Time-Critical Wireless Network (TCWN) is a promising communication technology that can satisfy the low latency, high reliability, and deterministic requirements of mission-critical applications. Multiple TCWNs require...
详细信息
In this paper, the model predictive control (MPC) problem is investigated for the constrained discrete-time Takagi-Sugeno fuzzy Markovian jump systems (FMJSs) under imperfect premise matching rules. To strike a balanc...
详细信息
This paper studies the quantitative measurement method of risk occurrence and possible spread among petrochemical supply chain enterprise nodes. Combined with the characteristics of petrochemical supply chain network,...
详细信息
We propose an unsupervised person search method for video surveillance. This method considers both the spatial features of persons within each frame and the temporal relationship of the same person among different fra...
详细信息
Although LiDAR semantic segmentation advances rapidly, state-of-the-art methods often incorporate specifically designed inductive bias derived from benchmarks originating from mechanical spinning LiDAR. This can limit...
详细信息
To solve the problem of ship heave motion in harsh marine environments, which affects the positioning accuracy and safety of its robotic arm, this paper adopts a PID parameter optimization method based on Tent cold li...
详细信息
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, ...
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, we propose a distributed topology-preserving algorithm for second-order multi-agent systems by adding noisy inputs. The major novelty is that we develop a strategic compensation approach to overcome the noise accumulation issue in the second-order dynamic process while ensuring the exact second-order consensus. Specifically, we design two distributed compensation strategies that make the topology more invulnerable against inference attacks. Furthermore, we derive the relationship between the inference error and the number of observations by taking the ordinary least squares estimator as a benchmark. Extensive simulations are conducted to verify the topology-preserving performance of the proposed algorithm.
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ...
详细信息
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense ***,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense *** designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions.
This paper utilizes the weak approximation method to analyze differential games that involve mixed strategies. Mixed strategies have the potential to produce unique strategic behaviors, whereas traditional models and ...
This paper utilizes the weak approximation method to analyze differential games that involve mixed strategies. Mixed strategies have the potential to produce unique strategic behaviors, whereas traditional models and tools in pure strategy games cannot be directly applied. Based on the stochastic processes with independent increments, we define the mixed strategy without assuming the knowledge of the opponents' strategy and system state. However, this general mixed strategy poses challenges in evaluating game payoff and game value. To overcome these challenges, we utilize the weak approximation method to employ a stochastic differential game to characterize the dynamics of the mixed strategy game. We demonstrate that the game's payoff function can be precisely approximated with an error of the same scale as the step size. Furthermore, we estimate the upper and lower value functions of the weak approximated game to analyze the existence of game value. Finally, we provide numerical examples to illustrate and elaborate on our findings.
Texture defect detection has wide applications in both textiles and industry, where traditional defect detection methods focus on costly manual labeling and defect samples are complex to collect in real-world industri...
详细信息
暂无评论