This study presents a sparse identification approach for modeling dynamic systems, leveraging data from a transient multiphase flow simulator, OLGA. The Sparse Identification of Nonlinear Dynamics (SINDy) methodology ...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
This study presents a sparse identification approach for modeling dynamic systems, leveraging data from a transient multiphase flow simulator, OLGA. The Sparse Identification of Nonlinear Dynamics (SINDy) methodology is applied, employing two optimization methods: Sequential Thresholded Least Squares (STLS) and a Mixed-integer linear programming (MILP)-based approach. The MILP-based method, featuring a cardinality constraint, represents a pioneering advancement in system identification techniques. Key findings include the importance of variable normalization for model accuracy, the role of cross-validation in hyperparameter selection for optimal model structure, and the exploration of the trade-off between sparsity and generalization. Results obtained for a reference case of transient water flow subject to many boundary conditions (or controls) validate the identified model's ability to represent observed data in OLGA accurately.
Packet classification is a crucial component of modern networks. Existing decision tree-based algorithms alleviate the rule replication problem caused by overlapping rules in the ruleset via rule partitioning. They pa...
详细信息
ISBN:
(纸本)9798350388015;9798350388008
Packet classification is a crucial component of modern networks. Existing decision tree-based algorithms alleviate the rule replication problem caused by overlapping rules in the ruleset via rule partitioning. They partition the ruleset into multiple subsets based on rule characteristics to reduce rule overlaps. However, existing algorithms fail to address the overlap between rules in the same set, seriously decreasing speed and memory performance. In this paper, we propose DOT, a framework for optimizing rule partitions before constructing decision trees. Its key idea is to migrate rules in subsets based on rule overlaps and the features of heuristics used to construct trees, as well as reorganize rules aided by tuples. DOT finds out the migrated rule candidates using rule dependency graphs and heuristic features, then transforms the rule migration problem into an integer linear programming problem and solves for the optimal migration strategy. Further, we employ a tuple-assisted approach to accelerate rule matching. Experiments show that DOT enhances existing decision tree-based algorithms, improving lookup speed by 1.69 x, reducing average 24.85% memory consumption and 31.03% decision tree depth.
Machine learning (ML) methods based on histopathology slides are increasingly used for cancer diagnosis and treatment. Analyses with specialized experimental stains, such as spatial proteomics, are often limited to ti...
详细信息
ISBN:
(纸本)9798350313345;9798350313338
Machine learning (ML) methods based on histopathology slides are increasingly used for cancer diagnosis and treatment. Analyses with specialized experimental stains, such as spatial proteomics, are often limited to tissue microarrays (TMAs) rather than whole slide images due to the cost of data generation. While different approaches for selecting tissue to include in a TMA exist, the impact of the sampling protocol on downstream ML-model performance is underexplored. Here, we present a general-purpose framework to evaluate ML performance of synthetic TMA datasets. We compare the performance of 16 synthetic TMA breast carcinoma datasets for predicting patient overall survival, immunohistochemistry subtype, and mutation status. We deduce several common design principles that are broadly applicable across TMA applications. Finally, we conduct a case study into principled and task-specific TMA sampling procedures in budget-constrained scenarios.
This paper considers a multi-layer game representing a cyber-physical system where a defender must protect a set of resources from an adversary. The defender employs deceptive actions in both the cyber and physical do...
详细信息
ISBN:
(纸本)9798350375978;9798350375961
This paper considers a multi-layer game representing a cyber-physical system where a defender must protect a set of resources from an adversary. The defender employs deceptive actions in both the cyber and physical domains. The two domains are interconnected, and the players' payoffs depend on their actions across both domains. We investigate the complexity of this multi-domain game and use a double oracle approach to solve it, presenting integerlinear programs for the player oracles. Due to the high dimensionality of the defender's combined action space, the game becomes intractable even for medium-sized networks. Therefore, we propose a heuristic defender oracle to solve large-scale problems efficiently. Our simulations validate that the proposed method can efficiently solve large-scale problems. Numerical results demonstrate that by using the heuristic oracle, the defender's payoff is, on average, within 16% of the optimal solution for random problem instances.
Network slicing has appeared a key feature in 5G and beyond communication networks that enables the creation of multiple virtual networks (i.e., slices) over a shared physical network infrastructure. This process invo...
详细信息
ISBN:
(纸本)9798331505158;9783903176669
Network slicing has appeared a key feature in 5G and beyond communication networks that enables the creation of multiple virtual networks (i.e., slices) over a shared physical network infrastructure. This process involves efficiently embedding (or mapping) each slice element, including virtual network functions (VNFs) and their interconnections, onto the physical network. This paper explores a scenario where the order of VNFs can be adjusted during slice embedding, offering greater flexibility to increase the number of services deployed on the infrastructure. We formulate a novel optimization framework to tackle the challenges of slice admission control and embedding with this flexibility. A heuristic is also introduced to derive embedding solutions in a timely manner. Simulation results demonstrate that allowing flexible VNF ordering significantly increases the number of slices that can be deployed in the network infrastructure.
We consider the problem of finding a basis of a matroid with weight exactly equal to a given target. Here weights can be discrete values from {-Delta, ... , Delta} or more generally m-dimensional vectors of such discr...
详细信息
ISBN:
(纸本)9798331516758;9798331516741
We consider the problem of finding a basis of a matroid with weight exactly equal to a given target. Here weights can be discrete values from {-Delta, ... , Delta} or more generally m-dimensional vectors of such discrete values. We resolve the parameterized complexity completely, by presenting an FPT algorithm parameterized by Delta and m for arbitrary matroids. Prior to our work, no such algorithms were known even when weights are in {0, 1}, or arbitrary Delta and m = 1. Our main technical contributions are new proximity and sensitivity bounds for matroid problems, independent of the number of elements. These bounds imply FPT algorithms via matroid intersection.
In the last three decades, the k-SUM hypothesis has emerged as a satisfying explanation of longstanding time barriers for a variety of algorithmic problems. Yet to this day, the literature knows of only few proven con...
详细信息
A two-stage solution approach based on complementary constraints and The Transformer Model with A Dummy Node is proposed to efficiently solve the large-scale nonlinear dynamic reactive power optimization (DRPO) proble...
详细信息
China’s express delivery industry has boomed in recent years, with the number of new parcels added each year now exceeding half of the overall U.S. express delivery volume, reaching 100 billion. China has established...
详细信息
This paper presents a method for synthesizing a free-labeled Petri net with inhibitor arcs (inhibitor net) from its generated finite language. Inhibitor arcs extend the modeling power of Petri nets to the Turing machi...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
This paper presents a method for synthesizing a free-labeled Petri net with inhibitor arcs (inhibitor net) from its generated finite language. Inhibitor arcs extend the modeling power of Petri nets to the Turing machine level, offering significant benefits for modeling physical systems such as parallel machine systems in manufacturing. However, inhibitor arcs modify the enabling conditions, complicating the synthesis problem and rendering previous methods inapplicable. To address this challenge, we introduce novel logical conditions to manage the altered enabling conditions and formulate the synthesis problem as an integer linear programming problem. Experimental results demonstrate the effectiveness of the proposed method.
暂无评论