An important area of attention is energy efficiency since artificial intelligence (AI) algorithms may control power use by identifying occupant habits and modifying systems accordingly. This not only lessens the impac...
详细信息
Communities often represent key structural and functional clusters in networks. To preserve such communities, it is important to understand their robustness under network perturbations. Previous work in community robu...
详细信息
Communities often represent key structural and functional clusters in networks. To preserve such communities, it is important to understand their robustness under network perturbations. Previous work in community robustness analysis has focused on studying changes in the community structure as a response of edge rewiring and node or edge removal. However, the impact of increasing connectivity on the robustness of communities in networked systems is relatively unexplored. Studying the limits of community robustness under edge addition is crucial to better understanding the cases in which density expands or false edges erroneously appear. In this paper, we analyze the effect of edge addition on community robustness in synthetic and empirical temporal networks. We study two scenarios of edge addition: random and targeted. We use four community detection algorithms, Infomap, Label Propagation, Leiden, and Louvain, and demonstrate the results in community similarity metrics. The experiments on synthetic networks show that communities are more robust when the initial partition is stronger or the edge addition is random, and the experiments on empirical data also indicate that robustness performance can be affected by the community similarity metric. Overall, our results suggest that the communities identified by the different types of community detection algorithms exhibit different levels of robustness, and so the robustness of communities depends strongly on the choice of detection method.
The success and advancement of machine learning (ML) in fields such as image recognition and natural language processing has lead to the development of novel methods for the solution of problems in physics and enginee...
详细信息
Traditional techniques for detecting threats in mobile edge networks are limited in their ability to adapt to evolving threats. We propose an intelligent reinforcement learning (RL)–based method for real-time threat ...
详细信息
This paper investigates stationary mean-field games (MFGs) on the torus with Lipschitz non-homogeneous diffusion and logarithmic-like couplings. The primary objective is to understand the existence of $$C^{1,\alpha }$...
This paper investigates stationary mean-field games (MFGs) on the torus with Lipschitz non-homogeneous diffusion and logarithmic-like couplings. The primary objective is to understand the existence of $$C^{1,\alpha }$$ solutions to address the research gap between low-regularity results for bounded and measurable diffusions and the smooth results modeled by the Laplacian. We use the Hopf-Cole transformation to convert the MFG system into a scalar elliptic equation. Then, we apply Morrey space methods to establish the existence and regularity of solutions. The introduction of Morrey space methods offers a novel approach to address regularity issues in the context of MFGs.
Chronic kidney disease (CKD) represents a significant global health challenge in society, and early detection of risk is essential for on-time treatment and intervention. This research suggests a novel machine-learnin...
详细信息
This paper investigates the tracking technology of moving objects from a UAV camera (or streaming video) for systems with limited computational resources, such as modern SBCs. A detector-tracker architecture is propos...
详细信息
ISBN:
(数字)9798331534141
ISBN:
(纸本)9798331534158
This paper investigates the tracking technology of moving objects from a UAV camera (or streaming video) for systems with limited computational resources, such as modern SBCs. A detector-tracker architecture is proposed, combining the advantages of object detection methods and tracking algorithms. A comparative analysis of the performance and accuracy of various detector and tracker combinations on modern SBCs is conducted. The results demonstrate the high efficiency of the proposed approach for object-tracking tasks under limited computational resources, which has practical significance for UAV-based systems.
Blockchain and smart contracts have become one of the most popular technologies to establish decentralized applications. Due to public visibility of data stored in blockchain, the information processed by a smart cont...
详细信息
This article presents a new approach to detecting anomalies in data obtained from unmanned aerial vehicles using spline models. The relevance of the study is driven by the need for fast and accurate identification of ...
详细信息
ISBN:
(数字)9798331534141
ISBN:
(纸本)9798331534158
This article presents a new approach to detecting anomalies in data obtained from unmanned aerial vehicles using spline models. The relevance of the study is driven by the need for fast and accurate identification of anomalies in real time, which is critical for military intelligence and civilian monitoring. The proposed model is based on the use of momentary characteristics, such as average illumination intensity and standard deviation, which allows for effective data parameterization and detection of anomalous observations. The advantage of the spline model is its ability to adapt to complex and heterogeneous image textures, which significantly reduces the risk of missing critical anomalies. The model also demonstrates high robustness to variations in the data, making it a reliable tool for analyzing images in different lighting and landscape conditions. Experiments using forest, road, and car textures have shown that the spline model is able to accurately identify anomalies, which increases the efficiency of analysis and allows for a quick response to detected changes.
The field of nursing is no stranger to the use of simulation and training systems for education and skill acquisition. Virtual reality (VR) has been utilized as an immersive learning environment (ILV) for many years a...
详细信息
暂无评论