Effective projection-based cross-lingual word embedding (CLWE) induction critically relies on the iterative self-learning procedure. It gradually expands the initial small seed dictionary to learn improved cross-lingu...
详细信息
With the spread of open-ear earphones that do not cover the ear, new listening experiences are being proposed that combines real ambient sounds with virtual sounds heard from earphones. At NTT, we call this merging of...
详细信息
There is a growing need for data-driven research efforts on how the public perceives the ethical, moral, and legal issues of autonomous AI systems. The current debate on the responsibility gap posed by these systems i...
详细信息
Auction-based Federated Learning (AFL) is a burgeoning research area. However, existing bidding strategies for AFL data consumers (DCs) primarily focus on maximizing expected accumulated utility, disregarding the more...
A data mining system, DBMiner, has been developed for interactive mining of multiple-level knowledge in large relational *** system implements a wide spectrum of data mining functions, including generalization, charac...
详细信息
As big data,its technologies,and application continue to advance,the Smart Grid(SG)has become one of the most successful pervasive and fixed computing platforms that efficiently uses a data-driven approach and employs...
详细信息
As big data,its technologies,and application continue to advance,the Smart Grid(SG)has become one of the most successful pervasive and fixed computing platforms that efficiently uses a data-driven approach and employs efficient information and communication technology(ICT)and cloud *** a result of the complicated architecture of cloud computing,the distinctive working of advanced metering infrastructures(AMI),and the use of sensitive data,it has become challenging tomake the SG *** of the SG are categorized into two main categories,Technical Losses(TLs)and Non-Technical Losses(NTLs).Hardware failure,communication issues,ohmic losses,and energy burnout during transmission and propagation of energy are ***’s are human-induced errors for malicious purposes such as attacking sensitive data and electricity theft,along with tampering with AMI for bill reduction by fraudulent *** research proposes a data-driven methodology based on principles of computational intelligence as well as big data analysis to identify fraudulent customers based on their load *** our proposed methodology,a hybrid Genetic Algorithm and Support Vector Machine(GA-SVM)model has been used to extract the relevant subset of feature data from a large and unsupervised public smart grid project dataset in London,UK,for theft detection.A subset of 26 out of 71 features is obtained with a classification accuracy of 96.6%,compared to studies conducted on small and limited datasets.
The hippocampus plays a critical role in learning, memory, and spatial representation, processes that depend on the NMDA receptor (NMDAR). Inspired by recent findings that compare deep learning models to the hippocamp...
The hippocampus plays a critical role in learning, memory, and spatial representation, processes that depend on the NMDA receptor (NMDAR). Inspired by recent findings that compare deep learning models to the hippocampus, we propose a new nonlinear activation function that mimics NMDAR dynamics. NMDAR-like nonlinearity shifts short-term working memory into long-term reference memory in transformers, thus enhancing a process that is similar to memory consolidation in the mammalian brain. We design a navigation task assessing these two memory functions and show that manipulating the activation function (i.e., mimicking the Mg2+-gating of NMDAR) disrupts long-term memory processes. Our experiments suggest that place cell-like functions and reference memory reside in the feed-forward network layer of transformers and that nonlinearity drives these processes. We discuss the role of NMDAR-like nonlinearity in establishing this striking resemblance between transformer architecture and hippocampal spatial representation.
In this paper, a novel online clustering approach called Parallel TEDA is introduced for processing high frequency streaming data. This newly proposed approach is developed within the recently introduced TEDA theory a...
详细信息
By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as c...
详细信息
By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as clustering and association rule algorithms can be used on historical data to develop a unique recommendation system *** our implementation,we utilize historical data to generate association rules specifically for student test marks below a threshold of 60%.By focusing on marks below this threshold,we aim to identify and establish associations based on the patterns of weakness observed in the past ***,we leverage K-means clustering to provide instructors with visual representations of the generated *** strategy aids instructors in better comprehending the information and associations produced by the *** clustering helps visualize and organize the data in a way that makes it easier for instructors to analyze and gain insights,enabling them to support the verification of the relationship between *** can be a useful tool to deliver better feedback to students as well as provide better insights to instructors when developing their *** paper further shows a prototype implementation of the above-mentioned concepts to gain opinions and insights about the usability and viability of the proposed system.
Detecting fraud users, who fraudulently promote certain target items, is a challenging issue faced by e-commerce platforms. Generally, many fraud users have different spam behaviors simultaneously, e.g. spam transacti...
详细信息
暂无评论