While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing su...
详细信息
While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing such feasibility assumptions, and in particular address the problem in the linear bandit setting, thus characterising the costs of feasibility testing for an unknown linear program using bandit feedback. Concretely, we test if ∃x : Ax ≥ 0 for an unknown A ∈ m×d, by playing a sequence of actions xt ∈ d, and observing Axt + noise in response. By identifying the hypothesis as determining the sign of the value of a minimax game, we construct a novel test based on low-regret algorithms and a nonasymptotic law of iterated logarithms. We prove that this test is reliable, and adapts to the 'signal level,' Γ, of any instance, with mean sample costs scaling as Õ(d2/Γ2). We complement this by a minimax lower bound of Ω(d/Γ2) for sample costs of reliable tests, dominating prior asymptotic lower bounds by capturing the dependence on d, and thus elucidating a basic insight missing in the extant literature on such problems. Copyright 2024 by the author(s)
By creating multipath backscatter links and amplify signal strength, reconfigurable intelligent surfaces (RIS) and decode-and-forward (DF) relaying are shown to degrade the latency of the ultrareliable low-latency com...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can...
详细信息
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can potentially address these problems by allowing systems trained on labelled datasets from the source domain(including less expensive synthetic domain)to be adapted to a novel target *** conventional approach involves automatic extraction and alignment of the representations of source and target domains *** limitation of this approach is that it tends to neglect the differences between classes:representations of certain classes can be more easily extracted and aligned between the source and target domains than others,limiting the adaptation over all ***,we address:this problem by introducing a Class-Conditional Domain Adaptation(CCDA)*** incorporates a class-conditional multi-scale discriminator and class-conditional losses for both segmentation and ***,they measure the segmentation,shift the domain in a classconditional manner,and equalize the loss over *** results demonstrate that the performance of our CCDA method matches,and in some cases,surpasses that of state-of-the-art methods.
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristic...
详细信息
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion *** challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,*** to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection *** data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as ***,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack *** on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the ***,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced *** selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter ***,the selected features are trained and tested for detecting attacks using *** Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the ord...
详细信息
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of *** work will present the implementation of sequence pattern mining for recommender systems within the domain of *** work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender *** feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target *** will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy *** work pre-sents a new hybrid recommender system based on optimized feature selection and systolic *** features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)*** systolic tree is used for pattern mining,and based on this,the recommendations are *** proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the *** was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.
The work proposes a methodology for five different classes of ECG signals. The methodology utilises moving average filter and discrete wavelet transformation for the remove of baseline wandering and powerline interfer...
详细信息
Population growth in cities results in a demand for parking lots from an increasing number of automobiles, which frequently contributes to the global problem of traffic congestion. This study presents the smart parkin...
详细信息
We develop a method to generate prediction sets with a guaranteed coverage rate that is robust to corruptions in the training data, such as missing or noisy variables. Our approach builds on conformal prediction, a po...
In the paper, an intelligent actor-critic learning control method augmented by a fuzzy broad learning system with output recurrent feedback (abbreviated as ORFBLS) is proposed for obstacle-avoiding trajectory tracking...
详细信息
暂无评论