Reading improves the reader's vocabulary and knowledge of the world. It can open minds to different ideas which may challenge the reader to view things in a different light. Reading books benefits both physical an...
详细信息
An analog-to-digital converter (ADC) is a critical part of most computing systems as it converts analog signals into quantifiable digital values. Since most digital devices operate only on digital values, the ADC acts...
详细信息
ISBN:
(纸本)9783031411809;9783031411816
An analog-to-digital converter (ADC) is a critical part of most computing systems as it converts analog signals into quantifiable digital values. Since most digital devices operate only on digital values, the ADC acts as an interface between the digital and analog worlds. Hence, ADCs are commonly used in a wide-range of application areas, such as internet of things (IoT), industrial controlsystems (ICS), cyberphysical systems (CPS), audio/video devices, medical imaging, digital oscilloscopes, and cell phones, among others. For example, programmable logic controllers (PLCs) in ICS/CPS often make control decisions based on digital values that are converted from analog signals by ADCs. Due to its crucial role in various applications, ADCs are often targeted by a wide-range of physical and cyber attacks. Attackers may exploit vulnerabilities that could be found in the software/hardware of ADCs. In this work, we first conduct a deeper study on the ADC conversion logic to scrutinize relevant vulnerabilities that were not well explored by prior works. Hence, we manage to identify exploitable vulnerabilities on certain ADC registers that are used in the ADC conversion process. these vulnerabilities can allow attackers to launch dangerous attacks that can disrupt the behaviour of the targeted system (e.g., an IoT or control system) in a stealthy way. As a proof of concept, we design three such attacks by exploiting the vulnerabilities identified. Finally, we test the attacks on a mini-CPS testbed we designed using IoT devices, analog sensors and actuators. Our experimental results reveal high effectiveness of the proposed attack techniques in misleading PLCs to make incorrect control decisions in CPS. We also analyze the impact of such attacks when launched in realistic CPS testbeds.
Multi-reference least mean square algorithm (MR-FXLMS) has been performed more efficiently than the traditional Least mean square algorithm (FXLMS). In this paper, a multi-reference adaptive gain (MRAG-FXLMS) algorith...
详细信息
the development of cutting-edge telecommunications systems more and more call for the implementation of community subsystems which might be bendy and can unexpectedly reply to modifications in user visitors. Such flex...
详细信息
the proceedings contain 41 papers. the special focus in this conference is on Industrial, Engineering and Other Applications of Applied Intelligent systems. the topics include: A Sparse Binary Data Clustering Method f...
ISBN:
(纸本)9789819746767
the proceedings contain 41 papers. the special focus in this conference is on Industrial, Engineering and Other Applications of Applied Intelligent systems. the topics include: A Sparse Binary Data Clustering Method for Transaction Data;improving Noise Robustness of Automatic Speech Recognition Based on a Parallel Adapter Model with Near-Identity Initialization;reconsidering Stochastic Policy Gradient Methods for Traffic Signal control;Hybrid Additive Manufacturing: A Convergence of Physical, Digital, and Social Realms Driven by Generative AI;towards Eco-Friendly Multi-compartment Transportation: A New Bi-objective Iterated Local Search Framework;simulation Optimization of Operating Room Schedules for Elective Surgeries;learning Causality Under Uncertainty for Egocentric Action Anticipation;time Heals Unfairness: Efficient Dynamic Routing at an Autonomous Society;Parallel Implementation of a Convolutional Neural Network on an MPSoC;deep Residual Networks for Pigmented Skin Lesions Diagnosis;weightless Neural Networks Based on Multi-valued Probabilistic Logic for Node for the Handwritten Digit Classification;formal Verification of Neural Networks: A "Step Zero" Approach for Vehicle Detection;PPG-Based Heart Rate Estimation Using Unsupervised Domain Adaptation;a Novel Multi-task Single-Step Traffic Congestion Forecasting Framework for Large-Scale Road Networks;towards Addressing an Open Problem in Coupled Matrix Tensor Factorization for Satellite Imagery Data Using Human-in-Loop;representation and Generation of Music: Incorporating Composers’ Perspectives into Deep Learning Models;evaluation Techniques for Long Short-Term Memory Models: Overfitting Analysis and Handling Missing Values;Live Product Line Engineering Using Density-Based Clustering of CAD Models;fog-Based Ransomware Detection for Internet of Medical things Using Lighweight Machine Learning Algorithms;verifying Autoencoders for Anomaly Detection in Predictive Maintenance;a computer Vision Based Approach fo
Many aspects of life are now conducted online, and many services requiring a secure account, usually password protected. Creating and tracking many online accounts and passwords is difficult for everyone. For older pe...
详细信息
this paper offers a workflow for generating synthetic point cloud data sets to be used in deep learning algorithms in tasks of modeling historical architectural elements. Documentation of cultural heritage is a time-c...
详细信息
ISBN:
(纸本)9789811912801;9789811912795
this paper offers a workflow for generating synthetic point cloud data sets to be used in deep learning algorithms in tasks of modeling historical architectural elements. Documentation of cultural heritage is a time-consuming process that requires high precision. Computational and semi-automatic tools enhance conventional methods to shorten the duration of the documentation phase and increase the accuracy of the output. Photogrammetry and laser scanning are how geometrical data is acquired and delivered as a point cloud with position, color, and optionally normal vector information. Segmenting architectural elements based on our interpretations of this data is possible using deep neural networks but is limited when, despite the millions of points from one building, the data is insufficient in terms of variance and quantity. To overcome this limitation, we propose a semi-automatic synthetic data set generation using parametric definitions of historic architectural elements. We create a synthetic dataset, namely the Historical Dome Dataset (HDD), consisting of nearly 1000 dome systems with four semantic classes. We quantitatively and qualitatively analyze the usefulness of the HDD by training a number of modern neural networks on it. Our method of synthesizing point clouds can quickly be adapted into similar cultural heritage projects to prepare relevant data to accurately train deep neural networks and process the collected cultural heritage data.
the proceedings contain 26 papers. the special focus in this conference is on Simulation of Adaptive Behavior. the topics include: Vector-Based Navigation Inspired by Directional Place Cells;a Behavior-Based Mode...
ISBN:
(纸本)9783031715327
the proceedings contain 26 papers. the special focus in this conference is on Simulation of Adaptive Behavior. the topics include: Vector-Based Navigation Inspired by Directional Place Cells;a Behavior-Based Model of Foraging Nectarivorous Echolocating Bats;benefit of Varying Navigation Strategies in Robot Teams;no-brainer: Morphological Computation Driven Adaptive Behavior in Soft Robots;cuttleBot: Emulating Cuttlefish Behavior and Intelligence in a Novel Robot Design;the Emergence of a Complex Representation of Touch through Interaction with a Robot;analyzing Multi-robot Leader-Follower Formations in Obstacle-Laden Environments;spatio-Temporal Dynamics of Social Contagion in Bio-inspired Interaction Networks;behavioural Contagion in Human and Artificial Multi-agent systems: A Computational Modeling Approach;transient Milling Dynamics in Collective Motion with Visual Occlusions;extended Swarming with Embodied Neural Computation for Human control over Swarms;bio-Inspired Agent-Based Model for Collective Shepherding;DaNCES: A Framework for Data-inspired Agent-Based Models of Collective Escape;the Role of Energy Constraints on the Evolution of Predictive Behavior;influence of the Costs of Acquisition of Private and Social Information on Animal Dispersal;integrated Information in Genetically Evolved Braitenberg Vehicles;neural Chaotic Dynamics for Adaptive Exploration control of an Autonomous Flying Robot;non-instructed Motor Skill Learning in Monkeys: Insights from Deep Reinforcement Learning Models;memory-Feedback controllers for Lifelong Sensorimotor Learning in Humanoid Robots;extracting Principles of Exploration Strategies with a Complex Ecological Task;the Cost of Behavioral Flexibility: Reversal Learning Driven by a Spiking Neural Network;"Value" Emerges from Imperfect Memory;the Role of theory of Mind in Finding Predator-Prey Nash Equilibria;nonverbal Immediacy Analysis in Education: A Multimodal Computational Model.
the increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e...
详细信息
Despite significant advances in methods for processing large volumes of structured and unstructured data, surprisingly little attention has been devoted to developing general practical methodologies that leverage stat...
Despite significant advances in methods for processing large volumes of structured and unstructured data, surprisingly little attention has been devoted to developing general practical methodologies that leverage state-of-the-art technologies to build domain-specific semantic search engines tailored to use cases where they could provide substantial benefits. this paper presents a methodology for developing these kinds of systems in a lightweight, modular, and flexible way with a particular focus on providing powerful search tools in domains where non-expert users encounter challenges in exploring the data repository at hand. Using an academic expertise finder tool as a case study, we demonstrate how this methodology allows us to leverage powerful off-the-shelf technology to enable the rapid, low-cost development of semantic search engines, while also affording developers withthe necessary flexibility to embed user-centric design in their development in order to maximise uptake and application value.
暂无评论