In this work, we study simulation-based optimization, where the agent aims to select the best configuration from the design space with as few as possible iterations. Inspired by the success of deep reinforcement learn...
详细信息
In this work, we study simulation-based optimization, where the agent aims to select the best configuration from the design space with as few as possible iterations. Inspired by the success of deep reinforcement learning (DRL), we formulate the sampling process as policy searching and give a solving method from the perspective of policy iteration. Concretely, a surrogate model for predicting the performance of each configuration and a parameterized sampling policy are applied, which correspond to the critic and actor in actor-critic (AC) method, respectively. We further derive the updating rule and propose two algorithms for configuration selection in continuous and discrete design spaces, respectively. Finally, the algorithms are validated experimentally on 1) two toy examples to intuitively explain the principle and 2) two high-dimensional tasks to reveal the effectiveness in large-scale problems. The results show that the proposed algorithms can efficiently deal with large-scale problems and effectively eliminate sub-optimal configurations.
Research into the detection, classification, and prediction of internal defects using surface morphology data of parts created via powder bed fusion-type additive manufacturing has become a hot topic in the previous d...
详细信息
Hyperspectral Imaging, employed in satellites for space remote sensing, like HYPSO-1, faces constraints due to few labeled data sets, affecting the training of AI models demanding these ground-truth annotations. In th...
Hyperspectral Imaging, employed in satellites for space remote sensing, like HYPSO-1, faces constraints due to few labeled data sets, affecting the training of AI models demanding these ground-truth annotations. In this work, we introduce The HYPSO-1 Sea-Land-Cloud-Labeled Dataset, an open dataset with 200 diverse hyperspectral images from the HYPSO-1 mission, available in both raw and calibrated forms for scientific research in Earth observation. Moreover, 38 of these images from different countries include ground-truth labels at pixel-level totaling about 25 million spectral signatures labeled for sea/land/cloud categories. To demonstrate the potential of the dataset and its labeled subset, we have additionally optimized a deep learning model (1D Fully Convolutional Network), achieving superior performance to the current state of the art. The complete dataset, ground-truth labels, deep learning model, and software code are openly accessible for download at the website https://***/hypso1_sea_land_clouds_dataset/.
Hyperspectral Imaging, employed in satellites for space remote sensing, like HYPSO-1, faces constraints due to few labeled data sets, affecting the training of AI models demanding these ground-truth annotations. In th...
详细信息
A novel marketing strategy approach is proposed that offers distinctive features than other competitive models. Text converted from speech between customer and sales executive is fed into text summarizer to automate c...
详细信息
Hyperspectral Image (HSI) consisting of numerous high-resolution spectral bands creates challenges of the high dimensionality problem in HSI classification which hinder real-life applications despite their abundance o...
详细信息
ISBN:
(数字)9798350385779
ISBN:
(纸本)9798350385786
Hyperspectral Image (HSI) consisting of numerous high-resolution spectral bands creates challenges of the high dimensionality problem in HSI classification which hinder real-life applications despite their abundance of information. We present a lossy compression approach using stacked autoencoders to reduce high dimensionality problem in this paper. The pro-posed method utilizes stacked autoencoders to extract features from HSIs, allowing compression and subsequent reconstruction. The study demonstrates improved Peak Signal-to-Noise Ratio (PSNR) of 70.43, 60.87 and 61.36 on three distinct HSI datasets-Salinas, Botswana, and KSC respectively compared to previous autoencoder-based compression method. Additionally, the impact of compression on classification accuracy is assessed using a 3D-2D CNN model, achieving an average accuracy of 99 % across the datasets. Improved compression along with high classification accuracy shows our proposed method's usefulness.
It is of the utmost importance to ensure robust security and effective device maintenance in the rapidly changing landscape of smart city infrastructures. Be that as it may, existing procedures frequently miss the mar...
详细信息
ISBN:
(数字)9798350392111
ISBN:
(纸本)9798350392128
It is of the utmost importance to ensure robust security and effective device maintenance in the rapidly changing landscape of smart city infrastructures. Be that as it may, existing procedures frequently miss the mark in tending to the dynamic and different difficulties presented by emerging dangers and the perplexing exchange of IoT environments. This paper presents a clever way to deal with these issues through three inventive strategies: Adaptive Reinforcement Learning for IoT Security (ARLIS), Graph-Analytics-Based Anomaly Detection (GABAD), and Predictive Maintenance using Time Series Forecasting (PMTSF). Customary safety efforts frequently battle to adjust to the advancing danger scene, prompting weaknesses and likely breaks. ARLIS tends to this constraint by loading the force of support figuring out how to progressively change security conventions in view of ongoing IoT information and organization conditions. ARLIS continuously learns from feedback to improve security measures, which reduces response times to security threats and improves overall security efficacy. Also, irregularity location in IoT networks is tested by the sheer volume and complexity of information produced by interconnected gadgets. GABAD beats this obstacle by utilizing diagram examination to recognize oddities in device connections and ways of behaving inside smart city organizations. By building an exhaustive chart model and applying progressed oddity identification calculations, GABAD accomplishes unequaled precision in peculiarity location while limiting misleading up-sides. In addition, optimizing system reliability and minimizing service disruptions require proactive maintenance of IoT devices. PMTSF alters upkeep methodologies by utilizing time series to foresee gadget disappointments before they happen. By examining gadget execution measurements and ecological variables, PMTSF empowers convenient support mediations, prompting a significant decrease in spontaneous margin time and
Non-card retail payments, such as direct-from-the-bank programs and E-wallets, have become increasingly common at both brick-and-mortar and online establishments. In recent years, the use of mobile wallets has increas...
详细信息
This study uses cryptography to tackle the important problem of data security in cloud computing. Two keys are used in the Dual Key Encryption (DKE) method for both encryption and decryption. DKE employs a public key ...
详细信息
ISBN:
(纸本)9798400708268
This study uses cryptography to tackle the important problem of data security in cloud computing. Two keys are used in the Dual Key Encryption (DKE) method for both encryption and decryption. DKE employs a public key for the first encryption round before cloud upload and a user-only private key for the second round of encryption. Decryption operates oppositely. When tested and simulated with different file sizes on a CloudAnalyst simulator, DKE operates faster and more efficiently than cryptographic methods such as Triple DES (3DES), AES, RSA, and DES. Thanks to developments in information technology, cloud computing has made several services available online. Data security assurance is still very difficult to achieve, nevertheless. In this context, cryptography is essential and has led to the creation of the novel DKE technology. This technology is not only far more efficient than well-known cryptographic techniques such as 3DES, but it also improves data security.
In recent years, the emergence of the Internet and E-commerce has steered significant growth in digital transactions. Businesses today need mobile wallets, credit and debit cards, and e-cash to digitize payments. Digi...
详细信息
In recent years, the emergence of the Internet and E-commerce has steered significant growth in digital transactions. Businesses today need mobile wallets, credit and debit cards, and e-cash to digitize payments. Digital payment systems are in transition and promise amazing advancements, but they also pose many risks and as the number of online transactions is increasing tremendously, we need a security system that follows all security norms. In this paper, we study digital transaction systems and evaluate various components of E-commerce plat-forms to address the security of these services. We evaluate the attributes that affect the security of digital payment processes and identify several barriers that hinder their performance to propose a simplified payment mechanism for micro-payments that eliminates the double payment problem.
暂无评论