This paper proposes an approximate Bayesian model to predict the number of internally displaced people arriving to a location. Locations are characterized by their elevation, distance from point of departure, and land...
详细信息
The number of refugees and other displaced persons is at an all-time high globally. News coverage of displacement often evokes negative and even dehumanizing portrayals of the situations, politics, and economics of re...
详细信息
Financial transactions between humanitarian aid donors and recipients form a network that can inform our understanding of how resilient these efforts are collectively. This is particularly critical considering that ce...
详细信息
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t...
详细信息
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. They can provide a comprehensive view of the affected area allowing for quick and a...
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. They can provide a comprehensive view of the affected area allowing for quick and accurate assessments of the extent of damage by providing critical information on the disaster's development. Semantic segmentation is believed to be one of the best techniques to capture pixel-wise information in computer vision. In this work, we will be using U-Net-based architectures to address the building localization and damage detection of the complex Xview2 dataset. We propose a generic algorithm that is not constrained by the nature of the disaster and can be deployed to various classes of disaster types with slight modifications.
This paper applied Monte Carlo Tree Search (MCTS) and its variant algorithm "Upper Confidence bounds applied to Trees" (UCT) to Chinese checker game and visualized it in the Ludii games portal. Since the MCT...
This paper applied Monte Carlo Tree Search (MCTS) and its variant algorithm "Upper Confidence bounds applied to Trees" (UCT) to Chinese checker game and visualized it in the Ludii games portal. Since the MCTS approach cannot guarantee a finite game length in our simulation and the winning strategy is inefficient, we developed a Convolution Neural Network (CNN) model formulated on top of the MCTS algorithm to improve the performance of the Chinese checker game. Our experiment and simulations show that by using the weak labels generated by MCTS algorithm, the CNN-based model could learn without supervised signals from human interventions and execute the game strategy in a finite time. PyGame and the Ludii game portal are used in our simulation to visualize the game and show the final game results.
5G networks are expected to provide high-speed, low-latency, and reliable connectivity to support various applications such as autonomous vehicles, smart cities, and the Internet of Things (IoT). However, the performa...
5G networks are expected to provide high-speed, low-latency, and reliable connectivity to support various applications such as autonomous vehicles, smart cities, and the Internet of Things (IoT). However, the performance of 5G networks can be affected by several factors such as interference, congestion, signal attenuation, or attacks, which can lead to packet loss and retransmissions. Retransmissions in the network may be seen as an essential measure to improve network reliability, but a high retransmission rate may indicate issues that can help network operators mitigate possible service disruptions or threats to network users. A deep learning-based approach has been proposed to predict downlink retransmissions in 5G networks, achieving as much as 5%- 15% improvement over traditional prediction algorithms.
The COVID-19 pandemic highlighted the vulnerability of supply chain networks to sources of concurrent disruption. This research investigates and broadens a quantified, generalised definition of vulnerability, which en...
详细信息
Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, ...
详细信息
Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions requiring speed and accuracy. Machine learning and artificial intelligence have become critical in supporting extensive data collection and real-time processing to assist decision-makers in configuring scarce resources. In this paper, we present four different applications that investigate issues related to the broader maritime supply chain security domain affecting the planning, execution, and performance of complex systems while exploring novel frontiers in cyber research and education. This paper will focus on Machine Learning and AI applications on Unmanned Aerial Systems and Cryptography related to Cybersecurity in Maritimes and Shipbuilding Spheres.
This paper takes a view on the identity management system in 5G using self-sovereign identity (SSI) solutions. It focuses on the use case of quasi-static and mobile devices that require a good connection on an isolate...
This paper takes a view on the identity management system in 5G using self-sovereign identity (SSI) solutions. It focuses on the use case of quasi-static and mobile devices that require a good connection on an isolated ship. The identities need to be self-managed when the ship is disconnected at sea, and the newly created identities need to be resolved when the ship regains connection. An overview of the decentralized / distributed identity management in 5G along with the call flows is presented in this paper. Furthermore, we highlight its impact on the large-scale device identity management process and its interoperability with minimum alterations in the current 5G identity management system. This work explores the security benefits of the decentralized property of SSI and measures the performance difference in merging identities with disconnected parts of the system. The results focus on three main measures of 5G identity management systems that include control overhead, verification delay, and identity reconciliation. The paper presents the costs/benefits to the SSI solution compared to centralized identity management systems.
暂无评论