Search results for "A* algorithm"

showing 10 items of 2538 documents

Optimization of flat area coverage under connectivity constraint in wireless sensor networks

2022

A wireless sensor network consists of a set of small autonomous units that interact via a network built by their communication modules. They observe their environment, capture information, then manage this information according to their computing and/or storage capacity. To effectively accomplish their task(s), they need to cover as much of the area of interest as possible. It is therefore essential to quantify the quality of their coverage. In this thesis, we therefore seek to best cover an area of interest, with a precise number of sensors. While taking into account the possible overlaps between sensors, we first deploy in a zone of regular dimensions and evaluate the exact coverage using…

ConnectivityGenetic AlgorithmConnectivitéAlgorithme génétiqueInternet des objets[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingRéseaux de capteurs sans filInternet Of ThingsCouverture de zoneWireless sensor networksArea Coverage
researchProduct

Decentralized unscented Kalman filter based on a consensus algorithm for multi-area dynamic state estimation in power systems

2015

Abstract A decentralized unscented Kalman filter (UKF) method based on a consensus algorithm for multi-area power system dynamic state estimation is presented in this paper. The overall system is split into a certain number of non-overlapping areas. Firstly, each area executes its own dynamic state estimation based on local measurements by using the UKF. Next, the consensus algorithm is required to perform only local communications between neighboring areas to diffuse local state information. Finally, according to the global state information obtained by the consensus algorithm, the UKF is run again for each area. Its performance is compared with the distributed UKF without consensus algori…

Consensus algorithmEstimationMathematical optimizationElectric power systemEngineeringControl theorybusiness.industryEnergy Engineering and Power TechnologyState (computer science)State informationKalman filterElectrical and Electronic EngineeringbusinessInternational Journal of Electrical Power & Energy Systems
researchProduct

A greedy perturbation approach to accelerating consensus algorithms and reducing its power consumption

2011

The average consensus is part of a family of algorithms that are able to compute global statistics by only using local data. This capability makes these algorithms interesting for applications in which these distributed philosophy is necessary. However, its iterative nature usually leads to a large power consumption due to the repetitive communications among the iterations. This drawback highlights the necessity of minimizing the power consumption until consensus is reached. In this work, we propose a greedy approach to perturbing the connectivity graph, in order to improve the convergence time of the consensus algorithm while keeping bounded the power consumption per iteration step. These …

Consensus algorithmMathematical optimizationIterative methodBounded functionPerturbation (astronomy)Graph theoryNetwork topologyWireless sensor networkDrawbackMathematics2011 IEEE Statistical Signal Processing Workshop (SSP)
researchProduct

On the Robust Synthesis of Logical Consensus Algorithms for Distributed Intrusion Detection

2013

We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on the value of a shared logical vector function depending on binary input events. Based on results on the convergence of finite--state iteration systems, we provide a technique to design logical consensus systems that minimize the number of messages to be exchanged and the number of steps before consensus is reached, and that can tolerate a bounded number of failed or malicious agents. We provide sufficient joint conditions on the input visibility and the communication topology for the method's applicability. We describe the application of our method to two distributed network intrusion detecti…

Consensus algorithmTheoretical computer scienceComputer scienceDistributed computingVisibility (geometry)Binary numberValue (computer science)Topology (electrical circuits)Computer Science::Multiagent SystemsSettore ING-INF/04 - AutomaticaControl and Systems EngineeringConsensus distributed algorithms intrusion detection security.Bounded functionConvergence (routing)Electrical and Electronic EngineeringVector-valued function
researchProduct

Applications of Harten’s Framework for Multiresolution: From Conservation Laws to Image Compression

2002

We briefly review Harten’s framework for multiresolution decompositions and describe two situations in which two different instances of the general framework have been used with success.

Conservation lawTheoretical computer scienceThresholding algorithmBiorthogonal waveletImage compressionMathematics
researchProduct

Constraint qualifications and Lagrange multipliers in nondifferentiable programming problems

1994

In this paper, we present several constraint qualifications, and we show that these conditions guarantee the nonvacuity and the boundedness of the Lagrange multiplier sets for general nondifferentiable programming problems. The relationships with various constraint qualifications are investigated.

Constraint (information theory)Constraint algorithmsymbols.namesakeMathematical optimizationControl and OptimizationComputingMilieux_THECOMPUTINGPROFESSIONApplied MathematicsLagrange multiplierTheory of computationsymbolsManagement Science and Operations ResearchConstraint satisfactionMathematicsJournal of Optimization Theory and Applications
researchProduct

Exact and Approximate Algorithms for Two–Criteria Topological Design Problem of WAN with Budget and Delay Constraints

2004

This paper studies the problem of designing wide area networks (WAN). In the paper the two-criteria topology assignment problem with two constraints is considered. The goal is select flow routes, channel capacities and network topology in order to minimize the total average delay per packet and the leasing cost of channels subject to the budget constraint and delay constraint. The problem is NP-complete. Then, the branch and bound method is used to construct the exact algorithm. Also the approximate algorithm is presented. Some computational results are reported. Based on computational experiments, several properties of the considered problem are formulated.

Constraint (information theory)Mathematical optimizationExact algorithmConstraint satisfaction dual problemTopology (electrical circuits)TopologyNetwork topologyAssignment problemAlgorithmBudget constraintMathematicsCommunication channel
researchProduct

The Two-Criteria Topological Design Problem in WAN with Delay Constraint: An Algorithm and Computational Results

2003

The problem is concerned with designing of wide area networks (WAN). The problem consists in selection of flow routes, channel capacities and wide area network topology in order to minimize the total average delay per packet and the leasing cost of channels subject to delay constraint. The problem is NP complete. Then, the branch and bound method is used to construct the exact algorithm. Lower bound of the criterion function is proposed. Computational results are reported. Based on computational experiments, several properties of the considered problem are formulated.

Constraint (information theory)Mathematical optimizationExact algorithmFlow (mathematics)Network packetWide area networkTopology (electrical circuits)TopologyUpper and lower boundsAlgorithmCommunication channelMathematics
researchProduct

Exception-Tolerant Hierarchical Knowledge Bases for Forward Model Learning

2021

This article provides an overview of the recently proposed forward model approximation framework for learning games of the general video game artificial intelligence (GVGAI) framework. In contrast to other general game-playing algorithms, the proposed agent model does not need a full description of the game but can learn the game's rules by observing game state transitions. Based on hierarchical knowledge bases, the forward model can be learned and revised during game-play, improving the accuracy of the agent's state predictions over time. This allows the application of simulation-based search algorithms and belief revision techniques to previously unknown settings. We show that the propose…

Context modelComputer sciencebusiness.industryComputingMilieux_PERSONALCOMPUTINGApproximation algorithmContext (language use)Belief revisionKnowledge-based systemsArtificial IntelligenceControl and Systems EngineeringSearch algorithmReinforcement learningArtificial intelligenceElectrical and Electronic EngineeringbusinessVideo gameSoftwareIEEE Transactions on Games
researchProduct

Partial Discharges analysis and parameters identification by continuous Ant Colony Optimization

2008

The technique of ant colony optimization has been employed in this paper to efficiently deal with the problem of parameters identification in partial discharge, PD, analysis. The latter is a continuous optimization problem. From the technical point of view the identification of these parameters allows the modeling of the phenomenon of Partial Discharges in dielectrics. In this way it is possible the early diagnosis of defects in Medium Voltage cable lines and components and thus it is possible to prevent possible outages and service interruptions. Analytically, the problem consists of finding the Weibull parameters of the Pulse Amplitude Distribution (PAD) distributions allowing the identif…

Continuous optimizationMathematical optimizationEstimation theoryComputer scienceCumulative distribution functionAnt colony optimization algorithmsAnt colonyAlgorithmSearch treeEvolutionary computationWeibull distribution2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)
researchProduct