$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement Learning, and Q-Learning 원문보기

Journal of information processing systems, v.16 no.5, 2020년, pp.1001 - 1007  

Park, Ji Su (Dept. of Computer Science and Engineering, Jeonju University) ,  Park, Jong Hyuk (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech))

Abstract AI-Helper 아이콘AI-Helper

In recent years, machine learning algorithms are continuously being used and expanded in various fields, such as facial recognition, signal processing, personal authentication, and stock prediction. In particular, various algorithms, such as deep learning, reinforcement learning, and Q-learning, are...

주제어

AI 본문요약
AI-Helper 아이콘 AI-Helper

* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.

제안 방법

  • Wen [9] proposed an improved convolutional neural network (CNN) based on Gabor filter to achieve gait recognition. In this paper, a Gabor filter-based walking feature extraction layer was inserted into the existing CNN and used to extract the walking features from the walking silhouette image. A metric learning technique was used to calculate the distance between two walks and a k-nearest neighbor (KNN) classifier was used to classify the walks.
  • Thus, the input image is calculated as a threshold value for several Boolean maps, and the initial protrusion map is calculated as the sum of the weights of the generated Boolean maps. Morphological operations and Gaussian filters are used in this paper to further refine the initial map to produce the final high-quality extrusion map.
  • This paper considered the improvement and extension of algorithms in a variety of fields, including agriculture, personal authentication, wireless networks, games, biometrics, and image recognition. Therefore, the present paper comprehensively discusses the following technologies: improved defect detection algorithm, survey of deep learning in agriculture techniques, next-generation personal authentication scheme, rate adaptation with Q-learning, evaluation of operational security, reinforcement learning activation functions, fast leaf recognition and retrieval, intelligent management and service, gait recognition, intelligent on-demand routing protocol, thangka image inpainting algorithm, classroom rollcall system, localization algorithm, hybrid genetic ant colony optimization (ACO) algorithm, visual saliency detection, heuristic and statistical prediction algorithms, object augmentation scheme, and dynamic action space handling method. The present paper mainly aims to rapidly provide popular and trendy research to researchers.
  • [12] proposed a new face recognition model based on game theory for classroom rollover by using CNNs with outstanding performance in the field of face recognition. This model uses multiple face images as inputs and constructs a student identity list by identifying each face with a confidence score. The optimization goal is then determined by tracking the face with the same identity or low confidence.
  • [8] introduced an Internet-based intelligent gas valve management and service system design scheme. This paper added a sensor and GPRS (General Packet Radio Service) module to the existing gas valve, and added a networking function between the gas valve and the server while using wireless packet communication technology. The authors suggested that the method proposed in this paper is more convenient and efficient than the existing gas valve management and service projects.
  • This paper considered the improvement and extension of algorithms in a variety of fields, including agriculture, personal authentication, wireless networks, games, biometrics, and image recognition. Therefore, the present paper comprehensively discusses the following technologies: improved defect detection algorithm, survey of deep learning in agriculture techniques, next-generation personal authentication scheme, rate adaptation with Q-learning, evaluation of operational security, reinforcement learning activation functions, fast leaf recognition and retrieval, intelligent management and service, gait recognition, intelligent on-demand routing protocol, thangka image inpainting algorithm, classroom rollcall system, localization algorithm, hybrid genetic ant colony optimization (ACO) algorithm, visual saliency detection, heuristic and statistical prediction algorithms, object augmentation scheme, and dynamic action space handling method.
  • Lee [6] proposed an agent using a reinforcement learning algorithm and a neural network to evaluate which activation function can get the best result when an agent learns a game through reinforcement learning in a 2D racing game environment. This paper evaluated the activation functions in the network by switching them together and measured the reward, the output of the advantage function, and the output of the loss function while training and testing them. The experimental result showed that the best activation function for the agent to learn the game and the difference between the best and the worst was 35.
  • This paper features 18 high-quality articles following a rigorous review process. This paper reviewed the technologies developed in various research fields, such as improved defect detection algorithm, survey of deep learning in agriculture techniques, next-generation personal authentication scheme, rate adaptation with Q-learning, evaluation of operational security, reinforcement learning activation functions, fast leaf recognition and retrieval, intelligent management and service, gait recognition, intelligent on-demand routing protocol, Thangka image inpainting algorithm, classroom roll-call system, localization algorithm, hybrid genetic ACO algorithm, visual saliency detection, heuristic and statistical prediction algorithms, object augmentation scheme, and dynamic action space handling method.
  • Two algorithms are compared to verify the effectiveness of the proposed algorithm. This paper selected a common denim fabric defect sample image, which includes normal image, weft missing, hole breaking, and oil pollution. The experimental results showed a good average detection rate of common defects of denim is more than 91.
  • [2] surveyed the development of deep neural-based work efforts in the agriculture domain over the last 5 years and investigated 32 research contributions that apply deep learning techniques to the agriculture domain. This paper surveyed different types of deep neural network architectures in agriculture and the current state-of-the-art methods. They found that deep learning was better in performance than other technologies, which concluded that deep learning will receive more attention and broader applications in future research.
  • Cho [4] proposed a reinforcement learning agent based on Q-learning to control the data transmission rates of nodes in carrier sensing multiple access with collision avoidance (CSMA/CA)-based wireless networks. This paper used the ns3-gym framework to simulate reinforcement learning and investigated the effects of the parameters of Q-learning on the performance of the reinforcement learning agent. The experimental results showed that the proposed reinforcement learning agent adequately adjusts the modulation and coding scheme (MCS) levels according to the changes in the network, and achieves a high throughput comparable to those of the existing data transmission rate adaptation schemes.
  • In order to express the evaluation index in the evaluation process and to reduce the uncertainty and ambiguity of the evaluation element, the use of the interval number was suggested. Through this, the objectivity and reliability of the evaluation results were improved, and a new idea was provided for the evaluation of operational safety management of high-speed rail passenger stations.
  • Plant leaf species recognition using images is difficult because of the large inter-class and small distances between different species. Thus, the authors developed an angular description method of leaf contours by using a new scale generation rule to address such difficulty. The evaluation results show that the proposed method has a faster computation time than the existing method and has high recognition and search accuracy.
  • However, the technical limitations of the EEG signal interpretation by using dry electrodes were regarded as an obstacle to the use of the EEG-based encryption system. To overcome this problem, this paper used not only EEG signals but also deep learning techniques that is a multinomial classification with a one-hot encoding.
본문요약 정보가 도움이 되었나요?

참고문헌 (18)

  1. S. Ma, W. Liu, C. You, S. Jia, and Y. Wu, "An improved defect detection algorithm of jean fabric based on optimized Gabor filter," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1008-1014, 2020. https://doi.org/10.3745/JIPS.02.0140 

  2. C. Ren, D. K. Kim, and D. Jeong, "A survey of deep learning in agriculture: techniques and their applications," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1015-1033, 2020. https://doi.org/10.3745/JIPS.04.0187 

  3. G. C. Yang, "Next-generation personal authentication scheme based on EEG signal and deep learning," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1034-1047, 2020. https://doi.org/10.3745/JIPS.03.0147 

  4. S. Cho, "Rate adaptation with Q-learning in CSMA/CA wireless networks," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1048-1063, 2020. https://doi.org/10.3745/JIPS.03.0148 

  5. L. Wang, C. Jin, and C. Xu, "An evaluative study of the operational safety of high-speed railway stations based on IEM-Fuzzy comprehensive assessment theory," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1064-1073, 2020. https://doi.org/10.3745/JIPS.04.0188 

  6. D. Lee, "Comparison of reinforcement learning activation functions to improve the performance of the racing game learning agent," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1074-1082, 2020. https://doi.org/10.3745/JIPS.02.0141 

  7. G. Xu and S. Zhang, "Fast leaf recognition and retrieval using multi-scale angular description method," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1083-1094, 2020. https://doi.org/10.3745/JIPS.02.0142 

  8. X. Wang, F. Wang, Y. Song, G. Zhang, and S. Wang, "Design of intelligent management and service system for gas valve," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1095-1104, 2020. https://doi.org/10.3745/JIPS.04.0189 

  9. J. Wen, "Gait recognition based on GF-CNN and metric learning," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1105-1112, 2020. https://doi.org/10.3745/JIPS.02.0143 

  10. Y. Ye, X. Sun, M. Liu, J. Mi, T. Yan, and L. Ding, "Intelligent on-demand routing protocol for ad hoc network," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1113-1128, 2020. https://doi.org/10.3745/JIPS.03.0149 

  11. F. Yao, "Thangka image inpainting algorithm based on wavelet transform and structural constraints," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1129-1144, 2020. https://doi.org/10.3745/JIPS.02.0144 

  12. J. Zhu, F. Yu, G. Liu, M. Sun, D. Zhao, Q. Geng, and J. Su, "Classroom roll-call system based on ResNet networks," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1145-1157, 2020. https://doi.org/10.3745/JIPS.04.0190 

  13. L. Zhao and K. Zhang, "Localization algorithm for wireless sensor networks based on modified distance estimation," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1158-1168, 2020. https://doi.org/10.3745/JIPS.03.0150 

  14. P. Wang, J. Bai, and J. Meng, "A hybrid genetic ant colony optimization algorithm with an embedded cloud model for continuous optimization," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1169-1182, 2020. https://doi.org/10.3745/JIPS.01.0059 

  15. M. T. N. Truong and S. Kim, "A study on visual saliency detection in infrared images using Boolean map approach," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1183-1195, 2020. https://doi.org/10.3745/JIPS.02.0145 

  16. S. Malik, I. Ullah, D. Kim, and K. Lee, "Heuristic and statistical prediction algorithms survey for smart environments," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1196-1213, 2020. https://doi.org/10.3745/JIPS.04.0191 

  17. S. B. Jang and Y. W. Ko, "An efficient object augmentation scheme for supporting pervasiveness in a mobile augmented reality," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1214-1222, 2020. https://doi.org/10.3745/JIPS.04.0192 

  18. S. Woo and Y. Sung, "Dynamic action space handling method for reinforcement learning models," Journal of Information Processing Systems, vol. 16, no. 5, pp. 1223-1230, 2020. https://doi.org/10.3745/JIPS.02.0146 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로