Space systems enable essential communications, navigation, imaging and sensing for a variety of domains, including agriculture, commerce, transportation, and emergency operations by first responders. Protecting the cy...
详细信息
The equivalent rectangular stress block is the basis for determining the flexural strength of reinforced concrete members. Instructors commonly present the concept in two dimensions, contrary to its three-dimensional ...
详细信息
This paper presents the collaboration between unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) for site-specific application of chemical (herbicides, pesticides, and other chemicals). The paper show...
详细信息
Markov Chain Monte Carlo (MCMC) algorithms are a widely-used algorithmic tool for sampling from high-dimensional distributions, a notable example is the equilibirum distribution of graphical models. The Glauber dynami...
详细信息
Recently, video contents application (e.g. multimedia on-demand service, short video playback, etc.) are provided by more and more automobile manufacturers in vehicular networks. However, the huge traffic poses a larg...
详细信息
ISBN:
(数字)9798350378412
ISBN:
(纸本)9798350378429
Recently, video contents application (e.g. multimedia on-demand service, short video playback, etc.) are provided by more and more automobile manufacturers in vehicular networks. However, the huge traffic poses a large burden on the limited wireless network resources. Edge caching technology is a promising solution, where base stations act as edge cache nodes. There are limitations that base stations have restricted coverage and the cost of deployment is a concern. Unmanned Aerial Vehicles(UAVs) has been widely used due to its lightweight and ease of deployment. Each vehicular user requests video contents of interest from the content provider and nearby UAVs which precache a certain video contents in advance deliver video contents to the requester, i.e., vehicular users. However, the storage capacity of UAVs is limited. In order to efficiently utilize the storage resources of UAVs, it is necessary for UAVs to proactively cache video contents with higher popularity. It is a challenge that the popularity of video contents are unknown and time-variant. Thus, we need to predict the popularity of video contents. In this paper, a prediction scheme based on LSTM-Attention method is proposed. Specifically, historical requests of video contents are used to make a prediction on the request of video contents in the next time step in the LSTM model. Attention mechanism is added to improve the accuracy of the prediction of the popularity of video contents. The real-world dataset is used to demonstrate that the proposed LSTM-Attention prediction scheme can enhance the prediction performance of popularity.
In this paper, we address the critical concerns related to dataset privacy in the context of k-means clustering publishing within a distributed dimension setting. By leveraging differential privacy mechanisms, we prop...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
In this paper, we address the critical concerns related to dataset privacy in the context of k-means clustering publishing within a distributed dimension setting. By leveraging differential privacy mechanisms, we propose a novel framework that integrates a differentially private classifier, constructed through voting based on raw clustering results, and an enhanced generative adversarial network (GAN) simulating the classifier’s behavior in inferring class labels for a public dataset. Our approach generates synthetic clustering results that mimic real outcomes in classification tasks, ensuring differential privacy and minimizing noise. Our contributions include a comprehensive exploration of privacy issues, the introduction of a novel privacy-preserving k-means clustering framework, and theoretical analyses demonstrating sensitivity and differential privacy guarantees. Evaluation on the MNIST dataset demonstrates the effectiveness of the framework, achieving 82.22% accuracy with a (10.48, 10
−9
)-differential-privacy guarantee, compared to 83.45% accuracy without privacy-preserving.
Drones are valuable assets across industries for a variety of purposes, including but not limited to surveillance, transportation, delivery, smart agriculture, etc. However, drone-related studies may require significa...
Drones are valuable assets across industries for a variety of purposes, including but not limited to surveillance, transportation, delivery, smart agriculture, etc. However, drone-related studies may require significant costs to purchase, configure, and deploy to study algorithms and how drones interact with each other. Alternatively, drone simulators can provide a lower-cost option to investigate drones and related algorithms. Nevertheless, drone simulators on the market today tend to be computationally heavy, have a steep learning curve, and may be overwhelming for abstract problem-solving studies. There is a need for an inexpensive and easy testing alternative for researchers and for high-level algorithm development. In this paper, we present a lightweight and easy-to-use drone simulator that allows the definition of multiple drones with their sensors, actuators, speed, and battery limit as well as their communication among themselves. The simulator also allows the definition of the simulation world using small blocks that can be defined using different parameters. We presented two scenarios, such as package delivery and survey area coverage, to show the capabilities of the simulator. The simulator information can be achieved from our group website.
Laboratory automation technologies have revolutionized biomedical ***,the availability of automation solutions at the single-cell level remains scarce,primarily owing to the inherent challenges of handling cells with ...
详细信息
Laboratory automation technologies have revolutionized biomedical ***,the availability of automation solutions at the single-cell level remains scarce,primarily owing to the inherent challenges of handling cells with such small dimensions in a precise,biocompatible ***,we present a single-cell-level laboratory automation solution that configures various experiments onto standardized,microscale test-tube matrices via our precise ultrasonic liquid sample ejection technology,known as *** enables the transformation of titer plates into microdroplet arrays by printing nanodrops and single cells acoustically in a programmable,scalable,and biocompatible *** pipetting robots,PULSE enables researchers to conduct biological experiments using single cells as anchoring points(e.g.,1 cell vs.1000 cells per“tube”),achieving higher resolution and potentially more relevant data for modeling and downstream *** demonstrate the ability of PULSE to perform biofabrication,precision gating,and deterministic array barcoding via preallocated droplet-addressable *** cells can be gently printed at a speed range of 5–20 cell⋅s−1 with an accuracy of 90.5–97.7%,which can then adhere to the substrate and grow for up to 72 h while preserving cell *** the deterministic barcoding experiment,95.6%barcoding accuracy and 2.7%barcode hopping were observed by comparing the phenotypic data with known genotypic data from two types of single *** PULSE platform allows for precise and dynamic analyses by automating experiments at the single-cell level,offering researchers a powerful tool in biomedical research.
Thermals are regions of rising hot air formed on the ground through the warming of the surface by the sun. Thermals are commonly used by birds and glider pilots to extend flight duration, increase cross-country distan...
详细信息
Deep Reinforcement Learning (DRL) is critical in modern Artificial Intelligence (AI), powering innovations from gaming to autonomous vehicles. As DRL continues its rapid ascent, ensuring its systems are both trustwort...
Deep Reinforcement Learning (DRL) is critical in modern Artificial Intelligence (AI), powering innovations from gaming to autonomous vehicles. As DRL continues its rapid ascent, ensuring its systems are both trustworthy and effective is crucial. This research focuses on different DRL techniques and the challenges faced in real-life scenarios. The paper also describes various formal verification techniques and the challenges related to their application. It sheds light on the different frameworks and tools that can enhance the credibility of systems. We performed an extensive literature survey to present the existing methodologies, tools, and frameworks. The analysis systematically reviews and categorizes various formal verification techniques and frameworks employed in DRL. The insights garnered from this study are anticipated to foster an enriched understanding of the processes and contribute to decision-making in Safety Critical Systems using DRL and verification.
暂无评论