In the field of NLP, Large Language Models (LLMs) have recently achieved significant advancements, leading to the development of various benchmarks for their evaluation. Along-side NLP, Vision Language Models (VLMs) h...
详细信息
This paper proposes a novel method to diagnose sensory ataxia via an automated Romberg Test - the current de facto medical procedure used to diagnose this condition. It utilizes a convolutional neural network to predi...
详细信息
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on...
详细信息
ISBN:
(数字)9798331507862
ISBN:
(纸本)9798331507879
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on using distributed agents with data exchange among neighbors, which, however, increases network complexity and usage and still suffers from the lack of broader coordination. Meanwhile, the attention mechanism has achieved tremendous success, and advances in vehicle-to-infrastructure (V2I) communications have enabled real-time collections of granular data. However, integrating these technologies into traffic signal control remains under-explored. Therefore, we present GreenLight, a forward-thinking and eco-friendly traffic signal control framework that can be applied to V2I-equipped fog computing environments. For a large urban area, traffic signals are divided into clusters, each coordinated by a fog node with an RL agent. Intra-cluster indexed self-attention is applied to extract context-aware features that the fog-residing RL agent utilizes to determine the proper signal control command. Results of simulation experiments using both synthetic and real-world scenarios show that the presented framework yields lower waiting time, emissions, and fuel consumption compared to baseline methods, indicating its potential for next-generation transportation systems.
This innovative practice full paper describes a new software framework based on JU nit to test student work. Automated testing is an important capability when teaching software development at the college level. Ideall...
详细信息
ISBN:
(数字)9798350351507
ISBN:
(纸本)9798350363067
This innovative practice full paper describes a new software framework based on JU nit to test student work. Automated testing is an important capability when teaching software development at the college level. Ideally, a testing system will allow the instructor to efficiently create a thorough set of tests. Also, the software should facilitate grading tasks and produce informative reports that can be distributed to the students in a timely fashion. For Java development, the well-known JUnit framework enables a test suite to be applied to a student's submission. The mutools library presented here extends the JUnit framework in novel ways to accelerate the instructor's task of creating test suites. This new framework allows the instructor to augment tests with directives to control scoring and reporting. The four main capabilities of the software include: 1) An assert statement that does not terminate the test when it has failed. Instead, statistics are maintained regarding the success or failure of each assert statement. 2) Tests that can be configured to award partial credit. This can be useful in situations where the instructor deems it appropriate to award students some credit even in the presence of incorrect asserts. 3) Tests that can be grouped into categories that match a particular rubric item. Java annotations are placed on the test suite to define these categories. For example, @TestCategory(name= “remove”, points=10.0) specifies that 10 points will be awarded for successful implementation of all tests related to removing an item from the collection class. 4) Testing reports that contain varying levels of information. With minimal details, the testing report shows each testing category with the following information: assert statistics, whether the test timed out or had abnormal termination. This software has been used for many semesters and has been found to increase the speed at which the instructor can develop test suites for grading. The framework is av
The success of any organization depends on the quality of the decisions made, and good decisions can be made by analyzing all the available data and knowledge of the organization. Decision Support Systems (DSSs) are u...
详细信息
The Covid-19 pandemic has prompted governments worldwide to implement various non-pharmaceutical interventions (NPIs) in an effort to curb the pandemic to attenuate the harmness of the pandemic. However, there is a de...
详细信息
As urban traffic becomes increasingly complex, conventional actuated traffic signal control methods are showing their limitations in mitigating congestion, and Deep Reinforcement Learning (DRL) is considered a promisi...
详细信息
ISBN:
(数字)9798350370065
ISBN:
(纸本)9798350370072
As urban traffic becomes increasingly complex, conventional actuated traffic signal control methods are showing their limitations in mitigating congestion, and Deep Reinforcement Learning (DRL) is considered a promising solution. Existing studies mainly focus on using distributed agents, each intersection being controlled by a separate agent that can communicate with its neighbors to facilitate local coordination, which subsequently increases network complexity and usage. This article presents a DRL-based intelligent traffic signal control framework that leverages the fog computing paradigm. Traffic signals are divided into clusters, each controlled by a shared DRL agent in a fog node based on the collective information of the regional traffic situation. We have conducted simulation experiments in multiple scenarios, and the experimental results show that the proposed method yields lower average waiting times compared to existing methods.
We propose an unsupervised insider threat detection system that learns normal user behaviors through audit data using neural networks equipped with multi-head self-attention mechanisms. The attention mechanisms learn ...
详细信息
ISBN:
(数字)9798350354775
ISBN:
(纸本)9798350354782
We propose an unsupervised insider threat detection system that learns normal user behaviors through audit data using neural networks equipped with multi-head self-attention mechanisms. The attention mechanisms learn precise normal user behaviors using large event windows. The key idea is to consider a sequence abnormal when it exhibits some events that are not likely to happen given the preceding events sequence. In addition, our method provides insights into detected threats through an event-based scoring system to facilitate threat understanding by security experts. Furthermore, the proposed solution does not require intensive audit logs pre-processing, such as manual domain knowledge-rich features extraction and data balancing. Thus, the proposed approach is easy to implement and use across organizations regardless of their expertise level. The proposed solution also provides the ability to detect threats in real-time. On the benchmark dataset CERT version 4.2, our solution, combined with hyperparameter search by Bayesian optimization, outperforms the previous state-of-the-art approaches with an area under the ROC curve of 97.23%, a recall of 91.51%, an accuracy of 93.13% and a false positive rate of 6.8%.
In this paper, we identify the influencing factors of API usability by extending a comprehensive framework for measuring API usability we proposed earlier, through a systematic examination of entities involved and art...
详细信息
暂无评论