We consider a robot that can move in a straight line, until it hits any wall of a given 2D rectangle room. If the robot hits a corner of the room then it will stop, otherwise the robot bounces off the wall using the l...
详细信息
ISBN:
(数字)9798350393965
ISBN:
(纸本)9798350393972
We consider a robot that can move in a straight line, until it hits any wall of a given 2D rectangle room. If the robot hits a corner of the room then it will stop, otherwise the robot bounces off the wall using the laws of reflection and again move in another straight line. The room may contain an unbroken opening of unit length on a wall, which is unknown to the robot. If the robot reaches any point of the opening with a non-zero angle, then it escapes through the opening. The objective of the problem is to devise an algorithm for the robot which enables it to find if there is an opening on the perimeter of any given rectangle or detect that the room contains no opening. This work is a continuation of our previous publication [1], where we presented an algorithm that enables the robot to find the opening or correctly declare that there is none, when any two adjacent sides of the rectangle are integer and co-prime. In this work, we study the problem for rectangles of any lengths and we have proposed a strategy where the robot is guaranteed to find the opening or correctly declare that there is none. Additionally, We provide other interesting results related to our proposed algorithm.
This letter puts forth a new hybrid horizontal-vertical federated learning (HoVeFL) for mobile edge computing-enabled Internet of Things (EdgeIoT). In this framework, certain EdgeIoT devices train local models using t...
详细信息
This paper presents a cutting-edge data mining approach to investigate user trust in decentralized applications (dApps) on public blockchains. Our innovative data analysis methodology enables a comprehensive explorati...
This paper presents a cutting-edge data mining approach to investigate user trust in decentralized applications (dApps) on public blockchains. Our innovative data analysis methodology enables a comprehensive exploration of dApp user behaviors, uncovering crucial insights. Contrary to popular belief, large-scale hacking incidents on centralized exchanges (CEX) have a limited impact on decentralized exchange (DEX) migration and inactive user rates. Additionally, our results reveal a notable trend of increased user outflow in older dApp protocols compared to their newer counterparts and emphasize the significant role of government regulations on DEX user inactivity. This research advances the understanding of dApp scalability and user trust, laying the groundwork for future inquiries in this rapidly evolving field.
Distance-based classification is frequently used in transductive few-shot learning (FSL). However, due to the high-dimensionality of image representations, FSL classifiers are prone to suffer from the hubness problem,...
Distance-based classification is frequently used in transductive few-shot learning (FSL). However, due to the high-dimensionality of image representations, FSL classifiers are prone to suffer from the hubness problem, where a few points (hubs) occur frequently in multiple nearest neighbour lists of other points. Hubness negatively impacts distance-based classification when hubs from one class appear often among the nearest neighbors of points from another class, degrading the classifier's performance. To address the hubness problem in FSL, we first prove that hubness can be eliminated by distributing representations uniformly on the hypersphere. We then propose two new approaches to embed representations on the hypersphere, which we prove optimize a tradeoff between uniformity and local similarity preservation - reducing hubness while retaining class structure. Our experiments show that the proposed methods reduce hubness, and significantly improves transductive FSL accuracy for a wide range of classifiers 1 1 Code available at https://***/uitml/noHub..
Robust aggregation integrates predictions from multiple experts without knowledge of the experts' information structures. Prior work assumes experts are Bayesian, providing predictions as perfect posteriors based ...
详细信息
We present a randomized differential testing approach to test OpenMP implementations. In contrast to previous work that manually creates dozens of verification and validation tests, our approach is able to randomly ge...
详细信息
This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging ev...
This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events for EVs. In this work we propose a residual based model which leverages the distinctive characteristics of EV charging patterns, marked by unpredictable spikes in energy consumption, and the more predictable nature of AC load. Our proposed approach involves training a lightweight forecasting model to predict overall house-hold consumption and utilizes the residuals of this model for iden-tifying household with EVs. The residual-based model, ResEV-AR, demonstrated a substantial advantage in F1 score (5.8% and 7.32%) compared to state-of-the-art models such as EVS and KBF, respectively. Additionally, a simpler residual model, ResEV-SRM, exhibited a 3.5% F1 score advantage over EVS, coupled with an impressive 11-fold reduction in computation time.
Many diseases and health conditions are closely related to various microbes,which participate in complex interactions with diverse drugs;nonetheless,the detailed targets of such drugs remain to be *** existing studies...
详细信息
Many diseases and health conditions are closely related to various microbes,which participate in complex interactions with diverse drugs;nonetheless,the detailed targets of such drugs remain to be *** existing studies have reported causal associations among drugs,gut microbes,or diseases,calling for a workflow to reveal their intricate *** this study,we developed a systematic workflow comprising three modules to construct a Quorum Sensing-based Drug-Microbe-Disease(QSDMD)database(http://***/),which includes diverse interactions for more than 8,000 drugs,163 microbes,and 42 common *** interactions between microbes and more than 8,000 drugs have been systematically studied by targeting microbial QS receptors combined with a docking-based virtual screening technique and in vitro experimental ***,we have constructed a QS-based drug-receptor interaction network,proposed a systematic framework including various drug-receptor-microbe-disease connections,and mapped a paradigmatic circular interaction network based on the QS-DMD,which can provide the underlying QS-based mechanisms for the reported causal *** QS-DMD will promote an understanding of personalized medicine and the development of potential therapies for diverse *** work contributes to a paradigm for the construction of a molecule-receptor-microbe-disease interaction network for human health that may form one of the key knowledge maps of precision medicine in the future.
Non-technical loss and energy theft detection are crucial for improving the stability and reducing financial losses in smart grid and power grid utilities. Recently, the availability of massive datasets has improved d...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
Non-technical loss and energy theft detection are crucial for improving the stability and reducing financial losses in smart grid and power grid utilities. Recently, the availability of massive datasets has improved detection capabilities using sophisticated techniques like deep neural networks. However, training models on extensive feature sets, such as multi-year data, can lead to confusion due to varied behavioral changes in electricity consumption. To address this, we propose a reformulation of the energy theft detection problem by segmenting the time series data and training individual models on each segment. These models’ anomaly scores are then aggregated to produce a final classification. Our framework has shown significant improvement, elevating the F1 score from 0.6 to 0.74, outperforming recent state-of-the-art techniques on the SGCC dataset, the only publicly available dataset labeled for energy theft.
In recent years,the traditional well logging interpretation method manually operated by experts has shown some problems,such as low efficiency and poor results,facing the challenges of high dimension,diversity and com...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
In recent years,the traditional well logging interpretation method manually operated by experts has shown some problems,such as low efficiency and poor results,facing the challenges of high dimension,diversity and complexity of current logging *** the progress of artificial intelligence,its effectiveness and efficiency in logging interpretation have gradually attracted researchers' ***,the uncertainty of logging process necessitates the preprocess of collected logging data before employing the artificial intelligence ***,an intelligent well logging interpretation system is designed and developed in this *** the logging data anomalies may include data repetition,null value,etc.,a specific preprocessing module is designed in the system to tackle the data anomalies,so as to ensure that the data input into the algorithms is correct and *** governance can effectively enhance the effectiveness of data,so it is used to guide the design and implementation of logging interpretation ***,user mode and debug mode are designed to solve the problem of cross functional conflict in data governance.
暂无评论