Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded ***,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless ***,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement ***,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain *** this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective *** results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approa...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approach at the PCC of ADNs using coordination of non-MPPT based ***,due to the intermittent nature of DGs coupled with PCC through uni-directional broadcast communication,the PCC becomes vulnerable to transient *** address this challenge,this study first presents a detailed mathematical model of an ADN from the perspective of PCC regulation to realize rigidness of PCC against ***,an H_(∞)controller is formulated and employed to achieve optimal performance against disturbances,consequently,ensuring the least oscillations during transients at ***,an eigenvalue analysis is presented to analyze convergence speed limitations of the newly derived system ***,simulation results show the proposed method offers superior performance as compared to the state-of-the-art methods.
Transformer neural networks (TNN) have been widely utilized on a diverse range of applications, including natural language processing (NLP), machine translation, and computer vision (CV). Their widespread adoption has...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, non...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, nonlinearity caused by radio frequency(RF)amplifiers will generate distortions to both passband and adjacent channels such that the transmission quality is degraded. The study of this article aims to predict the power spectrum for OFDM based signals at the output of an RF amplifier due to the nonlinearity. In this article,based on Taylor polynomial coefficients, a power spectrum expression for amplified OFDM signals in terms of intercept points(up to nth-order) is derived. This model is useful to RF engineers in choosing and testing RF amplifiers with appropriate specifications, such as intercept points and gain, to meet the requirements of wireless standards. Measurements are carried out to confirm the results of the proposed model.
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
This study explores the influence of social media marketing on consumers' decisions to purchase green software and identifies key factors affecting those decisions. The findings contribute to effective marketing s...
详细信息
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the ord...
详细信息
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of *** work will present the implementation of sequence pattern mining for recommender systems within the domain of *** work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender *** feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target *** will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy *** work pre-sents a new hybrid recommender system based on optimized feature selection and systolic *** features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)*** systolic tree is used for pattern mining,and based on this,the recommendations are *** proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the *** was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention and detection techniques have been proposed to mitigate these *** this paper,we propose an integrated security framework using blockchain and Machine Learning(ML)to protect IoT sensor *** framework consists of two modules:a blockchain prevention module and an ML detection *** blockchain prevention module has two lightweight mechanisms:identity management and trust *** management employs a lightweight Smart Contract(SC)to manage node registration and authentication,ensuring that unauthorized entities are prohibited from engaging in any tasks,while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network’s lifetime and tracking historical node *** and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance(VBFT)mechanism to ensure network reliability and *** ML detection module utilizes the Light Gradient Boosting Machine(LightGBM)algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their *** investigate the performance of several off-the-shelf ML algorithms,including Logistic Regression,Complement Naive Bayes,Nearest Centroid,and Stacking,using the WSN-DS *** is selected following a detailed comparative analysis conducted using accuracy,precision,recall,F1-score,processing time,training time,prediction time,computational complexity,and Matthews Correlation Coefficient(MCC)evaluation metrics.
暂无评论