Risk prediction is an important task to ensuring the driving safety of railway trams. Although data-driven intelligent methods are proved to be effective for driving risk prediction, accuracy is still a top concern fo...
详细信息
Risk prediction is an important task to ensuring the driving safety of railway trams. Although data-driven intelligent methods are proved to be effective for driving risk prediction, accuracy is still a top concern for the challenges of data quality which mainly represent as the unbalanced datasets. This study focuses on applying feature extraction and data augmentation methods to achieve effective risk prediction for railway trams, and proposes an approach based on a self-adaptive K-means clustering algorithm and the least squares deep convolution generative adversarial network(LS-DCGAN). The data preprocessing methods are proposed, which include the K-means algorithm to cluster the locations of trams and the extreme gradient boosting recursive feature elimination based feature selection algorithm to retain the key features. The LS-DCGAN model is designed for sparse sample expansion, aiming to address the sample category distribution imbalance problem. The experiments implemented with the public and real datasets show that the proposed approach can reach a high accuracy of 90.69%,which can greatly enhances the tram driving safety.
As urban populations grow, smart home technology has become a key enabler for enhancing energy efficiency, comfort, and convenience in residential environments. However, existing smart home implementations often strug...
详细信息
The evolution of the electrical grid from its early centralized structure to today’s advanced "smart grid" reflects significant technological progress. Early grids, designed for simple power delivery from l...
详细信息
The evolution of the electrical grid from its early centralized structure to today’s advanced "smart grid" reflects significant technological progress. Early grids, designed for simple power delivery from large plants to consumers, faced challenges in efficiency, reliability, and scalability. Over time, the grid has transformed into a decentralized network driven by innovative technologies, particularly artificial intelligence (AI). AI has become instrumental in enhancing efficiency, security, and resilience by enabling real-time data analysis, predictive maintenance, demand-response optimization, and automated fault detection, thereby improving overall operational efficiency. This paper examines the evolution of the electrical grid, tracing its transition from early limitations to the methodologies adopted in present smart grids for addressing those challenges. Current smart grids leverage AI to optimize energy management, predict faults, and seamlessly integrate electric vehicles (EVs), reducing transmission losses and improving performance. However, these advancements are not without limitations. Present grids remain vulnerable to cyberattacks, necessitating the adoption of more robust methodologies and advanced technologies for future grids. Looking forward, emerging technologies such as Digital Twin (DT) models, the Internet of Energy (IoE), and decentralized grid management are set to redefine grid architectures. These advanced technologies enable real-time simulations, adaptive control, and enhanced human–machine collaboration, supporting dynamic energy distribution and proactive risk management. Integrating AI with advanced energy storage, renewable resources, and adaptive access control mechanisms will ensure future grids are resilient, sustainable, and responsive to growing energy demands. This study emphasizes AI’s transformative role in addressing the challenges of the early grid, enhancing the capabilities of the present smart grid, and shaping a secure
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and gener...
详细信息
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and generalization to real rain *** this paper,we propose a deep residual channel attention network(DeRCAN)for *** channel attention mechanism is able to capture the inherent properties of the feature space and thus facilitates more accurate estimations of structures and details for image *** addition,we further propose an unsupervised learning approach to better solve real rain images based on the proposed *** qualitative and quantitative evaluation results on both synthetic and real-world images demonstrate that the proposed DeRCAN performs favorably against state-of-the-art methods.
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache...
详细信息
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image ***,the multistage generation strategy results in complex T2I ***,this study proposes a novel feature-grounded single-stage T2I model,which considers the“real”distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation *** results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models,showing the improved similarities among the generated image,text,and ground truth.
Machine learning (ML) with data analysis has many successful applications and is widely employed daily. Additionally, they have played a significant role in combating the global coronavirus (COVID-19) outbreak. Intern...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs...
详细信息
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs),although their geometries and light configurations may be *** allfrequency BRDFs in real time remains challenging due to the complex light *** approaches,including precomputed radiance transfer,light probes,and the most recent path-tracing-based approaches(ReSTIR PT),cannot satisfy both quality and performance requirements ***,we propose a practical hybrid global illumination approach that combines ray tracing and cached GI by caching the incoming radiance with *** approach can produce results close to those of ofline renderers at the cost of only approximately 17 ms at runtime and is robust over all-frequency *** approach is designed for applications involving static lighting and geometries,such as virtual exhibitions.
Traditional autonomous driving usually requires a large number of vehicles to upload data to a central server for training. However, collecting data from vehicles may violate personal privacy as road environmental inf...
详细信息
暂无评论