognition approaches for complex electromechanical equipment having had the disadvantages of excessive reliance on complete expert knowledge and insufficient training sets, real-time state identification system was always ...
Jing Xu +3 more
doaj +1 more source
Studying Transaction Fees in the Bitcoin Blockchain with Probabilistic Logic Programming
In Bitcoin, if a miner is able to solve a computationally hard problem called proof of work, it will receive an amount of bitcoin as a reward which is the sum of the fees for the transactions included in a block plus an amount inversely proportional to ...
Damiano Azzolini +2 more
semanticscholar +1 more source
DG System Using PFNN Controllers for Improving Islanding Detection and Power Control
In this study, an intelligent controlled distributed generator (DG) system is proposed for tracking control and islanding detection. First, a DC/AC inverter with DC power supply is adopted to emulate a DG system and control the active and reactive power ...
Kuang-Hsiung Tan, Chien-Wu Lan
doaj +1 more source
Forecasting worldwide empty container availability with machine learning techniques
Due to imbalances in the global transport of containerised goods, liner shipping companies go to great lengths to match the regional supply and demand for empty containers by transporting equipment from surplus to deficit regions.
Christoph Martius +4 more
doaj +1 more source
A Probabilistic Logic of Cyber Deception
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests ...
S. Jajodia +6 more
semanticscholar +1 more source
Applications of Nonclassical Logic Methods for Purposes of Knowledge Discovery and Data Mining [PDF]
* The work is partially supported by Grant no. NIP917 of the Ministry of Science and Education – Republic of Bulgaria.Methods for solution of a large class of problems on the base of nonclassical, multiple-valued, and probabilistic logics have been ...
Jotsov, Vladimir +2 more
core
Stochastic Spin-Orbit Torque Devices as Elements for Bayesian Inference
Probabilistic inference from real-time input data is becoming increasingly popular and may be one of the potential pathways at enabling cognitive intelligence.
Chen, Shuhan +3 more
core +1 more source
Formal Verification and Improvement of SAP-AKA Secondary Authentication Protocol [PDF]
The SAP-AKA protocol is a secondary authentication protocol that provides key service security for vertical users, based on the Extensible Authentication Protocol (EAP) framework defined by the 3rd Generation Partnership Project(3GPP)standard.
PENG Chengwei, YANG Jinji, YANG Guang
doaj +1 more source

