首页 > 最新文献

2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)最新文献

英文 中文
Efficient Finite Element Modeling of Complex HVAC Applications 复杂暖通空调应用的高效有限元建模
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257904
A. Hafez, T. Kasem, B. Elhadidi, M. Abdelrahman
A new Finite element model for HVAC applications is introduced. The model incorporates flow turbulence, buoyancy effects and unsteadiness. Also, the model accommodates complicated boundaries due to complex geometries and perforated tiles. Experimental validation is provided and extensive results for flow and temperature contours are presented. Temporal and spatial resolution prove that the model can capture important HVAC features as thermal comfort, buoyancy induced flow, complex boundaries.
介绍了一种新的暖通空调应用有限元模型。该模型考虑了湍流、浮力和非定常效应。此外,由于复杂的几何形状和穿孔瓷砖,该模型容纳了复杂的边界。提供了实验验证,并给出了流动和温度轮廓的广泛结果。时间和空间分辨率证明该模型能够捕捉到暖通空调的重要特征,如热舒适、浮力诱导流动、复杂边界等。
{"title":"Efficient Finite Element Modeling of Complex HVAC Applications","authors":"A. Hafez, T. Kasem, B. Elhadidi, M. Abdelrahman","doi":"10.1109/NILES50944.2020.9257904","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257904","url":null,"abstract":"A new Finite element model for HVAC applications is introduced. The model incorporates flow turbulence, buoyancy effects and unsteadiness. Also, the model accommodates complicated boundaries due to complex geometries and perforated tiles. Experimental validation is provided and extensive results for flow and temperature contours are presented. Temporal and spatial resolution prove that the model can capture important HVAC features as thermal comfort, buoyancy induced flow, complex boundaries.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of DW Spintronic Memristor performance in 2T1M Neuromorphic Synapse DW自旋电子忆阻器在2T1M神经形态突触中的性能研究
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257896
Yasmin K. Abdelmagid, Renad T. Nawar, Mennatullah K. Rabie, Ahmed S. Tulan, Ahmed H. Hassan, Andoleet Saleh, H. Mostafa
Memristor, the two-terminal memory-resistance device discovered by Chua in 1971, is a promising solution for future processing problems. Its CMOS integration compatibility and large resistance in small size, makes it very successful candidate for large-scale systems like Neural Networks. In last decade, memristors were used in many Neuromorphic Synapses for its advantage of combining processing (dot-product) and memory in same device. There are different materials that can be used to fabricate memristors. In this paper, a comparison between spintronic and TiO2-resistive memristor in two-transistors-one memristor synapse, is introduced. The work was done on Cadence Virtuoso with using Verilog-A for memristor modeling. The comparison reveals that the synaptic implementation with a spintronic memristor is more efficient when high speed is needed. However, the resistive memristor is more adequate due to its lower power dissipation.
忆阻器是Chua于1971年发现的双端记忆电阻器件,是解决未来处理问题的一个有希望的解决方案。它具有CMOS集成兼容性和小尺寸的大电阻,使其成为神经网络等大型系统的成功候选者。近十年来,忆阻器以其在同一器件内将处理(点积)和存储相结合的优点,在许多神经形态突触中得到了应用。有不同的材料可用于制造忆阻器。本文介绍了双晶体管-单忆阻突触中自旋电子忆阻器与二氧化钛电阻式忆阻器的比较。这项工作是在Cadence Virtuoso上完成的,使用Verilog-A进行忆阻器建模。比较表明,当需要高速时,使用自旋电子忆阻器的突触实现效率更高。然而,电阻式忆阻器由于其较低的功耗而更合适。
{"title":"Investigation of DW Spintronic Memristor performance in 2T1M Neuromorphic Synapse","authors":"Yasmin K. Abdelmagid, Renad T. Nawar, Mennatullah K. Rabie, Ahmed S. Tulan, Ahmed H. Hassan, Andoleet Saleh, H. Mostafa","doi":"10.1109/NILES50944.2020.9257896","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257896","url":null,"abstract":"Memristor, the two-terminal memory-resistance device discovered by Chua in 1971, is a promising solution for future processing problems. Its CMOS integration compatibility and large resistance in small size, makes it very successful candidate for large-scale systems like Neural Networks. In last decade, memristors were used in many Neuromorphic Synapses for its advantage of combining processing (dot-product) and memory in same device. There are different materials that can be used to fabricate memristors. In this paper, a comparison between spintronic and TiO2-resistive memristor in two-transistors-one memristor synapse, is introduced. The work was done on Cadence Virtuoso with using Verilog-A for memristor modeling. The comparison reveals that the synaptic implementation with a spintronic memristor is more efficient when high speed is needed. However, the resistive memristor is more adequate due to its lower power dissipation.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network with Adaptive Learning Rate 具有自适应学习率的神经网络
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257880
Abdelrahman Ezzeldin Nagib, M. Saeed, Shereen Fathy El-Feky, Ali Khater Mohamed
Over the last two decades, the neural network has surprisingly arisen as an efficient tool for dealing with numerous real-life applications. Optimization of the hyperparameter of the neural network attracted many researchers in industrial and research areas because of its great effect on the quality of the solution. This paper presents a new adaptation for the learning rate with shock (ALRS) as the learning rate is considered one of the most important hyperparameters. The experimental results proved that the new adaptation leads to improved accuracy with a simpler structure for the neural network regardless of the initial value of the learning rate.
在过去的二十年里,神经网络作为一种处理大量现实应用的有效工具,令人惊讶地崛起。神经网络的超参数优化问题由于对解的质量有很大的影响,在工业和科研领域引起了许多研究者的关注。由于学习率被认为是最重要的超参数之一,本文提出了一种新的带有冲击的学习率(ALRS)的自适应方法。实验结果证明,无论学习率的初始值是多少,新的自适应方法都能以更简单的结构提高神经网络的精度。
{"title":"Neural Network with Adaptive Learning Rate","authors":"Abdelrahman Ezzeldin Nagib, M. Saeed, Shereen Fathy El-Feky, Ali Khater Mohamed","doi":"10.1109/NILES50944.2020.9257880","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257880","url":null,"abstract":"Over the last two decades, the neural network has surprisingly arisen as an efficient tool for dealing with numerous real-life applications. Optimization of the hyperparameter of the neural network attracted many researchers in industrial and research areas because of its great effect on the quality of the solution. This paper presents a new adaptation for the learning rate with shock (ALRS) as the learning rate is considered one of the most important hyperparameters. The experimental results proved that the new adaptation leads to improved accuracy with a simpler structure for the neural network regardless of the initial value of the learning rate.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124607013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles 混合状态图原理在可配置车辆分层结构中的应用
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257953
M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan
Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.
多车辆编队是实现高效交通系统的重要步骤。本文介绍了一种面向网联车辆的三层混合编队控制体系结构。该体系结构采用混合状态图的原理,在审议决策层进行轨迹分配,然后在中间执行控制层进行车辆轨迹跟踪。最后,设计了一个功能控制层,用于低级反馈控制。该体系结构采用一组平行直线车辆编队轨迹的微型车辆进行仿真,并在横向方向上隔有偏移。为了验证中间控制层的有效性,在一辆小型汽车上进行了点对点控制实验。仿真实验结果表明,在直线编队轨迹跟踪中,所提出的控制体系在车辆纵向位置误差最小方面具有有效性和高精度。实验验证了所采用的中间控制层的有效性。
{"title":"Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles","authors":"M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257953","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257953","url":null,"abstract":"Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks nnDPI:一种基于词嵌入、卷积和递归神经网络的深度包检测技术
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257912
Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki
Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.
流量表征、应用识别、每个应用分类和VPN/非VPN流量表征是过去几年最引人注目的研究主题。深度包检测(Deep Packet Inspection, DPI)有望提高互联网服务提供商(isp)的服务质量(QoS),简化网络管理,并在内容审查中发挥重要作用。DPI已被用于帮助缓解网络流量。例如,如果有一条高优先级的消息,DPI可以用来使高优先级的信息在其他低优先级的消息之前立即通过。它可以用来优先处理关键任务的数据包,优先于普通的浏览数据包。对于某些流量类型(如点对点下载),可以使用DPI来限制或减慢数据传输速率。它还可以用于增强isp的能力,通过阻止来自设备的恶意请求来防止利用物联网(IoT)设备进行分布式拒绝服务(DDOS)攻击。在本文中,我们介绍了一种使用神经网络的DPI新架构,该架构利用词嵌入层,卷积神经网络和双向递归神经网络,在这项任务中证明了有希望的结果。提出的体系结构引入了一种新的层组合,其性能优于之前提出的方法。
{"title":"nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks","authors":"Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257912","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257912","url":null,"abstract":"Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game Theory for Computation Offloading and Resource Allocation in Edge Computing: A Survey 边缘计算中计算卸载与资源分配的博弈论综述
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257921
Marwa Zamzam, T. el-Shabrawy, M. Ashour
Edge computing is considered a promising approach to provide cloud computing capabilities at the edge of the network near to the users. However, the limited number of computation and communication resources at the edge have made the problem of offloading and resource allocation a challenging issue for service providers. Game theory analyzes the behavior of the users and succeeds to obtain solutions in this area where all users are satisfied and the problem reaches an equilibrium state. In this paper, first we give a brief background on game theory showing its definition, types and advantages. Second, we give an overview about edge computing system showing its architecture, challenges and kinds of resource management. Third, we provide a survey about significant achievements of applying game theory in edge computing problems. We categorize the state-of-the-art according to the objective function of the problem. It is divided into seven classes: 1) minimizing the latency, 2) minimizing the energy, 3) minimizing the cost, 4) minimizing both latency and energy, 5) minimizing energy and cost, 6) minimizing latency and cost and finally, 7) minimizing all together latency, cost and energy. Moreover, we present the lessons learned and the future research directions.
边缘计算被认为是在靠近用户的网络边缘提供云计算功能的一种很有前途的方法。然而,边缘有限的计算和通信资源使得卸载和资源分配问题成为服务提供商面临的一个挑战。博弈论分析用户的行为,并成功地在这个区域内得到所有用户都满意且问题达到均衡状态的解。本文首先简要介绍了博弈论的背景,介绍了博弈论的定义、类型和优势。其次,我们概述了边缘计算系统的架构、挑战和资源管理的种类。第三,综述了博弈论在边缘计算问题中的重要应用成果。我们根据问题的目标函数对现状进行分类。它分为7类:1)最小化延迟,2)最小化能量,3)最小化成本,4)最小化延迟和能量,5)最小化能量和成本,6)最小化延迟和成本,最后,7)最小化延迟,成本和能量。最后,提出了研究的经验教训和未来的研究方向。
{"title":"Game Theory for Computation Offloading and Resource Allocation in Edge Computing: A Survey","authors":"Marwa Zamzam, T. el-Shabrawy, M. Ashour","doi":"10.1109/NILES50944.2020.9257921","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257921","url":null,"abstract":"Edge computing is considered a promising approach to provide cloud computing capabilities at the edge of the network near to the users. However, the limited number of computation and communication resources at the edge have made the problem of offloading and resource allocation a challenging issue for service providers. Game theory analyzes the behavior of the users and succeeds to obtain solutions in this area where all users are satisfied and the problem reaches an equilibrium state. In this paper, first we give a brief background on game theory showing its definition, types and advantages. Second, we give an overview about edge computing system showing its architecture, challenges and kinds of resource management. Third, we provide a survey about significant achievements of applying game theory in edge computing problems. We categorize the state-of-the-art according to the objective function of the problem. It is divided into seven classes: 1) minimizing the latency, 2) minimizing the energy, 3) minimizing the cost, 4) minimizing both latency and energy, 5) minimizing energy and cost, 6) minimizing latency and cost and finally, 7) minimizing all together latency, cost and energy. Moreover, we present the lessons learned and the future research directions.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129347860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation 链接自适应上下文多武装强盗- RL算法的安全性评估
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257955
Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir
Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.
工业界越来越多地在生产中采用强化学习算法(RL),而没有彻底分析其安全特性。此外,如果这些算法的功能在运行过程中受到损害,可能会出现潜在的威胁。上下文多武装强盗(CMAB)算法是著名的强化学习算法之一。在本文中,我们探讨了CMAB如何通过学习将通信链路吞吐量最大化的最佳传输参数来解决链路自适应问题-这是电信行业中众所周知的问题。我们分析了该算法的潜在漏洞以及它们如何对链路参数计算产生不利影响。此外,我们在使用Ray的网络模拟环境中为上下文多武装强盗强化学习(CMAB-RL)算法提供了可证明的安全性评估。这是通过从理论上和实践上演示CMAB安全漏洞来实现的。针对CMAB代理及其周围环境,提出了一些安全控制措施。以修复这些漏洞并降低风险。这些控制可以应用于其他RL代理,以设计更健壮和安全的RL代理。
{"title":"Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation","authors":"Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir","doi":"10.1109/NILES50944.2020.9257955","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257955","url":null,"abstract":"Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart 面向自动多乘客高尔夫球车的平台改造
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257898
Hady Hafez, S. Maged, A. Osama, M. Abdelaziz
This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.
本文介绍了艾因沙姆斯大学汽车电子研究实验室团队将一辆14座多乘客高尔夫球车改造成自动驾驶3级汽车的过程。开发的车辆将在校园,度假村和俱乐部等封闭环境中使用。通过本文,我们将讨论汽车的机电改造以及传感器套件。此外,还讨论了在感知、定位和映射中使用的算法,以及在紧急情况下为乘客安全采取的安全措施。
{"title":"Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart","authors":"Hady Hafez, S. Maged, A. Osama, M. Abdelaziz","doi":"10.1109/NILES50944.2020.9257898","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257898","url":null,"abstract":"This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Self-Balancing and object Tracking Robot Using Artificial Intelligence and Machine Vision 基于人工智能和机器视觉的混合自平衡和目标跟踪机器人
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257916
Santiago Ramos Garces, Mayra Yucely Beb, Abdoulaye Boubakari, H. Ammar, Mohamed A. Wahby Shalaby
Over the past decade, mobile autonomous robots have been widely used efficiently for different applications. Recently, self-balancing robots attracted more attention and showed impressive performance. A self-balancing robot is simply a two-wheeled robot; hence it needs to be balanced vertically using a closed-loop control algorithm. In this paper, a new hybrid two-wheeled self-balancing robot is fully designed and implemented, which is able to track objects and to avoid obstacles efficiently. The proposed robot consists of a two-wheeled chassis equipped with an ultrasonic sensor, camera, gyroscope and accelerometer allowing a multi-directional navigation of the robot tracker. Additionally, the Internet of Things (IOT) framework has been used for remote control and monitoring via wireless interface. The Fuzzy Logic Controller is designed considering all the realistic hindrances in order to achieve high performance and meet robust stability. To approximate the position of an object about the robot, vision system and ultrasonic sensor coupled with a camera are used. Finally, it has been observed via simulation and hardware implementation the efficiency of fuzzy control technique which achieved both stability and robustness outcomes; however, due to processing restrictions other control techniques are also successfully implemented. Regarding the experimental results it can be concluded that, balancing and tracking techniques can be achieved by applying sequential algorithm in Simulink combined with vision system and sensors like ultrasonic, accelerometer and gyroscope.
在过去的十年中,移动自主机器人被广泛有效地应用于不同的应用领域。近年来,自平衡机器人越来越受到人们的关注,并表现出令人印象深刻的表现。自平衡机器人就是一个简单的两轮机器人;因此,需要使用闭环控制算法进行垂直平衡。本文完整地设计并实现了一种新型混合两轮自平衡机器人,该机器人能够有效地跟踪物体并避开障碍物。该机器人由两轮底盘组成,底盘上装有超声波传感器、摄像头、陀螺仪和加速度计,可实现机器人跟踪器的多向导航。此外,物联网(IOT)框架已用于通过无线接口进行远程控制和监控。模糊控制器的设计考虑了各种现实障碍,以达到高性能和鲁棒稳定性。为了逼近机器人周围物体的位置,使用了视觉系统和超声波传感器与相机相结合的方法。最后,通过仿真和硬件实现观察了模糊控制技术的有效性,实现了系统的稳定性和鲁棒性;然而,由于加工限制,其他控制技术也成功实施。实验结果表明,将时序算法应用于Simulink中,结合视觉系统和超声波、加速度计、陀螺仪等传感器,可以实现平衡和跟踪技术。
{"title":"Hybrid Self-Balancing and object Tracking Robot Using Artificial Intelligence and Machine Vision","authors":"Santiago Ramos Garces, Mayra Yucely Beb, Abdoulaye Boubakari, H. Ammar, Mohamed A. Wahby Shalaby","doi":"10.1109/NILES50944.2020.9257916","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257916","url":null,"abstract":"Over the past decade, mobile autonomous robots have been widely used efficiently for different applications. Recently, self-balancing robots attracted more attention and showed impressive performance. A self-balancing robot is simply a two-wheeled robot; hence it needs to be balanced vertically using a closed-loop control algorithm. In this paper, a new hybrid two-wheeled self-balancing robot is fully designed and implemented, which is able to track objects and to avoid obstacles efficiently. The proposed robot consists of a two-wheeled chassis equipped with an ultrasonic sensor, camera, gyroscope and accelerometer allowing a multi-directional navigation of the robot tracker. Additionally, the Internet of Things (IOT) framework has been used for remote control and monitoring via wireless interface. The Fuzzy Logic Controller is designed considering all the realistic hindrances in order to achieve high performance and meet robust stability. To approximate the position of an object about the robot, vision system and ultrasonic sensor coupled with a camera are used. Finally, it has been observed via simulation and hardware implementation the efficiency of fuzzy control technique which achieved both stability and robustness outcomes; however, due to processing restrictions other control techniques are also successfully implemented. Regarding the experimental results it can be concluded that, balancing and tracking techniques can be achieved by applying sequential algorithm in Simulink combined with vision system and sensors like ultrasonic, accelerometer and gyroscope.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling the effect of population density on controlling Covid-19 initial Spread with the use of MATLAB numerical methods and stringency index model 利用MATLAB数值方法和严格指数模型对人口密度对控制Covid-19初始传播的影响进行建模
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257960
A. Ibrahim, Mohab Mohammed Eid, Nagham Nessim Mostafa, Nour El-Hoda Mohamed Bishady, Samar Hassan Elghalban
The effect of population density on the initial spread of the novel Covid-19 virus has been evaluated using the numerical data of fifty pioneer adopting countries in their first thirty days experience with the disease. The fifty countries were curdled into ten groups that each of them possesses an average population density and each group’s virus’s spread was modeled in a two-dimensional graph with the use of MATLAB curve fitting. The modeling is done based on the exponential growth equation. The stringency index model was also utilized a source of analysis regarding the government responses of the groups in study. Finally, population density was found to be not a significant contributor in controlling Covid-19 epidemic in the very first month of spread; however, countries with denser populations were found better to adopt stricter regulations especially in the first month of spread as Covid-19 outbreak and total number of cases is
人口密度对新型Covid-19病毒初始传播的影响已利用50个率先采用该疾病的国家在其最初30天经验中的数字数据进行了评估。将50个国家分为10组,每组具有平均人口密度,并使用MATLAB曲线拟合在二维图形中模拟每组病毒的传播。模型是根据指数增长方程建立的。本文还利用严格指数模型对研究群体的政府反应进行了分析。最后,在Covid-19传播的第一个月,人口密度对控制疫情没有显著贡献;然而,研究发现,人口密度较高的国家最好采取更严格的监管措施,特别是在Covid-19爆发和病例总数增加的第一个月
{"title":"Modeling the effect of population density on controlling Covid-19 initial Spread with the use of MATLAB numerical methods and stringency index model","authors":"A. Ibrahim, Mohab Mohammed Eid, Nagham Nessim Mostafa, Nour El-Hoda Mohamed Bishady, Samar Hassan Elghalban","doi":"10.1109/NILES50944.2020.9257960","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257960","url":null,"abstract":"The effect of population density on the initial spread of the novel Covid-19 virus has been evaluated using the numerical data of fifty pioneer adopting countries in their first thirty days experience with the disease. The fifty countries were curdled into ten groups that each of them possesses an average population density and each group’s virus’s spread was modeled in a two-dimensional graph with the use of MATLAB curve fitting. The modeling is done based on the exponential growth equation. The stringency index model was also utilized a source of analysis regarding the government responses of the groups in study. Finally, population density was found to be not a significant contributor in controlling Covid-19 epidemic in the very first month of spread; however, countries with denser populations were found better to adopt stricter regulations especially in the first month of spread as Covid-19 outbreak and total number of cases is","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1