In this paper, the model predictive control (MPC) problem is investigated for the constrained discrete-time Takagi-Sugeno fuzzy Markovian jump systems (FMJSs) under imperfect premise matching rules. To strike a balanc...
详细信息
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ...
详细信息
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense ***,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense *** designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions.
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, ...
The interaction topology plays a significant role in the collaboration of multiagent systems. How to preserve the topology against inference attacks has become an imperative task for security concerns. In this paper, we propose a distributed topology-preserving algorithm for second-order multi-agent systems by adding noisy inputs. The major novelty is that we develop a strategic compensation approach to overcome the noise accumulation issue in the second-order dynamic process while ensuring the exact second-order consensus. Specifically, we design two distributed compensation strategies that make the topology more invulnerable against inference attacks. Furthermore, we derive the relationship between the inference error and the number of observations by taking the ordinary least squares estimator as a benchmark. Extensive simulations are conducted to verify the topology-preserving performance of the proposed algorithm.
This paper utilizes the weak approximation method to analyze differential games that involve mixed strategies. Mixed strategies have the potential to produce unique strategic behaviors, whereas traditional models and ...
This paper utilizes the weak approximation method to analyze differential games that involve mixed strategies. Mixed strategies have the potential to produce unique strategic behaviors, whereas traditional models and tools in pure strategy games cannot be directly applied. Based on the stochastic processes with independent increments, we define the mixed strategy without assuming the knowledge of the opponents' strategy and system state. However, this general mixed strategy poses challenges in evaluating game payoff and game value. To overcome these challenges, we utilize the weak approximation method to employ a stochastic differential game to characterize the dynamics of the mixed strategy game. We demonstrate that the game's payoff function can be precisely approximated with an error of the same scale as the step size. Furthermore, we estimate the upper and lower value functions of the weak approximated game to analyze the existence of game value. Finally, we provide numerical examples to illustrate and elaborate on our findings.
Deep learning methods have achieved remarkable results in the direction of image quality assessment tasks. However, most of the related studies focus only on image unimodal, ignoring the potential advantages that come...
详细信息
With the growing global energy demand and requirement for environmental protection, renewable energy is attracting attention as a vital development direction. Particularly, wind power is rapidly developing as a clean ...
详细信息
This paper focuses on the vision-based autonomous landing mission of a quadrotor unmanned aerial vehicle (UAV). A double-layered nested Aruco landing marker is designed which can adapt to the situation that the field ...
详细信息
This paper presents a study on the robust stability analysis of linear time-invariant systems with parameter uncertainties and norm-bounded uncertainties. By utilizing the structured singular value, necessary and suff...
This paper presents a study on the robust stability analysis of linear time-invariant systems with parameter uncertainties and norm-bounded uncertainties. By utilizing the structured singular value, necessary and sufficient conditions for robust stability are derived. Based on the stability condition, the stability margin of the uncertain system is obtained from the skewed structured singular value. Additionally, numerical simulation results are provided to validate the effectiveness of the proposed methods.
In image fusion,the desirable fused image is to obtain advantage information from different images of the same *** for the fusion of the infrared image and the visible image that have distinct features,this paper prop...
In image fusion,the desirable fused image is to obtain advantage information from different images of the same *** for the fusion of the infrared image and the visible image that have distinct features,this paper proposes an adaptive multiweight fusion based on multi-scale *** method designs different weight matrices according to the characteristics of the infrared image and the visible *** can also adaptively adjusts the weight size according to the *** on the difference of information entropy between infrared images and visible images,the method of this paper can keep the important information as much as *** results prove the method of this paper is fast and *** also has certain superiority compared with other methods.
With the continuous improvement of various high-performance computing systems, various data centers had also been fully expanded. Energy consumption and actual performance measurement were very important indicators, w...
详细信息
暂无评论