Designing communication channels for multiagent is a feasible method to conduct decentralized learning, especially in partially observable environments or large-scale multiagent systems. In this work, a communication ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention and detection techniques have been proposed to mitigate these *** this paper,we propose an integrated security framework using blockchain and Machine Learning(ML)to protect IoT sensor *** framework consists of two modules:a blockchain prevention module and an ML detection *** blockchain prevention module has two lightweight mechanisms:identity management and trust *** management employs a lightweight Smart Contract(SC)to manage node registration and authentication,ensuring that unauthorized entities are prohibited from engaging in any tasks,while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network’s lifetime and tracking historical node *** and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance(VBFT)mechanism to ensure network reliability and *** ML detection module utilizes the Light Gradient Boosting Machine(LightGBM)algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their *** investigate the performance of several off-the-shelf ML algorithms,including Logistic Regression,Complement Naive Bayes,Nearest Centroid,and Stacking,using the WSN-DS *** is selected following a detailed comparative analysis conducted using accuracy,precision,recall,F1-score,processing time,training time,prediction time,computational complexity,and Matthews Correlation Coefficient(MCC)evaluation metrics.
Recently, Neural Radiance Fields(NeRF) have shown remarkable performance in the task of novel view synthesis through multi-view. The present study introduces an advanced optimization framework, termed Pose Interpolati...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the ...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the heat transfer area of the heat exchanger *** R-GSO algorithm integrates the GSO algorithm with the Taguchi method,utilizing the Taguchi method to determine the optimal producer in each iteration of the GSO algorithm to strengthen the robustness of the search process and the ability to find the global *** conventional parameter design optimization,it is typically assumed that the designed parameters can be applied accurately and consistently throughout ***,for systems that are sensitive to changes in design parameters,even minor inaccuracies can substantially reduce overall system ***,the permissible variations of the design parameters are considered in the tolerance-optimized design to ensure the robustness of the *** optimized design of the heat exchanger system assumes that the system’s operating temperature parameters are ***,fixing the systemoperating temperature parameters at a constant value is *** paper assumes that the system operating temperature parameters have an uncertainty error when optimizing the heat transfer area of the heat exchanger *** results show that the AT-GSO algorithm optimizes the heat exchanger system and finds the optimal operating temperature in the absence of tolerance and under three tolerance conditions.
We describe a novel construction of arbitrary read-modify-write (RMW) primitives in a persistent shared memory model with process failures. Our construction uses blocking synchronization, in the form of recoverable mu...
详细信息
Detection and segmentation of defocus blur is a challenging task in digital imaging applications as the blurry images comprise of blur and sharp regions that wrap significant information and require effective methods ...
详细信息
Detection and segmentation of defocus blur is a challenging task in digital imaging applications as the blurry images comprise of blur and sharp regions that wrap significant information and require effective methods for information *** defocus blur detection and segmentation methods have several limitations i.e.,discriminating sharp smooth and blurred smooth regions,low recognition rate in noisy images,and high computational cost without having any prior knowledge of images i.e.,blur degree and camera ***,there exists a dire need to develop an effective method for defocus blur detection,and segmentation robust to the above-mentioned *** paper presents a novel features descriptor local directional mean patterns(LDMP)for defocus blur detection and employ KNN matting over the detected LDMP-Trimap for the robust segmentation of sharp and blur *** argue/hypothesize that most of the image fields located in blurry regions have significantly less specific local patterns than those in the sharp regions,therefore,proposed LDMP features descriptor should reliably detect the defocus blurred *** fusion of LDMP features with KNN matting provides superior performance in terms of obtaining high-quality segmented regions in the ***,the proposed LDMP features descriptor is robust to noise and successfully detects defocus blur in high-dense noisy *** results on Shi and Zhao datasets demonstrate the effectiveness of the proposed method in terms of defocus blur *** and comparative analysis signify that our method achieves superior segmentation performance and low computational cost of 15 seconds.
According to the advances in quantum computing and distributed learning, quantum federated learning (QFL) has recently become an emerging field of study. In QFL, each quantum computer or device locally trains its quan...
详细信息
The transferability of adversarial examples is of central importance to transfer-based black-box adversarial attacks. Previous works for generating transferable adversarial examples focus on attacking given pretrained...
详细信息
Forecasting electricity demand is an essential part of the smart grid to ensure a stable and reliable power grid. With the increasing integration of renewable energy resources into the grid, forecasting the demand for...
详细信息
Forecasting electricity demand is an essential part of the smart grid to ensure a stable and reliable power grid. With the increasing integration of renewable energy resources into the grid, forecasting the demand for electricity is critical at all levels, from the distribution to the household. Most existing forecasting methods, however, can be considered black-box models as a result of deep digitalization enablers, such as deep neural networks, which remain difficult to interpret by humans. Moreover, capture of the inter-dependencies among variables presents a significant challenge for multivariate time series forecasting. In this paper we propose eXplainable Causal Graph Neural Network (X-CGNN) for multivariate electricity demand forecasting that overcomes these limitations. As part of this method, we have intrinsic and global explanations based on causal inferences as well as local explanations based on post-hoc analyses. We have performed extensive validation on two real-world electricity demand datasets from both the household and distribution levels to demonstrate that our proposed method achieves state-of-the-art performance.
A crucial aspect of autonomous vehicles is path planning, which involves using various algorithms to determine the most efficient routes. This study investigates the application of the Ant Colony Optimization (ACO) al...
详细信息
暂无评论