The Network Digital Twin is emerging as a promising technology for future networks, including 6G, as it allows to gain deep knowledge of its Physical Twin and to perform “what-if“ analyses in a controlled environmen...
详细信息
ISBN:
(数字)9798350378597
ISBN:
(纸本)9798350378603
The Network Digital Twin is emerging as a promising technology for future networks, including 6G, as it allows to gain deep knowledge of its Physical Twin and to perform “what-if“ analyses in a controlled environment. However, while the concept of Digital Twin reached maturity in other fields (such as manufacturing), still the application of this concept to networks presents some relevant challenges. This paper studies the problem of synchronization between the Digital and the Physical Twin, a key functionality to enable the Digital Twin to accurately replicate the behaviour of the Physical Twin. Indeed, accurate synchronization is challenging due to the amount of data to exchange and the delays due to acquisition, modeling and transmission of the related information. The paper analyzes the delay chain in the synchronization process and introduces the concept of “negative delay” through accurate prediction in order to minimize the synchronization delay and enable real-time or “near” real-time synchronization between the Physical and the Digital Twin.
We introduce a framework to design in-memory decision tree machine-learning (ML) circuits using memristor crossbars. Decision trees (DTs) offer many advantages over neural networks, such as enhanced energy efficiency,...
详细信息
ISBN:
(数字)9798350330991
ISBN:
(纸本)9798350331004
We introduce a framework to design in-memory decision tree machine-learning (ML) circuits using memristor crossbars. Decision trees (DTs) offer many advantages over neural networks, such as enhanced energy efficiency, interpretability, safety, privacy, and speed, along with reduced dependence on extensive training data. We propose an adaptive multivariate decision tree (AMDT) training algorithm, which constructs decision trees that incorporate both univariate and multivariate features, facilitating the creation of higher accuracy and energy-efficient crossbar designs compared to the state-of-the-art (SOTA). Our circuits are realized using pure memristor crossbars, requiring just one memristor per cell and no transistors while employing sneak-paths for flow-based in-memory computations. In comparison to the SOTA, our approach produces designs that are, on average, 4% more accurate and require 12.6% lower energy.
Anomaly detection is a crucial task in cyber security. Technological advancement brings new cyber-physical threats like network intrusion, financial fraud, identity theft, and property invasion. In the rapidly changin...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Anomaly detection is a crucial task in cyber security. Technological advancement brings new cyber-physical threats like network intrusion, financial fraud, identity theft, and property invasion. In the rapidly changing world, with frequently emerging new types of anomalies, classical machine learning models are insufficient to prevent all the threats. Quantum Machine Learning (QML) is emerging as a powerful computational tool that can detect anomalies more efficiently. In this work, we have introduced QML and its applications for anomaly detection in consumer electronics. We have shown a generic framework for applying QML algorithms in anomaly detection tasks. We have also briefly discussed popular supervised, unsupervised, and reinforcement learning-based QML algorithms and included five case studies of recent works to show their applications in anomaly detection in the consumer electronics field.
Requirements serve as the foundation for defining what a software product should accomplish, highlighting the importance of clear and well-written specifications [1]. Deficient requirements often lead to defects in de...
详细信息
ISBN:
(数字)9798350395112
ISBN:
(纸本)9798350395129
Requirements serve as the foundation for defining what a software product should accomplish, highlighting the importance of clear and well-written specifications [1]. Deficient requirements often lead to defects in delivered software, which can be challenging and costly to rectify [2].
Recent advancements in the field of Deep Reinforcement Learning (DRL), such as the development of algorithms like Deep Q-Network, Deep Deterministic Policy Gradient (DDPG), and Proximal Policy Optimization (PPO), have...
详细信息
ISBN:
(数字)9798350385298
ISBN:
(纸本)9798350385304
Recent advancements in the field of Deep Reinforcement Learning (DRL), such as the development of algorithms like Deep Q-Network, Deep Deterministic Policy Gradient (DDPG), and Proximal Policy Optimization (PPO), have been significant. However, these algorithms encounter data privacy issues in multi-agent environments. This paper investigates the latest research trends in applying federated learning to address data privacy issues in multi-agent systems within deep reinforcement learning. It delves into various approaches for implementing federated learning in these systems, examines the challenges faced, and explores potential solutions to enhance privacy while maintaining or improving the performance of DRL algorithms in multi-agent setting.
A modular photovoltaic (PV) step-up converter with embedded high frequency power balancers that utilize an interlinking controller capable of power efficiency optimization over a wide operating range for Medium Voltag...
A modular photovoltaic (PV) step-up converter with embedded high frequency power balancers that utilize an interlinking controller capable of power efficiency optimization over a wide operating range for Medium Voltage (MV) DC distribution is proposed in this paper. The converter utilizes an integrated boost-CLL resonant circuit with power balancing active voltage quadruplers (AVQ) to achieve step-up voltage conversion, individual maximum power point tracking (MPPT) and modular power balancing. The proposed interlinking power balancer controller optimizes the transmission of mismatched power while simultaneously achieving soft-switching operation on all AVQ circuits. The modular nature of the system allows for additional modules to be added without requiring parameter changes to the existing system. Analysis of the proposed converter and power balancing technique along with 10kW, 10kV-output system simulation and preliminary results on a scaled down 500W, 850V-output system are provided to highlight the features of the proposed system.
While IoT devices provide significant benefits, their rapid growth results in larger data volumes, increased complexity, and higher security risks. To manage these issues, techniques like encryption, compression, and ...
详细信息
ISBN:
(数字)9798350378283
ISBN:
(纸本)9798350378290
While IoT devices provide significant benefits, their rapid growth results in larger data volumes, increased complexity, and higher security risks. To manage these issues, techniques like encryption, compression, and mapping are used to process data efficiently and securely. General-purpose and AI platforms handle these tasks well, but mapping in natural language processing is often slowed by training times. This work explores a self-explanatory, training-free mapping transformer based on non-deterministic finite automata, designed for Field-Programmable Gate Arrays (FPGAs). Besides highlighting the advantages of this proposed approach in providing real-time, cost-effective processing and dataset-loading, we also address the challenges and considerations for enhancing the design in future iterations.
Jute is considered as one of the most vital crops in the world. For some countries jute is the principal source of earnings and GDP. One of the primary elements influencing jute yield is jute pests. Accurate pest iden...
详细信息
ISBN:
(数字)9798350385779
ISBN:
(纸本)9798350385786
Jute is considered as one of the most vital crops in the world. For some countries jute is the principal source of earnings and GDP. One of the primary elements influencing jute yield is jute pests. Accurate pest identification makes it possible to take prompt preventative action to minimize financial losses. Considering the fact, to classify jute pests, the study suggests different jute pest classification models, which are based on transfer learning. The best model offers high performance and resilience. A VCI-validated dataset comprising 7235 images has been utilized in the analysis. The dataset encompasses images classified into 17 distinct jute pest classes. The dataset is already divided into three categories train, test and validation. To increase the dataset size, data augmentation is applied to the training set. To improve performance, all the models were integrated with the transfer learning model. VGG 16, ResNetl0l, DenseNet201, InceptionV3, Xception, and MobileN etV2 were used to train the parameters on the publicly available ImageN et dataset followed by some customized dense layers. The models were assessed using different types of metrics, including confusion matrix, F1 score, precision, and recall. Compared to other models DenseNet201 outclassed other models, acquiring 97% accuracy. The fundamental information and technical support for jute pest classification are provided by this study.
Black Fungus is a dangerous fungal illness, commonly referred to as 'mucormycosis', usually infecting uncompromising people. Mucormycosis is generally rare, affecting less than two individuals per million each...
详细信息
Smart Healthy Schools (SHS) are a new paradigm in building engineering and infection risk control in school buildings where the disciplines of Indoor Air Quality (IAQ), IoT (Internet of Things) and Artificial Intellig...
详细信息
暂无评论