Algorithms based on Monte-Carlo sampling have been widely adapted in robotics and other areas of engineering due to their performance robustness. However, these sampling-based approaches have high computational requir...
详细信息
Surveys studies carried out in different countries demonstrated that about 75% of lake water samples contain toxic cyanobacteria [4, 5]. The toxin that is must recurrent in Brazilian water bodies are the microcystin [...
详细信息
ISBN:
(数字)9781728194295
ISBN:
(纸本)9781728194301
Surveys studies carried out in different countries demonstrated that about 75% of lake water samples contain toxic cyanobacteria [4, 5]. The toxin that is must recurrent in Brazilian water bodies are the microcystin [6]. Microcystins are hepatotoxins produced by some species of cyanobacteria, and act by inflicting damage to cells from the liver and other organs [7]. Cases around the world have been reported over time, including health injuries by contact direct or not with contaminated water, as well livestock and humans deaths [4]. Due to its sanitary importance, the water that the population consumes needs regular monitoring in order to avoid contact and possible adverse effects. The objective of this work is to propose a computational approach for the identification of Microcystis aeruginosa from images, in raw water reservoirs, automatically, using artificial intelligence techniques. The identification was developed using convolutional neural networks (CNN), where two distinct model were compared. The obtained results demonstrated the effectiveness of the proposed approach to solve the problem of recognizing cyanobacterias.
A network switch is an important network device on a computer network, the role of a switch can determine the good and bad of a network service. In a data center, sometimes it has several switch devices with different...
详细信息
A cybersecurity problem for a multi-agent consensus problem is investigated through a dynamic game formulation. Specifically, we consider a game repeatedly played between a jamming attacker and a defender. The attacke...
详细信息
A cybersecurity problem for a multi-agent consensus problem is investigated through a dynamic game formulation. Specifically, we consider a game repeatedly played between a jamming attacker and a defender. The attacker attempts to jam the links between a number of agents to delay their consensus. On the other hand, the defender tries to maintain the connection between agents by attempting to recover some of the jammed links with the goal of achieving faster consensus. In each game, the players decide which links to attack/recover and for how long to continue doing so based on a Lyapunov-like function representing the largest difference between the states of the agents. We analyze the subgame perfect equilibrium of the game and obtain an upper bound of the consensus time that is influenced by the strategies of the players. The results are illustrated with a numerical example.
In Software Defined Networking (SDN), the controller locations are mainly constrained by delays between switches and controllers, and between the controllers themselves. In addition to the delay requirements, the avai...
详细信息
ISBN:
(数字)9781728163000
ISBN:
(纸本)9781728163017
In Software Defined Networking (SDN), the controller locations are mainly constrained by delays between switches and controllers, and between the controllers themselves. In addition to the delay requirements, the availability of the connections between switches and controllers is also a key issue for control plane performance. Here, we explore the idea of having a spanning tree substructure called the spine, whose links can be upgraded to have high availability in order to support availability requirements for the control paths (routing paths between switches and controllers). We formulate an optimization model of the joint controller placement and spine design problem for SDN networks, under delay, availability and path redundancy requirements. Numerical results are presented showing the trade-offs between the number of controllers, delay requirements and upgrade cost.
Epilepsy is a disorder of the brain denoted by frequent seizures. The symptoms of seizure include confusion, abnormal staring, and rapid, sudden, and uncontrollable hand movements. Epileptic seizure detection methods ...
详细信息
A new spectrum sensing detector is proposed and analytically studied, when it operates under generalized noise channels. Particularly, the McLeish distribution is used to model the underlying noise, which is suitable ...
详细信息
Generalized energy detection (GED) is analytically studied when operates under fast-faded channels and in the presence of generalized noise. For the first time, the McLeish distribution is used to model the underlying...
详细信息
E-learning is globalized in a short period of time due to the physical distancing requirement for curbing the spread of COVID-19. There are two major challenges imposed by the migration from face-To-face learning to E...
详细信息
Opinion mining on social media posts has become more and more popular. Users often express their opinion on a topic not only with words but they also use image symbols such as emoticons and emoji. In this paper, we in...
详细信息
暂无评论