We consider the matching problem on the line with advice complexity. We give a 1-competitive online algorithm with advice complexity n − 1, and show that there is no 1-competitive online algorithm reading less than n ...
详细信息
We consider the problem of finding a basis of a matroid with weight exactly equal to a given target. Here weights can be discrete values from {−∆, . . ., ∆} or more generally m-dimensional vectors of such discrete val...
详细信息
We present a low-energy deterministic distributed algorithm that computes exact Single-Source Shortest Paths (SSSP) in near-optimal time: it runs in Õ(n) rounds and each node is awake during only poly(log n) roun...
详细信息
The greedy algorithm based route planning problem is a method of finding the optimal or near optimal route between a given starting and ending point. This article first uses PCA method to reduce the dimensionality of ...
详细信息
Blackouts are disastrous events with a low probability of occurrence but a high impact on the system and its users. With the help of more distributed and controllable generation and sector-coupled flexibility, microgr...
详细信息
ISBN:
(纸本)9798400704802
Blackouts are disastrous events with a low probability of occurrence but a high impact on the system and its users. With the help of more distributed and controllable generation and sector-coupled flexibility, microgrids could be prepared to operate in islanded mode during a blackout. This paper discusses a two-step blackout mitigation approach for highly renewable microgrids that utilizes user flexibility and energy storage systems for power balance in islanded grid operation. The proposed method includes a proactive flexibility reservation step, which derives a minimal reservation schedule for microgrid resources under uncertainty considering related operational costs. As a second step, during a blackout, a fully distributed control is implemented to maximize the usage of available resources based on a sequence of max and min-consensus rounds. This paper focuses on the second step, for which the effectiveness of blackstart and long-term coordination is shown. Load shedding can be reduced by 40% compared to the forecast value. A hardware-in-the-loop simulation of a grid-forming converter further showed a fast convergence toward the optimal operation point.
Now a days, blockchain based IOT networks are gaining popularity for the unlimited space and robust security mechanism. Blockchain is the best solution for the IoT devices to store the huge amount of data generated by...
详细信息
ISBN:
(数字)9798350384598
ISBN:
(纸本)9798350384604
Now a days, blockchain based IOT networks are gaining popularity for the unlimited space and robust security mechanism. Blockchain is the best solution for the IoT devices to store the huge amount of data generated by them with utmost privacy and security using distributed ledger. However, the resource constrained IoT devices having low computing power are unable to meet the huge computing requirements of data mining in blockchain networks. This paper has proposed a robust Physically Unclonable Function (PUF)-based authentication system to replace the popular consensus algorithms by a lightweight hardware-based authentication mechanism without compromising the security and privacy. The proposed ring oscillator based PUF modules fortify users' credentials and withstand various types of attacks in decentralized and tamper-resistant blockchain based IOT network with significant reduction in latency and power consumption. Attack analysis is done to compare the vulnerabilities of both the proposed and conventional systems to prominent blockchain attacks. The results of attack analysis demonstrate that the proposed system outperforms the conventional PoW system.
Recently, parallel reinforcement learning (PRL) based Industrial Internet of Things (IIoT) edge-cloud resource scheduling has elicited escalating attention. However, with the scale of IIoT expands, there are several c...
详细信息
ISBN:
(纸本)9781665423915
Recently, parallel reinforcement learning (PRL) based Industrial Internet of Things (IIoT) edge-cloud resource scheduling has elicited escalating attention. However, with the scale of IIoT expands, there are several challenges in the existing researches: 1) large number of parallel servers slows down the convergence rate of PRL; 2) malicious parallel server affects resource allocation efficiency. In order to solve the above efficiency and security problem, blockchain-based approaches are introduced in PRL based resource allocation problem. However, traditional consensus algorithm in blockchain is not suitable for resource allocation and is inefficient. Thus, in this article, based on a novel fuzzy delegated proof of state and practical byzantine fault tolerance (fuzzy DPoSt+PBFT) consensus algorithm, we propose a blockchain-enabled collaborative parallel Q-learning (CPQL) approach to address the above challenges. To be specific, we first construct an edge-cloud collaborative architecture for executing the diversity intelligence IIoT applications. Then, we propose a CPQL algorithm for edge-cloud resource allocation and choosing the optimal number of parallel edge servers to speed up the Q-table training. In the Q-table aggregation process in CPQL, a fuzzy DPoSt+PBFT algorithm is designed for secure CPQL training and efficient consensus. Experimental results show the superior performance of the proposed approach. And the proposed approach has great potential in IIoT resource allocation problem.
This paper studies the behavior of the extragradient algorithm [Korpelevich, 1976] when applied to hypomonotone operators, a class of problems that extends beyond the classical monotone setting. To support the underst...
详细信息
Distributed control strategies based on consensus algorithms for DC microgrids have gained intensive interest in recent years thanks to its advantages of high reliability, resilience, and expandability, over centraliz...
详细信息
ISBN:
(数字)9781728153018
ISBN:
(纸本)9781728153025
Distributed control strategies based on consensus algorithms for DC microgrids have gained intensive interest in recent years thanks to its advantages of high reliability, resilience, and expandability, over centralized control ones. Thus, global information can be accurately shared in a distributed way by sharing information between neighbor units. Meanwhile, hierarchical control paradigm consisting of three levels, i.e., primary, secondary, and tertiary, has become a standard solution for DC microgrids. Usually, the primary control is performed locally without communication, while secondary and tertiary controls desire distributed communication to obtain average voltage or current among units. Thus, the sparse communications are crucial to distributed control of DC microgrids. In this work, three main communication conditions, i.e., link failure, communication delay, and noise are included in analyzing effects of these conditions on distributed control of DC microgrids. Simulation model is built to verify the analysis in MATLAB/Simulink environment.
This paper introduces a distributed parallel Alternating Direction Method of Multipliers (ADMM) algorithm for solving the distributed constrained optimization problem over directed graphs. To effectively handle the ef...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This paper introduces a distributed parallel Alternating Direction Method of Multipliers (ADMM) algorithm for solving the distributed constrained optimization problem over directed graphs. To effectively handle the effect of asymmetric information communication on the convergence of the optimization algorithm, a surplus-based averaging consensus algorithm is integrated into the ADMM-based optimization algorithm. Unlike existing distributed ADMM algorithms over directed graphs that focus on the case with solely local constraints, the proposed algorithm can deal with both local constraints and coupling constraints. Under the assumption that the objective function is convex and the underlying graph is strongly connected, the convergence of the surplus-based ADMM to an optimal solution of the distributed constrained problem is proved. Finally, numerical simulations are conducted to validate the effectiveness of the proposed algorithm.
暂无评论