Unmanned Aerial Vehicles (UAVs) have extensive applications such as logistics transportation and aerial photography. However, UAVs are sensitive to winds. Traditional control methods, such as proportional- integral-de...
详细信息
Unmanned Aerial Vehicles (UAVs) have extensive applications such as logistics transportation and aerial photography. However, UAVs are sensitive to winds. Traditional control methods, such as proportional- integral-derivative controllers, generally fail to work well when the strength and direction of winds are changing frequently. In this work deep reinforcement learning algorithms are combined with a domain randomization method to learn robust wind-resistant hovering policies. A novel reward function is designed to guide learning. This reward function uses a constant reward to maintain a continuous flight of a UAV as well as a weight of the horizontal distance error to ensure the stability of the UAV at altitude. A five-dimensional representation of actions instead of the traditional four dimensions is designed to strengthen the coordination of wings of a UAV. We theoretically explain the rationality of our reward function based on the theories of Q-learning and reward shaping. Experiments in the simulation and real-world application both illustrate the effectiveness of our method. To the best of our knowledge, it is the first paper to use reinforcement learning and domain randomization to explore the problem of robust wind-resistant hovering control of quadrotor UAVs, providing a new way for the study of wind-resistant hovering and flying of UAVs. IEEE
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
In recent years, the proliferation of LEO (Low-Earth Orbit) satellites and the accumulation of space debris have made Near-Earth space more and more crowded, and hence significantly increased the risk of collisions in...
详细信息
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industria...
详细信息
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industrial monitoring,transportation,and smart *** and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of *** paper presents a traffic-aware,cluster-based,and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such *** proposed protocol divides the network into clusters where optimal cluster heads are selected among super and normal nodes based on their residual *** protocol considers multi-criteria attributes,i.e.,energy,traffic load,and distance parameters to select the next hop for data delivery towards the base *** performance of the proposed protocol is evaluated through the network simulator *** different traffic rates,number of nodes,and different packet sizes,the proposed protocol outperformed LoRaWAN in terms of end-to-end packet delivery ratio,energy consumption,end-to-end delay,and network *** 100 nodes,the proposed protocol achieved a 13%improvement in packet delivery ratio,10 ms improvement in delay,and 10 mJ improvement in average energy consumption over LoRaWAN.
The novel Coronavirus (COVID-19) spread rapidly around the world and caused overwhelming effects on the health and economy of the world. It first appeared in Wuhan city of China and was declared a pandemic by the Worl...
详细信息
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on t...
详细信息
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on these reviews to make their decisions about products and companies are also very interested in these reviews to judge their products and *** reviews are also a very precious source of information for requirement *** companies and consumers are not very satisfied with the overall sentiment;they like fine-grained knowledge about consumer *** to this,many researchers have developed approaches for aspect-based sentiment *** existing approaches concentrate on explicit aspects to analyze the sentiment,and only a few studies rely on capturing implicit *** paper proposes a Keywords-Based Aspect Extraction method,which captures both explicit and implicit *** also captures opinion words and classifies the sentiment about each *** applied semantic similarity-basedWordNet and SentiWordNet lexicon to improve aspect *** used different collections of customer reviews for experiment purposes,consisting of eight datasets over seven *** compared our approach with other state-of-the-art approaches,including Rule Selection using Greedy Algorithm(RSG),Conditional Random Fields(CRF),Rule-based Extraction(RubE),and Double Propagation(DP).Our results have shown better performance than all of these approaches.
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,...
详细信息
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,isolate,and deploy applications,addressing the issue of low system reliability due to interlocking ***-based platforms usually entail users define application resource supplies for eco container *** is a constant problem of over-service in data centers for cloud service *** operating costs and incompetent resource utilization can occur in a waste of *** revolutionized the orchestration of the container in the cloud-native *** can adaptively manage resources and schedule containers,which provide real-time status of the cluster at runtime without the user’s *** clusters face unpredictable traffic,and the cluster performs manual expansion configuration by the *** to operational delays,the system will become unstable,and the service will be *** work proposed an RBACS that vigorously amended the distribution of containers operating in the entire Kubernetes *** allocation pattern is analyzed with the Kubernetes *** estimate the overall cost of RBACS,we use several scientific benchmarks comparing the accomplishment of container to remote node migration and on-site *** experiments ran on the simulations to show the method’s effectiveness yielded high precision in the real-time deployment of resources in eco *** to the default baseline,Kubernetes results in much fewer dropped requests with only slightly more supplied resources.
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingt
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides mor...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy *** existing methods,it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy ***,the models focus on different aspects *** is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence(AI)on autonomous driving and energy *** this end,we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision *** focuses on both safe driving in highway scenarios and energy *** deep learning based framework is realized with many models used for localization,path planning at high level,path planning at low level,reinforcement learning,transfer learning,power control,and speed *** reinforcement learning,state-action-feedback play important role in decision *** simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.
暂无评论