Cognitive navigation, a high-level and crucial function for organisms' survival in nature, enables autonomous exploration and navigation within the environment. However, most existing works for bio-inspired naviga...
详细信息
This paper is concerned with the adaptive neural network event-triggered control (ETC) problem for stochastic nonlinear systems with output constraint. The influence of stochastic disturbance inevitably exists in many...
详细信息
Driven by the imperative to reduce emissions from transportation, Electric Vehicles (EVs) are proliferating rapidly. However, the widespread adoption of EV charging facilities poses a potential threat to the stability...
详细信息
The design of manufacturing systems requires exploring diverse component configurations for one that best satisfies the requirements of the target system. At the same time, manufacturing systems evolve continuously, i...
详细信息
With Industry 5.0, prioritizing worker well-being, the integration of human-related data into production processes poses challenges related to data privacy and compliance with regulations such as GDPR. This paper pres...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
This paper presents intelligent access control for a charging station and a framework for dynamically and adaptively managing charging requests from randomly arriving electric vehicles(EVs),to increase the revenue of ...
详细信息
This paper presents intelligent access control for a charging station and a framework for dynamically and adaptively managing charging requests from randomly arriving electric vehicles(EVs),to increase the revenue of the ***,charging service requests from random EV arrivals are described as an event-driven sequential decision process,and the decision-making relies on an eventextended state that is composed of the real-time electricity price,real-time charging station state,and EV arrival ***,a state aggregation method is introduced to reduce the state space by first aggregating the charging station state in the form of the remaining charging time and then further aggregating it via sort ***,mathematical calculations of the code value are provided,and their uniqueness and continuous integer characteristics are ***,a corresponding Q-learning method is proposed to derive an optimal or suboptimal access control *** results of a case study demonstrate that the proposed learning optimisation method based on the event-extended state aggregation performs better than flat *** space complexity and time complexity are significantly reduced,which substantially improves the learning efficiency and optimisation performance.
Reliable and accurate short-term forecasting of residential load plays an important role in DSM. However, the high uncertainty inherent in single-user loads makes them difficult to forecast accurately. Various traditi...
详细信息
Monitoring sugar concentration during fermentation is crucial for producing high-quality alcoholic beverages. Traditional methods for measuring sugar concentration can be costly and time-consuming, especially for smal...
详细信息
Timely transmission line fire inspections are vital for power system safety. Although deep learning models are widely used for flame detection, struggle with small target recognition due to background interference and...
详细信息
暂无评论