For intelligent control of network traffic, to solve the problem of low utilization of public network bandwidth, we put forward scheduling data flow between data center based on SDN technology. First, we connect the d...
详细信息
A graph is considered wheel-free if the neighborhood of any vertex is acyclic. The extremal problems associated with wheel-free graphs have a long-standing history of research. In 1983, Gallai and Zelinka independentl...
详细信息
Leakage detection in water distribution networks (WDNs) is critical for reducing water loss and ensuring operational efficiency. While machine learning methods are often applied, they can lack interpretability. Takagi...
详细信息
ISBN:
(数字)9798331508258
ISBN:
(纸本)9798331508265
Leakage detection in water distribution networks (WDNs) is critical for reducing water loss and ensuring operational efficiency. While machine learning methods are often applied, they can lack interpretability. Takagi-Sugeno (Tsk) fuzzy systems offer a balance between accuracy and interpretability but are prone to overfitting and incur high computational costs, especially with large datasets. To address these issues, we explore various optimization and regularization techniques to improve Tsk performance. The models were trained on a large-scale benchmark dataset containing 1000 leak scenarios, each a year-long time series at half-hour intervals, totaling over 17 million data points. A systematic preprocessing pipeline was applied, including time-series segmentation, mutual information-based feature selection, and class imbalance handling. Alongside the baseline training of Adaptive Neuro-Fuzzy Inference Systems (ANFIS) using gradient descent (GD), we also trained Tsk models using stochastic gradient descent (SGD) and mini-batch gradient descent (MBGD). State-of-the-art regularization techniques such as uniform regularization and rule dropout were also incorporated to prevent overfitting. Key results show that SGD and MBGD models outperformed GD models in leak detection rates and achieved significantly lower false alarm rates than traditional machine learning models. These findings underscore the potential of fuzzy systems for effective leak detection, provided that appropriate learning and regularization techniques are employed.
As an important financial investment commodity, the price fluctuations of gold significantly impact the global economy and the stability of the financial market. Therefore, it is of great significance to accurately pr...
详细信息
Wentworth Institute of technology is a baccalaureate degree granting institution and in recent years we have also developed several Master's programs. Our department offers several degrees leading to a Bachelor of...
Wentworth Institute of technology is a baccalaureate degree granting institution and in recent years we have also developed several Master's programs. Our department offers several degrees leading to a Bachelor of science in Computer science, Computer Networking, Information technology, Cybersecurity, and datascience. All our programs are designed to be hands-on and expose students to a wide skill set. All our majors need to take several security-related courses. One of the latest security related courses we developed is in Quantum Computing with a focus on security. Quantum Computing is a groundbreaking technology that exploits the laws and properties of quantum mechanics. It can dramatically speed up computations of certain problems and surpass the computation power of modern supercomputers. One notable quantum algorithm we cover in our newly developed course is Grover's algorithm. It is used to search an unstructured database while providing quadratic speedup, compared to its classical counterpart. While demonstrating Grover's algorithm in the classroom, the students raise many questions and explaining all the details of the algorithm is challenging. In this paper, we explain and illustrate the theoretical and implementational challenges and provide examples and solutions.
Dynamic interval multi-objective optimization problems, such as those encountered in wireless sensor network scheduling and portfolio selection, are increasingly prevalent. However, they present significant challenges...
详细信息
In the realm of visual tasks, the estimation of orientation plays a pivotal role yet often remains an understudied aspect in the gamut of image analysis research. This paper endeavors to address this deficiency by con...
详细信息
In the realm of visual tasks, the estimation of orientation plays a pivotal role yet often remains an understudied aspect in the gamut of image analysis research. This paper endeavors to address this deficiency by conducting a comprehensive review of methods for orientation estimation within 2D imaging contexts. We aim to provide researchers with an exhaustive overview and detailed analysis of the techniques utilized for orientation estimation, thereby enhancing their understanding of this complex field. We introduce an organized classification of orientation estimation methods, segmented into approaches based on classification algorithms and those based on regression models. This classification not only sheds light on the distinct methodologies but also scrutinizes their underlying assumptions, practical applications. Additionally, the study identifies and underscores emerging research opportunities that hold the potential to enrich the discourse and technical advancements in orientation estimation, thereby encouraging deeper academic investigation and technological development.
Class-incremental learning poses a significant challenge under an exemplar-free constraint, leading to catastrophic forgetting and sub-par incremental accuracy. Previous attempts have focused primarily on single-modal...
详细信息
When uploading multimedia data such as photos or videos on network, they might be covered with mosaic blocks since some private information is not suitable for exposing. In some situation, mosaic images or video frame...
When uploading multimedia data such as photos or videos on network, they might be covered with mosaic blocks since some private information is not suitable for exposing. In some situation, mosaic images or video frames need to be restored or trimmed from them, it is necessary to detect the mosaic so as to discriminate these data for subsequent processing. Up to now, most mosaic detection methods are based on edge detection. However, mosaic regions with similar colors may cause several similar mosaic blocks to be stacked together, which makes it difficult to extract sufficient edge features, and lead to hardly detecting the subsequent mosaic region. In this paper, a line expansion- based mosaic detection method is proposed. First, find the upper left point of a block, expand downward to obtain a vertical line. Second, expand to the right based on vertical line to get the whole rectangular block. Third, repeat above steps until the entire mosaic region is extracted, ignoring the regions that have been marked during extraction. The proposed method is compared with several representative methods under different sizes and stacked mosaic. The experimental results show that the proposed method outperforms the state-of-the-art methods on stacked mosaic.
In Medical question-answering (QA) tasks, the need for effective systems is pivotal in delivering accurate responses to intricate medical queries. However, existing approaches often struggle to grasp the intricate log...
暂无评论