随着在边缘处使用容器的能力,它们构成了统一的解决方案,以打击分布式多主机ROS部署的复杂性,以及各个ROS节点和依赖关系部署。ROS中的双向通信对使用包含多个机器的非容集装箱中的集装箱ROS部署构成了挑战。我们将分析ROS采用的通信协议,以及不同容器网络模式的适用性及其对ROS部署的影响。最后,我们将为ROS呈现第7层透明代理服务器架构,作为所识别的问题的解决方案。不仅可以在集装箱中的环境中使用ROS,但通常在网段之间代理ROS。
translated by 谷歌翻译
机器人操作系统(ROS)提供软件框架,知识和社区生态系统提供资源,以便快速开发和原型智能机器人应用。通过标准化软件模块的通信,配置和调用,ROS便于重用设备驱动程序和算法实现。使用现有的功能实现允许用户从测试和已知的功能中组装其机器人应用程序。尽管ROS-Industrial Consortium和Rosin这样的项目努力将ROS带到工业应用和整合工业硬件,但我们观察缺乏在普遍整合基本物理IO的选择。在这项工作中,我们通过为ROS实现通用Modbus / TCP设备驱动程序来安置并提供解决此问题。
translated by 谷歌翻译
由于培训和测试数据分布之间的域移动,新的操作条件可能会导致故障诊断模型的大量性能下降。尽管已经提出了几种域的适应方法来克服此类域移位,但如果两个域中表示的故障类别不相同,则其应用是有限的。为了在两个不同的域之间启用训练有素的模型的更好可传递性,尤其是在两个域之间仅共享健康数据类别的设置中,我们提出了一个新的框架,以基于生成不同的故障签名的部分和开放式域适应一个瓦斯林甘。提出的框架的主要贡献是具有两个主要不同特征的受控合成断层数据生成。首先,所提出的方法使目标域中仅能访问目标域中的健康样品和源域中的样本错误,从而在目标域中生成未观察到的故障类型。其次,可以将故障产生控制以精确生成不同的故障类型和故障严重程度。所提出的方法特别适合于极端域的适应设置,这些设置在复杂和安全关键系统的背景下特别相关,其中两个域之间仅共享一个类。我们在两个轴承断层诊断案例研究上评估了部分和开放式域适应任务的拟议框架。我们在不同标签空间设置中进行的实验展示了提出的框架的多功能性。与给定较大域间隙的其他方法相比,提出的方法提供了优越的结果。
translated by 谷歌翻译
联邦学习(FL)是利用属于患者,人,公司或行业的敏感数据的合适解决方案,这些数据在刚性隐私约束下工作的难题。 FL主要或部分地支持数据隐私和安全问题,并提供促进促进多个边缘设备或组织的模型问题的替代方案,以使用许多本地数据培训全局模型而不具有它们。由其分布式自然引起的FL的非IID数据具有显着的性能下降和稳定性偏斜。本文介绍了一种新颖的方法,通过增强图像动态平衡客户端的数据分布,以解决FL的非IID数据问题。介绍的方法非常稳定模型培训,并将模型的测试精度从83.22%提高到89.43%,对于高度IID FL设定中的胸部X射线图像的多胸疾病检测。 IID,非IID和非IID的结果,联合培训表明,该方法可能有助于鼓励组织或研究人员开发更好的系统,以获得与数据隐私的数据的价值不仅适用于医疗保健,而且领域。
translated by 谷歌翻译
钢铁生产调度通常由人类专家规划者完成。因此,而不是全自动调度系统钢制造商更喜欢辅助推荐算法。通过合适的订单的建议,这些算法协助人类专家规划者,这些规划人员受到生产订单的选择和调度。但是,很难估计,这些算法应该具有多大的复杂性,因为钢制竞选规划缺乏精确的基于规则的程序;事实上,它需要广泛的域名知识以及只能通过多年的经营体验获得的直觉。这里,而不是开发新的算法或改善旧的算法,我们介绍了一种混洗辅助网络方法,以评估人类专家建立的选择模式的复杂性。该技术允许我们正式化并代表进入活动计划的默认知识。由于网络分析,我们发现生产订单的选择主要由订单碳含量决定。令人惊讶的是,锰,硅和钛等痕量元素对选择决定的影响较小,而不是受相关文献所假设。我们的方法可以作为一系列决策支持系统的输入,每当人类专家需要创建符合某些隐含选择标准的订单组('广告系列')。
translated by 谷歌翻译
A learned system uses machine learning (ML) internally to improve performance. We can expect such systems to be vulnerable to some adversarial-ML attacks. Often, the learned component is shared between mutually-distrusting users or processes, much like microarchitectural resources such as caches, potentially giving rise to highly-realistic attacker models. However, compared to attacks on other ML-based systems, attackers face a level of indirection as they cannot interact directly with the learned model. Additionally, the difference between the attack surface of learned and non-learned versions of the same system is often subtle. These factors obfuscate the de-facto risks that the incorporation of ML carries. We analyze the root causes of potentially-increased attack surface in learned systems and develop a framework for identifying vulnerabilities that stem from the use of ML. We apply our framework to a broad set of learned systems under active development. To empirically validate the many vulnerabilities surfaced by our framework, we choose 3 of them and implement and evaluate exploits against prominent learned-system instances. We show that the use of ML caused leakage of past queries in a database, enabled a poisoning attack that causes exponential memory blowup in an index structure and crashes it in seconds, and enabled index users to snoop on each others' key distributions by timing queries over their own keys. We find that adversarial ML is a universal threat against learned systems, point to open research gaps in our understanding of learned-systems security, and conclude by discussing mitigations, while noting that data leakage is inherent in systems whose learned component is shared between multiple parties.
translated by 谷歌翻译
Cutting planes are a crucial component of state-of-the-art mixed-integer programming solvers, with the choice of which subset of cuts to add being vital for solver performance. We propose new distance-based measures to qualify the value of a cut by quantifying the extent to which it separates relevant parts of the relaxed feasible set. For this purpose, we use the analytic centers of the relaxation polytope or of its optimal face, as well as alternative optimal solutions of the linear programming relaxation. We assess the impact of the choice of distance measure on root node performance and throughout the whole branch-and-bound tree, comparing our measures against those prevalent in the literature. Finally, by a multi-output regression, we predict the relative performance of each measure, using static features readily available before the separation process. Our results indicate that analytic center-based methods help to significantly reduce the number of branch-and-bound nodes needed to explore the search space and that our multiregression approach can further improve on any individual method.
translated by 谷歌翻译
In this modern era of technology with e-commerce developing at a rapid pace, it is very important to understand customer requirements and details from a business conversation. It is very crucial for customer retention and satisfaction. Extracting key insights from these conversations is very important when it comes to developing their product or solving their issue. Understanding customer feedback, responses, and important details of the product are essential and it would be done using Named entity recognition (NER). For extracting the entities we would be converting the conversations to text using the optimal speech-to-text model. The model would be a two-stage network in which the conversation is converted to text. Then, suitable entities are extracted using robust techniques using a NER BERT transformer model. This will aid in the enrichment of customer experience when there is an issue which is faced by them. If a customer faces a problem he will call and register his complaint. The model will then extract the key features from this conversation which will be necessary to look into the problem. These features would include details like the order number, and the exact problem. All these would be extracted directly from the conversation and this would reduce the effort of going through the conversation again.
translated by 谷歌翻译
Current technological advances open up new opportunities for bringing human-machine interaction to a new level of human-centered cooperation. In this context, a key issue is the semantic understanding of the environment in order to enable mobile robots more complex interactions and a facilitated communication with humans. Prerequisites are the vision-based registration of semantic objects and humans, where the latter are further analyzed for potential interaction partners. Despite significant research achievements, the reliable and fast registration of semantic information still remains a challenging task for mobile robots in real-world scenarios. In this paper, we present a vision-based system for mobile assistive robots to enable a semantic-aware environment perception without additional a-priori knowledge. We deploy our system on a mobile humanoid robot that enables us to test our methods in real-world applications.
translated by 谷歌翻译
有限的公开数据可以支持恶意软件分析技术的研究。特别是,几乎没有由杜鹃/斗篷等丰富的沙盒生成的公开可用数据集。使用动态沙箱的好处是对目标机中文件执行的逼真模拟并获得该执行日志。机器可以被恶意软件感染,因此很有可能在执行日志中捕获恶意行为,从而使研究人员可以详细研究这种行为。尽管随后对日志信息的分析在工业网络安全后端被广泛介绍,但据我们所知,仅在学术界投入了有限的努力,以使用最先进的技术提高此类日志分析功能。我们使此示例数据集可用来支持设计新的机器学习方法以进行恶意软件检测,尤其是用于自动检测通用恶意行为。该数据集是在Avast软件和捷克技术大学-AI中心(AIC)之间合作的。
translated by 谷歌翻译