Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This...Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This study presents a comprehensive overview of current bird repellant approaches used in agricultural contexts,as well as potential new ways. The bird repellent techniques include Internet of Things technology,Deep Learning,Convolutional Neural Network,Unmanned Aerial Vehicles,Wireless Sensor Networks and Laser biotechnology. This study’s goal is to find and review about previous approach towards repellent of birds in the crop fields using various technologies.展开更多
In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for n...In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for network optimization.This study introduces an innovative solution,the Gaussian Bare-Bones Levy Cheetah Optimizer(GBBLCO),addressing OPF challenges in power generation systems with stochastic RESs.The primary objective is to minimize the total operating costs of RESs,considering four functions:overall operating costs,voltage deviation management,emissions reduction,voltage stability index(VSI)and power loss mitigation.Additionally,a carbon tax is included in the objective function to reduce carbon emissions.Thorough scrutiny,using modified IEEE 30-bus and IEEE 118-bus systems,validates GBBLCO’s superior performance in achieving optimal solutions.Simulation results demonstrate GBBLCO’s efficacy in six optimization scenarios:total cost with valve point effects,total cost with emission and carbon tax,total cost with prohibited operating zones,active power loss optimization,voltage deviation optimization and enhancing voltage stability index(VSI).GBBLCO outperforms conventional techniques in each scenario,showcasing rapid convergence and superior solution quality.Notably,GBBLCO navigates complexities introduced by valve point effects,adapts to environmental constraints,optimizes costs while considering prohibited operating zones,minimizes active power losses,and optimizes voltage deviation by enhancing the voltage stability index(VSI)effectively.This research significantly contributes to advancing OPF,emphasizing GBBLCO’s improved global search capabilities and ability to address challenges related to local minima.GBBLCO emerges as a versatile and robust optimization tool for diverse challenges in power systems,offering a promising solution for the evolving needs of renewable energy-integrated power grids.展开更多
Extracting approximate symmetry planes is a challenge due to the difficulty of accurately measuring numerical values. Introducing the approximate symmetry planes of a 3D point set, this paper presents a new method by ...Extracting approximate symmetry planes is a challenge due to the difficulty of accurately measuring numerical values. Introducing the approximate symmetry planes of a 3D point set, this paper presents a new method by gathering normal vectors of potential of the planes, clustering the high probability ones, and then testing and verifying the planes. An experiment showed that the method is effective, robust and universal for extracting the complete approximate planes of symmetry of a random 3D point set.展开更多
Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital ...Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital to patient’s home. Due to its importance, clinical guidelines recommend the use of risk scores to predict the risk of a cardiovascular disease event. Therefore, there are several well known risk assessment tools, unfortunately they present some limitations.This work addresses this problem with two different methodologies:1) combination of risk assessment tools based on fusion of Bayesian classifiers complemented with genetic algorithm optimization;2) personalization of risk assessment through the creation of groups of patients that maximize the performance of each risk assessment tool. This last approach is implemented based on subtractive clustering applied to a reduced-dimension space.Both methodologies were developed to short-term CVD risk prediction for patients with Acute Coronary Syndromes without ST segment eleva-tion (ACS-NSTEMI). Two different real patients’ datasets were considered to validate the developed strategies:1) Santa Cruz Hospital, Portugal, N=460 patients;2)LeiriaPombal Hospital Centre, Portugal, N=99 patients.This work improved the performance in relation to current risk assessment tools reaching maximum values of sensitivity, specificity and geometric mean of, respectively, 80.0%, 82.9%, 81.5%. Besides this enhancement, the proposed methodologies allow the incorporation of new risk factors, deal with missing risk factors and avoid the selection of a single tool to be applied in the daily clinical practice. In spite of these achievements, the CVD risk assessment (patient stratification) should be improved. The incorporation of new risk factors recognized as clinically significant, namely parameters derived from heart rate variability (HRV), is introduced in this work. HRV is a strong and independent predictor of mortality in patients following acute myocardial infarction. The impact of HRV parameters in the characterization of coronary artery disease (CAD) patients will be conducted during hospitalization of these patients in the Leiria-Pombal Hospital Centre (LPHC).展开更多
Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order ...Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order to be serialized, requests to the same cache line can either be bounced (NACKed) or buffered in the coherence controller. In this paper, we focus mainly on systems whose coherence controllers buffer requests. In a lock hand-off, a burst of requests to the same line arrive at the coherence controller. During lock hand-off only the requests from the winning processor contribute to progress of the computation, since the winning processor is the only one that will advance the work. This key observation leads us to propose a hardware mechanism we call request bypassing, which allows requests from the winning processor to bypass the requests buffered in the coherence controller keeping the lock line. We present an inexpensive implementation of request bypassing that reduces the time spent on all the execution phases of a critical section (acquiring the lock, accessing shared data, and releasing the lock) and which, as a consequence, speeds up the whole parallel computation. This mechanism requires neither compiler or programmer support nor ISA or coherence protocol changes. By simulating a 32-processor system, we show that using request bypassing does not degrade but rather improves performance in three applications with low synchronization rates, while in those having a large amount of synchronization activity (the remaining four), we see reductions in execution time and in lock stall time ranging from 14% to 39% and from 52% to 7170, respectively. We compare request bypassing with a previously proposed technique called read combining and with a system that bounces requests, observing a significantly lower execution time with the bypassing scheme. Finally, we analyze the sensitivity of our results to some key hardware and software parameters.展开更多
Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement....Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME.展开更多
Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement....Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME.展开更多
Recently, we introduced the notion of a generalized derivation from a bimodule to a bimodule. In this paper, we give a more general notion based on commutators which covers generalized derivations as a special case. U...Recently, we introduced the notion of a generalized derivation from a bimodule to a bimodule. In this paper, we give a more general notion based on commutators which covers generalized derivations as a special case. Using it, we show that the separability of an algebra extension is characterized by generalized derivations.展开更多
文摘Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This study presents a comprehensive overview of current bird repellant approaches used in agricultural contexts,as well as potential new ways. The bird repellent techniques include Internet of Things technology,Deep Learning,Convolutional Neural Network,Unmanned Aerial Vehicles,Wireless Sensor Networks and Laser biotechnology. This study’s goal is to find and review about previous approach towards repellent of birds in the crop fields using various technologies.
基金supported by the Deanship of Postgraduate Studies and Scientific Research at Majmaah University in Saudi Arabia under Project Number(ICR-2024-1002).
文摘In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for network optimization.This study introduces an innovative solution,the Gaussian Bare-Bones Levy Cheetah Optimizer(GBBLCO),addressing OPF challenges in power generation systems with stochastic RESs.The primary objective is to minimize the total operating costs of RESs,considering four functions:overall operating costs,voltage deviation management,emissions reduction,voltage stability index(VSI)and power loss mitigation.Additionally,a carbon tax is included in the objective function to reduce carbon emissions.Thorough scrutiny,using modified IEEE 30-bus and IEEE 118-bus systems,validates GBBLCO’s superior performance in achieving optimal solutions.Simulation results demonstrate GBBLCO’s efficacy in six optimization scenarios:total cost with valve point effects,total cost with emission and carbon tax,total cost with prohibited operating zones,active power loss optimization,voltage deviation optimization and enhancing voltage stability index(VSI).GBBLCO outperforms conventional techniques in each scenario,showcasing rapid convergence and superior solution quality.Notably,GBBLCO navigates complexities introduced by valve point effects,adapts to environmental constraints,optimizes costs while considering prohibited operating zones,minimizes active power losses,and optimizes voltage deviation by enhancing the voltage stability index(VSI)effectively.This research significantly contributes to advancing OPF,emphasizing GBBLCO’s improved global search capabilities and ability to address challenges related to local minima.GBBLCO emerges as a versatile and robust optimization tool for diverse challenges in power systems,offering a promising solution for the evolving needs of renewable energy-integrated power grids.
文摘Extracting approximate symmetry planes is a challenge due to the difficulty of accurately measuring numerical values. Introducing the approximate symmetry planes of a 3D point set, this paper presents a new method by gathering normal vectors of potential of the planes, clustering the high probability ones, and then testing and verifying the planes. An experiment showed that the method is effective, robust and universal for extracting the complete approximate planes of symmetry of a random 3D point set.
文摘Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital to patient’s home. Due to its importance, clinical guidelines recommend the use of risk scores to predict the risk of a cardiovascular disease event. Therefore, there are several well known risk assessment tools, unfortunately they present some limitations.This work addresses this problem with two different methodologies:1) combination of risk assessment tools based on fusion of Bayesian classifiers complemented with genetic algorithm optimization;2) personalization of risk assessment through the creation of groups of patients that maximize the performance of each risk assessment tool. This last approach is implemented based on subtractive clustering applied to a reduced-dimension space.Both methodologies were developed to short-term CVD risk prediction for patients with Acute Coronary Syndromes without ST segment eleva-tion (ACS-NSTEMI). Two different real patients’ datasets were considered to validate the developed strategies:1) Santa Cruz Hospital, Portugal, N=460 patients;2)LeiriaPombal Hospital Centre, Portugal, N=99 patients.This work improved the performance in relation to current risk assessment tools reaching maximum values of sensitivity, specificity and geometric mean of, respectively, 80.0%, 82.9%, 81.5%. Besides this enhancement, the proposed methodologies allow the incorporation of new risk factors, deal with missing risk factors and avoid the selection of a single tool to be applied in the daily clinical practice. In spite of these achievements, the CVD risk assessment (patient stratification) should be improved. The incorporation of new risk factors recognized as clinically significant, namely parameters derived from heart rate variability (HRV), is introduced in this work. HRV is a strong and independent predictor of mortality in patients following acute myocardial infarction. The impact of HRV parameters in the characterization of coronary artery disease (CAD) patients will be conducted during hospitalization of these patients in the Leiria-Pombal Hospital Centre (LPHC).
基金supported in part by Spanish Government and European ERDF under Grant Nos. TIN2007-66423, TIN2010-21291-C02-01 and TIN2007-60625gaZ:T48 research group (Arag'on Government and European ESF)+1 种基金Consolider CSD2007-00050 (Spanish Government)HiPEAC-2 NoE (European FP7/ICT 217068)
文摘Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order to be serialized, requests to the same cache line can either be bounced (NACKed) or buffered in the coherence controller. In this paper, we focus mainly on systems whose coherence controllers buffer requests. In a lock hand-off, a burst of requests to the same line arrive at the coherence controller. During lock hand-off only the requests from the winning processor contribute to progress of the computation, since the winning processor is the only one that will advance the work. This key observation leads us to propose a hardware mechanism we call request bypassing, which allows requests from the winning processor to bypass the requests buffered in the coherence controller keeping the lock line. We present an inexpensive implementation of request bypassing that reduces the time spent on all the execution phases of a critical section (acquiring the lock, accessing shared data, and releasing the lock) and which, as a consequence, speeds up the whole parallel computation. This mechanism requires neither compiler or programmer support nor ISA or coherence protocol changes. By simulating a 32-processor system, we show that using request bypassing does not degrade but rather improves performance in three applications with low synchronization rates, while in those having a large amount of synchronization activity (the remaining four), we see reductions in execution time and in lock stall time ranging from 14% to 39% and from 52% to 7170, respectively. We compare request bypassing with a previously proposed technique called read combining and with a system that bounces requests, observing a significantly lower execution time with the bypassing scheme. Finally, we analyze the sensitivity of our results to some key hardware and software parameters.
基金The research of J.Wang,X.Chang,Y.Wang and J.Zhang was supported in part by Project supported by Chinese National Key Laboratory of Science and Technology on Information System Security and National Natural Science Foundation of China under Grant No.U1836105The research of R.J.Rodriguez and X.Chang has been supported in part by the University of Zaragoza and the Fundacion Ibercaja under Grant JIUZ-2020-TIC-08The research of R.J.Rodriguez has also been supported in part by the University,Industry and Innovation Department of the Aragonese Government under Programa de Proyectos Estrategicos de Grupos de Investigacidn(DisCo research group,ref.T21-20R).
文摘Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME.
基金Chinese National Key Laboratory of Science and Technology on Information System Security and National Natural Science Foundation of China under Grant No.U1836105The research of R.J.Rodríguez and X.Chang has been supported in part by the University of Zaragoza and the Fundación Ibercaja under Grant JIUZ-2020-TIC-08The research of R.J.Rodríguez has also been supported in part by the University,Industry and Innovation Department of the Aragonese Government under Programa de Proyectos Estratégicos de Grupos de Investigación(DisCo research group,ref.T21-20R).
文摘Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME.
文摘Recently, we introduced the notion of a generalized derivation from a bimodule to a bimodule. In this paper, we give a more general notion based on commutators which covers generalized derivations as a special case. Using it, we show that the separability of an algebra extension is characterized by generalized derivations.