The dynamic spectrum sharing technology in cognitive radio can effectively improve the utilization rate of spectrum and relieve the current spectrum pressure. To realize spectrum sharing without trust between SUs and ...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
The dynamic spectrum sharing technology in cognitive radio can effectively improve the utilization rate of spectrum and relieve the current spectrum pressure. To realize spectrum sharing without trust between SUs and PUs belonging to various operators, a decentralized spectrum sharing scheme based on blockchain is proposed in this paper. A latency model and a decentralization degree model of blockchain-enabled spectrum sharing network are formulated. Network scale law in this paper is defined as the change law of structure and scale in a network. Based on the proposed decentralization degree and latency model, the scale law of blockchain networks under the constraints of latency and decentralization is studied. The simulation analyzes the change of the proportion of consensus nodes in the blockchain network with different requirements for latency and decentralization. The results show that when blockchain networks have both low latency and decentralization characteristics, the upper limit of the total number of nodes is 390, and the value range of the proportion of consensus nodes is between 0.13 and 0.56.
The advancements in precision agriculture are vital to support the increasing demand for global food supply. Precision spot spraying is a major step towards reducing chemical usage for pest and weed control in agricul...
详细信息
The main objective of authentic learning is to offer students an exciting and stimulating educational setting that provides practical experiences in tackling real-world security issues. Each educational theme is compo...
The main objective of authentic learning is to offer students an exciting and stimulating educational setting that provides practical experiences in tackling real-world security issues. Each educational theme is composed of pre-lab, lab, and post-lab activities. Through the application of authentic learning, we create and produce portable lab equipment for AI Security and Privacy on Google CoLab. This enables students to access and practice these hands-on labs conveniently and without the need for time-consuming installations and configurations. As a result, students can concentrate more on learning concepts and gain more experience in hands-on problem-solving abilities.
Classification of Breast Imaging Reporting and Data System (BI-RADS) breast density categories generally reflects the amount of dense/fibroglandular tissue in the breast. Studies have consistently shown that breast wi...
详细信息
In the edge computing network environment, our applications can be deployed on edge servers. The request to execute the application can be produced on the edge device and transmitted to the edge server for calculation...
详细信息
Vulnerability data gathered from multiple detection and monitoring capabilities at different layers of an application using a time-series analysis will provide value and insights by doing a statistical correlation wit...
Vulnerability data gathered from multiple detection and monitoring capabilities at different layers of an application using a time-series analysis will provide value and insights by doing a statistical correlation with attack requests observed using a Web Application Firewall (WAF) monitoring solution. Static Analysis Security Testing, Software Composition Analysis, Dynamic Analysis Security Testing (DAST), Application Ethical Hack, Application Programming Interface (API) testing are the tests / scans that have been used to gather vulnerability data for this study. Correlations can further help track abnormal transaction paths if we follow specific ones pointed out by the statistical analysis for those requests that are not blocked by the rules and are allowed as valid transactions to pass through. This provides a narrowed down focus on the convergence of observability and security, critical to realizing a near-real time rapid action. Observations must continue for many days as a time series ensuring consistency and reliability in data collections and analysis. Multiple applications must be observed in a similar manner for ensuring validity of the process for analysis. Also, gathering sufficient data that is large enough to represent a reasonable population of web applications within an organization is a significant factor in achieving reliable correlation. Applying Pearson Correlation (or Spearman Correlation for distributions that are not normal) technique provides insight into Significance (two-tailed) as to whether a correlation is present over large number of data points. Results of analysis show evidence of correlations among specific attack requests monitored by the WAF and corresponding vulnerabilities in applications, detected using one or more methods. This is significant to looking for more insights into how these correlations can further explored into predicting attack patterns based on existing vulnerabilities.
To avoid a long period of no-pulse in a synchronized system for free-space quantum key distribution, a system based on a de Bruijn sequence was *** this system on-off pulse is used to simulate a \emph{zero} and on-on ...
详细信息
Free-space quantum key distribution requires to synchronize the transmitted and received signals. A timing and synchronization system for this purpose based on a de Bruijn sequence has been proposed and studied recent...
详细信息
Dealing with high-dimensional time series data makes the process of recommending visualizations with "interesting" insights difficult. The challenge originates from finding a way to obtain the recommended vi...
Dealing with high-dimensional time series data makes the process of recommending visualizations with "interesting" insights difficult. The challenge originates from finding a way to obtain the recommended visualizations efficiently without compromising their quality. Identifying such visualizations manually is considered a labor-intensive and time-consuming process. In response, this paper introduces different techniques designed to optimize the automated recommendation process. These techniques are entirely based on the concept of computation sharing and pruning. Furthermore, we provide a glimpse into our future research works in PhD thesis. The objective is to broaden the scope of our current work and enhance the generality of our problem statement.
Demand response (DR) is an approach that encourages consumers to shape consumption patterns in peak demands for the reliability of the power system and cost minimization. The optimal DR scheme has not only leverages t...
详细信息
Demand response (DR) is an approach that encourages consumers to shape consumption patterns in peak demands for the reliability of the power system and cost minimization. The optimal DR scheme has not only leverages the distribution system operators (DSOs) but also the consumers in the energy network. This paper introduced a multi-agent coordination control and reinforcement learning approach for optimal DR management. Each microgrid is considered an agent for the state and action estimation in the smart grid and programmed rewards and incentive plans. In this regard, the Multi-agent Markov game (MAMG) is utilized for the state and action. At the same time, the reward is articulated through reinforcement learning deep Q-network (DQN) and deep deterministic policy gradient (DDPG) schemes. The proposed DR model also encourages consumer participation for long-term incentivized benefits through integrating battery energy storage systems (BESS) in the SG network. The reliability of DQN and DDPG schemes is demonstrated and observed that the dynamically changing electricity cost is reduced by 19.86%. Moreover, the controllability of complex microgrids is achieved with limited control information to ensure the integrity and reliability of the network. The proposed schemes were simulated and evaluated in MATLAB and Python (PyCharm IDE) environments.
暂无评论