This paper presents a novel multiple unmanned aerial vehicde(UAV)swarm cotoller based on the fractional alculus *** controller i designed baed on fractional order Darwinian pigeon-inepired optimization(F 0DPI0)and PID...
详细信息
This paper presents a novel multiple unmanned aerial vehicde(UAV)swarm cotoller based on the fractional alculus *** controller i designed baed on fractional order Darwinian pigeon-inepired optimization(F 0DPI0)and PID *** comparative simulations are conducted in the *** simulation results reveal that FODPIObased muli-UAV formation controller is superior to the basic PIO and dilTerential evolution(DE)*** fractional oelfcdent in F ODPIO algorithm makes it eflective optimbation with fast convergence rate,small oversboot,and better ***,the contnoller propoeed in this paper is fessible and robust.
In the context of DOORS, a medium-scale distributed system, running on tens of 'normal PCs and/or embedded devices, we propose a solution for the problem of efficient allocation of execution and storage resources....
详细信息
We consider inexact policy iteration (iPI) methods for large-scale infinite-horizon discounted Markov decision processes (MDPs) with finite state and action spaces, a variant of policy iteration where the policy evalu...
详细信息
We consider inexact policy iteration (iPI) methods for large-scale infinite-horizon discounted Markov decision processes (MDPs) with finite state and action spaces, a variant of policy iteration where the policy evaluation step is implemented inexactly using an iterative solver for linear systems. In the classical dynamic programming literature, a similar principle is deployed in optimistic policy iteration, where an a-priori fixed-number of iterations of value iteration is used to inexactly solve the policy evaluation step. Inspired by the connection between policy iteration and semismooth Newton's method, we investigate a class of iPI methods that mimic the inexact variants of semismooth Newton's method by adopting a parametric stopping condition to regulate the level of inexactness of the policy evaluation step. For this class of methods we discuss local and global convergence properties and derive a practical range of values for the stopping-condition parameter that provide contraction guarantees. We also show that, when the iterative solver for policy evaluation enjoys linear contraction, the stopping criterion is verified in a finite-number of iterations. Our analysis is general and therefore encompasses a variety of iterative solvers for policy evaluation, including the standard value iteration as well as more sophisticated ones such as GMRES. As underlined by our analysis, the selection of the inner solver is of fundamental importance for the performance of the overall method. We therefore consider different iterative methods to solve the policy evaluation step and analyse their applicability and contraction properties when used for policy evaluation. In particular, we study Richardson's method, steepest descent, the minimal residual method and GMRES for policy evaluation. We show that the contraction properties of these methods tend to be enhanced by the specific structure of policy evaluation and that there is margin for substantial improvement over value
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicated. It calls for the network operators to grapple with low-level vendor particular arrangements to execute the high degree network policies which are complicated. A method for monitoring networks with OpenFlow controller is presented in this paper in two separate functions for the same networks. Bandwidth utilization, Meter values, charts and statistics are provided by the method to extend controller monitoring capabilities. The method architecture and implementation will be introduced in order to present the feature set. Additionally, softswitches are used as a switch and Mininet to evaluate a virtualized network. This analysis shows whether Meters or ports value is better for network management.
Efficiently detecting target weld seams while ensuring sub-millimeter accuracy has always been an important challenge in autonomous welding, which has significant application in industrial practice. Previous works mos...
Interconnection of wired Internet and Mobile Ad hoc Network (MANET), called Integrated Internet-MANET can expand the network coverages and services. In this type of networks, the gateway acts as a bridge between MANET...
详细信息
In modern industries, transducers and measurement systems have been largely applied for equipment monitoring. In this context, three-phase induction motors (TIMs) are the main focus of predictive maintenance due to th...
详细信息
The integration of brain-machine interface and exoskeleton robot has been widespread application in gait correction, walking assistance, and numerous other scenarios. To effectively extract the electroencephalogram (E...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
Few-shot segmentation (FSS) methods aim to segment objects using only a few pixel-level annotated samples. Current approaches either derive a generalized class representation from support samples to guide the segmenta...
详细信息
暂无评论