Active learning(AL)trains a high-precision predictor model from small numbers of labeled data by iteratively annotating the most valuable data sample from an unlabeled data pool with a class label throughout the learn...
详细信息
Active learning(AL)trains a high-precision predictor model from small numbers of labeled data by iteratively annotating the most valuable data sample from an unlabeled data pool with a class label throughout the learning ***,most current AL methods start with the premise that the labels queried at AL rounds must be free of ambiguity,which may be unrealistic in some real-world applications where only a set of candidate labels can be obtained for selected ***,most of the existing AL algorithms only consider the case of centralized processing,which necessitates gathering together all the unlabeled data in one fusion center for *** that data are collected/stored at different nodes over a network in many real-world scenarios,distributed processing is chosen *** this paper,the issue of distributed classification of partially labeled(PL)data obtained by a fully decentralized AL method is focused on,and a distributed active partial label learning(dAPLL)algorithm is *** proposed algorithm is composed of a fully decentralized sample selection strategy and a distributed partial label learning(PLL)*** the sample selection process,both the uncertainty and representativeness of the data are measured based on the global cluster centers obtained by a distributed clustering method,and the valuable samples are chosen in ***,using the disambiguation-free strategy,a series of binary classification problems can be constructed,and the corresponding cost-sensitive classifiers can be cooperatively trained in a distributed *** experiment results conducted on several datasets demonstrate that the performance of the dAPLL algorithm is comparable to that of the corresponding centralized method and is superior to the existing active PLL(APLL)method in different parameter ***,our proposed algorithm outperforms several current PLL methods using the random selection strategy,especially when only s
The effectiveness of the Novel Random Forest (RF) Algorithm for predicting cryptocurrency prices was evaluated and compared to the K-Nearest Neighbor (KNN) Algorithm. Machine learning methods were used to develop the ...
详细信息
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against ...
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against transient bus faults into the interface of the Hardisc RISC-V core. The protection is based on information redundancy with spatial redundancy features. It enables uninterrupted execution in the presence of transient faults and provides a hardware-software interface for its reporting. The benchmarking results indicate that most of the applications will be impacted minimally. The protection has a negligible impact on the maximal frequency and 8% area and power consumption overhead.
In this paper, we introduce a novel normative modeling approach that incorporates focal loss and adversarial autoencoders (FAAE) for Alzheimer’s Disease (AD) diagnosis and biomarker identification. Our method is an e...
详细信息
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
ISBN:
(数字)9798350377569
ISBN:
(纸本)9798350377576
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple lockstep technique to the microarchitecture-level protection of the Hardisc RISC-V core. For a fair comparison, each system is based on the same core(s) and integrates protection against bit-flips in memory and transient faults in the bus. We propose a fault injection methodology, combining pre-synthesis simulation with synthesis data to analyse the vulnerability of a system to faults. The fault injection campaigns show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. We have shown that system failures are more frequent once the fault rate reaches an application-specific threshold (one fault in 100 clock cycles).
This paper examines urban parking prediction using advanced AI-based technologies like machine and deep learning, automated ML (AutoML), and Federated Learning (FL). ML and DL can provide models with high predictive p...
详细信息
ISBN:
(数字)9798350364316
ISBN:
(纸本)9798350364323
This paper examines urban parking prediction using advanced AI-based technologies like machine and deep learning, automated ML (AutoML), and Federated Learning (FL). ML and DL can provide models with high predictive performance if appropriate data processing has been applied to the raw data collected by the parking sensors. The achieved performance is also determined by the selection and fine-tuning of the proper model. AutoML tools automate this time-consuming process, delivering equivalent or better accuracy. The methodology covers data collection and preprocessing, as well as model development, and highlights the integration of FL for improved data privacy and security. The implementation utilizes open-source tools, making our work applicable to real-world scenarios.
With the emergence of the COVID-19 pandemic,the World Health Organization(WHO)has urged scientists and industrialists to exploremodern information and communication technology(ICT)as a means to reduce or even eliminat...
详细信息
With the emergence of the COVID-19 pandemic,the World Health Organization(WHO)has urged scientists and industrialists to exploremodern information and communication technology(ICT)as a means to reduce or even eliminate *** World Health Organization recently reported that the virus may infect the organism through any organ in the living body,such as the respiratory,the immunity,the nervous,the digestive,or the cardiovascular *** the abovementioned goal,we envision an implanted nanosystem embedded in the intra living-body *** main function of the nanosystem is either to perform diagnosis and mitigation of infectious diseases or to implement a targeted drug delivery system(i.e.,delivery of the therapeutic drug to the diseased tissue or targeted cell).The communication among the nanomachines is accomplished via communication-based molecular *** control/interconnection of the nanosystem is accomplished through the utilization of Internet of bio-nano things(IoBNT).The proposed nanosystem is designed to employ a coded relay nanomachine disciplined by the decode and forward(DF)principle to ensure reliable drug delivery to the targeted ***,both the sensitivity of the drug dose and the phenomenon of drug molecules loss before delivery to the target cell site in long-distance due to the molecules diffusion process are taken into *** this paper,a coded relay NM with conventional coding techniques such as RS and Turbo codes is selected to achieve minimum bit error rate(BER)performance and high signal-to-noise ratio(SNR),while the detection process is based on maximum likelihood(ML)probability and minimum error probability(MEP).The performance analysis of the proposed scheme is evaluated in terms of channel capacity and bit error rate by varying system parameters such as relay position,number of released molecules,relay and receiver *** results are validated through simulation and demonstrate that the proposed scheme can
Software development companies commonly use Global Software Development (GSD) in their industry. A competent Scrum team supports the success of the GSD project. This research aims to identify the game components in th...
详细信息
In the dynamic landscape of online social networks, recognizing sensitive content is essential for safeguarding user privacy, fostering inclusivity, and enhancing diversity awareness. Building on prior research, this ...
详细信息
ISBN:
(数字)9798350394191
ISBN:
(纸本)9798350394207
In the dynamic landscape of online social networks, recognizing sensitive content is essential for safeguarding user privacy, fostering inclusivity, and enhancing diversity awareness. Building on prior research, this study explores new dimensions and methodologies for detecting sensitive content. We examine the temporal evolution of sensitive content, revealing how patterns shift over time, and address cross-linguistic challenges, emphasizing cultural and contextual nuances in detection. We employ advanced machine learning techniques, including deep learning models and BERT that improve the accuracy and robustness of the detection procedure. In the experimental study, BERT transformer reported the best performance in detecting sensitive content in text. Additionally, we incorporate explainability techniques such as LIME and SHAP to provide deeper insights into the model's decision-making processes, ensuring predictions are interpretable and reliable. Our work enhances the theoretical framework of sensitive content detection in social networks and provide methods that are accurate and scalable and can facilitate the creation of user-centric interaction that prioritize privacy and user experience.
In the physical propagation environment, the channel matrices of neighboring users exhibit a joint sparsity structure due to the shared scatterers at the Base Station (BS) side. Based on this observation, we consider ...
详细信息
暂无评论