فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی











متن کامل


نویسندگان: 

VASOU JOUYBARI M. | Ataie E. | Bastam M.

اطلاعات دوره: 
  • سال: 

    1401
  • دوره: 

    52
  • شماره: 

    3
  • صفحات: 

    195-204
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    261
  • دانلود: 

    83
چکیده: 

Distributed Denial of Service (DDoS) attacks are among the primary concerns in internet security today. Machine Learning can be exploited to detect such attacks. In this paper, a multi-layer perceptron model is proposed and implemented using Deep machine Learning to distinguish between malicious and normal traffic based on their behavioral patterns. The proposed model is trained and tested using the CICDDoS2019 dataset. To remove irrelevant and redundant data from the dataset and increase Learning accuracy, feature selection is used to select and extract the most effective features that allow us to detect these attacks. Moreover, we use the grid search algorithm to acquire optimum values of the model’s hyperparameters among the parameters’ space. In addition, the sensitivity of accuracy of the model to variations of an input parameter is analyzed. Finally, the effectiveness of the presented model is validated in comparison with some state-of-the-art works.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 261

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 83 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Adibian Majid | Ebadzadeh Mohammad Mahdi

اطلاعات دوره: 
  • سال: 

    2025
  • دوره: 

    57
  • شماره: 

    1
  • صفحات: 

    53-62
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

In Deep reinforcement Learning, experience replay buffers are used to reduce the effects of sequential data and make better use of past experiences. Prioritized Experience Replay (PER) improves upon random sampling by selecting transitions based on their temporal difference (TD) error. However, PER does not consider how important each transition is or how many times it has been used during training. In this paper, we propose a new method for adaptive prioritization that takes into account three additional transition-level factors: reward, usage count (counter), and policy probability—collectively referred to as RCP values. These values are normalized and used alongside the TD error to calculate the probability of selecting each transition from the replay buffer. We evaluate our method on several Atari environments and show that using any of the RCP values individually can improve performance compared to standard PER. To combine all three RCP components, we explore three aggregation functions: minimum, maximum, and mean. Experimental results show that the best aggregation method depends on the environment. However, the mean function generally provides stable improvements across tasks, as it balances all RCP signals and avoids over-relying on any single factor.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

فیاضی حسین | شکفته یاسر

اطلاعات دوره: 
  • سال: 

    1403
  • دوره: 

    13
  • شماره: 

    25
  • صفحات: 

    93-125
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    19
  • دانلود: 

    0
چکیده: 

In traditional speech processing, feature extraction and classification were conducted as separate steps. The advent of Deep neural networks has enabled methods that simultaneously model the relationship between acoustic and phonetic characteristics of speech while classifying it directly from the raw waveform. The first convolutional layer in these networks acts as a filter bank. To enhance interpretability and reduce the number of parameters, researchers have explored the use of parametric filters, with the SincNet architecture being a notable advancement. In SincNet's initial convolutional layer, rectangular bandpass filters are learned instead of fully trainable filters. This approach allows for modeling with fewer parameters, thereby improving the network's convergence speed and accuracy. Analyzing the learned filter bank also provides valuable insights into the model's performance. The reduction in parameters, along with increased accuracy and interpretability, has led to the adoption of various parametric filters and Deep architectures across diverse speech processing applications. This paper introduces different types of parametric filters and discusses their integration into various Deep architectures. Additionally, it examines the specific applications in speech processing where these filters have proven effective.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 19

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

درویش عباس | شامخی سینا

اطلاعات دوره: 
  • سال: 

    1401
  • دوره: 

    52
  • شماره: 

    2
  • صفحات: 

    137-146
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    135
  • دانلود: 

    21
چکیده: 

Identification of the exact location of an exon in a DNA sequence is an important research area of bioinformatics. The main issues of the previous signal processing techniques are accuracy and robustness for the exact locating of exons. To address the mentioned issues, in this study, a method has been proposed based on Deep Learning. The proposed method includes a new preprocessing, a new mapping method, and a multi-scale modified and hybrid Deep neural network. The proposed preprocessing method enriches the network to accept and encode genes at any length in a new mapping method. The proposed multi-scale Deep neural network uses a combination of an embedding layer, a modified CNN, and an LSTM network. In this study, HMR195, BG570, and F56F11.4 datasets have been used to compare this work with previous studies. The accuracies of the proposed method have been 0.982, 0.966, and 0.965 on HMR195, BG570, and F56F11.4 databases, respectively. The results reveal the superiority and effectiveness of the proposed hybrid multi-scale CNN-LSTM network.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 135

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 21 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    7
  • شماره: 

    2
  • صفحات: 

    23-36
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    20
  • دانلود: 

    0
چکیده: 

A social network consists of individuals and the relationships between them, which often influence each other. This influence can propagate behaviors or ideas through the network, a phenomenon known as influence propagation. This concept is crucial in applications like advertising, marketing, and public health. The influence maximization (IM) problem aims to identify key individuals in a social network who, when influenced, can maximize the spread of a behavior or idea. Given the NP-hard nature of IM, non-exact algorithms, especially metaheuristics, are commonly used. However, traditional metaheuristics like the variable neighborhood search (VNS) struggle with large networks due to vast solution spaces. This paper introduces DQVNS (Deep Q-Learning Variable Neighborhood Search), which integrates VNS with Deep reinforcement Learning (DRL) to enhance neighborhood structure determination in VNS. By using DQVNS, we aim to achieve performance similar to population-based algorithms and utilize the information created step by step during the algorithm's execution. This adaptive approach helps the VNS algorithm choose the most suitable neighborhood structure for each situation and find better solutions for the IM problem. Our method significantly outperforms existing metaheuristics and IM-specific algorithms. DQVNS achieves a 63% improvement over population-based algorithms on various datasets. The results of implementation on different real-world social networks of varying sizes demonstrate the superiority of this algorithm compared to existing metaheuristic, IM-specific algorithms, and network-specific measures.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 20

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    7
تعامل: 
  • بازدید: 

    91
  • دانلود: 

    0
چکیده: 

Autonomous driving is the most attractive field to research by academic and industrial socials that intelligent transportation play a vital role in structure of autonomous driving systems. Artificial Intelligence (AI) is an infrastructure for autonomous driving by designing of intelligent machine. Deep Learning is one of subfields of Artificial Intelligence that create models by mimicking human brain’ s functioning to make decision that it has shown great success in autonomous diving systems field. However, it performs very poorly in some stochastic environments caused by large overestimations of action values. Thus, we use the Double estimator to Q-Learning to construct Double Q-Learning with a new off-policy reinforcement Learning algorithm. By this algorithm, we can approximate the maximum expected value for any number of random variables and it underestimate rather than overestimate the maximum expected value. Moreover, we use an optimization method based on A* to improve routing in automation driving. Our proposed approach based on Double Q-Learning and A* is evaluated on an example environment with random obstacles and compare results to use Q-Learning alone. Results show the proposed approach has better performance based on duration of trip to destination and collision to obstacles.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 91

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
عنوان: 
نویسندگان: 

WATKINS C.J.C.H. | DAYAN P.

نشریه: 

MACHINE Learning

اطلاعات دوره: 
  • سال: 

    1992
  • دوره: 

    -
  • شماره: 

    -
  • صفحات: 

    279-292
تعامل: 
  • استنادات: 

    1
  • بازدید: 

    133
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 133

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2025
  • دوره: 

    6
  • شماره: 

    2
  • صفحات: 

    92-101
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    7
  • دانلود: 

    0
چکیده: 

The Laplace transform is widely used in science and technology to deal with complex problemsin stability and control systems. The modified Laplace transform has been applied in physics andmathematics to solve boundary layer equations in ordinary differential equations with variablecoefficients. The q-calculus appeared as a connection between mathematics and physics. It hasmany applications in different mathematical areas, such as number theory, combinatory theory,orthogonal polynomials, essential hyper-geometric functions, quantum mechanics, and relativity.Laplace transform, and its several extended versions are used frequently. The Double Laplacetransform applies to solving some q-functional and partial q-differential equations. Q-calculushas been used to solve complex and more potentially typical problems in a larger domain toinvestigate the calculus without limits for getting more generalizations. In the paper, weintroduce the Double-modified Laplace transform in q-calculus, namely the q-Double modifiedLaplace transform, and establish some properties. Furthermore, several propositions concernedwith q-Double modified Laplace transform are explored.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 7

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Kiyaei Mohammadhossein | Kiaee Farkhondeh

اطلاعات دوره: 
  • سال: 

    2025
  • دوره: 

    19
  • شماره: 

    2
  • صفحات: 

    19-26
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    3
  • دانلود: 

    0
چکیده: 

Access to cash for many in society is remainingessential during the current COVID-19 lock-down around theglobe. A smart city requires the banking industry to exploit IoTand Artificial Intelligence (AI) in order to track its ATM networkand predict outages due to cash shortages. In this paper, we studythe real-time cash replenishment planning problem under outflowuncertainty where the fee of the security companies grows if thereplenishment ends up falling on a weekends/holidays. Our modelis based by the Double Deep Q-Network (DQN) algorithm whichcombines popular Q-Learning with a Deep neural network. Theproposed method is used to minimize the ATM replenishmentcost where the cash demand changes dynamically at each day.The performance analysis of the proposed method for differentamounts of replenishment cash shows that the the proposedmethod can effectively work under real word conditions andreduce the ATM operational cost compared with the other stateof-the-art cash demand prediction schemes.Index Terms—cash replenishment planning, Deep Learning,ATM, reinforcement Learning, Double Q-network.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 3

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    2
  • شماره: 

    1
  • صفحات: 

    76-82
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    0
  • دانلود: 

    0
چکیده: 

Abstract - - Abstract - - Abstract - This paper proposes a master-slave approach to simultaneously control two drones with the aim of carrying an object toward a goal. The proposed method utilizes the Double Deep Q-Learning (DDQN) technique to train a master agent to be able to carry an object toward a goal with the help of a slave agent. This procedure is implemented such that the master agent gathers the observations and specifies the actions to be made by itself and the slave agent. Indeed, the slave agent just applies a predefined action and does not process any input for producing the output. This manner of Learning, leads to a unified convergence to an optimal solution compared to the situation in which each agent is trained separately. To verify the functionality of the proposed method, the algorithm is examined in the webots simulation environment. The simulations show that the introduced method has a good performance when controlling the drones to reach to the goal. The introduced method, other than algorithmic benefits which leads to a faster convergence of the model, suggests some reduction in the processing demand. The reason is that the Learning procedure is guided by one of the agents and consequently only one of the agents is responsible for doing the calculations that lead to choosing the action. In this scenario, the slave agent does not require any processing resources for choosing the action and just simply applies a predefined action dictated by the master agent.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button