The study aims to address a comprehensive energy optimization approach for a 2BHK residential building located in Bodinayakanur, Theni, Tamil Nadu, equipped with a 2 kW solar panel. The study focuses on minimizing ene...
详细信息
Existing studies on constrained reinforcement learning (RL) may obtain a well-performing policy in the training environment. However, when deployed in a real environment, it may easily violate constraints that were or...
详细信息
Existing studies on constrained reinforcement learning (RL) may obtain a well-performing policy in the training environment. However, when deployed in a real environment, it may easily violate constraints that were originally satisfied during training because there might be model mismatch between the training and real environments. To address this challenge, we formulate the problem as constrained RL under model uncertainty, where the goal is to learn a policy that optimizes the reward and at the same time satisfies the constraint under model mismatch. We develop a Robust Constrained Policy Optimization (RCPO) algorithm, which is the first algorithm that applies to large/continuous state space and has theoretical guarantees on worst-case reward improvement and constraint violation at each iteration during the training. We show the effectiveness of our algorithm on a set of RL tasks with constraints. Copyright 2024 by the author(s)
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio...
详细信息
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not *** the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple *** this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like ***-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive *** demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri *** results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility.
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Energy prices have increased by more than 62% globally on average, while power companies are trying to provide more affordable energy with different options: fixed-rate, slab-based tariffs, and Time-of-Use pricing. Th...
详细信息
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec...
详细信息
Diabetes mellitus is characterized as a chronic disease that may cause many complications. Machine learning algorithms are used to diagnose and predict diabetes. The learning-based algorithms play a vital role in supp...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT ga...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT gadget ***-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)*** this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their *** recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying *** current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT *** presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT *** accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square *** detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this ***,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition *** proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct *** comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
Cotton plays a vital role in agricultural sustainability, extending beyond its textile applications. Pathogens pose significant threats to cotton plants and farmers' livelihoods, highlighting the critical need for...
详细信息
With the recent advent of technology, social networks are accessible 24/7 using mobile devices. During covid-19 pandemic the propagation of misinformation are mostly related to the disease, its cures and prevention. W...
详细信息
暂无评论