Stream mining, especially with concept drift, presents significant challenges across various domains. As data streams evolve over time, initial models become less effective. We present a novel approach using fuzzy ART...
详细信息
TheUAV pursuit-evasion problem focuses on the efficient tracking and capture of evading targets using unmanned aerial vehicles(UAVs),which is pivotal in public safety applications,particularly in scenarios involving i...
详细信息
TheUAV pursuit-evasion problem focuses on the efficient tracking and capture of evading targets using unmanned aerial vehicles(UAVs),which is pivotal in public safety applications,particularly in scenarios involving intrusion monitoring and *** address the challenges of data acquisition,real-world deployment,and the limited intelligence of existing algorithms in UAV pursuit-evasion tasks,we propose an innovative swarm intelligencebased UAV pursuit-evasion control framework,namely“Boids Model-based DRL Approach for Pursuit and Escape”(Boids-PE),which synergizes the strengths of swarm intelligence from bio-inspired algorithms and deep reinforcement learning(DRL).The Boids model,which simulates collective behavior through three fundamental rules,separation,alignment,and cohesion,is adopted in our *** integrating Boids model with the Apollonian Circles algorithm,significant improvements are achieved in capturing UAVs against simple evasion *** further enhance decision-making precision,we incorporate a DRL algorithm to facilitate more accurate strategic *** also leverage self-play training to continuously optimize the performance of pursuit *** experimental evaluation,we meticulously designed both one-on-one and multi-to-one pursuit-evasion scenarios,customizing the state space,action space,and reward function models for each *** simulations,supported by the PyBullet physics engine,validate the effectiveness of our proposed *** overall results demonstrate that Boids-PE significantly enhance the efficiency and reliability of UAV pursuit-evasion tasks,providing a practical and robust solution for the real-world application of UAV pursuit-evasion missions.
In IoT systems managing multiple devices simultaneously, errors in system controllers often undermine intended operations. Formal verification offers a method to assess system reliability. Colored Generalized Stochast...
详细信息
Inverter topologies for integrating a rooftop photovoltaic (PV) unit into a microgrid are becoming increasingly complex. This paper proposes a high-voltage boosting transformerless inverter (HVBTI) topology for enhanc...
详细信息
Inverter topologies for integrating a rooftop photovoltaic (PV) unit into a microgrid are becoming increasingly complex. This paper proposes a high-voltage boosting transformerless inverter (HVBTI) topology for enhancing such applications. The coupled inductor-based high voltage gain feature of the HVBTI configuration allows power to be delivered into the grid from a lower voltage PV source without using higher duties. In addition, HVBTI suppresses leakage current as the common connection shared between the $-ve$ terminal of the PV source and the grid neutral point. In comparison to existing topologies, the HVBTI topology uses a compact pulse width modulation strategy to control only six controllable switching devices. Again, using lower-rated switching devices is more cost-effective while increasing reliability and efficiency. In a laboratory prototype of a 1 kVA grid integrated system, the proposed HVBTI configuration is validated, and the maximum efficiency of the HVBTI is estimated at approximately 95%. Author
A change in neuronal-action potential can generate a magnetically induced current during the release and propagation of intracellular *** better characterize the electromagnetic-induction effect,this paper presents an...
详细信息
A change in neuronal-action potential can generate a magnetically induced current during the release and propagation of intracellular *** better characterize the electromagnetic-induction effect,this paper presents an improved discrete Rulkov(ID-Rulkov)neuron model by coupling a discrete model of a memristor with sine memductance into a discrete Rulkov neuron *** ID-Rulkov neuron model possesses infinite invariant points,and its memristor-induced stability effect is evaluated by detecting the routes of period-doubling and Neimark-Sacker *** investigated the memristor-induced dynamic effects on the neuron model using bifurcation plots and firing ***,we theoretically expounded the memristor initial-boosting mechanism of infinite coexisting *** results show that the ID-Rulkov neuron model can realize diverse neuron firing patterns and produce hyperchaotic attractors that are nondestructively boosted by the initial value of the memristor,indicating that the introduced memristor greatly benefits the original neuron *** hyperchaotic attractors initially boosted by the memristor were verified by hardware experiments based on a hardware *** addition,pseudorandom number generators are designed using the ID-Rulkov neuron model,and their high randomness is demonstrated based onstrict test results.
A rapid computational algorithm is presented for Structured Illumination in Digital Holographic Microscopy. The proposed algorithm is based on the minimization of two cost functions to reconstruct improved resolution ...
详细信息
Long Short-Term Memory (LSTM) is a type of RNN architecture commonly employed in natural language processing, speech recognition, and various sequence modeling applications. A normal recurrent neural network (RNN), wh...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious...
详细信息
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious issues during network management,including identifying malicious traffic,which is a *** remains an open contest over how to learn features in IDS since current approaches use deep learning *** learning,which combines swarm intelligence and evolution,is gaining attention for further improvement against cyber *** this study,we employed a PSO-GA(fusion of particle swarm optimization(PSO)and genetic algorithm(GA))for feature selection on the CICIDS-2017 *** achieve better accuracy,we proposed a hybrid model called LSTM-GRU of deep learning that fused the GRU(gated recurrent unit)and LSTM(long short-term memory).The results show considerable improvement,detecting several network attacks with 98.86%accuracy.A comparative study with other current methods confirms the efficacy of our proposed IDS scheme.
Digital fraud has become a menace in every industry. It is critical for any firm to have a concentrated focus on detecting and preventing fraudulent activities. Security is a priority. The way we communicate has chang...
详细信息
Sentiment Analysis is one of the computerscience study areas that is expanding quickly, making it difficult to keep up with all the activity to fit in the business *** Analysis is used in fields of Stock Markets, Soc...
详细信息
暂无评论