Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar...
详细信息
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)areas or high reward(quality)*** existing methods perform exploration by only utilizing the novelty of *** novelty and quality in the neighboring area of the current state have not been well utilized to simultaneously guide the agent’s *** address this problem,this paper proposes a novel RL framework,called clustered reinforcement learning(CRL),for efficient exploration in *** adopts clustering to divide the collected states into several clusters,based on which a bonus reward reflecting both novelty and quality in the neighboring area(cluster)of the current state is given to the *** leverages these bonus rewards to guide the agent to perform efficient ***,CRL can be combined with existing exploration strategies to improve their performance,as the bonus rewards employed by these existing exploration strategies solely capture the novelty of *** on four continuous control tasks and six hard-exploration Atari-2600 games show that our method can outperform other state-of-the-art methods to achieve the best performance.
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc...
详细信息
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doctors to identify the exact model and manufacturer of the prosthesis when it is *** paper proposes a transfer learning-based class imbalance-aware prosthesis detection method to detect the implant’s manufacturer automatically from shoulder X-ray *** framework of the method proposes a novel training approach and a new set of batch-normalization,dropout,and fully convolutional layers in the head *** employs cyclical learning rates and weighting-based loss calculation *** modifications aid in faster convergence,avoid local-minima stagnation,and remove the training bias caused by imbalanced *** proposed method is evaluated using seven well-known pre-trained models of VGGNet,ResNet,and DenseNet *** is performed on a shoulder implant benchmark dataset consisting of 597 shoulder X-ray *** proposed method improves the classification performance of all pre-trained models by 10–12%.The DenseNet-201-based variant has achieved the highest classification accuracy of 89.5%,which is 10%higher than existing ***,to validate and generalize the proposed method,the existing baseline dataset is supplemented to six classes,including samples of two more implant *** results have shown average accuracy of 86.7%for the extended dataset and show the preeminence of the proposed method.
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies ...
详细信息
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies is reconstructed by the arrays of external electrodes that are connected on the periphery of the *** equipment is cheap,fast,and edge *** this imaging method,the image of electrical conductivity distribution(or its opposite;electrical impedance)of the internal parts of the target object is *** image reconstruction process is performed by injecting a precise electric current to the peripheral boundaries of the object,measuring the peripheral voltages induced from it and processing the collected *** an electrical impedance tomography system,the voltages measured in the peripheral boundaries have a non-linear equation with the electrical conductivity *** paper presents a cheap electrical Impedance Tomography(EIT)instrument for detecting impurities in the concrete.A voltage-controlled current source,a micro-controller,a set of multiplexers,a set of electrodes,and a personal computer constitute the structure of the *** conducted tests on concrete with impurities show that the designed EIT system can reveal impurities with a good accuracy in a reasonable time.
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conser...
详细信息
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous *** on Large Energy-Aware Fog(LEAF)computing,this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network *** main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected *** proposed LEAF model enables researchers to perform simulations of thousands of streaming applications over distributed and heterogeneous *** the possible reasons is that it provides a realistic simulation environment in which compute nodes can dynamically join and leave,while different kinds of networking protocols-wired and wireless-can also be *** novelty of this work is threefold:for the first time,the LEAF model integrates online decision-making algorithms for energy-aware task placement and routing strategies that leverage power usage traces with efficiency optimization in *** existing fog computing simulators,data flows and power consumption are modeled as parameterizable mathematical equations in LEAF to ensure scalability and ease of analysis across a wide range of devices and *** results of evaluation show that LEAF can cover up to 98.75%of the distance,with devices ranging between 1 and 1000,showing significant energy-saving potential through A wide-area network(WAN)usage *** findings indicate great promise for fog computing in the future-in particular,models like LEAF for planning energy-efficient IoV infrastructures.
The identification of individuals through ear images is a prominent area of study in the biometric *** recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing,prompting the explorati...
详细信息
The identification of individuals through ear images is a prominent area of study in the biometric *** recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing,prompting the exploration of supplementary biometric measures such as ear *** research proposes a Deep Learning(DL)framework,termed DeepBio,using ear biometrics for human *** employs two DL models and five datasets,including IIT Delhi(IITD-I and IITD-II),annotated web images(AWI),mathematical analysis of images(AMI),and *** augmentation techniques such as flipping,translation,and Gaussian noise are applied to enhance model performance and mitigate *** extraction and human identification are conducted using a hybrid approach combining Convolutional Neural Networks(CNN)and Bidirectional Long Short-Term Memory(Bi-LSTM).The DeepBio framework achieves high recognition rates of 97.97%,99.37%,98.57%,94.5%,and 96.87%on the respective *** analysis with existing techniques demonstrates improvements of 0.41%,0.47%,12%,and 9.75%on IITD-II,AMI,AWE,and EARVN1 datasets,respectively.
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeV...
详细信息
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork *** present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service *** compile a broad dataset of labeled VPN traffic flows from various apps and usage ***,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous *** effectively process and categorize encrypted packets,the neural network model has input,hidden,and output *** use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral *** also use cutting-edge optimizationmethods to optimize network characteristics and *** suggested ANN-based categorization method is extensively tested and *** show the model effectively classifies VPN traffic *** also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%*** study improves VPN security and protects against new *** VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security *** study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
Epileptic seizure detection has been a complex task due to the chaos and non-stationariness observed in the electroencephalogram (EEG) signals. Most existing EEG-based seizure detection algorithms are patient-dependen...
详细信息
In the process of coping with energy and environmental protection issues,technologies such as energy materials,energy devices,and energy systems have made great *** excellent performance,film capacitors play an increa...
详细信息
In the process of coping with energy and environmental protection issues,technologies such as energy materials,energy devices,and energy systems have made great *** excellent performance,film capacitors play an increasingly important role in energyrelated *** the increase of application scenarios and the continuous development of film material technology,it is urgent to establish a better theoretical connection from films to ***,the main components of the capacitor including the film and the positional relationships among them are ***,from the two perspectives of indirect calculation according to the volume and the direct calculation according to the winding process,the equation between the dielectric constant of films and the corresponding capacitance of capacitors is ***,the measurement data and error analysis results of the built test platform prove the accuracy and great potential of the proposed calculation *** addition,error sources,including film thickness uniformity,are ***,the challenges faced by the proposed calculation methods and the paths that can be referenced for future research are summarised and discussed.
Soft switching reduces voltage and current stress during transitions, smoothing and quieting operations and reducing electromagnetic interference while also increasing efficiency and equipment lifespan. Circuit design...
详细信息
暂无评论