Day by day, the role of data science and machine learning in cricket is increasing due to the large amount of data generated from a single player on a whole line. The field of data science is the intensive study of da...
详细信息
Day by day, the role of data science and machine learning in cricket is increasing due to the large amount of data generated from a single player on a whole line. The field of data science is the intensive study of data to extract insights and knowledge from the data and apply the acquired knowledge and actionable insights. These available data and statistics are used to predict things like the team's first-innings score and the probability of winning the second team, etc. This study works on Indian Premier League (IPL) data Analysis 2022 and data Visualization for the duration (2008–2020) using Python. This application modules are followed by preprocessing, data analysis, and visualization, and finally create a model that predicts the team's overall score and the probability of winning. When building models, python algorithms such as Numpy is used for Scientific computing, Pandas used to perform data Analysis, and finally Matplotlib and Seaborn to enable data Visualization. Finally, this paper helps the trainers and owners of the team during the auction to select an emerging player to win the matches in the entire season and to win the trophy and to get profit to the owners by the profit strategy done in this analysis report.
A key challenge in many IoT applications is to en-sure energy efficiency while processing large amounts of streaming data at the edge. Nodes often need to process time-sensitive data using limited computing and commun...
A key challenge in many IoT applications is to en-sure energy efficiency while processing large amounts of streaming data at the edge. Nodes often need to process time-sensitive data using limited computing and communication resources. To that end, we design a novel R - Learning based Offloading framework, RLO, that allows edge nodes to learn energy optimal decisions from experience regarding processing incoming data streams. In particular, when should the node process data locally? When should it transmit data to be processed by a fog node? And when should it store data for later processing? We validate our results on both real and simulated data streams. Simulation results show that RLO learns with time to achieve better overall-rewards with respect to three existing baseline schemes. Moreover, the proposed algorithm excels the existing baseline schemes when different priorities were set on the two objectives. We also illustrate how to adjust the priorities of the two objectives based on the application requirements and network constraints.
Multi-source domain adaptation aims to transfer knowledge from multiple labeled source domains to an unlabeled target domain and reduce the domain shift. Considering data privacy and storage cost, the data from differ...
详细信息
Multi-source domain adaptation aims to transfer knowledge from multiple labeled source domains to an unlabeled target domain and reduce the domain shift. Considering data privacy and storage cost, the data from different domains are isolated, which leads to the difficulty of domain adaptation. To reduce the domain shift on the decentralized source domains and target domain, we propose an instance relation consistency method for decentralized multi-source domain adaptation. Specifically, we utilize the models from other domains as bridges to conduct domain adaptation. We impose inter-domain instance relation consistency on the isolated source and target domain to transfer the semantic relation knowledge across different domain models. Meanwhile, we exploit intra-domain instance relation consistency to learn the intrinsic semantic relation across different data views. Experiments on three benchmarks indicate the effectiveness of our method for decentralized multi-source domain adaptation.
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challenging security and storage issues. In this paper, we present a secure and efficient multi-cloud storage data source scheme, BMDP. We use blockchain technology to ensure the secure storage of provenance data and design a smart contract to utilize the provenance data to ensure the proper operation of the multi-cloud storage system. Finally, we analyze the scheme’s safety and do simulation experiments to show that the scheme has practicality.
Economic dispatch (ED) is one of the critical tasks in a power system’s optimization issues, but its characteristics with non-convex, high-dimensional, non-linear, and non-differentiable, so that caused solutions are...
详细信息
Evolutionary Reinforcement Learning (ERL) that applying Evolutionary algorithms (EAs) to optimize the weight parameters of Deep Neural Network (DNN) based policies has been widely regarded as an alternative to traditi...
详细信息
Batch normalization (BN) has been widely used for accelerating the training of deep neural networks. However, recent findings show that, in the federated learning (FL) scenarios, BN can damage the learning performance...
详细信息
Batch normalization (BN) has been widely used for accelerating the training of deep neural networks. However, recent findings show that, in the federated learning (FL) scenarios, BN can damage the learning performance when the clients have non-i.i.d. data. While several FL schemes have been proposed to address this issue, they still suffer a significant performance loss compared to the centralized scheme. In addition, none of them have explained how the BN impacts the FL convergence analytically. In this paper, we present the first convergence analysis to show that the mismatched local and global statistical parameters due to non-i.i.d data cause gradient deviation and it leads the algorithm to converge to a biased solution with a slower rate. To remedy this, we further present a new FL algorithm, called FedTAN, based on an iterative layer-wise parameter aggregation procedure. Experiment results are presented to show the superiority of FedTAN.
data leakage is a significant problem in many industries and institutions. While there are different methods for protecting data using various encryption algorithms, this technology doesn't provide complete securi...
data leakage is a significant problem in many industries and institutions. While there are different methods for protecting data using various encryption algorithms, this technology doesn't provide complete security. In some cases, a data distributor may give sensitive data to trusted agents (third parties), and some of the data may be leaked in an unauthorized place. In such cases, the distributor must assess the likelihood that the leaked data came from one or more of the agents, as opposed to having been independently. This paper proposes strategies for allocating data across agents to improve the probability of identifying leaks in the event of data leakage. The proposed methods do not rely on altering the released data like watermarks. Instead, they focus on distributing the data in a way that makes it easier to identify the source of the leak. The paper highlights that data leakage is a significant problem that can lead to a loss of money, damage to reputation, and more. It can occur due to security vulnerabilities, poor data protection practices, or accidentally by a user. Therefore, it's essential to take measures for avoiding data leakage and protect data. Using the proposed strategies, the distributor can improve chances of identifying the source of the leak and taking appropriate action to prevent data leakage.
Deep latent variable generative models based on variational autoencoder (VAE) have shown promising performance for audio-visual speech enhancement (AVSE). The underlying idea is to learn a VAE-based audio-visual prior...
详细信息
Deep latent variable generative models based on variational autoencoder (VAE) have shown promising performance for audio-visual speech enhancement (AVSE). The underlying idea is to learn a VAE-based audio-visual prior distribution for clean speech data, and then combine it with a statistical noise model to recover a speech signal from a noisy audio recording and video (lip images) of the target speaker. Existing generative models developed for AVSE do not take into account the sequential nature of speech data, which prevents them from fully incorporating the power of visual data. In this paper, we present an audio-visual deep Kalman filter (AV-DKF) generative model which assumes a first-order Markov chain model for the latent variables and effectively fuses audio-visual data. Moreover, we develop an efficient inference methodology to estimate speech signals at test time. We conduct a set of experiments to compare different variants of generative models for speech enhancement. The results demonstrate the superiority of the AV-DKF model compared with both its audio-only version and the non-sequential audio-only and audio-visual VAE-based models.
Parallel computing of real-time data is an effective solution to the problem of timely analysis with the rapid increase of real-time data in today's power grid. Currently, most data parallel processing methods do ...
Parallel computing of real-time data is an effective solution to the problem of timely analysis with the rapid increase of real-time data in today's power grid. Currently, most data parallel processing methods do not consider the characteristics of the real-time power measurement data to improve efficiency. This paper proposes an improved jellyfish search method for data process task scheduling, which considers time window segmentation based on data arrival characteristic. The method proposed in this paper can improve the processing speed of realtime power measurement data with resources reduction.
暂无评论