115 results
Search Results
2. Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A Survey.
- Author
-
Cholevas, Christos, Angeli, Eftychia, Sereti, Zacharoula, Mavrikos, Emmanouil, and Tsekouras, George E.
- Subjects
- *
DATA structures , *MACHINE learning , *PRIVATE networks , *BLOCKCHAINS , *ALGORITHMS - Abstract
In decentralized systems, the quest for heightened security and integrity within blockchain networks becomes an issue. This survey investigates anomaly detection techniques in blockchain ecosystems through the lens of unsupervised learning, delving into the intricacies and going through the complex tapestry of abnormal behaviors by examining avant-garde algorithms to discern deviations from normal patterns. By seamlessly blending technological acumen with a discerning gaze, this survey offers a perspective on the symbiotic relationship between unsupervised learning and anomaly detection by reviewing this problem with a categorization of algorithms that are applied to a variety of problems in this field. We propose that the use of unsupervised algorithms in blockchain anomaly detection should be viewed not only as an implementation procedure but also as an integration procedure, where the merits of these algorithms can effectively be combined in ways determined by the problem at hand. In that sense, the main contribution of this paper is a thorough study of the interplay between various unsupervised learning algorithms and how this can be used in facing malicious activities and behaviors within public and private blockchain networks. The result is the definition of three categories, the characteristics of which are recognized in terms of the way the respective integration takes place. When implementing unsupervised learning, the structure of the data plays a pivotal role. Therefore, this paper also provides an in-depth presentation of the data structures commonly used in unsupervised learning-based blockchain anomaly detection. The above analysis is encircled by a presentation of the typical anomalies that have occurred so far along with a description of the general machine learning frameworks developed to deal with them. Finally, the paper spotlights challenges and directions that can serve as a comprehensive compendium for future research efforts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. The Algorithm of Gu and Eisenstat and D-Optimal Design of Experiments.
- Author
-
Forbes, Alistair
- Subjects
- *
OPTIMAL designs (Statistics) , *EXPERIMENTAL design , *FACTORIZATION , *ALGORITHMS - Abstract
This paper addresses the following problem: given m potential observations to determine n parameters, m > n , what is the best choice of n observations. The problem can be formulated as finding the n × n submatrix of the complete m × n observation matrix that has maximum determinant. An algorithm by Gu and Eisenstat for a determining a strongly rank-revealing QR factorisation of a matrix can be adapted to address this latter formulation. The algorithm starts with an initial selection of n rows of the observation matrix and then performs a sequence of row interchanges, with the determinant of the current submatrix strictly increasing at each step until no further improvement can be made. The algorithm implements rank-one updating strategies, which leads to a compact and efficient algorithm. The algorithm does not necessarily determine the global optimum but provides a practical approach to designing an effective measurement strategy. In this paper, we describe how the Gu–Eisenstat algorithm can be adapted to address the problem of optimal experimental design and used with the QR algorithm with column pivoting to provide effective designs. We also describe implementations of sequential algorithms to add further measurements that optimise the information gain at each step. We illustrate performance on several metrology examples. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Efficient Algorithm for Proportional Lumpability and Its Application to Selfish Mining in Public Blockchains.
- Author
-
Piazza, Carla, Rossi, Sabina, and Smuseva, Daria
- Subjects
- *
POLYNOMIAL time algorithms , *MARKOV processes , *BLOCKCHAINS , *ALGORITHMS , *STOCHASTIC models , *PETRI nets - Abstract
This paper explores the concept of proportional lumpability as an extension of the original definition of lumpability, addressing the challenges posed by the state space explosion problem in computing performance indices for large stochastic models. Lumpability traditionally relies on state aggregation techniques and is applicable to Markov chains demonstrating structural regularity. Proportional lumpability extends this idea, proposing that the transition rates of a Markov chain can be modified by certain factors, resulting in a lumpable new Markov chain. This concept facilitates the derivation of precise performance indices for the original process. This paper establishes the well-defined nature of the problem of computing the coarsest proportional lumpability that refines a given initial partition, ensuring a unique solution exists. Additionally, a polynomial time algorithm is introduced to solve this problem, offering valuable insights into both the concept of proportional lumpability and the broader realm of partition refinement techniques. The effectiveness of proportional lumpability is demonstrated through a case study that consists of designing a model to investigate selfish mining behaviors on public blockchains. This research contributes to a better understanding of efficient approaches for handling large stochastic models and highlights the practical applicability of proportional lumpability in deriving exact performance indices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Hardware Model Checking Algorithms and Techniques.
- Author
-
Cabodi, Gianpiero, Camurati, Paolo Enrico, Palena, Marco, and Pasini, Paolo
- Subjects
- *
APRIORI algorithm , *ALGORITHMS , *BOOLEAN functions , *MANUFACTURING industries , *HARDWARE - Abstract
Digital systems are nowadays ubiquitous and often comprise an extremely high level of complexity. Guaranteeing the correct behavior of such systems has become an ever more pressing need for manufacturers. The correctness of digital systems can be addressed resorting to formal verification techniques, such as model checking. Currently, it is usually impossible to determine a priori the best algorithm to use given a verification task and, thus, portfolio approaches have become the de facto standard in model checking verification suites. This paper describes the most relevant algorithms and techniques, at the foundations of bit-level SAT-based model checking itself. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Multiobjective Path Problems and Algorithms in Telecommunication Network Design—Overview and Trends.
- Author
-
Craveirinha, José, Clímaco, João, Girão-Silva, Rita, and Pascoal, Marta
- Subjects
- *
TELECOMMUNICATION systems , *ALGORITHMS , *QUALITY of service - Abstract
A major area of application of multiobjective path problems and resolution algorithms is telecommunication network routing design, taking into account the extremely rapid technological and service evolutions. The need for explicit consideration of heterogeneous Quality of Service metrics makes it advantageous for the development of routing models where various technical–economic aspects, often conflicting, should be tackled. Our work is focused on multiobjective path problem formulations and resolution methods and their applications to routing methods. We review basic concepts and present main formulations of multiobjective path problems, considering different types of objective functions. We outline the different types of resolution methods for these problems, including a classification and overview of relevant algorithms concerning different types of problems. Afterwards, we outline background concepts on routing models and present an overview of selected papers considered as representative of different types of applications of multiobjective path problem formulations and algorithms. A broad characterization of major types of path problems relevant in this context is shown regarding the overview of contributions in different technological and architectural network environments. Finally, we outline research trends in this area, in relation to recent technological evolutions in communication networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. The Knapsack Problem with Conflict Pair Constraints on Bipartite Graphs and Extensions.
- Author
-
Punnen, Abraham P. and Dhahan, Jasdeep
- Subjects
- *
KNAPSACK problems , *BIPARTITE graphs , *INTEGER programming , *COMBINATORIAL optimization , *ALGORITHMS - Abstract
In this paper, we study the knapsack problem with conflict pair constraints. After a thorough literature survey on the topic, our study focuses on the special case of bipartite conflict graphs. For complete bipartite (multipartite) conflict graphs, the problem is shown to be NP-hard but solvable in pseudo-polynomial time, and it admits an FPTAS. Extensions of these results to more general classes of graphs are also presented. Further, a class of integer programming models for the general knapsack problem with conflict pair constraints is presented, which generalizes and unifies the existing formulations. The strength of the LP relaxations of these formulations is analyzed, and we discuss different ways to tighten them. Experimental comparisons of these models are also presented to assess their relative strengths. This analysis disclosed various strong and weak points of different formulations of the problem and their relationships to different types of problem data. This information can be used in designing special purpose algorithms for KPCC involving a learning component. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. An Integer-Fractional Gradient Algorithm for Back Propagation Neural Networks.
- Author
-
Zhang, Yiqun, Xu, Honglei, Li, Yang, Lin, Gang, Zhang, Liyuan, Tao, Chaoyang, and Wu, Yonghong
- Subjects
- *
BACK propagation , *OPTIMIZATION algorithms , *ALGORITHMS , *LONG-term memory , *HUMAN fingerprints - Abstract
This paper proposes a new optimization algorithm for backpropagation (BP) neural networks by fusing integer-order differentiation and fractional-order differentiation, while fractional-order differentiation has significant advantages in describing complex phenomena with long-term memory effects and nonlocality, its application in neural networks is often limited by a lack of physical interpretability and inconsistencies with traditional models. To address these challenges, we propose a mixed integer-fractional (MIF) gradient descent algorithm for the training of neural networks. Furthermore, a detailed convergence analysis of the proposed algorithm is provided. Finally, numerical experiments illustrate that the new gradient descent algorithm not only speeds up the convergence of the BP neural networks but also increases their classification accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. An Enhanced Particle Swarm Optimization (PSO) Algorithm Employing Quasi-Random Numbers.
- Author
-
Kannan, Shiva Kumar and Diwekar, Urmila
- Subjects
- *
PARTICLE swarm optimization , *TRAVELING salesman problem , *STATISTICAL sampling , *ALGORITHMS , *BENCHMARK problems (Computer science) , *RANDOM numbers - Abstract
This paper introduces an innovative Particle Swarm Optimization (PSO) Algorithm incorporating Sobol and Halton random number samplings. It evaluates the enhanced PSO's performance against conventional PSO employing Monte Carlo random number samplings. The comparison involves assessing the algorithms across nine benchmark problems and the renowned Travelling Salesman Problem (TSP). The results reveal consistent enhancements achieved by the enhanced PSO utilizing Sobol/Halton samplings across the benchmark problems. Particularly noteworthy are the Sobol-based PSO improvements in iterations and the computational times for the benchmark problems. These findings underscore the efficacy of employing Sobol and Halton random number generation methods to enhance algorithm efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. On Finding Optimal (Dynamic) Arborescences.
- Author
-
Espada, Joaquim, Francisco, Alexandre P., Rocher, Tatiana, Russo, Luís M. S., and Vaz, Cátia
- Subjects
- *
DIRECTED graphs , *WEIGHTED graphs , *ALGORITHMS - Abstract
Let G = (V , E) be a directed and weighted graph with a vertex set V of size n and an edge set E of size m such that each edge (u , v) ∈ E has a real-valued weight w (u , c) . An arborescence in G is a subgraph T = (V , E ′) such that, for a vertex u ∈ V , which is the root, there is a unique path in T from u to any other vertex v ∈ V . The weight of T is the sum of the weights of its edges. In this paper, given G, we are interested in finding an arborescence in G with a minimum weight, i.e., an optimal arborescence. Furthermore, when G is subject to changes, namely, edge insertions and deletions, we are interested in efficiently maintaining a dynamic arborescence in G. This is a well-known problem with applications in several domains such as network design optimization and phylogenetic inference. In this paper, we revisit the algorithmic ideas proposed by several authors for this problem. We provide detailed pseudocode, as well as implementation details, and we present experimental results regarding large scale-free networks and phylogenetic inference. Our implementation is publicly available. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Hybrid Newton-like Inverse Free Algorithms for Solving Nonlinear Equations.
- Author
-
Argyros, Ioannis K., George, Santhosh, Regmi, Samundra, and Argyros, Christopher I.
- Subjects
- *
LINEAR operators , *OPERATOR equations , *ALGORITHMS , *BANACH spaces , *INVERSIONS (Geometry) - Abstract
Iterative algorithms requiring the computationally expensive in general inversion of linear operators are difficult to implement. This is the reason why hybrid Newton-like algorithms without inverses are developed in this paper to solve Banach space-valued nonlinear equations. The inverses of the linear operator are exchanged by a finite sum of fixed linear operators. Two types of convergence analysis are presented for these algorithms: the semilocal and the local. The Fréchet derivative of the operator on the equation is controlled by a majorant function. The semi-local analysis also relies on majorizing sequences. The celebrated contraction mapping principle is utilized to study the convergence of the Krasnoselskij-like algorithm. The numerical experimentation demonstrates that the new algorithms are essentially as effective but less expensive to implement. Although the new approach is demonstrated for Newton-like algorithms, it can be applied to other single-step, multistep, or multipoint algorithms using inverses of linear operators along the same lines. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Path Algorithms for Contact Sequence Temporal Graphs †.
- Author
-
Gheibi, Sanaz, Banerjee, Tania, Ranka, Sanjay, and Sahni, Sartaj
- Subjects
- *
ALGORITHMS , *NEIGHBORHOODS , *DATA structures - Abstract
This paper proposes a new time-respecting graph (TRG) representation for contact sequence temporal graphs. Our representation is more memory-efficient than previously proposed representations and has run-time advantages over the ordered sequence of edges (OSE) representation, which is faster than other known representations. While our proposed representation clearly outperforms the OSE representation for shallow neighborhood search problems, it is not evident that it does so for different problems. We demonstrate the competitiveness of our TRG representation for the single-source all-destinations fastest, min-hop, shortest, and foremost paths problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. PDASTSGAT: An STSGAT-Based Multipath Data Scheduling Algorithm.
- Author
-
Xue, Sen, Wu, Chengyu, Han, Jing, and Zhan, Ao
- Subjects
- *
GRAPH neural networks , *ALGORITHMS , *INTELLIGENT transportation systems , *SCHEDULING , *MULTICASTING (Computer networks) , *DATA transmission systems - Abstract
How to select the transmitting path in MPTCP scheduling is an important but open problem. This paper proposes an intelligent data scheduling algorithm using spatiotemporal synchronous graph attention neural networks to improve MPTCP scheduling. By exploiting the spatiotemporal correlations in the data transmission process and incorporating graph self-attention mechanisms, the algorithm can quickly select the optimal transmission path and ensure fairness among similar links. Through simulations in NS3, the algorithm achieves a throughput gain of 7.9% compared to the PDAA3C algorithm and demonstrates improved packet transmission performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Theoretical and Empirical Analysis of a Fast Algorithm for Extracting Polygons from Signed Distance Bounds.
- Author
-
Markuš, Nenad and Sužnjević, Mirko
- Subjects
- *
ALGORITHMS , *COMPUTER graphics , *COMPUTATIONAL complexity , *APPLICATION software , *POINT cloud - Abstract
Recently, there has been renewed interest in signed distance bound representations due to their unique properties for 3D shape modelling. This is especially the case for deep learning-based bounds. However, it is beneficial to work with polygons in most computer graphics applications. Thus, in this paper, we introduce and investigate an asymptotically fast method for transforming signed distance bounds into polygon meshes. This is achieved by combining the principles of sphere tracing (or ray marching) with traditional polygonization techniques, such as marching cubes. We provide theoretical and experimental evidence that this approach is of the O (N 2 log N) computational complexity for a polygonization grid with N 3 cells. The algorithm is tested on both a set of primitive shapes and signed distance bounds generated from point clouds by machine learning (and represented as neural networks). Given its speed, implementation simplicity, and portability, we argue that it could prove useful during the modelling stage as well as in shape compression for storage. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. An Objective Function-Based Clustering Algorithm with a Closed-Form Solution and Application to Reference Interval Estimation in Laboratory Medicine.
- Author
-
Klawonn, Frank and Hoffmann, Georg
- Subjects
- *
CLINICAL pathology , *GAUSSIAN mixture models , *K-means clustering , *ALGORITHMS - Abstract
Clustering algorithms are usually iterative procedures. In particular, when the clustering algorithm aims to optimise an objective function like in k-means clustering or Gaussian mixture models, iterative heuristics are required due to the high non-linearity of the objective function. This implies higher computational costs and the risk of finding only a local optimum and not the global optimum of the objective function. In this paper, we demonstrate that in the case of one-dimensional clustering with one main and one noise cluster, one can formulate an objective function, which permits a closed-form solution with no need for an iteration scheme and the guarantee of finding the global optimum. We demonstrate how such an algorithm can be applied in the context of laboratory medicine as a method to estimate reference intervals that represent the range of "normal" values. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Field Programmable Gate Array-Based Acceleration Algorithm Design for Dynamic Star Map Parallel Computing.
- Author
-
Cui, Bo, Wang, Lingyun, Li, Guangxi, and Ren, Xian
- Subjects
- *
STAR maps (Astronomy) , *PARALLEL programming , *USB technology , *STREAMING video & television , *ALGORITHMS - Abstract
The dynamic star simulator is a commonly used ground-test calibration device for star sensors. For the problems of slow calculation speed, low integration, and high power consumption in the traditional star chart simulation method, this paper designs a FPGA-based star chart display algorithm for a dynamic star simulator. The design adopts the USB 2.0 protocol to obtain the attitude data, uses the SDRAM to cache the attitude data and video stream, extracts the effective navigation star points by searching the starry sky equidistant right ascension and declination partitions, and realizes the pipelined displaying of the star map by using the parallel computing capability of the FPGA. Test results show that under the conditions of chart field of view of Φ 20 ° and simulated magnitude of 2.0 ∼ 6.0 Mv , the longest time for calculating a chart is 72 μs under the clock of 148.5 MHz, which effectively improves the chart display speed of the dynamic star simulator. The FPGA-based star map display algorithm gets rid of the dependence of the existing algorithm on the computer, reduces the volume and power consumption of the dynamic star simulator, and realizes the miniaturization and portable demand of the dynamic star simulator. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Artificial Intelligence Algorithms for Healthcare.
- Author
-
Chumachenko, Dmytro and Yakovlev, Sergiy
- Subjects
- *
ARTIFICIAL intelligence , *DEEP learning , *ALGORITHMS , *MACHINE learning , *INFORMATION technology , *MEDICAL care , *MOTION capture (Human mechanics) , *MEDICAL technology - Abstract
Artificial intelligence (AI) algorithms are playing a crucial role in transforming healthcare by enhancing the quality, accessibility, and efficiency of medical care, research, and operations. These algorithms enable healthcare providers to offer more accurate diagnoses, predict outcomes, and customize treatments to individual patient needs. AI also improves operational efficiency by automating routine tasks and optimizing resource management. However, there are challenges to adopting AI in healthcare, such as data privacy concerns and potential biases in algorithms. Collaboration among stakeholders is necessary to ensure ethical use of AI and its positive impact on the field. AI also has applications in medical research, preventive medicine, and public health. It is important to recognize that AI should augment, not replace, the expertise and compassionate care provided by healthcare professionals. The ethical implications and societal impact of AI in healthcare must be carefully considered, guided by fairness, transparency, and accountability principles. Several research papers in this special issue explore the application of AI algorithms in various aspects of healthcare, such as gait analysis for Parkinson's disease diagnosis, human activity recognition, heart disease prediction, compliance assessment with clinical protocols, epidemic management, neurological complications identification, fall prevention, leukemia diagnosis, and genetic clinical pathways. These studies demonstrate the potential of AI in improving medical diagnostics, patient monitoring, and personalized care. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
18. An FPT Algorithm for Directed Co-Graph Edge Deletion.
- Author
-
Li, Wenjun, Yang, Xueying, Xu, Chao, and Yang, Yongjie
- Subjects
- *
DIRECTED graphs , *ALGORITHMS , *NP-hard problems , *INTEGERS - Abstract
In the directed co-graph edge-deletion problem, we are given a directed graph and an integer k, and the question is whether we can delete, at most, k edges so that the resulting graph is a directed co-graph. In this paper, we make two minor contributions. Firstly, we show that the problem is NP-hard. Then, we show that directed co-graphs are fully characterized by eight forbidden structures, each having, at most, six edges. Based on the symmetry properties and several refined observations, we develop a branching algorithm with a running time of O (2.733 k) , which is significantly more efficient compared to the brute-force algorithm, which has a running time of O (6 k) . [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A Comprehensive Analysis of Real-Time Car Safety Belt Detection Using the YOLOv7 Algorithm.
- Author
-
Nkuzo, Lwando, Sibiya, Malusi, and Markus, Elisha Didam
- Subjects
- *
VIDEO surveillance , *OBJECT recognition (Computer vision) , *STREAMING video & television , *ALGORITHMS , *TRAFFIC accidents , *SEAT belts - Abstract
Using a safety belt is crucial for preventing severe injuries and fatalities during vehicle accidents. In this paper, we propose a real-time vehicle occupant safety belt detection system based on the YOLOv7 (You Only Look Once version seven) object detection algorithm. The proposed approach aims to automatically detect whether the occupants of a vehicle have buckled their safety belts or not as soon as they are detected within the vehicle. A dataset for this purpose was collected and annotated for validation and testing. By leveraging the efficiency and accuracy of YOLOv7, we achieve near-instantaneous analysis of video streams, making our system suitable for deployment in various surveillance and automotive safety applications. This paper outlines a comprehensive methodology for training the YOLOv7 model using the labelImg tool to annotate the dataset with images showing vehicle occupants. It also discusses the challenges of detecting seat belts and evaluates the system's performance on a real-world dataset. The evaluation focuses on distinguishing the status of a safety belt between two classes: "buckled" and "unbuckled". The results demonstrate a high level of accuracy, with a mean average precision (mAP) of 99.6% and an F1 score of 98%, indicating the system's effectiveness in identifying the safety belt status. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. A Greedy Pursuit Hierarchical Iteration Algorithm for Multi-Input Systems with Colored Noise and Unknown Time-Delays.
- Author
-
Du, Ruijuan and Tao, Taiyang
- Subjects
- *
TIME delay estimation , *TIME delay systems , *COMPRESSED sensing , *NOISE , *ALGORITHMS , *MODELS & modelmaking - Abstract
This paper focuses on the joint estimation of parameters and time delays for multi-input systems that contain unknown input delays and colored noise. A greedy pursuit hierarchical iteration algorithm is proposed, which can reduce the estimation cost. Firstly, an over-parameterized approach is employed to construct a sparse system model of multi-input systems even in the absence of prior knowledge of time delays. Secondly, the hierarchical principle is applied to replace the unknown true noise items with their estimation values, and a greedy pursuit search based on compressed sensing is employed to find key parameters using limited sampled data. The greedy pursuit search can effectively reduce the scale of the system model and improve the identification efficiency. Then, the parameters and time delays can be estimated simultaneously while considering the known orders and found locations of key parameters by utilizing iterative methods with limited sampled data. Finally, some simulations are provided to illustrate the effectiveness of the presented algorithm in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Two Medoid-Based Algorithms for Clustering Sets.
- Author
-
Nigro, Libero and Fränti, Pasi
- Subjects
- *
ALGORITHMS , *FUZZY algorithms , *DIAGNOSIS , *DATA analysis , *PARALLEL algorithms - Abstract
This paper proposes two algorithms for clustering data, which are variable-sized sets of elementary items. An example of such data occurs in the analysis of a medical diagnosis, where the goal is to detect human subjects who share common diseases to possibly predict future illnesses from previous medical history. The first proposed algorithm is based on K-medoids and the second algorithm extends the random swap algorithm, which has proven to be capable of efficient and careful clustering; both algorithms depend on a distance function among data objects (sets), which can use application-sensitive weights or priorities. The proposed distance function makes it possible to exploit several seeding methods that can improve clustering accuracy. A key factor in the two algorithms is their parallel implementation in Java, based on functional programming using streams and lambda expressions. The use of parallelism smooths out the O (N 2) computational cost behind K-medoids and clustering indexes such as the Silhouette index and allows for the handling of non-trivial datasets. This paper applies the algorithms to several benchmark case studies of sets and demonstrates how accurate and time-efficient clustering solutions can be achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Algorithm for Enhancing Event Reconstruction Efficiency by Addressing False Track Filtering Issues in the SPD NICA Experiment.
- Author
-
Amirkhanova, Gulshat, Mansurova, Madina, Ososkov, Gennadii, Burtebayev, Nasurlla, Shomanov, Adai, and Kunelbayev, Murat
- Subjects
- *
THRESHOLDING algorithms , *COGNITIVE processing speed , *ROOT-mean-squares , *CHOICE (Psychology) , *ALGORITHMS , *PARTICLE tracks (Nuclear physics) - Abstract
This paper introduces methods for parallelizing the algorithm to enhance the efficiency of event recovery in Spin Physics Detector (SPD) experiments at the Nuclotron-based Ion Collider Facility (NICA). The problem of eliminating false tracks during the particle trajectory detection process remains a crucial challenge in overcoming performance bottlenecks in processing collider data generated in high volumes and at a fast pace. In this paper, we propose and show fast parallel false track elimination methods based on the introduced criterion of a clustering-based thresholding approach with a chi-squared quality-of-fit metric. The proposed strategy achieves a good trade-off between the effectiveness of track reconstruction and the pace of execution on today's advanced multicore computers. To facilitate this, a quality benchmark for reconstruction is established, using the root mean square (rms) error of spiral and polynomial fitting for the datasets identified as the subsequent track candidate by the neural network. Choosing the right benchmark enables us to maintain the recall and precision indicators of the neural network track recognition performance at a level that is satisfactory to physicists, even though these metrics will inevitably decline as the data noise increases. Moreover, it has been possible to improve the processing speed of the complete program pipeline by 6 times through parallelization of the algorithm, achieving a rate of 2000 events per second, even when handling extremely noisy input data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. A Multithreaded Algorithm for the Computation of Sample Entropy.
- Author
-
Manis, George, Bakalis, Dimitrios, and Sassi, Roberto
- Subjects
- *
ENTROPY , *COMPILERS (Computer programs) , *PYTHON programming language , *TIME series analysis , *ALGORITHMS , *PERSONAL computers , *PARALLEL algorithms - Abstract
Many popular entropy definitions for signals, including approximate and sample entropy, are based on the idea of embedding the time series into an m-dimensional space, aiming to detect complex, deeper and more informative relationships among samples. However, for both approximate and sample entropy, the high computational cost is a severe limitation. Especially when large amounts of data are processed, or when parameter tuning is employed premising a large number of executions, the necessity of fast computation algorithms becomes urgent. In the past, our research team proposed fast algorithms for sample, approximate and bubble entropy. In the general case, the bucket-assisted algorithm was the one presenting the lowest execution times. In this paper, we exploit the opportunities given by the multithreading technology to further reduce the computation time. Without special requirements in hardware, since today even our cost-effective home computers support multithreading, the computation of entropy definitions can be significantly accelerated. The aim of this paper is threefold: (a) to extend the bucket-assisted algorithm for multithreaded processors, (b) to present updated execution times for the bucket-assisted algorithm since the achievements in hardware and compiler technology affect both execution times and gain, and (c) to provide a Python library which wraps fast C implementations capable of running in parallel on multithreaded processors. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Forgetful Forests: Data Structures for Machine Learning on Streaming Data under Concept Drift.
- Author
-
Yuan, Zhehu, Sun, Yinqi, and Shasha, Dennis
- Subjects
- *
MACHINE learning , *DATA structures , *DATABASES , *MACHINE performance , *PROBABILISTIC databases , *ALGORITHMS - Abstract
Database and data structure research can improve machine learning performance in many ways. One way is to design better algorithms on data structures. This paper combines the use of incremental computation as well as sequential and probabilistic filtering to enable "forgetful" tree-based learning algorithms to cope with streaming data that suffers from concept drift. (Concept drift occurs when the functional mapping from input to classification changes over time). The forgetful algorithms described in this paper achieve high performance while maintaining high quality predictions on streaming data. Specifically, the algorithms are up to 24 times faster than state-of-the-art incremental algorithms with, at most, a 2% loss of accuracy, or are at least twice faster without any loss of accuracy. This makes such structures suitable for high volume streaming applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. A Biased-Randomized Discrete Event Algorithm to Improve the Productivity of Automated Storage and Retrieval Systems in the Steel Industry.
- Author
-
Neroni, Mattia, Bertolini, Massimo, and Juan, Angel A.
- Subjects
- *
AUTOMATED storage retrieval systems , *DISCRETE event simulation , *OPTIMIZATION algorithms , *STEEL industry , *ALGORITHMS , *SIMULATED annealing - Abstract
In automated storage and retrieval systems (AS/RSs), the utilization of intelligent algorithms can reduce the makespan required to complete a series of input/output operations. This paper introduces a simulation optimization algorithm designed to minimize the makespan in a realistic AS/RS commonly found in the steel sector. This system includes weight and quality constraints for the selected items. Our hybrid approach combines discrete event simulation with biased-randomized heuristics. This combination enables us to efficiently address the complex time dependencies inherent in such dynamic scenarios. Simultaneously, it allows for intelligent decision making, resulting in feasible and high-quality solutions within seconds. A series of computational experiments illustrates the potential of our approach, which surpasses an alternative method based on traditional simulated annealing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Algorithms for Fractional Dynamical Behaviors Modelling Using Non-Singular Rational Kernels.
- Author
-
Sabatier, Jocelyn and Farges, Christophe
- Subjects
- *
IMPULSE response , *ALGORITHMS , *KERNEL functions - Abstract
This paper proposes algorithms to model fractional (dynamical) behaviors using non-singular rational kernels whose interest is first demonstrated on a pure power law function. Two algorithms are then proposed to find a non-singular rational kernel that allows the input-output data to be fitted. The first one derives the impulse response of the modeled system from the data. The second one finds the interlaced poles and zeros of the rational function that fits the impulse response found using the first algorithm. Several applications show the efficiency of the proposed work. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Image Deblurring Based on Convex Non-Convex Sparse Regularization and Plug-and-Play Algorithm.
- Author
-
Wang, Yi, Xu, Yating, Li, Tianjian, Zhang, Tao, and Zou, Jian
- Subjects
- *
OPTIMIZATION algorithms , *ESTIMATION bias , *ALGORITHMS , *MATHEMATICAL regularization , *IMAGE reconstruction algorithms - Abstract
Image deblurring based on sparse regularization has garnered significant attention, but there are still certain limitations that need to be addressed. For instance, convex sparse regularization tends to exhibit biased estimation, which can adversely impact the deblurring performance, while non-convex sparse regularization poses challenges in terms of solving techniques. Furthermore, the performance of the traditional iterative algorithm also needs to be improved. In this paper, we propose an image deblurring method based on convex non-convex (CNC) sparse regularization and a plug-and-play (PnP) algorithm. The utilization of CNC sparse regularization not only mitigates estimation bias but also guarantees the overall convexity of the image deblurring model. The PnP algorithm is an advanced learning-based optimization algorithm that surpasses traditional optimization algorithms in terms of efficiency and performance by utilizing the state-of-the-art denoiser to replace the proximal operator. Numerical experiments verify the performance of our proposed algorithm in image deblurring. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. A Lightweight Graph Neural Network Algorithm for Action Recognition Based on Self-Distillation.
- Author
-
Feng, Miao and Meunier, Jean
- Subjects
- *
HUMAN activity recognition , *ALGORITHMS , *HUMAN-computer interaction , *VIRTUAL reality - Abstract
Recognizing human actions can help in numerous ways, such as health monitoring, intelligent surveillance, virtual reality and human–computer interaction. A quick and accurate detection algorithm is required for daily real-time detection. This paper first proposes to generate a lightweight graph neural network by self-distillation for human action recognition tasks. The lightweight graph neural network was evaluated on the NTU-RGB+D dataset. The results demonstrate that, with competitive accuracy, the heavyweight graph neural network can be compressed by up to 80 % . Furthermore, the learned representations have denser clusters, estimated by the Davies–Bouldin index, the Dunn index and silhouette coefficients. The ideal input data and algorithm capacity are also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. An Algorithm for Coloring of Picture Fuzzy Graphs Based on Strong and Weak Adjacencies, and Its Application.
- Author
-
Rosyida, Isnaini and Indrati, Christiana Rini
- Subjects
- *
TRAFFIC signs & signals , *FUZZY graphs , *STATISTICAL decision making , *ALGORITHMS , *DECISION making , *PICTURES - Abstract
The idea of strong and weak adjacencies between vertices has been generalized into fuzzy graphs and intuitionistic fuzzy graphs (IFGs), and it is an important part of making decisions. However, one or two membership degrees are not always sufficient for making decisions on real-world problems that need an answer of types "yes, neutral, and no". Consequently, in previous work, we generalized the concept into picture fuzzy graphs (PFGs) where each element in the PFG has membership, neutral, and non-membership degrees. Moreover, we constructed the notion of the coloring of PFGs based on strong and weak adjacencies between vertices. In this paper, we investigate some properties of the chromatic number of PFGs based on the concept of strong and weak adjacencies between vertices. According to these properties, we construct an algorithm to find the chromatic number of PFGs. The algorithm is useful when we work with large PFGs. Further, we improve the method to implement the PFG's coloring for determining traffic signal phasing at an intersection. A case study has also been carried to evaluate the method. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. A Learnheuristic Algorithm for the Capacitated Dispersion Problem under Dynamic Conditions.
- Author
-
Gomez, Juan F., Uguina, Antonio R., Panadero, Javier, and Juan, Angel A.
- Subjects
- *
MACHINE learning , *REINFORCEMENT learning , *ALGORITHMS , *TELECOMMUNICATION systems , *DISPERSION (Chemistry) - Abstract
The capacitated dispersion problem, which is a variant of the maximum diversity problem, aims to determine a set of elements within a network. These elements could symbolize, for instance, facilities in a supply chain or transmission nodes in a telecommunication network. While each element typically has a bounded service capacity, in this research, we introduce a twist. The capacity of each node might be influenced by a random Bernoulli component, thereby rendering the possibility of a node having zero capacity, which is contingent upon a black box mechanism that accounts for environmental variables. Recognizing the inherent complexity and the NP-hard nature of the capacitated dispersion problem, heuristic algorithms have become indispensable for handling larger instances. In this paper, we introduce a novel approach by hybridizing a heuristic algorithm with reinforcement learning to address this intricate problem variant. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments.
- Author
-
Vidaković, Marin and Miličević, Kruno
- Subjects
- *
ALGORITHMS , *SMART cards , *QUANTUM computing , *DIGITAL signatures - Abstract
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. This paper provides a comparative evaluation of these algorithms across key metrics. The results indicate varying strengths and weaknesses for each algorithm, underscoring the importance of context-specific deployments. Our findings indicate that Dilithium offers advantages in low-power scenarios, Falcon excels in signature verification speed, and Sphincs+ provides robust security at the cost of computational efficiency. These results underscore the importance of context-specific deployments in specific and resource-constrained technological applications, like IoT, smart cards, blockchain, and vehicle-to-vehicle communication. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. Editorial Paper for the Special Issue "Algorithms in Hyperspectral Data Analysis".
- Author
-
Pizzolante, Raffaele
- Subjects
- *
DATA analysis , *ALGORITHMS , *THRESHOLDING algorithms , *SPECTRAL imaging , *SPATIAL data structures , *IMAGE segmentation - Abstract
This Special Issue contains four papers focused on hyperspectral data analysis. The authors use multivariate data analysis to establish a quantitative relationship between the obtained spectral information of the kidney and its reference TWC values. The present Special Issue covers a range of algorithms and techniques for hyperspectral data analysis. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
33. Temporal Multimodal Data-Processing Algorithms Based on Algebraic System of Aggregates.
- Author
-
Pester, Andreas, Sulema, Yevgeniya, Dychka, Ivan, and Sulema, Olga
- Subjects
- *
DATA structures , *MULTIMODAL user interfaces , *ALGORITHMS , *COMPUTER software development , *ELECTRONIC data processing - Abstract
In many tasks related to an object's observation or real-time monitoring, the gathering of temporal multimodal data is required. Such data sets are semantically connected as they reflect different aspects of the same object. However, data sets of different modalities are usually stored and processed independently. This paper presents an approach based on the application of the Algebraic System of Aggregates (ASA) operations that enable the creation of an object's complex representation, referred to as multi-image (MI). The representation of temporal multimodal data sets as the object's MI yields simple data-processing procedures as it provides a solid semantic connection between data describing different features of the same object, process, or phenomenon. In terms of software development, the MI is a complex data structure used for data processing with ASA operations. This paper provides a detailed presentation of this concept. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Algorithms in Low-Code-No-Code for Research Applications: A Practical Review.
- Author
-
Sufi, Fahim
- Subjects
- *
ALGORITHMS , *RESEARCH questions , *CYBERTERRORISM , *PROBLEM solving , *CYBER intelligence (Computer security) , *SOCIAL media - Abstract
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the recent studies using mainstream LCNC platforms to understand the area of research, the LCNC platforms used within these studies, and the features of LCNC used for solving individual research questions. We identified 23 research works using LCNC platforms, such as SetXRM, the vf-OS platform, Aure-BPM, CRISP-DM, and Microsoft Power Platform (MPP). About 61% of these existing studies resorted to MPP as their primary choice. The critical research problems solved by these research works were within the area of global news analysis, social media analysis, landslides, tornadoes, COVID-19, digitization of process, manufacturing, logistics, and software/app development. The main reasons identified for solving research problems with LCNC algorithms were as follows: (1) obtaining research data from multiple sources in complete automation; (2) generating artificial intelligence-driven insights without having to manually code them. In the course of describing this review, this paper also demonstrates a practical approach to implement a cyber-attack monitoring algorithm with the most popular LCNC platform. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Multiprocessor Fair Scheduling Based on an Improved Slime Mold Algorithm.
- Author
-
Dai, Manli and Jiang, Zhongyi
- Subjects
- *
MYXOMYCETES , *MULTIPROCESSORS , *ALGORITHMS , *SCHEDULING - Abstract
An improved slime mold algorithm (IMSMA) is presented in this paper for a multiprocessor multitask fair scheduling problem, which aims to reduce the average processing time. An initial population strategy based on Bernoulli mapping reverse learning is proposed for the slime mold algorithm. A Cauchy mutation strategy is employed to escape local optima, and the boundary-check mechanism of the slime mold swarm is optimized. The boundary conditions of the slime mold population are transformed into nonlinear, dynamically changing boundaries. This adjustment strengthens the slime mold algorithm's global search capabilities in early iterations and strengthens its local search capability in later iterations, which accelerates the algorithm's convergence speed. Two unimodal and two multimodal test functions from the CEC2019 benchmark are chosen for comparative experiments. The experiment results show the algorithm's robust convergence and its capacity to escape local optima. The improved slime mold algorithm is applied to the multiprocessor fair scheduling problem to reduce the average execution time on each processor. Numerical experiments showed that the IMSMA performs better than other algorithms in terms of precision and convergence effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Blockchain PoS and PoW Consensus Algorithms for Airspace Management Application to the UAS-S4 Ehécatl †.
- Author
-
Hashemi, Seyed Mohammad, Botez, Ruxandra Mihaela, and Ghazi, Georges
- Subjects
- *
BLOCKCHAINS , *ALGORITHMS , *DRONE aircraft , *ERROR rates , *COMPUTATIONAL complexity - Abstract
This paper introduces an innovative consensus algorithm for managing Unmanned Aircraft System Traffic (UTM) through blockchain technology, a highly secure consensus protocol, to allocate airspace. A smart contract was developed on the Ethereum blockchain for allocating airspace. This technique enables the division of the swarm flight zone into smaller sectors to decrease the computational complexity of the algorithm. A decentralized voting system was established within these segmented flight zones, utilizing two primary methodologies: Proof of Work (PoW) and Proof of Stake (PoS). By employing 1000 UAS-S4s across various locations and heading angles, a swarm flight zone was generated. The efficiency of the devised decentralized consensus system was assessed based on error rate and validation time. Despite PoS displaying greater efficiency in cumulative probability for block execution, the comparative analysis indicated PoW outperformed PoS concerning the potential for conflicts among UASs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Multiple Factor Analysis Based on NIPALS Algorithm to Solve Missing Data Problems.
- Author
-
Ochoa-Muñoz, Andrés F. and Contreras-Reyes, Javier E.
- Subjects
- *
MISSING data (Statistics) , *FACTOR analysis , *LEAST squares , *MULTIVARIATE analysis , *MULTIPLE imputation (Statistics) , *ALGORITHMS - Abstract
Missing or unavailable data (NA) in multivariate data analysis is often treated with imputation methods and, in some cases, records containing NA are eliminated, leading to the loss of information. This paper addresses the problem of NA in multiple factor analysis (MFA) without resorting to eliminating records or using imputation techniques. For this purpose, the nonlinear iterative partial least squares (NIPALS) algorithm is proposed based on the principle of available data. NIPALS presents a good alternative when data imputation is not feasible. Our proposed method is called MFA-NIPALS and, based on simulation scenarios, we recommend its use until 15% of NAs of total observations. A case of groups of quantitative variables is studied and the proposed NIPALS algorithm is compared with the regularized iterative MFA algorithm for several percentages of NA. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. A Hybrid Discrete Memetic Algorithm for Solving Flow-Shop Scheduling Problems.
- Author
-
Fazekas, Levente, Tüű-Szabó, Boldizsár, Kóczy, László T., Hornyák, Olivér, and Nehéz, Károly
- Subjects
- *
FLOW shop scheduling , *FLOW shops , *ALGORITHMS , *EVOLUTIONARY algorithms , *PERMUTATIONS , *PRODUCTION scheduling - Abstract
Flow-shop scheduling problems are classic examples of multi-resource and multi-operation scheduling problems where the objective is to minimize the makespan. Because of the high complexity and intractability of the problem, apart from some exceptional cases, there are no explicit algorithms for finding the optimal permutation in multi-machine environments. Therefore, different heuristic approaches, including evolutionary and memetic algorithms, are used to obtain the solution—or at least, a close enough approximation of the optimum. This paper proposes a novel approach: a novel combination of two rather efficient such heuristics, the discrete bacterial memetic evolutionary algorithm (DBMEA) proposed earlier by our group, and a conveniently modified heuristics, the Monte Carlo tree method. By their nested combination a new algorithm was obtained: the hybrid discrete bacterial memetic evolutionary algorithm (HDBMEA), which was extensively tested on the Taillard benchmark data set. Our results have been compared against all important other approaches published in the literature, and we found that this novel compound method produces good results overall and, in some cases, even better approximations of the optimum than any of the so far proposed solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Enhancing Metaheuristic Optimization: A Novel Nature-Inspired Hybrid Approach Incorporating Selected Pseudorandom Number Generators.
- Author
-
Gulić, Marko and Žuškin, Martina
- Subjects
- *
METAHEURISTIC algorithms , *GENETIC algorithms , *ALGORITHMS - Abstract
In this paper, a hybrid nature-inspired metaheuristic algorithm based on the Genetic Algorithm and the African Buffalo Optimization is proposed. The hybrid approach adaptively switches between the Genetic Algorithm and the African Buffalo Optimization during the optimization process, leveraging their respective strengths to improve performance. To improve randomness, the hybrid approach uses two high-quality pseudorandom number generators—the 64-bit and 32-bit versions of the SIMD-Oriented Fast Mersenne Twister. The effectiveness of the hybrid algorithm is evaluated on the NP-hard Container Relocation Problem, focusing on a test set of restricted Container Relocation Problems with higher complexity. The results show that the hybrid algorithm outperforms the individual Genetic Algorithm and the African Buffalo Optimization, which use standard pseudorandom number generators. The adaptive switch method allows the algorithm to adapt to different optimization problems and mitigate problems such as premature convergence and local optima. Moreover, the importance of pseudorandom number generator selection in metaheuristic algorithms is highlighted, as it directly affects the optimization results. The use of powerful pseudorandom number generators reduces the probability of premature convergence and local optima, leading to better optimization results. Overall, the research demonstrates the potential of hybrid metaheuristic approaches for solving complex optimization problems, which makes them relevant for scientific research and practical applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. A Novel Self-Adaptive Cooperative Coevolution Algorithm for Solving Continuous Large-Scale Global Optimization Problems †.
- Author
-
Vakhnin, Aleksei and Sopov, Evgenii
- Subjects
- *
GLOBAL optimization , *COEVOLUTION , *ALGORITHMS , *PROBLEM solving , *MATHEMATICAL optimization , *SELF-adaptive software , *METAHEURISTIC algorithms , *EVOLUTIONARY algorithms - Abstract
Unconstrained continuous large-scale global optimization (LSGO) is still a challenging task for a wide range of modern metaheuristic approaches. A cooperative coevolution approach is a good tool for increasing the performance of an evolutionary algorithm in solving high-dimensional optimization problems. However, the performance of cooperative coevolution approaches for LSGO depends significantly on the problem decomposition, namely, on the number of subcomponents and on how variables are grouped in these subcomponents. Also, the choice of the population size is still an open question for population-based algorithms. This paper discusses a method for selecting the number of subcomponents and the population size during the optimization process ("on fly") from a predefined pool of parameters. The selection of the parameters is based on their performance in the previous optimization steps. The main goal of the study is the improvement of coevolutionary decomposition-based algorithms for solving LSGO problems. In this paper, we propose a novel self-adapt evolutionary algorithm for solving continuous LSGO problems. We have tested this algorithm on 15 optimization problems from the IEEE LSGO CEC'2013 benchmark suite. The proposed approach, on average, outperforms cooperative coevolution algorithms with a static number of subcomponents and a static number of individuals. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. Quantifying Uncertainties in OC-SMART Ocean Color Retrievals: A Bayesian Inversion Algorithm.
- Author
-
Pachniak, Elliot, Fan, Yongzhen, Li, Wei, and Stamnes, Knut
- Subjects
- *
SCIENCE education , *PROBABILITY density function , *OCEAN color , *REMOTE sensing , *ALGORITHMS , *OPTICAL properties - Abstract
The Ocean Color—Simultaneous Marine and Aerosol Retrieval Tool (OC-SMART) is a robust data processing platform utilizing scientific machine learning (SciML) in conjunction with comprehensive radiative transfer computations to provide accurate remote sensing reflectances ( R rs estimates), aerosol optical depths, and inherent optical properties. This paper expands the capability of OC-SMART by quantifying uncertainties in ocean color retrievals. Bayesian inversion is used to relate measured top of atmosphere radiances and a priori data to estimate posterior probability density functions and associated uncertainties. A framework of the methodology and implementation strategy is presented and uncertainty estimates for R rs retrievals are provided to demonstrate the approach by applying it to MODIS, OLCI Sentinel-3, and VIIRS sensor data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids.
- Author
-
Li, Xue Jun, Ma, Maode, and Sun, Yihan
- Subjects
- *
DEEP learning , *MACHINE learning , *COMPUTER network security , *ENTORHINAL cortex , *INFRASTRUCTURE (Economics) , *COMMUNICATION infrastructure , *ALGORITHMS - Abstract
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, must be protected as smart grids are vulnerable and subject to various cyberattacks. Various machine learning based classifiers were proposed for intrusion detection in smart grids. However, each of them has respective advantage and disadvantages. Aiming to improve the performance of existing machine learning based classifiers, this paper proposes an adaptive deep learning algorithm with a data pre-processing module, a neural network pre-training module and a classifier module, which work together classify intrusion data types using their high-dimensional data features. The proposed Adaptive Deep Learning (ADL) algorithm obtains the number of layers and the number of neurons per layer by determining the characteristic dimension of the network traffic. With transfer learning, the proposed ADL algorithm can extract the original data dimensions and obtain new abstract features. By combining deep learning models with traditional machine learning-based classification models, the performance of classification of network traffic data is significantly improved. By using the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset, experimental results show that the proposed ADL algorithm improves the effectiveness of existing intrusion detection methods and reduces the training time, indicating a promising candidate to enhance network security in smart grids. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. An Effective Local Particle Swarm Optimization-Based Algorithm for Solving the School Timetabling Problem.
- Author
-
Tassopoulos, Ioannis X., Iliopoulou, Christina A., Katsaragakis, Iosif V., and Beligiannis, Grigorios N.
- Subjects
- *
PARTICLE swarm optimization , *ALGORITHMS , *INTEGER programming - Abstract
This paper deals with the school timetabling problem. The problem was formulated as encountered in a typical Greek high school. A local version of the particle swarm optimization algorithm was developed and applied to the problem at hand. Results on well-established benchmark instances showed that the proposed algorithm achieved the proven optima provided from an integer programming method presented in earlier research. In almost all cases, the current algorithm beat the integer programming method, either concerning the lower bound yielded or the execution time needed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Adding a Tail in Classes of Perfect Graphs.
- Author
-
Mpanti, Anna, Nikolopoulos, Stavros D., and Palios, Leonidas
- Subjects
- *
REPRESENTATIONS of graphs , *TREE graphs , *SPARSE graphs , *ALGORITHMS - Abstract
Consider a graph G which belongs to a graph class C. We are interested in connecting a node w ∉ V (G) to G by a single edge u w where u ∈ V (G) ; we call such an edge a tail. As the graph resulting from G after the addition of the tail, denoted G + u w , need not belong to the class C , we want to compute the number of non-edges of G in a minimum C -completion of G + u w , i.e., the minimum number of non-edges (excluding the tail u w ) to be added to G + u w so that the resulting graph belongs to C. In this paper, we study this problem for the classes of split, quasi-threshold, threshold and P 4 -sparse graphs and we present linear-time algorithms by exploiting the structure of split graphs and the tree representation of quasi-threshold, threshold and P 4 -sparse graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Folding Every Point on a Polygon Boundary to a Point.
- Author
-
Phetmak, Nattawut and Fakcharoenphol, Jittat
- Subjects
- *
POLYGONS , *ORIGAMI , *SKELETON , *PARABOLA , *ALGORITHMS - Abstract
We consider a problem in computational origami. Given a piece of paper as a convex polygon P and a point f located within, we fold every point on a boundary of P to f and compute a region that is safe from folding, i.e., the region with no creases. This problem is an extended version of a problem by Akitaya, Ballinger, Demaine, Hull, and Schmidt that only folds corners of the polygon. To find the region, we prove structural properties of intersections of parabola-bounded regions and use them to devise a linear-time algorithm. We also prove a structural result regarding the complexity of the safe region as a variable of the location of point f, i.e., the number of arcs of the safe region can be determined using the straight skeleton of the polygon P. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Data Preprocessing and Neural Network Architecture Selection Algorithms in Cases of Limited Training Sets—On an Example of Diagnosing Alzheimer's Disease.
- Author
-
Alekseev, Aleksandr, Kozhemyakin, Leonid, Nikitin, Vladislav, and Bolshakova, Julia
- Subjects
- *
ALZHEIMER'S disease , *MAGNETIC susceptibility , *CASCADE connections , *DIAGNOSIS , *ALGORITHMS - Abstract
This paper aimed to increase accuracy of an Alzheimer's disease diagnosing function that was obtained in a previous study devoted to application of decision roots to the diagnosis of Alzheimer's disease. The obtained decision root is a discrete switching function of several variables applicated to aggregation of a few indicators to one integrated assessment presents as a superposition of few functions of two variables. Magnetic susceptibility values of the basal veins and veins of the thalamus were used as indicators. Two categories of patients were used as function values. To increase accuracy, the idea of using artificial neural networks was suggested, but a feature of medical data is its limitation. Therefore, neural networks based on limited training datasets may be inefficient. The solution to this problem is proposed to preprocess initial datasets to determine the parameters of the neural networks based on decisions' roots, because it is known that any can be represented in the incompletely connected neural network form with a cascade structure. There are no publicly available specialized software products allowing the user to set the complex structure of a neural network, which is why the number of synaptic coefficients of an incompletely connected neural network has been determined. This made it possible to predefine fully connected neural networks, comparable in terms of the number of unknown parameters. Acceptable accuracy was obtained in cases of one-layer and two-layer fully connected neural networks trained on limited training sets on an example of diagnosing Alzheimer's disease. Thus, the scientific hypothesis on preprocessing initial datasets and neural network architecture selection using special methods and algorithms was confirmed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Enhancing the Distributed Acoustic Sensors' (DAS) Performance by the Simple Noise Reduction Algorithms Sequential Application.
- Author
-
Turov, Artem T., Konstantinov, Yuri A., Barkov, Fedor L., Korobko, Dmitry A., Zolotovskii, Igor O., Lopez-Mercado, Cesar A., and Fotiadi, Andrei A.
- Subjects
- *
DISTRIBUTED sensors , *ALGORITHMS , *SIGNAL processing , *OPTICAL fiber detectors , *NOISE control , *OPTICAL fibers , *SIGNAL-to-noise ratio - Abstract
Moving differential and dynamic window moving averaging are simple and well-known signal processing algorithms. However, the most common methods of obtaining sufficient signal-to-noise ratios in distributed acoustic sensing use expensive and precise equipment such as laser sources, photoreceivers, etc., and neural network postprocessing, which results in an unacceptable price of an acoustic monitoring system for potential customers. This paper presents the distributed fiber-optic acoustic sensors data processing and noise suppression techniques applied both to raw data (spatial and temporal amplitude distributions) and to spectra obtained after the Fourier transform. The performance of algorithms' individual parts in processing distributed acoustic sensor's data obtained in laboratory conditions for an optical fiber subjected to various dynamic impact events is studied. A comparative analysis of these parts' efficiency was carried out, and for each type of impact event, the most beneficial combinations were identified. The feasibility of existing noise reduction techniques performance improvement is proposed and tested. Presented algorithms are undemanding for computation resources and provide the signal-to-noise ratio enhancement of up to 13.1 dB. Thus, they can be useful in areas requiring the distributed acoustic monitoring systems' cost reduction as maintaining acceptable performance while allowing the use of cheaper hardware. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Improved JPS Path Optimization for Mobile Robots Based on Angle-Propagation Theta* Algorithm.
- Author
-
Luo, Yuan, Lu, Jiakai, Qin, Qiong, and Liu, Yanyu
- Subjects
- *
MOBILE robots , *ROBOT motion , *GRIDS (Cartography) , *ALGORITHMS , *TRAJECTORY optimization - Abstract
The Jump Point Search (JPS) algorithm ignores the possibility of any-angle walking, so the paths found by the JPS algorithm under the discrete grid map still have a gap with the real paths. To address the above problems, this paper improves the path optimization strategy of the JPS algorithm by combining the viewable angle of the Angle-Propagation Theta* (AP Theta*) algorithm, and it proposes the AP-JPS algorithm based on an any-angle pathfinding strategy. First, based on the JPS algorithm, this paper proposes a vision triangle judgment method to optimize the generated path by selecting the successor search point. Secondly, the idea of the node viewable angle in the AP Theta* algorithm is introduced to modify the line of sight (LOS) reachability detection between two nodes. Finally, the paths are optimized using a seventh-order polynomial based on minimum snap, so that the AP-JPS algorithm generates paths that better match the actual robot motion. The feasibility and effectiveness of this method are proved by simulation experiments and comparison with other algorithms. The results show that the path planning algorithm in this paper obtains paths with good smoothness in environments with different obstacle densities and different map sizes. In the algorithm comparison experiments, it can be seen that the AP-JPS algorithm reduces the path by 1.61–4.68% and the total turning angle of the path by 58.71–84.67% compared with the JPS algorithm. The AP-JPS algorithm reduces the computing time by 98.59–99.22% compared with the AP-Theta* algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Model of Lexico-Semantic Bonds between Texts for Creating Their Similarity Metrics and Developing Statistical Clustering Algorithm.
- Author
-
Demidova, Liliya, Zhukov, Dmitry, Andrianova, Elena, and Kalinin, Vladimir
- Subjects
- *
COSINE function , *DISTRIBUTION (Probability theory) , *CHARACTERISTIC functions , *ALGORITHMS , *WORD frequency , *PROBLEM solving - Abstract
To solve the problem of text clustering according to semantic groups, we suggest using a model of a unified lexico-semantic bond between texts and a similarity matrix based on it. Using lexico-semantic analysis methods, we can create "term–document" matrices based both on the occurrence frequencies of words and n-grams and the determination of the degrees of nodes in their semantic network, followed by calculating the cosine metrics of text similarity. In the process of the construction of the text similarity matrix using lexical or semantic analysis methods, the cosine of the angle for a vector pair describing such texts will determine the degree of similarity in the lexical or semantic presentation, respectively. Based on the averaging procedure described in this paper, we can obtain a matrix of cosine metric values that describes the lexico-semantic bonds between texts. We propose an algorithm for solving text clustering problems. This algorithm allows one to use the statistical characteristics of the distribution functions of element values in the rows of the cosine metric value matrix in the model of the lexico-semantic bond between documents. In addition, this algorithm allows one to separately describe the matrix of the cosine metric values obtained separately based on the lexical or semantic properties of texts. Our research has shown that the developed model for the lexico-semantic presentation of texts allows one to slightly increase the accuracy of their subsequent clustering. The statistical text clustering algorithm based on this model shows excellent results that are comparable to those of the widely used affinity propagation algorithm. Additionally, our algorithm does not require specification of the degree of similarity for combining vectors into a common cluster and other configuration parameters. The suggested model and algorithm significantly expand the list of known approaches for determining text similarity metrics and their clustering. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. On Modeling Antennas Using MoM-Based Algorithms: Wire-Grid versus Surface Triangulation.
- Author
-
Alhaj Hasan, Adnan, Kvasnikov, Aleksey A., Klyukin, Dmitriy V., Ivanov, Anton A., Demakov, Alexander V., Mochalov, Dmitry M., and Kuksenko, Sergei P.
- Subjects
- *
FINITE difference time domain method , *ANTENNAS (Electronics) , *BOW-tie antennas , *SPIRAL antennas , *PLANAR antennas , *HORN antennas , *TRIANGULATION , *ALGORITHMS - Abstract
This paper focuses on antenna modeling using wire-grid and surface triangulation as two of the most commonly used MoM-based approaches in this field. A comprehensive overview is provided for each of them, including their history, applications, and limitations. The mathematical background of these approaches is briefly presented. Two working algorithms were developed and described in detail, along with their implementations using acceleration techniques. The wire-grid-based algorithm enables modeling of arbitrary antenna solid structures using their equivalent grid of wires according to a specific modeling recommendation proposed in earlier work. On the other hand, the surface triangulation-based algorithm enables calculation of antenna characteristics using a novel excitation source model. Additionally, a new mesh generator based on the combined use of the considered algorithms is developed. These algorithms were used to estimate the characteristics of several antenna types with different levels of complexity. The algorithms computational complexities were also obtained. The results obtained using these algorithms were compared with those obtained using the finite difference time domain numerical method, as well as those calculated analytically and measured. The analysis and comparisons were performed on the example of a rectangle spiral, a spiral, rounded bow-tie planar antennas, biconical, and horn antennas. Furthermore, the validity of the proposed algorithms is verified using the Monte Carlo methodology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.