In recent years, the application of blockchain in distributed energy transactions has been studied globally, but blockchain is difficult to apply to scenarios such as distributed energy control due to performance issu...
详细信息
ISBN:
(纸本)9798350399677
In recent years, the application of blockchain in distributed energy transactions has been studied globally, but blockchain is difficult to apply to scenarios such as distributed energy control due to performance issues. For this reason, this paper proposes a distributed energy control system with blockchain and 5G fusion. Firstly, for the data characteristics of distributed energy control, deviated data transmission method is used to transmit reduced data volume, and 5G communication technology is adopted to further reduce communication delay and enhance security. Secondly, the nodes are ranked in terms of trustworthiness and the PBFT consensus algorithm is improved to reduce the number of communications. Then, distributed applications are implemented through smart contracts on the blockchain. Finally, simulation results show that the proposed method can achieve distributed energy control and is effectively compatible with malicious and faulty nodes.
This paper investigates the cooperative source seeking problem via a networked multi-vehicle system, and proposes a reinforcement learning (RL)-based trajectory planning scheme for the system. In contrast to most exis...
详细信息
ISBN:
(数字)9798350380323
ISBN:
(纸本)9798350380330
This paper investigates the cooperative source seeking problem via a networked multi-vehicle system, and proposes a reinforcement learning (RL)-based trajectory planning scheme for the system. In contrast to most existing works, the source position of this work is determined by multiple types of signal fields, and each vehicle in the network is responsible to take measurements of a type of signal field. In another word, a single vehicle cannot localize the source position and must cooperate with its neighbors. To cooperatively localize and simultaneously reach the source position, the vehicle is equipped with a trajectory planning scheme that combines consensus algorithm for cooperative source seeking and an RL-based algorithm for maximizing the value of its corresponding signal field. Thus, each trajectory planner only requires measurements of a field and relative positions between neighboring vehicles, which is especially appealing to global position system (GPS)-denied environments. Simulations are provided to validate the efficacy of the proposed trajectory planning scheme. The RL-based trajectory planner actively leads the vehicle to positions with higher field measurements, without the need for gradient or absolute position information. And we demonstrate the successful deployment of the model learned in single vehicle settings to the cooperative source seeking task.
We consider the problem of identifying the defectives from a population of items via a non-adaptive group testing framework with a random pooling-matrix design. We analyze the sufficient number of tests needed for app...
详细信息
We prove non asymptotic total variation estimates for the kinetic Langevin algorithm in high dimension when the target measure satisfies a Poincaré inequality and has gradient Lipschitz potential. The main point ...
详细信息
This paper introduces a novel method for eigenvalue computation using a distributed cooperative neural network framework. Unlike traditional techniques that face scalability challenges in large systems, our decentrali...
详细信息
Since the final quantum state in the Grover search algorithm is the normalized marked quantum state from the Gram-Schmidt process, Abrams and Lloyd [1] has shown that we can generate this vector by using a non-unitary...
详细信息
Stochastic nonconvex minimax problems have attracted wide attention in machine learning, signal processing and many other fields in recent years. In this paper, we propose an accelerated first-order regularized moment...
详细信息
The main aim of this work is to introduce and justify the study of semi-covarities. A semi-covariety is a non-empty family F of numerical semigroups such that it is closed under finite intersections, has a minimum, mi...
详细信息
One key benefit of Blockchain is the distribution of trust, consensus building, and scalability. By replicating data and automating the verification mechanisms, Blockchains provide unique foundations for transparency ...
详细信息
One key benefit of Blockchain is the distribution of trust, consensus building, and scalability. By replicating data and automating the verification mechanisms, Blockchains provide unique foundations for transparency and reliability. These aspects of Blockchains can be particularly useful to managing software code quality and *** paper presents outcomes of a workshop that included more than one hundred participants exploring the fundamental aspects of Blockchains, their development platforms, and tools to explore their potential in addressing software sustainability and maintainability challenges. Participants explored many Blockchain platforms and related tools, including Susereum, a Blockchain platform that builds software quality metrics by consensus.
Due to the problems of low consensus efficiency and high communication complexity in the random selection of master nodes in Practical Byzantine Fault Tolerance (PBFT), combined with the characteristics of the allianc...
详细信息
ISBN:
(数字)9798350361643
ISBN:
(纸本)9798350361650
Due to the problems of low consensus efficiency and high communication complexity in the random selection of master nodes in Practical Byzantine Fault Tolerance (PBFT), combined with the characteristics of the alliance chain, an improved PBFT algorithm based on the integral voting model (Integral Voting Practical Byzantine Fault Tolerance, IV-PBFT) is proposed. The integral voting model is introduced, and according to the node classification and conversion mechanism, the nodes are divided into four types and the nodes are dynamically adjusted according to the node behavior, which ensures the reliability of the consensus nodes to the maximum extent. The consistency protocol execution process is optimized, reducing the number of nodes involved in the consensus process, improving the efficiency of the algorithm. The results show that the IV-PBFT algorithm outperforms other algorithms in terms of security and performance.
暂无评论