Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
In this paper, we consider partial, feature-oriented digital twins of several virtual museums and formulate an approach to assessing them from the viewpoint of their reliability. Although the formulation specifically ...
详细信息
Data centers are often equipped with multiple cooling units. Here, an aquifer thermal energy storage (ATES) system has shown to be efficient. However, the usage of hot and cold-water wells in the ATES must be balanced...
详细信息
Data centers are often equipped with multiple cooling units. Here, an aquifer thermal energy storage (ATES) system has shown to be efficient. However, the usage of hot and cold-water wells in the ATES must be balanced for legal and environmental reasons. Reinforcement Learning has been proven to be a useful tool for optimizing the cooling operation at data centers. Nonetheless, since cooling demand changes continuously, balancing the ATES usage on a yearly basis imposes an additional challenge in the form of a delayed reward. To overcome this, we formulate a return decomposition, Cool-RUDDER, which relies on simple domain knowledge and needs no training. We trained a proximal policy optimization agent to keep server temperatures steady while minimizing operational costs. Comparing the Cool-RUDDER reward signal to other ATES-associated rewards, all models kept the server temperatures steady at around 30 °C. An optimal ATES balance was defined to be 0% and a yearly imbalance of −4.9% with a confidence interval of [−6.2, −3.8]% was achieved for the Cool 2.0 reward. This outperformed a baseline ATES-associated reward of 0 at −16.3% with a confidence interval of [−17.1, −15.4]% and all other ATES-associated rewards. However, the improved ATES balance comes with a higher energy consumption cost of 12.5% when comparing the relative cost of the Cool 2.0 reward to the zero reward, resulting in a trade-off. Moreover, the method comes with limited requirements and is applicable to any long-term problem satisfying a linear state-transition system.
We demonstrate a toroidal classification for quantum spin systems, revealing an intrinsic geometric duality within this structure. Through our classification and duality, we reveal that various bipartite quantum featu...
详细信息
We demonstrate a toroidal classification for quantum spin systems, revealing an intrinsic geometric duality within this structure. Through our classification and duality, we reveal that various bipartite quantum features in magnon systems can manifest equivalently in both bipartite ferromagnetic and antiferromagnetic materials, based upon the availability of relevant Hamiltonian parameters. Additionally, the results highlight the antiferromagnetic regime as an ultrafast dual counterpart to the ferromagnetic regime, both exhibiting identical capabilities for quantum spintronics and technological applications. Concrete illustrations are provided, demonstrating how splitting and squeezing types of two-mode magnon quantum correlations can be realized across ferro- and antiferromagnetic regimes.
Optimizing therapy and rehabilitation for Parkinson's disease (PD) requires early identification and precise evaluation of the illness's course. However, there is disagreement about the best way to use gait an...
详细信息
Efficient task scheduling and resource allocation are essential for optimizing performance in cloud computing environments. The presence of priority constraints necessitates advanced solutions capable of addressing th...
详细信息
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
Meta-heuristic optimization algorithms have become widely used due to their outstanding features, such as gradient-free mechanisms, high flexibility, and great potential for avoiding local optimal solutions. This rese...
详细信息
Vehicular Named Data Networks (VNDN) is a content centric approach for vehicle networks. The fundamental principle of addressing the content rather than the host, suits vehicular environment. There are numerous challe...
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** ...
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** systems face major security and data privacy challenges owing to their integral features such as scalability,resource constraints,and *** challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data,creating an attractive opportunity for *** address these challenges,artificial intelligence(AI)techniques,such as machine learning(ML)and deep learning(DL),are utilized to build an intrusion detection system(IDS)that helps to secure IoT *** learning(FL)is a decentralized technique that can help to improve information privacy and performance by training the IDS on discrete linked *** delivers an effectual tool to defend user confidentiality,mainly in the field of IoT,where IoT devices often obtain privacy-sensitive personal *** study develops a Privacy-Enhanced Federated Learning for Intrusion Detection using the Chameleon Swarm Algorithm and Artificial Intelligence(PEFLID-CSAAI)*** main aim of the PEFLID-CSAAI method is to recognize the existence of attack behavior in IoT ***,the PEFLIDCSAAI technique involves data preprocessing using Z-score normalization to transformthe input data into a beneficial ***,the PEFLID-CSAAI method uses the Osprey Optimization Algorithm(OOA)for the feature selection(FS)*** the classification of intrusion detection attacks,the Self-Attentive Variational Autoencoder(SA-VAE)technique can be ***,the Chameleon Swarm Algorithm(CSA)is applied for the hyperparameter finetuning process that is involved in the SA-VAE model.A wide range of experiments were conducted to validate the execution of the PEFLID-CSAAI *** simulated outcomes demonstrated that the PEFLID-CSAAI
暂无评论