On-site lithium-ion batteries’ state-of-health (SoH) estimation is of crucial importance for reliable operations of electric vehicles (EVs). Yet, due to the low quality of unlabeled real-time field data, diverse oper...
详细信息
Dear editor,This letter presents an unsupervised feature selection method based on machine *** selection is an important component of artificial intelligence,machine learning,which can effectively solve the curse of d...
详细信息
Dear editor,This letter presents an unsupervised feature selection method based on machine *** selection is an important component of artificial intelligence,machine learning,which can effectively solve the curse of dimensionality *** most of the labeled data is expensive to obtain.
Genealogical knowledge graphs depict the relationships of family networks and the development of family histories. They can help researchers to analyze and understand genealogical data, search for genealogical descend...
详细信息
Micro Expression (ME) is the subtle facial expressions that people show when they express their inner feelings. To address the problem that micro-expression recognition is difficult and less accurate due to the small ...
详细信息
We study the Nadaraya-Watson estimators for the drift function of two-sided reflected stochastic differential *** estimates,based on either the continuously observed process or the discretely observed process,are *** ...
详细信息
We study the Nadaraya-Watson estimators for the drift function of two-sided reflected stochastic differential *** estimates,based on either the continuously observed process or the discretely observed process,are *** certain conditions,we prove the strong consistency and the asymptotic normality of the two *** method is also suitable for one-sided reflected stochastic differential *** results demonstrate that the performance of our estimator is superior to that of the estimator proposed by Cholaquidis et al.(Stat Sin,2021,31:29-51).Several real data sets of the currency exchange rate are used to illustrate our proposed methodology.
User profiling by inferring user personality traits,such as age and gender,plays an increasingly important role in many real-world *** existing methods for user profiling either use only one type of data or ignore han...
详细信息
User profiling by inferring user personality traits,such as age and gender,plays an increasingly important role in many real-world *** existing methods for user profiling either use only one type of data or ignore handling the noisy information of ***,they usually consider this problem from only one *** this paper,we propose a joint user profiling model with hierarchical attention networks(JUHA)to learn informative user representations for user *** JUHA method does user profiling based on both inner-user and inter-user *** explore inner-user features from user behaviors(e.g.,purchased items and posted blogs),and inter-user features from a user-user graph(where similar users could be connected to each other).JUHA learns basic sentence and bag representations from multiple separate sources of data(user behaviors)as the first round of data *** this module,convolutional neural networks(CNNs)are introduced to capture word and sentence features of age and gender while the self-attention mechanism is exploited to weaken the noisy *** this,we build another bag which contains a user-user ***-user features are learned from this bag using propagation information between linked users in the *** acquire more robust data,inter-user features and other inner-user bag representations are joined into each sentence in the current bag to learn the final bag ***,all of the bag representations are integrated to lean comprehensive user representation by the self-attention *** experimental results demonstrate that our approach outperforms several state-of-the-art methods and improves prediction performance.
Multiparty dialogue question answering (QA) within machine reading comprehension (MRC) presents significant challenges due to the complex interplay of information across multiple speakers and the need for advanced log...
详细信息
Antenna Group Delay Variation(AGDV)is a hardware error source that affects the performance of Dual-Frequency Multi-Constellation(DFMC)Ground-based Augmentation System(GBAS),and these errors are difficult to distinguis...
详细信息
Antenna Group Delay Variation(AGDV)is a hardware error source that affects the performance of Dual-Frequency Multi-Constellation(DFMC)Ground-based Augmentation System(GBAS),and these errors are difficult to distinguish from multipath ***,AGDV is usually modeled as a part of the multipath error,which is called the multipath-AGDV ***,because of the inconsistency of AGDV and multipath when switching among different positioning modes of GBAS,and because the traditional model does not consider the impact of the azimuth on AGDV,using the traditional multipath-AGDV model will cause the protection levels to be inaccurately *** this paper,azimuth-based modeling of AGDV is conducted by using anechoic chamber *** biases and standard deviations of AGDV based on azimuths are analyzed and modeled,and the calculation method for the DFMC GBAS protection level is *** results show that the azimuth-based AGDV model and protection level optimization algorithm can better avoid the error exceeding the protection level than the multipath-AGDV *** with AGDV elevation model,the VPLs of the B1C signal are increased by 0.24 m and 0.06 m,and the VPLs of the B2a signal are reduced by 0.01 m and 0.16 m using the 100 s and 600 s DFree filtering positioning modes,*** changes in the B1C and B2a protection levels reflect the changes in AGDV corresponding to the azimuth for the respective frequencies,further ensuring the integrity of airborne users,especially when they turn near the airport.
Learning causal structures from observational data is critical for causal discovery and many machine learning tasks. Traditional constraint-based methods first adopt conditional independence (CI) tests to learn a glob...
详细信息
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl...
详细信息
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highly challenging problem. Although current research has addressed the issue of identity disclosure, there are still two challenges: First, the privacy protection for large-scale datasets is not yet comprehensive; Second, it is difficult to simultaneously protect the privacy of nodes, edges, and attributes in social networks. To address these issues, this paper proposes a(k,t)-graph anonymity algorithm based on enhanced clustering. The algorithm uses k-means++ clustering for k-anonymity and t-closeness to improve k-anonymity. We evaluate the privacy and efficiency of this method on two datasets and achieved good results. This research is of great significance for addressing the problem of privacy breaches that may arise from the publication of graph data.
暂无评论