Smartphone addiction has become a serious social problem, and this article studies the scientific methods for analyzing smartphone addiction. Firstly, study the C4.5 algorithm model, describe the algorithm using mathe...
详细信息
In this paper, we propose a new recommendation algorithm for addressing the problem of two-sided online matching markets with complementary preferences and quota constraints, where agents' preferences are unknown ...
详细信息
In this paper, we propose a new recommendation algorithm for addressing the problem of two-sided online matching markets with complementary preferences and quota constraints, where agents' preferences are unknown a priori and must be learned from data. The presence of mixed quota and complementary preferences constraints can lead to instability in the matching process, making this problem challenging to solve. To overcome this challenge, we formulate the problem as a bandit learning framework and propose the Multi-agent Multi-type Thompson Sampling (MMTS) algorithm. The algorithm combines the strengths of Thompson Sampling for exploration with a new double matching technique to provide a stable matching outcome. Our theoretical analysis demonstrates the effectiveness of MMTS as it can achieve stability and has a total Õ(Q√KmaxT)-Bayesian regret with high probability, which exhibits linearity with respect to the total firm's quota Q, the square root of the maximum size of available type workers √Kmax and time horizon T. In addition, simulation studies also demonstrate MMTS' effectiveness in various settings. We provide code used in our experiments https://***/Likelyt/Double-Matching. Copyright 2024 by the author(s)
The data-reusing maximum correlation entropy algorithm (DRMCC) exhibits good convergence characteristics in adaptive filters when the input data are correlated. To further enhance the estimation performance of this al...
详细信息
We study the problem of average consensus in multi-agent systems where some of the agents may malfunction. The object of robust average consensus is for non-faulty agents to converge to the average value of their init...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
We study the problem of average consensus in multi-agent systems where some of the agents may malfunction. The object of robust average consensus is for non-faulty agents to converge to the average value of their initial values despite the erroneous effects from adversarial agents. To this end, we propose a surplus-based consensus algorithm that can achieve robust average consensus under Byzantine attacks in the multi-agent networks with directed topologies. The key idea is to equip each normal agent with a running-sum variable so that it can record the effects from/to neighbors across iterations. Moreover, compared to the existing secure broadcast and retrieval approach where each agent keeps track of the initial values of all agents in the network, our algorithm saves massive storage especially for large-scale networks as each agent only requires the values and the correct detection of neighbors. Finally, numerical examples are given for verifying the effectiveness of our algorithm.
Traditional reactive power-voltage coordinated regulation methods have been proven technically and economically viable in PV distribution systems. However, challenges such as the uncertainty of distributed photovoltai...
详细信息
Graphs and graph structured data are ubiquitous in many applications as they readily represent datasets that lie in irregular, yet structured, domains. Due to their popularity, a plethora of methods have been develope...
详细信息
ISBN:
(数字)9798350354058
ISBN:
(纸本)9798350354065
Graphs and graph structured data are ubiquitous in many applications as they readily represent datasets that lie in irregular, yet structured, domains. Due to their popularity, a plethora of methods have been developed to learn from graphstructured data, which have been shown to be effective in many real-world applications including biology, finance, and social sciences, among others. However, these methods generally assume that the observed graph is free of corruption. This assumption does not hold in cases where the graph includes structural contamination, such as anomalous edges, which can degrade learning performance. This paper presents a method to identify anomalous edges that can be employed prior to learning methods to mitigate their effects. The proposed method employs link prediction (LP) to assign likelihood scores to the observed edges. As LP is not anomaly aware, we combine LP with ideas from sampling and consensus algorithms. LP is applied to subgraphs which tend to have fewer anomalies. Edge anomaly scores are then obtained by judiciously combining LP prediction results across subgraphs. Preliminary results indicate the effectiveness of the proposed method.
Unbalanced optimal transport (UOT) has recently gained much attention due to its flexible framework for handling un-normalized measures and its robustness properties. In this work, we explore learning (structured) spa...
详细信息
Unbalanced optimal transport (UOT) has recently gained much attention due to its flexible framework for handling un-normalized measures and its robustness properties. In this work, we explore learning (structured) sparse transport plans in the UOT setting, i.e., transport plans have an upper bound on the number of non-sparse entries in each column (structured sparse pattern) or in the whole plan (general sparse pattern). We propose novel sparsity-constrained UOT formulations building on the recently explored maximum mean discrepancy based UOT. We show that the proposed optimization problem is equivalent to the maximization of a weakly submodular function over a uniform matroid or a partition matroid. We develop efficient gradient-based discrete greedy algorithms and provide the corresponding theoretical guarantees. Empirically, we observe that our proposed greedy algorithms select a diverse support set and we illustrate the efficacy of the proposed approach in various applications. Copyright 2024 by the author(s)
As a staple of data analysis and unsupervised learning, the problem of private clustering has been widely studied under various privacy models. Centralized differential privacy is the first of them, and the problem ha...
详细信息
As a staple of data analysis and unsupervised learning, the problem of private clustering has been widely studied under various privacy models. Centralized differential privacy is the first of them, and the problem has also been studied for the local and the shuffle variation. In each case, the goal is to design an algorithm that computes privately a clustering, with the smallest possible error. The study of each variation gave rise to new algorithms: the landscape of private clustering algorithms is therefore quite intricate. In this paper, we show that a 20-year-old algorithm can be slightly modified to work for any of these models. This provides a unified picture: while matching almost all previously known results, it allows us to improve some of them and extend it to a new privacy model, the continual observation setting, where the input is changing over time and the algorithm must output a new solution at each time step. Copyright 2024 by the author(s)
Clustering is a type of data mining algorithm aimed at discovering hidden patterns in the data, and spatial clustering is an important type of it. Density-based spatial clustering of applications with noise (DBSCAN) i...
详细信息
The main study focuses on the shortcomings of the traditional PBFT consensus algorithm and the DPOS consensus algorithm, and then combines the two algorithms to form a new consensus algorithm from the perspective of o...
详细信息
ISBN:
(纸本)9781665426053
The main study focuses on the shortcomings of the traditional PBFT consensus algorithm and the DPOS consensus algorithm, and then combines the two algorithms to form a new consensus algorithm from the perspective of optimising the consensus performance of the blockchain, which can achieve several advantages in terms of node reduction view switching, node dynamics, bandwidth overhead reduction, transaction throughput and lower system latency performance. The advantages of the improved PBFT algorithm are illustrated by the experimental data on throughput, system latency of account creation and bandwidth overhead, which are compared to illustrate the effect of the improved PBFT algorithm.
暂无评论