The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of th...
详细信息
The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of the exact General-BranchFlow model are listed. The six formats are mathematically equivalent with each other. Linear approximation and second-order cone programming(SOCP) are then used to derive the six formats of the convex General-BranchFlow model. The branch ampacity constraints considering the shunt conductance and capacitance of the transmission line Π-model are derived. The key foundation of deriving the ampacity constraints is the correct interpretation of the physical meaning of the transmission line Π-model. An exact linear expression of the ampacity constraints of the power loss variable is derived. The applications of the General-BranchFlow model in deriving twelve formats of the exact optimal power flow(OPF) model and twelve formats of the approximate OPF model are formulated and analyzed. Using the Julia programming language, the extensive numerical investigations of all formats of the OPF models show the accuracy and computational efficiency of the General-BranchFlow model. A penalty function based approximation gap reduction method is finally proposed and numerically validated to improve the AC-feasibility of the approximate General-BranchFlow model.
In this paper, we study offline-to-online Imitation Learning (IL) that pretrains an imitation policy from static demonstration data, followed by fast finetuning with minimal environmental interaction. We find the na...
详细信息
In this paper, we study offline-to-online Imitation Learning (IL) that pretrains an imitation policy from static demonstration data, followed by fast finetuning with minimal environmental interaction. We find the naïve combination of existing offline IL and online IL methods tends to behave poorly in this context, because the initial discriminator (often used in online IL) operates randomly and discordantly against the policy initialization, leading to misguided policy optimization and unlearning of pretraining knowledge. To overcome this challenge, we propose a principled offline-to-online IL method, named OLLIE, that simultaneously learns a near-expert policy initialization along with an aligned discriminator initialization, which can be seamlessly integrated into online IL, achieving smooth and fast finetuning. Empirically, OLLIE consistently and significantly outperforms the baseline methods in 20 challenging tasks, from continuous control to vision-based domains, in terms of performance, demonstration efficiency, and convergence speed. This work may serve as a foundation for further exploration of pretraining and finetuning in the context of IL. Copyright 2024 by the author(s)
The integration of electric vehicles (EVs) into the smart grid has introduced new challenges and opportunities for optimizing power and energy management. This paper presents a simple method using a decision-tree to e...
详细信息
In the field of image forensics,image tampering detection is a critical and challenging *** methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits ...
详细信息
In the field of image forensics,image tampering detection is a critical and challenging *** methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits their effectiveness in complex scenarios involving multiple forms of *** deep learningbasedmethods offer the advantage of automatic feature learning,current approaches still require further improvements in terms of detection accuracy and computational *** address these challenges,this study applies the UNet 3+model to image tampering detection and proposes a hybrid framework,referred to as DDT-Net(Deep Detail Tracking Network),which integrates deep learning with traditional detection *** contrast to traditional additive methods,this approach innovatively applies amultiplicative fusion technique during downsampling,effectively combining the deep learning feature maps at each layer with those generated by the Bayar noise *** design enables noise residual features to guide the learning of semantic features more precisely and efficiently,thus facilitating comprehensive feature-level ***,by leveraging the complementary strengths of deep networks in capturing large-scale semantic manipulations and traditional algorithms’proficiency in detecting fine-grained local traces,the method significantly enhances the accuracy and robustness of tampered region *** with other approaches,the proposed method achieves an F1 score improvement exceeding 30% on the DEFACTO and DIS25k *** addition,it has been extensively validated on other datasets,including CASIA and *** results demonstrate that this method achieves outstanding performance across various types of image tampering detection tasks.
Federated learning (FL) allows a large number of users to collaboratively train machine learning (ML) models by sending only their local gradients to a central server for aggregation in each training iteration, withou...
详细信息
Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related ***,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding ***,the NDN communicat...
详细信息
Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related ***,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding ***,the NDN communication framework fails to address two important *** current NDN employs a pull-based content retrieval network,which is inefficient in disseminating crucial content in Vehicular Named Data Networking(VNDN).Additionally,VNDN is vulnerable to illusion attackers due to the administrative-less network of autonomous *** various solutions have been proposed for detecting vehicles’behavior,they inadequately addressed the challenges specific to *** deal with these two issues,we propose a novel push-based crucial content dissemination scheme that extends the scope of VNDN from pullbased content retrieval to a push-based content forwarding *** addition,we exploitMachine Learning(ML)techniques within VNDN to detect the behavior of vehicles and classify them as attackers or *** trained and tested our system on the publicly accessible dataset Vehicular Reference Misbehavior(VeReMi).We employed fiveML classification algorithms and constructed the bestmodel for illusion attack *** results indicate that RandomForest(RF)achieved excellent accuracy in detecting all illusion attack types in VeReMi,with an accuracy rate of 100%for type 1 and type 2,96%for type 4 and type 16,and 95%for type ***,RF can effectively evaluate the behavior of vehicles and identify attacker vehicles with high *** ultimate goal of our research is to improve content exchange and ***,ourML-based attack detection and preventionmechanismensures trustworthy content dissemination and prevents attacker vehicles from sharing misleading information in VNDN.
Among various power system disturbances,cascading failures are considered the most serious and extreme threats to grid operations,potentially leading to significant stability issues or even widespread power *** power ...
详细信息
Among various power system disturbances,cascading failures are considered the most serious and extreme threats to grid operations,potentially leading to significant stability issues or even widespread power *** power systems’behaviors during cascading failures is of great importance to comprehend how failures originate and propagate,as well as to develop effective preventive and mitigative control *** intricate mechanism of cascading failures,characterized by multi-timescale dynamics,presents exceptional challenges for their *** paper provides a comprehensive review of simulation models for cascading failures,providing a systematic categorization and a comparison of these *** challenges and potential research directions for the future are also discussed.
Cancer is a formidable andmultifaceted disease driven by genetic aberrations and metabolic *** 19% of cancer-related deaths worldwide are attributable to lung and colon cancer,which is also the top cause of death *** ...
详细信息
Cancer is a formidable andmultifaceted disease driven by genetic aberrations and metabolic *** 19% of cancer-related deaths worldwide are attributable to lung and colon cancer,which is also the top cause of death *** malignancy has a terrible 5-year survival rate of 19%.Early diagnosis is critical for improving treatment outcomes and survival *** study aims to create a computer-aided diagnosis(CAD)that accurately diagnoses lung disease by classifying histopathological *** uses a publicly accessible dataset that includes 15,000 images of benign,malignant,and squamous cell carcinomas in the *** addition,this research employs multiscale processing to extract relevant image features and conducts a comprehensive comparative analysis using four Convolutional Neural Network(CNN)based on pre-trained models such as AlexNet,VGG(Visual Geometry Group)16,ResNet-50,and VGG19,after hyper-tuning these models by optimizing factors such as batch size,learning rate,and *** proposed(CNN+VGG19)model achieves the highest accuracy of 99.04%.This outstanding performance demonstrates the potential of the CAD system in accurately classifying lung cancer histopathological *** study contributes significantly to the creation of a more precise CNN-based model for lung cancer identification,giving researchers and medical professionals in this vital sector a useful tool using advanced deep learning techniques and publicly available datasets.
In this paper, a 3D dangerous goods detection method based on RetinaNet is proposed. This method uses the bidirectional feature pyramid network structure of RetinaNet to extract multi-scale features from point cloud d...
详细信息
A challenge in image based metrology and forensics is intrinsic camera calibration when the used camera is unavailable. The unavailability raises two questions. The first question is how to find the projection model t...
详细信息
暂无评论