139 research outputs found

    A novel population-based local search for nurse rostering problem

    Get PDF
    Population-based approaches regularly are better than single based (local search) approaches in exploring the search space. However, the drawback of population-based approaches is in exploiting the search space. Several hybrid approaches have proven their efficiency through different domains of optimization problems by incorporating and integrating the strength of population and local search approaches. Meanwhile, hybrid methods have a drawback of increasing the parameter tuning. Recently, population-based local search was proposed for a university course-timetabling problem with fewer parameters than existing approaches, the proposed approach proves its effectiveness. The proposed approach employs two operators to intensify and diversify the search space. The first operator is applied to a single solution, while the second is applied for all solutions. This paper aims to investigate the performance of population-based local search for the nurse rostering problem. The INRC2010 database with a dataset composed of 69 instances is used to test the performance of PB-LS. A comparison was made between the performance of PB-LS and other existing approaches in the literature. Results show good performances of proposed approach compared to other approaches, where population-based local search provided best results in 55 cases over 69 instances used in experiments

    Late Maastrichtian carbon isotope stratigraphy and cyclostratigraphy of the Newfoundland Margin (Site U1403, IODP Expedition 342)

    Get PDF
    Earth’s climate during the Maastrichtian (latest Cretaceous) was punctuated by brief warming and cooling episodes, accompanied by perturbations of the global carbon cycle. Superimposed on a long-term cooling trend, the middle Maastrichtian is characterized by deep-sea warming and relatively high values of stable carbon-isotope ratios, followed by strong climatic variability towards the end of the Cretaceous. A lack of knowledge on the timing of climatic change inhibits our understanding of underlying causal mechanisms. We present an integrated stratigraphy from Integrated Ocean Drilling Program (IODP) Site U1403, providing an expanded deep ocean record from the North Atlantic (Expedition 342, Newfoundland Margin). Distinct sedimentary cyclicity suggests that orbital forcing played a major role in depositional processes, which is confirmed by statistical analyses of high resolution elemental data obtained by X-ray fluorescence (XRF) core scanning. Astronomical calibration reveals that the investigated interval encompasses seven 405-kyr cycles (Ma4051 to Ma4057) and spans the 2.8 Myr directly preceding the Cretaceous/Paleocene (K/Pg) boundary. A high-resolution carbon-isotope record from bulk carbonates allows us to identify global trends in the late Maastrichtian carbon cycle. Low-amplitude variations (up to 0.4‰) in carbon isotopes at Site U1403 match similar scale variability in records from Tethyan and Pacific open-ocean sites. Comparison between Site U1403 and the hemipelagic restricted basin of the Zumaia section (northern Spain), with its own well-established independent cyclostratigraphic framework, is more complex. Whereas the pre-K/Pg oscillations and the negative values of the Mid-Maastrichtian Event (MME) can be readily discerned in both the Zumaia and U1403 records, patterns diverge during a ~ 1 Myr period in the late Maastrichtian (67.8–66.8 Ma), with Site U1403 more reliably reflecting global carbon cycling. Our new carbon isotope record and cyclostratigraphy offer promise for Site U1403 to serve as a future reference section for high-resolution studies of late Maastrichtian paleoclimatic change

    Simulation de l'effet des surcharges sur le comportement mécanique des P.T.H à couples de matériaux différents

    Get PDF
    International audienceThe reliability of total hip arthroplasties (THA) is not any more to show. It is allowed by all. Indeed, the retreat of such interventions exceeds now fifteen years and the hopes which the first clinicians formulated are now realities. Nevertheless, the deformation and the wear of cup components remain an inevitable mechanism and loosening appear in long-term. Prevention of loosening passes by the reduction of this wear. This study deals with a simulation of the effect of overloads on THA with different materials. Three materials are analyzed in order to choose the couple which has better bio functionality.La fiabilité des arthroplasties totales de hanche n'est plus à démontrer. Elle est admise par tous. En effet, le recul de telles interventions dépasse maintenant quinze ans et les espérances que les premiers cliniciens ont formulées à leur égard sont maintenant des réalités. Néanmoins, la déformation et l'usure des composants acétabulaires restent un mécanisme inévitable et des descellements asceptiques apparaissent à long terme. La prévention du descellement passe donc par la réduction de cette usure. Cette étude porte sur une simulation de l'effet de certains paramètres mécaniques, entre autres « les surcharges » sur le comportement des PTH hybrides à couples de matériaux différents. Trois couples de matériaux sont analysés, en vue de choisir celui qui offre une meilleure biofonctionnalité

    Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring

    Get PDF
    With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity threats. Eavesdroppers can easily access confidential multimedia information and the privacy of individuals can be compromised. As a solution, novel encryption techniques for the multimedia data concealing have been proposed by the cryptographers. Due to the bandwidth limitations and computational complexity, traditional encryption methods are not applicable to multimedia data. In traditional encryption methods such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), once multimedia data are compressed during encryption, correct decryption is a challenging task. In order to utilize the available bandwidth in an efficient way, a novel secure video occupancy monitoring method in conjunction with encryption-compression has been developed and reported in this paper. The interesting properties of Chebyshev map, intertwining map, logistic map, and orthogonal matrix are exploited during block permutation, substitution, and diffusion processes, respectively. Real-time simulation and performance results of the proposed system show that the proposed scheme is highly sensitive to the initial seed parameters. In comparison to other traditional schemes, the proposed encryption system is secure, efficient, and robust for data encryption. Security parameters such as correlation coefficient, entropy, contrast, energy, and higher key space prove the robustness and efficiency of the proposed solution

    UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities

    Get PDF
    Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking and surveillance, military defense, managing healthcare delivery, wireless communications, and more. In traditional machine learning techniques, an enormous amount of sensor data from UAVs must be shared to central storage to perform model training, which poses serious privacy risks and risks of misuse of information. The federated learning technique (FL), which can be applied to UAVs, is a promising means of collaboratively training a global model while retaining local access to sensitive raw data. Despite this, FL is a significant communication burden for battery-constrained UAVs due to local model training and global synchronization frequency. In this article, we address the major challenges associated with UAV-based FL for smart cities, including single-point failure, privacy leakage, scalability, and global model verification. To tackle these challenges, we present a differentially private federated learning framework based on Accumulative Reputation-based Selection (ARS) for the edge-aided UAV network that utilizes blockchains to prevent single-point failures where we switched from central control to decentralized control, Interplanetary File System (IPFS) for off-chain model storage and their respective hash-keys on-chain to ensure model integrity. Due to IPFS, the size of the blockchain will be reduced, and local differential privacy will be applied to prevent privacy leakages. In the proposed framework, an aggregator will be selected based on its ARS score and model verification by the validators. After most validators approve it, it will be available for use. Several parameters are taken into consideration during evaluation, including accuracy, precision, recall, F1-score, and time consumption. It also evaluates the number of edge computers vs test accuracy, the number of edge computers vs time consumption for global model convergence, and the number of rounds vs test accuracy. This is done by considering two benchmark datasets: MNIST and CIFAR-10. The results show that the proposed work preserves privacy while achieving high accuracy. Moreover, it is scalable to accommodate many participants

    TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks

    Get PDF
    The Internet of Things (IoT) is a global network that connects a large number of smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to-machine communication, widely adopted in IoT networks. Various smart devices within these networks are employed to handle sensitive information. However, the scale and openness of IoT networks make them highly vulnerable to security breaches and attacks, such as eavesdropping, weak authentication, and malicious payloads. Hence, there is a need for advanced machine learning (ML) and deep learning (DL)-based intrusion detection systems (IDS). Existing ML-based IoT-IDSs face several limitations in effectively detecting malicious activities, mainly due to imbalanced training data. To address this, this study introduces a transformer neural network-based intrusion detection system (TNN-IDS) specifically designed for MQTT-enabled IoT networks. The proposed approach aims to enhance the detection of malicious activities within these networks. The TNN-IDS leverages the parallel processing capability of the Transformer Neural Network, which accelerates the learning process and results in improved detection of malicious attacks. To evaluate the performance of the proposed system, it was compared with various IDSs based on ML and DL approaches. The experimental results demonstrate that the proposed TNN-IDS outperforms other systems in terms of detecting malicious activity. The TNN-IDS achieved optimum accuracies reaching 99.9% in detecting malicious activities
    • …
    corecore