Federated Learning (FL) is a distributed learning scheme that enables deep learning to be applied to sensitive data streams and applications in a privacy-preserving manner. This paper focuses on the use of FL for anal...
详细信息
When we deploy sensors, we face severe problems to achieve resilience and robust coverage. It happens more in stochastic and dynamic environments. In this paper, we propose a hybrid framework which is a combination of...
详细信息
This paper presents the design of reconfigurable green PM2.5 sensor module deployment scheme based on blockchain technology. The proposed scheme proposes classes with hierarchical layers implemented by name registry s...
详细信息
ISBN:
(纸本)9783031054914;9783031054907
This paper presents the design of reconfigurable green PM2.5 sensor module deployment scheme based on blockchain technology. The proposed scheme proposes classes with hierarchical layers implemented by name registry smart contract that could be reconfigured for solving the green deployment problem among PM2.5 sensor modules. This proposed scheme design three functions made by smart contracts including Registration smart contract, Hierarchical Class Mapping Based on Name Registry Smart Contract Function, and Reconfigurable Working Grouping Smart Contract Function. The results shown that the modules which are measured the similar data will be distributed into the candidate group instead of the current working group, where the total corresponding energy consumption will be reduced for the BC transaction operations in this blockchain network. Moreover, the relevant data storages will be also avoided to store the duplication data as well as redundant data.
The purpose of this study is to present agile, intelligent, and efficient computer vision architectures, operating on quantum neuromorphic computing, as part of a Space Situational Awareness (SSA) network. Quantum neu...
详细信息
ISBN:
(纸本)9781665481021
The purpose of this study is to present agile, intelligent, and efficient computer vision architectures, operating on quantum neuromorphic computing, as part of a Space Situational Awareness (SSA) network. Quantum neuromorphic vision paired with polarimetric Dynamic Vision sensors p(DVS) principles, would give rise to the next generation of highly efficient neuromorphic engineering vision systems for SSA, at fast speeds, while operating at reduced bandwidth, low-power, and low-memory. A deep-learning network has been designed with high accuracy to classify different target speeds and shapes, by means of a p(DVS) neuromorphic sensor. The neural network relies on a limited number of events, within a fixed time window, instead of full frame images. In addition, it makes use of two classifiers, which practically take a single input and independently classify both its speed and shape. The outcome of this study indicates that both high computational efficiency and target classification accuracy results.
When commonly used two-step localization techniques, such as TOA/TDOA (Time-Of-Arrival, Time-Difference-of-Arrival), DOA (Direction-of-Arrival) or RSSI (Received-Signal-Strength-Indication)/Fingerprint-based, are appl...
详细信息
Appling mathematical modeling methods for analyses synchronization processes of distributed data processing systems makes it possible to significantly optimize these processes and guarantee the required level of consi...
详细信息
Home Automation system with web server deployment is developed using Raspberry Pi Pico and micropython, which turns ON the lights based on the count of persons inside that particular room. The system uses Infrared Red...
详细信息
作者:
Patel, AnandPatel, MiralDharmsinh Desai University
Faculty of Technology and Engineering Department of Information Technology Nadiad India Cvm University
G H.Patel College of Engineering and Technology Department of Information Technology Vallabh Vidyanagar Gujarat Anand India
The distributed ledger aspect of blockchain technology has transformed traditional trade;each record in this ledger is secured by cryptographic technique, making it more protected and tamper-proof, and the technology ...
详细信息
Being dangerous threats and attacks in this cyber era, botnets require proper handling. Nevertheless, some bot detection models that have been proposed are centralized and can only detect at one point of attack, even ...
详细信息
ISBN:
(纸本)9781665499736;9781665499729
Being dangerous threats and attacks in this cyber era, botnets require proper handling. Nevertheless, some bot detection models that have been proposed are centralized and can only detect at one point of attack, even though there are two known types of botnet activity: single and bot group. In fact, attacks from grouped bots can have a series of attacks with the same pattern at several different attack targets. So, it requires a distributed detection model that can detect bot attacks on some detection sensors and assemble them in the form of correlation analysis. This paper proposes a prototype distributed botnet detection model that can synchronize detection in each detection sensor and analyze a series of bot attack activities. It aims to obtain information on the series of attacks that occur at several attack points and state as a correlated botnet attack scenario. With the existence of a distributed botnet activity detection prototype, it will be able to facilitate the analysis and anticipation process from the system and network security administrators.
This paper studies the fault-tolerant consensus problem of a novel class of multi-agent systems with sensor faults and unknown disturbances, in which each agent is represented by two time-scales system. A decentralize...
详细信息
ISBN:
(数字)9781665495721
ISBN:
(纸本)9781665495721
This paper studies the fault-tolerant consensus problem of a novel class of multi-agent systems with sensor faults and unknown disturbances, in which each agent is represented by two time-scales system. A decentralized observer is proposed to simultaneously estimate the fault and agent's states. Then, an observer-based distributed protocol is designed to ensure the consensus of the underlying systems. Sufficient conditions for the existence of the proposed observer and consensus protocol are derived in terms of linear matrix inequalities (LMIs). A numerical example demonstrates the effectiveness of the proposed method.
暂无评论