Sub-terahertz and terahertz communications are key enabling technologies for future communication systems, and in the past few decades, many theoretical and experimental works have explored possible physical layer imp...
详细信息
ISBN:
(数字)9798350378597
ISBN:
(纸本)9798350378603
Sub-terahertz and terahertz communications are key enabling technologies for future communication systems, and in the past few decades, many theoretical and experimental works have explored possible physical layer implementations. Some theoretical works have also explored link or medium access control (MAC) layer solutions. However, there have been few implementations of the entire protocol stack using terahertz or sub-terahertz links. This work presents a platform implementing the whole protocol stack through Wi-Fi 6. The upload and download speeds of a Wi-Fi 6 sub-terahertz link are given, and the results indicate the need to optimize and specifically design the layers of the protocol stack for sub-terahertz and terahertz communications.
The Internet of Things (IoT), which has had a tremendous development in recent years, has altered many aspects of daily life by giving rise to commercial tools, home automation, wearable technology, and the framework ...
The Internet of Things (IoT), which has had a tremendous development in recent years, has altered many aspects of daily life by giving rise to commercial tools, home automation, wearable technology, and the framework for smart cities. The modern fantasy of having remote control over several parts of life has been realized because to this continuous connectivity and the ability of devices to acquire and interpret information. However, the various features and functionalities of IoT devices are a double-edged sword because they introduce a number of security flaws and dangers. Through a Systematic Literature Review (SLR), we explore vulnerabilities and their mitigation strategies based on prior research in the field. Notably, while the importance of security in IoT is paramount, especially considering the sensitivity of data involved, there exists a challenge in striking a balance between robust security and user convenience. It's imperative that while bolstering security, we do not compromise on user accessibility. This paper presents a comprehensive discourse addressing the dual challenges of security and accessibility in the IoT landscape. Our findings underscore the urgent need for layered security protocols, encryption, and user authentication to counteract the escalating cyber threats. We conclude by proposing a balanced solution that ensures both security and accessibility in the IoT ecosystem.
Under the condition of network and information, the important data in the power Industrial control System (ICS) is suffering more and more serious threat and destruction. It is necessary to further strengthen the prot...
详细信息
This paper presents a multi-agent reinforcement learning approach for autonomous vehicle highway merging control. A decentralized partially observable Markov decision process is formulated, where each autonomous vehic...
详细信息
ISBN:
(数字)9798350372977
ISBN:
(纸本)9798350372984
This paper presents a multi-agent reinforcement learning approach for autonomous vehicle highway merging control. A decentralized partially observable Markov decision process is formulated, where each autonomous vehicle acts independently based on local observations. The scenario considered in this paper assumes randomly spawning vehicles and fluctuating traffic flows and a self-attention network is used to handle varying numbers of agents (vehicles). The proposed method is validated in SUMO traffic simulator, which provides a realistic highway simulation environment. Results demonstrate the approach can enable safe, efficient coordination for merging maneuvers, successfully handling dynamic number of agents. Future work will continue to enhance multi-agent reinforcement learning for autonomous vehicle coordination in complex traffic environments by reducing the training time.
The proceedings contain 29 papers. The special focus in this conference is on Ubiquitous Security. The topics include: Impact of Library Code in Binary Similarity Systems;how Does Post-quantum Cryptography A...
ISBN:
(纸本)9789819712731
The proceedings contain 29 papers. The special focus in this conference is on Ubiquitous Security. The topics include: Impact of Library Code in Binary Similarity Systems;how Does Post-quantum Cryptography Affect Central Bank Digital Currency?;FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model;a Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models;process Mining with Programmable Logic controller Memory States;honey-Gauge: Enabling User-Centric Honeypot Classification;Improving DNS Data Exfiltration Detection Through Temporal Analysis;deploying Post-quantum Algorithms in Existing Applications and Embedded Devices;SCOrd: Shuffling Column-Oriented Relational Database to Enhance Security;A SLAHP in the Face of DLL Search Order Hijacking;poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack;channel Spatio-Temporal Convolutional Network for Trajectory Prediction;multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection;SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN;loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation;privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption;a Probability Mapping-Based Privacy Preservation Method for Social Networks;truFaaS - Trust Verification Framework for FaaS;detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence;privacy Preserving Elder Fall Detection Using Deep Learning;research on Authorization Model of Attribute Access control Based on Knowledge Graph;simulation of Mixmining Reward Parameters for the Nym Mixnet;blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing;is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication;a Unified Knowledge Graph to Permit Inte
Water scarcity is a growing global concern, particularly in agriculture. Traditional irrigation methods often lead to inefficient water usage. This research presents a smart irrigation system that utilizes sensor-base...
详细信息
ISBN:
(数字)9798331532420
ISBN:
(纸本)9798331532437
Water scarcity is a growing global concern, particularly in agriculture. Traditional irrigation methods often lead to inefficient water usage. This research presents a smart irrigation system that utilizes sensor-based technology to optimize water delivery to plants. The proposed system employs sensors to monitor soil moisture and temperature, enabling precise control of irrigation schedules. By automating the watering process, the system significantly reduces water consumption and minimizes the risk of overwatering or underwatering. The proposed system offers several benefits, including increased water efficiency, reduced labor costs, and enhanced crop yield. By adopting this technology, farmers can contribute to sustainable agriculture and mitigate the impact of water scarcity.
This paper focuses on the design of a gesture-controlled robotic arm that is navigated with the help of a webcam and OpenCV-enabled real-time hand tracking. Embedded with OpenCV’s hand tracking module, the system suc...
详细信息
ISBN:
(数字)9798350384598
ISBN:
(纸本)9798350384604
This paper focuses on the design of a gesture-controlled robotic arm that is navigated with the help of a webcam and OpenCV-enabled real-time hand tracking. Embedded with OpenCV’s hand tracking module, the system successfully identifies the hand landmarks from the live camera captured hand movement of the user. By the current state of each finger, the state is represented by a string format that includes the $ symbol and number (such as$00010) that is transmitted to an Arduino Uno board, the robotic arm can move its fingers up or down. control of the flows of the movement of the robotic arm is done using the Arduino Uno whereby the servo motors receive signals to move 0 or 180 degrees. This is mainly due to the efficiency, precision and short latency of the suggested system which makes it novel that gives the user a simple graphics interface to control robotic arms without necessity to know programming or have specific hardware. This technology provides an effective solution in robotic manipulation and presents the enormous potential to enhance HRI in different application areas.
Automatic speech recognition (ASR) systems transform acoustic waveforms into corresponding text representations, effectively capturing the semantic content conveyed by speakers. This paper presents the development of ...
详细信息
ISBN:
(数字)9798331522056
ISBN:
(纸本)9798331522063
Automatic speech recognition (ASR) systems transform acoustic waveforms into corresponding text representations, effectively capturing the semantic content conveyed by speakers. This paper presents the development of an ASR system tailored to Moroccan Arabic (Darija) for recognizing connected words in command-and-control scenarios. The system was trained on a dataset consisting of 2,394 words, each repeated 10 times, articulated by 19 speakers (both male and female) in Moroccan Arabic. It leverages the CMU Sphinx toolkit and employs Hidden Markov Models (HMMs) integrated with Gaussian Mixture Models (GMMs) for acoustic modeling. Mel-Frequency Cepstral Coefficients (MFCCs) were used for feature extraction. Experimental results demonstrate a recognition accuracy of $\mathbf{9 3 . 33 \%}$ for connected words, achieved using a configuration with four Gaussian mixtures.
With the development of information technology, wireless networks play an increasingly important role in people39;s lives. Because the number of terminals in the wireless network is large and the behavior is difficu...
详细信息
ISBN:
(数字)9798331528386
ISBN:
(纸本)9798331528393
With the development of information technology, wireless networks play an increasingly important role in people's lives. Because the number of terminals in the wireless network is large and the behavior is difficult to analyze, a wireless terminal behavior analysis method based on frequency pattern mining is proposed, which builds a behavior model for each wireless terminal by analyzing wireless controller logs and using information such as the terminal's connection location, online time, offline time. Experimental results show that the proposed method can effectively analyze the behavior patterns of wireless terminals and provide a basis for network administrators to optimize wireless networks.
The simultaneous withdrawal of multiple WTGs after wind farm participation in frequency regulation will cause a large power plunge, which in turn will cause a serious secondary frequency drop in the system. Moreover, ...
详细信息
ISBN:
(数字)9798350352658
ISBN:
(纸本)9798350352665
The simultaneous withdrawal of multiple WTGs after wind farm participation in frequency regulation will cause a large power plunge, which in turn will cause a serious secondary frequency drop in the system. Moreover, due to the large area of large-scale wind farms, the wind conditions in which each WTG is located vary greatly, and the volatility of wind speed is more complicated, so the timing arrangement of WTG withdrawal becomes more difficult. Aiming at this problem, this research takes the power dips and the output frequency regulation energy into account, at the moment of withdraw of WTG, establishes a wind speed differentiated withdraw control mode for WTG frequency regulation, and based on this, a novel control strategy of wind turbines for their withdraw of frequency regulation is proposed, which staggers the time of speed restoration of the WTG groups at the wind farm level to mitigate the power dips caused by the simultaneous withdraw of multiple WTGs.
暂无评论