GNSS is the main source of PNT information for maritime ship users. Its availability is related to the safety of ship navigation, and is also an important state that the maritime management department urgently needs t...
详细信息
This paper presents research on applying the user identification subsystem for industrial automation systems. Within the framework of this study, we propose software and hardware architecture for the analysis of the e...
详细信息
Zero-shot hashing targets to learn the hash codes of images in unseen classes based on the limited training data provided by seen classes. In zero-shot hashing, transferring the supervised knowledge, such as attribute...
详细信息
Zero-shot hashing targets to learn the hash codes of images in unseen classes based on the limited training data provided by seen classes. In zero-shot hashing, transferring the supervised knowledge, such as attributes and semantic relations, from seen classes to unseen ones is a widely employed method, where the performance is always subject to the ability to capture these supervised knowledge (which is always difficult to obtain). Therefore, in this study, we propose a new methodology for zero-shot hashing via an asymmetric ratio similarity matrix (ASZH), which only needs to calculate the semantic similarity among seen classes for hash learning. Specifically, we use an asymmetric ratio matrix in the similarity calculation to further explore the influence of similarity, where the values of positive weights for similar samples are not equivalent to those of negative ones for dissimilar samples. Additionally, a theoretical analysis regarding the utilization of an asymmetric ratio matrix is provided in this study. The experiments on three large benchmark datasets indicate that the proposed method achieves excellent performance than several state-of-the-art hashing methods.
Based on mining the association relationship in the War Game data, this study extracts the key actions to provide support for the auxiliary operation deduction, operation process description and review evaluation. Bas...
详细信息
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and dataanalysis including cautious threshold infe...
详细信息
ISBN:
(纸本)9781665465120
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and dataanalysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematically exploring the threshold space, we find most honeypot platforms produce comparable results despite their different configurations. Moreover, by applying data from a large-scale honeypot deployment, network telescopes, and a real-world baseline obtained from a leading DDoS mitigation provider, we question the fundamental assumption of honeypot research that convergence of observations can imply their completeness. Conclusively we derive guidance on precise, reproducible honeypot research, and present open challenges.
Federated analysis can help perform large-scale analyses using neuroimaging datasets across various research groups overcoming the limitations of institutional data-sharing poli-cies, privacy or regulatory concerns as...
详细信息
The study presents a comparison between Machine Learning approaches, such as Decision Trees, XGBoost, Linear Discriminant analysis, and Histogram Boost for detecting days with a higher likelihood of an increased incid...
详细信息
ISBN:
(纸本)9798350394139;9798350394122
The study presents a comparison between Machine Learning approaches, such as Decision Trees, XGBoost, Linear Discriminant analysis, and Histogram Boost for detecting days with a higher likelihood of an increased incidence of stroke occurrences in the region of Transylvania, Romania, using meteorological data. The study brings an original contribution to existing work by including air fronts in the analysis and focusing on machine learning methods, being the first one to approach this issue in Romania. Furthermore, it covers a large period of 10 years (2013-2022). The proposed methods include dimensionality reduction and clustering techniques, as the initial dataset contains a large class imbalance, with the positive class representing critical days composing approximate to 1/20 of the entire dataset. Based on the findings outlined, the combination of Kernel PCA, K-means, XGBoost, and Feature Selection emerges as the most effective pipeline, resulting in an overall metric of 74% when evaluated on the test dataset.
Precisely aligning phenotypic information within medical texts is paramount in advancing intelligent medical applications, such as similar patient case retrieval. However, despite its criticality, an algorithm specifi...
详细信息
The increasing complexity of integrated systems has exacerbated the challenges associated with system diagnosis. To tackle these challenges, intelligent root-cause-analysis facilitated by machine learning has been pro...
详细信息
ISBN:
(纸本)9781665410601
The increasing complexity of integrated systems has exacerbated the challenges associated with system diagnosis. To tackle these challenges, intelligent root-cause-analysis facilitated by machine learning has been proposed in recent years. However, most of these methods rely on a large amount of data with root-cause labels, which are often either not available or difficult to obtain. In this paper, we propose a semi-supervised root-cause-analysis method with co-training, where only a small set of labeled data is required. Using random forest as the learning kernel, a co-training technique is proposed to leverage the unlabeled data by automatically pre-labeling a subset of them and retraining each decision tree. In addition, several novel techniques are proposed to avoid over-fitting and determine hyper-parameters. Two case studies based on industrial designs demonstrate that the proposed approach significantly outperforms state-of-the-art methods by saving up to 43% of labeling efforts by human experts.
In this paper we present a reconstruction technique for the reduction of unsteady flow data based on neural representations of time-varying vector fields. Our approach is motivated by the large amount of data typicall...
详细信息
In this paper we present a reconstruction technique for the reduction of unsteady flow data based on neural representations of time-varying vector fields. Our approach is motivated by the large amount of data typically generated in numerical simulations, and in turn the types of data that domain scientists can generate in situ that are compact, yet useful, for post hoc analysis. One type of data commonly acquired during simulation are samples of the flow map, where a single sample is the result of integrating the underlying vector field for a specified time duration. In our work, we treat a collection of flow map samples for a single dataset as a meaningful, compact, and yet incomplete, representation of unsteady flow, and our central objective is to find a representation that enables us to best recover arbitrary flow map samples. To this end, we introduce a technique for learning implicit neural representations of time-varying vector fields that are specifically optimized to reproduce flow map samples sparsely covering the spatiotemporal domain of the data. We show that, despite aggressive data reduction, our optimization problem - learning a function-space neural network to reproduce flow map samples under a fixed integration scheme - leads to representations that demonstrate strong generalization, both in the field itself, and using the field to approximate the flow map. Through quantitative and qualitative analysis across different datasets we show that our approach is an improvement across a variety of data reduction methods, and across a variety of measures ranging from improved vector fields, flow maps, and features derived from the flow map.
暂无评论