The integration of artificial intelligence (AI) into Clinical Decision Support systems (CDSS) is changing the face of healthcare by allowing AI powered predictive, datadriven insights, enabling medical practitioners ...
详细信息
Federated learning is a new family of privacy-preserving machine learning, tackling at the same time the most demanding challenges set by data-drivensystems. In this paper, we attempt to present a study on federated ...
详细信息
In this study, we introduce an innovative gait learning methodology for three-dimensional bipedal robots, integrating Hybrid Zero Dynamics (HZD) priors with periodic reward functions to enhance gait stability, symmetr...
详细信息
GPUs are used in products from ultra-low power mobile devices to high performance machine learning accelerators in data centers. Across the products, power and power delivery have become top limiters to performance an...
ISBN:
(纸本)9798350351248;9798350351231
GPUs are used in products from ultra-low power mobile devices to high performance machine learning accelerators in data centers. Across the products, power and power delivery have become top limiters to performance and are key considerations in the early stages of product definition and design. In particular, the power and power delivery problem has been significantly exacerbated with the recent trends in the growth of AI workloads. In this paper, we present some of the data centers driven power optimizations used in latest generation of AMD GPUs including the recently announced AMD Instinct (TM) MI300 GPU. To this end, we cover power and power delivery optimization techniques spanning the product life cycle from architecture, physical design, validation, test, and manufacturing with an eye on the challenges in the road ahead.
Machine learning based security monitoring can be used to detect cyberattacks and malfunctions in cyberphysical production systems. Acquiring real data sets for training machine learning algorithms is a problem due to...
详细信息
ISBN:
(纸本)9781665493130
Machine learning based security monitoring can be used to detect cyberattacks and malfunctions in cyberphysical production systems. Acquiring real data sets for training machine learning algorithms is a problem due to high costs, low data quality, data diversity, and the violation of privacy policies. This paper introduces CyberSyn, a novel approach to generate synthetic data sets for machine learning based security monitoring systems. The generated data sets are analyzed using data quality metrics. Two scenarios from process manufacturing and industrial communication networks are used to evaluate the introduced approach. The proposed approach is able to generate synthetic data sets for both scenarios.
Sign Language Recognition has grown to be increasingly important as a mean to improve the access and effective communication for the hearing impaired through Human Computer Interaction (HCI). This paper presents a hyb...
详细信息
Optimal control of general nonlinear systems is a central challenge in automation. Enabled by powerful function approximators, data-driven approaches to control have recently successfully tackled challenging applicati...
详细信息
Optimal control of general nonlinear systems is a central challenge in automation. Enabled by powerful function approximators, data-driven approaches to control have recently successfully tackled challenging applications. However, such methods often obscure the structure of dynamics and control behind black-box over-parameterized representations, thus limiting our ability to understand closed-loop behavior. This article adopts a hybrid-system view of nonlinear modeling and control that lends an explicit hierarchical structure to the problem and breaks down complex dynamics into simpler localized units. We consider a sequence modeling paradigm that captures the temporal structure of the data and derive an expectation-maximization (EM) algorithm that automatically decomposes nonlinear dynamics into stochastic piecewise affine models with nonlinear transition boundaries. Furthermore, we show that these time-series models naturally admit a closed-loop extension that we use to extract local polynomial feedback controllers from nonlinear experts via behavioral cloning. Finally, we introduce a novel hybrid relative entropy policy search (Hb-REPS) technique that incorporates the hierarchical nature of hybrid models and optimizes a set of time-invariant piecewise feedback controllers derived from a piecewise polynomial approximation of a global state-value function.
The increasing demand for video data traffic, along with the proliferation of smart devices, poses significant challenges to content and Internet service providers. In response to this challenge, content caching on mo...
详细信息
ISBN:
(纸本)9798350363999;9798350364002
The increasing demand for video data traffic, along with the proliferation of smart devices, poses significant challenges to content and Internet service providers. In response to this challenge, content caching on mobile edge computing (MEC) servers has emerged to reduce content download latency. However, existing caching solutions often assume stationary content popularity or require real-time knowledge of popularity, which does not align with real-world scenarios. To address these limitations, we introduce ProCache, a novel content caching algorithm. ProCache takes into account spatial and temporal monetary budget sharing for caching, content sizes, and original server locations while dealing with uncertain regional content popularity. The goal of ProCache is to minimize the long-term expected content download latency overall active users, comprising two key components. First, the deep learning module includes the 1DCNN-LSTM-Dense layered deep learning model for predicting future content requests and the data mapping module which makes the model focus more on the request trend rather than the magnitude. Second, based on our predictions, the stochastic optimization module runs a dynamic content caching algorithm based on the Lyapunov optimization technique that operates in a fully distributed manner by region and ensures overall performance bounds. Trace-driven simulations using the YouTube dataset demonstrate that ProCache outperforms existing prediction models and content caching algorithms.
In this paper, we explore the interplay between Predictive control and closed-loop optimality, spanning from Model Predictive control to data-driven Predictive control. Predictive control in general relies on some for...
详细信息
In this paper, we explore the interplay between Predictive control and closed-loop optimality, spanning from Model Predictive control to data-driven Predictive control. Predictive control in general relies on some form of prediction scheme on the real system trajectories. However, these predictions may not accurately capture the real system dynamics, for e.g., due to stochasticity, resulting in sub-optimal control policies. This lack of optimality is a critical issue in case of problems with economic objectives. We address this by providing sufficient conditions on the underlying prediction scheme such that a Predictive controller can achieve closed-loop optimality. However, these conditions do not readily extend to data-driven Predictive control. In this context of closed-loop optimality, we conclude that the factor distinguishing the approaches within data-driven Predictive control is if they can be cast as a sequential decision-making process or not, rather than the dichotomy of model-based vs. model-free. Furthermore, we show that the conventional approach of improving the prediction accuracy from data may not guarantee optimality. Copyright (c) 2024 The Authors.
It is known that many industrial processes are multiple input multiple output (MIMO) in nature. The main challenge in controlling such processes is the interaction between the loops. In this article, the data-driven v...
详细信息
暂无评论