Compartmental models have been utilized in the study and understanding of the COVID-19 pandemic. Traditional models have been expanded to include geographical level transmission dynamics and new states. Here, we prese...
ISBN:
(纸本)9798350369663
Compartmental models have been utilized in the study and understanding of the COVID-19 pandemic. Traditional models have been expanded to include geographical level transmission dynamics and new states. Here, we present a model based on Cell-DEVS specifications that can be used to define and study the effects of basic human behavior. We include mask wearing and lockdown fatigue, and an adaptable framework allowing for the rapid prototyping of different diseases and behaviors. We exemplify how to build the model and adapt the attributes using the provinces of Canada as a case study. The results show the effect mask mandates, mask wearing, and lockdown fatigue have on case counts over time.
Industrial control systems (ICS) are increasingly vulnerable to cyberattacks that can propagate to impact physical industrial processes. Existing research on ICS impact analysis views ICS dependability attributes as a...
详细信息
ISBN:
(数字)9798331532390
ISBN:
(纸本)9798331532406
Industrial control systems (ICS) are increasingly vulnerable to cyberattacks that can propagate to impact physical industrial processes. Existing research on ICS impact analysis views ICS dependability attributes as an afterthought and focuses primarily on attacks but not the attackers and their different behaviors. In this work, we include explicit considerations for ICS dependability attributes and attacker behaviors in ICS impact analysis. By adopting the Structured Cyberattack Impact Analysis (SCIA) approach, our model-based impact analysis is demonstrated on a manufacturing ICS modeled in UPPAAL-SMC. More specifically, we visualize and quantify, respectively, using simulations and statistical model checking, the potential impact of data tampering attacks when performed by attackers with different behaviors (random, relentless, and informed). Furthermore, the impact analysis results highlight the interplay of ICS dependability attributes in terms of (1) how attacks on ICS security can impact system reliability and availability, (2) how improving security can improve system availability and reliability, and (3) how accepting some sacrifices on one attribute (availability) can end up improving other attributes (security and reliability).
Forest fires are a growing threat to human commu-nities. The Canadian Wildland Fire Information System gives realtime information to fire management agencies and the public. However, machine learning use for forest fi...
详细信息
Forest fires pose imminent threats to ecosystems and human lives, necessitating precise prediction for effective mitigation. The challenges include managing extensive big data and addressing data imbalance. This study...
详细信息
Recently, we have seen growing interest among patients with chronic conditions to track their health-related data. There are many wearable devices available to track different health data. However, tracking pain is mo...
详细信息
Reconfigurable intelligent surfaces (RISs) have manifested huge potential in enhancing information security by actively intervening the wireless propagation, yet the security gain may still be limited depending on the...
详细信息
Reconfigurable intelligent surfaces (RISs) have manifested huge potential in enhancing information security by actively intervening the wireless propagation, yet the security gain may still be limited depending on the RIS deployment. In this paper, we propose to employ an unmanned aerial vehicle (UAV) mounting a RIS to enable on-demand reflection, noted as an aerial RIS (ARIS). The ARIS is then exploited to assist the anti-eavesdropping communications established through a conventional fixed-deployed RIS to further enhance the wireless secrecy. The secure communication is investigated by jointly optimizing the reflection at both RISs as well as the trajectory of the ARIS to maximize the average secrecy rate during the flight. To facilitate effective algorithm design, the formulated security problem is decomposed and solved in a double-layer framework. The outer layer tackles the flying trajectory through deep reinforcement learning while the inner layer solves for reflection phase shift design with manifold optimization. Finally, simulation results demonstrate the learned trajectory in various topologies as well as the superior performance of our proposal in terms of security provisioning. IEEE
We present our in-progress work on co-designing a visualization tool for presenting unstructured text. We have conducted a focus group with a variety of professionals who regularly analyze large corpora of unstructure...
详细信息
Modern networking paradigms like Service Function Chaining (SFC) allow for services to be broken down to a series of ordered and interconnected Virtualized Network Functions (VNFs) that can be hosted in generic server...
详细信息
Stroke is one of the leading causes of disability worldwide. The efficacy of recovery is determined by a variety of factors, including patient adherence to rehabilitation programs. One way to increase patient adherenc...
详细信息
Driving safely on the urban roads is a major impediment in achieving level 5 autonomy. To achieve this, two main streams of approaches have been proposed: module-based and end-to-end. Module based solutions try to sol...
详细信息
ISBN:
(数字)9798350395969
ISBN:
(纸本)9798350395976
Driving safely on the urban roads is a major impediment in achieving level 5 autonomy. To achieve this, two main streams of approaches have been proposed: module-based and end-to-end. Module based solutions try to solve the problem by dividing the whole task of driving into separate modules and solving each one at a time. On the other hand, end-to-end approaches try to provide the control command directly from the sensor data input, like what a human driver does. Deep reinforcement learning (DRL) is one of the algorithm families that has received much attention recently to achieve end-to-end solutions. As this approach is challenging, almost all the related works use simulator generated data for training a policy network. However, synthetic data does not capture the complexity, variability, realism, and diversity of the real-world environment. A reinforcement learning (RL) policy trained on synthetic dataset necessarily makes it unreliable in real-world deployment. In this study, we propose an actor-critic DRL model to learn a driving policy from a real-world urban driving dataset. The policy enables the RL agent to keep safe distance from the leading vehicle, follow traffic light, and prevents the agent from going off-road. To optimize the policy we use proximal policy optimization (PPO), a state-of-the-art reinforcement learning algorithm. Simulation results show that the agent learns some of the basic safe driving requirements effectively.
暂无评论