Showing 341 - 360 results of 1,487 for search 'agent’s state', query time: 0.06s Refine Results
  1. 341

    Predictive channel scheduling algorithm between macro base station and micro base station group by Yinghai XIE, Ruohe YAO, Bin WU

    Published 2019-11-01
    “…A novel predictive channel scheduling algorithm was proposed for non-real-time traffic transmission between macro-base stations and micro-base stations in 5G ultra-cellular networks.First,based on the stochastic stationary process characteristics of wireless channels between stationary communication agents,a discrete channel state probability space was established for the scheduling process from the perspective of classical probability theory,and the event domain was segmented.Then,the efficient scheduling of multi-user,multi-non-real-time services was realized by probability numerical calculation of each event domain.The theoretical analysis and simulation results show that the algorithm has low computational complexity.Compared with other classical scheduling algorithms,the new algorithm can optimize traffic transmission in a longer time dimension,approximate the maximum signal-to-noise ratio algorithm in throughput performance,and increase system throughput by about 14% under heavy load.At the same time,the new algorithm is accurate.Quantitative computation achieves a self-adaption match between the expected traffic rate and the actual scheduling rate.…”
    Get full text
    Article
  2. 342

    Battery Energy Storage Systems in Microgrids: A Review of SoC Balancing and Perspectives by Thales Augusto Fagundes, Guilherme Henrique Favaro Fuzato, Lucas Jonys Ribeiro Silva, Augusto Matheus dos Santos Alonso, Juan C. Vasquez, Josep M. Guerrero, Ricardo Quadros Machado

    Published 2024-01-01
    “…In this context, an energy management system (EMS) is necessary to incorporate BESS in MGs. Consequently, state-of-charge (SoC) equalization is a common approach to address EMS requirements and balance the internal load among BESS units in MG operation. …”
    Get full text
    Article
  3. 343

    An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems by Ping Yu, Ding Yang, Khalid A. Alattas, Ardashir Mohammadzadeh, Afef Fekih

    Published 2025-01-01
    “…To this end, a fractional order extended state observer (FOESO) is adopted to predict the tremor measurement signals of the accelerometer sensor. …”
    Get full text
    Article
  4. 344
  5. 345
  6. 346
  7. 347
  8. 348
  9. 349

    Making virtual learning environment more intelligent: application of Markov decision process by Dalia Baziukaitė

    Published 2004-12-01
    “… Suppose there exist a Virtual Learning Environment in which agent plays a role of the teacher. With time it moves to different states and makes decisions on which action to choose for moving from current state to the next state. …”
    Get full text
    Article
  10. 350
  11. 351
  12. 352

    Isolation of Corynebacterium pseudotuberculosis Biovar equi from a Horse in Central Iowa by Kate L. Hepworth-Warren, Beatrice T. Sponseller, David M. Wong, Joann M. Kinyon

    Published 2014-01-01
    “…The agent is typically identified in the Western United States but has recently been identified in Canada; it has not previously been documented as cause of infection in horses in Iowa. …”
    Get full text
    Article
  13. 353
  14. 354
  15. 355
  16. 356

    IMMUNOPROPHYLAXIS OF CANINE PARVOVIRAL ENTERITIS by A. V. Shatalov, S. P. Dannikov, A. N. Kononov, V. S. Skripkin

    Published 2019-01-01
    “…Data on the specifcity of the development of post-vaccination immunity against parvovirus enteritis agent in dogs are summarized and analyzed in the review. …”
    Get full text
    Article
  17. 357
  18. 358
  19. 359
  20. 360

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article