We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogeno...
详细信息
ISBN:
(纸本)9783031785993;9783031786006
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogenous prices. Three settings of the mechanism are considered: (i) benchmark involving no taxation, (ii) optimum tariff, (iii) optimum sanction. The expected utility maximization formulation of the game is extended further by relying on cumulative prospect theory to account for the bounded rationality of the stakeholders. We derive closed-form mappings linking the outcomes of the three settings. Additionally, we assess the impact of bounded rationality through a new performance metric, the Price of Irrationality. Numerical results are derived on a randomized instance of a gas trading game between Europe, Asia, and Russia.
The rise of smart cities, driverless automobiles, smart watches, and mobile banking has led to increased reliance on the Internet. Although technology has enormous advantages for people and society, it also introduces...
详细信息
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to int...
详细信息
ISBN:
(纸本)9798331541613;9798331541606
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to introduce a Cascade-Forward Neural network (CFNN) control approach designed to lead inverter-based grids when operating in grid-connected or islanded modes, focusing on improving the transient state performance of the CFNN technique. The suggested approach involves utilizing the inverter in a bidirectional manner, suitable for a diverse array of battery energy storage systems and distributed generation setups. The proposed strategy leverages CFNN to grasp the inverter's non-linear model, enabling precise monitoring of demand and reference power across various operational scenarios within smart grid applications. Furthermore, the approach redefines the grid control concept, guiding the inverter according to optimal parameters that encompass power demand, reference power, equipment dimensions, and external disturbances. Notably, this method circumvents the need for any manual tuning procedures. Furthermore, incorporating dynamic elements into the approach improves the protection system's responsiveness. This ensures continuous power supply during faults, enabling a more effective and rapid response, enhancing system resilience, and reducing downtime. This dual advantage of better power supply and heightened protection system sensitivity highlights the proposed method's significance in fortifying the reliability of power systems.. To assess the efficacy of the suggested CFNN controller, its power tracking, operational capabilities, and dynamic response are assessed via multiple experimental trials employing the hardware-in-the-loop (HIL) approach across various scenarios. The outcomes of these tests are meticulously compared to a well-established conventional strategy, affirming the effectiveness of the proposed method.
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navig...
详细信息
ISBN:
(纸本)9798350311259
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach networks, often, over multiple network hosts and evades detection. It also uses "low-and-slow" approach over a long period of time. Resource availability, integrity, and confidentiality of the operational cyber-physical systems (CPS) state and control is highly impacted by the safety and security measures in place. A framework multi-stage detection approach termed "APT(DASAC)" to detect different tactics, techniques, and procedures (TTPs) used during various APT steps is proposed. Implementation was carried out in three stages: (i) Data input and probing layer - this involves data gathering and pre-processing, (ii) Data analysis layer;applies the core process of "APT(DASAC)" to learn the behaviour of attack steps from the sequence data, correlate and link the related output and, (iii) Decision layer;the ensemble probability approach is utilized to integrate the output and make attack prediction. The framework was validated with three different datasets and three case studies. The proposed approach achieved a significant attacks detection capability of 86.36% with loss as 0.32%, demonstrating that attack detection techniques applied that performed well in one domain may not yield the same good result in another domain. This suggests that robustness and resilience of operational systems state to withstand attack and maintain system performance are regulated by the safety and security measures in place, which is specific to the system in question.
In this paper, we discuss the problem of learning state observers for Recurrent Neural network (RNN) black-box models of dynamical systems. State observers are indeed key to designing state-feedback control laws, such...
详细信息
With the widespread application of deep learning frameworks, large-scale computing and GPU programming are receiving increased attention. For upper-layer applications that utilize GPUs for computational communication,...
详细信息
The integration of intrusion detection systems (IDS) is crucial for strengthening network security. Improving IDS performance requires advanced techniques for handling intrusion detection data, with machine learning p...
详细信息
Congestion is a major issue in networks, as it decreases efficiency and wastes bandwidth. While the basic operations of TCP remain the same, there are different flavors of TCP developed for specific network environmen...
详细信息
Until recently, researchers used machine learning methods to compensate for hardware imperfections at the symbol level, indicating that optimum radio-frequency transceiver performance is possible. Nevertheless, such a...
详细信息
ISBN:
(纸本)9798350339109
Until recently, researchers used machine learning methods to compensate for hardware imperfections at the symbol level, indicating that optimum radio-frequency transceiver performance is possible. Nevertheless, such approaches neglect the error correcting codes used in wireless networks, which inspires machine learning (ML)-approaches that learn and minimise hardware imperfections at the bit level. In the present work, we evaluate a graph neural network (GNN)-based intelligent detector's in-phase and quadrature imbalance (IQI) mitigation capabilities. We focus on a high-frequency, high-directional wireless system where IQI affects both the transmitter (TX) and the receiver (RX). The TX uses a GNN-based decoder, whilst the RX uses a linear error correcting algorithm. The bit error rate (BER) is computed using appropriate Monte Carlo simulations to quantify performance. Finally, the outcomes are compared to both traditional systems using conventional detectors and wireless systems using belief propagation based detectors. Due to the utilization of graph neural networks, the proposed algorithm is highly scalable with few training parameters and is able to adapt to various code parameters.
The construction of network security control and protection system of internal and external communication terminals under the heterogeneous network environment can promote the research and development of power network...
详细信息
暂无评论