We study the problem of maximizing a monotone submodular function subject to a matroid constraint, and present for it a deterministic non-oblivious local search algorithm that has an approximation guarantee of 1 − 1/e...
详细信息
Recently, the underwater sensor networks (USNs) play increasingly essential role in many applications, such as target localization. However, it faces extremely harsh environment including clock asynchronous and false ...
详细信息
ISBN:
(纸本)9781665426480
Recently, the underwater sensor networks (USNs) play increasingly essential role in many applications, such as target localization. However, it faces extremely harsh environment including clock asynchronous and false data attacks. This paper investigates the above problem and proposes an attack-resistant target localization algorithm. The localization process is mainly divided into two phases. One is sensor nodes clock synchronization and self-localization. Followed by the USNs obtain the position of target. Specifically, sensor nodes complete clock synchronize using average clock synchronization algorithm and perform self-localization. Especially, taking false clock data attack (FCDA) in synchronize process into consideration. Then sensor nodes are grouped to solve the position of target under false estimations attack (FEA). The security test by adaptive threshold is used to determine whether the estimated position is accurate. The weight of attacked estimation is reduced by adaptively deviation-tolerant secure target localization consensus algorithm (DLCA). Simulation results in Section IV reveal the effectiveness of algorithm despite false data attacks exist.
Community search over bipartite graphs is a fundamental problem, and finding influential communities has attracted significant attention. However, all existing studies have used the minimum weight of vertices as the i...
详细信息
Deterministic policy gradient algorithms are foundational for actor-critic methods in controlling continuous systems, yet they often encounter inaccuracies due to their dependence on the derivative of the critic’s va...
详细信息
Multi-objective search means searching for any one of several objectives in an unstructured database. Grover’s algorithm has quadratic acceleration in multi-objection search than classical ones. Iterated operator in ...
详细信息
Two new hybrid algorithms are proposed for large-scale linear discrete ill-posed problems in general-form regularization. They are both based on Krylov subspace inner-outer iterative algorithms. At each iteration, the...
详细信息
The coordinated control of AC microgrid based on consensus algorithm is an effective approach to realize accurate reactive power sharing and voltage regulation. However, it requires numerous communication resources an...
详细信息
ISBN:
(数字)9798350352658
ISBN:
(纸本)9798350352665
The coordinated control of AC microgrid based on consensus algorithm is an effective approach to realize accurate reactive power sharing and voltage regulation. However, it requires numerous communication resources and the control structure is complex. On the basis we propose an integrated controller that integrates voltage and current regulators into one. The approach only needs the voltage information of neighbors and realizes the accurate reactive power sharing and voltage regulation in a simple way. This simplifies the controller design and reduces the communication dependence of the system. In the end, the effectiveness and ability to cope with communication failures of the proposed control strategy is verified by simulation.
Nowadays blockchain is used in many spheres of our life. But even though this idea promises a high level of security and each new protocol seems to improve the technology, it is still not perfect. In this article, we ...
详细信息
ISBN:
(数字)9781728157610
ISBN:
(纸本)9781728157627
Nowadays blockchain is used in many spheres of our life. But even though this idea promises a high level of security and each new protocol seems to improve the technology, it is still not perfect. In this article, we concentrate on the new blockchain protocol, called "Blockmesh". The article starts with a brief introduction into the blockchain technology in general and then moves on to describing Blockmesh, its features and ways of compromising it. To test our assumptions we'll create the environment, simulating the system work. Our goal is to review the possibilities and weaknesses of the new protocol and to explore the cases of Blockmesh providing a higher level of security.
We present an elementary branch and bound algorithm with a simple analysis of why it achieves worstcase optimality for join queries on classes of databases defined respectively by cardinality or acyclic degree constra...
详细信息
Cloud computing is a developing technology used for providing various services such as PaaS, IaaS and SaaS for various applications based on the pay as per usage. The foundation of trust is the assurance and confidenc...
详细信息
Cloud computing is a developing technology used for providing various services such as PaaS, IaaS and SaaS for various applications based on the pay as per usage. The foundation of trust is the assurance and confidence that information, people, entities, data, or processes will deliver the desired outcome with a particular level of assurance. Many times, users even do not have knowledge about processing their personal information over the clouds. In cloud computing, centralized architecture is used for trust modeling, which causes various trust and privacy issues. The trust model is subject to a number of limitations, including single point failure, overload, vulnerability to malicious assaults, particularly harmful recommendations, and lack of accessibility and untraceability of trust proof. There are numerous initiatives underway to increase confidence between cloud users and CSPs. The privacy issues including data leakage and compromising data integrity in the cloud environment. The blockchain technology can provide the solution for the above issues. The Blockchain technology has various advantages as it is decentralized in nature, immutable ledgers, providing full transparency, Instant traceability, data encrypted end-to-end. In the proposed system hybrid consensus algorithms are created to overcome problems of the existing blockchain consensus algorithm. By using blockchain technology creates a Blockchain as a Service (BaaS) in the cloud environment to improve the trust and privacy of users.
暂无评论