The power sector is an important factor in ensuring the development of the national *** simulation and prediction of power consumption help achieve the balance between power generation and power *** this paper,a Multi...
详细信息
The power sector is an important factor in ensuring the development of the national *** simulation and prediction of power consumption help achieve the balance between power generation and power *** this paper,a Multi-strategy Hybrid Coati Optimizer(MCOA)is used to optimize the parameters of the three-parameter combinatorial optimization model TDGM(1,1,r,ξ,Csz)to realize the simulation and prediction of China's daily electricity ***,a novel MCOA is proposed in this paper,by making the following improvements to the Coati Optimization Algorithm(COA):(ⅰ)Introduce improved circle chaotic mapping strategy.(ⅱ)Fusing Aquila Optimizer,to enhance MCOA's exploration capabilities.(ⅲ)Adopt an adaptive optimal neighborhood jitter learning *** improve MCOA escape from local optimal solutions.(ⅳ)Incorporating Differential Evolution to enhance the diversity of the ***,the superiority of the MCOA algorithm is verified by comparing it with the newly proposed algorithm,the improved optimiza-tion algorithm,and the hybrid algorithm on the CEC2019 and CEC2020 test ***,in this paper,MCOA is used to optimize the parameters of TDGM(1,1,r,ξ,Csz),and this model is applied to forecast the daily electricity consumption in China and compared with the predictions of 14 models,including seven intelligent algorithm-optimized TDGM(1,1,r,ξ,Csz),and seven forecasting *** experimental results show that the error of the proposed method is minimized,which verifies the validity of the proposed method.
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref...
详细信息
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a *** this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the *** the other hand,a decoder was used to reproduce the original image back after the vector was received and *** convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and *** hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding *** this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in *** first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification *** second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 *** third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can...
详细信息
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can potentially address these problems by allowing systems trained on labelled datasets from the source domain(including less expensive synthetic domain)to be adapted to a novel target *** conventional approach involves automatic extraction and alignment of the representations of source and target domains *** limitation of this approach is that it tends to neglect the differences between classes:representations of certain classes can be more easily extracted and aligned between the source and target domains than others,limiting the adaptation over all ***,we address:this problem by introducing a Class-Conditional Domain Adaptation(CCDA)*** incorporates a class-conditional multi-scale discriminator and class-conditional losses for both segmentation and ***,they measure the segmentation,shift the domain in a classconditional manner,and equalize the loss over *** results demonstrate that the performance of our CCDA method matches,and in some cases,surpasses that of state-of-the-art methods.
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with ...
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with bounded time-varying *** the first step,the system state is attenuated from V (t0) to γV (t0) using the generalized Halanay inequality,where0<γ 1 is a free *** the second step,by applying existing finite-time stability theorems,the system state further decays from γV (t0) to *** on the above ideas,two novel finite-time stability lemmas for the error system are presented,and the convergence rate as well as the settling time is ***,the value of γ that results in the shortest settling time for the error system is also *** the help of the derived lemmas,several sufficient algebraic criteria are established to achieve finite-time synchronization between the considered delayed neural *** results of this paper not only improve the existing two-step control method but also overcome the limitations of certain one-step finite-time control ***,the validity and practical applicability of the obtained theoretical results are demonstrated through two numerical examples and an image protection experiment.
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
In the context of Intelligent Transportation Systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the Wo...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the World Health Organization (WHO), approximately 1.35 million people are involved in road traffic crashes resulting in loss of life or physical disability. WHO attributes events like over-speeding, drunken driving, distracted driving, dilapidated road infrastructure and unsafe practices such as non-use of helmets and seatbelts to road traffic accidents. As these driving events negatively affect driving quality and enhance the risk of a vehicle crash, they are termed as negative driving attributes. Methods: A multi-level hierarchical fuzzy rules-based computational model has been designed to capture risky driving by a driver as a driving risk index. Data from the onboard telematics device and vehicle controller area network is used for capturing the required information in a naturalistic way during actual driving conditions. Fuzzy rules-based aggregation and inference mechanisms have been designed to alert about the possibility of a crash due to the onset of risky driving. Results: On-board telematics data of 3213 sub-trips of 19 drivers has been utilized to learn long term risky driving attributes. Furthermore, the current trip assessment of these drivers demonstrates the efficacy of the proposed model in correctly modeling the driving risk index of all of them, including 7 drivers who were involved in a crash after the monitored trip. Conclusion: In this work, risky driving behavior has been associated not just with rash driving but also other contextual data like driver’s long-term risk aptitude and environmental context such as type of roads, traffic volume and weather conditions. Trip-wise risky driving behavior of six out of seven drivers, who had met with a crash during that trip, was correctly predicted during evaluation. Similarly, for the other 12
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in...
详细信息
Infrared thermography as a non-destructive testing method provides radiometric records of surface temperature distribution in the form of an image. During thermographic measurements, emissivity coefficient should be (...
详细信息
暂无评论