Accurate positioning is crucial in fields such as indoor positioning, autonomous driving, and robot navigation. However, traditional base station positioning algorithms are often affected by factors such as sensor err...
详细信息
Wireless Sensor Networks (WSN) have been implemented in a variety of applications ranging from environmental monitoring and control of industrial processes to healthcare and emergency response. In many cases, routing ...
详细信息
the goal of this study is to analyze the role of artificial intelligence (AI) in cybersecurity by analyzing the strengths of many key AI techniques, including machine learning (ML), deep learning (DL), natural languag...
详细信息
the combination of LiDAR point clouds and deep learning is transforming autonomous systems. the balance between LiDAR technology and DL methods for accurate point cloud categorization is the topic of this work. Our ob...
详细信息
Ensuring the safety and quality of fish products is essential for public health, especially in countries like Indonesia, where tuna is a popular fishery product. Tuna freshness is a critical indicator of seafood safet...
详细信息
the problem of vehicle hijacking is increasingly prevalent in many parts of the world, including South Africa, causing travelers to live in constant fear of becoming victims. To address this, this work employs the usa...
详细信息
this survey paper provides an overview of the current state-of-the-art techniques for diabetes diagnosis and prediction using machine learning (ML) methods. Various techniques, including both basic classifiers and dee...
详细信息
the concept of optimization has gained widespread recognition in numerous industries worldwide. To maximize resources like time, money, distance, options, and searches, people and organizations are actively looking fo...
详细信息
the concept of optimization has gained widespread recognition in numerous industries worldwide. To maximize resources like time, money, distance, options, and searches, people and organizations are actively looking for the best answers to particular problems. the traditional methods of tackling optimization problems are no longer considered adequate since they frequently produce suboptimal results or take too long. Using heuristic and meta-heuristic methods is now necessary to solve optimization problems. To avoid becoming trapped in locally optimal solutions, meta-heuristic approaches are made to thoroughly investigate and utilize the entire search space. Meta-heuristic algorithms are remarkably adept at solving optimization issues;they take their cues from the behavior of real organisms such as fish, birds, insects, and bees. In almost every modern field, optimization is a crucial factor to take into account while attempting to resolve real-world issues. An in-depth analysis of bio-inspired optimization methods and their real-world applications for a variety of optimization problems is presented in this paper.
In the rapid development of industrial networks, in the face of complex and changeable network environments, the demand for reliable and efficient communication systems is becoming increasingly prominent. In this pape...
详细信息
Using distributed algorithms, multiple computing agents can coordinate their operations by jointly solving optimal power flow problems. However, cyberattacks on the data communicated among agents may maliciously alter...
详细信息
ISBN:
(纸本)9780998133171
Using distributed algorithms, multiple computing agents can coordinate their operations by jointly solving optimal power flow problems. However, cyberattacks on the data communicated among agents may maliciously alter the behavior of a distributed algorithm. To improve cybersecurity, this paper proposes a machine learning method for detecting and mitigating data integrity attacks on distributed algorithms for solving optimal power flow problems. In an offline stage with trustworthy data, agents train and share machine learning models of their local subproblems. During online execution, each agent uses the trained models from neighboring agents to detect cyberattacks using a reputation system and then mitigate their impacts. Numerical results show that this method reliably, accurately, and quickly detects data integrity attacks and effectively mitigates their impacts to achieve near-feasible and near-optimal operating points.
暂无评论