With 5G and beyond promises to realize massive machine-type communications, a wide range of applications have driven interest in complex heterogeneous networked systems, including multi-agent optimization, large-scale...
详细信息
ISBN:
(纸本)9798350371000;9798350370997
With 5G and beyond promises to realize massive machine-type communications, a wide range of applications have driven interest in complex heterogeneous networked systems, including multi-agent optimization, large-scale distributed learning, 5G service provisioning, etc. This trend highlights the essence of seamless control, management, and security mechanisms to be in place for the next-generation networked cyber-physical systems (CPS). In this paper, we interpret trust as a relation among networked collaborating entities that can set forth a measure for evaluating the status of network components and secure the execution of the collaborative protocol. In this paper, we will first elaborate on the importance of trust as a metric and then present a mathematical framework for trust computation and aggregation within a network. We consider two use-case examples where trust can be incorporated into the next-generation networked CPS and improve the security of decision-making, i.e. i) federated learning (FL), and ii) network resource provisioning. Finally, we explain the challenges associated with aggregating the trust evidence and briefly explain our ideas to tackle them.
The hope for a futuristic global quantum internet that provides robust and high-capacity quantum information transfer lies largely on qudits,the fundamental quantum information carriers prepared in high-dimensional su...
详细信息
The hope for a futuristic global quantum internet that provides robust and high-capacity quantum information transfer lies largely on qudits,the fundamental quantum information carriers prepared in high-dimensional superposition ***,preparing and manipulating N-dimensional flying qudits as well as subsequently establishing their entanglement are still challenging tasks,which require precise and simultaneous maneuver of 2(N-1)parameters across multiple degrees of ***,using an integrated approach,we explore the synergy from two degrees of freedom of light,spatial mode and polarization,to generate,encode,and manipulate flying structured photons and their formed qudits in a four-dimensional Hilbert space with high quantum fidelity,intrinsically enabling enhanced noise resilience and higher quantum data *** four eigen spin–orbit modes of our qudits possess identical spatial–temporal characteristics in terms of intensity distribution and group velocity,thereby preserving long-haul coherence within the entirety of the quantum data transmission *** leveraging the bi-photon entanglement,which is well preserved in the integrated manipulation process,we present versatile spin–orbit cluster states in an extensive dimensional Hilbert *** cluster states hold the promise for quantum error correction which can further bolster the channel robustness in long-range quantum communication.
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e...
详细信息
Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming att...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(M...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(MILP)are popular approaches to solving ***,with many binary unit commitment variables,LR suffers from slow convergence and MILP presents heavy computation *** proposed data-driven variable reduction approach consists of offline and online calculations to accelerate computational performance of the MILP-based large-scale TCUC problems.A database including multiple nodal net load intervals and the corresponding TCUC solutions is first built offline via the data-driven and all-scenario-feasible(ASF)approaches,which is then leveraged to efficiently solve new TCUC instances ***/off statuses of considerable units can be fixed in the online calculation according to the database,which would reduce the computation burden while guaranteeing good solution quality for new TCUC instances.A feasibility proposition is proposed to promptly check the feasibility of the new TCUC instances with fixed binary variables,which can be used to dynamically tune parameters of binary variable fixing strategies and guarantee the existence of feasible UC solutions even when system structure *** tests illustrate the efficiency of the proposed approach.
The power systems of offshore jack-up drilling rigs consist of diesel generators running in parallel load-sharing mode, controlled by an automatic Power Management System (PMS). In this paper, the operational performa...
详细信息
The ever increasing number of wireless devices and systems has led to a crowded spectrum and increased the demand for versatile and multi-functional wireless apparatuses. Recently, metasurfaces have been explored as a...
详细信息
The ever increasing number of wireless devices and systems has led to a crowded spectrum and increased the demand for versatile and multi-functional wireless apparatuses. Recently, metasurfaces have been explored as a prominent technological solution to the current paradigm of spectrum scarcity by opportunistically sharing the spectrum with various users. In general, metasurfaces are passive/dynamic,ultra-compact, multi-functional and programmable structures that are capable of both reciprocal and nonreciprocal signal-wave transmissions. The controllability and programmability of such metasurfaces are governed through DC bias and occasionally a radio-frequency modulation applied to the active components of the unit cells of the metasurface, e.g. diodes and transistors. This article overviews some of the recently proposed passive and dynamic metasurfaces and shows that metasurfaces can enhance the performance of wireless communication systems thanks to their unique physical features such as real-time signal coding,nonreciprocal-beam radiation, nonreciprocal beamsteering amplification and advanced pattern-coding multiple access communication.
作者:
Alzaher, Hussain A.Alkhalifa, Ibrahim M.
Department of Electrical Engineering Dhahran31261 Saudi Arabia
Irc for Communication Systems and Sensing Dhahran31261 Saudi Arabia
Department of Electrical and Computer Engineering Thuwal23955 Saudi Arabia
This paper investigates the application of the operational current amplifier (OCA) in the design of quadrature sinusoidal oscillators. There are numerous quadrature sinusoidal oscillators based on the three fundamenta...
详细信息
暂无评论