1,083 results
Search Results
2. Science Mapping Research on Social Studies Education: A Bibliometric Analysis of International Publications
- Author
-
Palaz, Tevfik
- Abstract
In this study, international research papers by Turkish scholars on social studies education were investigated. The sample was selected among published journals of education indexed in the Web of Science (WoS) database, such as Social Sciences Citation Index (SSCI), Emerging Sources Citation Index (ESCI), and Science Citation Index Expanded (SCI-Expanded). The obtained data were analyzed via the bibliometric analysis method using version 1.6.17 of VOSviewer software. The results revealed that the first publication in the relevant indexes was released in 2005, and after 2007 the number of publications showed an increasing trend. In addition, it was found that "Educational Sciences-Theory & Practice" and "Education and Science" were among the international journals that most frequently published papers on social studies education, while Kaya Yilmaz, Arife Figen Ersoy, and Handan Deveci were the most cited authors. Results also revealed that Anadolu University, Marmara University, and Gazi University were identified as the institutions that published most papers while they were also cited most. Finally, the most frequently used common keywords were determined as "social studies", "social studies education", "pre-service social studies teachers"; "academic achievement", "citizenship education" and "values education".
- Published
- 2022
3. Torn-Paper Coding.
- Author
-
Shomorony, Ilan and Vahid, Alireza
- Subjects
- *
SEQUENTIAL analysis , *DATA warehousing - Abstract
We consider the problem of communicating over a channel that randomly “tears” the message block into small pieces of different sizes and shuffles them. For the binary torn-paper channel with block length $n$ and pieces of length ${\mathrm{ Geometric}}(p_{n})$ , we characterize the capacity as $C = e^{-\alpha }$ , where $\alpha = \lim _{n\to \infty } p_{n} \log n$. Our results show that the case of ${\mathrm{ Geometric}}(p_{n})$ -length fragments and the case of deterministic length- $(1/p_{n})$ fragments are qualitatively different and, surprisingly, the capacity of the former is larger. Intuitively, this is due to the fact that, in the random fragments case, large fragments are sometimes observed, which boosts the capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. Measuring well-being at organizational context: exploring the Better Life Index as a measurement tool
- Author
-
Dias, Susana, Luís, Sílvia, and Cruz, Bernardo
- Published
- 2024
- Full Text
- View/download PDF
5. Generalizability of Dynamic Fit Index, Equivalence Testing, and Hu & Bentler Cutoffs for Evaluating Fit in Factor Analysis
- Author
-
Daniel McNeish
- Abstract
Factor analysis is often used to model scales created to measure latent constructs, and internal structure validity evidence is commonly assessed with indices like SRMR, RMSEA, and CFI. These indices are essentially effect size measures and definitive benchmarks regarding which values connote reasonable fit have been elusive. Simulations from the 1990s suggesting possible benchmark values are among the most highly cited methodological papers across any discipline. However, simulations have suggested that fixed benchmarks do not generalize well -- fit indices are systematically impacted by characteristics like the number of items and the magnitude of the loadings, so fixed benchmarks can confound misfit with model characteristics. Alternative frameworks for creating customized, model-specific benchmarks have recently been proposed to circumvent these issues but they have not been systematically evaluated. Motivated by two empirical applications where different methods yield inconsistent conclusions, two simulation studies are performed to assess the ability of three different approaches to correctly classify models that are correct or misspecified across different conditions. Results show that dynamic fit indices and equivalence testing both improved upon the traditional Hu & Bentler benchmarks and dynamic fit indices appeared to be least confounded with model characteristics in the conditions studied. [This paper was published in "Multivariate Behavioral Research" v58 n1 p195-219 2023.]
- Published
- 2023
- Full Text
- View/download PDF
6. Optimizing Image Captioning Algorithm to Facilitate English Writing
- Author
-
Xiaxia Cao, Yao Zhao, and Xiang Li
- Abstract
Various studies have been conducted on applying intelligent recognition technology, especially speech recognition technology to improve English learning ability, mostly listening and speaking. However, few studies have touched on how image-to-text recognition technology can be used for writing. The present research was conducted to fill this gap by exploring the optimization of a deep-learning-based image captioning algorithm to facilitate English writing, so as to enable learners to break the time and space limitations and learn English writing (including sentence patterns, spelling, vocabulary, and grammar) anytime and anywhere by taking pictures. Therefore, this paper focused on image captioning based on CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory), using DenseNet201 or Vision Transformer trained on the ImageNet-1K image classification dataset as the image encoder and LSTM as the decoder. First, pre-training was performed on the Flickr8k dataset. After selecting the best-trained model as the pre-trained weight model for the COCO dataset, fine-tuning optimization was performed on the COCO dataset, and the attention mechanism was used to design the ablation experiment. The BLEU-4, CIDEr, METEOR, and ROUGE evaluation indexes of the optimized model on the test set were 0.3437,1.121,0.2750, and 0.5117, respectively. The study results showed that the convergence of the model was accelerated and had better performance. The model was used to automatically caption 12 images that had never been used during the training process. The descriptions generated by the optimized image captioning algorithm have lexical and syntactic accuracy, and matched what the images expressed, showing that this improved algorithm could be used as a learning tool to help English learners improve lexical and syntactic acquisition to promote writing through the generated descriptions of the pictures taken anytime and anywhere in real-life situations.
- Published
- 2024
- Full Text
- View/download PDF
7. Developing Learning and Participation in Schools: Using the Index for Inclusion in Spain Lessons Learned and Common Challenges
- Author
-
Echeita, Gerardo, Simón, Cecilia, Sandoval, Marta, and Muñoz, Yolanda
- Abstract
This paper presents a documentary review in Spain on the uses and experiences of school change with Index for Inclusion materials (Booth and Ainscow, 2000, 2011) during the last 15 years. A brief description of the Spanish educational system is made in order to contextualise this analysis. The initiatives are grouped into three categories. Firstly, it has served as a source of partial inspiration, primarily in research contexts, to generate tools for analysis. Secondly, it has been taken up in teacher education activities. In this context, the index has been especially useful to help to construct and share a common language about inclusive education. The third category encompasses projects that have used the index in the evaluation and improvement processes to guide inclusive development in schools. Some 'lessons learned' are shared and common challenges are discussed, among them the need to give greater emphasis to the conditions which support schools on their journey to become more inclusive.
- Published
- 2023
- Full Text
- View/download PDF
8. Search tools and scholarly citation practices in literary studies
- Author
-
Lehnen, Carl A. and Insua, Glenda M.
- Published
- 2022
- Full Text
- View/download PDF
9. A bibliometric analysis and science mapping of scientific publications of Alzahra University during 1986–2019
- Author
-
Doulani, Abbas
- Published
- 2021
- Full Text
- View/download PDF
10. Applying modified golden jackal optimization to intrusion detection for Software-Defined Networking.
- Author
-
Qiu, Feng, Xu, Hui, and Li, Fukui
- Subjects
SOFTWARE-defined networking ,ALGORITHMS ,INTRUSION detection systems (Computer security) ,INDEXES ,COMPUTER network architectures - Abstract
As a meta-heuristic algorithm, the Golden Jackal Optimization (GJO) algorithm has been widely used in traditional network intrusion detection due to its ease of use and high efficiency. This paper aims to extend its application to the emerging field of Software-Defined Networking (SDN), which is a new network architecture. To adapt the GJO for SDN intrusion detection, a modified Golden Jackal Optimization (mGJO) is proposed to enhance its performance with the use of two strategies. First, an Elite Dynamic Opposite Learning strategy operates during each iteration to find solutions opposite to the current global optimal solutions, which increases population diversity. Second, an updating strategy based on the Golden Sine II Algorithm is utilized in the exploitation phase to update the position information of the golden jackal pairs, which accelerates the search for the best feature subset indexes. To validate the feasibility of the mGJO algorithm, this paper first assesses its optimization capability using benchmark test functions. Then, four UCI datasets and the NSL-KDD dataset are used to test the classification capability of the mGJO algorithm and its application in traditional network intrusion detection. Furthermore, the InSDN dataset is used to validate the feasibility of the mGJO algorithm for SDN intrusion detection. The experimental results show that, when the mGJO algorithm is applied to SDN for intrusion detection, the various indexes of classification and the selection of feature subsets achieve better results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Some Basic Properties of the Second Multiplicative Zagreb Eccentricity Index.
- Author
-
Azari, Mahdieh
- Subjects
GRAPH grammars ,INDEXES ,GRAPH theory ,COMBINATORICS ,EXTREMAL problems (Mathematics) ,TOPOLOGICAL dynamics - Abstract
The second multiplicative Zagreb eccentricity index E*
2 (G) of a simple connected graph G is expressed as the product of the weights ε(a)εG(b) over all edges ab of G, where ε(a) stands for the eccentricity of the vertex a in G. In this paper, some extremal problems on the E*2 index over some special graph classes including trees, unicyclic graphs and bicyclic graphs are examined, and the corresponding extremal graphs are characterized. Besides, the relationships between this vertex-eccentricity-based graph invariant and some well-known parameters of graphs and existing graph invariants such as the number of vertices, number of edges, minimum vertex degree, maximum vertex degree, eccentric connectivity index, connective eccentricity index, first multiplicative Zagreb eccentricity index and second multiplicative Zagreb index are investigated. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
12. Weight Enumerators and Cardinalities for Number-Theoretic Codes.
- Author
-
Nozaki, Takayuki
- Subjects
HAMMING weight ,RINGS of integers ,BINARY codes ,LINEAR codes ,ERROR-correcting codes - Abstract
The number-theoretic code is a class of codes defined by single or multiple congruences. These codes are mainly used for correcting insertion and deletion errors, and for correcting asymmetric errors. This paper presents a formula for a generalization of the complete weight enumerator for the number-theoretic codes. This formula allows us to derive the weight enumerators and cardinalities for the number-theoretic codes. As a special case, this paper provides the Hamming weight enumerators and cardinalities of the non-binary Tenengolts’ codes, correcting single insertion or deletion. Moreover, we show that the formula deduces the MacWilliams identity for the linear codes over the ring of integers modulo $r$. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. A Collective Approach to Scholar Name Disambiguation.
- Author
-
Luo, Dongsheng, Ma, Shuai, Yan, Yaowei, Hu, Chunming, Zhang, Xiang, and Huai, Jinpeng
- Subjects
WIDE area networks ,SCHOLARS ,PERSONAL names - Abstract
Scholar name disambiguation remains a hard and unsolved problem, which brings various troubles for bibliography data analytics. Most existing methods handle name disambiguation separately that tackles one name at a time, and neglect the fact that disambiguation of one name affects the others. Further, it is typically common that only limited information is available for bibliography data, e.g., only basic paper and citation information is available in DBLP. In this study, we propose a collective approach to name disambiguation, which takes the connection of different ambiguous names into consideration. We reformulate bibliography data as a heterogeneous multipartite network, which initially treats each author reference as a unique author entity, and disambiguation results of one name propagate to the others of the network. To further deal with the sparsity problem caused by limited available information, we also introduce word-word and venue-venue similarities, and we finally measure author similarities by assembling similarities from four perspectives. Using real-life data, we experimentally demonstrate that our approach is both effective and efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. A Transaction Cardinality Estimation Approach for QoS-Adjustable Intelligent Blockchain Systems.
- Author
-
Xu, Hao, Liu, Xiulong, Liang, Zhelin, Sun, Hongyan, Xue, Weilian, Wang, Jianrong, and Li, Keqiu
- Subjects
BLOCKCHAINS ,CRYPTOCURRENCIES ,SEARCH algorithms ,QUALITY of service - Abstract
The rapid development of the blockchain leads to a blowout of on-chain transactions, contracts, and currencies, which will further accelerate the increase of data. The existing blockchain systems typically support exact transaction queries, which, however, cannot satisfy the QoS requirements with intelligent adjustment in the blockchain systems. To this end, this paper takes the first step to define and address the practically important problem of transaction cardinality estimation for QoS-adjustable intelligent blockchain systems. We first establish a mathematical relationship between the bit string and transaction cardinality. Thus, we can leverage the number of leading 1s of the obtained bit string to estimate the transaction cardinality. We then improve the block header and body with a corresponding search algorithm to access bit strings in blocks. We also propose an estimation protocol with intelligent adjustable QoS to support accuracy-guaranteed and efficiency-optimized estimation. Finally, we design an authentication scheme and guarantee the reliability of our protocol through rigorous theoretical derivation. When achieving the transaction cardinality estimation in blockchain, two technical challenges need to be addressed. (i) To ensure efficient, verifiable, and overhead-saving bit string accessing mechanism in blockchain, we propose the Merkle Cardinality Tree (MCT) and target block filtering mechanism based on Bloom Filter (BF) in off-chain and improve on-chain block header by joining the abstract of MCT and BF. (ii) To improve estimation efficiency while guaranteeing accuracy requirements in hybrid blockchain scheme, we propose a Dynamic One-round Sampling-based cardinality Estimation (DOSE) protocol and integrate BF-DOSE to intelligently accelerate estimation. We build MCT in Ethereum and store the MCT Root in the block header for estimation authentication. Extensive experiments reveal that our BF-DOSE protocol can well satisfy various accuracy and efficiency requirements of QoS-adjustable intelligent blockchain systems, and is one to two orders of magnitude faster compared with benchmark schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. Constructions of MDS, Near MDS and Almost MDS Codes From Cyclic Subgroups of F* q 2.
- Author
-
Heng, Ziling, Li, Chengju, and Wang, Xinran
- Subjects
CYCLIC codes ,LINEAR codes ,CYCLIC loads - Abstract
Linear codes achieving or nearly achieving the Singleton bound are interesting in both theory and practice. The objective of this paper is to construct several infinite families of MDS, near MDS and almost MDS codes from some special cyclic subgroups of ${\mathbb {F}}_{q^{2}}^{*}$. To this end, the augmentation and extension techniques are used. The codes in this paper have flexible parameters and their lengths could be large. The minimum linear locality of the codes constructed in this paper is also studied. Some infinite families of optimal linearly locally recoverable codes are obtained. Besides, some codes in this paper are proved to be proper for error detection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. Expected Value of Zagreb Indices of Random Bipartite Graphs.
- Author
-
Samaie, Sara, Iranmanesh, Ali, Tehranian, Abolfazl, and Hosseinzadeh, Mohammad Ali
- Subjects
BIPARTITE graphs ,EXPECTED returns ,GRAPH theory ,INDEXES ,RANDOM graphs ,COMBINATORICS - Abstract
In this paper, we calculate the expected values of the first and second Zagreb indices, denoted as E(M
1 ) and E(M2 ) respectively, as well as the expected value of the forgotten index, E(F), for two models of random bipartite graphs. To evaluate our findings, we establish the growth rate by demonstrating that for a random bipartite graph G of order n in either model, the expected value of M1 (G) is O(n³). Furthermore, we prove that the expected values of M2 (G) and F(G) are both O(n4 ). [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
17. Analytical Adequacy Evaluation for Power Consumers With UPS in Distribution Networks.
- Author
-
Yong, Pei, Zhang, Ning, Li, Yaowang, Hou, Qingchun, Liu, Yuxiao, Ci, Song, and Kang, Chongqing
- Abstract
An uninterruptible power supply (UPS) can reduce power failure loss by responding to power demand during distribution network failures. For reliability-sensitive power consumers, deploying UPSs is a solution for improving power supply reliability. Nevertheless, because of UPS devices’ energy limits and potential failure probability, power consumers with UPSs cannot guarantee 100% adequacy. In future power systems with frequent reconfiguration and massive storage facilities, the power supply adequacy of a consumer with respect to the network configuration and the storage capacity will need to be frequently evaluated. Furthermore, the analytical formulation of a consumer with a UPS should be investigated since the simulation-based method might witness low efficiency and poor convergency. Therefore, this paper proposes a novel analytical availability index calculation framework for adequacy evaluation. The framework models the uncertainties of distribution networks and UPS devices as stochastic processes. Then, the availability index calculation formula is acquired based on the stochastic modeling. Compared with existing methods, this paper incorporates UPS devices’ capacity and characteristics. Moreover, the distribution network configuration and protection device placement are considered. Case studies on an illustrative distribution network, the modified RBTS system, and a real distribution system in China validate the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Testing Scenario Library Generation for Connected and Automated Vehicles, Part II: Case Studies.
- Author
-
Feng, Shuo, Feng, Yiheng, Sun, Haowei, Bao, Shan, Zhang, Yi, and Liu, Henry X.
- Abstract
Testing scenario library generation (TSLG) is a critical step for the development and deployment of connected and automated vehicles (CAVs). In Part I of this study, a general method for TSLG is proposed, and theoretical properties are investigated regarding the accuracy and efficiency of CAV evaluation. This paper aims to provide implementation examples and guidelines, and to enhance the proposed methodology under high-dimensional scenarios. Three typical cases, including cut-in, highway-exit, and car-following, are designed and studied in this paper. For each case, the process of library generation and CAV evaluation is elaborated. To address the challenges brought by high dimensionality, the proposed method is further enhanced by reinforcement learning technique. For all three cases, results show that the proposed method can accelerate the CAV evaluation process by multiple magnitudes with same evaluation accuracy, if compared with the on-road test method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Data-Driven Production Planning Models for Wafer Fabs: An Exploratory Study.
- Author
-
Volker, Tobias and Monch, Lars
- Subjects
PRODUCTION planning ,SEMICONDUCTOR wafers ,WORK in process ,SEMICONDUCTOR devices - Abstract
Cycle time, which is of order of ten weeks for most products in semiconductor wafer fabrication facilities (wafer fabs), must be explicitly considered in production planning models. Cycle times depend nonlinearly on the resource workload in a wafer fab. Different data-driven (DD) production planning formulations are studied in this paper. Such formulations are based on a set of system states representing the congestion behavior of a wafer fab with work in process (WIP) and resulting output levels. Different WIP-output relations in the DD formulations are investigated. In addition, different methods are proposed to gather representative sets of system states. The DD formulations are compared with the Allocated Clearing Function (ACF) formulation with respect to profit and cost values using simulation models of a scaled-down and a large-sized multi-product wafer fab, respectively. The simulation results show that some DD variants are able to outperform the ACF formulation under several experimental conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Composite Index for Comprehensive Assessment of Power System Transient Stability.
- Author
-
Ye, Xinlin and Milanovic, Jovica
- Subjects
ELECTRIC transients ,PRINCIPAL components analysis ,COMPOSITE construction - Abstract
This paper proposes a Principal Component Analysis (PCA)-based method to construct composite indices to rapidly assess power system transient stability. By assigning appropriate weights to a few selected sub-indicators, a composite index can be constructed to guarantee a better coverage of worst-case stability scenarios of the power system. This paper provides an automatic method to construct a composite index with four sub-indicators calculated by the integral of acceleration, speed deviation and rotor angle of generators over a certain integration period using PCA. The effectiveness of the sub-indicators is validated first, followed by a comprehensive example of process of composite index construction, and the assessment of the influence of the effect of integration period on the performance of the composite index. High accuracy of classification has been demonstrated using composite index with appropriate settings of the integration periods of the sub-indicators. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. An ENS-Oriented Voltage Protection Scheme for Inverter-Based Generators in Active Distribution Networks.
- Author
-
Ebrahimi, Hossein, Yazdaninejadi, Amin, Golshannavaz, Sajjad, and Teimourzadeh, Saeed
- Abstract
This paper unveils that maintaining a proper voltage protection for inverter-based distributed generations (IBDGs) using overcurrent relays and during the power grids’ faults with considerable resistance stands as a complicated issue. To overcome this challenge, this paper presents a new protection scheme through developing a voltage index (VI) and launching a new characteristic that concentrates on minimizing energy-not-supplied (ENS). If the developed voltage index is in place, the near area faults with considerable resistance could be effectively discriminated from those at a far distance. Moreover, the adopted characteristic represents two operation modes known by fast and slow modes. For the faults in the vicinity of the IBDG, independent from resistances, the fast part of the proposed characteristic and VI are jointly corresponded to clear the faults swiftly. Moreover, to satisfy coordination time interval (CTI) among relays pairs, the slow part acts in the conventional manner which is corresponded during the backup process. To evaluate the performance of the proposed method, numerical studies are carried out on IEEE 33-bus test system. Results show that the ENS index is enhanced while meeting IBDGs’ voltage protection requirements and satisfying selectivity tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Measuring and Fostering Diversity in Affective Computing Research.
- Author
-
Hupont, Isabelle, Tolan, Songul, Frau, Pedro, Porcaro, Lorenzo, and Gomez, Emilia
- Abstract
This work presents a longitudinal study of diversity among the Affective Computing research community members. We explore several dimensions of diversity, including gender, geography, institutional types of affiliations and selected combinations of dimensions. We cover the last 10 years of the IEEE Transactions on Affective Computing (TAFFC) journal and the International Conference on Affective Computing and Intelligent Interaction (ACII), the primary sources of publications in Affective Computing. We also present an analysis of diversity among the members of the Association for the Advancement of Affective Computing (AAAC). Our findings reveal a “leaky pipeline” in the field, with a low –albeit slowly increasing over the years– representation of women. They also show that academic institutions clearly dominate publications, ahead of industry and governmental centres. In terms of geography, most publications come from the USA, contributions from Latin America or Africa being almost non-existent. Lastly, we find that diversity in the characteristics of researchers (gender and geographic location) influences diversity in the topics. To conclude, we analyse initiatives that have been undertaken in other AI-related research communities to foster diversity, and recommend a set of initiatives that could be applied to the Affective Computing field to increase diversity in its different facets. The diversity data collected in this work are publicly available, ensuring strict personal data protection and governance rules. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. A Cycle by Cycle FSK Demodulator With High Sensitivity of 1% Frequency Modulation Index for Implantable Medical Devices.
- Author
-
Razavi Haeri, Ali Asghar and Safarian, Aminghasem
- Subjects
ARTIFICIAL implants ,MEDICAL equipment ,WIRELESS power transmission ,RADIO detectors ,DATA transmission systems ,FREQUENCY shift keying ,COMPLEMENTARY metal oxide semiconductors ,WIRELESS sensor networks - Abstract
This paper presents a cycle by cycle Frequency Shift Keying (FSK) demodulator, able to demodulate a FSK signal with 1% frequency modulation index (MI), in a single cycle. Based on the proposed demodulation scheme, a high rate data transmission link can be established through a high-Q inductive coupling link, breaking the basic tradeoff between the power transfer efficiency (PTE) and data rate in single carrier wireless power and data transfer systems. Designed and simulated with $0.18\mu m$ CMOS process, the proposed FSK demodulator, detects successfully a 5Mbps data with a carrier frequency of 5MHz. A test chip is fabricated in 180nm CMOS technology. Measurement results shows that the demodulator is able to demodulate the cycle-by-cycle modulated FSK signals with low modulation index of 2.5%, with a BER of $1.24\times 10^{-5}$. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Learning to Delay in Ride-Sourcing Systems: A Multi-Agent Deep Reinforcement Learning Framework.
- Author
-
Ke, Jintao, Xiao, Feng, Yang, Hai, and Ye, Jieping
- Subjects
REINFORCEMENT learning ,MULTIAGENT systems ,DEEP learning ,COMBINATORIAL optimization - Abstract
Ride-sourcing services are now reshaping the way people travel by effectively connecting drivers and passengers through mobile internets. Online matching between idle drivers and waiting passengers is one of the most key components in a ride-sourcing system. The average pickup distance or time is an important measurement of system efficiency since it affects both passengers’ waiting time and drivers’ utilization rate. It is naturally expected that a more effective bipartite matching (with smaller average pickup time) can be implemented if the platform accumulates more idle drivers and waiting passengers in the matching pool. A specific passenger request can also benefit from a delayed matching since he/she may be matched with closer idle drivers after waiting for a few seconds. Motivated by the potential benefits of delayed matching, this paper establishes a two-stage framework which incorporates a combinatorial optimization and multi-agent deep reinforcement learning methods. The multi-agent reinforcement learning methods are used to dynamically determine the delayed time for each passenger request (or the time at which each request enters the matching pool), while the combinatorial optimization conducts an optimal bipartite matching between idle drivers and waiting passengers in the matching pool. Four tailored reinforcement learning methods, delayed multi-agent deep Q learning (Delayed-M-DQN), delayed multi-agent actor-critic (Delayed-M-A2C), delayed multi-agent Proximal Policy Optimization (Delayed-M-PPO), and delayed multi-agent actor-critic with experience replay (Delayed-M-ACER), are developed. Through extensive empirical experiments with a well-designed simulator, we show that the proposed framework is able to remarkably improve system performances, by well balancing the trade-off among pick-up time, matching time, successful matching rate. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Optimal Myopic Policy for Restless Bandit: A Perspective of Eigendecomposition.
- Author
-
Wang, Kehao, Yu, Jihong, Chen, Lin, Zhou, Pan, and Win, Moe Z.
- Abstract
This paper considers restless multiarmed bandit (RMAB) problem involving partially observed Markov decision processes with heterogeneous state transition matrices in discrete time slots. Due to the notorious PSPACE-hardness of the generic RMAB, we turn to the myopic policy, i.e., scheduling the best processes each time, since the myopic policy is one of the policies with linear computation complexity and popularly adopted in practice. Intuitively, the myopic policy is not optimal because it only exploits information without exploring. In this paper, to show the optimality of the myopic policy, we first generalize the concept of the first order stochastic dominance ordering and then decompose each state transition matrix into a weighted sum of a series of eigenmatrices in which the weights are determined by the corresponding eigenvalues. Furthermore, we identify two sets of sufficient conditions on both eigenvalues and eigenmatrices to guarantee the optimality of the myopic policy for two instances, respectively. The theorectical results provide some insights into the structure of the optimal policy for the generic RMAB. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Quantifying the Contribution of Dynamic Reactive Power Compensators on System Strength at LCC-HVdc Converter Terminals.
- Author
-
Zhang, Yi and Gole, Aniruddha
- Subjects
REACTIVE power ,SHORT circuits ,SYNCHRONOUS capacitors ,STATIC VAR compensators - Abstract
This paper presents improved indices to evaluate the contribution of reactive power compensators at HVdc converter terminals. The presence of such compensators impacts converter performance, such as the maximum available power (MAP) limit, susceptance to commutation failure, fault recovery time and temporary over voltage. Traditionally, the Effective Short Circuit Ratio (ESCR) has been used to indicate system strength. However, this index cannot be directly applied when power-electronics based converters are used to provide the reactive power support. The approach of this paper is to use an improved form of the ‘Apparent increase in Short Circuit Ratio’ (AISCR) index to quantify the impact of the compensator on the HVdc system. This index is evaluated by comparing the performance with the reactive power device with a system without the device, but having the same performance. The paper shows that a single AISCR index cannot quantify all behaviors and suggest modifications to AISCR for each of several HVdc phenomena. In this paper two types of compensators are considered – the Synchronous Compensator and the Static Synchronous Compensator (STATCOM). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering.
- Author
-
Li, Yanni, Li, Hui, Wang, Zhi, Liu, Bing, Cui, Jiangtao, and Fei, Hang
- Subjects
STREAMING video & television ,PARALLEL algorithms ,BIG data ,HEURISTIC algorithms ,ALGORITHMS ,ADAPTIVE natural resource management - Abstract
Many big data applications produce a massive amount of high-dimensional, real-time, and evolving streaming data. Clustering such data streams with both effectiveness and efficiency are critical for these applications. Although there are well-known data stream clustering algorithms that are based on the popular online-offline framework, these algorithms still face some major challenges. Several critical questions are still not answer satisfactorily: How to perform dimensionality reduction effectively and efficiently in the online dynamic environment? How to enable the clustering algorithm to achieve complete real-time online processing? How to make algorithm parameters learn in a self-supervised or self-adaptive manner to cope with high-speed evolving streams? In this paper, we focus on tackling these challenges by proposing a fully online data stream clustering algorithm (called ESA-Stream) that can learn parameters online dynamically in a self-adaptive manner, speedup dimensionality reduction, and cluster data streams effectively and efficiently in an online and dynamic environment. Experiments on a wide range of synthetic and real-world data streams show that ESA-Stream outperforms state-of-the-art baselines considerably in both effectiveness and efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. Partially Observable Minimum-Age Scheduling: The Greedy Policy.
- Author
-
Shao, Yulin, Cao, Qi, Liew, Soung Chang, and Chen, He
- Subjects
PARTIALLY observable Markov decision processes ,WIRELESS sensor networks ,SENSOR networks ,GREEDY algorithms - Abstract
This paper studies the minimum-age scheduling problem in a wireless sensor network where an access point (AP) monitors the state of an object via a set of sensors. The freshness of the sensed state, measured by the age-of-information (AoI), varies at different sensors and is not directly observable to the AP. The AP has to decide which sensor to query/sample in order to get the most updated state information of the object (i.e., the state information with the minimum AoI). In this paper, we formulate the minimum-age scheduling problem as a multi-armed bandit problem with partially observable arms and explore the greedy policy to minimize the expected AoI sampled over an infinite horizon. To analyze the performance of the greedy policy, we 1) put forth a relaxed greedy policy that decouples the sampling processes of the arms, 2) formulate the sampling process of each arm as a partially observable Markov decision process (POMDP), and 3) derive the average sampled AoI under the relaxed greedy policy as a sum of the average AoI sampled from individual arms. Numerical and simulation results validate that the relaxed greedy policy is an excellent approximation to the greedy policy in terms of the expected AoI sampled over an infinite horizon. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. Extended Signed Quadrature Spatial Modulation System With Multi-User Support.
- Author
-
Habbash, Alaa H. Al, Abu-Hudrouss, Ammar M., Astal, Mohammed Taha O. El, Albreem, Mahmoud A., and Ikki, Salama S.
- Subjects
SPATIAL systems ,BIT error rate ,SIGNAL detection ,COMPUTATIONAL complexity - Abstract
Signed quadrature spatial modulation (SQSM) was recently introduced to enhance the throughput of spatial modulation (SM) in multiple-input multiple-output (MIMO) systems. This strategy involves independently transmitting the real and imaginary components of a symbol and its inverse from four independent antennas. In this paper, an extended SQSM (ESQSM) system is proposed. It combines $K$ SQSM constellations and transmits them from the same transmit-antenna set with the aim of realizing a $K$ -fold improvement in the spectral efficiency (SE). The proposed ESQSM employs the average power of the $K$ SQSM constellations as an additional dimension for transmission. Performance of the proposed ESQSM surpasses that of other state-of-art SM systems such as the QSM, DSM, IQSM SQSM, and EQSM by 13 dB, 11 dB, 10.55 dB, 10 dB, and 6.8 dB, respectively. In this paper, we also propose an efficient ESQSM with a multi-user (ESQSM-MU) system inspired by the ESQSM ability in increasing the SE. The proposed ESQSM-MU system offers a significant bit error rate (BER) improvement and a higher capacity (i.e., $5K$ -users) compared to the current non orthogonal multiple access-SM (NOMA-SM) and SM-assisted multi-antenna NOMA (SM-AMA-NOMA) systems. Moreover, an efficient low-complexity detector is introduced for the ESQSM signal detection, promising a 91.2% reduction in the computational complexity of ESQSM and ESQSM-MU systems relative to the maximum likelihood (ML) with a trivial loss in performance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. Exploration of Science and Technology Interaction: A Case Study on Taxol.
- Author
-
Suominen, Arho, Ranaei, Samira, and Dedehayir, Ozgur
- Subjects
PACLITAXEL ,ANTINEOPLASTIC agents ,PATENTS - Abstract
Linkages between science and technology have been extensively studied using nonpatent literature citations or author-inventor matching. These methods suffer from limitations, such as the lack of citations to relevant documents or challenges with the disambiguation of author–inventor linkages. To mitigate these limitations, this paper uses Latent Dirichlet Allocation to create topic-based linkages between publications and patents based on the semantic content in the documents. The approach allows for the detection of topical overlap between patent and scientific publications, highlighting topical areas shared by research and application. Using a case study on “Taxol,” a cancer drug, with in total 26 475 documents retrieved from EuropePMC database the study illustrates the performance of the approach. The study offers qualitative and quantitative support that the approach is valuable in detecting patent and publication linkages. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. Minimum Feedback for Collision-Free Scheduling in Massive Random Access.
- Author
-
Kang, Justin and Yu, Wei
- Subjects
SCHEDULING ,MAXIMA & minima ,ALGORITHMS - Abstract
Consider a massive random access scenario in which a small set of $k$ active users out of a large number of $n$ potential users need to be scheduled in $b\ge k$ slots. What is the minimum common feedback to the users needed to ensure that scheduling is collision-free? Instead of a naive scheme of listing the indices of the $k$ active users in the order in which they should transmit, at a cost of $k\log (n)$ bits, this paper shows that for the case of $b=k$ , the rate of the minimum fixed-length common feedback code scales only as $k \log (e)$ bits, plus an additive term that scales in $n$ as $\Theta (\log \log (n))$ for fixed $k$. If a variable-length code can be used, assuming uniform activity among the users, the minimum average common feedback rate still requires $k \log (e)$ bits, but the dependence on $n$ can be reduced to $O(1)$. When $b>k$ , the number of feedback bits needed for collision-free scheduling can be significantly further reduced. Moreover, a similar scaling on the minimum feedback rate is derived for the case of scheduling $m$ users per slot, when $k \le mb$. The problem of constructing a minimum collision-free feedback scheduling code is connected to that of constructing a perfect hashing family, which allows practical feedback scheduling codes to be constructed from perfect hashing algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Multi-Objective Optimization-Based Recommendation for Massive Online Learning Resources.
- Author
-
Li, Hui, Zhong, Zhaoman, Shi, Jun, Li, Haining, and Zhang, Yong
- Abstract
As an important research topic in intelligent teaching systems, personalized recommendation services of learning resources can effectively solve the “information overload” problem and provide effective learning. However, the traditional learning resource recommendation technology mainly aims to improve recommendation accuracy and cannot effectively ensure the diversity and novelty of recommendation results. In this paper, the learning resource recommendation task is modelled with a multi-objective optimization problem. This paper proposes the Multi-Objective Evolutionary Algorithm-based online learning Resource Recommendation Model to balance the system’s accuracy, novelty, and diversity. The proposed model includes the following four steps: learning clustering, optimization goal setting individual representation, and genetic operator. According to the experimental results, this algorithm can improve the recommendation performance of online learning resources. Compared with the existing recommendation algorithms, more accurate, diverse, and novel learning resource recommendation results can be obtained with the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. Dimension Reduced Channel Feedback for Reconfigurable Intelligent Surface Aided Wireless Communications.
- Author
-
Shen, Decai and Dai, Linglong
- Subjects
WIRELESS channels ,WIRELESS communications ,ANTENNA feeds ,CHANNEL estimation ,FEATURE extraction - Abstract
Reconfigurable intelligent surface (RIS) has recently received extensive research interest due to its capability to intelligently change the wireless propagation environment. For RIS-aided wireless communications in frequency division duplex (FDD) mode, channel feedback at the user equipment (UE) is essential for the base station (BS) to acquire the downlink channel state information (CSI). In this paper, a dimension reduced channel feedback scheme is proposed to reduce the channel feedback overhead by exploiting the single-structured sparsity of BS-RIS-UE cascaded channel. Since different UEs share the same sparse BS-RIS channel but have their respective RIS-UE channels, there are only limited non-zero column vectors in the BS-RIS-UE cascaded channel matrix, and different UEs share the same indexes of the non-zero columns. Thus, the downlink CSI can be decomposed into user-independent channel information (i.e., the indexes of non-zero columns) and user-specific channel information (i.e., the non-zero column vectors), where the former for all UEs can be fed back by only one UE, while the latter can be fed back with a fairly low overhead by different UEs, respectively. Simulation results show that, compared with the conventional method, the proposed scheme can reduce channel feedback overhead by more than 80% for RIS-aided wireless communications. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.
- Author
-
Chen, Hang, Ding, Cunsheng, Mesnager, Sihem, and Tang, Chunming
- Subjects
BOOLEAN functions ,ALGEBRAIC functions ,REED-Muller codes ,LINEAR codes ,BINARY codes ,CODING theory - Abstract
Boolean functions with high algebraic immunity are important cryptographic primitives in some stream ciphers. In this paper, two methodologies for constructing minimal binary codes from sets, Boolean functions and vectorial Boolean functions with high algebraic immunity, are proposed. More precisely, a general construction of new minimal codes using minimal codes contained in Reed-Muller codes and sets without nonzero low degree annihilators is presented. The other construction allows us to yield minimal codes from certain subcodes of Reed-Muller codes and vectorial Boolean functions with high algebraic immunity. Via these general constructions, infinite families of minimal binary linear codes of dimension $m$ and length less than or equal to $m(m+1)/2$ are obtained. Besides, a lower bound on the minimum distance of the proposed minimal linear codes is established. Conjectures and open problems are also presented. The results of this paper show that Boolean functions with high algebraic immunity have nice applications in several fields additionally to symmetric cryptography, such as coding theory and secret sharing schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
35. Degree-Based Function Index of Graphs with Given Connectivity.
- Author
-
Vetrík, Tomáš
- Subjects
MATHEMATICAL variables ,INDEXES ,GRAPH connectivity ,SYMMETRIC functions ,MOLECULAR connectivity index - Abstract
We investigate the index If (G) = vw2E(G) f(dG(v); dG(w)) of a graph G, where f is a symmetric function of two variables satisfying certain conditions, E(G) is the edge set of G, and dG(v) and dG(w) are the degrees of vertices v and w in G, respectively. Those conditions are satisfied by functions that can be used to define the general sum-connectivity index Xa, general Randic index Ra, general reduced second Zagreb index GRMa for some a 2 R, general Sombor index SOa;b, general augmented Zagreb index AZIa;b and by one other generalization Ma;b for some a; b 2 R. The general augmented Zagreb index is a new index defined in this paper. We obtain a sharp upper bound on If for graphs with given order and connectivity, and a sharp lower bound on If for 2-connected graphs with given order. Our upper bound holds for Ma;b and SOa;b where a; b ≥ 1; Xa and Ra where a ≥ 1; and GRMa where a > -1. Our lower bound holds for Ma;b where a ≥ 0 and b ≥ -a; SOa;b where a; b ≥ 0 or a; b = 0; AZIa;b where a ≥ -2 and b ≥ 0; Xa and Ra where a ≥ 0; and GRMa where a > -2. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. On Extremal Values Of Total Structure Connectivity and Narumi-Katayama Indices on the Class of all Unicyclic and Bicyclic Graphs.
- Author
-
Manian, Mohammad Ali, Heidarian, Shahram, and Haghani, Farhad Khaksar
- Subjects
TOPOLOGICAL graph theory ,INDEXES ,GEOMETRIC vertices ,SUBGRAPHS ,DENDRIMERS ,HYDROCARBONS - Abstract
The total structure connectivity and Narumi-Katayama indices of a simple graph G are defined as ... respectively, where du represents the degree of vertex u in G. In this paper, we determine the extremal values of total structure connectivity index on the class of unicyclic and bicyclic graphs and characterize the corresponding extremal graphs. In addition, we determine the bicyclic graphs extremal with respect to the Narumi-Katayama index. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Asymmetric Association of Resources: Conditions Under Which the Separation and Integration of Idea Generation and Implementation Support Product Innovation.
- Author
-
Blank, Tali Hadasa and Naveh, Eitan
- Subjects
RESEARCH & development ,ASSOCIATION of ideas ,TIME management ,CONCURRENT engineering - Abstract
This paper examines an alternative view of the use of resources in R&D teams and proposes a way to resolve the dispute between integration versus separation of idea generation and idea implementation concerning the achievement of high levels of product innovation. Contrary to the symmetric approach espoused by earlier studies, the hypotheses here are grounded in the notion that resources have an asymmetric association with idea generation and idea implementation. By asymmetric association we mean that resources have more impact on idea generation than on idea implementation. This paper considers the interactional relationship of two types of resources, time and financial budget, on idea generation and idea implementation. It is based on responses from 214 team members that belong to 40 R&D teams. The results support the existence of an asymmetric mechanism of association between resources and the idea generation and idea implementation climates. Furthermore, they demonstrate that the integration of idea generation and idea implementation is associated with high levels of product innovation when resources are available, while the separation of the two is associated with high levels of product innovation when resources are scarce. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Is Talking About the Future a Curse or a Blessing? The Effects of Future-Focused Message Framing on Fundraising Performance.
- Author
-
Lin, Yu-Ting, Wang, Wanxin, and Doong, Her-Sen
- Subjects
DIGITAL communications ,BLESSING & cursing ,FUNDRAISING ,INDIVIDUAL investors ,CROWD funding ,MANAGEMENT information systems - Abstract
The growth of crowdfunding has attracted interest from academics and managers alike. Crowdfunders are consumers in the sense that they consume start-up ideas now and their outputs in the future. Given that a crowdfunding platform is almost the only channel for entrepreneurial marketers to interactively communicate with consumers, it is pivotal to study the effectiveness of campaign message design. Thus, the goals of this paper are, first, what impact does future-focused message framing have on seeking seed-stage finance when promoting novel ideas to retail investors who may become future consumers? Second, what are other factors that can be further combined as digital communication tools to effectively improve fundraising performance? We collected a dataset of 3361 reward-based crowdfunding campaigns on Kickstarter, the results of which show that a future-focused campaign has a negative impact on the amount of funds raised. In order to reduce such adverse effects on fundraising, campaigners’ extensive engagement is necessary especially when only a handful of reward options are available. This paper highlights the critical role of future focus in driving digital communication effectiveness and offers important implications for research and practice. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Some Punctured Codes of Several Families of Binary Linear Codes.
- Author
-
Wang, Xiaoqiang, Zheng, Dabin, and Ding, Cunsheng
- Subjects
BINARY codes ,LINEAR codes ,BENT functions ,FINITE fields ,BOOLEAN functions ,FAMILIES - Abstract
Two general constructions of linear codes with functions over finite fields have been extensively studied in the literature. The first one is given by C(ƒ) = {Tr(aƒ(x) + bx)
x∈Fqm *: a, b ∈ Fqm }, where q is a prime power, Fqm * = Fqm \ {0}, Tr is the trace function from Fqm to Fq , and ƒ(x) is a function from Fqm to Fqm with ƒ(0) = 0. Almost bent functions, quadratic functions and some monomials on F2m were used in the first construction, and many families of binary linear codes with few weights were obtained in the literature. This paper studies some punctured codes of these binary codes. Several families of binary linear codes with few weights and new parameters are obtained in this paper. Several families of distance-optimal binary linear codes with new parameters are also produced in this paper. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
40. Shortened Linear Codes Over Finite Fields.
- Author
-
Liu, Yang, Ding, Cunsheng, and Tang, Chunming
- Subjects
LINEAR codes ,REED-Muller codes ,HAMMING codes ,HAMMING weight ,FINITE fields ,RESEARCH methodology ,CYCLIC codes - Abstract
The puncturing and shortening techniques are two important approaches to constructing new linear codes from old ones. In the past 70 years, a lot of progress on the puncturing technique has been made, and many works on punctured linear codes have been done. Many families of linear codes with interesting parameters have been obtained with the puncturing technique. However, little research on the shortening technique has been done and there are only a handful references on shortened linear codes. The first objective of this paper is to prove some general theory for shortened linear codes. The second objective is to study some shortened codes of the Hamming codes, Simplex codes, some Reed-Muller codes, and ovoid codes. Eleven families of optimal shortened codes over finite fields are presented in this paper. As a byproduct, five infinite families of 2-designs are also constructed from some of the shortened codes presented in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
41. Multi-Block Ascending Auctions for Effective 5G Licensed Shared Access.
- Author
-
Chouayakh, Ayman, Bechler, Aurelien, Amigo, Isabel, Nuaymi, Loutfi, and Maille, Patrick
- Subjects
AUCTIONS ,COGNITIVE radio ,5G networks - Abstract
Licensed Shared Access (LSA) is a new concept proposed by the radio spectrum policy group in order to optimize spectrum usage: a Mobile Network Operator (MNO) can access temporarily to other incumbent's spectrum after obtaining a license. The licensing process is made via an auction mechanism. The mechanisms proposed in the literature for the LSA context are one-shot auction mechanisms which allocate all the available spectrum as a unique block. In this paper, we first show how to increase the performance of those auctions (in terms of revenue, efficiency and fairness of the allocation) while preserving truthful bidding, by splitting spectrum and converting single block auctions into multi-block auctions. Simulation results illustrate how appropriately choosing the number of blocks allows to increase the aforementioned metrics. Second, we show how to convert one-shot mechanisms to equivalent ascending mechanisms (in terms of allocations and payments) so that we add transparency and privacy to the auction. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. A Conceptual Analysis of Equilibrium Bidding Strategy in a Combined Oligopoly and Oligopsony Wholesale Electricity Market.
- Author
-
Emami, Iman Taheri, Samani, Ehsan, Abyaneh, Hossein Askarian, Mohsenian-Rad, Hamed, and Bakhshai, Alireza
- Subjects
BIDDING strategies ,NASH equilibrium ,ELECTRICITY markets ,OLIGOPOLIES ,IMPERFECT competition - Abstract
This paper proposes a semi-analytical method to obtain the equilibrium bidding strategies for generation and demand units in a combined oligopoly and oligopsony wholesale electricity market. Such market structure is the outcome of the increasing deployment of demand response programs that facilitate active participation of demand-side players in the price-setting process. In this analysis, the concept of supply function equilibrium (SFE) is used to investigate the oligopolistic competition among generation units. The SFE model is extended and the demand function equilibrium (DFE) is obtained to study the oligopsonistic competition among demand units. The economic behavior of a market participant is formulated as a bi-level programming (BLP) problem. The imperfect competition among generation units, as well as among demand units, are modeled as a non-cooperative game. Next, a direct method is developed to calculate all candidate equilibriums of the market, and the locational marginal prices (LMPs) in terms of the bidding strategies of the market participants. The BLP problem is solved by obtaining the coordinated Pareto-dominant Nash equilibrium of the market participants’ non-cooperative games. Finally, the proposed analysis is examined in case studies. Accordingly, we report insightful observations with respect to the impact of the changes in the new market structure, at firm-level and market-level, such as in terms of mitigating market power of generation units, the market clearing prices and quantities, surplus for generation units and demand units, and potential impact on market efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
43. Commonality Analysis for Detecting Failures Caused by Inspection Tools in Semiconductor Manufacturing Processes.
- Author
-
An, Dae Woong, Kim, Seung, Kim, Hyun Kyu, and Kim, Chang Ouk
- Subjects
SEMICONDUCTOR manufacturing ,MANUFACTURING processes ,FAILURE analysis ,QUALITY control charts - Abstract
Semiconductor fabrication involves hundreds of process steps through various manufacturing tools. These processing steps are composed of many manufacturing and inspection steps. Inspection is an important step in the fabrication process to determine whether a process is in or out of control. Abrupt manufacturing or inspection tool excursion can lead to a serious low yield problem. Although commonality analysis is a proven tool for detecting abrupt tool excursion, it has gained only limited success in detecting manufacturing tool excursion outside of inspection tools. Compared with manufacturing tools, only a small number of lots or wafers pass through inspection tools. Therefore, it is difficult to construct a sufficient lot history log for inspection commonality analysis in contrast to that of manufacturing tools. Furthermore, inspection may stress a wafer during its own processing, therefore, the target wafer is changed sequentially or randomly. Accordingly, a lot history is apt to include missing traces, which hinders finding inspection tool excursion effectively. In this paper, we propose a comparative analysis framework for commonality analysis algorithms. Performance measures are suggested. To compare the performance of the algorithms effectively, we use a synthetically generated dataset in a simulation experiment. In addition, we apply the algorithms to a real problem that occurred in the fabrication process. Our proposed algorithm demonstrates superiority over the other commonality analysis algorithms in the experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Analysis of the Information Entropy on Traffic Flows.
- Author
-
Liu, Zhiyuan, Wang, Yunshan, Cheng, Qixiu, and Yang, Hai
- Abstract
This paper aims to reveal the uncertainty of traffic flow by introducing a new quantity based on the concept of information entropy (IE). We discover the existence and analyze the properties of IE of traffic flows. It is revealed by both real-world trajectory data and simulation data that the IE of traffic flows can be clearly measured and observed. More importantly, the relationships between IE and other key quantities, those are space mean speed and density, in traffic flow analysis can be described by linear and parabolic functions. We also discover that these relationships are not sensitive to traffic volume. With the inspiration from IE, another new quantity termed speed entropy (SE) is then proposed. Tests with aggregated traffic data from Performance Measurement System (PeMS) show that the pattern of the relationship between SE and flow-weighted average speed illustrates different traffic conditions. In general, a key achievement of the IE analysis is that it gives us a new pathway to better capture the intricate traffic flows from the dimension of uncertainty, thus it has the potential to enhance existing models for traffic data analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. Joint Vehicular Localization and Reflective Mapping Based on Team Channel-SLAM.
- Author
-
Chu, Xinghe, Lu, Zhaoming, Gesbert, David, Wang, Luhan, Wen, Xiangming, Wu, Muqing, and Li, Meiling
- Abstract
This paper addresses high-resolution vehicle positioning and tracking. In recent work, it was shown that a fleet of independent but neighboring vehicles can cooperate for the task of localization by capitalizing on the existence of common surrounding reflectors, using the concept of Team Channel-SLAM. This approach exploits an initial (e.g. GPS-based) vehicle position information and allows subsequent tracking of vehicles by exploiting the shared nature of virtual transmitters associated to the reflecting surfaces. In this paper, we show that the localization can be greatly enhanced by joint sensing and mapping of reflecting surfaces. To this end, we propose a combined approach coined Team Channel-SLAM Evolution (TCSE) which exploits the intertwined relation between (i) the position of virtual transmitters, (ii) the shape of reflecting surfaces, and (iii) the paths described by the radio propagation rays, in order to achieve high-resolution vehicle localization. Overall, TCSE yields a complete picture of the trajectories followed by dominant paths together with a mapping of reflecting surfaces. While joint localization and mapping is a well researched topic within robotics using inputs such as radar and vision, this paper is first to demonstrate such an approach within mobile networking framework based on radio data. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Traffic Node Importance Evaluation Based on Clustering in Represented Transportation Networks.
- Author
-
Huang, Xinlong, Chen, Jian, Cai, Ming, Wang, Wei, and Hu, Xiping
- Abstract
With the ability to acquire and process large-scale traffic big data, a cooperative intelligent transport system can be realized. Identifying important nodes in a traffic network contributes to better traffic control, which plays a more critical role in improving the traffic efficiency of a cooperative intelligent transport system. However, existing traffic node importance evaluation methods rely on manually designed metrics such as betweenness, degree, which may lead to biased results. Meanwhile, the traditional method of iteratively deleting nodes is unsuitable for a large-scale traffic network. In this paper, we propose a novel traffic node importance evaluation method based on clustering in represented transportation network. Specifically, the proposed method first construct a length-weighted network based on the geographic road network. Then, it learns the low-dimensional embeddings of nodes employing network representation learning. Finally, it clusters each nodes with a machine learning method and identifies the critical nodes through vehicle flow of different nodes. Experimental results on the real-word dataset show that our proposed method has excellent performance compared to baseline methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Index-Based Intimate-Core Community Search in Large Weighted Graphs.
- Author
-
Sun, Longxu, Huang, Xin, Li, Rong-Hua, Choi, Byron, and Xu, Jianliang
- Subjects
WEIGHTED graphs ,SPANNING trees ,SOCIAL networks ,COMMUNITIES - Abstract
Community search that finds query-dependent communities has been studied on various kinds of graphs. As one instance of community search, intimate-core group (community) search over a weighted graph is to find a connected $k$ k -core containing all query nodes with the smallest group weight. However, existing state-of-the-art methods start from the maximal $k$ k -core to refine an answer, which is practically inefficient for large networks. In this paper, we develop an efficient framework, called local exploration k-core search (LEKS), to find intimate-core groups in graphs. We propose a small-weighted spanning tree to connect query nodes, and then expand the tree level by level to a connected $k$ k -core, which is finally refined as an intimate-core group. In addition, to support the intimate group search over large weighted graphs, we develop a weighted-core index (WC-index) and two new WC-index-based algorithms for expansion and refinement phases in LEKS. Specifically, we propose a WC-index-based expansion to efficiently find a candidate graph of intimate-core group, leveraging on a two-level expansion of $k$ k -breadth and 1-depth. We propose two graph removal strategies: coarse-grained refinement is designed for large graphs to delete a batch of nodes in a few iterations; fine-grained refinement is designed for small graphs to remove nodes carefully and achieve high-quality answers. Extensive experiments on real-life networks with ground-truth communities validate the effectiveness and efficiency of our proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Verifying the Correctness of Analytic Query Results.
- Author
-
Nosrati, Masoud and Cai, Ying
- Subjects
SERVER farms (Computer network management) ,MAGNETIC recording heads ,CONTRACTING out ,DATA analysis ,DATA structures - Abstract
Data outsourcing is a cost-effective solution for data owners to tackle issues such as large volumes of data, huge number of users, and intensive computation needed for data analysis. They can simply upload their databases to a cloud and let it perform all management works, including query processing. One problem with this service model is how query issuers can verify the query results they receive are indeed correct. This concern is legitimate because, as a third party, clouds may not be fully trustworthy, and as a large data center, clouds are ideal targets for hackers. There has been significant work on query result verification, but most consider only simple queries where query results can be attained by checking the raw data against the query conditions directly. In this paper, we consider the problem of enabling users to verify the correctness of the results of analytic queries. Unlike simple queries, analytic queries involve ranking functions to score a database, which makes it difficult to build data structures for verification purposes. We propose two approaches, namely one-signature and multi-signature, and show that they work well on three representative types of analytic queries, including top-k, range, and KNN queries, through both analysis and experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Indirect Multi-Energy Transactions of Energy Internet With Deep Reinforcement Learning Approach.
- Author
-
Yang, Lingxiao, Sun, Qiuye, Zhang, Ning, and Li, Yushuai
- Subjects
REINFORCEMENT learning ,DEEP learning ,MACHINE learning ,INTERNET ,ENERGY consumption ,MARKOV processes - Abstract
With the new feature of multi-energy coupling and the advancement of the energy market, Energy Internet (EI) has higher requirements for the efficiency and applicability of integrated energy response. This paper proposes an indirect multi-energy transaction (IMET) to promote multi-energy collaborative optimization in local energy market (LEM) and improve energy utilization through personalized responses from We-Energies (WEs). Firstly, an indirect customer-to-customer multi-energy transaction is modeled for local multi-energy coupling market which can satisfy privacy, preference and autonomy of users. The efficiency of energy matching can be promoted through the participation of conversion devices. In addition, multi-time scale hybrid trading mechanism is constructed with the consideration of the transmission speed of different energy sources. Meanwhile, energy transaction process is built as a Markov decision process (MDP) with deep reinforcement learning algorithm so that the system modeling error can be successfully avoided. Furthermore, a distributed training structure is utilized to obtain more experience for a wider range of scenarios. The results of numerical simulations demonstrate the performance of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Wildfire Mitigation Plans in Power Systems: A Literature Review.
- Author
-
Vazquez, Daniel A. Zuniga, Qiu, Feng, Fan, Neng, and Sharp, Kevin
- Subjects
WILDFIRE prevention ,WILDFIRES ,LITERATURE reviews ,VEGETATION management ,HAZARD mitigation ,SITUATIONAL awareness ,GRIDS (Cartography) - Abstract
Some of the deadliest wildfires in the U.S., such as California’s 2018 wildfires, have been ignited by power systems. In an effort to prevent and minimize the ignition of wildfires, or control them if ignited, energy companies have developed wildfire mitigation plans. This paper provides energy companies and power system operators, engineers, researchers, and suppliers an overview of the state-of-the-art studies that address key topics in these wildfire mitigation plans and compares the wildfire mitigation plans of several energy companies. The key topics include grid design and system hardening, asset management and inspection, situational awareness and forecasting, operational response, vegetation management, public safety power shutoff, and risk-spend efficiency. This paper also presents a comparison of several energy companies’ decision-making criteria for initiating a public safety power shutoff. Finally, we discuss opportunities for future research studies that could help energy companies prevent wildfire ignitions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.