This paper presents a novel frequency control method for static wireless power transfer (WPT) systems using neural networks. Static WPT, where transmitter and receiver distance is fixed, achieves optimal power at the ...
详细信息
The wear reliability analysis model of pantograph systems is built based on a radial basis function neural network in this paper, complicated and strong nonlinear wear characteristics of pantograph systems are obtaine...
详细信息
This paper proposes an enhanced neural network model predictive control based on the teaching learning-based optimization algorithm, for the speed control of the permanent magnet synchronous motor. The objectives of t...
详细信息
This paper presents a formulation of interval control for nonlinear systems based on Long Short-Term Memory network (LSTM) and using predictive control to solve the nonlinear interval control problem. The gradient des...
详细信息
This study explores the application of machine learning algorithms, including Linear Regression, Decision Trees, and a Feed-Forward Neural network, to solve the inverse kinematics problem for a 2R planar robotic arm. ...
详细信息
Slotted Aloha has been widely adopted in various communication systems, while its stability performance has long been observed as being sensitive to the setting of transmission probabilities. For stability analysis of...
详细信息
ISBN:
(纸本)9781728190549
Slotted Aloha has been widely adopted in various communication systems, while its stability performance has long been observed as being sensitive to the setting of transmission probabilities. For stability analysis of Aloha networks with multiple transmitter-receiver (T-R) pairs, the focus of previous studies has been placed on characterization of the maximum input rate of T-R pairs, below which the network can be stabilized under any given topology. With a fixed and identical transmission probability for all T-R pairs, nevertheless, network stability is often found to be unachievable, as part of transmitters would become unstable regardless of how small the traffic input rate is. As we will demonstrate in this paper, to stabilize the whole network, transmission probabilities of T-R pairs should be properly adjusted according to their traffic input rates and locations. Specifically, by establishing the fixed-point equations of the steady-state probabilities of successful transmissions of Head-of-Line (HOL) packets, the service rates of transmitters' queues can be obtained, based on which the operating region of transmission probabilities for achieving stability can further be characterized. Simulation results corroborate that all the T-R pairs can be stabilized by choosing transmission probabilities from the region, which highlights the importance of proper transmission control based on the traffic input rates and network topology for Aloha networks.
5G radio access network (RAN) slicing enables better satisfaction of different quality of service (QoS) requirements than without network slicing. A handful of slice types are specified for various service verticals;h...
详细信息
ISBN:
(纸本)9798350316971
5G radio access network (RAN) slicing enables better satisfaction of different quality of service (QoS) requirements than without network slicing. A handful of slice types are specified for various service verticals;however, the number and size of those slices is unspecified. Subslicing refers to grouping slice users into smaller groups, subpartitioning slice bandwidth, and allocating smaller bandwidth parts to smaller user groups. State of the art subslicing has been done to better satisfy the QoS requirements inside the service vertical. Slice performance improvement was not the purpose of subslicing, but the positive effect was noticeable. In this paper, the subslicing decision is done with the aim of improving slice performance. The decision mechanism for management closed control loop is proposed. The input dataset consists of 6 key performance indicators, namely slice bandwidth utilization, slice goodput (application level throughput) per one allocated resource block (RB), and slice block error ratio (BLER), both in uplink and downlink. This dataset is clustered, and the result is learned by a classifier to decide whether the slice is too large and should be split or too small and should be merged with another too small slice or subslice. The results show that by knowing the slice utilization and goodput per one allocated RB, the slice reconfiguration action regarding subslicing can be determined using machine learning tools.
The rapid development of the Internet of Things (IoT) has led to an exponential increase in data volumes offloaded to edge computing for rapid processing and analysis close to IoT devices. One of the major challenges ...
详细信息
This paper first investigates emergency transportation for power recovery in post-disaster. The problem is formulated as a mixed-integer linear programming model called vehicle routing problem with charging relief (VR...
详细信息
This paper first investigates emergency transportation for power recovery in post-disaster. The problem is formulated as a mixed-integer linear programming model called vehicle routing problem with charging relief (VRPCR). The battery state of charge (SoC$SoC$) implies the working hours that the battery can provide. The goal is to make a set of shelters charge before the battery SoC$SoC$ of shelters reaches the minimum bound over time. To this end, a two-stage algorithm is developed to deal with the problem. In stage I, a reduced road network is obtained from a leading road network by the A-star search algorithm. Subsequently, to determine the order of power delivery with charging operations at shelters by enhanced genetic algorithm (EGA) in stage ii. To evaluate this strategy, the detailed complexity analysis of the three algorithms and results tested on a realistic disaster scenario shows the performance of the A-star search algorithm for VRPCR that outperforms the Dijkstra and Floyd algorithms. In addition, the EGA is applied to Solomon's benchmarks compared with the state-of-the-art heuristic algorithms, which indicates a better performance of EGA. A real case obtained from a disaster scenario in Ichihara City, Japan is also conducted. Simulation results demonstrate that the method can achieve satisfactory solutions.
In today's digital landscape, critical services are increasingly dependent on network connectivity, thus cybersecurity has become paramount. Indeed, the constant escalation of cyberattacks, including zero-day expl...
详细信息
In today's digital landscape, critical services are increasingly dependent on network connectivity, thus cybersecurity has become paramount. Indeed, the constant escalation of cyberattacks, including zero-day exploits, poses a significant threat. While network Intrusion Detection systems (NIDSs) leveraging machine-learning and deep-learning models have proven effective in recent studies, they encounter limitations such as the need for abundant samples of malicious traffic and full retraining upon encountering new attacks. These limitations hinder their adaptability in real-world scenarios. To address these challenges, we design a novel NIDS capable of promptly adapting to classify new attacks and provide timely predictions. Our proposal for attack-traffic classification adopts Few-Shot Class-Incremental Learning (FSCIL) and is based on the Rethinking Few-Shot (RFS) approach, which we experimentally prove to overcome other FSCIL state-of-the-art alternatives based on either meta-learning or transfer learning. We evaluate the proposed NIDS across a wide array of cyberattacks whose traffic is collected in recent publicly available datasets to demonstrate its robustness across diverse network-attack scenarios, including malicious activities in an Internet-of-Things context and cyberattacks targeting servers. We validate various design choices as well, involving the number of traffic samples per attack available, the impact of the features used to represent the traffic objects, and the time to deliver the classification verdict. Experimental results witness that our proposed NIDS effectively retains previously acquired knowledge (with over 94% F1-score) while adapting to new attacks with only few samples available (with over 98% F1-score). Thus, it outperforms non-FSCIL state of the art in terms of classification effectiveness and adaptation time. Moreover, our NIDS exhibits high performance even with traffic collected within short time frames, achieving 95% F1-score whi
暂无评论