Deep Reinforcement Learning (DRL) has emerged as a pivotal technology in modern transportation systems, offering considerable potential to enhance driving safety and optimize performance. This study underscores the si...
详细信息
ISBN:
(数字)9798350351200
ISBN:
(纸本)9798350351217
Deep Reinforcement Learning (DRL) has emerged as a pivotal technology in modern transportation systems, offering considerable potential to enhance driving safety and optimize performance. This study underscores the significance of DRL in autonomous driving (AD) and introduces the Advantage Actor-Critic (A2C) approach for lane change decision-making. A2C, representing policy-based methods, is compared with the Prioritized Replay Deep Q-Network (PRDQN), a value-based approach previously used in similar scenarios. Both approaches were evaluated using the CARLA (Car Learning to Act) simulation environment, focusing on static obstacle scenarios. The comparative analysis aims to assess the performance differences between A2C and PRDQN, highlighting the effectiveness of A2C in improving decision-making accuracy, safety, and adaptability. The results demonstrate the superior performance of A2C in improving safety and decision-making within autonomous driving systems.
We propose a method for Saimaa ringed seal (Pusa hispida saimensis) re-identification. Access to large image volumes through camera trapping and crowdsourcing provides novel possibilities for animal conservation and m...
We propose a method for Saimaa ringed seal (Pusa hispida saimensis) re-identification. Access to large image volumes through camera trapping and crowdsourcing provides novel possibilities for animal conservation and monitoring and calls for automatic methods for analysis, in particular, when re-identifying individual animals from the images. The proposed method NOvel Ringed seal re-identification by Pelage Pattern Aggregation (NORPPA) utilizes the permanent and unique pelage pattern of Saimaa ringed seals and content-based image retrieval techniques. First, the query image is preprocessed, and each seal instance is segmented. Next, the seal's pelage pattern is extracted using a U-net encoder-decoder based method. Then, CNN-based affine invariant features are embedded and aggregated into Fisher Vectors. Finally, the cosine distance between the Fisher Vectors is used to find the best match from a database of known individuals. We perform extensive experiments of various modifications of the method on challenging Saimaa ringed seals re-identification dataset. The proposed method is shown to produce the best re-identification accuracy on our dataset in comparisons with alternative approaches.
During the process of mineral grinding, the ball mill generates the mechanical signals containing rich information due to different positions, which include mill loads and mill load parameters (MLPs). Actually, as one...
详细信息
This study explores the effectiveness of Convolutional Neural Networks (CNNs) in automatically classifying skin cancer for e-health applications. The trained model showcases impressive performance by leveraging the HA...
详细信息
Through the neural network model, the rainfall-type debris flow in Jiangjiagou is predicted. Based on seven meteorological factors with time series characteristics, such as daily rainfall, previous effective rainfall,...
详细信息
Contemporary machine learning techniques are capable of extracting complex structure from data in a way that complements or exceeds manual examination, yet, as is welldocumented, many of these techniques suffer from a...
详细信息
Urban congestion has been a known problem since the first urban revolution throughout the world. Today's major metropolises are synonymous with traffic congestion and complicated urban circulation. This paper intr...
详细信息
In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential *** support secure transmissions f...
详细信息
In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential *** support secure transmissions from legitimate users,two NOMA Secrecy Sum Rate Transmit Beam Forming(NOMA-SSR-TBF)schemes are proposed to maximise the SSR of a Base Station(BS)with sufficient and insufficient transmit *** BS with sufficient transmit power,an artificial jamming beamforming design scheme is proposed to disrupt the potential eavesdropping without impacting the legitimate *** addition,for BS with insufficient transmit power,a modified successive interference cancellation decoding sequence is used to reduce the impact of artificial jamming on legitimate *** specifically,iterative algorithm for the successive convex approximation are provided to jointly optimise the vectors of transmit beamforming and artificial *** results demonstrate that the proposed NOMA-SSR-TBF schemes outperforms the existing works,such as the maximized artificial jamming power scheme,the maximized artificial jamming power scheme with artificial jamming beamforming design and maximized secrecy sum rate scheme without artificial jamming beamforming design.
Through the recent progress in the field of microelectronics and the emergence of wireless communication technologies, wireless sensor networks (WSNs) have seen the light of day. However, one of the major problems of ...
详细信息
With the continuous development of construction technology and computer technology, in order to meet the needs of concrete quality management, a real-time monitoring information system based on computervision is esta...
详细信息
暂无评论