Existing computer vision methods mainly focus on the recognition of rigid objects, whereas the recognition of flexible objects remains unexplored. Recognizing flexible objects poses significant challenges due to their...
详细信息
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many efficient logic locking techniques have been proven to be broken. Th...
详细信息
In recent years, the combination of deep reinforcement learning and unmanned aerial vehicle (UAV) to achieve autonomous flight has been a hot research field. In this paper, an obstacle avoidance navigation algorithm (...
In recent years, the combination of deep reinforcement learning and unmanned aerial vehicle (UAV) to achieve autonomous flight has been a hot research field. In this paper, an obstacle avoidance navigation algorithm (PA-SAC) based on priority experience buffer pool (PEBP), attention, and Soft-Actor-Critic (SAC) is proposed to solve the continuous space obstacle avoidance navigation problem of UAVs by using a deep reinforcement learning algorithm. In the two simulation experiments, the success rate of the PA-SAC algorithm was 95.6% in the known environment and 73% in the unknown environment. These results demonstrate that the PA-SAC algorithm can achieve autonomous obstacle avoidance for UAVs with deep image input.
An enhanced SRGAN image super-resolution algorithm is proposed to address SRGAN's training instability and limited global information capture. This enhancement optimizes both the network structure and loss functio...
详细信息
ISBN:
(数字)9798350368239
ISBN:
(纸本)9798350368246
An enhanced SRGAN image super-resolution algorithm is proposed to address SRGAN's training instability and limited global information capture. This enhancement optimizes both the network structure and loss function. In network structure optimization, group normalization is introduced as an alternative to batch normalization, addressing its dependency on batch size and improving stability during small-batch training. Additionally, Global Context Block (GCBlock) is integrated into the residual block, enhancing the network's global information capture and detail representation capabilities. In regard to the loss function, this paper introduces L1 loss and MS-SSIM loss as alternatives to the conventional MSE loss. This approach aims to enhance the quality of the generated image in both pixel space and structural information while reducing the smoothing effect. In the experimental section, the ablation experiments evaluate the performance of models with and without GCBlock on five test sets, including U rban1 00 and Manga109. The results demonstrate that GCBlock improves both detail expressiveness and global information capture, with an average PSNR gain of 0.1388 and SSIM improvement of 0.008. In comparison experiments, the improved algorithm achieved an average PSNR increase of 0.270 and an average SSIM increase of 0.018 on the aforementioned test set, indicating a significant improvement in detail expression and visual quality. Finally, the limitations of the enhanced algorithm are discussed, and potential future research directions are proposed.
In this paper we address the challenge of efficiently deploying Virtual Network Functions (VNFs) in network infrastructures. This is particularly crucial when facing resource fragmentation, where available resources a...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
In this paper we address the challenge of efficiently deploying Virtual Network Functions (VNFs) in network infrastructures. This is particularly crucial when facing resource fragmentation, where available resources are not fully utilized due to the fluctuating allocation and deallocation of virtual network requests. Traditional optimization techniques often fall short in managing the dynamic complexities of VNF placement. To overcome this, we introduce a novel online VNF placement strategy using Deep Reinforcement Learning (DRL) combined with a Reward Constrained Policy Optimization (RCPO). This method leverages the flexibility of DRL and the constraint integration capacity of RCPO, ensuring compliance with performance and resource limitations while minimizing resource fragmentation. The results demonstrate that our DRL-based method surpasses existing methods, resulting in more effective resource management and less resource fragmentation.
The development of person search techniques has been greatly promoted in recent years for its superior practicality and challenging goals. Despite their significant progress, existing person search models still lack t...
详细信息
The telecommunication industry saw a dramatic shift with the introduction of 5G technologies. This new cellular generation brought lightening speed, massive capacity, and better connectivity. Despite the many introduc...
详细信息
ISBN:
(数字)9798350368833
ISBN:
(纸本)9798350368840
The telecommunication industry saw a dramatic shift with the introduction of 5G technologies. This new cellular generation brought lightening speed, massive capacity, and better connectivity. Despite the many introduced opportunities, several challenges emerge at the same time, especially in the field of performance assurance. An example of such challenges is the rapid identification of network anomalies, which is critical for maintaining network performance and ensuring user satisfaction. Traditional techniques of detecting anomalies have fallen short given the unique operating requirements of 5G networks. To address this issue, this paper presents a novel technique applying deep learning for the detection of cellular network anomalies. Specifically, we leverage and exploit the capabilities of several Long-Short-Term-Memory (LSTM) and Artificial Neural Networks (ANN) flavors, such as LSTM with ANN and Bidirection-LSTM (BiLSTM) with ANN, to excel at identifying network anomalies for the preservation and efficiency of 5G networks. Our work includes extensive experimentation and the attained results show that our proposed models are overwhelmingly adapting to preserving the integrity of the network in the fast-paced, ever-changing realm of cellular networks.
The Air Quality Index (AQI) serves as a critical tool for informing the public about the negative impact of air pollution on human health. In Indian cities, where air pollution levels have been rising sharply, accurat...
详细信息
ISBN:
(数字)9798350365917
ISBN:
(纸本)9798350365924
The Air Quality Index (AQI) serves as a critical tool for informing the public about the negative impact of air pollution on human health. In Indian cities, where air pollution levels have been rising sharply, accurate assessment and forecasting of AQI are more important than ever. This study evaluates urban air quality and forecasts future AQI by analyzing a wide array of pollutants, including nitrogen oxides (NO
x
), ammonia, carbon monoxide, sulfur dioxide, ozone, benzene, toluene, PM2.5, PM10, nitric oxide, nitrogen dioxide, and xylene. We employ a Random Forest classifier for detection and use the Prophet library for forecasting. The performance of our model is demonstrated by precision, accuracy, and recall metrics, with the model achieving an accuracy score of 99.57%. This high level of accuracy indicates the model’s robust capability in predicting AQI and underscores its potential utility in urban air quality management.
The use of deep neural networks in information retrieval significantly improves its effectiveness, but negatively affects the performance of the process. To deal with this, we propose a new ranking model that uses the...
The use of deep neural networks in information retrieval significantly improves its effectiveness, but negatively affects the performance of the process. To deal with this, we propose a new ranking model that uses the deep neural network of the "Transformer" architecture (in particular, BERT) for efficient information retrieval. In accordance with the proposed approach, contextualized vector representations are extracted from documents during indexing, after which these representations are clustered for each independent token. The resulting clusters reflect different meanings of the words and are indirectly used as inverted index keys. The values represent the documents in which these contextualized word meanings occur, along with the distances from each document to the contextualized embedding. Thus, after the indexing process, we obtain an index containing pre-calculated distances between the contextualized meanings of dictionary elements and documents. This approach helps us avoid the performance overhead of calculating distances online. At the search stage, the query is transformed into a set of contextualized vectors representing each query token, which allows us to use these vectors to retrieve most semantically close neighbor-tokens and use them to extract relevant documents from the index. This way of searching for contextualized embeddings consumes less memory and is more performant due to the use of an inverted index.
A social recommendation system based on graph neural networks is a system that uses social relationships between users to generate personalized recommendations. To improve recommendation accuracy, it is usually necess...
A social recommendation system based on graph neural networks is a system that uses social relationships between users to generate personalized recommendations. To improve recommendation accuracy, it is usually necessary to collect a large amount of user behavior data, which may lead to user privacy breaches and data misuse. Existing privacy protection methods often sacrifice recommendation effectiveness or increase computational costs. Therefore, this article proposes a federated social recommendation system (FRSRec) based on Rényi differential privacy. By combining hash encryption technology with Rényi differential privacy, user data privacy can be protected while ensuring recommendation effectiveness and computational efficiency. This article conducted experimental evaluations on three real datasets. The experimental results show that the FRSRec model achieves optimal results in both MAE and RMSE, demonstrating that the FRSRec model can effectively achieve privacy protection while improving recommendation quality.
暂无评论