Traffic light control plays a crucial role in intelligent transportation systems. This paper introduces Temporal Difference-Aware Graph Convolutional Reinforcement Learning (TeDA-GCRL), a decentralized RL-based method...
详细信息
The collective behaviors of animals,from schooling fish to packing wolves and flocking birds,display plenty of fascinating phenomena that result from simple interaction rules among *** emergent intelligent properties ...
详细信息
The collective behaviors of animals,from schooling fish to packing wolves and flocking birds,display plenty of fascinating phenomena that result from simple interaction rules among *** emergent intelligent properties of the animal collective behaviors,such as self-organization,robustness,adaptability and expansibility,have inspired the design of autonomous unmanned swarm *** article reviews several typical natural collective behaviors,introduces the origin and connotation of swarm intelligence,and gives the application case of animal collective *** this basis,the article focuses on the forefront of progress and bionic achievements of aerial,ground and marine robotics swarms,illustrating the mapping relationship from biological cooperative mechanisms to cooperative unmanned cluster ***,considering the significance of the coexisting-cooperative-cognitive human-machine system,the key technologies to be solved are given as the reference directions for the subsequent exploration.
The main goal of distribution network(DN)expansion planning is essentially to achieve minimal investment con-strained by specified reliability *** reliability-constrained distribution network planning(RcDNP)problem ca...
详细信息
The main goal of distribution network(DN)expansion planning is essentially to achieve minimal investment con-strained by specified reliability *** reliability-constrained distribution network planning(RcDNP)problem can be cast as an instance of mixed-integer linear programming(MILP)which involves ultra-heavy computation burden especially for large-scale *** this paper,we propose a parallel computing based solution method for the RcDNP *** RcDNP is decomposed into a backbone grid and several lateral grid problems with ***,a parallelizable augmented Lagrangian algorithm with acceleration method is developed to solve the coordination planning *** lateral grid problems are solved in parallel through coordinating with the backbone grid planning ***-Seidel iteration is adopted on the subset of the convex hull of the feasible region constructed by *** mild conditions,the optimality and convergence of the proposed method are *** tests show that the proposed method can significantly reduce the solution time and make the RcDNP applicable for real-worldproblems.
6G networks envision a seamless integration of data and AI into their core operations, marking a new era where distributed client devices actively engage in intelligent processes, supported by a diverse ecosystem of A...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Heart disease is one of the destructive infections that an enormous populace of individuals all over the planet grieves. The prediction of heart disease is very much urged because of increasing death rates. The conven...
详细信息
computer-aided detection of plasmodium malaria on cell images from digital microscopy provides an invaluable second opinion to medical experts. Traditionally, well-established deep learning algorithms are widely used ...
详细信息
We demonstrate 6-bit DAC resolution with an ultra-compact slow-light electro-optic modulator. The 10× modulation length reduction enables 31× compute density, 1.17× energy efficiency, and 36.1× ene...
详细信息
Unmanned Aerial Vehicles (UAVs) are increasingly utilized in various applications often requiring coordinated operations of multiple UAVs. Circular formation control has garnered significant attention due to its diver...
详细信息
The rapid development of multi-view videos (MVV) transmission is an irresistible trend. Concurrently, reconfigurable intelligent surface (RIS)-assisted wireless communication has drawn significant attention. We observ...
详细信息
暂无评论