Knowledge Graphs typically suffer from incompleteness. A popular approach to knowledge graph completion is to infer missing knowledge by multi-hop reasoning over the information found along other paths connecting a pa...
详细信息
This Work in Progress paper in the Innovative Practice Category presents an approach to incorporate the use of a virtual reality environment in the teaching of analysis of software requirements through modeling. Commo...
详细信息
The article is devoted to the problem of automatic monitoring of the driver's physical conditions while driving. The purpose of this article is to describe an approach to recognizing driver fatigue using a video c...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
The article is devoted to the problem of automatic monitoring of the driver's physical conditions while driving. The purpose of this article is to describe an approach to recognizing driver fatigue using a video camera mounted on the front panel of a vehicle, which allows recording facial expressions of a driver's face for further analysis by managers of logistic company and using of the received information by Internet of Things objects in the freight management system. The system will allow managers of the logistics company to gain access to the movements of each driver and to statistics of dangerous conditions recorded during the trip, which, in turn, will allow to control the routes, compliance with traffic rules, as well as the work and rest of the drivers of the logistics companies.
Deep generative models have been praised for their ability to learn smooth latent representations of images, text, and audio, which can then be used to generate new, plausible data. Motivated by these success stories,...
详细信息
Deep generative models have been praised for their ability to learn smooth latent representations of images, text, and audio, which can then be used to generate new, plausible data. Motivated by these success stories, there has been a surge of interest in developing deep generative models for automated molecule design. However, these models face several difficulties due to the unique characteristics of molecular graphs--their underlying structure is not Euclidean or grid-like, they remain isomorphic under permutation of the nodes' labels, and they come with a different number of nodes and edges. In this paper, we first propose a novel variational autoencoder for molecular graphs, whose encoder and decoder are specially designed to account for the above properties by means of several technical innovations. Moreover, in contrast with the state of the art, our decoder is able to provide the spatial coordinates of the atoms of the molecules it generates. Then, we develop a gradient-based algorithm to optimize the decoder of our model so that it learns to generate molecules that maximize the value of certain property of interest and, given any arbitrary molecule, it is able to optimize the spatial configuration of its atoms for greater stability. Experiments reveal that our variational autoencoder can discover plausible, diverse and novel molecules more effectively than several state of the art models. Moreover, for several properties of interest, our optimized decoder is able to identify molecules with property values 121% higher than those identified by several state of the art methods based on Bayesian optimization and reinforcement learning.
Global software development (GSD) is basically a development which is done through low cost in given time frame by sitting in remote areas within cities, countries and around the globe. The global software development...
详细信息
The smart grid faces with increasingly sophisticated cyber-physical threats, against which machine learning (ML)-based intrusion detection systems have become a powerful and promising solution to smart grid security m...
详细信息
ISBN:
(数字)9781728169262
ISBN:
(纸本)9781728169279
The smart grid faces with increasingly sophisticated cyber-physical threats, against which machine learning (ML)-based intrusion detection systems have become a powerful and promising solution to smart grid security monitoring. However, many ML algorithms presume that training and testing data follow the same or similar data distributions, which may not hold in the dynamic time-varying systems like the smart grid. As operating points may change dramatically over time, the resulting data distribution shifts could lead to degraded detection performance and delayed incidence responses. To address this challenge, this paper proposes a semi-supervised framework based on domain-adversarial training to transfer the knowledge of known attack incidences to detect returning threats at different hours and load patterns. Using normal operation data of the ISO New England grids, the proposed framework leverages adversarial training to adapt learned models against new attacks launched at different times of the day. Effectiveness of the proposed detection framework is evaluated against the well-studied false data injection attacks synthesized on the IEEE 30-bus system, and the results demonstrated the superiority of the framework against persistent threats recurring in the highly dynamic smart grid.
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ...
详细信息
ISBN:
(纸本)9781450372800
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the local variance value. Compared to the simple LSB algorithm where we use bits 7 and 8 to embed information, the proposed algorithm is more robust to white noise and JPEG compression. Experimental results show that the quality of the watermarked image is high in terms of Peak Signal-to-Noise (PSNR) and Structural Similarity Index (SSIM).
Recently, federated learning (FL) has emerged as a promising distributed machine learning (ML) technology, owing to the advancing computational and sensing capacities of end-user devices, as well as the increasing con...
详细信息
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ...
详细信息
暂无评论