在过去的几十年里,有关超光图像的密集有了密集的研究。诸如NMF,VCA和N-FindR等一些方法已成为标准,因为它们表明在处理超细图像的解密时的稳健性。然而,关于多光谱图像的混合物的研究相对稀缺。因此,我们将一些解密方法扩展到多光谱图像。在本文中,我们创建了两个模拟的多光谱数据集,其两个高光谱数据集被给出了其基本真理。然后我们将解密方法(VCA,NMF,N-FINDR)应用于这两个数据集。通过比较和分析结果,我们能够用多光谱数据集使用VCA,NMF和N-FindR的一些有趣的结果。此外,这也证明了将这些解密方法扩展到多光谱成像领域的可能性。
translated by 谷歌翻译
This paper presents a construction of a proper and stable labelled sample compression scheme of size $O(\VCD^2)$ for any finite concept class, where $\VCD$ denotes the Vapnik-Chervonenkis Dimension. The construction is based on a well-known model of machine teaching, referred to as recursive teaching dimension. This substantially improves on the currently best known bound on the size of sample compression schemes (due to Moran and Yehudayoff), which is exponential in $\VCD$. The long-standing open question whether the smallest size of a sample compression scheme is in $O(\VCD)$ remains unresolved, but our results show that research on machine teaching is a promising avenue for the study of this open problem. As further evidence of the strong connections between machine teaching and sample compression, we prove that the model of no-clash teaching, introduced by Kirkpatrick et al., can be used to define a non-trivial lower bound on the size of stable sample compression schemes.
translated by 谷歌翻译
Basecalling is an essential step in nanopore sequencing analysis where the raw signals of nanopore sequencers are converted into nucleotide sequences, i.e., reads. State-of-the-art basecallers employ complex deep learning models to achieve high basecalling accuracy. This makes basecalling computationally-inefficient and memory-hungry; bottlenecking the entire genome analysis pipeline. However, for many applications, the majority of reads do no match the reference genome of interest (i.e., target reference) and thus are discarded in later steps in the genomics pipeline, wasting the basecalling computation. To overcome this issue, we propose TargetCall, the first fast and widely-applicable pre-basecalling filter to eliminate the wasted computation in basecalling. TargetCall's key idea is to discard reads that will not match the target reference (i.e., off-target reads) prior to basecalling. TargetCall consists of two main components: (1) LightCall, a lightweight neural network basecaller that produces noisy reads; and (2) Similarity Check, which labels each of these noisy reads as on-target or off-target by matching them to the target reference. TargetCall filters out all off-target reads before basecalling; and the highly-accurate but slow basecalling is performed only on the raw signals whose noisy reads are labeled as on-target. Our thorough experimental evaluations using both real and simulated data show that TargetCall 1) improves the end-to-end basecalling performance of the state-of-the-art basecaller by 3.31x while maintaining high (98.88%) sensitivity in keeping on-target reads, 2) maintains high accuracy in downstream analysis, 3) precisely filters out up to 94.71% of off-target reads, and 4) achieves better performance, sensitivity, and generality compared to prior works. We freely open-source TargetCall at https://github.com/CMU-SAFARI/TargetCall.
translated by 谷歌翻译
Network intrusion detection systems (NIDSs) play an important role in computer network security. There are several detection mechanisms where anomaly-based automated detection outperforms others significantly. Amid the sophistication and growing number of attacks, dealing with large amounts of data is a recognized issue in the development of anomaly-based NIDS. However, do current models meet the needs of today's networks in terms of required accuracy and dependability? In this research, we propose a new hybrid model that combines machine learning and deep learning to increase detection rates while securing dependability. Our proposed method ensures efficient pre-processing by combining SMOTE for data balancing and XGBoost for feature selection. We compared our developed method to various machine learning and deep learning algorithms to find a more efficient algorithm to implement in the pipeline. Furthermore, we chose the most effective model for network intrusion based on a set of benchmarked performance analysis criteria. Our method produces excellent results when tested on two datasets, KDDCUP'99 and CIC-MalMem-2022, with an accuracy of 99.99% and 100% for KDDCUP'99 and CIC-MalMem-2022, respectively, and no overfitting or Type-1 and Type-2 issues.
translated by 谷歌翻译
随着安装摄像头的广泛使用,基于视频的监视方法已引起了针对不同目的(例如辅助生活)的广泛关注。时间冗余和原始视频的巨大大小是与视频处理算法有关的两个最常见的问题。大多数现有方法主要集中于通过探索连续帧来提高准确性,这是费力的,不能考虑实时应用程序。由于视频主要以压缩格式存储和传输,因此在许多设备上都可以使用这些视频。压缩视频包含许多有益信息,例如运动向量和量化系数。正确使用此可用信息可以大大改善视频理解方法的性能。本文提出了一种使用残差数据的方法,该方法直接在压缩视频中可用,可以通过部分解码过程获得。此外,提出了一种积累相似残差的方法,该方法大大减少了处理识别的处理帧数。仅应用神经网络,专门用于压缩域中的累积残留物,可以加速性能,而分类结果与原始视频方法具有很高的竞争力。
translated by 谷歌翻译
通信网络中的时间延迟是通过边缘部署机器人的主要关注点之一。本文提出了一个多阶段的非线性模型预测控制(NMPC),该控制能够处理不同的网络引起的时间延迟,以建立控制框架,以确保无碰撞的无碰撞微型航空车(MAVS)导航。这项研究介绍了一种新颖的方法,该方法通过与现有的典型多阶段NMPC相反的离散化场景树来考虑不同的采样时间,在这种情况下,系统不确定性是由场景树建模的。此外,该方法根据通信链接中时间延迟的概率考虑了多阶段NMPC方案的自适应权重。由于多阶段NMPC,获得的最佳控制动作对于多个采样时间有效。最后,在各种测试和不同的模拟环境中证明了所提出的新型控制框架的总体有效性。
translated by 谷歌翻译
在本文中,我们提出了一种反应性约束导航方案,并避免了无人驾驶汽车(UAV)的嵌入式障碍物,以便在障碍物密集的环境中实现导航。拟议的导航体系结构基于非线性模型预测控制(NMPC),并利用板载2D激光雷达来检测障碍物并在线转换环境的关键几何信息为NMPC的参数约束,以限制可用位置空间的可用位置空间无人机。本文还重点介绍了所提出的反应导航方案的现实实施和实验验证,并将其应用于多个具有挑战性的实验室实验中,我们还与相关的反应性障碍物避免方法进行了比较。提出的方法中使用的求解器是优化引擎(开放)和近端平均牛顿进行最佳控制(PANOC)算法,其中采用了惩罚方法来正确考虑导航任务期间的障碍和输入约束。拟议的新颖方案允许快速解决方案,同时使用有限的车载计算能力,这是无人机的整体闭环性能的必需功能,并在多个实时场景中应用。内置障碍物避免和实时适用性的结合使所提出的反应性约束导航方案成为无人机的优雅框架,能够执行快速的非线性控制,本地路径计划和避免障碍物,所有框架都嵌入了控制层中。
translated by 谷歌翻译
与液态燃料相比,电动汽车(EV)的广泛采用受到目前能量和功率密度低的电池的限制,并且会随着时间的推移而衰老和性能恶化。因此,在电动汽车生命周期内监视电池电量状态(SOC)和健康状况(SOH)是一个非常相关的问题。这项工作提出了一个电池数字双结构结构,旨在在运行时准确反映电池动力学。为了确保有关非线性现象的高度正确性,数字双胞胎依赖于在电池演化痕迹随时间训练的数据驱动模型中依靠:SOH模型,反复执行以估计最大电池容量的退化和SOC型号的降级,定期重新训练以反映衰老的影响。拟议的数字双结构将在公共数据集上举例说明,以激发其采用并证明其有效性,并具有很高的准确性和推理以及与车载执行兼容的时间。
translated by 谷歌翻译
世界卫生组织(WHO)推荐戴面面罩作为最有效的措施,以防止Covid-19传输。在许多国家,现在必须在公共场所佩戴面部面具。由于手动监测面部面罩通常在人群中间不可行,因此自动检测可能是有益的。为方便,我们探索了许多深度学习模型(即,VGG1,VGG19,Reset50),用于面部掩模检测,并在两个基准数据集中进行评估。在此背景下,我们还评估了转移学习(即,VGG19,Reset50在ImageNet上预先培训)。我们发现,虽然所有型号的表演都非常好,但转移学习模型达到了最佳性能。转移学习将性能提高0.10 \% - 0.40 \%,培训时间减少30 \%。我们的实验还显示了这些高性能模型对于测试数据集来自不同的分布而不是非常强大。没有任何微调,这些模型的性能在跨域设置中的47 \%下降。
translated by 谷歌翻译
识别语音情绪的语言不可知论的方法仍然是一个不完整和具有挑战性的任务。在本文中,我们使用Bangla和英语语言来评估与语音中的情感是否与语言无关。这项研究分类了以下情绪:幸福,愤怒,中立,悲伤,厌恶和恐惧。我们雇用了三种情绪言论,其中前两组是由孟加拉和英语语言的本土孟加拉语扬声器开发的。第三个是多伦多情感演讲(苔丝),由加拿大母语的英语发言者开发。我们仔细选择了语言无关的韵律特征,采用了支持向量机(SVM)模型,并进行了三个实验来执行我们的主张。在第一个实验中,我们单独测量三种语音组的性能。接下来是第二种实验,我们通过组合语音集来记录分类率。最后,在第三个实验中,我们通过培训和测试不同语音集来测量识别率。虽然这项研究表明,言语情感认可(SER)大多是语言无关的,但在识别出在这两种语言中的厌恶和恐惧之类的情绪状态时存在一些差异。此外,我们的调查推断出非母语人员通过言语传达情绪,就像以其母语在母语中表达自己。
translated by 谷歌翻译