Discovering regularities between entities in temporal graphs is vital for many real-world applications(e.g.,social recommendation,emergency event detection,and cyberattack event detection).This paper proposes temporal...
详细信息
Discovering regularities between entities in temporal graphs is vital for many real-world applications(e.g.,social recommendation,emergency event detection,and cyberattack event detection).This paper proposes temporal graph association rules(TGARs)that extend traditional graph-pattern association rules in a static graph by incorporating the unique temporal information and *** introduce quality measures(e.g.,support,confidence,and diversification)to characterize meaningful TGARs that are useful and *** addition,the proposed support metric is an upper bound for alternative metrics,allowing us to guarantee a superset of *** extend conventional confidence measures in terms of maximal occurrences of *** diversification score strikes a balance between interestingness and *** the problem is NP-hard,we develop an effective discovery algorithm for TGARs that integrates TGARs generation and TGARs selection and shows that mining TGARs is feasible over a temporal *** propose pruning strategies to filter TGARs that have low support or cannot make top-k as early as ***,we design an auxiliary data structure to prune the TGARs that do not meet the constraints during the TGARs generation process to avoid conducting repeated subgraph matching for each extension in the search *** experimentally verify the effectiveness,efficiency,and scalability of our algorithms in discovering diversified top-k TGARs from temporal graphs in real-life applications.
With the increasing demand for high-quality 3D holographic reconstruction, visual clarity and accuracy remain significant challenges in various imaging applications. Current methods struggle for higher image resolutio...
详细信息
The advancement of terahertz (THz) communication technology drives the evolution of wireless communication systems,offering novel pathways and technical means for the development of future 6G communication *** wireles...
The advancement of terahertz (THz) communication technology drives the evolution of wireless communication systems,offering novel pathways and technical means for the development of future 6G communication *** wireless communication systems are often constrained by bandwidth limitations of electronic devices in high frequency ***,THz communication technology leverages the characteristics of electromagnetic waves to transcend these limitations,enabling communication athigher frequencies and wider bandwidths.
Due to our increasing dependence on infrastructure networks,the attack and defense game in these networks has draw great concerns from security ***,when it comes to evaluating the payoffs in practical attack and defen...
详细信息
Due to our increasing dependence on infrastructure networks,the attack and defense game in these networks has draw great concerns from security ***,when it comes to evaluating the payoffs in practical attack and defense games in infrastructure networks,the lack of consideration for the fuzziness and uncertainty of subjective human judgment brings forth significant challenges to the analysis of strategic interactions among decision *** paper employs intuitionistic fuzzy sets(IFSs)to depict such uncertain payoffs,and introduce a theoretical framework for analyzing the attack and defense game in infrastructure networks based on intuitionistic fuzzy *** take the changes in three complex network metrics as the universe of discourse,and intuitionistic fuzzy sets are employed based on this universe of discourse to reflect the satisfaction of decision *** employ an algorithm based on intuitionistic fuzzy theory to find the Nash equilibrium,and conduct experiments on both local and global *** show that:(1)the utilization of intuitionistic fuzzy sets to depict the payoffs of attack and defense games in infrastructure networks can reflect the unique characteristics of decision makers’subjective preferences.(2)the use of differently weighted proportions of the three complex network metrics has little impact on decision makers’choices of different strategies.
Poverty has always been a global concern that has restricted human *** first goal(SDG 1)of the United Nations Sustainable Development Goals(SDGs)is to eliminate all forms of poverty all over the *** establishment of a...
详细信息
Poverty has always been a global concern that has restricted human *** first goal(SDG 1)of the United Nations Sustainable Development Goals(SDGs)is to eliminate all forms of poverty all over the *** establishment of a scientific and effective localized SDG 1 evaluation and monitoring method is the key to achieving SDG *** paper proposes SDG 1 China district and county-level localization evaluation method based on multi-source remote sensing data for the United Nations Sustainable Development *** temporal and spatial distribution characteristics of China's poverty areas and their SDG 1 evaluation values in 2012,2014,2016,and 2018 have been *** on the SDGs global indicator framework,this paper first constructed SDG 1 China's district and county localization indicator system and then extracted multidimensional feature factors from nighttime light images,land cover data,and digital elevation model ***,we establish SDG 1 China's localized partial least squares estimation model and SDG 1 China's localized machine learning estimation ***,we analyze and verify the spatiotemporal distribution characteristics of China's poverty areas and counties and their SDG 1 evaluation *** results show that SDG 1 China's district and county localization indicator system proposed in this study and SDG 1 China's localized partial least squares estimation model can better reflect the poverty level of China's districts and *** estimated model R2 is 0.65,which can identify 72.77%of China's national poverty *** 2012 to 2018,the spatial distribution pattern of SDG evaluation values in China's districts and counties is that the SDG evaluation values gradually increase from western China to eastern *** addition,the average SDG 1 evaluation value of China's districts and counties increased by 23%from 2012 to *** paper is oriented to the United Nations SDGs frame-work,explores the SDG 1 localized evalu
In order to reduce the coupling between dense antenna arrays in multiple input multiple output (MIMO) systems, this paper proposes a method to reduce the coupling between microstrip antenna arrays by utilizing a defec...
详细信息
The increasingly stringent performance requirement in integrated circuit manufacturing, characterized by smaller feature sizes and higher productivity, necessitates the wafer stage executing a extreme motion with the ...
详细信息
The increasingly stringent performance requirement in integrated circuit manufacturing, characterized by smaller feature sizes and higher productivity, necessitates the wafer stage executing a extreme motion with the accuracy in terms of nanometers. This demanding requirement witnesses a widespread application of iterative learning control(ILC), given the repetitive nature of wafer scanning. ILC enables substantial performance improvement by using past measurement data in combination with the system model knowledge. However, challenges arise in cases where the data is contaminated by the stochastic noise, or when the system model exhibits significant uncertainties, constraining the achievable performance. In response to this issue, an extended state observer(ESO) based adaptive ILC approach is proposed in the frequency *** being model-based, it utilizes only a rough system model and then compensates for the resulting model uncertainties using an ESO, thereby achieving high robustness against uncertainties with minimal modeling effort. Additionally, an adaptive learning law is developed to mitigate the limited performance in the presence of stochastic noise, yielding high convergence accuracy yet without compromising convergence speed. Simulation and experimental comparisons with existing model-based and data-driven inversion-based ILC validate the effectiveness as well as the superiority of the proposed method.
This paper investigates a multiplayer reach-avoid differential game in 3-dimensional(3D)space,which involves multiple pursuers,multiple evaders,and a designated target *** evaders aim to reach the target region,while ...
详细信息
This paper investigates a multiplayer reach-avoid differential game in 3-dimensional(3D)space,which involves multiple pursuers,multiple evaders,and a designated target *** evaders aim to reach the target region,while the pursuers attempt to guard the target region by capturing the *** class of research holds significant practical ***,the complexity of the problem escalates substantially with the growing number of players,rendering its solution extremely *** this paper,the multiplayer game is divided into many subgames considering the cooperation among pursuers,reducing the computational burden,and obtaining numerically tractable strategies for ***,the Apollonius sphere,a fundamental geometric tool for analyzing the 3D differential game,is formulated,and its properties are *** on this,the optimal interception point for the pursuer to capture the evader is derived and the winning conditions for the pursuer and evader are ***,based on the Apollonius sphere,the optimal state feedback strategies of players are designed,and simultaneously,the optimal one-to-one pairings are ***,the Value function of the multiplayer reach-avoid differential game is explicitly given and is proved to satisfy Hamilton-Jacobi-Isaacs(HJI)***,the matching algorithm for the case with pursuers outnumbered evaders is provided through constructing a weighted bipartite graph,and the cooperative tactics for multiple pursuers are proposed,inspired by the Harris'Hawks intelligent cooperative hunting ***,numerical simulations are conducted to illustrate the effectiveness of the theoretical results for both cases where the number of adversary players is equal and unequal between the 2 groups.
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
Traffic classification is a crucial task for network *** of the most difficult challenges is to accurately identify the traffic of unknown applications as well as discriminate the known *** current learning-based clas...
详细信息
Traffic classification is a crucial task for network *** of the most difficult challenges is to accurately identify the traffic of unknown applications as well as discriminate the known *** current learning-based classifiers can achieve high classification accuracy for the known traffic[1,2],but are infeasible toclassifyeither the unknown/unseen/unlabeled application or zero-day application traffic[3],which is known as identification of unknown applications(IUA).Although the clustering-based methods can identify the unknown traffic,they need lots of human intervention to thefeaturechoice,hyperparameter configuration and known/unknown traffic division[4].
暂无评论