期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Privacy-Preserving Federated Deep Learning Diagnostic Method for Multi-Stage Diseases
1
作者 Jinbo Yang Hai Huang +2 位作者 Lailai Yin Jiaxing Qu Wanjuan Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3085-3099,共15页
Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources,including clinical symptoms,physical signs,biochemical test results,imaging findings,pathological examination data,and even ... Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources,including clinical symptoms,physical signs,biochemical test results,imaging findings,pathological examination data,and even genetic data.When applying machine learning modeling to predict and diagnose multi-stage diseases,several challenges need to be addressed.Firstly,the model needs to handle multimodal data,as the data used by doctors for diagnosis includes image data,natural language data,and structured data.Secondly,privacy of patients’data needs to be protected,as these data contain the most sensitive and private information.Lastly,considering the practicality of the model,the computational requirements should not be too high.To address these challenges,this paper proposes a privacy-preserving federated deep learning diagnostic method for multi-stage diseases.This method improves the forward and backward propagation processes of deep neural network modeling algorithms and introduces a homomorphic encryption step to design a federated modeling algorithm without the need for an arbiter.It also utilizes dedicated integrated circuits to implement the hardware Paillier algorithm,providing accelerated support for homomorphic encryption in modeling.Finally,this paper designs and conducts experiments to evaluate the proposed solution.The experimental results show that in privacy-preserving federated deep learning diagnostic modeling,the method in this paper achieves the same modeling performance as ordinary modeling without privacy protection,and has higher modeling speed compared to similar algorithms. 展开更多
关键词 Vertical federation homomorphic encryption deep neural network intelligent diagnosis machine learning and big data
下载PDF
Data learning and expert judgment in a Bayesian belief network for aiding human reliability assessment in offshore decommissioning risk assessment 被引量:2
2
作者 Mei Ling Fam Dimitrios Konovessis +1 位作者 XuHong He Lin Seng Ong 《Journal of Ocean Engineering and Science》 SCIE 2021年第2期170-184,共15页
Decommissioning of offshore facilities involve changing risk profiles at different decommissioning phases.Bayesian Belief Networks(BBN)are used as part of the proposed risk assessment method to capture the multiple in... Decommissioning of offshore facilities involve changing risk profiles at different decommissioning phases.Bayesian Belief Networks(BBN)are used as part of the proposed risk assessment method to capture the multiple interactions of a decommissioning activity.The BBN is structured from the data learning of an accident database and a modification of the BBN nodes to incorporate human reliability and barrier performance modelling.The analysis covers one case study of one area of decommissioning operations by extrapolating well workover data to well plugging and abandonment.Initial analysis from well workover data,of a 5-node BBN provided insights on two different levels of severity of an accident,the’Accident’and’Incident’level,and on its respective profiles of the initiating events and the investigation-reported human causes.The initial results demonstrate that the data learnt from the database can be used to structure the BBN,give insights on how human reliability pertaining to well activities can be modelled,and that the relative frequencies from the count analysis can act as initial data input for the proposed nodes.It is also proposed that the integrated treatment of various sources of information(database and expert judgement)through a BBN model can support the risk assessment of a dynamic situation such as offshore decommissioning. 展开更多
关键词 Bayesian belief network Human reliability assessment Expert judgement data learning
原文传递
Distributed and Weighted Extreme Learning Machine for Imbalanced Big Data Learning 被引量:10
3
作者 Zhiqiong Wang Junchang Xin +4 位作者 Hongxu Yang Shuo Tian Ge Yu Chenren Xu Yudong Yao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期160-173,共14页
The Extreme Learning Machine(ELM) and its variants are effective in many machine learning applications such as Imbalanced Learning(IL) or Big Data(BD) learning. However, they are unable to solve both imbalanced ... The Extreme Learning Machine(ELM) and its variants are effective in many machine learning applications such as Imbalanced Learning(IL) or Big Data(BD) learning. However, they are unable to solve both imbalanced and large-volume data learning problems. This study addresses the IL problem in BD applications. The Distributed and Weighted ELM(DW-ELM) algorithm is proposed, which is based on the Map Reduce framework. To confirm the feasibility of parallel computation, first, the fact that matrix multiplication operators are decomposable is illustrated.Then, to further improve the computational efficiency, an Improved DW-ELM algorithm(IDW-ELM) is developed using only one Map Reduce job. The successful operations of the proposed DW-ELM and IDW-ELM algorithms are finally validated through experiments. 展开更多
关键词 weighted Extreme learning Machine(ELM) imbalanced big data MapReduce framework user-defined counter
原文传递
An improved transfer learning strategy for short-term cross-building energy prediction usingdata incremental 被引量:1
4
作者 Guannan Li Yubei Wu +5 位作者 Chengchu Yan Xi Fang Tao Li Jiajia Gao Chengliang Xu Zixi Wang 《Building Simulation》 SCIE EI CSCD 2024年第1期165-183,共19页
The available modelling data shortage issue makes it difficult to guarantee the performance of data-driven building energy prediction(BEP)models for both the newly built buildings and existing information-poor buildin... The available modelling data shortage issue makes it difficult to guarantee the performance of data-driven building energy prediction(BEP)models for both the newly built buildings and existing information-poor buildings.Both knowledge transfer learning(KTL)and data incremental learning(DIL)can address the data shortage issue of such buildings.For new building scenarios with continuous data accumulation,the performance of BEP models has not been fully investigated considering the data accumulation dynamics.DIL,which can learn dynamic features from accumulated data adapting to the developing trend of new building time-series data and extend BEP model's knowledge,has been rarely studied.Previous studies have shown that the performance of KTL models trained with fixed data can be further improved in scenarios with dynamically changing data.Hence,this study proposes an improved transfer learning cross-BEP strategy continuously updated using the coarse data incremental(CDI)manner.The hybrid KTL-DIL strategy(LSTM-DANN-CDI)uses domain adversarial neural network(DANN)for KLT and long short-term memory(LSTM)as the Baseline BEP model.Performance evaluation is conducted to systematically qualify the effectiveness and applicability of KTL and improved KTL-DIL.Real-world data from six-type 36 buildings of six types are adopted to evaluate the performance of KTL and KTL-DIL in data-driven BEP tasks considering factors like the model increment time interval,the available target and source building data volumes.Compared with LSTM,results indicate that KTL(LSTM-DANN)and the proposed KTL-DIL(LSTM-DANN-CDI)can significantly improve the BEP performance for new buildings with limited data.Compared with the pure KTL strategy LSTM-DANN,the improved KTL-DIL strategy LSTM-DANN-CDI has better prediction performance with an average performance improvement ratio of 60%. 展开更多
关键词 building energy prediction(BEP) cross-building data incremental learning(DIL) domain adversarial neural network(DANN) knowledge transfer learning(KTL)
原文传递
Bolstering integrity in environmental data science and machine learning requires understanding socioecological inequity
5
作者 Joe F.Bozeman III 《Frontiers of Environmental Science & Engineering》 SCIE EI CSCD 2024年第5期171-179,共9页
Socioecological inequity in environmental data science—such as inequities deriving from data-driven approaches and machine learning(ML)—are current issues subject to debate and evolution.There is growing consensus a... Socioecological inequity in environmental data science—such as inequities deriving from data-driven approaches and machine learning(ML)—are current issues subject to debate and evolution.There is growing consensus around embedding equity throughout all research and design domains—from inception to administration,while also addressing procedural,distributive,and recognitional factors.Yet,practically doing so may seem onerous or daunting to some.The current perspective helps to alleviate these types of concerns by providing substantiation for the connection between environmental data science and socioecological inequity,using the Systemic Equity Framework,and provides the foundation for a paradigmatic shift toward normalizing the use of equity-centered approaches in environmental data science and ML settings.Bolstering the integrity of environmental data science and ML is just beginning from an equity-centered tool development and rigorous application standpoint.To this end,this perspective also provides relevant future directions and challenges by overviewing some meaningful tools and strategies—such as applying the Wells-Du Bois Protocol,employing fairness metrics,and systematically addressing irreproducibility;emerging needs and proposals—such as addressing data-proxy bias and supporting convergence research;and establishes a ten-step path forward.Afterall,the work that environmental scientists and engineers do ultimately affect the well-being of us all. 展开更多
关键词 EQUITY Bias Machine learning data Science JUSTICE Systemic Equity
原文传递
Prediction of Seaward Slope Recession in Berm Breakwaters Using M5' Machine Learning Approach 被引量:1
6
作者 Alireza Sadat HOSSEINI Mehdi SHAFIEEFAR 《China Ocean Engineering》 SCIE EI CSCD 2016年第1期19-32,共14页
In the design process of berm breakwaters, their front slope recession has an inevitable rule in large number of model tests, and this parameter being studied. This research draws its data from Moghim's and Shekari'... In the design process of berm breakwaters, their front slope recession has an inevitable rule in large number of model tests, and this parameter being studied. This research draws its data from Moghim's and Shekari's experiment results. These experiments consist of two different 2D model tests in two wave flumes, in which the berm recession to different sea state and structural parameters have been studied. Irregular waves with a JONSWAP spectrum were used in both test series. A total of 412 test results were used to cover the impact of sea state conditions such as wave height, wave period, storm duration and water depth at the toe of the structure, and structural parameters such as berm elevation from still water level, berm width and stone diameter on berm recession parameters. In this paper, a new set of equations for berm recession is derived using the M5' model tree as a machine learning approach. A comparison is made between the estimations by the new formula and the formulae recently given by other researchers to show the preference of new M5' approach. 展开更多
关键词 berm breakwater recession experimental data M5' model tree machine learning method
下载PDF
A Novel Method for Prediction of Protein Domain Using Distance-Based Maximal Entropy
7
作者 Shu-xue Zou Yan-xin Huang Yan Wang Chun-guang Zhou 《Journal of Bionic Engineering》 SCIE EI CSCD 2008年第3期215-223,共9页
Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a pro... Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a protein from sequence information alone is presented. The method is based on analyzing multiple sequence alignments derived from a database search. Multiple measures are defined to quantify the domain information content of each position along the sequence. Then they are combined into a single predictor using support vector machine. What is more important, the domain detection is first taken as an imbal- anced data learning problem. A novel undersampling method is proposed on distance-based maximal entropy in the feature space of Support Vector Machine (SVM). The overall precision is about 80%. Simulation results demonstrate that the method can help not only in predicting the complete 3D structure of a protein but also in the machine learning system on general im- balanced datasets. 展开更多
关键词 protein domain boundary SVM imbalanced data learning distance-based maximal entropy
下载PDF
Exploring the Road to 6G: ABC-Foundation for Intelligent Mobile Networks 被引量:10
8
作者 Jinkang Zhu Ming Zhao +1 位作者 Sihai Zhang Wuyang Zhou 《China Communications》 SCIE CSCD 2020年第6期51-67,共17页
The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applicatio... The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G. 展开更多
关键词 6G Artificial intelligence Wireless big data Cloud computing Knowledge+data driven deep learning layered computing layered network
下载PDF
A nowcasting model for the prediction of typhoon tracks based on a long short term memory neural network 被引量:21
9
作者 GAO Song ZHAO Peng +5 位作者 PAN Bin LI Yaru ZHOU Min XU Jiangling ZHONG Shan SHI Zhenwei 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2018年第5期8-12,共5页
It is of vital importance to reduce injuries and economic losses by accurate forecasts of typhoon tracks. A huge amount of typhoon observations have been accumulated by the meteorological department, however, they are... It is of vital importance to reduce injuries and economic losses by accurate forecasts of typhoon tracks. A huge amount of typhoon observations have been accumulated by the meteorological department, however, they are yet to be adequately utilized. It is an effective method to employ machine learning to perform forecasts. A long short term memory(LSTM) neural network is trained based on the typhoon observations during 1949–2011 in China's Mainland, combined with big data and data mining technologies, and a forecast model based on machine learning for the prediction of typhoon tracks is developed. The results show that the employed algorithm produces desirable 6–24 h nowcasting of typhoon tracks with an improved precision. 展开更多
关键词 typhoon tracks machine learning LSTM big data
下载PDF
Construction and Update of an Online Ensemble Score Involving Linear Discriminant Analysis and Logistic Regression
10
作者 Benoî t Lalloué +1 位作者 Jean-Marie Monnez Eliane Albuisson 《Applied Mathematics》 2022年第2期228-242,共15页
The present aim is to update, upon arrival of new learning data, the parameters of a score constructed with an ensemble method involving linear discriminant analysis and logistic regression in an online setting, witho... The present aim is to update, upon arrival of new learning data, the parameters of a score constructed with an ensemble method involving linear discriminant analysis and logistic regression in an online setting, without the need to store all of the previously obtained data. Poisson bootstrap and stochastic approximation processes were used with online standardized data to avoid numerical explosions, the convergence of which has been established theoretically. This empirical convergence of online ensemble scores to a reference “batch” score was studied on five different datasets from which data streams were simulated, comparing six different processes to construct the online scores. For each score, 50 replications using a total of 10N observations (N being the size of the dataset) were performed to assess the convergence and the stability of the method, computing the mean and standard deviation of a convergence criterion. A complementary study using 100N observations was also performed. All tested processes on all datasets converged after N iterations, except for one process on one dataset. The best processes were averaged processes using online standardized data and a piecewise constant step-size. 展开更多
关键词 learning for Big data Stochastic Approximation MEDICINE Ensemble Method Online Score
下载PDF
Distributed secure quantum machine learning 被引量:8
11
作者 Yu-Bo Sheng Lan Zhou 《Science Bulletin》 SCIE EI CAS CSCD 2017年第14期1025-1029,共5页
Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. More... Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. Moreover, DSQML can be extended to a more general case that the client does not have enough data, and resorts both the remote quantum server and remote databases to perform the secure machi~ learning. Here we propose a DSQML protocol that the client can classify two-dimensional vectors to dif- ferent clusters, resorting to a remote small-scale photon quantum computation processor. The protocol is secure without leaking any relevant information to the Eve. Any eavesdropper who attempts to intercept and disturb the learning process can be noticed. In principle, this protocol can be used to classify high dimensional vectors and may provide a new viewpoint and application for future "big data". 展开更多
关键词 Quantum machine learning Quantum communication Quantum computation Big data
原文传递
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
12
作者 Jianlin Xu Yifan Yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 Android platform mobile malware detection cloud computing forensic analysis machine learning redis key-value store big data hadoop distributed file system data mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部