We consider the matching problem on the line with advice complexity. We give a 1-competitive online algorithm with advice complexity n − 1, and show that there is no 1-competitive online algorithm reading less than n ...
详细信息
In this paper we give a single-source shortest-path algorithm that breaks, after over 65 years, the O(n · m) bound for the running time of the Bellman-Ford-Moore algorithm, where n is the number of vertices and m...
详细信息
We present a low-energy deterministic distributed algorithm that computes exact Single-Source Shortest Paths (SSSP) in near-optimal time: it runs in Õ(n) rounds and each node is awake during only poly(log n) roun...
详细信息
The greedy algorithm based route planning problem is a method of finding the optimal or near optimal route between a given starting and ending point. This article first uses PCA method to reduce the dimensionality of ...
详细信息
Recently, parallel reinforcement learning (PRL) based Industrial Internet of Things (IIoT) edge-cloud resource scheduling has elicited escalating attention. However, with the scale of IIoT expands, there are several c...
详细信息
ISBN:
(纸本)9781665423915
Recently, parallel reinforcement learning (PRL) based Industrial Internet of Things (IIoT) edge-cloud resource scheduling has elicited escalating attention. However, with the scale of IIoT expands, there are several challenges in the existing researches: 1) large number of parallel servers slows down the convergence rate of PRL; 2) malicious parallel server affects resource allocation efficiency. In order to solve the above efficiency and security problem, blockchain-based approaches are introduced in PRL based resource allocation problem. However, traditional consensus algorithm in blockchain is not suitable for resource allocation and is inefficient. Thus, in this article, based on a novel fuzzy delegated proof of state and practical byzantine fault tolerance (fuzzy DPoSt+PBFT) consensus algorithm, we propose a blockchain-enabled collaborative parallel Q-learning (CPQL) approach to address the above challenges. To be specific, we first construct an edge-cloud collaborative architecture for executing the diversity intelligence IIoT applications. Then, we propose a CPQL algorithm for edge-cloud resource allocation and choosing the optimal number of parallel edge servers to speed up the Q-table training. In the Q-table aggregation process in CPQL, a fuzzy DPoSt+PBFT algorithm is designed for secure CPQL training and efficient consensus. Experimental results show the superior performance of the proposed approach. And the proposed approach has great potential in IIoT resource allocation problem.
Now a days, blockchain based IOT networks are gaining popularity for the unlimited space and robust security mechanism. Blockchain is the best solution for the IoT devices to store the huge amount of data generated by...
详细信息
ISBN:
(数字)9798350384598
ISBN:
(纸本)9798350384604
Now a days, blockchain based IOT networks are gaining popularity for the unlimited space and robust security mechanism. Blockchain is the best solution for the IoT devices to store the huge amount of data generated by them with utmost privacy and security using distributed ledger. However, the resource constrained IoT devices having low computing power are unable to meet the huge computing requirements of data mining in blockchain networks. This paper has proposed a robust Physically Unclonable Function (PUF)-based authentication system to replace the popular consensus algorithms by a lightweight hardware-based authentication mechanism without compromising the security and privacy. The proposed ring oscillator based PUF modules fortify users' credentials and withstand various types of attacks in decentralized and tamper-resistant blockchain based IOT network with significant reduction in latency and power consumption. Attack analysis is done to compare the vulnerabilities of both the proposed and conventional systems to prominent blockchain attacks. The results of attack analysis demonstrate that the proposed system outperforms the conventional PoW system.
Blackouts are disastrous events with a low probability of occurrence but a high impact on the system and its users. With the help of more distributed and controllable generation and sector-coupled flexibility, microgr...
详细信息
ISBN:
(纸本)9798400704802
Blackouts are disastrous events with a low probability of occurrence but a high impact on the system and its users. With the help of more distributed and controllable generation and sector-coupled flexibility, microgrids could be prepared to operate in islanded mode during a blackout. This paper discusses a two-step blackout mitigation approach for highly renewable microgrids that utilizes user flexibility and energy storage systems for power balance in islanded grid operation. The proposed method includes a proactive flexibility reservation step, which derives a minimal reservation schedule for microgrid resources under uncertainty considering related operational costs. As a second step, during a blackout, a fully distributed control is implemented to maximize the usage of available resources based on a sequence of max and min-consensus rounds. This paper focuses on the second step, for which the effectiveness of blackstart and long-term coordination is shown. Load shedding can be reduced by 40% compared to the forecast value. A hardware-in-the-loop simulation of a grid-forming converter further showed a fast convergence toward the optimal operation point.
This paper studies the behavior of the extragradient algorithm [Korpelevich, 1976] when applied to hypomonotone operators, a class of problems that extends beyond the classical monotone setting. To support the underst...
详细信息
Distributed control systems are part of the often invisible backbone of modern society that provides utility services like water and electricity. Their uninterrupted operation is vital, and unplanned stops due to fail...
详细信息
ISBN:
(数字)9798350340266
ISBN:
(纸本)9798350340273
Distributed control systems are part of the often invisible backbone of modern society that provides utility services like water and electricity. Their uninterrupted operation is vital, and unplanned stops due to failure can be expensive. Critical devices, like controllers, are often duplicated to minimize the service stop probability, with a secondary controller acting as a backup to the primary. A seamless takeover requires that the backup has the primary's latest state, i.e., the primary has to replicate its state to the backup. While this method ensures high availability, it can be costly due to hardware doubling. This work proposes a state replication solution that doesn't require the backup to store the primary state, separating state storage from the backup function. Our replication approach allows for more flexible controller redundancy deployments since one controller can be a backup for multiple primaries without being saturated by state replication data. Our main contribution is the partible state replication approach, realized with a distributed architecture utilizing a consensus algorithm. A partial connectivity-tolerant consensus algorithm is also an additional contribution.
This paper introduces a distributed parallel Alternating Direction Method of Multipliers (ADMM) algorithm for solving the distributed constrained optimization problem over directed graphs. To effectively handle the ef...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This paper introduces a distributed parallel Alternating Direction Method of Multipliers (ADMM) algorithm for solving the distributed constrained optimization problem over directed graphs. To effectively handle the effect of asymmetric information communication on the convergence of the optimization algorithm, a surplus-based averaging consensus algorithm is integrated into the ADMM-based optimization algorithm. Unlike existing distributed ADMM algorithms over directed graphs that focus on the case with solely local constraints, the proposed algorithm can deal with both local constraints and coupling constraints. Under the assumption that the objective function is convex and the underlying graph is strongly connected, the convergence of the surplus-based ADMM to an optimal solution of the distributed constrained problem is proved. Finally, numerical simulations are conducted to validate the effectiveness of the proposed algorithm.
暂无评论