1 Introduction Artificial neural networks(ANNs,also NNs)have recently emerged as leading candidate models for deep learning,popularly used in various areas[1–3].Behind the enormous success,ANNs are generally with com...
详细信息
1 Introduction Artificial neural networks(ANNs,also NNs)have recently emerged as leading candidate models for deep learning,popularly used in various areas[1–3].Behind the enormous success,ANNs are generally with complicated structures,there being an intricate data flow through multiple linear or nonlinear components between the input layer and the output ***,it is pressing to evaluate how much a specific component contributes to the final output,termed the Credit Assignment Problem(CAP)[4]in this paper.
Networking paradigm known as "Software-Defined Networking" (SDN) offers more flexibility with network management and is fast gaining popularity. Separating the control plane from the data plane is largely re...
详细信息
Mobile robot path planning involves decision-making in uncertain, dynamic conditions, where Reinforcement Learning (RL) algorithms excel in generating safe and optimal paths. The Deep Deterministic Policy Gradient (DD...
详细信息
Efficient route optimization is a crucial concern in modern transportation systems, influencing travel time, resource consumption, and user satisfaction. By empowering users to select their priority parameters, such a...
详细信息
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a coll...
详细信息
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a collection of 3D coordinates,have found wide-ranging *** augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization *** of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point ***,there has been a lack of focus on making the most of the numerous existing augmentation *** this deficiency,this research investigates the possibility of combining two fundamental data augmentation *** paper introduces PolarMix andMix3D,two commonly employed augmentation techniques,and presents a new approach,named *** of using a fixed or predetermined combination of augmentation methods,RandomFusion randomly chooses one method from a pool of options for each instance or *** innovative data augmentation technique randomly augments each point in the point cloud with either PolarMix or *** crux of this strategy is the random choice between PolarMix and Mix3Dfor the augmentation of each point within the point cloud data *** results of the experiments conducted validate the efficacy of the RandomFusion strategy in enhancing the performance of neural network models for 3D lidar point cloud semantic segmentation *** is achieved without compromising computational *** examining the potential of merging different augmentation techniques,the research contributes significantly to a more comprehensive understanding of how to utilize existing augmentation methods for 3D lidar point *** data augmentation technique offers a simple yet effective method to leverage the diversity of augmentation techniques and boost the ro
Quick Access Recorder(QAR),an important device for storing data from various flight parameters,contains a large amount of valuable data and comprehensively records the real state of the airline ***,the recorded data h...
详细信息
Quick Access Recorder(QAR),an important device for storing data from various flight parameters,contains a large amount of valuable data and comprehensively records the real state of the airline ***,the recorded data have certain missing values due to factors,such as weather and equipment *** missing values seriously affect the analysis of QAR data by aeronautical engineers,such as airline flight scenario reproduction and airline flight safety status ***,imputing missing values in the QAR data,which can further guarantee the flight safety of airlines,is *** data also have multivariate,multiprocess,and temporal ***,we innovatively propose the imputation models A-AEGAN("A"denotes attention mechanism,"AE"denotes autoencoder,and"GAN"denotes generative adversarial network)and SA-AEGAN("SA"denotes self-attentive mechanism)for missing values of QAR data,which can be effectively applied to QAR ***,we apply an innovative generative adversarial network to impute missing values from QAR *** improved gated recurrent unit is then introduced as the neural unit of GAN,which can successfully capture the temporal relationships in QAR *** addition,we modify the basic structure of GAN by using an autoencoder as the generator and a recurrent neural network as the *** missing values in the QAR data are imputed by using the adversarial relationship between generator and *** introduce an attention mechanism in the autoencoder to further improve the capability of the proposed model to capture the features of QAR *** mechanisms can maintain the correlation among QAR data and improve the capability of the model to impute missing ***,we improve the proposed model by integrating a self-attention mechanism to further capture the relationship between different parameters within the QAR *** results on real datasets demonstrate that the model can rea
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learni...
详细信息
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learning assisted *** work addresses a DHFSP with minimizing the maximum completion time(Makespan).First,a mathematical model is developed for the concerned ***,four Q-learning-assisted meta-heuristics,e.g.,genetic algorithm(GA),artificial bee colony algorithm(ABC),particle swarm optimization(PSO),and differential evolution(DE),are *** to the nature of DHFSP,six local search operations are designed for finding high-quality solutions in local *** of randomselection,Q-learning assists meta-heuristics in choosing the appropriate local search operations during ***,based on 60 cases,comprehensive numerical experiments are conducted to assess the effectiveness of the proposed *** experimental results and discussions prove that using Q-learning to select appropriate local search operations is more effective than the random *** verify the competitiveness of the Q-learning assistedmeta-heuristics,they are compared with the improved iterated greedy algorithm(IIG),which is also for solving *** Friedman test is executed on the results by five *** is concluded that the performance of four Q-learning-assisted meta-heuristics are better than IIG,and the Q-learning-assisted PSO shows the best competitiveness.
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t...
详细信息
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts to investigate and enhance the security of smart home *** a more secure smart home ecosystem,we present a detailed literature review on the security of smart home ***,we categorize smart home systems’security issues into the platform,device,and communication *** exploring the research and specific issues in each of these security areas,we summarize the root causes of the security flaws in today's smart home systems,which include the heterogeneity of internal components of the systems,vendors'customization,the lack of clear responsibility boundaries and the absence of standard security ***,to better understand the security of smart home systems and potentially provide better protection for smart home systems,we propose research directions,including automated vulnerability mining,vigorous security checking,and data-driven security analysis.
Video data is an asset that may be used in various settings, such as a live broadcast on a personal blog or a security camera at a manufacturing facility. Both of these examples are examples of how video data can be u...
详细信息
Video data is an asset that may be used in various settings, such as a live broadcast on a personal blog or a security camera at a manufacturing facility. Both of these examples are examples of how video data can be used. It is becoming increasingly common practice across a wide range of applications to use a machine learning appliance as a tool for processing video. Recent years have seen significant advancements made in the field of machine learning in computer vision. These advancements have been achieved. The presentation of humans is approached or even surpassed in areas such as item identification, object categorization, and image segmentation. Despite this, challenging difficulties exist, such as identifying human emotions. This study aims to recognize human emotions by analyzing still images and motion pictures taken from motion pictures using numerous machine learning procedures. To accomplish this, neural networks constructed based on Generative Adversarial Networks (GAN) were used to classify each face picture obtained from a frame into one of the seven categories of facial emotions we chose. To communicate feelings, videos are mined for informative aspects such as audio, single, and multiple video frames. During this process stage, separate instances of the OpenSMILE and Inception-ResNet-v2 models extract feature vectors from the audio and frames. After that, numerous classification models are trained using stochastic gradient descent with the impetus approach (SGDMA). The findings from each of the pictures are compiled into a table, and from that, it is determined which facial expression was seen on-screen the most often throughout the film. The classification of audio feature vectors is accomplished with the application of GAN-SGDMA. The Inception-ResNet-v2 algorithm is utilized to recognize feelings conveyed by still photographs. The findings of several experiments suggest that the presented distributed model GAN-SGDMA could significantly boost the sp
The creation of the 3D rendering model involves the prediction of an accurate depth map for the input images.A proposed approach of a modified semi-global block matching algorithm with variable window size and the gra...
详细信息
The creation of the 3D rendering model involves the prediction of an accurate depth map for the input images.A proposed approach of a modified semi-global block matching algorithm with variable window size and the gradient assessment of objects predicts the depth map.3D modeling and view synthesis algorithms could effectively handle the obtained disparity *** work uses the consistency check method to find an accurate depth map for identifying occluded *** prediction of the disparity map by semi-global block matching has used the benchmark dataset of Middlebury stereo for *** improved depth map quality within a reasonable process-ing time outperforms the other existing depth map prediction *** experimental results have shown that the proposed depth map predictioncould identify the inter-object boundaryeven with the presence ofocclusion with less detection error and *** observed that the Middlebury stereo dataset has very few images with occluded objects,which made the attainment of gain *** this gain,we have created our dataset with occlu-sion using the structured lighting *** proposed regularization term as an optimization process in the graph cut algorithm handles occlusion for different smoothing *** experimented results demonstrated that our dataset had outperformed the Tsukuba dataset regarding the percentage of occluded pixels.
暂无评论