This study aims to statistically assess the effectiveness of vaccination against SARS-CoV-2. It is indispensable to investigate the relationship between Covid-19 deadliness and vaccination in order to study the impact...
详细信息
Fuzzy logic is widely applied in various applications. However, verifying the correctness of fuzzy logic models can be difficult. This extended abstract presents our ongoing work on verifying fuzzy logic models. We tr...
Fuzzy logic is widely applied in various applications. However, verifying the correctness of fuzzy logic models can be difficult. This extended abstract presents our ongoing work on verifying fuzzy logic models. We treat a fuzzy logic model as a program and propose a verification method based on symbolic execution for fuzzy logic models. We have developed and implemented the environment models for the common functions and the inference rules in fuzzy logic models. Our preliminary evaluation shows the potential of our verification method.
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, imp...
详细信息
ISBN:
(纸本)9781665476621
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, implementation changes can create errors (e.g., parallelism errors), which are difficult to identify since the aggregate behavior of an incorrect implementation of a stochastic network simulation can fall within the distributions expected from correct implementations. In this paper, we propose the first approach that applies machine learning to traces of network simulations to detect errors. Our technique transforms simulation traces into images by reordering the network's adjacency matrix, and then training supervised machine learning models. Our evaluation on three simulation models shows that we can easily detect previously encountered types of errors and even confidently detect new errors. This work opens up numerous opportunities by examining other simulation models, representations (i.e., matrix reordering algorithms), or machine learning techniques.
In the process of quality analysis of grains, number counting is one of the key steps for agricultural production. Traditional manual grain counting methods are time-consuming and subject to human error, and automated...
In the process of quality analysis of grains, number counting is one of the key steps for agricultural production. Traditional manual grain counting methods are time-consuming and subject to human error, and automated methods have the potential to improve accuracy and save time. In this study, we aimed to develop an image analysis-based method to automatically quantify the number of grains in a quicker manner. The 576 grain images were collected manually, and labelImg tagging tool used to annotate to generate a text file with their respective positions by drawing bounding boxes manually. The datasets consist were separated into three groups: training, validation, and test. For object detection, the YOLOv5, YOLOv4, and YOLOv3 algorithms represent cutting-edge deep learning frameworks. They replace the tedious and error-prone manual counting process by precisely identifying and counting grains in images obtained from agricultural fields. This technique helps to increase grain counting's precision and effectiveness. We believe this method will be extremely beneficial in guiding the development of high throughput systems for counting the number of grains in other crops as it performs well with a wide range of backgrounds, picture sizes, grain sizes, as well as various quantities of grain crowding. When compared to the other two approaches, YOLOv4 performed well in terms of accuracy, speed, and robustness (97.65%), demonstrating that the suggested strategy is competitive with other cutting-edge deep networkst.
Analyzing stop-and-go waves at the scale of miles and hours of data is an emerging challenge in traffic research. In the past, datasets were of limited scale and could be easily analyzed by hand or with rudimentary me...
详细信息
Analyzing stop-and-go waves at the scale of miles and hours of data is an emerging challenge in traffic research. In the past, datasets were of limited scale and could be easily analyzed by hand or with rudimentary methods to identify a very limited set of traffic waves present within the data. The past 5 years have seen an explosion in the availability of large-scale traffic data containing traffic waves and complex congestion patterns, making existing approaches unsuitable for repeatable and scalable analysis of traffic waves in this data. This paper makes a first step towards addressing this shortcoming by introducing an automatic and scalable stop-and-go wave identification method capable of capturing wave generation, propagation, dissipation, as well as bifurcation and merging, which have previously been observed only very rarely. Using a concise and simple critical-speed based definition of a stop-and-go wave, the proposed method identifies all wave boundaries that encompass spatio-temporal points where vehicle speed is below a chosen critical speed. The method is built upon a graph-based representation of the spatio-temporal points associated with stop-and-go waves, specifically wave front (start) points and wave tail (end) points, and approaches the solution as a graph component identification problem. The method is implemented in Python and demonstrated on a large-scale dataset, I-24 MOTION INCEPTION. New insights revealed from this demonstration with emerging phenomena include: (a) we demonstrate that waves do generate, propagate, and dissipate at a scale (miles and hours) and ubiquity never observed before;(b) wave fronts and tails travels at a consistent speed for a critical speed between 10-20 mph, with propagation variation across lanes, where wave speed on the outer lane are less consistent compared to those on the inner lane;(c) wave fronts and tails propagate at different speeds;(d) wave boundaries capture rich and non-trivial wave topologies (with
Zero-shot stance detection (ZSSD) is an important research problem that requires algorithms to have good stance detection capability even for unseen targets. In general, stance features can be grouped into two types: ...
详细信息
Zero-shot stance detection (ZSSD) is an important research problem that requires algorithms to have good stance detection capability even for unseen targets. In general, stance features can be grouped into two types: target-invariant and target-specific. Target-invariant features express the same stance regardless of the targets they are associated with, and such features are general and transferable. On the contrary, target-specific features will only be directly associated with specific targets. Therefore, it is crucial to effectively mine target-invariant features in texts in ZSSD. In this paper, we develop a method based on contrastive learning to mine certain transferable target-invariant expression features in texts from two dimensions of sentiment and stance and then generalize them to unseen targets. Specifically, we first grouped all texts into several types in terms of two orthogonal dimensions: sentiment polarity and stance polarity. Then we devise a supervised contrastive learning-based strategy to capture each type's common and transferable expressive features. Finally, we fuse the above-mentioned expressive features with the semantic features of the original texts about specific targets to deal with the stance detection for unseen targets. Extensive experiments on three benchmark datasets show that our proposed model achieves the state-of-the-art performance on most datasets. Code and other resources are available on GitHub 1 1 https://***/zoujiaying1995/sscl-project.
This paper reviews the use of Minikube in multi-node mode to work with the ETSI MEC Sandbox as a lightweight multi-access edge computing platform simulator (LWMECPS). The work included a comparative analysis of MEC pl...
This paper reviews the use of Minikube in multi-node mode to work with the ETSI MEC Sandbox as a lightweight multi-access edge computing platform simulator (LWMECPS). The work included a comparative analysis of MEC platforms in terms of functionality, cost of deployment, and complexity of adoption. An experiment was also conducted to test LWMECPS as a MEC platform using a Python3 test application. The experiment confirmed the feasibility of using LWMECPS as a MEC platform by deploying a Kubernetes deployment based on the number of users on the simulated 4g-macro network service zones from the ETSI MEC Sandbox. Particular attention was paid to the analysis of existing scientific literature on the use of multi-access edge computing platforms in various use cases.
Multi-modality image fusion (MMIF) entails synthesizing images with detailed textures and prominent objects. Existing methods tend to use general feature extraction to handle different fusion tasks. However, these met...
详细信息
This work focuses on Speech Emotion Recognition (SER) for extracting emotional states from speech signals, encompassing universal emotions like Happiness, Anger, Neutral, Calm, Sadness, Disgust, Fearful, and Surprised...
详细信息
ISBN:
(数字)9798350389609
ISBN:
(纸本)9798350389616
This work focuses on Speech Emotion Recognition (SER) for extracting emotional states from speech signals, encompassing universal emotions like Happiness, Anger, Neutral, Calm, Sadness, Disgust, Fearful, and Surprised. The methodology involves extracting features such as Chromogram, Mel- frequency cepstral coefficients (MFCC), Mel scaled spectrogram, Tonal Centroid and Spectral contrast, followed by classification using Artificial Neural Networks (ANN). A health-oriented aspect, is integrated in this model by providing personalized guided meditation sessions based on the user's emotional state to promote mental wellness. The main aim of this work is to broaden its reach and impact through ongoing refinement of the model and exploration of new implementation strategies, ultimately contributing to a healthier and happier society. The results of this work demonstrate promising accuracy, with the trained deep neural network (DNN) model achieving approximately 81.25% accuracy in recognizing speech emotions in comparison with the existing algorithms. DNN shows a 11%, 8%, 14% increase in accuracy with RNN & LSTM, SVM, GMM respectively.
Hate speech detection is hampered by the scarcity and topical and lexical biases of annotated data, leading to poor generalization. It is imperative to devise a cross-domain approach to solve this problem. The ability...
详细信息
Hate speech detection is hampered by the scarcity and topical and lexical biases of annotated data, leading to poor generalization. It is imperative to devise a cross-domain approach to solve this problem. The ability to learn transferable knowledge is critical for cross-domain hate speech detection. In this work, We propose a domain-adaptive dependency graph method based on post-hoc explanation (DPDG). We extract post-hoc explanations from fine-tuned BERT classifiers as the importance score for hate representation. Based on these, we construct in-domain graph and cross-domain graph to better learn in-domain hate representation and adapt to the target domain respectively. Finally, we use interactive GCN blocks to interactively and adaptively learn and adjust the domain adaptive graph representation. The results of cross-domain experiments on multiple domains show that our proposed model outperforms competitive baselines in cross-domain hate speech detection.
暂无评论