Robotics research has achieved rapid development in the field of quadruped robots. These robots can traverse uneven terrains better than similar sized wheeled robots. However, challenges related to their affordability...
详细信息
Reactive power optimization of distribution networks is traditionally addressed by physical model based methods,which often lead to locally optimal solutions and require heavy online inference time *** improve the qua...
详细信息
Reactive power optimization of distribution networks is traditionally addressed by physical model based methods,which often lead to locally optimal solutions and require heavy online inference time *** improve the quality of the solution and reduce the inference time burden,this paper proposes a new graph attention networks based method to directly map the complex nonlinear relationship between graphs(topology and power loads)and reactive power scheduling schemes of distribution networks,from a data-driven *** graph attention network is tailored specifically to this problem and incorporates several innovative features such as a self-loop in the adjacency matrix,a customized loss function,and the use of max-pooling ***,a rulebased strategy is proposed to adjust infeasible solutions that violate *** results on multiple distribution networks demonstrate that the proposed method outperforms other machine learning based methods in terms of the solution quality and robustness to varying load ***,its online inference time is significantly faster than traditional physical model based methods,particularly for large-scale distribution networks.
Image inpainting consists of filling holes or missing parts of an image. Inpainting face images with symmetric characteristics is more challenging than inpainting a natural scene. None of the powerful existing models ...
详细信息
Deterministic delivery of scheduled traffic (ST) is critical in time-sensitive networking (TSN). The time-aware shaper (TAS) defined by IEEE 802.1Qbv is the enabler to ensure deterministic end-to-end delays of ST flow...
详细信息
This work focuses on the problem of distributed optimization in multi-agent cyberphysical systems, where a legitimate agent's iterates are influenced both by the values it receives from potentially malicious neigh...
详细信息
From AI-assisted art creation to large language model (LLM)-powered ChatGPT, AI-generated contents and services are becoming a transforming force. It calls for the telecom industry to embrace the prospects of AIGC ser...
详细信息
Recently, deep neural networks have triumphed over a large variety of human activity recognition (HAR) applications on resource-constrained mobile devices. However, most existing works are static and ignore the fact t...
详细信息
Beamforming is now a basic technique in wireless communication to improve signal quality and reduce interference. This study investigates the use of deep learning-enhanced beamforming to improve the quality of transmi...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
Decentralized Finance (DeFi) has emerged as a transformative force in the financial landscape, bringing about challenges in ensuring blockchain security. This paper systematically examines prominent DeFi incidents fro...
详细信息
暂无评论