The impact of virtual collaborations and digital transformation has led to a significant increase in the use of VoIP technologies. VoIP, which works on a hierarchical client-server architecture in order to adapt to th...
详细信息
ISBN:
(纸本)9798350351866;9798350351859
The impact of virtual collaborations and digital transformation has led to a significant increase in the use of VoIP technologies. VoIP, which works on a hierarchical client-server architecture in order to adapt to the old circuit-switched technology, has gradually started to use a P2P architecture over time in parallel with the developments in this architecture. The lack of " peer admission" and "control in call flow" features in pure P2P architecture has resulted in vulnerabilities against some attacks, such as modifying, termination, eavesdropping, and SPIT. Although various studies have been conducted to mitigate these vulnerabilities in P2P systems on other platforms, the literature on P2P VoIP is limited. Studies using distributed blockchains were limited to authentication and could not eliminate the system's centralization by keeping SIP servers in their architecture. In this study, we proposed a P2P VoIP system and assessed the feasibility of managing user data via distributed blockchain technology. Our findings reveals that this approach can enhance security and decentralization in P2P VoIP. Furthermore, a thorough performance and security evaluation is conducted on the blockchain type, consensus algorithm, and several blockchain architectures that will be used to manage this data, offering a promising outlook for the future of P2P VoIP.
In this research, we solve the task assignment problem of multiple agents to multiple tasks in a multi-agent system. Regarding the problem of one agent versus multiple tasks, we use the concept of "grouping,"...
详细信息
ISBN:
(纸本)9798331517939;9788993215380
In this research, we solve the task assignment problem of multiple agents to multiple tasks in a multi-agent system. Regarding the problem of one agent versus multiple tasks, we use the concept of "grouping," in which each agent seeks a set of tasks that it can handle at once. On the other hand, for the problem of multiple agents versus one task, we use the concept of the "Timetable" with the goal of synchronizing the start time of each agent's task. By combining the two concepts, it is possible to deal with complex assignment problems, such as each agent executing multiple tasks at the same time, or multiple agents executing one task at the same time. Furthermore, we show that this solution can respond if circumstances changes, such as when the number of agents decreases or the number of tasks increases.
Multi-agent systems are vulnerable to cyber-attacks, environmental disturbances, and hardware failures. A robust distributed control architecture is required to ensure that these systems can perform their mission succ...
详细信息
ISBN:
(数字)9781624107115
ISBN:
(纸本)9781624107115
Multi-agent systems are vulnerable to cyber-attacks, environmental disturbances, and hardware failures. A robust distributed control architecture is required to ensure that these systems can perform their mission successfully and minimize the detrimental impacts of previously stated conditions. This paper proposes a control algorithm comprising a bio-inspired adaptive consensus algorithm and a bio-inspired machine learning-based health management system. The adaptive consensus algorithm is implemented on a multi-agent system consisting of four Crazyflie quadcopters. Flight test data are used to train the health management system and then tested with both nominal and faulty flight test data. Results presented in this paper show that the adaptive distributed algorithm can drive the agents to a consensus, minimize the effects of disturbances, and accurately differentiate nominal and faulty conditions.
In this paper, we study the problem of resilient average consensus for second-order multi-agent systems with misbehaving agents. General types of misbehaviors are considered, including false data injection attacks and...
详细信息
ISBN:
(数字)9781665451963
ISBN:
(纸本)9781665451963
In this paper, we study the problem of resilient average consensus for second-order multi-agent systems with misbehaving agents. General types of misbehaviors are considered, including false data injection attacks and accidental faults. The difficulties of this problem are to detect errors in a distributed way and accurately compensate two-dimension state errors by one-dimension acceleration input. We first provide sufficient conditions for second-order average consensus. Then, we design detection methods via two-hop communication information and propose schemes to compensate errors accurately in a distributed way inspired by sufficient conditions. Hence, we propose a finite input-errors detection-compensation-based consensus algorithm (FIDC). Considering infinite attacks on input, velocity and position, an extension named IADC is proposed with a fault-tolerance mechanism. We prove that the proposed algorithms allow agents to asymptotically achieve second-order average consensus. Finally, extensive simulations are conducted to verify the effectiveness of the algorithms.
Currently, a large amount of information is stored in digital form. There have been many information security problems, leading to the emergence of a large number of pirated digital products. Although there have been ...
详细信息
Currently, a large amount of information is stored in digital form. There have been many information security problems, leading to the emergence of a large number of pirated digital products. Although there have been many protection measures for digital information copyright, the research content on copyright protection for digital music information is still very little. Aiming at the problems of low data storage security, long confirmation period and vulnerability to attacks in the confirmation system of digital music copyright, combined with Blockchain Technology (BT), a scheme for credible confirmation of digital music copyright is proposed. The experimental results reveal that the DPBFT algorithm can accommodate up to two faulty nodes, which has a higher fault tolerance rate than the traditional PBFT algorithm. The average throughput can reach 1249, which can meet the needs of the music copyright management system and has practical application value.
The collocation and interpolation technique on the power series approximate solution was used to develop a new continuous implicit hybrid one-third step method capable of solving first-order stiff initial value proble...
详细信息
Some applications, like round-based consensus algorithms, require all the nodes from a system to send a message to the same node (the leader) at the same time. In a Mobile Ad-Hoc Network (MANET), this situation is lik...
详细信息
In this study, we consider the consensus problem for a high-order multi-agent systems (MASs) with an imprecise communica-tion topology structure described by the Takagi-Sugeno fuzzy model. A distributed adaptive contr...
详细信息
In this study, we consider the consensus problem for a high-order multi-agent systems (MASs) with an imprecise communica-tion topology structure described by the Takagi-Sugeno fuzzy model. A distributed adaptive control protocol is proposed for the consensus problem comprising MASs with unknown parameters and input disturbances. The proposed protocol can guarantee that the consensus errors asymptotically approach zero under the conditions that the communication topology is fuzzy union connected and the dynamics of the leader are unknown to any agent among the followers. Furthermore, the proposed algorithm is extended to solve the formation control problem for MASs. Sufficient conditions are provided for the consensus and formation problems for MASs based on Lyapunov stability theory. Finally, three simulation examples are presented to illustrate the effectiveness of the proposed control protocol. (C) 2020 Elsevier B.V. All rights reserved.
We study the problem of online unweighted bipartite matching with n offline vertices and n online vertices where one wishes to be competitive against the optimal offline algorithm. While the classic RANKING algorithm ...
详细信息
We study the problem of online unweighted bipartite matching with n offline vertices and n online vertices where one wishes to be competitive against the optimal offline algorithm. While the classic RANKING algorithm of (Karp et al., 1990) provably attains competitive ratio of 1 - 1/e > 1/2, we show that no learning-augmented method can be both 1-consistent and strictly better than 1/2-robust under the adversarial arrival model. Meanwhile, under the random arrival model, we show how one can utilize methods from distribution testing to design an algorithm that takes in external advice about the online vertices and provably achieves competitive ratio interpolating between any ratio attainable by advice-free methods and the optimal ratio of 1, depending on the advice quality.
It is known that the Wadge reducibility of regular co-languages is efficiently decidable (Krishnan et al., 1995), (Wilke, Yoo, 1995). In this paper we study analogous problem for regular k-partitions of co-languages. ...
详细信息
It is known that the Wadge reducibility of regular co-languages is efficiently decidable (Krishnan et al., 1995), (Wilke, Yoo, 1995). In this paper we study analogous problem for regular k-partitions of co-languages. In the series of previous papers (Selivanov, 2011), (Alaev, Selivanov, 2021), (Selivanov, 2012) there was a partial progress towards obtaining an efficient algorithm for deciding the Wadge reducibility in this setting as well. In this paper we finalize this line of research providing a quadratic algorithm (in RAM model). For this we construct a quadratic algorithm to decide a preorder relation on iterated posets. Additionally, we discuss the size of the representation of regular co-languages and suggest a more compact way to represent them. The algorithm we provide is efficient for the more compact representation as well.
暂无评论