Mobile ad hoc network (MANET) brings simplicity and flexibility but also introduces constraints due to mobility, dynamic configuration, limited resources, and security. Security is among the most important limitations...
详细信息
ISBN:
(纸本)9789811501845;9789811501838
Mobile ad hoc network (MANET) brings simplicity and flexibility but also introduces constraints due to mobility, dynamic configuration, limited resources, and security. Security is among the most important limitations in MANET. Because of its distinctive features, MANET creates a variety of serious challenges. The various protection schemes aligned with routing makes efforts in lowering threat perception. In this paper, a novel security mechanism named secure multipath routing (SMR) for MANET is proposed for jamming attacks that also takes care of routing and load balancing. The proposed technique will first identify the attacked node, and then, it will not allow other attacker node/s. Thereafter, as a corrective measure it blocks the activity of offender and drops it from the routing. SMR is then judged against conventional AODV and AOMDV protocols in NS-2.35. Experimental results show that the proposed SMR demonstrates better results in terms of throughput, average end-to-end delay, packet delivery ratio, and routing overhead.
Distributed Denial of Service (DDoS) has been the most prominent attack in cyber-physical system over the last decade. Defending against DDoS attack is not only challenging but also strategic. Tons of new strategies a...
详细信息
ISBN:
(纸本)9783030394424;9783030394417
Distributed Denial of Service (DDoS) has been the most prominent attack in cyber-physical system over the last decade. Defending against DDoS attack is not only challenging but also strategic. Tons of new strategies and approaches have been proposed to defend against different types of DDoS attacks. The ongoing battle between the attackers and defenders is full-fledged due to its newest strategies and techniques. Machine learning (ML) has promising outcomes in different research fields including cybersecurity. In this paper, ensemble unsupervised ML approach is used to implement an intrusion detection system which has the noteworthy accuracy to detect DDoS attacks. The goal of this research is to increase the DDoS attack detection accuracy while decreasing the false positive rate. The NSL-KDD dataset and twelve feature sets from existing research are used for experimentation to compare our ensemble results with those of our individual and other existing models.
The group intelligent optimization algorithm provides some new ideas for solving many practical problems. These algorithms have stronger robustness and stronger search ability, and are easy to implement in parallel. I...
详细信息
ISBN:
(纸本)9783030152352;9783030152345
The group intelligent optimization algorithm provides some new ideas for solving many practical problems. These algorithms have stronger robustness and stronger search ability, and are easy to implement in parallel. It is easy to combine with other algorithms to improve the performance of the algorithm and solve complex practical problems. The effect of the experiment is more obvious. In this paper, the improvement and application of particle swarm optimization algorithm, fireworks algorithm and artificial bee colony algorithm in intelligent algorithm are reviewed, and the advantages and disadvantages are analyzed. The future development of intelligent algorithm is prospected.
This article is devoted to the problem of identifying the most effective intelligent agents suitable in their personal qualities for solving nonstandard, complex, creative tasks. The effectiveness of the decisions mad...
详细信息
ISBN:
(纸本)9783030392161;9783030392154
This article is devoted to the problem of identifying the most effective intelligent agents suitable in their personal qualities for solving nonstandard, complex, creative tasks. The effectiveness of the decisions made by intelligent agents determines the productivity of the entire system. The possibilities of generating creative solutions to complex, non-standard problems largely depend on the state of intelligent agents. An intelligent agent, taking into account its inherent anthropomorphic properties and qualities, can be in various psycho-emotional states: from a depressed mood to creative uplift and insight. The states of the agent change over time, which he informs the system about at specified points in time. It is assuming that all agents provide reliable information about their states to the system. Based on the data obtained, the system should determine the most and least stable agents and redistribute the functions and responsibilities between them to maximize own utility function. The task is characterizing by the need to analyze large volumes of subjective information and belongs to the class of difficulty formalized tasks. To solve it, fuzzy clustering algorithms that are well implementing in the Matlab software environment can be using.
The traditional urban planning and management model can no longer meet the needs of the contemporary people. More and more cities are moving towards smarter. Wisdom is an important part of urban planning and a technic...
详细信息
ISBN:
(纸本)9783030152352;9783030152345
The traditional urban planning and management model can no longer meet the needs of the contemporary people. More and more cities are moving towards smarter. Wisdom is an important part of urban planning and a technical basis for urban development. In the process of development, a lot of financial and material resources are invested to build a smart city street landscape. The continuous development of street landscape construction has played a positive role in promoting the development of smart cities. The emergence of smart cities is not only an effective means of urban planning, but also an urban development. premise. The article first introduces the background and significance of the research, analyzes the current situation of the application of street landscape design in smart city planning, and combines the current practical characteristics to give a plan for smart city street landscape planning.
Centralized or self/peer governance approaches are major concerns and debates in modern smart cities and living. Proponents of central top-down governance approaches argued that the centralized approach supports the s...
详细信息
ISBN:
(纸本)9783030325237;9783030325220
Centralized or self/peer governance approaches are major concerns and debates in modern smart cities and living. Proponents of central top-down governance approaches argued that the centralized approach supports the strong alignment of control and safety and in short, facilitating ease of national development while self/peer advocates highlight opportunities for agile responses and a capability to bridge the widening gap between technology, social acceptance and well-being. As in all modern innovative measures, the consequences of Socially Assistive Robotics (SAR), its interactions between technology and users need to be explored. This paper looks at an Exploratory Governance Framework (EGF) as a possible option to managing future innovative services and technologies with focus on the narrow domain of SAR. This research provides opportunities to incorporate concepts of coevolution of technology and governance as well as elements of design considerations to impact development of modern technologies and services and allow balanced perspective on the centralized versus self/peer regulatory options.
Wireless Sensor Networks (WSN) consists of several tens to hundreds of nodes, interacting with each other. Thus, they have multiple communications between them, transferring and receiving several packets of data to ea...
详细信息
ISBN:
(纸本)9789811500350;9789811500343
Wireless Sensor Networks (WSN) consists of several tens to hundreds of nodes, interacting with each other. Thus, they have multiple communications between them, transferring and receiving several packets of data to each other. In order to reduce the overall traffic in the network and lessen the presence of redundant node data, this paper proposes an adaptive sensor ranking method by evaluating the task necessity, utility, and region coverage of a particular node in a given WSN. Logistic regression has been used to adaptively train the WSN to assign a status to node as on or off, thereby, decreasing the overall data transmission into the network, while still accounting for the entire range of the WSN.
Automated and Highly-automated Vehicles still need to interact with the driver at different cognitive levels. Those who are SAE Level 1 or 2 consider the human in the loop all the time and require strong participation...
详细信息
ISBN:
(纸本)9783030395124;9783030395117
Automated and Highly-automated Vehicles still need to interact with the driver at different cognitive levels. Those who are SAE Level 1 or 2 consider the human in the loop all the time and require strong participation of the driver at the control level. To increase safety, trust and comfort of the driver with this kind of automation, systems with a strong cooperative component are needed. This paper introduces the design of a vehicle controller based on shared control, together with an arbitration system, and the design of a Human-Machine Interface (HMI) to foster the mutual understanding between driver and automation in a lane-keeping task. The driver-automation cooperation is achieved through incremental support, in a continuum spectrum from manual to full automation. Additionally, the design of an HMI to support the driver in a takeover maneuver is presented. This functionality is a key component of vehicles SAE Level 3 and 4.
Star schema in data warehouses is a very well established model. However, the increasing number of star schemas creating large constellations schemas add new challenges in the organizations. In this document, we inten...
详细信息
ISBN:
(纸本)9783030456870;9783030456887
Star schema in data warehouses is a very well established model. However, the increasing number of star schemas creating large constellations schemas add new challenges in the organizations. In this document, we intend to make a contribution in the technical architecture of data warehouses with constellation schemas using an extension of the bus matrix. The proposed supply-demand matrix details the raw data from the original databases, describes the constellation schemas with different dimensions and establishes the information demand requirements.
To successfully integrate into society, today's robots, largely non-anthropomorphic, need to be able to communicate with people in various roles. In this paper, we focus on the military robot domain, where radio s...
详细信息
ISBN:
(纸本)9783030204679;9783030204662
To successfully integrate into society, today's robots, largely non-anthropomorphic, need to be able to communicate with people in various roles. In this paper, we focus on the military robot domain, where radio silence and high cognitive loads are par for the course, making nonverbal means of communication a necessity. To better understand how the findings in nonverbal communication using visual (lights) and auditory (non-speech sounds) channels from other domains could apply to the military, we conducted an exploratory survey soliciting opinions from laymen and experts on communicative abilities of a small non-anthropomorphic ground robot. For this study, we used Clearpath Jackal, equipped with a string of LED lights and a speaker to produce nonverbal cues in three different vignettes, and obtained feedback from 16 participants. Our study revealed a number of important issues in nonverbal signal design: importance of context and individual differences, challenge of ambiguity of meaning, and disambiguation of multiple simultaneous messages.
暂无评论