The focus of this paper is on base functionalities required for UAV-based rapid deployment of an ad hoc communication infrastructure in the initial phases of rescue *** main idea is to use heterogeneous teams of UAVs ...
详细信息
The focus of this paper is on base functionalities required for UAV-based rapid deployment of an ad hoc communication infrastructure in the initial phases of rescue *** main idea is to use heterogeneous teams of UAVs to deploy communication kits that include routers,and are used in the generation of ad hoc Wireless Mesh Networks(WMN).Several fundamental problems are considered and algorithms are proposed to solve these *** Router Node Placement problem(RNP)and a generalization of it that takes into account additional constraints arising in actual field usage is considered *** RNP problem tries to determine how to optimally place routers in a WMN.A new algorithm,the RRT-WMN algorithm,is proposed to solve this *** is based in part on a novel use of the Rapidly Exploring Random Trees(RRT)algorithm used in motion planning.A comparative empirical evaluation between the RRT-WMN algorithm and existing techniques such as the Covariance Matrix Adaptation Evolution Strategy(CMA-ES)and Particle Swarm Optimization(PSO),shows that the RRT-WMN algorithm has far better performance both in amount of time taken and regional coverage as the generalized RNP problem scales to realistic *** Gateway Node Placement Problem(GNP)tries to determine how to locate a minimal number of gateway nodes in a WMN backbone network while satisfying a number of Quality of Service(QoS)*** alternatives are proposed for solving the combined RNP-GNP *** first approach combines the RRT-WMN algorithm with a preexisting graph clustering *** second approach,WMNbyAreaDecomposition,proposes a novel divide-and-conquer algorithm that recursively partitions a target deployment area into a set of disjoint regions,thus creating a number of simpler RNP problems that are then solved *** algorithms are evaluated on real-world GIS models of different size and *** is shown to outperform existing algorithms u
In making legal decisions, courts apply relevant law to facts. While the law typically changes slowly over time, facts vary from case to case. Nevertheless, underlying patterns of fact may emerge. This research focuse...
详细信息
Tourism continues to be developed, as one of important sectors to support foreign exchange revenue and also support the economic sectors. The purpose of this research finds the mapping factor from digital economy and ...
详细信息
IT systems design and architecture have many similarities with the design of organisations and institutions. Both pay attention to social concepts such as rules, norms, and values. Justice is one of the key concepts t...
详细信息
Industrial alarm systems facilitate the reliable and effective management of industrial process operations. However, the manufacturer’s fear of missing a critical fault or lacking process understanding may lead to th...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
Industrial alarm systems facilitate the reliable and effective management of industrial process operations. However, the manufacturer’s fear of missing a critical fault or lacking process understanding may lead to the implementation of alarm systems that overburden operators by an enormous amount of alarms. Inadequate alarm settings and maintenance, coupled with a high volume of disturbance alarms, necessitate operators making crucial decisions within a limited time. Thus, an alarm management strategy that accurately anticipates the types of incoming alarms is needed, especially in brownfield systems where it is infeasible to simplify the underlying alarming functions. This alleviates the need for human interpretation of alarms upon arrival, allowing operators to address anomalous behaviors early. This study proposes an alarm classification approach, based on active learning, latent dirichlet allocation (LDA) topic modeling and transformer-based deep learning. It focuses on addressing these challenges through a systematic natural language processing (NLP) approach to classify and map fault messages. To demonstrate the validity of this approach, real-world alarm data from an industrial hybrid non-woven manufacturing process is used.
Air pollution makes it worse in populated regions. Indonesia's major cities are also impacted by air pollution. Due to rising traffic, material consumption by vehicles, industrial growth, land burning, and garbage...
详细信息
In a manner analogous to their classical counterparts, quantum classifiers are vulnerable to adversarial attacks that perturb their inputs. A promising countermeasure is to train the quantum classifier by adopting an ...
详细信息
ISBN:
(数字)9798350382846
ISBN:
(纸本)9798350382853
In a manner analogous to their classical counterparts, quantum classifiers are vulnerable to adversarial attacks that perturb their inputs. A promising countermeasure is to train the quantum classifier by adopting an attack-aware, or adversarial, loss function. This paper studies the generalization properties of quantum classifiers that are adversarially trained against bounded-norm white-box attacks. Specifically, a quantum adversary maximizes the classifier's loss by transforming an input state
$\rho(x)$
into a state
$\tau$
that is
$\epsilon$
-close to the original state
$\rho(x)$
in p-Schatten distance. Under suitable assumptions on the quantum embedding
$\rho(x)$
, we derive novel information-theoretic upper bounds on the generalization error of adversarially trained quantum classifiers for
$p=1$
and
$p=\infty$
. The derived upper bounds consist of two terms: the first is an exponential function of the 2-Renyi mutual information between classical data and quantum embedding, while the second term scales linearly with the adversarial perturbation size
$\epsilon$
. Both terms are shown to decrease as
$1/\sqrt{T}$
over the training set size
$T$
. An extension is also considered in which the adversary assumed during training has different parameters
$p$
and
$\epsilon$
as compared to the adversary affecting the test inputs. Finally, we validate our theoretical findings with numerical experiments for a synthetic setting.
Audio-visual embodied navigation, as a hot research topic, aims training a robot to reach an audio target using egocentric visual (from the sensors mounted on the robot) and audio (emitted from the target) input. The ...
详细信息
In the field of multi-criteria decision-making, compromise is often sought because it is highly desirable for decision-making. However, over the years, many methods have been developed for decision-making, between whi...
详细信息
暂无评论