In this paper we consider the distributed resource allocation problem, where the individual cost of each agent attempts to minimize when both the total resource and the capacity of local agents are limit. This problem...
详细信息
ISBN:
(纸本)9781728112985
In this paper we consider the distributed resource allocation problem, where the individual cost of each agent attempts to minimize when both the total resource and the capacity of local agents are limit. This problem is encountered in many practical applications such as demand response, cloud computingsystems.and economic dispatch of power systems. This kind of problem can be expressed as an optimization problem under constraints. Our goal is to obtain the optimal resource allocation under limited conditions and the global objective function is a sum of all local agents individual cost function. By combining with the distributed primal-dual method, we design a distributed optimization algorithm with a constant step-size. When the cost function of each agent is convex and smooth, we prove that our method can converge to the optimal solution. Finally, we apply the algorithm to the problem of the economic dispatch in power systems.and get the optimal resource allocation, which verifies the effectiveness of the algorithm.
The proceedings contain 27 papers. The special focus in this conference is on Computational Intelligence, Security and Internet of Things. The topics include: computing Exact Solutions of Evolutionary Rescue Equations...
ISBN:
(纸本)9783030667627
The proceedings contain 27 papers. The special focus in this conference is on Computational Intelligence, Security and Internet of Things. The topics include: computing Exact Solutions of Evolutionary Rescue Equations of Spatial Population Dynamics;variants of Generative Adversarial Networks for Credit Card Fraud Detection;a Compact Network Intrusion Classifier Using Fuzzy Logic;Tamper Detection and Correction of ELF Binaries by Remote Parties via Merkle Trees;device Independent Key Generation Using Decoy State;a Novel Cryptographic Approach to Implement Confidentiality Using Point Reflection Property;security and Anonymity Aspects in Tails and Windows 10 Operating systems.exploiting Aspect-Classified Sentiments for Cyber-Crime Analysis and Hack Prediction;application of IoT and Weather Prediction for Enhancement of Agricultural Productivity;intangible Learning Experience Using Leap Motion Controller for Distance Mapping;enhancing Data Privacy in the Internet of Things (IoT) Using Edge computing;Priority Based GTS Allocation in Zigbee Wireless Sensor Network;MITM Intrusion Analysis for Advanced Metering Infrastructure Communication in a Smart Grid Environment;smart Border Security System Using Internet of Things;cluster Based Redundancy Elimination Algorithm for Data Aggregation Scheduling Scheme in Wireless Sensor Networks;integrated Internet of Things and Analysis Framework for Industrial Applications Using a Multi Tiered Analysis Architecture;ioT Sensor Network Based Implementation for Rainfall Induced Landslide Monitoring;multi Agent Based Resource Provisioning in Fog computing;a Novel Salp Swarm Algorithm for Controller Placement Problem;earthquake Magnitude Prediction Using Machine Learning Technique;real-Time Vision-Based Vehicle-to-Vehicle Distance Estimation on Two-Lane Single Carriageway Using a Low-Cost 2D Camera at Night;analysing Social Media Responses in Natural Disaster.
The paper presents a comparative analysis of different symmetric keying cryptographic algorithms. The algorithms under study are AES, ARC2, Blowfish, CAST and DES3, and the performance metrics for the basis of the stu...
详细信息
ISBN:
(纸本)9781538678084
The paper presents a comparative analysis of different symmetric keying cryptographic algorithms. The algorithms under study are AES, ARC2, Blowfish, CAST and DES3, and the performance metrics for the basis of the study are Encryption time, Decryption time, Throughput, Plain text size vs Cipher text size. The study is conducted for a standalone system, where the algorithms are executed on a quad core i5 processor running Windows 10 and, Python is used as the programming language.
This paper presents an approach to providing service composition to cyber-physical system (CPS) for industrial fault detection and vibration detection in particular. While vibration fault detection has been increasing...
详细信息
The drive towards automating solutions to societal challenges has seen an increase in the use of emerging technologies such as Internet of Things (IoT). Subsequently a lot of research exists that focuses on designing ...
详细信息
The proceedings contain 43 papers. The special focus in this conference is on Dynamic Data Driven Application systems. The topics include: A DDDAS Protocol for Real-Time Large-Scale UAS Flight Coordination;data-Driven...
ISBN:
(纸本)9783030617240
The proceedings contain 43 papers. The special focus in this conference is on Dynamic Data Driven Application systems. The topics include: A DDDAS Protocol for Real-Time Large-Scale UAS Flight Coordination;data-Driven State Awareness for Fly-by-Feel Aerial Vehicles via Adaptive Time Series and Gaussian Process Regression Models;preface;predictive Digital Twins: Where Dynamic Data-Driven Learning Meets Physics-Based Modeling;Integrated Planning, Decision-Making, and Weather Modeling for UAS Navigating Complex Weather;Microgrid Operational Planning Using Deviation Clustering Within a DDDAS Framework;dynamic Data-Driven Self-healing Application for Phasor Measurement Unit Networks;interpretable Deep Attention Model for Multivariate Time Series Prediction in Building Energy systems.overcoming Stealthy Adversarial Attacks on Power Grid Load Predictions Through Dynamic Data Repair;Uncertainty Analysis of Self-healed Composites with Machine Learning as Part of DDDAS;active Search Methods to Predict Material Failure Under Intermittent Loading in the Serebrinksy-Ortiz Fatigue Model;dynamic Data-Driven Distribution Tracking of Nanoparticle Morphology;machine Learning Algorithms for Improved Thermospheric Density Modeling;Dynamic Transfer Learning from Physics-Based Simulated SAR Imagery for Automatic Target Recognition;Dynamic Data-Driven Application systems.for NASA’s Science Mission Directorate;uncertainty Estimation for Semantic Segmentation of Hyperspectral Imagery;Spectral Super Resolution with DCT Decomposition and Deep Residual Learning;active Scene Classification via Dynamically Learning Prototypical Views;informative Ensemble Kalman Learning for Neural Structure;reachability Analysis Based Tracking: Applications to Non-cooperative Space Object Tracking;sparse Regression and Adaptive Feature Generation for the Discovery of Dynamical systems.improving Prediction Confidence in Learning-Enabled Autonomous systems.towards Provably Correct Probabilistic Flight systems.data
Nowadays the aim of different processes monitoring is to obtain various process parameters. Monitoring systems.include different types of sensors. Video surveillance systems.are widely used for monitoring and real-tim...
详细信息
The proceedings contain 59 papers. The special focus in this conference is on Communication, Devices and Networking. The topics include: Gender differences in patients’ assessment of positive outcomes of online direc...
ISBN:
(纸本)9789811549311
The proceedings contain 59 papers. The special focus in this conference is on Communication, Devices and Networking. The topics include: Gender differences in patients’ assessment of positive outcomes of online direct-to-consumer promotion;a wearable antenna using jeans substrate operating in dual-frequency band;ingan/gan multiple quantum wells solar cell as an efficient power source for space mission;feature extraction of hill rain on the basis of reflectivity-rain rate relationship;an empirical note on positive aspects of online direct to consumer promotion of pharmaceutical products;modelling orographic rainfall using regression based method—a case study;electric vehicles in the indian scenario;self-medication and direct-to-consumer promotion of drugs;performance index modeling for urban water system using hierarchical fuzzy inference approach;heterogeneous networks in lte-advanced: A review;design and simulation of an efficient fpga based epileptic seizure detection system;design of a novel reconfigurable microstrip bandpass filter with electronic switching;guided filter based colour image rain streaks removal using L0 Gradient Minimization Method;image contrast enhancement using histogram equalization-based grey wolf optimizer (gwo);analysis of split gate dielectric and charge modulated son fet as biosensor;algorithmic improvisation of music rhythm;multipath mitigation techniques for range error reduction in pn ranging systems.raspberry pi based smart and automated irrigation system;a rectangular annular slotted frequency reconfigurable patch antenna;fractional order control of unstable and time-delayed linear time-invariant (lti) plants;a novel ultra-wideband cmos low-noise amplifier for wireless communication;applications and approaches for texture analysis and their modern evolution;discrete decoupling and control of time-delayed mimo systems.
The proceedings contain 28 papers. The special focus in this conference is on Material Engineering and Manufacturing. The topics include: Research on microstructure and hardness of laser cladding using the mixed powde...
ISBN:
(纸本)9783035715187
The proceedings contain 28 papers. The special focus in this conference is on Material Engineering and Manufacturing. The topics include: Research on microstructure and hardness of laser cladding using the mixed powder of nano-tic and ni-based alloy;acoustic metamaterial design method based on green coordinate transformation;fabrication on a recycled and wide-band absorber by 3d printing;monitoring cnt-based composite laminates under monotonic and cyclic flexural loading;effects of material emissivity on the radiative characteristics of solid surface;cooling rate and microstructural investigation of rapidly solidified spherical mono-sized copper particles;skin coating design of stealth aircraft based on infrared characteristic analysis;anti-cavitation approach in a bio-inspired throttle valve: A study of using rubber-like materials;a simplified approach to the failure probability assessment of thermally stable diamond composite rock cutting tips;study on the dispersion of aramid pulp in epoxy resin system;relationship between crystallization behavior and mechanical performance of f-iii fibers under different tensions in supercritical carbon dioxide;study on the crystallization behavior of pan fibers during hot-drawing process in supercritical carbon dioxide fluid with different strain;detection of graphene materials in fibers;characteristic enhancement of ingan-based light emitting diodes grown on pattern sapphire substrates;low energy-consumption inverted orange organic light-emitting diodes with reduced efficiency roll-off;high-performance red phosphorescent organic light-emitting diodes based on a gradient-doped emitting layer;enhanced optical absorption of dual-diameter structured silicon nanoholes array;the potential of graphene in electronic applications;investigation of cutting performance for nak80 hardened steel under different assisted machining systems.
The future power system can be considered as an aggregation of controllable distributedsystems.devices that coordinate with each other through the Internet of Things (IoT), energy internet (EI) new paradigms arise. I...
详细信息
The future power system can be considered as an aggregation of controllable distributedsystems.devices that coordinate with each other through the Internet of Things (IoT), energy internet (EI) new paradigms arise. In EI environments, agreement among multiple computers is essential for power generation, transmission, distribution, and consumption etc. applications. Coordinated control and security protection play important roles in the application of a distributedcomputing environment. A consensus approach can provide fault tolerance and prevent system errors and attacks, thereby providing the system with strong security in distributedcomputing environment. In this paper, a distributed Kalman filter with consensus coordinated control algorithm for multiagent systems.(MAS) was proposed to investigate the energy internet with links failure by cyber attack. The proposed algorithm is evaluated in the energy internet through a MAS model using MATLAB software.
暂无评论