Since network delays can severely impact networked controlsystems (NCS), both guaranteed Quality of Service (QoS) at the network level and guaranteed stability at the application level in the presence of delays are e...
详细信息
controlling antenna tilts in cellular networks is critical to achieve a good trade-off between network coverage and capacity. We devise algorithms learning optimal tilt control policies from existing data (passive lea...
详细信息
controlling antenna tilts in cellular networks is critical to achieve a good trade-off between network coverage and capacity. We devise algorithms learning optimal tilt control policies from existing data (passive learning setting) or from data actively generated by the algorithms (active learning setting). We formalize the design of such algorithms as a Best Policy Identification problem in Contextual Linear Bandits (CLB). In CLB, an action represents an antenna tilt update;the context captures current network conditions;the reward corresponds to an improvement of performance, mixing coverage and capacity. The objective is to identify an approximately optimal policy (a function mapping the context to an action with maximal reward). For both active and passive learning, we derive information-theoretical lower bounds on the number of samples required by any algorithm returning an approximately optimal policy with a given level of certainty, and devise algorithms achieving these fundamental limits. We apply our algorithms to the Remote Electrical Tilt optimization problem in cellular networks, and show that they can produce optimal tilt update policy using much fewer data samples than naive or existing rule-based learning algorithms. This paper is an extension of work presented at IEEE International conference on Computer Communications (INFOCOM) 2022 (Vannella et al. 2022).
In order to solve the problem of low security in transactions between multi service providers and multi bottom network providers, this paper proposes a secure and efficient network slice resource access control mechan...
详细信息
In order to solve the problem of low security in transactions between multi service providers and multi bottom network providers, this paper proposes a secure and efficient network slice resource access control mechanism in a distributed environment. First, a secure and efficient network slice resource access control architecture in distributed environment is designed. The framework consists of multiple domains. The roles of each domain include multiple service providers, multiple underlying network providers, authentication servers, and resource use license servers. The overall mechanism of secure and efficient network slice resource access control in a distributed environment includes six steps: the service provider applies for identity authentication to the authentication server, the service provider applies for resources to the resource use license server, the resource use license server returns the list of underlying network providers to the service provider, the underlying network provider allocates resources to the service provider, the service provider applies for resources from a resource use license server outside the domain, and the resource use license server outside the domain returns a remote list of underlying network providers to the service provider. Finally, the mechanism in this paper has good performance.
Contemporarily, in light of the intelligent transportation systems (ITS) sector, the tendency can be observed that the solution of the multi-objective cyber-physical optimization problems with imperfect information ta...
详细信息
ISBN:
(纸本)9798350363074;9798350363081
Contemporarily, in light of the intelligent transportation systems (ITS) sector, the tendency can be observed that the solution of the multi-objective cyber-physical optimization problems with imperfect information takes an increasingly weighted role. In the present scientific work, the authors want to take these developments into account by introducing an innovative cyber-physical architectural design and corresponding the two-stage heuristic computing approach. It is utilized in synergy with the MCSA1 and DCEx architectural principles for the workflow scheduling of Monte-Carlo simulation, which is based on the intelligent and sustainable route-order dispatching process model. Factors such as emissions, transport costs, risks, and the individual weighting of orders are reflected in the model. In particular, the authors define a stochastic ILP-based2 monte-carlo workflow model. They further propose two-stage scheduling heuristic with d-HEFT DAG relaxation as first stage and apply state-of-the-art techniques as a part of SCIP framework to solve 2nd 1-0 ILP-based stage;evaluate the performance of the scheduling approach. The authors obtain preliminary results of the second stage behavior using a realistic heterogeneous computing scenario and corresponding constraint structures within MACS simulator engine3. The results from the experiments illustrate moderate complexity of the approach. Scalability of the model looks promising for the applicability in various industry-related scenarios and corresponding computing environments.
In video snapshot compressive imaging (SCI) systems, video reconstruction methods are used to recover spatial- temporal-correlated video frame signals from a compressed measurement. While unfolding methods have demons...
详细信息
In video snapshot compressive imaging (SCI) systems, video reconstruction methods are used to recover spatial- temporal-correlated video frame signals from a compressed measurement. While unfolding methods have demonstrated promising performance, they encounter two challenges: (1) They lack the ability to estimate degradation patterns and the degree of ill-posedness from video SCI, which hampers guiding and supervising the iterative learning process. (2) The prevailing reliance on 3D-CNNs in these methods limits their capacity to capture long-range dependencies. To address these concerns, this paper introduces the Degradation-Aware Deep Unfolding network (DADUN). DADUN leverages estimated priors from compressed frames and the physical mask to guide and control each iteration. We also develop a novel Bidirectional Propagation Convolutional Recurrent Neural network (BiP-CRNN) that simultaneously captures both intra-frame contents and inter-frame dependencies. By plugging BiP-CRNN into DADUN, we establish a novel end-to-end (E2E) and data-dependent deep unfolding method, DADUN with transformer prior (TP), for video sequence reconstruction. Experimental results on various video sequences show the effectiveness of our proposed approach, which is also robust to random masks and has wide generalization bounds.
Recent advancements in deep learning, particularly in semantic segmentation, have achieved notable success in various industrial applications. However, the characteristics of images vary between applications, presenti...
详细信息
ISBN:
(纸本)9798331517939;9788993215380
Recent advancements in deep learning, particularly in semantic segmentation, have achieved notable success in various industrial applications. However, the characteristics of images vary between applications, presenting distinct challenges. In the case of steel images, environmental factors during acquisition significantly affect their appearance, and the random occurrence of defects complicates their generalization, making defect segmentation for surface inspection particularly challenging. This paper introduces TAG-Net, a novel attention-based semantic segmentation network aimed at improving the distinction between background and defects in challenging input images. TAG-Net estimates three attention maps for the background, defects, and their boundaries, with boundary detection included as an auxiliary task to enhance the guidance of the attention maps. Experiments on the NEU-Seg dataset demonstrate that our proposed method significantly outperforms traditional baseline approaches for general images and recent approaches for steel images, yielding superior segmentation performance.
The proceedings contain 175 papers. The topics discussed include: an optimized inverse neural networkcontrol augmented with feedback PI controller for time-varying systems;image encryption using neural network based ...
ISBN:
(纸本)9798331528201
The proceedings contain 175 papers. The topics discussed include: an optimized inverse neural networkcontrol augmented with feedback PI controller for time-varying systems;image encryption using neural network based chaotic systems;investigating the impact of update frequency on PID controller performance in autonomous robotics;deep learning framework for constellation signal classification in underwater optical wireless communication systems;fuzzy based web automation for smart power supply controller;ensembled machine learning models for antenna optimization in wireless communication/ biomedical applications;vertically integrated substrate integrated cavity based filtering antenna;network intrusion detection system using autoencoders;and a comparative study of Wallace tree multiplier and binary multiplier performance.
This study investigates the potential of spiking neural networks (SNNs) as a bio-inspired alternative to traditional Proportional (P) controllers in quadrotor simulations. A quadrotor model was developed and its perfo...
详细信息
ISBN:
(纸本)9798331517939;9788993215380
This study investigates the potential of spiking neural networks (SNNs) as a bio-inspired alternative to traditional Proportional (P) controllers in quadrotor simulations. A quadrotor model was developed and its performance validated through integration with SNNs, demonstrating the system's feasibility. The dataset for training the SNN was generated by applying the P controller to random states. The network fundamentally adopts a Convolutional Neural network structure but is uniquely modified to include spike current encoding and separated decoding, enhancing its processing capabilities. To address the inherent non-differentiable nature of SNNs, a surrogate gradient method was employed to facilitate effective backpropagation. The optimized SNN exhibited promising results, achieving an average loss of 0.251 and effectively managing to reposition the quadrotor to its original point. This study not only showcases the capabilities of SNNs in simulating and controlling flight dynamics but also paves the way for further research into their application in advanced controlsystems.
With the continuous development of computer vision technology, transportation systems are gradually approaching intelligence. This article proposes a lightweight neural network for highway toll vehicle classification,...
详细信息
ISBN:
(数字)9798350387780
ISBN:
(纸本)9798350387780;9798350387797
With the continuous development of computer vision technology, transportation systems are gradually approaching intelligence. This article proposes a lightweight neural network for highway toll vehicle classification, which can replace manual judgment of toll vehicle types. It is compared and validated with other object detection algorithms on the Beijing Hong Kong Macao Expressway dataset. The results show that the method proposed in this article has higher real-time performance and accuracy.
In this manuscript, we present a solution to provide secure communication in Industry 4.0 environments. Legacy ICS components that do not have encryption capabilities will be able to communicate using secured channels...
详细信息
ISBN:
(纸本)9798350369588;9798350369595
In this manuscript, we present a solution to provide secure communication in Industry 4.0 environments. Legacy ICS components that do not have encryption capabilities will be able to communicate using secured channels by means of P4 programmable switches that implement security in the data plane. We will compare the proposed solution with TLS end-to-end encryption, showing that it offers similar performance with no need to interact with the end hosts.
暂无评论