In this paper we analyze the problem of optimal task scheduling for data centers. Given the available resources and tasks, we propose a fast distributed iterative algorithm which operates over a large scale network of...
详细信息
Motivated by current sharing in power networks, we consider a class of output consensus (also called agreement) problems for nonlinear systems, where the consensus value is determined by external disturbances, e.g., p...
详细信息
This paper performs a comparative analysis of Android mobile forensics tools which are used for acquisition and analyzing of Android mobile devices. The major challenges of Android forensics investigation are manufact...
详细信息
ISBN:
(数字)9781728159256
ISBN:
(纸本)9781728159263
This paper performs a comparative analysis of Android mobile forensics tools which are used for acquisition and analyzing of Android mobile devices. The major challenges of Android forensics investigation are manufacturing of Android devices with various operating system versions and there is no single tool which can be used for all sorts of Android devices. Aiming to overcome these challenges and increase more accuracy and integrity in Android forensic investigation, we made comparative analysis on both open source tools and one commercial tool. Logical and physical acquisition methods were utilized to acquire data from Android devices. Android Debug Bridge backup, Linux Data Duplicator utility tool, Magnet Acquire and Belkasoft Acquisition tools were used for acquisition. Two popular analyzing tools such as Autopsy and Belkasoft Evidence Center were utilized to analyze acquired data. The results show that using multiple tools can get more accuracy and integrity of artifacts which is forensically sound.
In counteraction to the increasing threat of cyber terrorism, the modeling to be predicted in guessing the predictive models for estimating the incidence of cyber-attacks for enterprise network in Myanmar are seriousl...
详细信息
ISBN:
(数字)9781728159256
ISBN:
(纸本)9781728159263
In counteraction to the increasing threat of cyber terrorism, the modeling to be predicted in guessing the predictive models for estimating the incidence of cyber-attacks for enterprise network in Myanmar are seriously needed. Although we need these models, there is no record of attacks, defenseless, outcome and threat to utilize the developing predictive models and authentication. The main purpose of this research is to determine whether SOC (Security Operation Center) manager uses cyber security model by using SOC results figures to prepare further cyber defense and incident response plan. The goal of this study was achieved by conducting experiments on various cyber-attacks occurred in security operation center of Industrial control System (ICS).
In the hardware implementation of quantum computation, the control pulses for quantum states and gate operations must be calibrated to correct errors induced by unknown drifts of system parameters. The calibration can...
详细信息
In the hardware implementation of quantum computation, the control pulses for quantum states and gate operations must be calibrated to correct errors induced by unknown drifts of system parameters. The calibration can be iteratively done by checking the control precision, but the required randomized benchmarking or quantum tomography is experimentally expensive. In this paper, we propose that the control calibration and the quantum tomography can be taken as two separate but collaborative learning processes. Combining the gradient-descent pulse engineering and the adaptive tomography, the resulting c-GRAPE algorithm can substantially reduce the high cost of measurements without sacrificing the control accuracy. The effectiveness is demonstrated by numerical simulation examples.
An article is based on comparing of data processing within PLC and MCU with using Cloud platforms. The last advances in computation and communication technologies are taking shape in the form of IoT (Internet of Thing...
详细信息
Motion planning is one of the most significant technologies for autonomous driving. To make motion planning models able to learn from the environment and to deal with emergency situations, a new motion planning framew...
详细信息
Motion planning is one of the most significant technologies for autonomous driving. To make motion planning models able to learn from the environment and to deal with emergency situations, a new motion planning framework called as"parallel planning" is proposed in this paper. In order to generate sufficient and various training samples, artificial traffic scenes are firstly constructed based on the knowledge from the reality.A deep planning model which combines a convolutional neural network(CNN) with the Long Short-Term Memory module(LSTM) is developed to make planning decisions in an end-toend mode. This model can learn from both real and artificial traffic scenes and imitate the driving style of human ***, a parallel deep reinforcement learning approach is also presented to improve the robustness of planning model and reduce the error rate. To handle emergency situations, a hybrid generative model including a variational auto-encoder(VAE) and a generative adversarial network(GAN) is utilized to learn from virtual emergencies generated in artificial traffic scenes. While an autonomous vehicle is moving, the hybrid generative model generates multiple video clips in parallel, which correspond to different potential emergency scenarios. Simultaneously, the deep planning model makes planning decisions for both virtual and current real scenes. The final planning decision is determined by analysis of real observations. Leveraging the parallel planning approach, the planner is able to make rational decisions without heavy calculation burden when an emergency occurs.
The online differentiation of a signal contaminated with bounded noise is addressed. A differentiator is developed that generates a Lipschitz continuous output, is exact in the absence of noise, and provides the optim...
The online differentiation of a signal contaminated with bounded noise is addressed. A differentiator is developed that generates a Lipschitz continuous output, is exact in the absence of noise, and provides the optimal worst-case accuracy among all possible exact differentiators when noise is present. This combination of features is not shared by any previously existing differentiator. Tuning of the developed differentiator is very simple, requiring only the knowledge of a bound for the second-order derivative of the signal. The approach consists in regularizing the possibly highly noisy output of a recently introduced linear adaptive robust exact differentiator and feeding it to a first-order sliding-mode filter designed to maintain optimal accuracy. The proposed regularization and filtering of this output allows trading the speed with which exactness is obtained for the feature of a Lipschitz continuous, hence less noisy, output. An illustrative example is provided to highlight the features of the developed differentiator.
The utilization of Artificial Intelligence (AI) to improve processes constitutes a main subject for many enterprises. The area of Production Planning and control (PPC) possesses several functions that could profit fro...
详细信息
The utilization of Artificial Intelligence (AI) to improve processes constitutes a main subject for many enterprises. The area of Production Planning and control (PPC) possesses several functions that could profit from such approaches. However, manufacturing companies find themselves often limited in the application of these approaches. This paper concentrates on three elements to assist enterprises: 1) the clarification of what AI is (in the manufacturing context) and its application to the field of PPC; 2) a review performed together with manufacturing enterprises in Germany and Hungary in order to understand the obstacles for the implementation of AI; and 3) the proposal of a maturity model to help enterprises understand where they are in regards to AI, as a way to help them create a roadmap to achieve their objectives.
暂无评论