Conventional methods of imitation learning for variable-speed motion have difficulty extrapolating speeds because they rely on learning models running at a constant sampling frequency. This study proposes variable-fre...
详细信息
Precise uncrewed aerial vehicle (UAV) detection over long distances is of crucial importance for guaranteeing the airspace security. Although deep learning-based vision detectors have been developed, they still rely o...
详细信息
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s...
详细信息
In this research, we propose a novel approach to addressing the exploration–exploitation dilemma in multi-armed bandit (MAB) algorithms using fractal dimensions. The fractal dimension is used in the algorithms to rep...
In this research, we propose a novel approach to addressing the exploration–exploitation dilemma in multi-armed bandit (MAB) algorithms using fractal dimensions. The fractal dimension is used in the algorithms to represent the reward distributions of arms which represents the uncertainty of the arm in receiving the reward. The fractal dimension of the reward distribution is implemented in the most popular MAB optimization algorithms, such as Epsilon-Greedy, Upper Confidence Bound (UCB), Exponential-weight algorithm for Exploration and Exploitation (EXP3), and Thompson Sampling in this study. The algorithm prefers to choose arm with the least fractal dimension, as a lower fractal dimension represents less uncertainty of the arm. The performance of the fractal-enhanced MAB optimization algorithms is compared with traditional algorithms in non-stationary environments with various numbers of arms. The proposed approach provides a novel way to quantify and utilize the uncertainty of each arm in MAB problems.
Deepfake technology has rapidly evolved, posing a serious threat to the authenticity of digital media and contributing to the spread of misinformation. The manipulation of media content raises significant concerns acr...
详细信息
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho...
详细信息
Pushing the information states'acquisition efficiency has been a long-held goal to reach the measurement precision limit inside scattering *** studies have indicated that maximal information states can be attained...
详细信息
Pushing the information states'acquisition efficiency has been a long-held goal to reach the measurement precision limit inside scattering *** studies have indicated that maximal information states can be attained through engineered modes;however,partial intrusion is generally *** non-invasive designs have been substantially explored across diverse physical scenarios,the non-invasive acquisition of information states inside dynamic scattering spaces remains challenging due to the intractable non-unique mapping problem,particularly in the context of multi-target ***,we establish the feasibility of non-invasive information states'acquisition experimentally for the first time by introducing a tandem-generated adversarial network framework inside dynamic scattering *** illustrate the framework's efficacy,we demonstrate that efficient information states'acquisition for multi-target scenarios can achieve the Fisher information limit solely through the utilization of the external scattering matrix of the *** work provides insightful perspectives for precise measurements inside dynamic complex systems.
This paper proposes a measurement technique for an integrated complex filter. The proposed method is based on two measurement methods with integrated circuitry for calibration. It is accomplished by applying square wa...
详细信息
Generative adversarial networks (GANs) have gained popularity for their ability to synthesize images from random inputs in deep learning models. One of the notable applications of this technology is the creation of re...
详细信息
The adoption of symmetric searchable encryption (SSE) has become increasingly common. However, many current SSE schemes assume an honest-but-curious cloud service provider (CSP) or necessitate significant overhead to ...
详细信息
暂无评论