Pub Date : 2024-02-15DOI: 10.3389/fcomp.2024.1355975
Sheng Li, Jiyi Li, Yang Cao
This study explores the vulnerability of robot dialogue systems' automatic speech recognition (ASR) module to adversarial music attacks. Specifically, we explore music as a natural camouflage for such attacks. We propose a novel method to hide ghost speech commands in a music clip by slightly perturbing its raw waveform. We apply our attack on an industry-popular ASR model, namely the time-delay neural network (TDNN), widely used for speech and speaker recognition. Our experiment demonstrates that adversarial music crafted by our attack can easily mislead industry-level TDNN models into picking up ghost commands with high success rates. However, it sounds no different from the original music to the human ear. This reveals a serious threat by adversarial music to robot dialogue systems, calling for effective defenses against such stealthy attacks.
本研究探讨了机器人对话系统的自动语音识别(ASR)模块在对抗性音乐攻击面前的脆弱性。具体来说,我们探索音乐作为此类攻击的天然伪装。我们提出了一种新方法,通过轻微扰动音乐片段的原始波形来隐藏音乐片段中的幽灵语音命令。我们将攻击应用于业界流行的 ASR 模型,即广泛用于语音和说话人识别的时延神经网络 (TDNN)。我们的实验证明,我们的攻击所制作的对抗性音乐可以轻易地误导行业级 TDNN 模型,使其高成功率地捕捉到幽灵指令。然而,在人耳听来,它与原始音乐并无不同。这揭示了对抗性音乐对机器人对话系统的严重威胁,要求对这种隐蔽攻击进行有效防御。
{"title":"Phantom in the opera: adversarial music attack for robot dialogue system","authors":"Sheng Li, Jiyi Li, Yang Cao","doi":"10.3389/fcomp.2024.1355975","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1355975","url":null,"abstract":"This study explores the vulnerability of robot dialogue systems' automatic speech recognition (ASR) module to adversarial music attacks. Specifically, we explore music as a natural camouflage for such attacks. We propose a novel method to hide ghost speech commands in a music clip by slightly perturbing its raw waveform. We apply our attack on an industry-popular ASR model, namely the time-delay neural network (TDNN), widely used for speech and speaker recognition. Our experiment demonstrates that adversarial music crafted by our attack can easily mislead industry-level TDNN models into picking up ghost commands with high success rates. However, it sounds no different from the original music to the human ear. This reveals a serious threat by adversarial music to robot dialogue systems, calling for effective defenses against such stealthy attacks.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139774668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-15DOI: 10.3389/fcomp.2024.1355975
Sheng Li, Jiyi Li, Yang Cao
This study explores the vulnerability of robot dialogue systems' automatic speech recognition (ASR) module to adversarial music attacks. Specifically, we explore music as a natural camouflage for such attacks. We propose a novel method to hide ghost speech commands in a music clip by slightly perturbing its raw waveform. We apply our attack on an industry-popular ASR model, namely the time-delay neural network (TDNN), widely used for speech and speaker recognition. Our experiment demonstrates that adversarial music crafted by our attack can easily mislead industry-level TDNN models into picking up ghost commands with high success rates. However, it sounds no different from the original music to the human ear. This reveals a serious threat by adversarial music to robot dialogue systems, calling for effective defenses against such stealthy attacks.
本研究探讨了机器人对话系统的自动语音识别(ASR)模块在对抗性音乐攻击面前的脆弱性。具体来说,我们探索音乐作为此类攻击的天然伪装。我们提出了一种新方法,通过轻微扰动音乐片段的原始波形来隐藏音乐片段中的幽灵语音命令。我们将攻击应用于业界流行的 ASR 模型,即广泛用于语音和说话人识别的时延神经网络 (TDNN)。我们的实验证明,我们的攻击所制作的对抗性音乐可以轻易地误导行业级 TDNN 模型,使其高成功率地捕捉到幽灵指令。然而,在人耳听来,它与原始音乐并无不同。这揭示了对抗性音乐对机器人对话系统的严重威胁,要求对这种隐蔽攻击进行有效防御。
{"title":"Phantom in the opera: adversarial music attack for robot dialogue system","authors":"Sheng Li, Jiyi Li, Yang Cao","doi":"10.3389/fcomp.2024.1355975","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1355975","url":null,"abstract":"This study explores the vulnerability of robot dialogue systems' automatic speech recognition (ASR) module to adversarial music attacks. Specifically, we explore music as a natural camouflage for such attacks. We propose a novel method to hide ghost speech commands in a music clip by slightly perturbing its raw waveform. We apply our attack on an industry-popular ASR model, namely the time-delay neural network (TDNN), widely used for speech and speaker recognition. Our experiment demonstrates that adversarial music crafted by our attack can easily mislead industry-level TDNN models into picking up ghost commands with high success rates. However, it sounds no different from the original music to the human ear. This reveals a serious threat by adversarial music to robot dialogue systems, calling for effective defenses against such stealthy attacks.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139834190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-13DOI: 10.3389/fcomp.2024.1378160
A. Turner, Stephen James McCombie, Allon J. Uhlmann
{"title":"Editorial: The impacts of cyber threat in the maritime ecosystem","authors":"A. Turner, Stephen James McCombie, Allon J. Uhlmann","doi":"10.3389/fcomp.2024.1378160","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1378160","url":null,"abstract":"","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139780131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-13DOI: 10.3389/fcomp.2024.1378160
A. Turner, Stephen James McCombie, Allon J. Uhlmann
{"title":"Editorial: The impacts of cyber threat in the maritime ecosystem","authors":"A. Turner, Stephen James McCombie, Allon J. Uhlmann","doi":"10.3389/fcomp.2024.1378160","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1378160","url":null,"abstract":"","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139840057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-09DOI: 10.3389/fcomp.2023.1125124
Amir Amini, Arash Mohammadi, Ming Hou, Amir Asif
This article proposes a secure implementation for consensus using a dynamic event-triggered control (DETC) scheme for general autonomous multi-agent systems (MAS) under asynchronous (distributed) denial of service (DoS) attacks. The asynchronous DoS attacks can block each communication channel independently in an unknown pattern. Depending on the impact of DoS on the communication topology, the attacks are categorized into (i): connectivity-preserved DoS (CP-DoS), and (ii): connectivity-broken DoS (CB-DoS). In CP-DoS, the operating communication topology remains connected. On the other hand, in CB-DoS the adversary breaks the communication graph into isolated sub-graphs.The DETC scheme is employed to reduce the control updates for each agent. To guarantee consensus under both the CP-DoS and CB-DoS, a linear matrix inequality (LMI) based optimization approach is proposed, which simultaneously designs all the unknown DETC parameters as well as the state feedback control gain.The proposed optimization method prioritizes the minimum inter-event interval (MIET) between consecutive control updates. The trade-off between relevant features of the MAS, namely the consensus convergence rate, intensity of control updates, and level of resilience to DoS can be handled by the proposed optimization.Simulation results quantify the effectiveness of the proposed approach, showcasing its ability to maintain secure consensus in MAS under varying DoS attack scenarios.
本文提出了一种在异步(分布式)拒绝服务(DoS)攻击下使用动态事件触发控制(DETC)方案为一般自主多代理系统(MAS)达成共识的安全实现方法。异步 DoS 攻击会以未知的模式独立阻塞每个通信通道。根据 DoS 对通信拓扑的影响,攻击可分为 (i) 连接保留型 DoS(CP-DoS)和 (ii) 连接破坏型 DoS(CB-DoS)。在 CP-DoS 中,运行中的通信拓扑保持连接。另一方面,在 CB-DoS 中,对手会将通信图分解成孤立的子图。DETC 方案用于减少每个代理的控制更新。为了保证在 CP-DoS 和 CB-DoS 两种情况下达成共识,我们提出了一种基于线性矩阵不等式(LMI)的优化方法,它可以同时设计所有未知的 DETC 参数以及状态反馈控制增益。仿真结果量化了所提方法的有效性,展示了该方法在不同 DoS 攻击场景下保持 MAS 安全共识的能力。
{"title":"Secure dynamic event-triggering control for consensus under asynchronous denial of service","authors":"Amir Amini, Arash Mohammadi, Ming Hou, Amir Asif","doi":"10.3389/fcomp.2023.1125124","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1125124","url":null,"abstract":"This article proposes a secure implementation for consensus using a dynamic event-triggered control (DETC) scheme for general autonomous multi-agent systems (MAS) under asynchronous (distributed) denial of service (DoS) attacks. The asynchronous DoS attacks can block each communication channel independently in an unknown pattern. Depending on the impact of DoS on the communication topology, the attacks are categorized into (i): connectivity-preserved DoS (CP-DoS), and (ii): connectivity-broken DoS (CB-DoS). In CP-DoS, the operating communication topology remains connected. On the other hand, in CB-DoS the adversary breaks the communication graph into isolated sub-graphs.The DETC scheme is employed to reduce the control updates for each agent. To guarantee consensus under both the CP-DoS and CB-DoS, a linear matrix inequality (LMI) based optimization approach is proposed, which simultaneously designs all the unknown DETC parameters as well as the state feedback control gain.The proposed optimization method prioritizes the minimum inter-event interval (MIET) between consecutive control updates. The trade-off between relevant features of the MAS, namely the consensus convergence rate, intensity of control updates, and level of resilience to DoS can be handled by the proposed optimization.Simulation results quantify the effectiveness of the proposed approach, showcasing its ability to maintain secure consensus in MAS under varying DoS attack scenarios.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139789326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-09DOI: 10.3389/fcomp.2023.1125124
Amir Amini, Arash Mohammadi, Ming Hou, Amir Asif
This article proposes a secure implementation for consensus using a dynamic event-triggered control (DETC) scheme for general autonomous multi-agent systems (MAS) under asynchronous (distributed) denial of service (DoS) attacks. The asynchronous DoS attacks can block each communication channel independently in an unknown pattern. Depending on the impact of DoS on the communication topology, the attacks are categorized into (i): connectivity-preserved DoS (CP-DoS), and (ii): connectivity-broken DoS (CB-DoS). In CP-DoS, the operating communication topology remains connected. On the other hand, in CB-DoS the adversary breaks the communication graph into isolated sub-graphs.The DETC scheme is employed to reduce the control updates for each agent. To guarantee consensus under both the CP-DoS and CB-DoS, a linear matrix inequality (LMI) based optimization approach is proposed, which simultaneously designs all the unknown DETC parameters as well as the state feedback control gain.The proposed optimization method prioritizes the minimum inter-event interval (MIET) between consecutive control updates. The trade-off between relevant features of the MAS, namely the consensus convergence rate, intensity of control updates, and level of resilience to DoS can be handled by the proposed optimization.Simulation results quantify the effectiveness of the proposed approach, showcasing its ability to maintain secure consensus in MAS under varying DoS attack scenarios.
本文提出了一种在异步(分布式)拒绝服务(DoS)攻击下使用动态事件触发控制(DETC)方案为一般自主多代理系统(MAS)达成共识的安全实现方法。异步 DoS 攻击会以未知的模式独立阻塞每个通信通道。根据 DoS 对通信拓扑的影响,攻击可分为 (i) 连接保留型 DoS(CP-DoS)和 (ii) 连接破坏型 DoS(CB-DoS)。在 CP-DoS 中,运行中的通信拓扑保持连接。另一方面,在 CB-DoS 中,对手会将通信图分解成孤立的子图。DETC 方案用于减少每个代理的控制更新。为了保证在 CP-DoS 和 CB-DoS 两种情况下达成共识,我们提出了一种基于线性矩阵不等式(LMI)的优化方法,它可以同时设计所有未知的 DETC 参数以及状态反馈控制增益。仿真结果量化了所提方法的有效性,展示了该方法在不同 DoS 攻击场景下保持 MAS 安全共识的能力。
{"title":"Secure dynamic event-triggering control for consensus under asynchronous denial of service","authors":"Amir Amini, Arash Mohammadi, Ming Hou, Amir Asif","doi":"10.3389/fcomp.2023.1125124","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1125124","url":null,"abstract":"This article proposes a secure implementation for consensus using a dynamic event-triggered control (DETC) scheme for general autonomous multi-agent systems (MAS) under asynchronous (distributed) denial of service (DoS) attacks. The asynchronous DoS attacks can block each communication channel independently in an unknown pattern. Depending on the impact of DoS on the communication topology, the attacks are categorized into (i): connectivity-preserved DoS (CP-DoS), and (ii): connectivity-broken DoS (CB-DoS). In CP-DoS, the operating communication topology remains connected. On the other hand, in CB-DoS the adversary breaks the communication graph into isolated sub-graphs.The DETC scheme is employed to reduce the control updates for each agent. To guarantee consensus under both the CP-DoS and CB-DoS, a linear matrix inequality (LMI) based optimization approach is proposed, which simultaneously designs all the unknown DETC parameters as well as the state feedback control gain.The proposed optimization method prioritizes the minimum inter-event interval (MIET) between consecutive control updates. The trade-off between relevant features of the MAS, namely the consensus convergence rate, intensity of control updates, and level of resilience to DoS can be handled by the proposed optimization.Simulation results quantify the effectiveness of the proposed approach, showcasing its ability to maintain secure consensus in MAS under varying DoS attack scenarios.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139849075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-07DOI: 10.3389/fcomp.2024.1348024
H. Obaid, Shahzad Ashraf, Muhammad Asgher Nadeem, Hifsa Shahid, Adeel Akram, Muhammad Zafrullah
Free space optical (FSO) systems offer a desirable and affordable way of providing communication services in remote locations. They provide secure wireless transmission without the requirement for licensing and with lower implementation costs. However, due to the impact of atmospheric turbulences on the effectiveness of FSO systems, their implementation faces significant challenges. Dense wavelength division multiplexing (DWDM) has shown promise in addressing the growing bandwidth needs in optical networks. This paper introduces a hybrid optical amplifier based system, combining DWDM and FSO technology. Energy conservation in such a system involves optimizing various aspects to reduce power consumption while maintaining or improving performance. The proposed DWDM-FSO system operates at a rate of 480 Gbps and consists of 12 channels, each capable of transmitting data at 40 Gbps. The system's performance is evaluated and compared by determining the Q-factor and bit error rate (BER) for both the cases when hybrid amplifier is employed and with no hybrid amplifier within the C-band, specifically focusing on wavelengths around 1550 nm. Moreover, the length of the FSO link is increased to assess the corresponding Q-factor and BER. Resultantly, the maximum distance for the FSO link is determined, ensuring that it remains within acceptable Q-factor and BER thresholds. Furthermore, the FSO system's effectiveness is assessed and compared across various atmospheric conditions. The findings reveal that, in clear weather conditions, the FSO system achieves a maximum distance of 510 meters while maintaining satisfactory Q-factor and BER values when not utilizing a hybrid amplifier. However, by integrating a hybrid amplifier, the system's reach significantly extends to 1700 m under clear weather conditions, still maintaining acceptable Q-factor and BER values.
{"title":"Performance analysis of a hybrid optical amplifier based 480-Gbps DWDM-FSO system under the effect of different atmospheric conditions","authors":"H. Obaid, Shahzad Ashraf, Muhammad Asgher Nadeem, Hifsa Shahid, Adeel Akram, Muhammad Zafrullah","doi":"10.3389/fcomp.2024.1348024","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1348024","url":null,"abstract":"Free space optical (FSO) systems offer a desirable and affordable way of providing communication services in remote locations. They provide secure wireless transmission without the requirement for licensing and with lower implementation costs. However, due to the impact of atmospheric turbulences on the effectiveness of FSO systems, their implementation faces significant challenges. Dense wavelength division multiplexing (DWDM) has shown promise in addressing the growing bandwidth needs in optical networks. This paper introduces a hybrid optical amplifier based system, combining DWDM and FSO technology. Energy conservation in such a system involves optimizing various aspects to reduce power consumption while maintaining or improving performance. The proposed DWDM-FSO system operates at a rate of 480 Gbps and consists of 12 channels, each capable of transmitting data at 40 Gbps. The system's performance is evaluated and compared by determining the Q-factor and bit error rate (BER) for both the cases when hybrid amplifier is employed and with no hybrid amplifier within the C-band, specifically focusing on wavelengths around 1550 nm. Moreover, the length of the FSO link is increased to assess the corresponding Q-factor and BER. Resultantly, the maximum distance for the FSO link is determined, ensuring that it remains within acceptable Q-factor and BER thresholds. Furthermore, the FSO system's effectiveness is assessed and compared across various atmospheric conditions. The findings reveal that, in clear weather conditions, the FSO system achieves a maximum distance of 510 meters while maintaining satisfactory Q-factor and BER values when not utilizing a hybrid amplifier. However, by integrating a hybrid amplifier, the system's reach significantly extends to 1700 m under clear weather conditions, still maintaining acceptable Q-factor and BER values.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139797979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-07DOI: 10.3389/fcomp.2024.1334027
P. Radanliev
This study conducts a detailed qualitative review of Alternative Therapies for mental health and proposes a novel design for integrating Non-Pharmacological Interventions into the Metaverse Extended Reality environments.This study investigates the potential of the Extended Reality environments for Non-Pharmacological Interventions in Mental Health, with a specific focus on Dance Movement Therapy as a preventive and therapeutic strategy for anxiety, depression, and other mental health conditions.This study conducts qualitative evidence syntheses of primary quantitative data and performs meta-analyses of existing studies of participants reporting anxiety, depression, or other mental health conditions.Dance Movement Therapy in the extended reality environments shows promise as a viable alternative therapy, but data privacy and ethical considerations must be addressed.This study raises significant concerns regarding the privacy and security of participants' data, necessitating the storage of only the metadata in electronically compatible files, in cases where users' data is stored for long-term preservation.The outcomes of this study could revolutionize mental health practice, providing effective Non-Pharmacological Interventions for anxiety, depression, and other mental health conditions.
{"title":"Dance as a mental health therapy in the Metaverse: exploring the therapeutic potential of Dance Movement Therapy as a non-pharmacological treatment in the Metaverse","authors":"P. Radanliev","doi":"10.3389/fcomp.2024.1334027","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1334027","url":null,"abstract":"This study conducts a detailed qualitative review of Alternative Therapies for mental health and proposes a novel design for integrating Non-Pharmacological Interventions into the Metaverse Extended Reality environments.This study investigates the potential of the Extended Reality environments for Non-Pharmacological Interventions in Mental Health, with a specific focus on Dance Movement Therapy as a preventive and therapeutic strategy for anxiety, depression, and other mental health conditions.This study conducts qualitative evidence syntheses of primary quantitative data and performs meta-analyses of existing studies of participants reporting anxiety, depression, or other mental health conditions.Dance Movement Therapy in the extended reality environments shows promise as a viable alternative therapy, but data privacy and ethical considerations must be addressed.This study raises significant concerns regarding the privacy and security of participants' data, necessitating the storage of only the metadata in electronically compatible files, in cases where users' data is stored for long-term preservation.The outcomes of this study could revolutionize mental health practice, providing effective Non-Pharmacological Interventions for anxiety, depression, and other mental health conditions.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139797703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-07DOI: 10.3389/fcomp.2024.1348024
H. Obaid, Shahzad Ashraf, Muhammad Asgher Nadeem, Hifsa Shahid, Adeel Akram, Muhammad Zafrullah
Free space optical (FSO) systems offer a desirable and affordable way of providing communication services in remote locations. They provide secure wireless transmission without the requirement for licensing and with lower implementation costs. However, due to the impact of atmospheric turbulences on the effectiveness of FSO systems, their implementation faces significant challenges. Dense wavelength division multiplexing (DWDM) has shown promise in addressing the growing bandwidth needs in optical networks. This paper introduces a hybrid optical amplifier based system, combining DWDM and FSO technology. Energy conservation in such a system involves optimizing various aspects to reduce power consumption while maintaining or improving performance. The proposed DWDM-FSO system operates at a rate of 480 Gbps and consists of 12 channels, each capable of transmitting data at 40 Gbps. The system's performance is evaluated and compared by determining the Q-factor and bit error rate (BER) for both the cases when hybrid amplifier is employed and with no hybrid amplifier within the C-band, specifically focusing on wavelengths around 1550 nm. Moreover, the length of the FSO link is increased to assess the corresponding Q-factor and BER. Resultantly, the maximum distance for the FSO link is determined, ensuring that it remains within acceptable Q-factor and BER thresholds. Furthermore, the FSO system's effectiveness is assessed and compared across various atmospheric conditions. The findings reveal that, in clear weather conditions, the FSO system achieves a maximum distance of 510 meters while maintaining satisfactory Q-factor and BER values when not utilizing a hybrid amplifier. However, by integrating a hybrid amplifier, the system's reach significantly extends to 1700 m under clear weather conditions, still maintaining acceptable Q-factor and BER values.
{"title":"Performance analysis of a hybrid optical amplifier based 480-Gbps DWDM-FSO system under the effect of different atmospheric conditions","authors":"H. Obaid, Shahzad Ashraf, Muhammad Asgher Nadeem, Hifsa Shahid, Adeel Akram, Muhammad Zafrullah","doi":"10.3389/fcomp.2024.1348024","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1348024","url":null,"abstract":"Free space optical (FSO) systems offer a desirable and affordable way of providing communication services in remote locations. They provide secure wireless transmission without the requirement for licensing and with lower implementation costs. However, due to the impact of atmospheric turbulences on the effectiveness of FSO systems, their implementation faces significant challenges. Dense wavelength division multiplexing (DWDM) has shown promise in addressing the growing bandwidth needs in optical networks. This paper introduces a hybrid optical amplifier based system, combining DWDM and FSO technology. Energy conservation in such a system involves optimizing various aspects to reduce power consumption while maintaining or improving performance. The proposed DWDM-FSO system operates at a rate of 480 Gbps and consists of 12 channels, each capable of transmitting data at 40 Gbps. The system's performance is evaluated and compared by determining the Q-factor and bit error rate (BER) for both the cases when hybrid amplifier is employed and with no hybrid amplifier within the C-band, specifically focusing on wavelengths around 1550 nm. Moreover, the length of the FSO link is increased to assess the corresponding Q-factor and BER. Resultantly, the maximum distance for the FSO link is determined, ensuring that it remains within acceptable Q-factor and BER thresholds. Furthermore, the FSO system's effectiveness is assessed and compared across various atmospheric conditions. The findings reveal that, in clear weather conditions, the FSO system achieves a maximum distance of 510 meters while maintaining satisfactory Q-factor and BER values when not utilizing a hybrid amplifier. However, by integrating a hybrid amplifier, the system's reach significantly extends to 1700 m under clear weather conditions, still maintaining acceptable Q-factor and BER values.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139857834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-07DOI: 10.3389/fcomp.2024.1334027
P. Radanliev
This study conducts a detailed qualitative review of Alternative Therapies for mental health and proposes a novel design for integrating Non-Pharmacological Interventions into the Metaverse Extended Reality environments.This study investigates the potential of the Extended Reality environments for Non-Pharmacological Interventions in Mental Health, with a specific focus on Dance Movement Therapy as a preventive and therapeutic strategy for anxiety, depression, and other mental health conditions.This study conducts qualitative evidence syntheses of primary quantitative data and performs meta-analyses of existing studies of participants reporting anxiety, depression, or other mental health conditions.Dance Movement Therapy in the extended reality environments shows promise as a viable alternative therapy, but data privacy and ethical considerations must be addressed.This study raises significant concerns regarding the privacy and security of participants' data, necessitating the storage of only the metadata in electronically compatible files, in cases where users' data is stored for long-term preservation.The outcomes of this study could revolutionize mental health practice, providing effective Non-Pharmacological Interventions for anxiety, depression, and other mental health conditions.
{"title":"Dance as a mental health therapy in the Metaverse: exploring the therapeutic potential of Dance Movement Therapy as a non-pharmacological treatment in the Metaverse","authors":"P. Radanliev","doi":"10.3389/fcomp.2024.1334027","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1334027","url":null,"abstract":"This study conducts a detailed qualitative review of Alternative Therapies for mental health and proposes a novel design for integrating Non-Pharmacological Interventions into the Metaverse Extended Reality environments.This study investigates the potential of the Extended Reality environments for Non-Pharmacological Interventions in Mental Health, with a specific focus on Dance Movement Therapy as a preventive and therapeutic strategy for anxiety, depression, and other mental health conditions.This study conducts qualitative evidence syntheses of primary quantitative data and performs meta-analyses of existing studies of participants reporting anxiety, depression, or other mental health conditions.Dance Movement Therapy in the extended reality environments shows promise as a viable alternative therapy, but data privacy and ethical considerations must be addressed.This study raises significant concerns regarding the privacy and security of participants' data, necessitating the storage of only the metadata in electronically compatible files, in cases where users' data is stored for long-term preservation.The outcomes of this study could revolutionize mental health practice, providing effective Non-Pharmacological Interventions for anxiety, depression, and other mental health conditions.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139857524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}