The following topics are dealt with: wireless LAN; 5G mobile communication; radio access networks; quality of service; Internet; vehicular ad hoc networks; software defined networking; mobile radio; computer network s...
详细信息
ISBN:
(数字)9781728162485
ISBN:
(纸本)9781728162492
The following topics are dealt with: wireless LAN; 5G mobile communication; radio access networks; quality of service; Internet; vehicular ad hoc networks; software defined networking; mobile radio; computer network security; and millimetre wave communication.
In this paper we are experimenting with an intrusion detection system (IDS) for IoT. The IDS under consideration is employing a machine learning techniques for detecting novel at-tacks in the IoT network. We examine d...
详细信息
ISBN:
(数字)9781728143514
ISBN:
(纸本)9781728198040
In this paper we are experimenting with an intrusion detection system (IDS) for IoT. The IDS under consideration is employing a machine learning techniques for detecting novel at-tacks in the IoT network. We examine detection based on Support Vector Machines (SVM). The detection models were trained and evaluated for Selective Forward and Blackhole network routing layer attacks using IoT-testbed data and achieved up to 99.8% Accuracy rates and 100% Recall values.
Existing methods of morphing 3D meshes are often limited to cases in which 3D input meshes to be morphed are topologically equivalent. The paper presents a new method for morphing 3D meshes having different surface to...
详细信息
Existing methods of morphing 3D meshes are often limited to cases in which 3D input meshes to be morphed are topologically equivalent. The paper presents a new method for morphing 3D meshes having different surface topological types. The most significant feature of the method is that it allows explicit control of topological transitions that occur during the morph. Transitions of topological types are specified by means of a compact formalism that resulted from a rigorous examination of singularities of 4D hypersurfaces and embeddings of meshes in 3D space. Using the formalism, every plausible path of topological transitions can be classified into a small set of cases. In order to guide a topological transition during the morph, our method employs a key frame that binds two distinct surface topological types. The key frame consists of a pair of "faces", each of which is homeomorphic to one of the source (input) 3D meshes. Interpolating the source meshes and the key frame by using a tetrahedral 4D mesh and then intersecting the interpolating mesh with another 4D hypersurface creates a morphed 3D mesh. We demonstrate the power of our methodology by using several examples of topology transcending morphing.
For a service robot to assist humans, it should interact with objects of varying sizes and shapes existing in an indoor environment. 3D object detection must be preceded to achieve this goal since it provides the robo...
ISBN:
(数字)9781728160757
ISBN:
(纸本)9781728160764
For a service robot to assist humans, it should interact with objects of varying sizes and shapes existing in an indoor environment. 3D object detection must be preceded to achieve this goal since it provides the robot with the ability to perceive visual information. Most of the existing methods are anchor-based and predict the bounding box close to the ground truth among multiple candidates. However, it is complex to compute Intersection over Union (IoU) and Non-Maximum Suppression (NMS) per each anchor box. Therefore, we propose keypoint-based monocular 3D object detection, where each object's center location is only needed for reproducing predicted 3D bounding box without extra computation of the anchor boxes. Our 3D object detection also works well even if images are rotated corresponding to the robot's head movement. To properly train our network, the object center is based on a projected 3D location instead of 2D to take advantage of the exact center position of the object. Furthermore, we apply data augmentation using a perspective transformation. The method facilitates adding a small perturbation to the camera rotation angle randomly. We use the SUN RGB-D dataset, which has images taken indoor scenes with camera rotations for training and test set. Our approach particularly shows that the errors of object center location based on a single image reduce 15.4% and 24.2%, respectively, compared to the method without data augmentation.
Device to Device (D2D) Communication is one of the technology components of the evolving 5G architecture, as it promises improvements in energy efficiency, spectral efficiency, overall system capacity, and higher data...
详细信息
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geographic routing protocols. This graph ...
详细信息
ISBN:
(纸本)1581134282
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geographic routing protocols. This graph has the following attractive properties: (1) it is a planar graph;(2) between any two nodes there exists a path in the RDG whose length, whether measure in terms of topological or Euclidean distance, is only a constant times the optimum length possible;and (3) the graph can be maintained efficiently in a distributed manner when the nodes move around. Furthermore, each node only needs constant time to make routing decisions. We also show by simulation that the RDG outperforms the previously proposed routing graphs under the Greedy Perimeter Stateless Routing (GPSR) protocol. In addition, we investigate theoretical bounds on the quality of paths discovered using GPSR.
Enterprise engineering (EE) is a growing scientific discipline that takes the increasingly needed construction-oriented point of view, and aims to provide synthetic knowledge for letting enterprises more effectively a...
详细信息
While Structure from Motion (SfM) achieves great success in 3D reconstruction, it still meets challenges on large scale scenes. In this work, large scale SfM is deemed as a graph problem, and we tackle it in a divide-...
详细信息
暂无评论