首页 > 最新文献

2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)最新文献

英文 中文
Intersection Control for Autonomous Vehicles Using Control Barrier Function Approach 基于控制障碍函数方法的自动驾驶汽车交叉口控制
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257886
Samaa Khaled, Omar M. Shehata, E. I. Morgan
Intersection management is one of the big challenges in traffic control. Autonomous vehicles are becoming more realistic. A lot of research efforts has been done to develop control systems for the autonomous vehicles in order to guarantee safety and reduce the average travel time and fuel Consumption while increasing the intersection throughput. This paper applies the concept of Control barrier function on a four way intersection. Several parametric studies were conducted to validate the the Control barrier function approach. Moreover, in order to evaluate the efficiency of the proposed approach , it is compared to a baseline scenario where the conventional vehicles operate under traffic lights. It shows better performance in terms of the average travel time and the intersection throughput. The average travel time is reduced by 14.91 to 15.11%. The intersection throughput is increased by almost 173%.
交叉口管理是交通管理的一大难题。自动驾驶汽车正变得越来越现实。为了保证安全,减少平均行驶时间和燃油消耗,同时提高交叉口吞吐量,自动驾驶汽车的控制系统已经进行了大量的研究工作。本文将控制障碍函数的概念应用于四路交叉口。进行了几个参数研究来验证控制障碍函数方法。此外,为了评估所提出的方法的效率,将其与传统车辆在红绿灯下运行的基线情景进行比较。在平均行驶时间和交叉口吞吐量方面表现出较好的性能。平均出行时间减少14.91%至15.11%。十字路口的吞吐量增加了近173%。
{"title":"Intersection Control for Autonomous Vehicles Using Control Barrier Function Approach","authors":"Samaa Khaled, Omar M. Shehata, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257886","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257886","url":null,"abstract":"Intersection management is one of the big challenges in traffic control. Autonomous vehicles are becoming more realistic. A lot of research efforts has been done to develop control systems for the autonomous vehicles in order to guarantee safety and reduce the average travel time and fuel Consumption while increasing the intersection throughput. This paper applies the concept of Control barrier function on a four way intersection. Several parametric studies were conducted to validate the the Control barrier function approach. Moreover, in order to evaluate the efficiency of the proposed approach , it is compared to a baseline scenario where the conventional vehicles operate under traffic lights. It shows better performance in terms of the average travel time and the intersection throughput. The average travel time is reduced by 14.91 to 15.11%. The intersection throughput is increased by almost 173%.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BGP Route Leaks Detection Using Supervised Machine Learning Technique 基于监督机器学习技术的BGP路由泄漏检测
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257981
Salma Abd El Monem, A. Khalafallah, S. Shaheen
The route leaks problem is considered one of the unsolved Border Gateway Protocol problems for more than fifteen years ago. It has a large negative impact on global internet stability and reliability. This problem is hard to be prevented due to human errors and misconfigurations, and hard to be detected due to the confidentiality of autonomous systems relationships.The paper proposes a new taxonomy to the different types of route leaks depending on their effects on the Border Gateway Protocol traffic, the first real route leaks incidents dataset, and a complete real-time detection system based on a supervised learning classification method. The work compares three classifiers (Decision Tree, Random Forest Trees, and Support Vector Machines). The proposed system prototype can detect and classify route leaks from normal updates with an accuracy of 87% and time complexity of O(NM), where N is the number of prefixes each with M prefix length.
路由泄漏问题被认为是15年前未解决的边境网关协议问题之一。它对全球互联网的稳定性和可靠性产生了很大的负面影响。由于人为错误和错误配置,这个问题很难被预防,并且由于自治系统关系的机密性,这个问题很难被检测到。本文根据不同类型的路由泄漏对边界网关协议流量的影响,提出了一种新的路由泄漏分类方法,建立了第一个真实的路由泄漏事件数据集,并基于监督学习分类方法建立了完整的实时检测系统。这项工作比较了三种分类器(决策树,随机森林树和支持向量机)。所提出的系统原型可以从正常更新中检测和分类路由泄漏,准确率为87%,时间复杂度为0 (NM),其中N为每个前缀长度为M的前缀数。
{"title":"BGP Route Leaks Detection Using Supervised Machine Learning Technique","authors":"Salma Abd El Monem, A. Khalafallah, S. Shaheen","doi":"10.1109/NILES50944.2020.9257981","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257981","url":null,"abstract":"The route leaks problem is considered one of the unsolved Border Gateway Protocol problems for more than fifteen years ago. It has a large negative impact on global internet stability and reliability. This problem is hard to be prevented due to human errors and misconfigurations, and hard to be detected due to the confidentiality of autonomous systems relationships.The paper proposes a new taxonomy to the different types of route leaks depending on their effects on the Border Gateway Protocol traffic, the first real route leaks incidents dataset, and a complete real-time detection system based on a supervised learning classification method. The work compares three classifiers (Decision Tree, Random Forest Trees, and Support Vector Machines). The proposed system prototype can detect and classify route leaks from normal updates with an accuracy of 87% and time complexity of O(NM), where N is the number of prefixes each with M prefix length.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart 面向自动多乘客高尔夫球车的平台改造
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257898
Hady Hafez, S. Maged, A. Osama, M. Abdelaziz
This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.
本文介绍了艾因沙姆斯大学汽车电子研究实验室团队将一辆14座多乘客高尔夫球车改造成自动驾驶3级汽车的过程。开发的车辆将在校园,度假村和俱乐部等封闭环境中使用。通过本文,我们将讨论汽车的机电改造以及传感器套件。此外,还讨论了在感知、定位和映射中使用的算法,以及在紧急情况下为乘客安全采取的安全措施。
{"title":"Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart","authors":"Hady Hafez, S. Maged, A. Osama, M. Abdelaziz","doi":"10.1109/NILES50944.2020.9257898","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257898","url":null,"abstract":"This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improving Productivity of A Production Line in Perfumes Industry in Egypt Using Lean Manufacturing Methodology 利用精益生产方法提高埃及某香水生产线的生产率
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257902
Ahmed M. Radwan, I. E. A. Rahman, Ahmed W. Roshdy, I. Fahim
This study presents proposed solutions for increasing the productivity of a production line in the perfumes industry in Egypt using lean manufacturing methodology. Enhancing efficiency is a major significant objective to consider in a typical manufacturing firm to improve the overall performance. Increasing productivity is achieved through applying an extensive lean program implementing appropriate lean tools to solve problems identified as wastage in materials and activities as well as bottlenecks increasing lead time. Information of current problems and gaps are gathered through visits and interviews. Problems are showed and analyzed using some lean tools and charts as bottleneck analysis, workflow sequence and fishbone diagrams. Lean methodology is selected to be applied due to its ability to achieve desired results, solve current gaps and maintain outstanding performance and continuous improvement enabling competitiveness within marketplace. Proposed lean tools and the fully lean manufacturing system are presented to increase efficiency and solve problems identified. Expected results showed decreased inventories by 20-30% as well as reduction in costs by 10-20%.
本研究提出了建议的解决方案,以提高生产线的生产力在香水行业在埃及使用精益生产方法。提高效率是典型制造企业提高整体绩效所要考虑的重要目标。提高生产力是通过应用广泛的精益计划,实施适当的精益工具来解决材料和活动浪费以及增加交货时间的瓶颈等问题。通过访问和访谈收集当前问题和差距的信息。运用瓶颈分析、工作流序列、鱼骨图等精益工具和图表对问题进行了展示和分析。精益方法被选择应用,因为它能够达到预期的结果,解决当前的差距,保持出色的表现和持续改进,使市场竞争力。提出了精益工具和全精益制造系统,以提高效率和解决所发现的问题。预期结果显示,库存减少了20-30%,成本降低了10-20%。
{"title":"Improving Productivity of A Production Line in Perfumes Industry in Egypt Using Lean Manufacturing Methodology","authors":"Ahmed M. Radwan, I. E. A. Rahman, Ahmed W. Roshdy, I. Fahim","doi":"10.1109/NILES50944.2020.9257902","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257902","url":null,"abstract":"This study presents proposed solutions for increasing the productivity of a production line in the perfumes industry in Egypt using lean manufacturing methodology. Enhancing efficiency is a major significant objective to consider in a typical manufacturing firm to improve the overall performance. Increasing productivity is achieved through applying an extensive lean program implementing appropriate lean tools to solve problems identified as wastage in materials and activities as well as bottlenecks increasing lead time. Information of current problems and gaps are gathered through visits and interviews. Problems are showed and analyzed using some lean tools and charts as bottleneck analysis, workflow sequence and fishbone diagrams. Lean methodology is selected to be applied due to its ability to achieve desired results, solve current gaps and maintain outstanding performance and continuous improvement enabling competitiveness within marketplace. Proposed lean tools and the fully lean manufacturing system are presented to increase efficiency and solve problems identified. Expected results showed decreased inventories by 20-30% as well as reduction in costs by 10-20%.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimum Sizing of the Sleep Transistor in MTCMOS Technology MTCMOS技术中休眠晶体管的最佳尺寸
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257978
S. Sharroush
Multi-threshold-voltage complementary metal-oxide semiconductor (MTCMOS) technology finds a wide variety of applications in reducing the subthreshold-leakage current in both combinational and sequential circuits. This is due to the fact that slightly increasing the threshold voltage causes a dramatic decrease in the subthreshold-leakage current. However, the decision on the sizing of the sleep transistor is a critical issue because there are various trade-offs that the designer must face with this respect. In this paper, the area, the static and dynamic-power consumption, and the time delay are investigated with respect to the aspect ratio of the sleep transistor with compact-form expressions derived for them. Accordingly, the optimal size of the sleep transistor is determined quantitatively. The results are discussed for NAND and NOR gates. The results obtained are based on adopting the Berkeley predictive technology model (BPTM) of the 22 nm CMOS technology with a power-supply voltage, VDD, equal to 0.8 V.
多阈值电压互补金属氧化物半导体(MTCMOS)技术在降低组合电路和顺序电路的亚阈值泄漏电流方面有着广泛的应用。这是由于稍微增加阈值电压会导致亚阈值泄漏电流的急剧下降。然而,关于休眠晶体管尺寸的决定是一个关键问题,因为设计师必须面对这方面的各种权衡。本文研究了休眠晶体管的面积、静态功耗和动态功耗以及延时与宽高比的关系,并推导了它们的紧凑表达式。因此,定量地确定休眠晶体管的最佳尺寸。讨论了NAND门和NOR门的结果。结果基于采用22nm CMOS技术的伯克利预测技术模型(BPTM),电源电压VDD为0.8 V。
{"title":"Optimum Sizing of the Sleep Transistor in MTCMOS Technology","authors":"S. Sharroush","doi":"10.1109/NILES50944.2020.9257978","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257978","url":null,"abstract":"Multi-threshold-voltage complementary metal-oxide semiconductor (MTCMOS) technology finds a wide variety of applications in reducing the subthreshold-leakage current in both combinational and sequential circuits. This is due to the fact that slightly increasing the threshold voltage causes a dramatic decrease in the subthreshold-leakage current. However, the decision on the sizing of the sleep transistor is a critical issue because there are various trade-offs that the designer must face with this respect. In this paper, the area, the static and dynamic-power consumption, and the time delay are investigated with respect to the aspect ratio of the sleep transistor with compact-form expressions derived for them. Accordingly, the optimal size of the sleep transistor is determined quantitatively. The results are discussed for NAND and NOR gates. The results obtained are based on adopting the Berkeley predictive technology model (BPTM) of the 22 nm CMOS technology with a power-supply voltage, VDD, equal to 0.8 V.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks nnDPI:一种基于词嵌入、卷积和递归神经网络的深度包检测技术
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257912
Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki
Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.
流量表征、应用识别、每个应用分类和VPN/非VPN流量表征是过去几年最引人注目的研究主题。深度包检测(Deep Packet Inspection, DPI)有望提高互联网服务提供商(isp)的服务质量(QoS),简化网络管理,并在内容审查中发挥重要作用。DPI已被用于帮助缓解网络流量。例如,如果有一条高优先级的消息,DPI可以用来使高优先级的信息在其他低优先级的消息之前立即通过。它可以用来优先处理关键任务的数据包,优先于普通的浏览数据包。对于某些流量类型(如点对点下载),可以使用DPI来限制或减慢数据传输速率。它还可以用于增强isp的能力,通过阻止来自设备的恶意请求来防止利用物联网(IoT)设备进行分布式拒绝服务(DDOS)攻击。在本文中,我们介绍了一种使用神经网络的DPI新架构,该架构利用词嵌入层,卷积神经网络和双向递归神经网络,在这项任务中证明了有希望的结果。提出的体系结构引入了一种新的层组合,其性能优于之前提出的方法。
{"title":"nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks","authors":"Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257912","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257912","url":null,"abstract":"Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles 混合状态图原理在可配置车辆分层结构中的应用
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257953
M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan
Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.
多车辆编队是实现高效交通系统的重要步骤。本文介绍了一种面向网联车辆的三层混合编队控制体系结构。该体系结构采用混合状态图的原理,在审议决策层进行轨迹分配,然后在中间执行控制层进行车辆轨迹跟踪。最后,设计了一个功能控制层,用于低级反馈控制。该体系结构采用一组平行直线车辆编队轨迹的微型车辆进行仿真,并在横向方向上隔有偏移。为了验证中间控制层的有效性,在一辆小型汽车上进行了点对点控制实验。仿真实验结果表明,在直线编队轨迹跟踪中,所提出的控制体系在车辆纵向位置误差最小方面具有有效性和高精度。实验验证了所采用的中间控制层的有效性。
{"title":"Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles","authors":"M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257953","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257953","url":null,"abstract":"Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"31 4-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies 5G和卫星网络融合:机遇、挑战和推动技术调查
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257914
Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki
Development of 5G system as a global telecommunication infrastructure is accelerating to realize the concept of a unified network infrastructure incorporating all access technologies. The potential of Low Earth Orbit (LEO) constellation systems has emerged to support wide range of services. This could help to achieve 5G key service requirements for enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). The integration of satellite communications with the 5G New Radio (NR) is stimulated by technology advancement to support challenging service requirements and demand for ubiquitous connectivity with the best possible quality of service. In this paper, we surveyed the opportunities of integrating terrestrial mobile and satellite networks, key technical challenges and proposed solutions. We also introduced a mobility management scheme that reduces signaling overhead and minimizes service interruption during inter satellite handover process.
5G系统作为全球电信基础设施,正在加速发展,实现融合所有接入技术的统一网络基础设施概念。低地球轨道(LEO)星座系统在支持广泛服务方面的潜力已经显现。这有助于实现增强型移动宽带(eMBB)、大规模机器类型通信(mMTC)和超可靠低延迟通信(URLLC)的5G关键服务需求。技术进步促进了卫星通信与5G新无线电(NR)的融合,以支持具有挑战性的业务需求和以最佳服务质量实现无处不在的连接的需求。在本文中,我们调查了整合地面移动和卫星网络的机会,关键技术挑战和提出的解决方案。我们还介绍了一种移动性管理方案,该方案减少了信令开销,并最大限度地减少了卫星间切换过程中的服务中断。
{"title":"5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies","authors":"Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257914","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257914","url":null,"abstract":"Development of 5G system as a global telecommunication infrastructure is accelerating to realize the concept of a unified network infrastructure incorporating all access technologies. The potential of Low Earth Orbit (LEO) constellation systems has emerged to support wide range of services. This could help to achieve 5G key service requirements for enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). The integration of satellite communications with the 5G New Radio (NR) is stimulated by technology advancement to support challenging service requirements and demand for ubiquitous connectivity with the best possible quality of service. In this paper, we surveyed the opportunities of integrating terrestrial mobile and satellite networks, key technical challenges and proposed solutions. We also introduced a mobility management scheme that reduces signaling overhead and minimizes service interruption during inter satellite handover process.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation 链接自适应上下文多武装强盗- RL算法的安全性评估
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257955
Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir
Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.
工业界越来越多地在生产中采用强化学习算法(RL),而没有彻底分析其安全特性。此外,如果这些算法的功能在运行过程中受到损害,可能会出现潜在的威胁。上下文多武装强盗(CMAB)算法是著名的强化学习算法之一。在本文中,我们探讨了CMAB如何通过学习将通信链路吞吐量最大化的最佳传输参数来解决链路自适应问题-这是电信行业中众所周知的问题。我们分析了该算法的潜在漏洞以及它们如何对链路参数计算产生不利影响。此外,我们在使用Ray的网络模拟环境中为上下文多武装强盗强化学习(CMAB-RL)算法提供了可证明的安全性评估。这是通过从理论上和实践上演示CMAB安全漏洞来实现的。针对CMAB代理及其周围环境,提出了一些安全控制措施。以修复这些漏洞并降低风险。这些控制可以应用于其他RL代理,以设计更健壮和安全的RL代理。
{"title":"Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation","authors":"Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir","doi":"10.1109/NILES50944.2020.9257955","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257955","url":null,"abstract":"Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Schlieren System for Visualization of Heat and Mass Transfer 用于传热传质可视化的纹影系统设计
Pub Date : 2020-10-24 DOI: 10.1109/NILES50944.2020.9257970
Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily
In this contribution, a simple yet effective design for Schlieren photography system is described and implemented. The proposed system is used in the visualization of both heat and mass transfer phenomena. Refractive index gradient is created by a lighter to study mass transfer, then the lighter is ignited to create temperature gradient. Results show the ability of the proposed system in capturing the gradients in both mass and temperature gradients.
在这篇文章中,描述并实现了一个简单而有效的纹影摄影系统设计。所提出的系统用于传热和传质现象的可视化。折射率梯度是由打火机来研究传质,然后点燃打火机来产生温度梯度。结果表明,该系统能够捕获质量梯度和温度梯度的梯度。
{"title":"Design of a Schlieren System for Visualization of Heat and Mass Transfer","authors":"Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily","doi":"10.1109/NILES50944.2020.9257970","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257970","url":null,"abstract":"In this contribution, a simple yet effective design for Schlieren photography system is described and implemented. The proposed system is used in the visualization of both heat and mass transfer phenomena. Refractive index gradient is created by a lighter to study mass transfer, then the lighter is ignited to create temperature gradient. Results show the ability of the proposed system in capturing the gradients in both mass and temperature gradients.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1