نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
Introduction: In order to deal with temporarily unavailable nodes in a distributed storage system, engineers apply special classes of erasure correction codes. These codes allow you repair node by downloading small amounts data from the remaining ones. However, this creates safety threats presence an eavesdropper. Purpose: Introducing new mathematical model which eavesdropper has limited access...
this paper presents a control strategy developed for optimizing the power flow in a fuel cell hybrid vehicle structure. this method implements an on-line power management based on the optimal fuzzy controller between dual power sources that consist of a battery bank and a fuel cell (fc). the power management strategy in the hybrid control structure is crucial for balancing between efficiency an...
Secure function evaluation (SFE) allows a set of players to compute an arbitrary agreed function of their private inputs, even if an adversary may corrupt some of the players. Secure multi-party computation (MPC) is a generalization allowing to perform an arbitrary on-going (also called reactive or stateful) computation during which players can receive outputs and provide new inputs at intermed...
According to the characteristics of the ac motor starting process, design a fuzzy soft start controller, realize constant current of ac motor soft start control. Using fuzzy soft start controller uses the two-dimensional structure, current deviation and deviation change rate as input, Mining Mamdani inference method of fuzzy reasoning. The controller output to the adjustment of the thyristor tr...
Recent applications of Stackelberg Security Games (SSG), from wildlife crime to urban crime, have employed machine learning tools to learn and predict adversary behavior using available data about defender-adversary interactions. Given these recent developments, this paper commits to an approach of directly learning the response function of the adversary. Using the PAC model, this paper lays a ...
In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, passive, and fail corruption. The adversary’s corruption power is characterized by a so-called adversary structure which enumerates the adversary’s corruption options, each option being a triple (A, E, F ) of subsets of P , where...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید