In the next for coming sixth-generation (6G) networks, Unmanned Aerial Vehicle (UAV) networks emerges with different Internet of Everything (IoE) applications and services. With the UAVs it is possible to move closer ...
详细信息
Major problems with the electricity grid include electrical mishaps. Electrical linemen who died at work while doing maintenance made up the majority of deaths. Poor electrical wire charging and discharging, that is d...
详细信息
The advances in robotics are often inspired by biological systems, which have attained harmonised functionality and efficiency through billions of years of evolution. Motivated by the nature, this paper presents the r...
详细信息
ISBN:
(纸本)9781665442732
The advances in robotics are often inspired by biological systems, which have attained harmonised functionality and efficiency through billions of years of evolution. Motivated by the nature, this paper presents the realisation of sensorimotor correlation using printed synaptic transistor. While such a concept has drawn increasing attention recently, no report on the adopted technology details has been published. To this end, this paper specifically presents the technical elements for the practical realisation of the concept through printed synaptic transistor and the development of the conditioning printed circuit board (PCB) for operating the as-realised device. This work presents a possible roadmap for the future advancement towards e-Skin with neural-like processing capability through a heterogeneous integration of printed circuits on flexible PCBs.
Wireless communications have experienced speedy and technical development in this modern era. Significant improvements are required in terms of communication speed link, energy level, size of the device, network lifet...
详细信息
In recent years, data security incidents caused by insider threats in distributed file systems have attracted the attention of academia and industry. The most common way to detect insider threats is based on user prof...
详细信息
ISBN:
(纸本)9781665494250
In recent years, data security incidents caused by insider threats in distributed file systems have attracted the attention of academia and industry. The most common way to detect insider threats is based on user profiles. Through analysis, we realize that based on existing user profiles are not efficient enough, and there are many false positives when a stable user profile has not yet been formed. In this work, we propose personalized user profiles and design an insider threat detection framework, which can intelligently detect insider threats for securing distributed file systems in real-time. To generate personalized user profiles, we come up with a time window-based clustering algorithm and a weighted kernel density estimation algorithm. Compared with non-personalized user profiles, both the Recall and Precision of insider threat detection based on personalized user profiles have been improved, resulting in their harmonic mean F1 increased to 96.52%. Meanwhile, to reduce the false positives of insider threat detection, we put forward operation recommendations based on user similarity to predict new operations that users will produce in the future, which can reduce the false positive rate (FPR). The FPR is reduced to 1.54% and the false positive identification rate (FPIR) is as high as 92.62%. Furthermore, to mitigate the risks caused by inaccurate authorization for users, we present user tags based on operation content and permission. The experimental results show that our proposed framework can detect insider threats more effectively and precisely, with lower FPR and high FPIR.
Wireless Power Transmission (WPT) has been widely used to replenish energy for Wireless Rechargeable sensor Networks. However, the charging service model, which is of the essence to commercial WPT, has not emerged so ...
详细信息
ISBN:
(纸本)9781665445139
Wireless Power Transmission (WPT) has been widely used to replenish energy for Wireless Rechargeable sensor Networks. However, the charging service model, which is of the essence to commercial WPT, has not emerged so far. In this paper, we present a wireless charging service model from the perspective of cooperative charging economics, and formulate the Cooperative Charging Scheduling (CCS) problem for joint optimization of rechargeable devices' charging cost and moving cost. We first propose two intragroup cost sharing schemes to sustain the cooperation among devices. Then, the approximation algorithm CCSA of the CCS problem is proposed based on greedy approach and submodular function minimization. Furthermore, we model the large-scale CCS problem as a coalition formation game and present a game theoretic algorithm CCSGA. We show that CCSGA finally converges to a pure Nash Equilibrium. We conduct simulations, and field experiments on a testbed consisting of 5 chargers and 8 rechargeable sensor nodes. The results show that the average comprehensive cost of CCSA is 27.3% lower than the noncooperation algorithm and is only 7.3% higher than the optimal solution on average. In field experiments, CCSA outperforms the noncooperation algorithm by 42.9% in terms of comprehensive cost on average. Moreover, CCSGA is much faster than the approximation algorithm and is more suitable for large-scale cooperative charging scheduling.
A non-invasive and portable device for stroke detection is proposed in this paper. A planar microwave sensor is designed at 2.4GHz ISM band on roger substrate with copper as conducting material. The microwave sensor i...
详细信息
As we move more deeply into information-oriented services and systems, we clearly observe the importance and impact of smart and connected vehicles for urban computing. New Cloud-enabled paradigms have boosted informa...
详细信息
ISBN:
(纸本)9781665439299
As we move more deeply into information-oriented services and systems, we clearly observe the importance and impact of smart and connected vehicles for urban computing. New Cloud-enabled paradigms have boosted information and service sharing. However, such paradigms rely heavily on the underlying communication layer, inheriting the challenges originated from the high mobility of vehicles. Several works have been devised to cope with highly dynamic vehicular environments in support of effective resource management and allocation, which we discuss in the paper. Moreover, we propose a Fog paradigm solution to resource allocation using a hierarchical method in vehicular clouds. Our method is based on the Multiplicative Analytic Hierarchy Process (MAHP) proposed by Lootsma. MAHP is a branch of another method called Analytic Hierarchy Process proposed by Saaty. Therefore, we used MAHP in the decision-making of the resource allocation process using a Fog paradigm to select the best Fog to allocate certain services. We evaluated the proposed solution comparing to three other decision methods, GREEDY, RANDOM, and RELIABLE. The proposed Fog-oriented Hierarchical Resource Allocation Policy in Vehicular Clouds (FRACTAL) performed better than the other decision methods, fulfilling more services and consequently denying fewer services.
The restructuring of power market is playing vital role in efficient use of renewable with tumbling the dependency on the conventional power plants. The new revolution in Electric Vehicle (EV) technology, the electric...
详细信息
Real-world applications such as habitat monitoring, air quality, natural disaster prevention, smart agriculture, and smart building are possible due to the utilization of Wireless sensor Networks (WSNs). However, in m...
详细信息
暂无评论