Generalizing visual reinforcement learning is fundamental to robot visual navigation, involving the acquisition of a policy from interactions with source environments to facilitate adaptation to analogous, yet unfamil...
详细信息
ISBN:
(纸本)9798350377712;9798350377705
Generalizing visual reinforcement learning is fundamental to robot visual navigation, involving the acquisition of a policy from interactions with source environments to facilitate adaptation to analogous, yet unfamiliar target environments. Recent advancements capitalize on data augmentation techniques, self-supervised learning methods, and the generative adversarial network framework to train policy neural networks with enhanced generalizability. However, current methods, upon extracting domain-general latent features, further utilize these features to train the reinforcement learning policy, resulting in a decline in the performance of the learned policy guiding the agent to accomplish tasks. To tackle these challenges, a framework of self-expert imitation with purifying latent features was devised, empowering the policy to achieve robust and stable zero-shot generalization performance in visually similar domains previously unseen, without diminishing the performance of guiding the agent to accomplish tasks. The extraction method of domain-general latent features is proposed to enhance their quality based on the variational autoencoder. Extensive experiments have shown that our policy, compared with state-of-the-art counterparts, does not diminish the performance of the policy guiding the agent to accomplish tasks after generalization.
Electrical lighting systems contribute to approximately 20% of global electricity consumption and 6% of carbon dioxide (CO2) emissions, underlining the urgent need for more efficient and adaptable lighting solutions. ...
详细信息
The research presents that the Stream control Transmission Protocol (SCTP) provides a very interesting alternative to classical TCP and UDP, especially in multihoming settings. We therefore specifically sought to test...
详细信息
Hierarchical text classification is an essential task in natural language processing. Existing studies focus only on label hierarchy structure, such as building classifiers for each level of labels or employing the la...
详细信息
ISBN:
(纸本)9783031398209;9783031398216
Hierarchical text classification is an essential task in natural language processing. Existing studies focus only on label hierarchy structure, such as building classifiers for each level of labels or employing the label taxonomic hierarchy to improve the hierarchy classification performance. However, these methods ignore issues with imbalanced datasets, which present tremendous challenges to text classification performance, especially for the tail categories. To this end, we propose Hierarchyaware-Bilateral-Branch-network (HiBBN) to address this problem, where we introduce the bilateral-branch network and apply a hierarchy-aware encoder to model text representation with label dependencies. In addition, HiBBN has two network branches that cooperate with the uniform sampler and reversed sampler, which can deal with the data imbalance problem sufficiently. Therefore, our-model handles both hierarchical structural information and modeling of tail data simultaneously, and extensive experiments on benchmark datasets indicate that our model achieves better performance, especially for fine-grained categories.
The rise of smart cities, driverless automobiles, smart watches, and mobile banking has led to increased reliance on the Internet. Although technology has enormous advantages for people and society, it also introduces...
详细信息
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navig...
详细信息
ISBN:
(纸本)9798350311259
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach networks, often, over multiple network hosts and evades detection. It also uses "low-and-slow" approach over a long period of time. Resource availability, integrity, and confidentiality of the operational cyber-physical systems (CPS) state and control is highly impacted by the safety and security measures in place. A framework multi-stage detection approach termed "APT(DASAC)" to detect different tactics, techniques, and procedures (TTPs) used during various APT steps is proposed. Implementation was carried out in three stages: (i) Data input and probing layer - this involves data gathering and pre-processing, (ii) Data analysis layer;applies the core process of "APT(DASAC)" to learn the behaviour of attack steps from the sequence data, correlate and link the related output and, (iii) Decision layer;the ensemble probability approach is utilized to integrate the output and make attack prediction. The framework was validated with three different datasets and three case studies. The proposed approach achieved a significant attacks detection capability of 86.36% with loss as 0.32%, demonstrating that attack detection techniques applied that performed well in one domain may not yield the same good result in another domain. This suggests that robustness and resilience of operational systems state to withstand attack and maintain system performance are regulated by the safety and security measures in place, which is specific to the system in question.
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogeno...
详细信息
ISBN:
(纸本)9783031785993;9783031786006
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogenous prices. Three settings of the mechanism are considered: (i) benchmark involving no taxation, (ii) optimum tariff, (iii) optimum sanction. The expected utility maximization formulation of the game is extended further by relying on cumulative prospect theory to account for the bounded rationality of the stakeholders. We derive closed-form mappings linking the outcomes of the three settings. Additionally, we assess the impact of bounded rationality through a new performance metric, the Price of Irrationality. Numerical results are derived on a randomized instance of a gas trading game between Europe, Asia, and Russia.
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to int...
详细信息
ISBN:
(纸本)9798331541613;9798331541606
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to introduce a Cascade-Forward Neural network (CFNN) control approach designed to lead inverter-based grids when operating in grid-connected or islanded modes, focusing on improving the transient state performance of the CFNN technique. The suggested approach involves utilizing the inverter in a bidirectional manner, suitable for a diverse array of battery energy storage systems and distributed generation setups. The proposed strategy leverages CFNN to grasp the inverter's non-linear model, enabling precise monitoring of demand and reference power across various operational scenarios within smart grid applications. Furthermore, the approach redefines the grid control concept, guiding the inverter according to optimal parameters that encompass power demand, reference power, equipment dimensions, and external disturbances. Notably, this method circumvents the need for any manual tuning procedures. Furthermore, incorporating dynamic elements into the approach improves the protection system's responsiveness. This ensures continuous power supply during faults, enabling a more effective and rapid response, enhancing system resilience, and reducing downtime. This dual advantage of better power supply and heightened protection system sensitivity highlights the proposed method's significance in fortifying the reliability of power systems.. To assess the efficacy of the suggested CFNN controller, its power tracking, operational capabilities, and dynamic response are assessed via multiple experimental trials employing the hardware-in-the-loop (HIL) approach across various scenarios. The outcomes of these tests are meticulously compared to a well-established conventional strategy, affirming the effectiveness of the proposed method.
In this paper, we discuss the problem of learning state observers for Recurrent Neural network (RNN) black-box models of dynamical systems. State observers are indeed key to designing state-feedback control laws, such...
详细信息
The integration of intrusion detection systems (IDS) is crucial for strengthening network security. Improving IDS performance requires advanced techniques for handling intrusion detection data, with machine learning p...
详细信息
暂无评论