首页 > 最新文献

2021 26th International Computer Conference, Computer Society of Iran (CSICC)最新文献

英文 中文
Secure Determining of the k-th Greatest Element Among Distributed Private Values 分布私有值中第k大元素的安全确定
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420567
M. Jaberi, H. Mala
One of the basic operations over distributed data is to find the k-th greatest value among union of these numerical data. The challenge arises when the datasets are private and their owners cannot trust any third party. In this paper, we propose a new secure protocol to find the k-th greatest value by means of secure summation sub-protocol. We compare our proposed protocol with other similar protocols. Specially, we will show that our scheme is more efficient than the well-known protocol of Aggarwal et.al. (2004) in terms of computation and communication complexity. Specifically, in the case of Ti = 1 secret value for any party Pi our protocol has log m computation overhead and δ log m communication overhead for party Pi, where m and δ are the maximum acceptable value and communication overhead of the secure summation sub-protocol, respectively. The overheads of our protocol is exactly half of the overheads of Aggarwal’s protocol.
分布数据的基本运算之一是求这些数值数据的并集的第k个最大值。当数据集是私有的,并且它们的所有者不能信任任何第三方时,挑战就出现了。本文提出了一种利用安全求和子协议寻找第k个最大值的新安全协议。我们将所提出的协议与其他类似协议进行了比较。特别地,我们将证明我们的方案比众所周知的Aggarwal等协议更有效。(2004)在计算和通信复杂性方面。具体来说,在任何一方Pi的Ti = 1秘密值的情况下,我们的协议对Pi的计算开销为log m,通信开销为δ log m,其中m和δ分别是安全求和子协议的最大可接受值和通信开销。我们协议的开销恰好是Aggarwal协议开销的一半。
{"title":"Secure Determining of the k-th Greatest Element Among Distributed Private Values","authors":"M. Jaberi, H. Mala","doi":"10.1109/CSICC52343.2021.9420567","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420567","url":null,"abstract":"One of the basic operations over distributed data is to find the k-th greatest value among union of these numerical data. The challenge arises when the datasets are private and their owners cannot trust any third party. In this paper, we propose a new secure protocol to find the k-th greatest value by means of secure summation sub-protocol. We compare our proposed protocol with other similar protocols. Specially, we will show that our scheme is more efficient than the well-known protocol of Aggarwal et.al. (2004) in terms of computation and communication complexity. Specifically, in the case of Ti = 1 secret value for any party Pi our protocol has log m computation overhead and δ log m communication overhead for party Pi, where m and δ are the maximum acceptable value and communication overhead of the secure summation sub-protocol, respectively. The overheads of our protocol is exactly half of the overheads of Aggarwal’s protocol.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124867931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate Time-Series Prediction Using LSTM Neural Networks 基于LSTM神经网络的多元时间序列预测
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420543
R. Ghanbari, K. Borna
In this paper, we analyzed different models of LSTM neural networks on the multi-step time-series dataset. The purpose of this study is to express a clear and precise method using LSTM neural networks for sequence datasets. These models can be used in other similar datasets, and the models are composed to be developed for various multi-step datasets with the slightest adjustment required. The principal purpose and question of this study were whether it is possible to provide a model to predict the amount of electricity consumed by a house over the next seven days. Using the specified models, we have made a prediction based on the dataset. We also made a comprehensive comparison with all the results obtained from the methods among different models. In this study, the dataset is household electricity consumption data gathered over four years. We have been able to achieve the desired prediction results with the least amount of error among the existing state-of-the-art models.
本文对LSTM神经网络在多步时间序列数据集上的不同模型进行了分析。本研究的目的是利用LSTM神经网络对序列数据集表达一种清晰、精确的方法。这些模型可以用于其他类似的数据集,并且这些模型可以用于各种多步数据集,只需要最轻微的调整。这项研究的主要目的和问题是,是否有可能提供一个模型来预测一个房子在未来七天内消耗的电量。利用指定的模型,对数据集进行了预测。在不同的模型中,我们还对所有方法得到的结果进行了综合比较。在这项研究中,数据集是四年来收集的家庭用电量数据。我们已经能够在现有的最先进的模型中以最小的误差达到预期的预测结果。
{"title":"Multivariate Time-Series Prediction Using LSTM Neural Networks","authors":"R. Ghanbari, K. Borna","doi":"10.1109/CSICC52343.2021.9420543","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420543","url":null,"abstract":"In this paper, we analyzed different models of LSTM neural networks on the multi-step time-series dataset. The purpose of this study is to express a clear and precise method using LSTM neural networks for sequence datasets. These models can be used in other similar datasets, and the models are composed to be developed for various multi-step datasets with the slightest adjustment required. The principal purpose and question of this study were whether it is possible to provide a model to predict the amount of electricity consumed by a house over the next seven days. Using the specified models, we have made a prediction based on the dataset. We also made a comprehensive comparison with all the results obtained from the methods among different models. In this study, the dataset is household electricity consumption data gathered over four years. We have been able to achieve the desired prediction results with the least amount of error among the existing state-of-the-art models.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Recurrent Neural Network Approach to Model Failure Rate Considering Random and Deteriorating Failures 考虑随机和劣化故障的故障率模型递归神经网络方法
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420545
A. Alizadeh, Navid Malek Alayi, A. Fereidunian, H. Lesani
Recurrent neural networks (RNNs) utilize their internal state to handle variable length sequences, as time series; namely here as uncertain failure rates of the systems. Failure rate model of the components are required to improve systems reliability. Although the failure rate model has undeniable importance systems reliability assessment, an acceptable failure rate model has not been proposed to consider all causes of failures particularly random failures. Therefore, planners and decision makers are susceptible to a high financial risk for their decisions in the system. An approach is addressed to consider random failure rate along with deteriorating failure rate, to ameliorate this risks, in this paper. Therefore, the complexity of failure behavior is considered, while modeling considering the failure data as a time series. Moreover, the results of failure rate estimation are tested on a reliability-centered maintenance (RCM) implementation to prove the importance of random failure rate consideration. The results express that a more effective strategy can be regarded for preventive maintenance (PM) scheduling in RCM problem, when the proposed approach is utilized for failure rate modeling.
递归神经网络(rnn)利用其内部状态来处理变长序列,如时间序列;也就是系统的不确定故障率。为了提高系统的可靠性,需要建立部件的故障率模型。尽管故障率模型在系统可靠性评估中具有不可否认的重要性,但目前还没有一个可接受的故障率模型来考虑所有的故障原因,特别是随机故障。因此,规划者和决策者在系统中的决策容易受到高财务风险的影响。本文提出了一种考虑随机故障率和恶化故障率的方法,以改善这种风险。因此,在建模时考虑了失效行为的复杂性,并将失效数据视为时间序列。最后,在以可靠性为中心的维修(RCM)实施中对故障率估计结果进行了测试,以证明随机故障率考虑的重要性。结果表明,将该方法应用于RCM问题的故障率建模,可以为RCM问题的预防性维修调度提供更有效的策略。
{"title":"A Recurrent Neural Network Approach to Model Failure Rate Considering Random and Deteriorating Failures","authors":"A. Alizadeh, Navid Malek Alayi, A. Fereidunian, H. Lesani","doi":"10.1109/CSICC52343.2021.9420545","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420545","url":null,"abstract":"Recurrent neural networks (RNNs) utilize their internal state to handle variable length sequences, as time series; namely here as uncertain failure rates of the systems. Failure rate model of the components are required to improve systems reliability. Although the failure rate model has undeniable importance systems reliability assessment, an acceptable failure rate model has not been proposed to consider all causes of failures particularly random failures. Therefore, planners and decision makers are susceptible to a high financial risk for their decisions in the system. An approach is addressed to consider random failure rate along with deteriorating failure rate, to ameliorate this risks, in this paper. Therefore, the complexity of failure behavior is considered, while modeling considering the failure data as a time series. Moreover, the results of failure rate estimation are tested on a reliability-centered maintenance (RCM) implementation to prove the importance of random failure rate consideration. The results express that a more effective strategy can be regarded for preventive maintenance (PM) scheduling in RCM problem, when the proposed approach is utilized for failure rate modeling.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Subspace Outlier Detection in High Dimensional Data using Ensemble of PCA-based Subspaces 基于pca的子空间集成的高维数据子空间离群点检测
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420589
Mahboobeh Riahi-Madvar, B. Nasersharif, A. A. Azirani
Outlier detection in high dimensional data faces the challenge of curse of dimensionality where irrelevant features may prevent detection of outliers. The Principal Component Analysis (PCA) is widely used for dimensionality reduction in high dimensional outlier detection problem. While no single subspace can to thoroughly capture the outlier data points; we propose to combine the result of multiple subspaces to deal with this situation. In this research, we propose a subspace outlier detection algorithm in high dimensional data using an ensemble of PCA-based subspaces (SODEP) method. Three relevant subspaces are selected using PCA features to discover different types of outliers and subsequently, compute outlier scores in the projected subspaces. The experimental results show that our ensemble-based outlier selection is a promising method in high dimensional data and has better efficiency than other compared methods.
高维数据的异常点检测面临着维度诅咒的挑战,其中不相关的特征可能会阻碍异常点的检测。主成分分析(PCA)被广泛用于高维异常点检测问题的降维。而没有一个单独的子空间可以完全捕获离群数据点;我们建议结合多个子空间的结果来处理这种情况。在本研究中,我们提出了一种基于pca的子空间集成(SODEP)方法的高维数据子空间离群点检测算法。利用PCA特征选择三个相关的子空间来发现不同类型的离群值,然后在投影子空间中计算离群值得分。实验结果表明,基于集成的离群点选择方法是一种很有前途的高维数据选择方法,并且比其他比较方法具有更好的效率。
{"title":"Subspace Outlier Detection in High Dimensional Data using Ensemble of PCA-based Subspaces","authors":"Mahboobeh Riahi-Madvar, B. Nasersharif, A. A. Azirani","doi":"10.1109/CSICC52343.2021.9420589","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420589","url":null,"abstract":"Outlier detection in high dimensional data faces the challenge of curse of dimensionality where irrelevant features may prevent detection of outliers. The Principal Component Analysis (PCA) is widely used for dimensionality reduction in high dimensional outlier detection problem. While no single subspace can to thoroughly capture the outlier data points; we propose to combine the result of multiple subspaces to deal with this situation. In this research, we propose a subspace outlier detection algorithm in high dimensional data using an ensemble of PCA-based subspaces (SODEP) method. Three relevant subspaces are selected using PCA features to discover different types of outliers and subsequently, compute outlier scores in the projected subspaces. The experimental results show that our ensemble-based outlier selection is a promising method in high dimensional data and has better efficiency than other compared methods.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121665860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fine-grain Computation Offloading Considering Application Components’ Sequencing 考虑应用组件排序的细粒度计算卸载
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420577
Razie Roostaei, Marzieh Sheikhi, Z. Movahedi
Nowadays, the usage of mobile devices is increasing in human’s life. But these devices have some constraints such as limited storage, low battery lifetime, and weak computation capacity. To deal with these limitations, mobile devices offload their heavy applications to the cloud by using mobile cloud computing technology. Because of the network conditions, offloading may impose delay and energy costs on mobile devices. Thus, it is a tradeoff between local and remote execution. Further, offloading some components of the application may be cost-effective than the whole one. In this paper, we propose a fine-grain computation offloading scheme considering application components’ sequencing. The proposed scheme turns the exponential complexity of the decision algorithm into the polynomial. The simulation and evaluation results demonstrate that the offloading efficiency improves thanks to reducing the decision overhead.
如今,移动设备在人们生活中的使用越来越多。但这些设备有一些限制,如有限的存储,电池寿命短,计算能力弱。为了解决这些限制,移动设备通过使用移动云计算技术将其繁重的应用程序卸载到云中。由于网络条件的原因,卸载可能会对移动设备造成延迟和能源成本。因此,这是本地执行和远程执行之间的权衡。此外,卸载应用程序的某些组件可能比卸载整个组件更具成本效益。本文提出了一种考虑应用组件排序的细粒度计算卸载方案。该方案将决策算法的指数复杂度转化为多项式复杂度。仿真和评估结果表明,由于减少了决策开销,卸载效率得到了提高。
{"title":"Fine-grain Computation Offloading Considering Application Components’ Sequencing","authors":"Razie Roostaei, Marzieh Sheikhi, Z. Movahedi","doi":"10.1109/CSICC52343.2021.9420577","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420577","url":null,"abstract":"Nowadays, the usage of mobile devices is increasing in human’s life. But these devices have some constraints such as limited storage, low battery lifetime, and weak computation capacity. To deal with these limitations, mobile devices offload their heavy applications to the cloud by using mobile cloud computing technology. Because of the network conditions, offloading may impose delay and energy costs on mobile devices. Thus, it is a tradeoff between local and remote execution. Further, offloading some components of the application may be cost-effective than the whole one. In this paper, we propose a fine-grain computation offloading scheme considering application components’ sequencing. The proposed scheme turns the exponential complexity of the decision algorithm into the polynomial. The simulation and evaluation results demonstrate that the offloading efficiency improves thanks to reducing the decision overhead.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Distributed Access Control Model in Cloud Computing by Blockchain 基于b区块链改进的云计算分布式访问控制模型
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420586
Akram Sabzmakan, S. L. Mirtaheri
With the ever-expanding digital communications and the need for advanced interoperability and collaboration, organizations and entities need to share their digital assets. Cloud computing is now widely used for managing and storing resources. Access control is a critical issue, facing many challenges in distributed environments, including clouds. In this paper, we present a model of the cloud access control system. Our distributed model utilizes a role-based access control to enable the management of resources and the parties’ access securely. We provide interoperability between multiple organizations to access shared resources using Ethereum Blockchain smart contracts and access levels for available resources. Roles define access permissions; however, unlike the traditional role-based access control model, the roles are determined according to the organizations involved' collaborative project, sometimes may not exist in any organization. They can only be created in their interactions. Finally, for evaluating its cost and time parameters. We use Ethereum smart contracts and deploy them in the Ethereum test network called Rinkby,
随着数字通信的不断扩展以及对高级互操作性和协作的需求,组织和实体需要共享其数字资产。云计算现在被广泛用于管理和存储资源。访问控制是一个关键问题,在包括云在内的分布式环境中面临许多挑战。本文提出了一种云访问控制系统的模型。我们的分布式模型利用基于角色的访问控制来安全地管理资源和各方的访问。我们提供多个组织之间的互操作性,使用以太坊区块链智能合约和可用资源的访问级别访问共享资源。角色定义访问权限;然而,与传统的基于角色的访问控制模型不同,角色是根据所涉及的组织的协作项目来确定的,有时可能在任何组织中都不存在。它们只能在相互作用中被创造出来。最后,对其成本和时间参数进行了评价。我们使用以太坊智能合约,并将其部署在名为Rinkby的以太坊测试网络中,
{"title":"An Improved Distributed Access Control Model in Cloud Computing by Blockchain","authors":"Akram Sabzmakan, S. L. Mirtaheri","doi":"10.1109/CSICC52343.2021.9420586","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420586","url":null,"abstract":"With the ever-expanding digital communications and the need for advanced interoperability and collaboration, organizations and entities need to share their digital assets. Cloud computing is now widely used for managing and storing resources. Access control is a critical issue, facing many challenges in distributed environments, including clouds. In this paper, we present a model of the cloud access control system. Our distributed model utilizes a role-based access control to enable the management of resources and the parties’ access securely. We provide interoperability between multiple organizations to access shared resources using Ethereum Blockchain smart contracts and access levels for available resources. Roles define access permissions; however, unlike the traditional role-based access control model, the roles are determined according to the organizations involved' collaborative project, sometimes may not exist in any organization. They can only be created in their interactions. Finally, for evaluating its cost and time parameters. We use Ethereum smart contracts and deploy them in the Ethereum test network called Rinkby,","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An SDN-based Firewall for Networks with Varying Security Requirements 基于sdn的防火墙,适用于不同安全需求的网络
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420571
Ghazal Rezaei, M. Hashemi
With the new coronavirus crisis, medical devices’ workload has increased dramatically, leaving them growingly vulnerable to security threats and in need of a comprehensive solution. In this work, we take advantage of the flexible and highly manageable nature of Software Defined Networks (SDN) to design a thoroughgoing security framework that covers a health organization’s various security requirements. Our solution comes to be an advanced SDN firewall that solves the issues facing traditional firewalls. It enables the partitioning of the organization’s network and the enforcement of different filtering and monitoring behaviors on each partition depending on security conditions. We pursued the network’s efficient and dynamic security management with the least human intervention in designing our model which makes it generally qualified to use in networks with different security requirements.
随着新型冠状病毒危机的爆发,医疗设备的工作量急剧增加,越来越容易受到安全威胁,需要全面的解决方案。在这项工作中,我们利用软件定义网络(SDN)的灵活性和高度可管理性来设计一个全面的安全框架,涵盖医疗机构的各种安全需求。我们的解决方案是一种先进的SDN防火墙,解决了传统防火墙面临的问题。它支持对组织的网络进行分区,并根据安全条件在每个分区上实施不同的过滤和监视行为。在设计模型时,力求以最少的人为干预实现网络的高效、动态的安全管理,使该模型能够普遍适用于不同安全要求的网络。
{"title":"An SDN-based Firewall for Networks with Varying Security Requirements","authors":"Ghazal Rezaei, M. Hashemi","doi":"10.1109/CSICC52343.2021.9420571","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420571","url":null,"abstract":"With the new coronavirus crisis, medical devices’ workload has increased dramatically, leaving them growingly vulnerable to security threats and in need of a comprehensive solution. In this work, we take advantage of the flexible and highly manageable nature of Software Defined Networks (SDN) to design a thoroughgoing security framework that covers a health organization’s various security requirements. Our solution comes to be an advanced SDN firewall that solves the issues facing traditional firewalls. It enables the partitioning of the organization’s network and the enforcement of different filtering and monitoring behaviors on each partition depending on security conditions. We pursued the network’s efficient and dynamic security management with the least human intervention in designing our model which makes it generally qualified to use in networks with different security requirements.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114714140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Duplicated Replay Buffer for Asynchronous Deep Deterministic Policy Gradient 异步深度确定性策略梯度的重复重放缓冲
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420550
Seyed Mohammad Seyed Motehayeri, Vahid Baghi, E. M. Miandoab, A. Moeini
Off-Policy Deep Reinforcement Learning (DRL) algorithms such as Deep Deterministic Policy Gradient (DDPG) has been used to teach intelligent agents to solve complicated problems in continuous space-action environments. Several methods have been successfully applied to increase the training performance and achieve better speed and stability for these algorithms. Such as experience replay to selecting a batch of transactions of the replay memory buffer. However, working with environments with sparse reward function is a challenge for these algorithms and causes them to reduce these algorithms' performance. This research intends to make the transaction selection process more efficient by increasing the likelihood of selecting important transactions from the replay memory buffer. Our proposed method works better with a sparse reward function or, in particular, with environments that have termination conditions. We are using a secondary replay memory buffer that stores more critical transactions. In the training process, transactions are select in both the first replay buffer and the secondary replay buffer. We also use a parallel environment to asynchronously execute and fill the primary replay buffer and the secondary replay buffer. This method will help us to get better performance and stability. Finally, we evaluate our proposed approach to the Crawler model, one of the Unity ML-Agent tasks with sparse reward function, against DDPG and AE-DDPG.
非策略深度强化学习(DRL)算法,如深度确定性策略梯度(DDPG),已被用于训练智能体解决连续空间行动环境中的复杂问题。已经成功地应用了几种方法来提高这些算法的训练性能,并获得了更好的速度和稳定性。如经历重播要选择一批事务的重播缓冲存储器。然而,对于这些算法来说,处理具有稀疏奖励函数的环境是一个挑战,并导致它们降低了这些算法的性能。本研究旨在通过增加从重放记忆缓冲区中选择重要事务的可能性来提高事务选择过程的效率。我们提出的方法在稀疏奖励函数中工作得更好,特别是在具有终止条件的环境中。我们使用二级重放内存缓冲区来存储更多的关键事务。在训练过程中,在第一重放缓冲区和第二重放缓冲区中选择事务。我们还使用并行环境来异步执行和填充主重放缓冲区和辅助重放缓冲区。这种方法将帮助我们获得更好的性能和稳定性。最后,我们针对DDPG和AE-DDPG评估了我们提出的针对Crawler模型的方法,该模型是具有稀疏奖励函数的Unity ML-Agent任务之一。
{"title":"Duplicated Replay Buffer for Asynchronous Deep Deterministic Policy Gradient","authors":"Seyed Mohammad Seyed Motehayeri, Vahid Baghi, E. M. Miandoab, A. Moeini","doi":"10.1109/CSICC52343.2021.9420550","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420550","url":null,"abstract":"Off-Policy Deep Reinforcement Learning (DRL) algorithms such as Deep Deterministic Policy Gradient (DDPG) has been used to teach intelligent agents to solve complicated problems in continuous space-action environments. Several methods have been successfully applied to increase the training performance and achieve better speed and stability for these algorithms. Such as experience replay to selecting a batch of transactions of the replay memory buffer. However, working with environments with sparse reward function is a challenge for these algorithms and causes them to reduce these algorithms' performance. This research intends to make the transaction selection process more efficient by increasing the likelihood of selecting important transactions from the replay memory buffer. Our proposed method works better with a sparse reward function or, in particular, with environments that have termination conditions. We are using a secondary replay memory buffer that stores more critical transactions. In the training process, transactions are select in both the first replay buffer and the secondary replay buffer. We also use a parallel environment to asynchronously execute and fill the primary replay buffer and the secondary replay buffer. This method will help us to get better performance and stability. Finally, we evaluate our proposed approach to the Crawler model, one of the Unity ML-Agent tasks with sparse reward function, against DDPG and AE-DDPG.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic Segmentation of Autonomous Driving Images by the Combination of Deep Learning and Classical Segmentation 深度学习与经典分割相结合的自动驾驶图像语义分割
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420573
Mohammad Hosein Hamian, Ali Beikmohammadi, A. Ahmadi, B. Nasersharif
One of the bold issues in autonomous driving is considered semantic image segmentation, which must be done with high accuracy and speed. Semantic segmentation is used to understand an image at the pixel level. In this regard, various architectures based on deep neural networks have been proposed for semantic segmentation of autonomous driving image datasets. In this paper, we proposed a novel combination method in which dividing the image into its constituent regions with the help of classical segmentation brings about achieving beneficial information that improves the DeepLab v3+ network results. The proposed method with the two backbones, Xception and MobileNetV2, obtains the mIoU of 81.73% and 76.31% on the Cityscapes dataset, respectively, which shows promising results compared to the model without post-processing.
语义图像分割是自动驾驶中的一个重要问题,它必须以高精度和高速度完成。语义分割用于在像素级理解图像。在这方面,基于深度神经网络的各种架构已经被提出用于自动驾驶图像数据集的语义分割。在本文中,我们提出了一种新的组合方法,在经典分割的帮助下将图像划分为其组成区域,从而获得有益的信息,提高了DeepLab v3+网络的结果。采用Xception和MobileNetV2两个主干的方法,在cityscape数据集上的mIoU分别为81.73%和76.31%,与未进行后处理的模型相比,效果良好。
{"title":"Semantic Segmentation of Autonomous Driving Images by the Combination of Deep Learning and Classical Segmentation","authors":"Mohammad Hosein Hamian, Ali Beikmohammadi, A. Ahmadi, B. Nasersharif","doi":"10.1109/CSICC52343.2021.9420573","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420573","url":null,"abstract":"One of the bold issues in autonomous driving is considered semantic image segmentation, which must be done with high accuracy and speed. Semantic segmentation is used to understand an image at the pixel level. In this regard, various architectures based on deep neural networks have been proposed for semantic segmentation of autonomous driving image datasets. In this paper, we proposed a novel combination method in which dividing the image into its constituent regions with the help of classical segmentation brings about achieving beneficial information that improves the DeepLab v3+ network results. The proposed method with the two backbones, Xception and MobileNetV2, obtains the mIoU of 81.73% and 76.31% on the Cityscapes dataset, respectively, which shows promising results compared to the model without post-processing.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Graph Representation Learning In A Contrastive Framework For Community Detection 社区检测对比框架中的图表示学习
Pub Date : 2021-03-03 DOI: 10.1109/CSICC52343.2021.9420623
Mehdi Balouchi, A. Ahmadi
Graph structured data has become very popular and useful recently. Many areas in science and technology are using graphs for modeling the phenomena they are dealing with (e.g., computer science, computational economics, biology, …). Since the volume of data and its velocity of generation is increasing every day, using machine learning methods for analyzing this data has become necessary. For this purpose, we need to find a representation for our graph structured data that preserves topological information of the graph alongside the feature information of its nodes. Another challenge in incorporating machine learning methods as a graph data analyzer is to provide enough amount of labeled data for the model which may be hard to do in real-world applications. In this paper we present a graph neural network-based model for learning node representations that can be used efficiently in machine learning methods. The model learns representations in an unsupervised contrastive framework so that there is no need for labels to be present. Also, we test our model by measuring its performance in the task of community detection of graphs. Performance comparing on two citation graphs shows that our model has a better ability to learn representations that have a higher accuracy for community detection than other models in the field.
图结构数据最近变得非常流行和有用。科学和技术的许多领域都在使用图形来模拟他们正在处理的现象(例如,计算机科学、计算经济学、生物学等)。由于数据量和生成速度每天都在增加,使用机器学习方法来分析这些数据变得很有必要。为此,我们需要为我们的图结构化数据找到一种表示,这种表示既保留了图的拓扑信息,也保留了图的节点特征信息。将机器学习方法作为图数据分析器的另一个挑战是为模型提供足够数量的标记数据,这在实际应用中可能很难做到。在本文中,我们提出了一个基于图神经网络的学习节点表示模型,该模型可以有效地用于机器学习方法。该模型在无监督的对比框架中学习表征,因此不需要存在标签。此外,我们通过测量其在图的社区检测任务中的性能来测试我们的模型。在两个引用图上的性能比较表明,我们的模型比该领域的其他模型具有更好的学习表征的能力,并且具有更高的社区检测精度。
{"title":"Graph Representation Learning In A Contrastive Framework For Community Detection","authors":"Mehdi Balouchi, A. Ahmadi","doi":"10.1109/CSICC52343.2021.9420623","DOIUrl":"https://doi.org/10.1109/CSICC52343.2021.9420623","url":null,"abstract":"Graph structured data has become very popular and useful recently. Many areas in science and technology are using graphs for modeling the phenomena they are dealing with (e.g., computer science, computational economics, biology, …). Since the volume of data and its velocity of generation is increasing every day, using machine learning methods for analyzing this data has become necessary. For this purpose, we need to find a representation for our graph structured data that preserves topological information of the graph alongside the feature information of its nodes. Another challenge in incorporating machine learning methods as a graph data analyzer is to provide enough amount of labeled data for the model which may be hard to do in real-world applications. In this paper we present a graph neural network-based model for learning node representations that can be used efficiently in machine learning methods. The model learns representations in an unsupervised contrastive framework so that there is no need for labels to be present. Also, we test our model by measuring its performance in the task of community detection of graphs. Performance comparing on two citation graphs shows that our model has a better ability to learn representations that have a higher accuracy for community detection than other models in the field.","PeriodicalId":374593,"journal":{"name":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127166362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 26th International Computer Conference, Computer Society of Iran (CSICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1