Search results for " Network"

showing 10 items of 6428 documents

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

The Effect of Damage Functions on Urban Flood Damage Appraisal

2014

Flooding damage appraisal can been obtained by interpolating real damage data caused by historical flooding events or accounting the effects of a flood in terms of the depreciation of assets. Most often, the expected damage is evaluated by means of damage functions describing the relationship occurring between the damage and hydraulic characteristics of flood. The present paper aims to evaluate the uncertainty linked to the choice of the depth-damage function adopted in the flood damage analysis. Several possible depth-damage function formulations were selected in literature and applied to historical flooding events monitored in the "Centro Storico" catchment in Palermo (Italy). (C) 2013 Th…

damage curveFlood mythForensic engineeringDamage analysisEnvironmental scienceGeneral MedicineFlood damageuncertainty analysidepth-damage functionuncertainty analysisUncertainty analysisEngineering(all)Flooding (computer networking)Procedia Engineering
researchProduct

'Dark Ecological Network': strategically tackling light pollution for biodiversity and people

2021

Night-time light pollution from artificial sources can disrupt biological processes and fragment habitats. This study presents a new concept foraddressing the problem: a 'dark ecological network'. Its development involves mapping a new system of connected functional zones and corridors where dark can be preserved to help birds, bats and other taxa, and gives people the chance to experience starry skies.

dark ecological network[SDE.BE] Environmental Sciences/Biodiversity and EcologyALAN[SDE.MCG] Environmental Sciences/Global Changeslight pollution[SHS] Humanities and Social Sciences[SDE.ES] Environmental Sciences/Environmental and Societyartificial light at night
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey

2021

Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…

data collection scenariosTK7800-8360Computer Networks and CommunicationsProcess (engineering)Computer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMSwireless sensor networks (WSNs)mobile robotsenergy consumptionComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSunmanned aerial vehicles (UAVs)Electrical and Electronic EngineeringData collectionControl algorithmcommunication structuresCommunication structures Control algorithms Data collection scenarios Energy consumption Mobile robots Unmanned aerial vehicles (UAVs) Wireless sensor networks (WSNs)Mobile robotEnergy consumptionSettore ING-IND/31 - ElettrotecnicaHardware and ArchitectureControl and Systems EngineeringSignal Processingcontrol algorithmsElectronicsMobile deviceWireless sensor networkLimited resourcesElectronics
researchProduct

LPV model identification for gain scheduling control: An application to rotating stall and surge control problem

2006

Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…

decentralized controlEngineeringbusiness.industryApplied MathematicsSystem identificationStall (fluid mechanics)Control engineeringconsensus protocolOptimal controlconsensus protocolsDecentralised systemComputer Science Applicationsoptimal controlNonlinear systemGain schedulingControl and Systems EngineeringControl theorynetworksSettore MAT/09 - Ricerca OperativaElectrical and Electronic EngineeringSurgebusinessSurge controlconsensus protocols; decentralized control; optimal control; networksControl Engineering Practice
researchProduct

Predicting the availability of users' devices in Decentralized Online Social Networks

2018

The understanding of the user temporal behavior is a crucial aspect for all those systems that rely on user resources for daily operations, such as decentralized online social networks (DOSNs). Indeed, DOSNs exploit the devices of their users to take on and share the tasks needed to provide services such as storing the published data. In the last years, the increasing popularity of DOSN services has changed the way of how people interact with each other by enabling users to connect to these services at any time by using their personal devices (such as notebooks or smartphones). As a result, the availability of data in these systems is strongly affected (or reflected) by the temporal behavio…

decentralized online social networkdecentralized online social networksavailability predictionComputer Networks and CommunicationComputational Theory and Mathematicsavailabilityuser behaviorComputer Science Applications1707 Computer Vision and Pattern Recognitionpredictionavailability prediction; decentralized online social networks; user behaviorSoftwareTheoretical Computer Science
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

Computational Modeling of Human Visual Function using Psychophysics, Deep Neural Networks, and Information Theory

2023

Visual perception is a key to unlocking the secrets of brain functions because most of the information is processed through the early visual system and then transmitted to the high-level cognitive perception brain regions. The brain functions as a self-organizing, bio-dynamic, and chaotic system that receives outside information and then decomposes it into pieces of information that can be processed efficiently and independently. The work connects natural image statistics, psychophysics, deep neural networks, and information theory to perceptual vision systems to explore how vision processes information from the outside world and how the information coupled drives functional connectivity be…

deep neural networkshuman vision systemUNESCO::FÍSICAperceptioninformation theory
researchProduct