Distributed resource allocation of second‐order nonlinear multiagent systems

S Li, X Nian, Z Deng, Z Chen… - International Journal of …, 2021 - Wiley Online Library
This article investigates a resource allocation problem of second‐order nonlinear multiagent
systems. The resource allocation problem arises from many fields such as economic …

Distributed resource allocation of second‐order multiagent systems with exogenous disturbances

S Li, X Nian, Z Deng - … Journal of Robust and Nonlinear Control, 2020 - Wiley Online Library
In this paper, we study the resource allocation problem of second‐order multiagent systems
with exogenous disturbances, and the communication networks are weight‐balanced …

[PDF][PDF] An adaptive confidentiality security service enhancement protocol using image-based key generator for multi-agent ethernet packet switched networks

JF Abukhait, MS Saleh - International Journal of Electrical and Electronic …, 2023 - ijeetc.com
Conventional network Security Protocols provide different types of security services that
establish secure connections between network nodes making them robust against different …

Identifying malicious behavior in MANET: a survey

P Deshmukh, Y Rai… - International Journal of …, 2015 - search.proquest.com
A mobile ad hoc network (MANET) is auto configurable network of devices without any
wires. The device in this environment is free to move randomly in any direction. These types …

[PDF][PDF] Position-Based Multipath Route Switching Protocol for Intelligent VANETs Using

WCF Model - 2022 - ijeetc.com
The high dynamicity in VANET topology increases the possibility of frequently broken links
and degraded the type of service provided to its customers (ie, comfort and safety services) …

A real-time multi-agent system for cryptographic key generation using imaging-based textural features

J Abukhait, M Saleh - International Journal of Information …, 2019 - inderscienceonline.com
Traditional network security protocols depend on exchanging the security keys between the
network nodes, and thus opposing the network to different classes of security threats. In this …

Distributed optimization of second-order multi-agent systems with external disturbance over weight-balanced digraphs

S Li, X Nian, Z Deng - 2019 Chinese Control Conference (CCC), 2019 - ieeexplore.ieee.org
This paper studies a distributed optimization problem of second-order multi-agent systems
with external disturbance under weight-balanced digraphs. In order to find the exact optimal …

[PDF][PDF] An agent-based simulation model of dynamic real-time traffic signal controller

A Aljaafreh, M Saleh, N Al-Oudat… - International Journal of …, 2020 - academia.edu
Traffic management has a key role within intelligent transportation systems (ITS). An efficient
traffic control system leads to less fuel consumption, gas emissions, and transportation …

[PDF][PDF] Year of Publication: 2016

P Deshmukh, AM Deshpande - 2016 - academia.edu
A mobile ad hoc network (MANET) is auto configurable system. This environment allows us
to move haphazardly in any path. These sorts of system are in some cases self-controlled or …

[ЦИТИРОВАНИЕ][C] Identifying and Securing Malicious Behavior in MANET

P Deshmukh, Y Rai… - International Journal of …, 2015 - ui.adsabs.harvard.edu
Identifying and Securing Malicious Behavior in MANET - NASA/ADS Now on home page ads
icon ads Enable full ADS view NASA/ADS Identifying and Securing Malicious Behavior in …