The increasing use of IoT devices on future networks is very helpful for humans in their lives. However, the increase in devices connected to IoT networks also increases the potential for attacks against those network...
详细信息
The fourth industrial revolution has given rise to large-scale data-driven models like smart cities and Intelligent transportation. Within these models, applications like smart parking have been growing rapidly in res...
详细信息
Coronary artery disease (CAD) is the leading cause of morbidity and death worldwide. Invasive coronary angiography is the most accurate technique for diagnosing CAD, but is invasive and costly. Hence, analytical metho...
详细信息
We study an architecture for fault-tolerant measurement-based quantum computation (FT-MBQC) over optically-networked trapped-ion modules. The architecture is implemented with a finite number of modules and ions per mo...
详细信息
As autonomous and connected vehicles continue to garner much research attention, the automotive Over-The-Air (OTA) updates recently emerged as an important research topic. OTA is crucial to disseminate critical update...
As autonomous and connected vehicles continue to garner much research attention, the automotive Over-The-Air (OTA) updates recently emerged as an important research topic. OTA is crucial to disseminate critical updates for safety and stability of on-board sensing and operational systems. In beyond 5G(BSG) systems, OTA may be regarded as cached and a service provided by cellular base stations and roadside units (RSUs). However, for large-size OTA dissemination, the Electronic Control Units (ECUs) of vehicles need to download scheduled segments of the OTA payload from the serving RSU in an opportunistic manner, i.e., while stopping at the traffic signal or waiting in traffic. To maximize the downloadable payload per vehicle served by a RSU within a limited time window, we consider multi-band RSUs and ECUs as transmitting and receiving nodes, respectively. We consider legacy RF (radio frequency), mmWave (millimeter Wave), and visible light communication (VLC) bands at the RSU to provide large capacity links to the ECUs, respectively. However, the sub-channels of these frequency bands suffer from different blockage characteristics. We formulate this as a tradeoff problem in this paper in the presence of vehicular blockers, and propose a Thompson Sampling (TS)-based opportunistic band selection to alleviate the computational burden on both the communicating RSU and ECU nodes. Based on extensive computer-based simulations, we demonstrate the performance of our proposal in contrast with an optimal (centralized) baseline, as well as other comparable heuristic-based solutions.
According to current research evidence, security awareness is an issue of great importance in cyber security. Although various investigations have been carried out on numerous areas of information and cybersecurity aw...
According to current research evidence, security awareness is an issue of great importance in cyber security. Although various investigations have been carried out on numerous areas of information and cybersecurity awareness, all are contradictory and depend on the circumstances. The purpose of this study is to determine young knowledge of online security risks and knowledge of countermeasures to protect them from online threats. A questionnaire technique is used for this, and an online survey through Google forms is used to collect the data from university students. The supplemental dataset in this study is utilized to assess the level of cybersecurity knowledge among university students, which is reported in detail. To recruit subjects, two different methods are used: the individual has to be of Indian descent and their age should be over 17. Participants are gathered using a combination of selective and snowball methods via institutional emails from universities and WhatsApp messaging to persons who met the criteria.
Quantum statistical models (i.e., families of normalized density matrices) and quantum measurements (i.e., positive operator-valued measures) can be regarded as linear maps: the former, mapping the space of effects to...
详细信息
The Internet of Things (IoT), like other network infrastructures, requires Intrusion Detection Systems (IDSs) to be protected against attacks. When deploying an IDS in IoT-based smart city environments, the balance be...
The Internet of Things (IoT), like other network infrastructures, requires Intrusion Detection Systems (IDSs) to be protected against attacks. When deploying an IDS in IoT-based smart city environments, the balance between latency and node capacity must be considered, which justifies a distributed IDS with specific classifiers based on the location of the system processing nodes. This paper proposes a two-level classification technique for collaborative anomaly-based IDSs deployed on fog and edge nodes. A Gradient Boosting Classifier (GBC) is used in the lower layer classifier at the edge, while a Convolutional Neural Network (CNN) is used in the upper layer classifier at the fog. Experimentation has demonstrated that the suggested IDS architecture outperforms previous solutions. For instance, in some scenarios, when comparing our proposal with Random Forest, the former obtained an accuracy equal to 99.1%, while the latter obtained 95.3%. Furthermore, our proposal can better select the most important network traffic features, reducing 76% of the data to be analyzed and improving privacy.
Ensuring drinking-water safety is essential to support the realization of SDGs. Drinkable water has distinct characteristics in flavor, odor, and appearance. Poor water infrastructure and treatment affect these charac...
Ensuring drinking-water safety is essential to support the realization of SDGs. Drinkable water has distinct characteristics in flavor, odor, and appearance. Poor water infrastructure and treatment affect these characteristics and can pose a risk to human health. This study resulted in the development of an IoT mechanism for detecting water quality which is affordable and can mitigate the health risks posed on humans. Various water parameters, including temperature, acidity or alkalinity, and impurities, were collected by assembling the Arduino in a low-power energy consumption schema. Considering the limited resource, the real-time notification of data monitoring through a mobile messenger complements web monitoring. The retrieved data was monitored via Grafana and utilized using the binary classifiers of machine learning techniques. Enhancing the artificial intelligence framework was conducted to evaluate the best model between the decision and non-decision trees. The ratio encompassed 60% data training: 10% data testing: and 20% data validation. According to the monitoring and prediction results, authorities can control and manage drinking-water supplies that are routinely tested.
Most of the typical reinforcement learning algorithms help wireless devices choose the security policy such as the moving strategy and communication policy by exploring all the possible state-action pairs including th...
Most of the typical reinforcement learning algorithms help wireless devices choose the security policy such as the moving strategy and communication policy by exploring all the possible state-action pairs including the risky policies that cause a severe collision or network disaster. In this paper, we design a safe reinforcement learning algorithm for safety-critical applications (e.g., intelligent transportation systems) to guide the learning agent to avoid exploring risky policies. This algorithm uses Q-network (i.e., a convolutional neural network or a deep neural network) to choose the policy and designs a safety guide to modify the chosen policy that results in dangerous status. More specifically, the safety guide includes a risk alarm module that evaluates the immediate warning value corresponding to the risk of each state-action pair and a G-network that estimates the long-term risk value. By adding the long-term risk value and the long-term expected reward output by the Q-network, this algorithm uses a safety dock to modify the chosen policy. This algorithm uses the immediate warning value to formulate a safe buffer and a risky buffer for the G-network updating to ensure fully exploration in the initial learning process. As a case study, we apply the designed algorithm in a cargo transportation system, in which the experimental results verify the effectiveness of our algorithm compared with the benchmark safe deep Q-network.
暂无评论