Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Distributed resource allocation of second‐order nonlinear multiagent systems
S Li, X Nian, Z Deng, Z Chen… - International Journal of …, 2021 - Wiley Online Library
This article investigates a resource allocation problem of second‐order nonlinear multiagent
systems. The resource allocation problem arises from many fields such as economic …
systems. The resource allocation problem arises from many fields such as economic …
Distributed resource allocation of second‐order multiagent systems with exogenous disturbances
S Li, X Nian, Z Deng - … Journal of Robust and Nonlinear Control, 2020 - Wiley Online Library
In this paper, we study the resource allocation problem of second‐order multiagent systems
with exogenous disturbances, and the communication networks are weight‐balanced …
with exogenous disturbances, and the communication networks are weight‐balanced …
[PDF][PDF] An adaptive confidentiality security service enhancement protocol using image-based key generator for multi-agent ethernet packet switched networks
Conventional network Security Protocols provide different types of security services that
establish secure connections between network nodes making them robust against different …
establish secure connections between network nodes making them robust against different …
Identifying malicious behavior in MANET: a survey
P Deshmukh, Y Rai… - International Journal of …, 2015 - search.proquest.com
A mobile ad hoc network (MANET) is auto configurable network of devices without any
wires. The device in this environment is free to move randomly in any direction. These types …
wires. The device in this environment is free to move randomly in any direction. These types …
[PDF][PDF] Position-Based Multipath Route Switching Protocol for Intelligent VANETs Using
WCF Model - 2022 - ijeetc.com
The high dynamicity in VANET topology increases the possibility of frequently broken links
and degraded the type of service provided to its customers (ie, comfort and safety services) …
and degraded the type of service provided to its customers (ie, comfort and safety services) …
A real-time multi-agent system for cryptographic key generation using imaging-based textural features
Traditional network security protocols depend on exchanging the security keys between the
network nodes, and thus opposing the network to different classes of security threats. In this …
network nodes, and thus opposing the network to different classes of security threats. In this …
Distributed optimization of second-order multi-agent systems with external disturbance over weight-balanced digraphs
S Li, X Nian, Z Deng - 2019 Chinese Control Conference (CCC), 2019 - ieeexplore.ieee.org
This paper studies a distributed optimization problem of second-order multi-agent systems
with external disturbance under weight-balanced digraphs. In order to find the exact optimal …
with external disturbance under weight-balanced digraphs. In order to find the exact optimal …
[PDF][PDF] An agent-based simulation model of dynamic real-time traffic signal controller
Traffic management has a key role within intelligent transportation systems (ITS). An efficient
traffic control system leads to less fuel consumption, gas emissions, and transportation …
traffic control system leads to less fuel consumption, gas emissions, and transportation …
[PDF][PDF] Year of Publication: 2016
P Deshmukh, AM Deshpande - 2016 - academia.edu
A mobile ad hoc network (MANET) is auto configurable system. This environment allows us
to move haphazardly in any path. These sorts of system are in some cases self-controlled or …
to move haphazardly in any path. These sorts of system are in some cases self-controlled or …
[ЦИТИРОВАНИЕ][C] Identifying and Securing Malicious Behavior in MANET
P Deshmukh, Y Rai… - International Journal of …, 2015 - ui.adsabs.harvard.edu
Identifying and Securing Malicious Behavior in MANET - NASA/ADS Now on home page ads
icon ads Enable full ADS view NASA/ADS Identifying and Securing Malicious Behavior in …
icon ads Enable full ADS view NASA/ADS Identifying and Securing Malicious Behavior in …