In the landscape of rapidly expanding data streams, deriving meaningful insights, particularly frequent itemsets, within massive datasets at a swift pace poses a significant challenge. Addressing this challenge, vario...
In the landscape of rapidly expanding data streams, deriving meaningful insights, particularly frequent itemsets, within massive datasets at a swift pace poses a significant challenge. Addressing this challenge, various methodologies for Frequent Itemset Mining have been proposed, yet they struggle with low support counts and efficiency concerns in handling large datasets. In response, our research introduces Jagged Itemset Counting (JIC) methodologies, aiming to effectively mine Frequent Itemsets from extensive data. The core objective revolves around devising a robust algorithm capable of identifying all Frequent Itemsets, irrespective of database size or the nature of the itemset. Central to this approach is the introduction of a straightforward label representation, GPLN (Geometric Progression Label Number), assigned to each frequent item. Utilizing CGPLN (Cumulative Geometric Progression Label Number), derived from the arithmetic sum of GPLNs within transaction subsets, forms the CGPLN-Label representation for each transaction subset (itemset). Comparative analysis reveals superior performance of JIC over Apriori and Eclat algorithms for small and medium-sized datasets, exhibiting efficiency even at minimal support thresholds. In the realm of Big Data, where FP-Growth and Eclat falter, the proposed technique shines with faster execution times, optimized main memory utilization, and efficient disc memory usage.
Variational autoencoder (VAE) is an established generative model but is notorious for its blurriness. In this work, we investigate the blurry output problem of VAE and resolve it, exploiting the variance of Gaussian d...
详细信息
In the present era of internet revolution, organizations have to go through numerous resumes in order to identify the most suitable candidates for their Job Description (JD), while ensuring that no acquisition of tale...
详细信息
ISBN:
(数字)9798350364866
ISBN:
(纸本)9798350364873
In the present era of internet revolution, organizations have to go through numerous resumes in order to identify the most suitable candidates for their Job Description (JD), while ensuring that no acquisition of talent is overlooked through human mistakes. Thus, tools like Applicant Tracking Systems (ATS) have taken over the human process of resume screening, enabling assessment of thousands of resumes in a matter of seconds. Although these technologies are incredibly effective, they are not flawless. Consequently, highly qualified individuals may miss out on said opportunities if their resumes are not formatted correctly. Therefore, individuals must ensure that their resume is appropriately structured prior to submitting it to any organization. The study centers on the present literature and suggests an enhanced approach for parsing resumes by leveraging Large Language Models (LLMs).
It is imperative to note that post-quantum cryptography, such as supersingular isogeny Diffie-Hellman (SIDH), is essential for ensuring that Internet of Things (IoT) devices have a restricted amount of resources. The ...
详细信息
This paper develops an implementation of a measurement and control system in which a vehicle follows its predecessor while maintaining a certain distance. First, we construct a model that virtually delays the referenc...
详细信息
ISBN:
(数字)9798350374766
ISBN:
(纸本)9798350374773
This paper develops an implementation of a measurement and control system in which a vehicle follows its predecessor while maintaining a certain distance. First, we construct a model that virtually delays the reference coordinates of the leading target backwards, and propose a control law that follows the steering angle of the following vehicle to that virtual delay point. Next, a range sensor is used to detect the position and orientation of the leader, and the position and orientation is estimated using a template matching method based on the person’s body contour point group measured by the sensor. Finally, the effectiveness (including robustness) of the proposed system is demonstrated in some simulations and human tracking experiments.
We introduce a framework to design in-memory decision tree machine-learning (ML) circuits using memristor crossbars. Decision trees (DTs) offer many advantages over neural networks, such as enhanced energy efficiency,...
详细信息
ISBN:
(数字)9798350330991
ISBN:
(纸本)9798350331004
We introduce a framework to design in-memory decision tree machine-learning (ML) circuits using memristor crossbars. Decision trees (DTs) offer many advantages over neural networks, such as enhanced energy efficiency, interpretability, safety, privacy, and speed, along with reduced dependence on extensive training data. We propose an adaptive multivariate decision tree (AMDT) training algorithm, which constructs decision trees that incorporate both univariate and multivariate features, facilitating the creation of higher accuracy and energy-efficient crossbar designs compared to the state-of-the-art (SOTA). Our circuits are realized using pure memristor crossbars, requiring just one memristor per cell and no transistors while employing sneak-paths for flow-based in-memory computations. In comparison to the SOTA, our approach produces designs that are, on average, 4% more accurate and require 12.6% lower energy.
The threat of credit card fraud is high and so there should be efficient ways to combat it. The research is being employed to focus on how to enhance credit card fraud detection, machine learning methodologies can be ...
详细信息
A bacterial or viral infection of the lungs can cause pneumonia, one of the dangerous and potentially fatal illnesses that can have dire repercussions in a short amount of time. Therefore, a key component of a success...
详细信息
ISBN:
(数字)9798350385779
ISBN:
(纸本)9798350385786
A bacterial or viral infection of the lungs can cause pneumonia, one of the dangerous and potentially fatal illnesses that can have dire repercussions in a short amount of time. Therefore, a key component of a successful treatment plan is an early diagnosis. Therefore, a sophisticated and automated system that can diagnose chest X-rays and make the process of diagnosing pneumonia easier for both specialists and novices is required. This research aims to create a CNN model that will help with the accurate classification of pneumonia. In this work, we have presented our Deep Learning method for the classification challenge, which is taught using modified images through several pre-processing stages. With an overall accuracy of 93.30%, we were able to classify X-ray images of pneumonia using a custom CNN model. Our proposed model is able to precisely detect pneumonia from X-ray images with amazing accuracy and loss. Furthermore, we employed the LIME and SHAP tools of the XAI technique to generate a noteworthy conclusion to persuade medical practitioners.
Anomaly detection is a crucial task in cyber security. Technological advancement brings new cyber-physical threats like network intrusion, financial fraud, identity theft, and property invasion. In the rapidly changin...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Anomaly detection is a crucial task in cyber security. Technological advancement brings new cyber-physical threats like network intrusion, financial fraud, identity theft, and property invasion. In the rapidly changing world, with frequently emerging new types of anomalies, classical machine learning models are insufficient to prevent all the threats. Quantum Machine Learning (QML) is emerging as a powerful computational tool that can detect anomalies more efficiently. In this work, we have introduced QML and its applications for anomaly detection in consumer electronics. We have shown a generic framework for applying QML algorithms in anomaly detection tasks. We have also briefly discussed popular supervised, unsupervised, and reinforcement learning-based QML algorithms and included five case studies of recent works to show their applications in anomaly detection in the consumer electronics field.
Most existing 3D point cloud analysis approaches employ traditional supervised methods, which require large amounts of labeled data, and data annotation is labor-intensive, and costly. On the other hand, although many...
详细信息
ISBN:
(数字)9798350365474
ISBN:
(纸本)9798350365481
Most existing 3D point cloud analysis approaches employ traditional supervised methods, which require large amounts of labeled data, and data annotation is labor-intensive, and costly. On the other hand, although many existing works use either raw 3D point clouds or multiple 2D depth images, their joint use is relatively under-explored. To address these issues, we propose PointOfView, a novel, multi-modal few-shot 3D point cloud classification model, to classify never-before-seen classes with only a few annotated samples. A 2D multi-view learning branch is proposed for processing multiple projection images, and it contains two sub-branches to extract information at individual image level as well as among all six depth images. In addition, we propose a multi-scale 2D pooling layer, which employs various 2D max-pooling and 2D average pooling operations, with different pooling sizes. This allows fusing features at different scales. The second main branch processes raw 3D point clouds by first sorting them, and then using DGCNN to extract features. We perform within-dataset and cross-domain experiments on ModelNel40, ModelNet40-C and ScanobjectNN datasets, and compare with six state-of-the-art baselines. The results show that our approach outperforms all baselines in all experimental settings and achieve the state-of-the-art performance.
暂无评论