This article explores how IoT device systems handle multimedia data and presents a secure multimedia framework utilizing blockchain technology. The proposed framework high- lights how blockchain ensures the safety and...
详细信息
With the development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's Internet era. It c...
详细信息
ISBN:
(纸本)9798350386288;9798350386271
With the development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's Internet era. It can separate the control plane from the data plane, allowing rapid packet forwarding in the Internet through a centralized controller. However, SDN environments are vulnerable to traditional distributed Denial of Service (DDoS) attacks. This paper proposes a new dual layer strategy to try to mitigate the question. First, by using blockchain technology and smart contract in the northbound interface to store the flow tables required for SDN networks, security is increased. Then, we use the Token Bucket algorithm and Time Window algorithm to build the first-tier strategy to defend against obvious DDoS attacks. To detect unobvious DDoS attacks, we design the second-tier strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm to perform binary classification on data, thereby identifying abnormal traffic. We use the currently publicly available DDoS dataset CIC-DDoS2019 for experimental verification. The results show that using this strategy in SDN networks results in an average deviation of data Round-Rip Time (RTT) approximately 38.86% lower than in the original SDN networks without this strategy. Additionally, the accuracy of DDoS attack identification reaches 91.29%. This means that with the implementation of this strategy, DDoS attacks can be effectively identified without compromising the stability of data transmission in SDN network environments.
Tower solar thermal power generation is a new type of low-carbon and environmentally friendly clean energy technology. In this paper, a single-objective optimization model is established with the maximum annual averag...
详细信息
Autonomous robots that interact with their environment require a detailed semantic scene model. For this, volumetric semantic maps are frequently used. The scene understanding can further be improved by including obje...
详细信息
ISBN:
(纸本)9781665472609
Autonomous robots that interact with their environment require a detailed semantic scene model. For this, volumetric semantic maps are frequently used. The scene understanding can further be improved by including object-level information in the map. In this work, we extend a multi-view 3D semantic mapping system consisting of a network of distributed smart edge sensors with object-level information, to enable downstream tasks that need object-level input. Objects are represented in the map via their 3D mesh model or as an object-centric volumetric sub-map that can model arbitrary object geometry when no detailed 3D model is available. We propose a keypoint-based approach to estimate object poses via PnP and refinement via ICP alignment of the 3D object model with the observed point cloud segments. Object instances are tracked to integrate observations over time and to be robust against temporary occlusions. Our method is evaluated on the public Behave dataset where it shows pose estimation accuracy within a few centimeters and in real-world experiments with the sensor network in a challenging lab environment where multiple chairs and a table are tracked through the scene online, in real time even under high occlusions.
distributedsystems like microservices, containerized applications and cloud computing are considered crown jewels for developing business driven applications. These systems provide scalability, resiliency, ease of ac...
详细信息
Load balancing is the process of distributing the incoming traffic of the network among various resources and servers. When one of the servers fails, the load balancer transfers the network traffic to the other server...
详细信息
Grasping objects whose physical properties are unknown is still a great challenge in robotics. Most solutions rely entirely on visual data to plan the best grasping strategy. However, to match human abilities and be a...
详细信息
ISBN:
(纸本)9781728196817
Grasping objects whose physical properties are unknown is still a great challenge in robotics. Most solutions rely entirely on visual data to plan the best grasping strategy. However, to match human abilities and be able to reliably pick and hold unknown objects, the integration of an artificial sense of touch in robotic systems is pivotal. This paper describes a novel model-based slip detection pipeline that can predict possibly failing grasps in real-time and signal a necessary increase in grip force. As such, the slip detector does not rely on manually collected data, but exploits physics to generalize across different tasks. To evaluate the approach, a state-of-the-art vision-based tactile sensor that accurately estimates distributed forces was integrated into a grasping setup composed of a six degrees-of-freedom cobot and a two-finger gripper. Results show that the system can reliably predict slip while manipulating objects of different shapes, materials, and weights. The sensor can detect both translational and rotational slip in various scenarios, making it suitable to improve the stability of a grasp.
In recent years, industries have automated processes which mean the amount of human participation has decreased, resulting in the Fourth Industrial Revolution. A highly distributed self-organizing system known as a Wi...
详细信息
The proceedings contain 99 papers. The topics discussed include: SYnergy: fine-grained energy-efficient heterogeneous computing for scalable energy saving;5 ExaFlop/s HPL-MxP benchmark with linear scalability on the 4...
ISBN:
(纸本)9798400701092
The proceedings contain 99 papers. The topics discussed include: SYnergy: fine-grained energy-efficient heterogeneous computing for scalable energy saving;5 ExaFlop/s HPL-MxP benchmark with linear scalability on the 40-million-core Sunway supercomputer;GreenNFV: energy-efficient network function virtualization with service level agreement constraints;demystifying and mitigating cross-layer deficiencies of soft error protection in instruction duplication;a quantitative approach for adopting disaggregated memory in HPC systems;legate sparse: distributed sparse computing in Python;large-scale simulation of structural dynamics computing on GPU clusters;NNQS-transformer: an efficient and scalable neural network quantum states approach for ab initio quantum chemistry;and a high-performance MST implementation for GPUs.
The ieee 802.11 ah standard is the prominent protocol for medium range communication in the domain of Internet of Things (IoT), facilitating interaction between wireless sensor nodes and access points. Supporting up t...
详细信息
暂无评论