期刊文献+
共找到281,200篇文章
< 1 2 250 >
每页显示 20 50 100
Distributed Air &Missile Defense with Spatial Grasp Technology 被引量:2
1
作者 Peter Simon Sapaty 《Intelligent Control and Automation》 2012年第2期117-131,共15页
A high-level technology is revealed that can effectively convert any distributed system into a globally programmable machine capable of operating without central resources and self-recovering from indiscriminate damag... A high-level technology is revealed that can effectively convert any distributed system into a globally programmable machine capable of operating without central resources and self-recovering from indiscriminate damages. Integral mission scenarios in Distributed Scenario Language (DSL) can be injected from any point, runtime covering & grasping the whole system or its parts, setting operational infrastructures, and orienting local and global behavior in the way needed. Many operational scenarios can be simultaneously injected into this spatial machine from different points, cooperating or competing over the shared distributed knowledge as overlapping fields of solutions. Distributed DSL interpreter organization and benefits of using this technology for integrated air and missile defense are discussed along with programming examples in this and other fields. 展开更多
关键词 distributed SYSTEMS SPATIAL GRASP Technology Integral Mission Scenarios distributed Scenario Language Parallel NETWORKED Interpretation Air and MISSILE Defense Directed Energy SYSTEMS Cooperative Robotics
下载PDF
Boundary Control Problem of Infinite Order Distributed Hyperbolic Systems Involving Time Lags 被引量:2
2
作者 Bahaa Gaber Mohamed 《Intelligent Control and Automation》 2012年第3期211-221,共11页
Various optimal boundary control problems for linear infinite order distributed hyperbolic systems involving constant time lags are considered. Constraints on controls are imposed. Necessary and sufficient optimality ... Various optimal boundary control problems for linear infinite order distributed hyperbolic systems involving constant time lags are considered. Constraints on controls are imposed. Necessary and sufficient optimality conditions for the Neumann problem with the quadratic performance functional are derived. 展开更多
关键词 BOUNDARY CONTROL (n × n) Hyperbolic Systems Time Lags distributed CONTROL Problems NEUMANN Conditions Existence and UNIQUENESS of Solutions Infinite Order Operator
下载PDF
Distributed Lagrange Multiplier/Fictitious Domain Finite Element Method for a Transient Stokes Interface Problem with Jump Coefficients 被引量:2
3
作者 Andrew Lundberg Pengtao Sun +1 位作者 Cheng Wang Chen-song Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第4期35-62,共28页
The distributed Lagrange multiplier/fictitious domain(DLM/FD)-mixed finite element method is developed and analyzed in this paper for a transient Stokes interface problem with jump coefficients.The semi-and fully disc... The distributed Lagrange multiplier/fictitious domain(DLM/FD)-mixed finite element method is developed and analyzed in this paper for a transient Stokes interface problem with jump coefficients.The semi-and fully discrete DLM/FD-mixed finite element scheme are developed for the first time for this problem with a moving interface,where the arbitrary Lagrangian-Eulerian(ALE)technique is employed to deal with the moving and immersed subdomain.Stability and optimal convergence properties are obtained for both schemes.Numerical experiments are carried out for different scenarios of jump coefficients,and all theoretical results are validated. 展开更多
关键词 TRANSIENT STOKES interface problem JUMP COEFFICIENTS distributed LAGRANGE multiplier fictitious domain method mixed finite element an optimal error estimate stability
下载PDF
Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners:A Recommendation System
4
作者 Ameni Ellouze Nesrine Kadri +1 位作者 Alaa Alaerjan Mohamed Ksantini 《Computers, Materials & Continua》 SCIE EI 2024年第4期351-372,共22页
Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t... Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women. 展开更多
关键词 Human physical activities smartphone sensors deep learning distributed monitoring recommendation system uncertainty HEALTHY CALORIES
下载PDF
Optimality of Distributed Control for <i>n ×n</i>Hyperbolic Systems with an Infinite Number of Variables
5
作者 Ahlam Hasan Qamlo 《Advances in Pure Mathematics》 2013年第6期598-608,共11页
In this paper, we study the existence of solutions for 2l order (n × n) cooperative systems governed by Dirichlet and Neumann problems involving hyperbolic operators with an infinite number of variables and with ... In this paper, we study the existence of solutions for 2l order (n × n) cooperative systems governed by Dirichlet and Neumann problems involving hyperbolic operators with an infinite number of variables and with variable coefficients. The necessary and sufficient conditions for optimality of the distributed control with constraints are obtained and the set of inequalities that defining the optimal control of these systems are also obtained. 展开更多
关键词 Hyperbolic Operators Cooperative Systems Spaces With AN Infinite Number of VARIABLES Existence and Uniqueness of Solutions distributed CONTROL Problems CONTROL Constraints Variable Coefficients
下载PDF
Providing Global Awareness in Distributed Dynamic Systems
6
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2023年第2期87-100,共14页
The paper investigates applicability of the developed high-level model and technology for solution of diverse problems in large distributed dynamic systems which can provide sufficient awareness of their structures,or... The paper investigates applicability of the developed high-level model and technology for solution of diverse problems in large distributed dynamic systems which can provide sufficient awareness of their structures,organization,and functionalities.After the review of meanings of awareness and existing approaches for its expression and support,the paper shows application of the Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)for very practical awareness solutions in large distributed dynamic systems,with obtaining any knowledge from any point inside or outside the system.The self-evolving,self-replicating,and self-recovering scenario code in SGL can effectively supervise distributed systems under any circumstances including rapidly changing number of their elements.Examples are provided in SGL for distributed networked systems showing how in any node any information about other nodes and links,including the whole system,can be obtained by using network requesting patterns based on recursive scenarios combining forward and backward network matching and coverage.The returned results may be automatically organized in networked patterns too.The presented exemplary solutions are parallel and fully distributed,without the need of using vulnerable centralized resources,also very compact.This can be explained by fundamentally different philosophy and ideology of SGT which is not based on traditional partitioned systems representation and multiple agent communications.On the contrary,SGT and its basic language supervise and control distributed systems by holistic self-spreading recursive code in wavelike,virus-like,and even“soul-like”mode. 展开更多
关键词 AWARENESS distributed awareness situational awareness real world awareness global awareness distributed systems Spatial Grasp Technology Spatial Grasp Language networked implementation self-evolving scenarios spatial pattern-matching higher-level knowledge
下载PDF
Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions 被引量:1
7
作者 Emmanuel N. Ekwonwune Bright U. Ezeoha 《International Journal of Communications, Network and System Sciences》 2019年第4期49-58,共10页
The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environmen... The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environment is presented. Thus, inability to upload sizeable files, slow transportation of files, weak security and lack of fault tolerance are the major problems in the existing system. Hence, the utmost need is to build a client-server network that runs on two or more server systems in order to implement scalability, such that when one server is down, the other(s) would still hold up the activities within the network. And to achieve this reliable network environment, LINUX network operating system is recommended among others as a preferred platform for the synchronization of the server systems, such that every user activity like sending of internal memos/mails, publication of academic articles, is replicated;thereby, achieving the proposed result. Hence, Scalable Distributed File Sharing System provides the robustness required to having a reliable intranet. 展开更多
关键词 distributed SYSTEM Architecture FILES Sharing distributed File SYSTEM Replication Reliability TRANSPARENCY Data Access Interfaces FAULT Detection FAULT Tolerance Cache Consistency SCALABILITY
下载PDF
International Standardization of Blockchain and Distributed Ledger Technology:Overlaps,Gaps and Challenges 被引量:1
8
作者 Xiangjuan Jia Jing Xu +3 位作者 Mengwei Han Qing Zhang Lu Zhang Xiaofeng Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1491-1523,共33页
As one of the most concerned digital technologies in recent years,blockchain and distributed ledger technology are an important driving force for a new round of technological development.It is currently in the process... As one of the most concerned digital technologies in recent years,blockchain and distributed ledger technology are an important driving force for a new round of technological development.It is currently in the process of accelerating its evolution and maturity,and has gradually integrated with other digital technologies.It has been applied in many industries,providing decentralized solutions for various industries,realizing innovative storage models,and building a new trust system.As blockchain technology is officially incorporated into China’s new information infrastructure category,the application fields of blockchain have expanded rapidly,gradually extending from the financial field and government affairs to other fields in the real economy.At the same time,with the continuous development of the globalized economy,blockchain technology will also have a profound impact on international technological and economic development.Therefore,for the healthy and orderly development and real implementation of the blockchain industry,standardize the application of blockchain,effectively break through the cognitive and technical barriers between different countries,industries and systems on a global scale,prevent application risks,the development of the global blockchain industry needs standardization basis,which is particularly important and urgent.A sound standard system is an important key to the successful development of technology,and formulating the right standard at the right time for technology development helps ensure the ease of use and interoperability of the technology.From the perspective of international standardization,this article first introduces the general situation of ISO,ITU-T,IEEE,W3C and other international standardization organizations,and sorts out the status quo of the blockchain standardization working groups of mainstream international standardization organizations.All blockchain-related standards under development have been analyzed for the characteristics of international blockchain technology standards and industry application standards.Through data analysis,the overlaps,differences and conflicts in the field of international blockchain standard formulation are sorted out,and suggestions for blockchain standardization work in the application and development of blockchain technology standardization by international organizations and industries are put forward.The plans and layouts of future international standards are summarized to help the development of the international standardization of blockchain. 展开更多
关键词 ISO ITU-T IEEE blockchain distributed ledger technology international standard standardization status OVERLAPS GAPS CHALLENGES
下载PDF
ADMM-based Distributed Algorithm for Economic Dispatch in Power Systems With Both Packet Drops and Communication Delays 被引量:5
9
作者 Qing Yang Gang Chen Ting Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期842-852,共11页
By virtue of alternating direction method of multipliers(ADMM), Newton-Raphson method, ratio consensus approach and running sum method, two distributed iterative strategies are presented in this paper to address the e... By virtue of alternating direction method of multipliers(ADMM), Newton-Raphson method, ratio consensus approach and running sum method, two distributed iterative strategies are presented in this paper to address the economic dispatch problem(EDP) in power systems. Different from most of the existing distributed ED approaches which neglect the effects of packet drops or/and time delays, this paper takes into account both packet drops and time delays which frequently occur in communication networks. Moreover, directed and possibly unbalanced graphs are considered in our algorithms, over which many distributed approaches fail to converge. Furthermore, the proposed schemes can address the EDP with local constraints of generators and nonquadratic convex cost functions, not just quadratic ones required in some existing ED approaches. Both theoretical analyses and simulation studies are provided to demonstrate the effectiveness of the proposed schemes. 展开更多
关键词 ALTERNATING direction method of multipliers(ADMM) average consensus directed graph(digraph) distributed algorithm economic DISPATCH packet DROPS time DELAYS
下载PDF
Impact of PV Distributed Generation on Loop Distribution Network
10
作者 Mohammad A. Alrumaih Abdullah M. Al-Shaalan 《Journal of Power and Energy Engineering》 2019年第8期27-42,共16页
The rapid spreading of the Photovoltaic (PV) Systems as Distributed Generation (DG) in medium and low voltage networks created many effects and changes on the existing power system networks. In this work, two methods ... The rapid spreading of the Photovoltaic (PV) Systems as Distributed Generation (DG) in medium and low voltage networks created many effects and changes on the existing power system networks. In this work, two methods have been used and applied to determine the optimal allocation and sizing of the PV to be installed as DGs (ranging from 250 kW up to 3 MW). The first one is to determine the location according to the maximal power losses reduction over the feeder. The second one is by using the Harmony Search Algorithm which is claimed to be a powerful technique for optimal allocation of PV systems. The results of the two techniques were compared and found to be nearly closed. Furthermore, investigation on the effects on the feeder in terms of voltage levels, power factor readings, and short circuit current levels has been done. All calculations and simulations are conducted by using the MATLAB Simulation Program. Some field calculations and observations have been expended in order to substantiate the research findings and validation. 展开更多
关键词 distributed Generation (DG) FEEDER Photovoltaic System (PV) Power Factor Ring Main Unit (RMU) Short Circuit Current Voltage INSTABILITY
下载PDF
Data complexity-based batch sanitization method against poison in distributed learning
11
作者 Silv Wang Kai Fan +2 位作者 Kuan Zhang Hui Li Yintang Yang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期416-428,共13页
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are ca... The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are called causative availability indiscriminate attacks.Facing the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations,we propose a new supervised batch detection method for poison,which can fleetly sanitize the training dataset before the local model training.We design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model,which will be used in an efficient batch hierarchical detection process.Our model stockpiles knowledge about poison,which can be expanded by retraining to adapt to new attacks.Being neither attack-specific nor scenario-specific,our method is applicable to FL/DML or other online or offline scenarios. 展开更多
关键词 distributed machine learning security Federated learning Data poisoning attacks Data sanitization Batch detection Data complexity
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
12
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
A Novel Defender-Attacker-Defender Model for Resilient Distributed Generator Planning with Network Reconfiguration and Demand Response
13
作者 Wenlu Ji Teng Tu Nan Ma 《Energy Engineering》 EI 2024年第5期1223-1243,共21页
To improve the resilience of a distribution system against extreme weather,a fuel-based distributed generator(DG)allocation model is proposed in this study.In this model,the DGs are placed at the planning stage.When a... To improve the resilience of a distribution system against extreme weather,a fuel-based distributed generator(DG)allocation model is proposed in this study.In this model,the DGs are placed at the planning stage.When an extreme event occurs,the controllable generators form temporary microgrids(MGs)to restore the load maximally.Simultaneously,a demand response program(DRP)mitigates the imbalance between the power supply and demand during extreme events.To cope with the fault uncertainty,a robust optimization(RO)method is applied to reduce the long-term investment and short-term operation costs.The optimization is formulated as a tri-level defenderattacker-defender(DAD)framework.At the first level,decision-makers work out the DG allocation scheme;at the second level,the attacker finds the optimal attack strategy with maximum damage;and at the third level,restoration measures,namely distribution network reconfiguration(DNR)and demand response are performed.The problem is solved by the nested column and constraint generation(NC&CG)method and the model is validated using an IEEE 33-node system.Case studies validate the effectiveness and superiority of the proposed model according to the enhanced resilience and reduced cost. 展开更多
关键词 Distribution system RESILIENCE defender-attacker-defender distributed generator demand response microgrids formation
下载PDF
Joint resource allocation scheme for target tracking in distributed MIMO radar systems 被引量:1
14
作者 ZHENG Na’e SUN Yang +1 位作者 SONG Xiyu CHEN Song 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第4期709-719,共11页
A joint resource allocation scheme concerned with the sensor subset,power and bandwidth for range-only target tracking in multiple-input multiple-output(MIMO)radar systems is proposed.By selecting an optimal subset of... A joint resource allocation scheme concerned with the sensor subset,power and bandwidth for range-only target tracking in multiple-input multiple-output(MIMO)radar systems is proposed.By selecting an optimal subset of sensors with the predetermined size and implementing the power allocation and bandwidth strategies among them,this algorithm can help achieving a better performance within the same resource constraints.Firstly,the Bayesian Cramer-Rao bound(BCRB)is derived from it.Secondly,a criterion for minimizing the BCRB at the target location among all targets tracking in a certain range is derived.Thirdly,the optimization problem involved with three variable vectors is formulated,which can be simplified by deriving the relationship between the optimal power allocation vector and the bandwidth allocation vector.Then,the simplified optimization problem is solved by the cyclic minimization algorithm incorporated with the sequential parametric convex approximation(SPCA)algorithm.Finally,the validity of the proposed method is demonstrated with simulation results. 展开更多
关键词 distributed MULTIPLE-INPUT multiple-output(MIMO)radar target tracking JOINT RESOURCE alloction sensor SUBSET selection(SSS) optimal power and bandwidth allocation(OPBA)
下载PDF
Monitoring Surface Deformation Using Distributed Scatterers InSAR 被引量:1
15
作者 LI Haocheng DONG Jie +1 位作者 WANG Yi’an LIAO Mingsheng 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期42-58,共17页
In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction ... In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction of distributed scatterers in Distributed Scatterers InSAR(DS-InSAR)has significantly expanded the application scenarios of InSAR geodetic measurement by increasing the number of measurement points.This study traces the history of DS-InSAR,presents the definition and characteristics of distributed scatterers,and focuses on exploring the relationships and distinctions among proposed algorithms in two crucial steps:statistically homogeneous pixel selection and phase optimization.Additionally,the latest research progress in this field is tracked and the possible development direction in the future is discussed.Through simulation experiments and two real InSAR case studies,the proposed algorithms are compared and verified,and the advantages of DS-InSAR in deformation measurement practice are demonstrated.This work not only offers insights into current trends and focal points for theoretical research on DS-InSAR but also provides practical cases and guidance for applied research. 展开更多
关键词 INSAR permanent scatterers distributed scatterers statistically homogeneous pixel selection phase optimization
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
16
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Autonomous Vehicle Platoons In Urban Road Networks:A Joint Distributed Reinforcement Learning and Model Predictive Control Approach
17
作者 Luigi D’Alfonso Francesco Giannini +3 位作者 Giuseppe Franzè Giuseppe Fedele Francesco Pupo Giancarlo Fortino 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期141-156,共16页
In this paper, platoons of autonomous vehicles operating in urban road networks are considered. From a methodological point of view, the problem of interest consists of formally characterizing vehicle state trajectory... In this paper, platoons of autonomous vehicles operating in urban road networks are considered. From a methodological point of view, the problem of interest consists of formally characterizing vehicle state trajectory tubes by means of routing decisions complying with traffic congestion criteria. To this end, a novel distributed control architecture is conceived by taking advantage of two methodologies: deep reinforcement learning and model predictive control. On one hand, the routing decisions are obtained by using a distributed reinforcement learning algorithm that exploits available traffic data at each road junction. On the other hand, a bank of model predictive controllers is in charge of computing the more adequate control action for each involved vehicle. Such tasks are here combined into a single framework:the deep reinforcement learning output(action) is translated into a set-point to be tracked by the model predictive controller;conversely, the current vehicle position, resulting from the application of the control move, is exploited by the deep reinforcement learning unit for improving its reliability. The main novelty of the proposed solution lies in its hybrid nature: on one hand it fully exploits deep reinforcement learning capabilities for decisionmaking purposes;on the other hand, time-varying hard constraints are always satisfied during the dynamical platoon evolution imposed by the computed routing decisions. To efficiently evaluate the performance of the proposed control architecture, a co-design procedure, involving the SUMO and MATLAB platforms, is implemented so that complex operating environments can be used, and the information coming from road maps(links,junctions, obstacles, semaphores, etc.) and vehicle state trajectories can be shared and exchanged. Finally by considering as operating scenario a real entire city block and a platoon of eleven vehicles described by double-integrator models, several simulations have been performed with the aim to put in light the main f eatures of the proposed approach. Moreover, it is important to underline that in different operating scenarios the proposed reinforcement learning scheme is capable of significantly reducing traffic congestion phenomena when compared with well-reputed competitors. 展开更多
关键词 distributed model predictive control distributed reinforcement learning routing decisions urban road networks
下载PDF
Distributed Multicircular Circumnavigation Control for UAVs with Desired Angular Spacing
18
作者 Shixiong Li Xingling Shao +1 位作者 Wendong Zhang Qingzhen Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期429-446,共18页
This paper addresses a multicircular circumnavigation control for UAVs with desired angular spacing around a nonstationary target.By defining a coordinated error relative to neighboring angular spacing,under the premi... This paper addresses a multicircular circumnavigation control for UAVs with desired angular spacing around a nonstationary target.By defining a coordinated error relative to neighboring angular spacing,under the premise that target information is perfectly accessible by all nodes,a centralized circular enclosing control strategy is derived for multiple UAVs connected by an undirected graph to allow for formation behaviors concerning the moving target.Besides,to avoid the requirement of target’s states being accessible for each UAV,fixed-time distributed observers are introduced to acquire the state estimates in a fixed-time sense,and the upper boundary of settling time can be determined offline irrespective of initial properties,greatly releasing the burdensome communication traffic.Then,with the aid of fixed-time distributed observers,a distributed circular circumnavigation controller is derived to force all UAVs to collaboratively evolve along the preset circles while keeping a desired angular spacing.It is inferred from Lyapunov stability that all errors are demonstrated to be convergent.Simulations are offered to verify the utility of proposed protocol. 展开更多
关键词 Angular spacing distributed observer Multicircular circumnavigation Moving target UAVS
下载PDF
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
19
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
GRU-integrated constrained soft actor-critic learning enabled fully distributed scheduling strategy for residential virtual power plant
20
作者 Xiaoyun Deng Yongdong Chen +2 位作者 Dongchuan Fan Youbo Liu Chao Ma 《Global Energy Interconnection》 EI CSCD 2024年第2期117-129,共13页
In this study,a novel residential virtual power plant(RVPP)scheduling method that leverages a gate recurrent unit(GRU)-integrated deep reinforcement learning(DRL)algorithm is proposed.In the proposed scheme,the GRU-in... In this study,a novel residential virtual power plant(RVPP)scheduling method that leverages a gate recurrent unit(GRU)-integrated deep reinforcement learning(DRL)algorithm is proposed.In the proposed scheme,the GRU-integrated DRL algorithm guides the RVPP to participate effectively in both the day-ahead and real-time markets,lowering the electricity purchase costs and consumption risks for end-users.The Lagrangian relaxation technique is introduced to transform the constrained Markov decision process(CMDP)into an unconstrained optimization problem,which guarantees that the constraints are strictly satisfied without determining the penalty coefficients.Furthermore,to enhance the scalability of the constrained soft actor-critic(CSAC)-based RVPP scheduling approach,a fully distributed scheduling architecture was designed to enable plug-and-play in the residential distributed energy resources(RDER).Case studies performed on the constructed RVPP scenario validated the performance of the proposed methodology in enhancing the responsiveness of the RDER to power tariffs,balancing the supply and demand of the power grid,and ensuring customer comfort. 展开更多
关键词 Residential virtual power plant Residential distributed energy resource Constrained soft actor-critic Fully distributed scheduling strategy
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部