Optimization and sampling based algorithms are two branches of methods in machine learning, while existing safe reinforcement learning (RL) algorithms are mainly based on optimization, it is still unclear whether samp...
详细信息
Optimization and sampling based algorithms are two branches of methods in machine learning, while existing safe reinforcement learning (RL) algorithms are mainly based on optimization, it is still unclear whether sampling based methods can lead to desirable performance with safe policy. This paper formulates the Langevin policy for safe RL, and proposes Langevin Actor-Critic (LAC) to accelerate the process of policy inference. Concretely, instead of parametric policy, the proposed Langevin policy provides a stochastic process that directly infers actions, which is the numerical solver to the Langevin dynamic of actions on the continuous time. Furthermore, to make Langevin policy practical on RL tasks, the proposed LAC accumulates the transitions induced by Langevin policy and reproduces them with a generator. Finally, extensive empirical results show the effectiveness and superiority of LAC on the MuJoCo-based and Safety Gym tasks. Our implementation is available at https://***/Lfh404/LAC. Copyright 2024 by the author(s)
Radio Frequency Identification (RFID) is a crucial technology in the Internet of Things (IoT), enabling seamless wireless communication and data exchange. However, these technologies can pose significant security chal...
详细信息
The metaverse is a visual world that blends the physical world and digital *** present,the development of the metaverse is still in the early stage,and there lacks a framework for the visual construction and explorati...
详细信息
The metaverse is a visual world that blends the physical world and digital *** present,the development of the metaverse is still in the early stage,and there lacks a framework for the visual construction and exploration of the *** this paper,we propose a framework that summarizes how graphics,interaction,and visualization techniques support the visual construction of the metaverse and user-centric *** introduce three kinds of visual elements that compose the metaverse and the two graphical construction methods in a *** propose a taxonomy of interaction technologies based on interaction tasks,user actions,feedback and various sensory channels,and a taxonomy of visualization techniques that assist user *** potential applications and future opportunities are discussed in the context of visual construction and exploration of the *** hope this paper can provide a stepping stone for further research in the area of graphics,interaction and visualization in the metaverse.
The unpredictable nature of cryptocurrency markets, particularly Bitcoin, has attracted significant attention from investors, researchers, and financial institutions seeking to understand and predict price movements. ...
详细信息
With the continuous expansion of the tourism industry, understanding and enhancing tourism service quality has become increasingly critical. This study introduces an innovative method for evaluating tourism service qu...
详细信息
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of Information and Communication Technologies (ICTs). Within the immersive SPG e...
详细信息
Our goal in this paper is to significantly decrease the compiled size of a given Boolean instance with a large representation, while preserving as much information about the instance as possible. We achieve this by as...
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c...
详细信息
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication *** grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for ***,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for ***,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security ***,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal *** index system contains 18 indicators in 3 ***,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and *** higher the level,the greater the security ***,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by *** results show that calculated security risk level based on the proposed assessment method are consistent with actual ***,the reasonableness and effectiveness of the proposed index system and assessment method are validated.
Due to high proliferation of unsolicited information in the text, image and video files, the social media analytics engine suffers from losing its user, user privacy and others. The unsolicited information is been a h...
详细信息
Deep learning has transformed medical imaging by significantly improving accuracy and efficiency in image processing tasks such as disease detection, segmentation, and classification. This paper explores the role of c...
详细信息
暂无评论