773 research outputs found
2023-2024 Catalog
The 2023-2024 Governors State University Undergraduate and Graduate Catalog is a comprehensive listing of current information regarding:Degree RequirementsCourse OfferingsUndergraduate and Graduate Rules and Regulation
Adaptive vehicular networking with Deep Learning
Vehicular networks have been identified as a key enabler for future smart traffic applications aiming to improve on-road safety, increase road traffic efficiency, or provide advanced infotainment services to improve on-board comfort. However, the requirements of smart traffic applications also place demands on vehicular networks’ quality in terms of high data rates, low latency, and reliability, while simultaneously meeting the challenges of sustainability, green network development goals and energy efficiency. The advances in vehicular communication technologies combined with the peculiar characteristics of vehicular networks have brought challenges to traditional networking solutions designed around fixed parameters using complex mathematical optimisation. These challenges necessitate greater intelligence to be embedded in vehicular networks to realise adaptive network optimisation. As such, one promising solution is the use of Machine Learning (ML) algorithms to extract hidden patterns from collected data thus formulating adaptive network optimisation solutions with strong generalisation capabilities.
In this thesis, an overview of the underlying technologies, applications, and characteristics of vehicular networks is presented, followed by the motivation of using ML and a general introduction of ML background. Additionally, a literature review of ML applications in vehicular networks is also presented drawing on the state-of-the-art of ML technology adoption. Three key challenging research topics have been identified centred around network optimisation and ML deployment aspects.
The first research question and contribution focus on mobile Handover (HO) optimisation as vehicles pass between base stations; a Deep Reinforcement Learning (DRL) handover algorithm is proposed and evaluated against the currently deployed method. Simulation results suggest that the proposed algorithm can guarantee optimal HO decision in a realistic simulation setup.
The second contribution explores distributed radio resource management optimisation. Two versions of a Federated Learning (FL) enhanced DRL algorithm are proposed and evaluated against other state-of-the-art ML solutions. Simulation results suggest that the proposed solution outperformed other benchmarks in overall resource utilisation efficiency, especially in generalisation scenarios.
The third contribution looks at energy efficiency optimisation on the network side considering a backdrop of sustainability and green networking. A cell switching algorithm was developed based on a Graph Neural Network (GNN) model and the proposed energy efficiency scheme is able to achieve almost 95% of the metric normalised energy efficiency compared against the “ideal” optimal energy efficiency benchmark and is capable of being applied in many more general network configurations compared with the state-of-the-art ML benchmark
Integration of hybrid networks, AI, Ultra Massive-MIMO, THz frequency, and FBMC modulation toward 6g requirements : A Review
The fifth-generation (5G) wireless communications have been deployed in many countries with the following features: wireless networks at 20 Gbps as peak data rate, a latency of 1-ms, reliability of 99.999%, maximum mobility of 500 km/h, a bandwidth of 1-GHz, and a capacity of 106 up to Mbps/m2. Nonetheless, the rapid growth of applications, such as extended/virtual reality (XR/VR), online gaming, telemedicine, cloud computing, smart cities, the Internet of Everything (IoE), and others, demand lower latency, higher data rates, ubiquitous coverage, and better reliability. These higher requirements are the main problems that have challenged 5G while concurrently encouraging researchers and practitioners to introduce viable solutions. In this review paper, the sixth-generation (6G) technology could solve the 5G limitations, achieve higher requirements, and support future applications. The integration of multiple access techniques, terahertz (THz), visible light communications (VLC), ultra-massive multiple-input multiple-output ( ÎĽm -MIMO), hybrid networks, cell-free massive MIMO, and artificial intelligence (AI)/machine learning (ML) have been proposed for 6G. The main contributions of this paper are a comprehensive review of the 6G vision, KPIs (key performance indicators), and advanced potential technologies proposed with operation principles. Besides, this paper reviewed multiple access and modulation techniques, concentrating on Filter-Bank Multicarrier (FBMC) as a potential technology for 6G. This paper ends by discussing potential applications with challenges and lessons identified from prior studies to pave the path for future research
University of Windsor Graduate Calendar 2023 Spring
https://scholar.uwindsor.ca/universitywindsorgraduatecalendars/1027/thumbnail.jp
Data ethics : building trust : how digital technologies can serve humanity
Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century:
For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car,
from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad,
for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world?
How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations
in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication.
The authors and institutions come from all continents.
The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust!
The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors
Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace
University of Windsor Graduate Calendar 2023 Winter
https://scholar.uwindsor.ca/universitywindsorgraduatecalendars/1026/thumbnail.jp
2023-2024 Lindenwood University Undergraduate Course Catalog
Lindenwood University Undergraduate Course Catalog.https://digitalcommons.lindenwood.edu/catalogs/1209/thumbnail.jp
Network selection based on chi-square distance and reputation for internet of things
The internet of things (IoT) has become one of the most important technologies of the 21st century. The IoT environment is composed of heterogeneous IoT communication networks. These technologies are complementary and need to be integrated to meet the requirements of different types of IoT applications that require the mobility of the IoT device under different IoT communication networks. In this paper, the vertical handover decision method is considered to select the appropriate network among different IoT technologies. So, IoT devices, equipped with several radio technologies, can select the most suitable network based on several criteria like quality of service (QoS), cost, power, and security. In this work, a multi-attribute decision-making algorithm (MADM) based on techniques for order preference by similarity to an ideal solution (TOPSIS) that uses chi-square distance instead of Euclidean distance is proposed. The network reputation is added to reduce the average number of handoffs. The proposed algorithm was implemented to select the best technology depending on the requirements of the different IoT traffic classes. The obtained results showed that our proposition outperforms the traditional MADM algorithms
Mediation Model of Service Quality and Behavioural Intention to Use of Artificial Intelligence Security Technology in UAE
This study created and evaluated a mediation model which allows the role of essential artificial intelligence (AI) in mediating the connection between service quality and behavioural intent to use AI security features in the United Arab Emirates. The primary objective is to improve the standards for customer service in the UAE's artificial intelligence security industry. The data to developed the model was derived from 389 valid questionnaires form the questionnaire survey. The data was screened and cleaned before uploaded in Smart-PLS software to developing and assessing the model. Based on the assessment on the model, it was found that the most fundamental form of artificial intelligence exerts a mediating effect to some extent, on the connection that exists between service quality and behavioural intention in terms of the application of Al security technology. The coefficient and t-value point to a substantial indirect relationship between the quality of the service and the intention to use artificial intelligence. This relationship is shown to be indirect rather than direct. It is possible to draw the conclusion that improved service quality raises people's likelihood of intending to use AI security technologies. This is due to the fact that the contribution of such technologies to improved job performance, as well as the convenience with which such technologies can be utilised, raises people's awareness of the perceived value of such technologies
- …