Wireless networks, used extensively in military applications, are susceptible to jamming attacks. In this paper, we study a network interdiction problem on a multi-hop multi-channel wireless network in which an attack...
详细信息
ISBN:
(纸本)9780983762430
Wireless networks, used extensively in military applications, are susceptible to jamming attacks. In this paper, we study a network interdiction problem on a multi-hop multi-channel wireless network in which an attacker places jamming devices in order to minimize the expected throughput of the network. We model this problem as a bi-level attacker-defender mixed integer program. The objective of the attacker is to locate a limited number of jamming devices and determine an optimal channel hopping strategy while the defenders objective is to determine an optimal channel hopping strategy. The defender seeks to maximize the equilibrium network throughput, and the attacker seeks to minimize it. In the defender's problem, the attacker and defender play a Nash Equilibrium channel hopping mixed strategy.
The emerging and foreseen advancements in 5G and Beyond 5G (B5G) networking infrastructures enhance both communications capabilities and the flexibility of executing computational tasks in a distributed manner, includ...
详细信息
Cost prediction is an important activity in all phases of product development. However, accurate estimation of the actual manufacturing cost in early phases of product design is challenging due to the limited data ava...
详细信息
Cost prediction is an important activity in all phases of product development. However, accurate estimation of the actual manufacturing cost in early phases of product design is challenging due to the limited data available in the early design stages. This paper describes a new tool for cost estimation using a hybrid approach that supports several common methods for cost estimation (parametric, hierarchical, feature-based, etc). Cost analysis includes computation of point estimates for cost, trade studies, calibration, to reduce bias by using error found in previous estimates, and risk analysis, to examine sensitivity due to variation in parameters.
Real-time multimedia communication is an important service that should be supported in wireless ad hoc networks. In this paper, we consider the problem of how to optimally support multiple concurrent video communicati...
详细信息
Local nets are a major contributing factor to mismatch between the global routing (GR) and detailed routing (DR) stages. A local net has all its terminals inside one global cell (gcell) and is traditionally ignored du...
详细信息
The widespread deployment of 'Smart' Infrastructure, which uses networked computing systems to manage physical processes, has brought the onset of the fourth industrial Revolution (4IR). The 4IR relies on netw...
详细信息
Accurate prediction of manufacturing costs is required in very early stages of the product design and development. Usually these costs are estimated using a parametric approach, in which several simplifications are ut...
详细信息
Accurate prediction of manufacturing costs is required in very early stages of the product design and development. Usually these costs are estimated using a parametric approach, in which several simplifications are utilized, resulting in less accurate cost estimation. This paper presents a novel approach in which a hierarchical library is used in conjunction with the Cost estimation tool developed within the Federated Intelligent Product EnviRonment (FIPER), which is being developed as part of the National Institute of Standards and Technology (NIST) Advanced Technology Program (ATP). The library includes machining cost, assembly, setup cost, machine and tool cost, and overhead cost in hierarchical manner. Cost elements that accumulate individual cost items have been developed: part and assembly models accumulate all component costs, machine models accumulate setup cost with direct labor included into each individual manufacturing process. A functioning library of elements has been developed using this approach. The coverage of the library includes manufacturing of rotational and prismatic components, basic shape generation processes (casting and forging), and corresponding machines. The library can be utilized in two different modes (using or extending) which are is demonstrated on a couple of examples.
作者:
Liu, MingDatseris, PhilipHuang, HeMechanical
Industrial and Systems Engineering University of Rhode Island Kingston RI United States Electrical
Computer and Biomedical Engineering University of Rhode Island Kingston RI United States
In this paper, we designed a prototype of powered above-knee prosthesis. Compared with other prototypes available in the literature, our designed prosthetic leg employs a redundant actuator concept to overcome the cha...
详细信息
This paper presents a seamlessly controlled human multi-robot system comprised of ground and aerial robots of semiautonomous nature for source localization tasks. The system combines augmented reality interfaces capab...
详细信息
We introduce a particle process that models the evolutionof page configurations in solid-state-drive (SSD) storage *** devices use integrated circuitry as memory tostore data. Typically, pages (units of storage) are o...
详细信息
We introduce a particle process that models the evolutionof page configurations in solid-state-drive (SSD) storage *** devices use integrated circuitry as memory tostore data. Typically, pages (units of storage) are organizedinto blocks of a given size. Three operations are permitted:write, read, and clean. Rewrites are not allowed, i.e., a pagehas to be "cleaned" before the write operation can be *** the read and write operations are permittedon individual pages, the clean operation can be executed onwhole blocks only. Analysis of our particle process capturesa key tradeoff in the operation of SSD's.
暂无评论