In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochast...
详细信息
In this paper the authors consider the operational problem of optimal signalling and control,called control-coding capacity(with feedback),C_(FB) in bits/second,of discrete-time nonlinear partially observable stochastic systems in state space form,subject to an average cost constraint.C_(FB) is the maximum rate of encoding signals or messages into randomized controller-encoder strategies with feedback,which control the state of the system,and reproducing the messages at the output of the system using a decoder or estimator with arbitrary small asymptotic error *** the first part of the paper,the authors characterize C_(FB) by an information theoretic optimization problem of maximizing directed information from the inputs to the outputs of the system,over randomized strategies(controller-encoders).The authors derive equivalent characterizations of C_(FB),using randomized strategies generated by either uniform or arbitrary distributed random variables(RVs),sufficient statistics,and a posteriori distributions of nonlinear filtering *** the second part of the paper,the authors analyze C_(FB) for linear-quadratic Gaussian partially observable stochastic systems(LQG-POSSs).The authors show that randomized strategies consist of control,estimation and signalling parts,and the sufficient statistics are,two Kalman-filters and an orthogonal innovations *** authors prove a semi-separation principle which states,the optimal control strategy is determined explicitly from the solution of a control matrix difference Riccati equation(DRE),independently of the estimation and signalling ***,the authors express the optimization problem of C_(FB) in terms of two filtering matrix DREs,a control matrix DRE,and the covariance of the innovations *** the paper,the authors illustrate that the expression of C_(FB) includes as degenerate cases,problems of stochastic optimal control and channel capacity of information transmission.
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
Voltage deviation in power systems, particularly during overloading and light load conditions, has become a significant concern. To address this issue, Photovoltaic (PV) sources are used to compensate for voltage devi...
详细信息
Edge computing has emerged as a promising technology to satisfy the demand for data computational resources in Internet of Things (IoT) networks. With edge computing, processing of the massive data-intensive tasks can...
详细信息
The growing prevalence of Internet of Things (IoT) devices has heightened vulnerabilities to botnet-based cyberattacks, necessitating robust detection mechanisms. This paper proposes DenseRSE-ASPPNet, an advanced deep...
详细信息
In the setting of error-correcting codes with feedback, Alice wishes to communicate a k-bit message x to Bob by sending a sequence of bits over a channel while noiselessly receiving feedback from Bob. It has been long...
详细信息
False data injection (FDI) attacks targeting under-load tap changing (ULTC) transformers pose a significant threat to smart distribution networks by exploiting vulnerabilities in the volt-var optimization (VVO) proces...
详细信息
Photovoltaic arrays receive varying levels of solar radiation due to factors such as shadows created by clouds, surrounding buildings, and other obstructions. Therefore, an effective Maximum Power Point Tracking (MPPT...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. Th...
详细信息
In this paper, we present a Deep Neural Network(DNN) based framework that employs Radio Frequency(RF) hologram tensors to locate multiple Ultra-High Frequency(UHF) passive Radio-Frequency Identification(RFID) tags. The RF hologram tensor exhibits a strong relationship between observation and spatial location, helping to improve the robustness to dynamic environments and equipment. Since RFID data is often marred by noise, we implement two types of deep neural network architectures to clean up the RF hologram tensor. Leveraging the spatial relationship between tags, the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase wrapping. In contrast to fingerprinting-based localization systems that use deep networks as classifiers, our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between fingerprints. We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors. The proposed framework is implemented using commodity RFID devices, and its superior performance is validated through extensive experiments.
暂无评论