Mobile robots in disaster scenarios such as tunnels, mines, or collapsed structures face communication challenges for reliable video streaming to remote control centers. Commercial fifth-generation (5G) networks provi...
详细信息
ISBN:
(纸本)9798350381115;9798350381122
Mobile robots in disaster scenarios such as tunnels, mines, or collapsed structures face communication challenges for reliable video streaming to remote control centers. Commercial fifth-generation (5G) networks provide low latency and high bandwidth, especially in urban areas, but ad hoc WiFi networks with static and robotic nodes can provide a solution to attenuation in occluded areas. This paper offers a field experiment report from a search and rescue (SAR) exercise where we tested a WiFi mesh network against commercial 5G in tunnels 184 m long, 6 m wide, and 4 m high. Two operator streamed video to the Internet through a mesh that consisted of two static nodes and two mobile nodes on unmanned ground vehicles (UGV). Latency was measured for both operators for different video resolutions, as well as for a 5G customer-premises equipment (CPE) on-board a scout-UGV. The paper discusses experimental results and lessons learned.
Energy efficiency measurement plays an important role in the operation and design phase of a distribution control system. The main objective of any energy adequacy test is to determine the exact location of the steady...
详细信息
In the era of big data and growing privacy concerns, Federated Learning (FL) has emerged as a promising solution for collaborative model training while preserving user data privacy. However, FL faces challenges such a...
详细信息
Aerial base stations (ABSs), i.e., unmanned aerial vehicle-mounted base stations, have emerged as an essential technology to expand the coverage and capacity in next-generation wireless networks. Determining the optim...
详细信息
Modern data centers are hosting a great number of various applications (e.g. MapReduce and web search) that require a high fan-in data communication, which easily causes serious packet losses and timeouts, substantial...
详细信息
In order to solve the problems of reactive power optimization in distribution networks which includes the high proportion of distributed new energy power generation, this paper proposes a multi time scale reactive pow...
详细信息
The widespread use of digital networks, technologies, and platforms, that allow humans, physical objects, and machines to interact with each other, has significantly affected the structure, components, and knowledge p...
详细信息
ISBN:
(纸本)9783031054631;9783031054624
The widespread use of digital networks, technologies, and platforms, that allow humans, physical objects, and machines to interact with each other, has significantly affected the structure, components, and knowledge processes of innovation systems that have been transformed into cyber-physical innovation environments. Such environments operate at various scales and spaces, involve a wider set of actors, and demonstrate collective intelligence, exhibiting, thus, higher efficiency and impact than traditional innovation systems. Therefore, it is justified that there is an increasing research interest for understanding digital crowdsourcing platforms and online communities as a channel of collaborative innovation. Despite the attention such systems receive from different disciplines, there is still limited empirical evidence on their structure and coordination, as well as the mechanics that lead to sustained user participation and the generation of inventive and creative ideas, especially in urban planning and civic participation. This paper aims to conduct an overview of key platform attributes and common human-computer interaction patterns, based on an examination of the pertinent literature, as well as an indicative sample of notable platforms which allow large networks of individuals or communities to access, explore, and exchange knowledge and ideas.
Cybersecurity efforts aim to protect computersystems, especially complex systems with dynamically changing architectures like mobile computational clouds, from digital attacks. The use of machine learning (ML) models...
详细信息
ISBN:
(纸本)9798350377521;9798350377514
Cybersecurity efforts aim to protect computersystems, especially complex systems with dynamically changing architectures like mobile computational clouds, from digital attacks. The use of machine learning (ML) models in these systems to analyze and process data, allocate resources or monitor and manage infrastructure is increasingly the field of hackers and the target of sophisticated and increasingly difficult-to-detect attacks. Adversarial machine learning (AML) is a class of techniques and methods that attempt to "fool" classical ML algorithms by using, among others, deceptive data or modifying the parameters of cyber-physical systems (CPS). This paper presents a new generic evasion attack model for generating targeted attacks on the ML binary classifiers in domains with nonlinear constraints. We used GD (Gradient Descent) and Adam (Adaptive Moment Estimation) optimization algorithms as the most important internal components of two variants of our attack model. Such a model was then evaluated in an experimental analysis. The achieved results show that the new generic evasion attack model effectively generates targeted attacks on ML binary classifiers, utilizing GD and Adam optimization algorithms. This model was evaluated through experimental analysis, demonstrating its potential in cybersecurity contexts. Through this approach, the research contributes significantly to the field of adversarial machine learning by presenting a novel method that challenges the robustness of ML models under specific nonlinear constraints.
All existing coflow scheduling algorithms compute dynamic-rate schedules that change the rates of flows during transmission. In this paper, we make a crucial finding: although dynamically adjusting the rates of flows ...
详细信息
The pharmaceutical drug industry faces considerable challenges in supply chain management, particularly in regard to tracking and tracing medications. Counterfeit drugs pose a significant global threat, and existing s...
详细信息
暂无评论