Branch-and-bound is a systematic enumerative method for combinatorial optimization, where the performance highly relies on the variable selection strategy. State-of-theart handcrafted heuristic strategies suffer from ...
详细信息
ISBN:
(数字)9781665490627
ISBN:
(纸本)9781665490627
Branch-and-bound is a systematic enumerative method for combinatorial optimization, where the performance highly relies on the variable selection strategy. State-of-theart handcrafted heuristic strategies suffer from relatively slow inference time for each selection, while the current machinelearning methods require a significant amount of labeled data. We propose a new approach for solving the data labeling and inference latency issues in combinatorial optimization based on the use of the reinforcement learning (RL) paradigm. We use imitation learning to bootstrap an RL agent and then use Proximal Policy Optimization (PPO) to further explore global optimal actions. then, a value network is used to run Monte-Carlo tree search (MCTS) to enhance the policy network. We evaluate the performance of our method on four different categories of combinatorial optimization problems and show that our approach performs strongly compared to the state-of-the-art machinelearning and heuristics based methods.
the proceedings contain 44 papers. the topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distan...
ISBN:
(纸本)9798350329599
the proceedings contain 44 papers. the topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distance monitoring, systems using YOLOv5;IMU-based human activity recognition using machinelearning and deep learning models;enhancing brain tumor aid diagnosis with augmented reality rendering-based 6 DoF object pose estimation;secure key exchange scheme and blockchain-oriented data protection in the internet of vehicles;an intelligent edge-deployable indoor air quality monitoring and activity recognition approach;DiffT: a novel approach for privacy preserving data analytics;using data integration platform for effective location-aware service development platform;hybrid whale-mud-ring optimization for precise color skin cancer image segmentation;and an extensive evaluation of plant disease detection using diverse machinelearning approaches.
mining operations, on a global scale, experience challenges in ensuring high availability and utilization of their haul trucks for optimum production. Most of the shortfalls in availability are due to mechanical break...
详细信息
Endotracheal Suctioning (ETS) is a critical procedure typically carried out to patients with artificial airways in intensive care units. It is an extremely delicate procedure requiring adequate expertise to minimize t...
详细信息
the use of social media becomes a must for almost all businesses, including micro and small enterprises. Despite the benefits of social media marketing, the feedbacks and responses retrieved from audience or customers...
详细信息
ISBN:
(纸本)9783031669644;9783031669651
the use of social media becomes a must for almost all businesses, including micro and small enterprises. Despite the benefits of social media marketing, the feedbacks and responses retrieved from audience or customers via posts and comments in social media could be a challenge. Comments received could be negative in nature, which could affect the businesses in a negative way. the negative influence could jeopardize the business reputation, especially if the comments are highly negative and go viral. In sustaining their businesses, the micro and small business owners should not be left behind in using the latest analysis method in securing their business reputation. this paper proposes a simple website that makes use of the back-end sentiment analysis, to detect negative influence on their products and businesses. the results are presented in the form of process flow and interface design of the proposed website, made simple for the target users.
In the 21st-century information age, withthe development of big data technology, effectively extracting valuable information from massive data has become a key issue. Traditional datamining methods are inadequate wh...
详细信息
this paper proposes a shadow puppetry motion capture and digital protection system based on deep learning and machine vision technology. the system uses a high-precision camera to collect the motion data of shadow pup...
详细信息
this study provides a general overview of face recognition technology's incorporation with artificial intelligence, which has emerged as an important component to enhance a nation’s security in respect of interna...
详细信息
We investigate a cross-sensor recognition algorithm for heterogeneous sensors based on shared representation learning to address the difficulty of non-cooperative object recognition in C4ISR systems due to modal barri...
详细信息
the proceedings contain 18 papers. the special focus in this conference is on Software Testing, machinelearning and Complex Process Analysis. the topics include: Link Graph and data-Driven Graphs as Complex Networks:...
ISBN:
(纸本)9783031504228
the proceedings contain 18 papers. the special focus in this conference is on Software Testing, machinelearning and Complex Process Analysis. the topics include: Link Graph and data-Driven Graphs as Complex Networks: Comparative Study;An Approach to Creating a Synthetic Financial Transactions dataset Based on an NDA-Protected dataset;optic Flow Approximated by a Homogeneous, three-Dimensional Point Renewal Process;fair Mutual Exclusion for N Processes;data Stream Processing in Reconciliation Testing: Industrial Experience;Detection of Flying Objects Using the YOLOv4 Convolutional Neural Network;modern Experiment Management Systems Architecture for Scientific Big data;an Approach to Modules Similarity Definition Based on System Trace Analysis;process mining Algorithm for Online Intrusion Detection System;bayesian Optimization with Time-Decaying Jitter for Hyperparameter Tuning of Neural Networks;investigation of the Capabilities of Artificial Neural Networks in the Problem of Classifying Objects with Dynamic Features;analysis of Hardware-Implemented U-Net–Like Convolutional Neural Networks;early Detection of Tasks with Uncommonly Long Run Duration in Post-trade Systems;Unpaired Image-To-Image Translation Using Transformer-Based CycleGAN;model-Based Testing Approach for Financial Technology Platforms: An Industrial Implementation;searching for Deviations in Trading Systems: Combining Control-Flow and data Perspectives.
暂无评论