This study presents a novel approach to enhance the performance of TCPSO by integrating Gaussian process regression into the solution search process. By leveraging Gaussian process regression to estimate the underlyin...
详细信息
In a cloud-edge system, data analysis, processing, and storage can be performed in edge servers, avoiding transferring data to more distant cloud servers. This greatly improves the efficiency of data processing, saves...
详细信息
As technologies advance, multi-agent systems have been used in various domains. In a multi-agent formation path planning system, a number of aspects including formation maintenance, collision avoidance, control consum...
详细信息
With the integration of advanced communication and sensor technologies, traditional power grids are shifting to automated smart grids, while exacerbating the risk of cyber-attacks. This paper proposes a spatio-tempora...
详细信息
Opinion dynamics studies the principles governing the evolution of collective opinion, offering valuable insights into the comprehension of social phenomena and forecasting group behavior. However, existing opinion dy...
详细信息
The metaverse integrates digital and physical realities into a parallel virtual environment, which has become a key direction for the future of the digital world. With the development of this paradigm, the need for hu...
详细信息
ISBN:
(纸本)9798350395525;9798350395518
The metaverse integrates digital and physical realities into a parallel virtual environment, which has become a key direction for the future of the digital world. With the development of this paradigm, the need for human-computer interaction (HCI) systems within the metaverse has become increasingly important, but the complexity and uniqueness of the interactions also pose a series of challenges. To better understand and solve problems in metaverse HCI systems, this paper proposes an approach based on a combination of problem framing (PF) and model-drive (MDE). The approach describes the entities of the metaverse HCI system and the special interactions between the two worlds by extending the meta-model of the PF. This paper also discusses the application scenarios of this extended model, demonstrating the feasibility of our approach through a case study.
This paper investigates the containment control problem of heterogeneous linear multi-agent systems with nonuniform bounded distributed communication delays under an assumption that only the neighboring agents of mult...
Federated learning (FL) trains a model collaboratively but is susceptible to backdoor attacks for its privacy-preserving nature. Existing defenses against backdoor attacks in FL always make specific assumptions on dat...
详细信息
This paper focuses on enhancing the efficiency of MPPT based on an optimal Tip Speed Ratio (TSR) technique for wind turbines by employing a robust Super-twisting third order sliding mode control. A comparative analysi...
详细信息
One of the main concerns about implementing Networked Automation systems is ensuring its security against cyber-attacks. In this paper, we consider that the Networked Automation system is abstracted as a Discrete-Even...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
One of the main concerns about implementing Networked Automation systems is ensuring its security against cyber-attacks. In this paper, we consider that the Networked Automation system is abstracted as a Discrete-Event system, and we consider cyber-attacks where a malicious agent eavesdrops on a communication channel with the objective of gathering information about the system's behavior. To protect the information transmitted in the attacked channel, we propose a cryptographic system that uses Mealy automata to represent the encryption and decryption functions. One of the main advantages of representing cryptographic systems using automata is that they can be easily implemented on Programmable Logic Controllers, yielding to fast encryption and decryption of the transmitted message.
暂无评论