Here we consider the problem of denoising features associated to complex data, modeled as signals on a graph, via a smoothness prior. This is motivated in part by settings such as single-cell RNA where the data is ver...
Here we consider the problem of denoising features associated to complex data, modeled as signals on a graph, via a smoothness prior. This is motivated in part by settings such as single-cell RNA where the data is very high-dimensional, but its structure can be captured via an affinity graph. This allows us to utilize ideas from graph signal processing. In particular, we present algorithms for the cases where the signal is perturbed by Gaussian noise, dropout, and uniformly distributed noise. The signals are assumed to follow a prior distribution defined in the frequency domain which favors signals which are smooth across the edges of the graph. By pairing this prior distribution with our three models of noise generation, we propose Maximum A Posteriori (M.A.P.) estimates of the true signal in the presence of noisy data and provide algorithms for computing the M.A.P. Finally, we demonstrate the algorithms’ ability to effectively restore signals from white noise on image data and from severe dropout in single-cell RNA sequence data.
A Z2×Z2-graded Lie algebra g is a Z2×Z2-graded algebra g with a bracket [[·,·]] that satisfies certain graded versions of the symmetry and Jacobi identity. In particular, despite the common termino...
详细信息
This paper presents a comparative analysis of selected distance metrics within the intuitionistic fuzzy environment in Multi-Criteria Decision Analysis (MCDA). The Technique for Order of Preference by Similarity to Id...
详细信息
Despite notable results on standard aerial datasets, current state-of-the-arts fail to produce accurate building footprints in dense areas due to challenging properties posed by these areas and limited data availabili...
详细信息
This paper provides a comparative analysis of three selected Multi-Criteria Decision Analysis (MCDA) methods in a practical decision problem to examine the robustness of the obtained results. The Complex Proportional ...
详细信息
Asymmetric Shapley values (ASVs) are an extension of Shapley values that allow a user to incorporate partial causal knowledge into the explanation process. Unfortunately, computing ASVs requires sampling permutations,...
详细信息
In this paper we investigate phenomena of emergence of highly organized structures in networks. Our approach is based on Kolmogorov complexity of networks viewed as finite size strings. We apply this approach to study...
详细信息
Demand-side management provides a great potential for improving the efficiency and reliability of energy systems. This requires a mechanism to connect the market level and the demand side. The flexibility function is ...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and *** learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit *** intrusion detection system controls the flow of network traffic with the help of computer *** deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network *** this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network *** Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious *** proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection.
Time delays are ubiquitous in industry, and they must be accounted for when designing control strategies. However, numerical optimal control (NOC) of delay differential equations (DDEs) is challenging because it requi...
详细信息
暂无评论