Node classification on graphs is a significant task with a wide range of applications, including social analysis and anomaly detection. Even though graph neural networks (GNNs) have produced promising results on this ...
详细信息
Under voltage load shedding (UVLS) for power grid emergency control builds the last defensive perimeter to prevent cascade outages and blackouts in case of contingencies. This letter proposes a novel cooperative multi...
详细信息
Edge-computing-enabled smart greenhouses are a representative application of the Internet of Things(IoT)technology,which can monitor the environmental information in real-time and employ the information to contribute ...
详细信息
Edge-computing-enabled smart greenhouses are a representative application of the Internet of Things(IoT)technology,which can monitor the environmental information in real-time and employ the information to contribute to intelligent *** the process,anomaly detection for wireless sensor data plays an important ***,the traditional anomaly detection algorithms originally designed for anomaly detection in static data do not properly consider the inherent characteristics of the data stream produced by wireless sensors such as infiniteness,correlations,and concept drift,which may pose a considerable challenge to anomaly detection based on data stream and lead to low detection accuracy and ***,the data stream is usually generated quickly,which means that the data stream is infinite and ***,any traditional off-line anomaly detection algorithm that attempts to store the whole dataset or to scan the dataset multiple times for anomaly detection will run out of memory ***,there exist correlations among different data streams,and traditional algorithms hardly consider these ***,the underlying data generation process or distribution may change over ***,traditional anomaly detection algorithms with no model update will lose their *** these issues,a novel method(called DLSHiForest)based on Locality-Sensitive Hashing and the time window technique is proposed to solve these problems while achieving accurate and efficient *** experiments are executed using a real-world agricultural greenhouse dataset to demonstrate the feasibility of our *** results show that our proposal is practical for addressing the challenges of traditional anomaly detection while ensuring accuracy and efficiency.
Digital Pathology is the technique of digitizing histology slides to create high-resolution images. One of the important applications for digital pathology is tissue level classification, such as the identification of...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming and labor-intensive for manual predetermination for a large-scale modern power *** improve efficiency of predetermination,this paper proposes a framework of knowledge fusion-based deep reinforcement learning(KF-DRL)for intelligent predetermination of ***,the Markov Decision Process(MDP)for GTS problem is formulated based on transient instability ***,linear action space is developed to reduce dimensionality of action space for multiple controllable ***,KF-DRL leverages domain knowledge about GTS to mask invalid actions during the decision-making *** can enhance the efficiency and learning ***,the graph convolutional network(GCN)is introduced to the policy network for enhanced learning *** simulation results obtained on New England power system demonstrate superiority of the proposed KF-DRL framework for GTS over the purely data-driven DRL method.
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac...
详细信息
作者:
Zhou, JingShang, JunChen, TongwenUniversity of Alberta
Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Tongji University
Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China
This paper examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Du...
详细信息
Despite of exciting advances in image-based rendering and novel view synthesis, it is still challenging to achieve high-resolution results that can reach production-level quality when applying such methods to the task...
Despite of exciting advances in image-based rendering and novel view synthesis, it is still challenging to achieve high-resolution results that can reach production-level quality when applying such methods to the task of stereo conversion. At the same time, only very few dedicated stereo conversion approaches exist, which also fall short in terms of the required quality. Hence, in this paper, we present a novel method for high-resolution 2D-to-3D conversion. It is fully differentiable in all of its stages and performs disparity-informed warping, consistent foreground-background compositing, and background-aware inpainting. To enable temporal consistency in the resulting video, we propose a strategy to integrate information from additional video frames. Extensive ablation studies validate our design choices, leading to a fully automatic model that outperforms existing approaches by a large margin (49-70% LPIPS error reduction). Finally, inspired from current practices in manual stereo conversion, we introduce optional interactive tools into our model, which allow to steer the conversion process and make it significantly more applicable for 3D film production.
Machine learning is widely used in all industries. In order to speed up decision-making on the most likely course of action, machine learning have shown their effectiveness in analyzing perioperative effects. In sever...
详细信息
Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development *** stories are the primary means of requirements collection and elicitat...
详细信息
Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development *** stories are the primary means of requirements collection and elicitation in the agile development.A project can involve a large amount of user stories,which should be clustered into different groups based on their functionality’s similarity for systematic requirements analysis,effective mapping to developed features,and efficient ***,the current user story clustering is mainly conducted in a manual manner,which is time-consuming and subjective to human *** this paper,we propose a novel approach for clustering the user stories automatically on the basis of natural language ***,the sentence patterns of each component in a user story are first analysed and determined such that the critical structure in the representative tasks can be automatically extracted based on the user story *** similarity of user stories is calculated,which can be used to generate the connected graph as the basis of automatic user story *** evaluate the approach based on thirteen datasets,compared against ten baseline *** results show that our clustering approach has higher accuracy,recall rate and F1-score than these *** is demonstrated that the proposed approach can significantly improve the efficacy of user story clustering and thus enhance the overall performance of agile *** study also highlights promising research directions for more accurate requirements elicitation.
暂无评论