This study presents a comparative analysis of the Deep Q-Network (DQN) and Deep Deterministic Policy Gradient (DDPG) reinforcement learning algorithms in the context of stock trading, focusing on historical stock pric...
详细信息
Time-synchronization (TS) formation control for unmanned surface vehicles (USVs) presents several advantages, including precise execution of tasks, broadened combat capabilities, and improved information fusion qualit...
详细信息
Time-synchronization (TS) formation control for unmanned surface vehicles (USVs) presents several advantages, including precise execution of tasks, broadened combat capabilities, and improved information fusion quality. To achieve this performance, a time-synchronized formation control method is presented that takes into account direct topology, external disturbances, and system uncertainties (EDSU). In contrast to prior formation control strategies, we introduce the formalized time-synchronized formation control framework, where all state components of the formation system concurrently converge to the equilibrium point at a uniform time constant, independently of their initial states. To counteract the EDSU, a fixed-time disturbance observer is designed to guarantee the convergence of all observer error components to zero. System stability is corroborated through the application of Lyapunov-like theory. Simulations and comparative experiments on three USVs are conducted to demonstrate the proposed method's superiority. IEEE
Herein, we propose high-performance Ti/STO/n+-Si and Ag/STO/n+-Si write-once-read-many-times devices, where the resistance transition mechanisms are controlled by oxygen vacancies in the STO layer and metal atoms from...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure *** of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB *** this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)*** proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three *** proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment *** achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 *** findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based...
详细信息
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based resources are intermittent, but also controllable, and are expected to amplify the role of distribution networks together with other distributed energy resources, such as storage systems and controllable loads. The available control methods for these resources are typically categorized based on the available communication network into centralized, distributed, and decentralized or local. Standard local schemes are typically inefficient, whereas centralized approaches show implementation and cost concerns. This paper focuses on optimized decentralized control of distributed generators via supervised and reinforcement learning. We present existing state-of-the-art decentralized control schemes based on supervised learning, propose a new reinforcement learning scheme based on deep deterministic policy gradient, and compare the behavior of both decentralized and centralized methods in terms of computational effort, scalability, privacy awareness, ability to consider constraints, and overall optimality. We evaluate the performance of the examined schemes on a benchmark European low voltage test system. The results show that both supervised learning and reinforcement learning schemes effectively mitigate the operational issues faced by the distribution network.
The objective of this study is to examine the effectiveness of a hybrid methodology that combines Long Short-Term Memory (LSTM) and k-Nearest Neighbors (k-NN) models in the context of energy prediction within data cen...
详细信息
A biomaterial is a biocompatible substance engineered to interact with biological systems for therapeutic and diagnostic, such as pacemakers, dental implants, vascular stents, artificial joints, drug delivery systems,...
详细信息
The fluctuating nature of lung cancer, which is impacted by recurrent radiation exposure and Computed Tomography (CT) pictures, makes the early detection of the disease challenging. Even seasoned professionals find ma...
详细信息
Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting *** security concerns are still a substantial concern despite its extraordinary *** paper offers an extensive revi...
详细信息
Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting *** security concerns are still a substantial concern despite its extraordinary *** paper offers an extensive review of IoT security,emphasizing the technology’s architecture,important security elements,and common *** highlights how important artificial intelligence(AI)is to bolstering IoT security,especially when it comes to addressing risks at different IoT architecture *** systematically examined current mitigation strategies and their effectiveness,highlighting contemporary challenges with practical solutions and case studies from a range of industries,such as healthcare,smart homes,and industrial *** results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational *** networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning *** study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT,security challenges,and AI-driven solutions.
Holography is the only imaging technology that can faithfully reproduce reflected light from objects. The hologram reproduced on a computer is called a computer-generated hologram (CGH), but the generation of CGH has ...
详细信息
暂无评论