Optimal control methods provide solutions to safety-critical problems but easily become intractable. Control Barrier Functions (CBFs) have emerged as a popular technique that facilitates their solution by provably gua...
详细信息
Highly notable cyber-attacks, such as Stuxnet [1] and the Maroochy attack [3], have targeted critical infrastructure to affect physical processes to cause harm. This work presents a payload analysis-based Intrusion Pr...
详细信息
To satisfy the high data rate requirements, cellular systems will evolve towards the direction of higher carrier frequencies and larger antenna arrays. The conventional phased arrays are hard to fulfill such a vision ...
详细信息
Traffic light control plays a crucial role in intelligent transportation systems. This paper introduces Temporal Difference-Aware Graph Convolutional Reinforcement Learning (TeDA-GCRL), a decentralized RL-based method...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and peo...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and people,medical institutions,andmedical ***,with the openness of network transmission,the security and privacy of information transmission have become a major ***,Masud et *** a lightweight anonymous user authentication protocol for IoT medical treatment,claiming that their method can resist various ***,through analysis of the protocol,we observed that their protocol cannot effectively resist privileged internal attacks,sensor node capture attacks,and stolen authentication attacks,and their protocol does not have perfect forward ***,we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters,so as tomake the protocolmore compact and *** addition,we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
In this paper, an effective system for discriminating violent scenes in movies from audio signals alone is proposed. The technology for automatic discrimination of violent scenes is one of the most crucial aspects of ...
详细信息
In an age dominated by technology, manual tasks are becoming increasingly rare. However, gardening remains a beloved pastime for many, often requiring significant manual effort. The project aims to revolutionize garde...
详细信息
One of the most vital aspects behind performing laboratory-scale studies on the interoperability of power electronic converters within the scenario of smart microgrids is the implementation of communication interfaces...
详细信息
We study how representation learning can improve the learning efficiency of contextual bandit problems. We study the setting where we play T contextual linear bandits with dimension d simultaneously, and these T bandi...
详细信息
We study how representation learning can improve the learning efficiency of contextual bandit problems. We study the setting where we play T contextual linear bandits with dimension d simultaneously, and these T bandit tasks collectively share a common linear representation with a dimensionality of r d. We present a new algorithm based on alternating projected gradient descent (GD) and minimization estimator to recover a low-rank feature matrix. Using the proposed estimator, we present a multi-task learning algorithm for linear contextual bandits and prove the regret bound of our algorithm. We presented experiments and compared the performance of our algorithm against benchmark algorithms. Copyright 2024 by the author(s)
We present a robust process for fabricating high-Q, dispersion-engineered Si3N4 photonic chips using amorphous silicon hardmask etching with PECVD SiO2 cladding, achieving an intrinsic quality factor up to ∼ 17.5...
详细信息
暂无评论