This article studies the performance of different evolutionary strategies for deep reinforcement learning policy optimization. The policy will be centred in an important swarm robotic task: the aggregation of simple r...
详细信息
An essential part of wireless sensor networks (WSN) is managing congestion, which occurs when the amount of traffic exceeds the combined or individual capacities of the underlying channel. As a result, developing more...
详细信息
Graphs are used to represent complex structures in patternrecognition and computer vision. In various applications, these complex structures must be classified, recognized, or compared with one another. Except for sp...
详细信息
The proceedings contain 25 papers. The special focus in this conference is on Ada 95 and Java. The topics include: Embedded opportunities;porting the GNAT tasking runtime system to the java virtual machine;automating ...
ISBN:
(纸本)3540645365
The proceedings contain 25 papers. The special focus in this conference is on Ada 95 and Java. The topics include: Embedded opportunities;porting the GNAT tasking runtime system to the java virtual machine;automating the ada binding process for java;synchronizing multiple clients and servers;how to avoid the inheritance anomaly in ada;inside the distributed systems annex;integrating groups and transactions;implementing and using execution time clocks in ada hard real-time applications;programming hard real-time systems with optional components in ada 102;object oriented abstractions for real-time distributed systems;ada 95 for a distributed simulation system;a portable API for industrial robots;a portable testing facility for ASIS;a two-level matching mechanism for object-oriented class libraries;modern avionics requirements for the distributed systems annex;symbolic reaching definitions analysis of ada programs;looking at code with your safety goggles on and the ravenscar tasking profile for high integrity real-time programs .
The unmanned automatic vehicles (UAV) are important elements in industrial application, such as unmanned carriers in warehouse. With the great progress in the intelligent transportation systems, the UAVs are often app...
详细信息
ISBN:
(纸本)9783642165832
The unmanned automatic vehicles (UAV) are important elements in industrial application, such as unmanned carriers in warehouse. With the great progress in the intelligent transportation systems, the UAVs are often applied to drive automatically. The mechanical vision replaces the human's eyes to be the feedback component. By the image processing, the necessary information can be figured out. However, due to the complicate calculation of image process, it will take a long calculation time from fetching image to making image information. Hence, a novel control rule that is the Grey-Fuzzy-Fuzzy controller is proposed in this paper for vision guided control of UAVs. The novel rule consists of the base-layer and upper-layer fuzzy controllers. The base-layer fuzzy controller is the classical fuzzy controller using the position error and the error difference to be the input variables. The Grey prediction is used to estimate the position error at the time of making image information. Then, the upper-layer fuzzy controller uses the two input variables, which are the estimated position error and the estimated error difference, to correct the base-layer fuzzy controller's output signal. Finally, an experimental UAV is developed to examine the potential of the proposed control scheme. The vision-based experiment of automatically driving of lane-following is carried out in this paper. The experimental results show the proposed controller will eliminate the swinging phenomenon and increase the accuracy while tracking. The experimental results also show the practical capability of the Grey-Fuzzy-Fuzzy controller.
Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome;a problem encountered in many areas such as machine learning, patternrecognition and signal proces...
详细信息
ISBN:
(纸本)3540286535
Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome;a problem encountered in many areas such as machine learning, patternrecognition and signal processing. In particular, solution to this has found successful application in tasks that involve datasets containing huge numbers of features (in the order of tens of thousands), which would be impossible to process further. Recent examples include text processing and web content classification. Rough set theory has been used as such a dataset pre-processor with much success, but current methods are inadequate at finding minimal reductions, the smallest sets of features possible. This paper proposes a technique that considers this problem from a propositional satisfiability perspective. In this framework, minimal subsets can be located and verified. An initial experimental investigation is conducted, comparing the new method with a standard rough set-based feature selector.
This contribution introduces a software framework enabling researchers to develop real-time patternrecognition and sensor fusion applications in an abstraction level above that of common programming languages in orde...
详细信息
This contribution introduces a software framework enabling researchers to develop real-time patternrecognition and sensor fusion applications in an abstraction level above that of common programming languages in order to reduce and minimize programming errors and technical obstacles. Furthermore, a proof of concept using two separate instances of the process engine on different computers with audiovisual data processing is described. The scenario shows the capability of the engine to process data in realtime and synchronously on multiple machines, which are necessary features in large scale projects.
In the member of mud crab, species of Scylla are the most traded seafood commodity in Asia and the culturing practice is already done in most of Asia country a few years ago. The demand for mud crabs has increased rap...
详细信息
The proceedings contain 67 papers. The special focus in this conference is on Next Generation Wired/Wireless Networking. The topics include: Detecting PII Leakage Using DPI and machine Learning in an En...
ISBN:
(纸本)9783031609961
The proceedings contain 67 papers. The special focus in this conference is on Next Generation Wired/Wireless Networking. The topics include: Detecting PII Leakage Using DPI and machine Learning in an Enterprise Environment;deep Learning for Preventing Botnet Attacks on IoT;Design of Multi-polarisation MIMO Antenna for Heterogeneous Smartphone Applications;potential Possibilities of Voice patternrecognition by a Distributed Fiber Optic Sensor;Enhancing Wireless Connectivity Through Bayesian-Optimized UAV-BS Positioning and Charging;comparison of Centralized and Federated machine Learning Techniques for Beamtracking in 5G/6G Systems;exploring the Efficiencies and Vulnerabilities of Smart Door Control Systems: A Systematic Review;System-Level Model for SINR and HPBW Evaluation in 5G mmWave UDN with Location-Aware Beamforming;reinforcement Learning Based Power Allocation for 6G Heterogenous Networks;The Impact of Capacity Averaging in Packet-Level Modeling of 5G NR with Blockage and Micromobility;Interference Mitigation for Reconfigurable Intelligent Surface (RIS)-Aided Non-terrestrial Base Station (NTBS) in NOMA Downlink HetNets;modeling a Digital Avatar of a Car Drivers Based on the Quantification of the Information Environment;A New Blockage Detection Approach for 6G THz Systems;real-Time Anomaly Detection in Network Traffic Using Graph Neural Networks and Random Forest;addressing Security and Privacy Issues in a Smart Environment by Using Blockchain as a Preemptive Technique;the Role of Cryptocurrencies in the Development of Countries and the Fight Against Financial Problems;Designing the UzBCS Lending Platform Network Based on Blockchain Technology and Ensure Transaction Security;decentralized Blockchain Networks and Economic Security: Balancing Scalability and Security Tradeoffs;study of machine Learning Models for IoT Based Efficient Classroom Usage;transforming Higher Education: A Comprehensive Analysis of Blockchain Technologies and Digitalization.
This book constitutes the thoroughly refereed post-conference proceedings of the Second international Symposium on Intelligent Informatics (ISI 2013) held in Mysore, India during August 23-24, 2013. The 47 revised pap...
详细信息
ISBN:
(数字)9783319017785
ISBN:
(纸本)9783319017778
This book constitutes the thoroughly refereed post-conference proceedings of the Second international Symposium on Intelligent Informatics (ISI 2013) held in Mysore, India during August 23-24, 2013. The 47 revised papers presented were carefully reviewed and selected from 126 initial submissions. The papers are organized in topical sections on patternrecognition, signal and image processing; data mining, clustering and intelligent information systems; multi agent systems; and computer networks and distributed systems. The book is directed to the researchers and scientists engaged in various fields of intelligent informatics.
暂无评论