In order to deploy machine learning in a real-world self-driving laboratory where data acquisition is costly and there are multiple competing design criteria, systems need to be able to intelligently sample while bala...
详细信息
Lithium-ion batteries (Li-ion) have revolutionized energy storage technology, becoming integral to our daily lives by powering a diverse range of devices and *** high energy density, fast power response, recyclability...
详细信息
Neural networks, which are a type of deep learning model, are massively criticized due to their ‘black box’ approach, which does not allow interpreting their decisions. In this research, several post-hoc interpretab...
详细信息
ISBN:
(数字)9798350350067
ISBN:
(纸本)9798350350074
Neural networks, which are a type of deep learning model, are massively criticized due to their ‘black box’ approach, which does not allow interpreting their decisions. In this research, several post-hoc interpretability techniques, which seek to explain the behavior of such models, are discussed. Specifically, this paper aims to evaluate the application of activation maps, feature importance, and attention mechanisms for explaining CNN and LSTM architectures within two distinct datasets namely Fashion MNIST and IMDB. Thus, the work has a focus on showing that these interpretability methods are not only useful for understanding deep learning models, as well as for reducing bias, fairness, and trust in AI systems. It emphasizes that the complexity and interpretability of models used in socially important tasks should be more thoroughly researched in order to develop effective means of improving artificial intelligence systems while maintaining explanatory power and non-discriminatory approach.
We examine the computational complexity of turnstile puzzles, which are grid-based tour puzzles with walls and turnstiles. A turnstile is a wall that can be rotated in 90° increments, either clockwise or counter-...
详细信息
Group testing is utilized in the case when we want to find a few defectives among a large amount of items. Testing $n$ items one by one requires $n$ tests, but if the ratio of defectives is small, group testing is...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
Group testing is utilized in the case when we want to find a few defectives among a large amount of items. Testing
$n$
items one by one requires
$n$
tests, but if the ratio of defectives is small, group testing is an efficient way to reduce the number of tests. Many researches have been developed for group testing for a single type of defectives. In this paper, we consider the case where two types of defective A and B exist. For two types of defectives, we develop a belief propagation algorithm to compute the marginal posterior probability of defectives. Furthermore, we construct several kinds of collections of pools in order to test for A and B. And, by utilizing our belief propagation algorithm, we evaluate the performance of group testing by conducting simulations.
This paper presents a comparative analysis of three widely used encryption algorithms, namely AES (Advanced Encryption Standard), RC (Rivest Cipher), and Twofish, with a focus on their performance in data encryption a...
详细信息
ISBN:
(数字)9798350353839
ISBN:
(纸本)9798350353846
This paper presents a comparative analysis of three widely used encryption algorithms, namely AES (Advanced Encryption Standard), RC (Rivest Cipher), and Twofish, with a focus on their performance in data encryption and decryption. The study aims to evaluate the strengths and weaknesses of these algorithms in terms of security, speed, and efficiency. The analysis involves benchmarking the algorithms against various performance metrics, including encryption time, decryption time, key size, and resistance against cryptanalysis attacks. Additionally, the research explores the impact of different data sizes and configurations on the performance of each algorithm. The findings of this study will provide valuable insights for decision-makers and practitioners in selecting the most suitable encryption algorithm for their specific needs, considering the tradeoffs between security and performance.
Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfec...
详细信息
Physics-informed neural network (PINN) algorithms have shown promising results in solving a wide range of problems involving partial differential equations (PDEs). However, they often fail to converge to desirable sol...
详细信息
Vehicle platooning, one of the advanced services supported by 5G New Radio V2X (NR-V2X), improves traffic efficiency in the connected intelligent transportation systems (C-ITSs). However, the packet collision probabil...
详细信息
In vector tomography (VT), the aim is to reconstruct an unknown multi-dimensional vector field using line integral data. In the case of a 2-dimensional VT, two types of line integral data are usually required. These d...
详细信息
暂无评论