Accurate load forecasting is essential for energy system demand response, energy distribution, and energy waste reduction. This work investigates artificial intelligence-based energy load estimation methods, focussing...
详细信息
ISBN:
(数字)9798331502768
ISBN:
(纸本)9798331502775
Accurate load forecasting is essential for energy system demand response, energy distribution, and energy waste reduction. This work investigates artificial intelligence-based energy load estimation methods, focussing on Gradient Boosting Machines (GBM) to improve forecast accuracy. The study will focus on GBM use. The research project begins with extensive data preprocessing. This solution includes imputation for missing data and data inclusion to fix dataset imbalances. To improve model performance, autoencoder-based feature selection reduces data dimensionality while keeping crucial information. We also use a correlation matrix to find and remove duplicate characteristics. After that, the Gradient Boosting Machine classifier is used for regression jobs to manage nonlinear relationships and reduce prediction mistakes. This improves forecast accuracy. The studies show that the suggested strategy enhances load forecasting accuracy compared to standard models. This study shows that AI-driven methods can improve demand responsiveness. This can help smart grids and telecoms manage energy more efficiently and sustainably.
This article proposes a current limiting function for a self-sensing and self-triggering monolithically integrated SiC circuit breaker device. The proposed function provides the device not only with a fast-response cu...
详细信息
Ethereum is one of the most popular blockchain platforms with a high number of adoption in the blockchain world today. Ethereum token (ERC-20) can tokenize any real-world object while it is also possible to exchange t...
详细信息
In this paper, we propose and analyze the terahertz (THz) bolometric vector detectors based on the graphene-channel field-effect transistors (GC-FET) with the black-P gate barrier layer or with the composite b-BN/blac...
详细信息
Gossip learning (GL), as a decentralized alternative to federated learning (FL), is more suitable for resourceconstrained wireless networks, such as Flying Ad-Hoc Networks (FANETs) that are formed by unmanned aerial v...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
Gossip learning (GL), as a decentralized alternative to federated learning (FL), is more suitable for resourceconstrained wireless networks, such as Flying Ad-Hoc Networks (FANETs) that are formed by unmanned aerial vehicles (UAVs). GL can significantly enhance the efficiency and extend the battery life of UAV networks. Despite the advantages, the performance of GL is strongly affected by data distribution, communication speed, and network connectivity. However, how these factors influence the GL convergence is still unclear. Existing work studied the convergence of GL based on a virtual quantity for the sake of convenience, which failed to reflect the real state of the network when some nodes are inaccessible. In this paper, we formulate and investigate the impact of inaccessible nodes to GL under a dynamic network topology. We first decompose the weight divergence by whether the node is accessible or not. Then, we investigate the GL convergence under the dynamic of node accessibility and theoretically provide how the number of inaccessible nodes, data non-i.i.d.-ness, and duration of inaccessibility affect the convergence. Extensive experiments are carried out in practical settings to comprehensively verify the correctness of our theoretical findings.
Missing data is commonly encountered in practice, and when the missingness is non-ignorable, effective remediation depends on knowledge of the missingness mechanism. Learning the underlying missingness mechanism from ...
详细信息
In this paper, we detect bacteria from Gram stained smears images by the object detectors of SSD, M2Det, RT-DETR and YOLOv8. Then, we show that SSD and M2Det are not appropriate for detecting bacteria. Also we show th...
详细信息
ISBN:
(数字)9798350377903
ISBN:
(纸本)9798350377910
In this paper, we detect bacteria from Gram stained smears images by the object detectors of SSD, M2Det, RT-DETR and YOLOv8. Then, we show that SSD and M2Det are not appropriate for detecting bacteria. Also we show that RT-DETR with pre-training and the variation of YOLOv8 shifting convolution layers are more appropriate to detect bacteria than standard YOLOv8.
Marine object detection has gained prominence in marine research, driven by the pressing need to unravel oceanic mysteries and enhance our understanding of invaluable marine ecosystems. There is a profound requirement...
详细信息
The recent advancement in Multimedia Analytical, computer Vision (CV), and Artificial Intelligence (AI) algorithms resulted in several interesting tools allowing an automatic analysis and retrieval of multimedia conte...
详细信息
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate network functions with physical and virtual resources towards providing a complete network service. Concurrently, the management of a continuously expanding network and the fulfillment of the applications’ requirements pave the way for autonomic network solutions. Intent Based Networking (IBN) is a novel paradigm that aims to achieve the automatic orchestration of network services and the assurance of their performance. Accordingly, in this paper, we propose a novel automated network assurance model, based on Model Predictive Control, to guarantee the Quality of Service (QoS) and security requirements of multi-tenant and IBN-enabled SFCs. In this context, corrective decisions are proactively taken, in the form of incoming intent relocations among the SFCs. The results reveal that our model can assure with high probability the application requirements and minimize QoS violations.
暂无评论