In environments lacking infrastructure, such as the battlefield, a diverse array of intelligent devices continues to evolve. These devices face challenges in flexibly addressing resource allocation and information tra...
详细信息
How to coordinate the design of sampling and Sparse-dense Matrix Multiplication (SpMM) is important in Graph Neural Network (GNN) acceleration. However, existing methods have an imbalance between accuracy and speed in...
详细信息
In recent years, the volumes of information processed and transmitted over the network are rapidly increasing, while the demand for speed and quality of transmitted data is also increasing. As a result, there is a nee...
详细信息
ISBN:
(纸本)9783031609930;9783031609947
In recent years, the volumes of information processed and transmitted over the network are rapidly increasing, while the demand for speed and quality of transmitted data is also increasing. As a result, there is a need to use edge computing, which allows reducing network response time and more efficiently using bandwidth, as well as significantly improving the performance of the data transmission system. Article describes the application of edge computing in the form of transferring processes to an edge computing cluster, and presents the results of research on existing migration processes, full transfer time and downtime, identifying the optimal migration process for further implementation of the service migration automation algorithm. The following empirical research methods were used in the work: comparative evaluation method and experiment. The work considers the transfer of computational processes to an edge computing cluster;a comparative analysis of methods for automated service migration is carried out;an optimal migration strategy is identified;an algorithm for automating service migration is developed. Solutions related to automation of migration are excellent for use in the field of Internet of Things. They contribute to improving application performance and reducing response time. Automatic service migration allows increasing process efficiency and reducing system maintenance costs."
In the present work, a distributed network-based remote indoor temperature control and energy conservation system is proposed. The system provides such functions as remote data transfer and remote control, as well as ...
详细信息
Ubiquitous artificial intelligence (AI) is considered one of the key services in 6G systems. AI services typically rely on deep neural networks (DNN) requiring heavy computation. Hence, to support ubiquitous AI, it is...
详细信息
Edge artificial intelligence (Edge-AI) is emerging with the proliferation of both multi-access edge computing (MEC) and AI. Cooperative Edge-AI can not only increase the computing resource utilization ratio with edge-...
详细信息
The combination of cognitive radio networks and unmanned aerial vehicles (UAVs) can overcome the scarcity of spectrum for wireless networks and provide important benefits for large-scale deployment of UAVs. However, e...
详细信息
The proceedings contain 31 papers. The special focus in this conference is on Structural Information and Communication Complexity. The topics include: Awake Complexity of distributed Minimum Spanning Tree;all You Need...
ISBN:
(纸本)9783031606021
The proceedings contain 31 papers. The special focus in this conference is on Structural Information and Communication Complexity. The topics include: Awake Complexity of distributed Minimum Spanning Tree;all You Need are Random Walks: Fast and Simple distributed Conductance Testing;k-Center Clustering in distributed Models;optimal Memory Requirement for Self-stabilizing Token Circulation;stand-Up Indulgent Gathering on Rings;in Search of the Lost Tree;near-Optimal Fault Tolerance for Efficient Batch Matrix Multiplication via an Additive Combinatorics Lens;deterministic Leader Election for Stationary Programmable Matter with Common Direction;mutual Visibility in Hypercube-Like Graphs;non-negotiating distributed Computing;better Sooner Rather Than Later;Highly-Efficient Persistent FIFO Queues;locally Balanced Allocations Under Strong Byzantine Influence;distributed Fractional Local Ratio and Independent Set Approximation;towards Singular Optimality in the Presence of Local Initial Knowledge;efficient Wait-Free Linearizable Implementations of Approximate Bounded Counters Using Read-Write Registers;on distributed Computation of the Minimum Triangle Edge Transversal;stability of P2P networks Under Greedy Peering;universal Coating by 3D Hybrid Programmable Matter;distributed Binary Labeling Problems in High-Degree Graphs;Computing Replacement Paths in the CONGEST Model;reaching Agreement Among k out of n Processes;on the Bit Complexity of Iterated Memory;sharding in Permissionless systems in Presence of an Adaptive Adversary;online Drone Scheduling for Last-Mile Delivery;efficient Self-stabilizing Simulations of Energy-Restricted Mobile Robots by Asynchronous Luminous Mobile Robots;network Abstractions for Characterizing Communication Requirements in Asynchronous distributedsystems;on the Existence of Consensus Converging Organized Groups in Large Social networks;multi-agent Online Graph Exploration on Cycles and Tadpole Graphs.
The progressive dissemination of the Internet of Things (IoT) and Wireless Sensor networks (WSNs) has ushered in a new era of connectivity, with vast applications spanning from medicare to smart city infrastructure. H...
详细信息
ISBN:
(纸本)9789819797615
The progressive dissemination of the Internet of Things (IoT) and Wireless Sensor networks (WSNs) has ushered in a new era of connectivity, with vast applications spanning from medicare to smart city infrastructure. However, this expansion has been paralleled by a corresponding increase in the sophistication and variety of cyber threats targeting these networks. Traditional cyber security measures, designed for a less dynamic threat landscape, are proving increasingly insufficient in protecting against the innovative and varied attack methods now in commonplace. This study introduces an innovative application of Generative Adversarial networks (GANs) to address this challenge, presenting a novel framework for the simulation and mitigation of advanced network attacks, particularly focusing on distributed Denial of Service (DDoS) and spoofing attacks which pose significant threats in IoT environments. Generative Adversarial networks (GANs), comprising two neural networks-the generator and the discriminator compete in a game-theoretic scenario, facilitating a deep understanding of attack patterns through the generation of realistic, synthetic cyber-attack scenarios. This research exploits GANs to bridge the gap between the static nature of traditional security protocols and the dynamic, evolving landscape of cyber threats. By training on a comprehensive dataset of known attacks and normal network activities, our proposed model, the Dynamic Adaptive Threat Simulation GAN (DATS-GAN), is capable of producing varied and realistic attack scenarios. These simulations serve a dual purpose: they not only enhance the detection capabilities and responsiveness of current security systems but also provide a basis for the development of new, adaptive security mechanisms capable of dynamically responding to the ever-changing cyber threat landscape. The effectiveness of DATS-GAN is demonstrated through extensive empirical analysis, highlighting significant improvements in the detecti
With the paradigm change and the need for two-way communication and secure data transfer based on two-way correspondence between security domains with high and low information importance, the need for cross-domain sol...
详细信息
ISBN:
(纸本)9798350356250
With the paradigm change and the need for two-way communication and secure data transfer based on two-way correspondence between security domains with high and low information importance, the need for cross-domain solutions (CDS) has increased. The cross-domain solution is a security approach that implements data exchange between different security domains by security policies. Nowadays, distributed energy resources(DER) as a solution for small-scale power plants to produce electricity are growing more and more due to their high *** exchange between power plants and its upstream security domain, such as the control center of the SCADA, is an inevitable necessity. To establish two-way communication, CDS equipment must follow the two-way security policy of security domains. By establishing a two-way correspondence between the high and low security domains, the CDS is able to confirm the request and the associated response and reject it otherwise. This study proposes two central ideas. The first idea proposes a two-way CDS architecture that is able to check the correspondence between the response and the received request in SCADA based on DER architecture. The second idea is a distributed CDS architecture that is able to connect several low security domains to a control center in a high security domain. Considering the large number of solar power plants as a low-security domain and how to connect them to the SCADA control center in the high-security domain, using a one-to-one architecture is a costly approach. Obviously, with the implementation of distributed architecture may lead to reduction of CDS network downtime, scalability, redundancy, flexibility, cost-effectiveness, advanced fault tolerance and preventing a single point of failure in CDS. In the current studies, there is no distributed CDS and CDS by checking two-way correspondence of packets. Therefore, in this study, a prototype of a distributed CDS architecture and two-way CDS architecture based
暂无评论