现代分布式系统受到耐故障算法的支持,例如可靠的广播和共识,即使系统的某些节点失败,也可以确保系统的正确操作。但是,分布式算法的开发是一个手动且复杂的过程,导致科学论文通常呈现单一算法或现有算法的变化。为了自动化开发此类算法的过程,这项工作提出了一种使用强化学习来生成正确且有效耐受性分布式分布式算法的智能代理。我们表明,我们的方法能够在仅12,000个学习剧集中生成正确的耐受性可靠的广播算法,而文献中的其他人则具有相同的性能。
translated by 谷歌翻译
Density based representations of atomic environments that are invariant under Euclidean symmetries have become a widely used tool in the machine learning of interatomic potentials, broader data-driven atomistic modelling and the visualisation and analysis of materials datasets.The standard mechanism used to incorporate chemical element information is to create separate densities for each element and form tensor products between them. This leads to a steep scaling in the size of the representation as the number of elements increases. Graph neural networks, which do not explicitly use density representations, escape this scaling by mapping the chemical element information into a fixed dimensional space in a learnable way. We recast this approach as tensor factorisation by exploiting the tensor structure of standard neighbour density based descriptors. In doing so, we form compact tensor-reduced representations whose size does not depend on the number of chemical elements, but remain systematically convergeable and are therefore applicable to a wide range of data analysis and regression tasks.
translated by 谷歌翻译
通常声称由软材料制成的腿部机器人比其刚性材料表现出更安全,更健壮的环境相互作用。但是,软机器人的这种激励特征需要更严格的开发才能与刚性运动进行比较。本文介绍了一个柔软的机器人平台Horton和一个反馈控制系统,并在其操作的某些方面保证了安全性。该机器人是使用一系列软肢构造的,由热形记忆合金(SMA)线肌肉作用,其位置和执行器温度的传感器。监督控制方案在机器人姿势的单独控制器操作过程中维护安全执行者状态。实验表明,霍顿可以举起腿并保持平衡姿势,这是运动的前身。在平衡过程中,通过人类交互测试在硬件中验证了主管,使所有SMA肌肉保持在温度阈值以下。这项工作代表了任何柔软的腿机器人的安全验证反馈系统的首次演示。
translated by 谷歌翻译
我们研究了使用K代理商最佳检查地下(水下)画廊的问题。我们考虑了一个带有单个开口的画廊,并带有树拓扑结构。由于管道的直径很小(洞穴),代理是小型机器人,自主权有限,在画廊的开口处有一个供应站。因此,它们最初被放置在根部,并且需要定期返回供应站。我们的目标是设计离线策略,以有效地使用$ k $小型机器人覆盖树。我们考虑两个目标功能:覆盖时间(最大集体时间)和覆盖距离(总行驶距离)。最大的集体时间是机器人花费的最大时间需要完成其分配的任务(假设所有机器人同时启动);总行进距离是所有覆盖步行的长度的总和。由于问题对于大树很棘手,因此我们提出了近似算法。通过密集的数值实验,均匀溶液的效率和准确性均可显示随机树的经验表明。
translated by 谷歌翻译
整个幻灯片组织学图像中的组织类型学注释是一项复杂而乏味但既繁琐但必要的任务,用于开发计算病理学模型。我们建议通过将开放式识别技术应用于共同分类属于一组带注释类的组织的任务来解决此问题。临床相关的组织类别,同时拒绝测试时间开放式样品,即属于训练集中不存在的类别的图像。为此,我们引入了一种基于训练模型的开放式组织病理图像识别的新方法,以准确识别图像类别,并同时预测已应用了哪些数据增强变换。在测试时间中,我们测量了模型的置信度预测这种转换,我们期望开放集中的图像较低。在组织学图像的结直肠癌评估的背景下,我们进行了全面的实验,这些实验为我们的方法提供了证据,以自动从未知类别中识别样品的优势。代码在https://github.com/agaldran/t3po上发布。
translated by 谷歌翻译
圆角焊接是该行业中最广泛类型的焊接之一,仍然通过接触手动或自动进行。本文旨在描述具有U和L形结构的非接触式圆角焊接机器人的在线编程系统,这响应了第四工业革命的需求。在本文中,作者提出了一种在线机器人编程方法,其消除了传统上在机器人焊接中执行的不必要步骤,使得操作者仅执行三个步骤来完成焊接任务。首先,选择焊接件。然后,进入焊接参数。最后,它将自动生成的程序发送到机器人。该系统最终设法在比比较方法更有效的准备时间中使用所提出的方法进行圆角焊接任务。为此,除了六个轴工业机器人手臂之外,还使用了与其他系统相比使用减少数量的组件,例如结构化光3D相机,两个计算机和集中器。系统的操作复杂性尽可能减少。据作者所知,没有能够执行圆角焊接过程的在线机器人编程系统的科学或商业证据,简化了该过程,使其对操作员完全透明,并在行业4.0范例中陷入框架。它的商业潜力主要在于一种能够适应任何工业圆角焊接工作和任何可以容纳它的支架的柔性系统中的简单和低成本。
translated by 谷歌翻译
语音神经调节物有可能为患有扰动或休闲症的人提供沟通。最近的进展已经证明了从放置在皮质表面上的电加电网的高质量文本解码和语音合成。在这里,我们研究了较少的侵入性测量模态,即立体定向脑电图(SEEG),其提供来自多个脑区的稀疏抽样,包括皮质区域。为了评估Seeg是否也可用于综合神经录音的高质量音频,我们采用了一种基于现代深度学习方法的经常性编码器 - 解码器框架。我们证明,尽管有限的训练数据,但是可以从这些微创录音来重建高质量的言论。最后,我们利用变分特征丢失来成功识别最具信息丰富的电极触点。
translated by 谷歌翻译
While the brain connectivity network can inform the understanding and diagnosis of developmental dyslexia, its cause-effect relationships have not yet enough been examined. Employing electroencephalography signals and band-limited white noise stimulus at 4.8 Hz (prosodic-syllabic frequency), we measure the phase Granger causalities among channels to identify differences between dyslexic learners and controls, thereby proposing a method to calculate directional connectivity. As causal relationships run in both directions, we explore three scenarios, namely channels' activity as sources, as sinks, and in total. Our proposed method can be used for both classification and exploratory analysis. In all scenarios, we find confirmation of the established right-lateralized Theta sampling network anomaly, in line with the temporal sampling framework's assumption of oscillatory differences in the Theta and Gamma bands. Further, we show that this anomaly primarily occurs in the causal relationships of channels acting as sinks, where it is significantly more pronounced than when only total activity is observed. In the sink scenario, our classifier obtains 0.84 and 0.88 accuracy and 0.87 and 0.93 AUC for the Theta and Gamma bands, respectively.
translated by 谷歌翻译
There are multiple scales of abstraction from which we can describe the same image, depending on whether we are focusing on fine-grained details or a more global attribute of the image. In brain mapping, learning to automatically parse images to build representations of both small-scale features (e.g., the presence of cells or blood vessels) and global properties of an image (e.g., which brain region the image comes from) is a crucial and open challenge. However, most existing datasets and benchmarks for neuroanatomy consider only a single downstream task at a time. To bridge this gap, we introduce a new dataset, annotations, and multiple downstream tasks that provide diverse ways to readout information about brain structure and architecture from the same image. Our multi-task neuroimaging benchmark (MTNeuro) is built on volumetric, micrometer-resolution X-ray microtomography images spanning a large thalamocortical section of mouse brain, encompassing multiple cortical and subcortical regions. We generated a number of different prediction challenges and evaluated several supervised and self-supervised models for brain-region prediction and pixel-level semantic segmentation of microstructures. Our experiments not only highlight the rich heterogeneity of this dataset, but also provide insights into how self-supervised approaches can be used to learn representations that capture multiple attributes of a single image and perform well on a variety of downstream tasks. Datasets, code, and pre-trained baseline models are provided at: https://mtneuro.github.io/ .
translated by 谷歌翻译
In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new device identification mechanisms based on behavior monitoring. Besides, these solutions have recently leveraged Machine and Deep Learning techniques due to the advances in this field and the increase in processing capabilities. In contrast, attackers do not stay stalled and have developed adversarial attacks focused on context modification and ML/DL evaluation evasion applied to IoT device identification solutions. This work explores the performance of hardware behavior-based individual device identification, how it is affected by possible context- and ML/DL-focused attacks, and how its resilience can be improved using defense techniques. In this sense, it proposes an LSTM-CNN architecture based on hardware performance behavior for individual device identification. Then, previous techniques have been compared with the proposed architecture using a hardware performance dataset collected from 45 Raspberry Pi devices running identical software. The LSTM-CNN improves previous solutions achieving a +0.96 average F1-Score and 0.8 minimum TPR for all devices. Afterward, context- and ML/DL-focused adversarial attacks were applied against the previous model to test its robustness. A temperature-based context attack was not able to disrupt the identification. However, some ML/DL state-of-the-art evasion attacks were successful. Finally, adversarial training and model distillation defense techniques are selected to improve the model resilience to evasion attacks, without degrading its performance.
translated by 谷歌翻译