Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and of...
详细信息
Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and often expressed in higher-level languages or frameworks. State machines have been the go-to language to model behavior for decades, but recently, behavior trees have gained attention among roboticists. Originally designed to model autonomous actors in computer games, behavior trees offer an extensible tree-based representation of missions and are claimed to support modular design and code reuse. Although several implementations of behavior trees are in use, little is known about their usage and scope in the real world. How do concepts offered by behavior trees relate to traditional languages, such as state machines? How are concepts in behavior trees and state machines used in actual applications? This paper is a study of the key language concepts in behavior trees as realized in domain-specific languages (DSLs), internal and external DSLs offered as libraries, and their use in open-source robotic applications supported by the Robot Operating System (ROS). We analyze behavior-tree DSLs and compare them to the standard language for behavior models in robotics: state machines. We identify DSLs for both behavior-modeling languages, and we analyze five in-depth. We mine open-source repositories for robotic applications that use the analyzed DSLs and analyze their usage. We identify similarities between behavior trees and state machines in terms of language design and the concepts offered to accommodate the needs of the robotics domain. We observed that the usage of behavior-tree DSLs in open-source projects is increasing rapidly. We observed similar usage patterns at model structure and at code reuse in the behavior-tree and state-machine models within the mined open-source projects. We contribute all extracted models as a dataset, hoping to inspire the commu
Key distribution as a core feature of any security system is one of the challenging tasks in an online transaction. Pairing is used to share the key between the users as an answer to the underlying security problem. D...
详细信息
The improvement of consensus algorithms has greatly enhanced the performance of consortium blockchain, making it possible to be applied in large-scale network scenarios such as finance, healthcare and supply chain man...
详细信息
Selfish mining attacks pose a significant and ongoing security threat to blockchain networks, including major platforms like Bitcoin and Ethereum. Understanding and effectively countering these attacks is crucial for ...
详细信息
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
The World Health Organization (WHO) has designated the COVID-19 pandemic a global health emergency, prompting responses all over the world. The fatality rate is between 2% and 5%, and millions of people around the wor...
详细信息
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio...
详细信息
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compression,they are unable to address the issue of mixed double compression resulting from the use of different compression *** particular,the implementation of Joint Photographic Experts Group 2000(JPEG2000)as the secondary compression standard can result in a decline or complete loss of performance in existing *** tackle this challenge of JPEG+JPEG2000 compression,a detection method based on quaternion convolutional neural networks(QCNN) is *** QCNN processes the data as a quaternion,transforming the components of a traditional convolutional neural network(CNN) into a quaternion *** relationships between the color channels of the image are preserved,and the utilization of color information is ***,the method includes a feature conversion module that converts the extracted features into quaternion statistical features,thereby amplifying the evidence of double *** results indicate that the proposed QCNN-based method improves,on average,by 27% compared to existing methods in the detection of JPEG+JPEG2000 compression.
Heart rate measurements based on remote physiological signals could significantly facilitate health monitoring in daily life. However, the ground-truth labels of the physiological signals are expensive and hard to col...
详细信息
1 Introduction As an emerging machine learning paradigm,unsupervised domain adaptation(UDA)aims to train an effective model for unlabeled target domain by leveraging knowledge from related but distribution-inconsisten...
详细信息
1 Introduction As an emerging machine learning paradigm,unsupervised domain adaptation(UDA)aims to train an effective model for unlabeled target domain by leveraging knowledge from related but distribution-inconsistent source *** of the existing UDA methods[2]align class-wise distributions resorting to target domain pseudo-labels,for which hard labels may be misguided by misclassifications while soft labels are confusing with trivial noises so that both of them tend to cause frustrating *** overcome such drawbacks,as shown in Fig.1,we propose to achieve UDA by performing self-adaptive label filtering learning(SALFL)from both the statistical and the geometrical perspectives,which filters out the misclassified pseudo-labels to reduce negative ***,the proposed SALFL firstly predicts labels for the target domain instances by graph-based random walking and then filters out those noise labels by self-adaptive learning strategy.
Personalized Federated Learning (pFL) is among the most popular tasks in distributed deep learning, which compensates for mutual knowledge and enables device-specific model personalization. However, the effectiveness ...
详细信息
暂无评论