[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (176)

Search Parameters:
Keywords = functional dependencies graph

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 1032 KiB  
Article
Fractal Continuum Maxwell Creep Model
by Andriy Kryvko, Claudia del C. Gutiérrez-Torres, José Alfredo Jiménez-Bernal, Orlando Susarrey-Huerta, Eduardo Reyes de Luna and Didier Samayoa
Axioms 2025, 14(1), 33; https://doi.org/10.3390/axioms14010033 - 2 Jan 2025
Viewed by 222
Abstract
In this work, the fractal continuum Maxwell law for the creep phenomenon is introduced. By mapping standard integer space-time into fractal continuum space-time using the well-known Balankin’s approach to variable-order fractal calculus, the fractal version of Maxwell model is developed. This methodology employs [...] Read more.
In this work, the fractal continuum Maxwell law for the creep phenomenon is introduced. By mapping standard integer space-time into fractal continuum space-time using the well-known Balankin’s approach to variable-order fractal calculus, the fractal version of Maxwell model is developed. This methodology employs local fractional differential operators on discontinuous properties of fractal sets embedded in the integer space-time so that they behave as analytic envelopes of non-analytic functions in the fractal continuum space-time. Then, creep strain ε(t), creep modulus J(t), and relaxation compliance G(t) in materials with fractal linear viscoelasticity can be described by their generalized forms, εβ(t),Jβ(t) and Gβ(t), where β=dimS/dimH represents the time fractal dimension, and it implies the variable-order of fractality of the self-similar domain under study, which are dimS and dimH for their spectral and Hausdorff dimensions, respectively. The creep behavior depends on beta, which is characterized by its geometry and fractal topology: as beta approaches one, the fractal creep behavior approaches its standard behavior. To illustrate some physical implications of the suggested fractal Maxwell creep model, graphs that showcase the specific details and outcomes of our results are included in this study. Full article
(This article belongs to the Special Issue Fractal Analysis and Mathematical Integration)
Show Figures

Figure 1

Figure 1
<p>A geometrical interpretation of fractal continuum calculus using the classical Menger sponge.</p>
Full article ">Figure 2
<p>Predictions of fractal creep compliance for several beta values (<math display="inline"><semantics> <mrow> <mi>E</mi> <mo>=</mo> <mn>2.8</mn> <mo>,</mo> <mspace width="0.277778em"/> <mi>η</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>) for (<b>a</b>) creep modulus, and (<b>b</b>) relaxation compliance.</p>
Full article ">Figure 3
<p>Sample with fractal geometry similar to the Sierpinski carpet <math display="inline"><semantics> <msup> <mi mathvariant="script">S</mi> <mo>ℓ</mo> </msup> </semantics></math>: (<b>a</b>) fifth iteration for <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>1</mn> <mo>/</mo> <mn>3</mn> </mrow> </semantics></math>, (<b>b</b>) self-similar part of the Sierpinski carpet with five squares of third iteration, (<b>c</b>) the tensile test on a dog bone sample of the constituent material, and (<b>d</b>) the constituent material with the fractal domain.</p>
Full article ">Figure 4
<p>Dimensionless fractal creep compliance <math display="inline"><semantics> <mrow> <msup> <mi>J</mi> <mi>β</mi> </msup> <mrow> <mo>(</mo> <mi>t</mi> <mo>/</mo> <mi>τ</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>/</mo> <mi>τ</mi> </mrow> </semantics></math> for the Maxwell model in a specimen Sierpinski carpet type with <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.803</mn> </mrow> </semantics></math> and comparison with conventional creep compliance (<math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>) for (<b>a</b>) short times, and (<b>b</b>) log-log plot.</p>
Full article ">Figure 5
<p>The dimensionless relaxation modulus in the fractal space-time continuum for the Maxwell model in the speciment Sierpinski carpet type with <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.803</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> for (<b>a</b>) short times, and (<b>b</b>) semi-log plot.</p>
Full article ">Figure 6
<p>The creep strain rate (<b>a</b>) as a function of the order of fractal dimension of time scale for several values of time, as well as (<b>b</b>) as an applied stress function for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.803</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>A geometric representation of the Maxwell model.</p>
Full article ">
15 pages, 557 KiB  
Article
Analysis of the Matching Media Effects by Microwave Field Distribution Simulations for the Cylindrically Layered Human Arm Model
by Tanju Yelkenci
Appl. Sci. 2025, 15(1), 268; https://doi.org/10.3390/app15010268 - 30 Dec 2024
Viewed by 386
Abstract
In this study, a method is presented to determine the matching media parameters that maximize the electromagnetic energy penetrating into the human arm modeled as a radially stratified cylinder. In this context, first, the electromagnetic scattering problem related to the layered cylindrical model [...] Read more.
In this study, a method is presented to determine the matching media parameters that maximize the electromagnetic energy penetrating into the human arm modeled as a radially stratified cylinder. In this context, first, the electromagnetic scattering problem related to the layered cylindrical model in question was solved analytically using cylindrical harmonics. Then, based on this solution, a frequency-dependent functional in terms of the electromagnetic parameters of the matching medium was defined, and the parameters that minimize this functional were determined through the graphs of this functional. In this functional, which depends on the permittivity, conductivity and frequency of the matching medium, one parameter was kept constant at every turn while the other two parameters were optimized. The accuracy of the approach was demonstrated by calculating the electric field amplitudes inside and outside the layers for the parameters determined by the proposed method. The numerical results given in this context demonstrate that if a matching medium is used, the penetrating field increases between 1.3 to 13.96 times compared to the case where the matching medium is absent. Full article
(This article belongs to the Special Issue Trends and Prospects in Applied Electromagnetics)
Show Figures

Figure 1

Figure 1
<p>Geometry of the problem with an internal object <math display="inline"><semantics> <mi mathvariant="script">D</mi> </semantics></math>.</p>
Full article ">Figure 2
<p>Amplitude variation of the functional <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <mi>f</mi> <mo>,</mo> <msub> <mi>ϵ</mi> <mrow> <mi>r</mi> <mspace width="0.222222em"/> <mi>m</mi> <mi>m</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>σ</mi> <mrow> <mi>m</mi> <mi>m</mi> </mrow> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Comparison of the total transmitted field amplitude variations along the line <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> in the innermost layer of the model for the <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>f</mi> <mo>,</mo> <msub> <mi>ϵ</mi> <mrow> <mi>r</mi> <mspace width="0.166667em"/> <mi>mm</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> pairs.</p>
Full article ">Figure 4
<p>Total scattered field computed outside and inside the arm model having an internal object in presence and absence of the matching medium at <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mn>0.5</mn> <mspace width="0.166667em"/> <mi>GHz</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Amplitude variation of the functional <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <mi>f</mi> <mo>,</mo> <msub> <mi>σ</mi> <mi>mm</mi> </msub> <mo>)</mo> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mrow> <mi>r</mi> <mi>mm</mi> </mrow> </msub> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Comparison of the total transmitted field amplitude variations along the line <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> in the innermost layer of the model for the <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>f</mi> <mo>,</mo> <msub> <mi>σ</mi> <mi>mm</mi> </msub> <mo>)</mo> </mrow> </semantics></math> pairs.</p>
Full article ">Figure 7
<p>Total scattered field computed outside and inside the arm model having an internal object in presence and absence of the matching medium at <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mn>1</mn> <mspace width="0.166667em"/> <mi>GHz</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Amplitude variation of the functional <math display="inline"><semantics> <mrow> <mi>F</mi> <mo>(</mo> <msub> <mi>ϵ</mi> <mrow> <mi>r</mi> <mspace width="0.222222em"/> <mi>mm</mi> </mrow> </msub> <mo>,</mo> <msub> <mi>σ</mi> <mi>mm</mi> </msub> <mo>)</mo> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mn>0.1</mn> <mspace width="0.166667em"/> <mi>GHz</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Comparison of the total transmitted field amplitude variations along the line <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> in the innermost layer of the model for the <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>ϵ</mi> <mrow> <mi>r</mi> <mspace width="0.166667em"/> <mi>mm</mi> </mrow> </msub> <mo>,</mo> <msub> <mi>σ</mi> <mi>mm</mi> </msub> <mo>)</mo> </mrow> </semantics></math> pairs.</p>
Full article ">Figure 10
<p>Total scattered field computed outside and inside the arm model having an internal object in presence and absence of the matching medium at <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>=</mo> <mn>0.1</mn> <mspace width="0.166667em"/> <mi>GHz</mi> </mrow> </semantics></math>.</p>
Full article ">
18 pages, 8911 KiB  
Article
Diagnosis of Autism Spectrum Disorder (ASD) by Dynamic Functional Connectivity Using GNN-LSTM
by Jun Tang, Jie Chen, Miaojun Hu, Yao Hu, Zixi Zhang and Liuming Xiao
Sensors 2025, 25(1), 156; https://doi.org/10.3390/s25010156 - 30 Dec 2024
Viewed by 332
Abstract
Early detection of autism spectrum disorder (ASD) is particularly important given its insidious qualities and the high cost of the diagnostic process. Currently, static functional connectivity studies have achieved significant results in the field of ASD detection. However, with the deepening of clinical [...] Read more.
Early detection of autism spectrum disorder (ASD) is particularly important given its insidious qualities and the high cost of the diagnostic process. Currently, static functional connectivity studies have achieved significant results in the field of ASD detection. However, with the deepening of clinical research, more and more evidence suggests that dynamic functional connectivity analysis can more comprehensively reveal the complex and variable characteristics of brain networks and their underlying mechanisms, thus providing more solid scientific support for computer-aided diagnosis of ASD. To overcome the lack of time-scale information in static functional connectivity analysis, in this paper, we proposes an innovative GNN-LSTM model, which combines the advantages of long short-term memory (LSTM) and graph neural networks (GNNs). The model captures the spatial features in fMRI data by GNN and aggregates the temporal information of dynamic functional connectivity using LSTM to generate a more comprehensive spatio-temporal feature representation of fMRI data. Further, a dynamic graph pooling method is proposed to extract the final node representations from the dynamic graph representations for classification tasks. To address the variable dependence of dynamic feature connectivity on time scales, the model introduces a jump connection mechanism to enhance information extraction between internal units and capture features at different time scales. The model achieves remarkable results on the ABIDE dataset, with accuracies of 80.4% on the ABIDE I and 79.63% on the ABIDE II, which strongly demonstrates the effectiveness and potential of the model for ASD detection. This study not only provides new perspectives and methods for computer-aided diagnosis of ASD but also provides useful references for research in related fields. Full article
Show Figures

Figure 1

Figure 1
<p>DFC calculation flow.</p>
Full article ">Figure 2
<p>Overview of the GNN-LSTM.</p>
Full article ">Figure 3
<p>Variable length jump connection instructions.</p>
Full article ">Figure 4
<p>ROC curves for different methods on ABIDE. (<b>a</b>) ABIDE I. (<b>b</b>) ABIDE II.</p>
Full article ">Figure 5
<p>Performance of different pooling methods (<b>a</b>) ABIDE I. (<b>b</b>) ABIDE II.</p>
Full article ">Figure 6
<p>Feature matrix visualization. (<b>a</b>) HC. (<b>b</b>) ASD.</p>
Full article ">Figure 7
<p>States in ASD.</p>
Full article ">Figure 8
<p>States in HC.</p>
Full article ">Figure 9
<p>Heat map of state transfer matrix for all subjects. (<b>a</b>) ASD. (<b>b</b>) HC.</p>
Full article ">Figure 10
<p>ASD subject state transition diagram.</p>
Full article ">Figure 11
<p>HC subject state transition diagram.</p>
Full article ">Figure 12
<p>Performance of the model for different <span class="html-italic">p</span>. (<b>a</b>) ABIDE I. (<b>b</b>) ABIDE II.</p>
Full article ">Figure 13
<p>Performance for different window sizes and window step. (<b>a</b>) ABIDE I. (<b>b</b>) ABIDE II.</p>
Full article ">
20 pages, 908 KiB  
Article
Mining Nuanced Weibo Sentiment with Hierarchical Graph Modeling and Self-Supervised Learning
by Chuyang Wang, Jessada Konpang, Adisorn Sirikham and Shasha Tian
Electronics 2025, 14(1), 41; https://doi.org/10.3390/electronics14010041 - 26 Dec 2024
Viewed by 274
Abstract
Weibo sentiment analysis has gained prominence, particularly during the COVID-19 pandemic, as a means to monitor public emotions and detect emerging mental health trends. However, challenges arise from Weibo’s informal language, nuanced expressions, and stylistic features unique to social media, which complicate the [...] Read more.
Weibo sentiment analysis has gained prominence, particularly during the COVID-19 pandemic, as a means to monitor public emotions and detect emerging mental health trends. However, challenges arise from Weibo’s informal language, nuanced expressions, and stylistic features unique to social media, which complicate the accurate interpretation of sentiments. Existing models often fall short, relying on text-based methods that inadequately capture the rich emotional texture of Weibo posts, and are constrained by single loss functions that limit emotional depth. To address these limitations, we propose a novel framework incorporating a sentiment graph and self-supervised learning. Our approach introduces a “sentiment graph” that leverages both word-to-post and post-to-post relational connections, allowing the model to capture fine-grained sentiment cues and context-dependent meanings. Enhanced by a gated mechanism within the graph, our model selectively filters emotional signals based on intensity and relevance, improving its sensitivity to subtle variations such as sarcasm. Additionally, a self-supervised objective enables the model to generalize beyond labeled data, capturing latent emotional structures within the graph. Through this integration of sentiment graph and self-supervised learning, our approach advances Weibo sentiment analysis, offering a robust method for understanding the complex emotional landscape of social media. Full article
(This article belongs to the Special Issue Artificial Intelligence in Graphics and Images)
Show Figures

Figure 1

Figure 1
<p>Our framework models the sentiment graph with self-supervised learning to enhance sentiment predictions.</p>
Full article ">Figure 2
<p>Label statistics for Dataset 1.</p>
Full article ">Figure 3
<p>Sensitivity analysis of <math display="inline"><semantics> <mi>λ</mi> </semantics></math>.</p>
Full article ">Figure 4
<p>Training losses.</p>
Full article ">Figure 5
<p>Attention maps between word and post.</p>
Full article ">Figure 6
<p>Training Time.</p>
Full article ">
25 pages, 1676 KiB  
Article
Research of Chinese Entity Recognition Model Based on Multi-Feature Semantic Enhancement
by Ling Yuan, Chenglong Zeng and Peng Pan
Electronics 2024, 13(24), 4895; https://doi.org/10.3390/electronics13244895 - 12 Dec 2024
Viewed by 388
Abstract
Chinese Entity Recognition (CER) aims to extract key information entities from Chinese text data, supporting subsequent natural language processing tasks such as relation extraction, knowledge graph construction, and intelligent question answering. However, CER faces several challenges, including limited training corpora, unclear entity boundaries, [...] Read more.
Chinese Entity Recognition (CER) aims to extract key information entities from Chinese text data, supporting subsequent natural language processing tasks such as relation extraction, knowledge graph construction, and intelligent question answering. However, CER faces several challenges, including limited training corpora, unclear entity boundaries, and complex entity structures, resulting in low accuracy and a call for further improvements. To address issues such as high annotation costs and ambiguous entity boundaries, this paper proposes the SEMFF-CER model, a CER model based on semantic enhancement and multi-feature fusion. The model employs character feature extraction algorithms, SofeLexicon semantic enhancement for vocabulary feature extraction, and deep semantic feature extraction from pre-trained models. These features are integrated into the entity recognition process via gating mechanisms, effectively leveraging diverse features to enhance contextual semantics and improve recognition accuracy. Additionally, the model incorporates several optimization strategies: an adaptive loss function to balance negative samples and improve the F1 score, data augmentation to enhance model robustness, and dropout and Adamax optimization algorithms to refine training. The SEMFF-CER model is characterized by a low dependence on training corpora, fast computation speed, and strong scalability. Experiments conducted on four Chinese benchmark entity recognition datasets validate the proposed model, demonstrating superior performance over existing models with the highest F1 score. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Architecture diagram of sequential entity recognition model based on semantic enhancement and multi-feature fusion.</p>
Full article ">Figure 2
<p>Flowchart of character word text vectorization.</p>
Full article ">Figure 3
<p>Schematic diagram of feature extraction of the root glyph.</p>
Full article ">Figure 4
<p>Flowchart of word matching.</p>
Full article ">Figure 5
<p>Schematic diagram of word frequency statistics.</p>
Full article ">Figure 6
<p>Diagram of multi-feature fusion.</p>
Full article ">Figure 7
<p>Loss decline plot for the Resume dataset.</p>
Full article ">Figure 8
<p>Experimental comparison of optimization effect of loss function.</p>
Full article ">Figure 9
<p>A comparison of the number of entities before and after augmentation.</p>
Full article ">Figure 10
<p>Comparison of ablation control experiments with feature fusion mode.</p>
Full article ">
27 pages, 428 KiB  
Article
Identifying Causal Effects Under Functional Dependencies
by Yizuo Chen and Adnan Darwiche
Entropy 2024, 26(12), 1061; https://doi.org/10.3390/e26121061 - 6 Dec 2024
Viewed by 446
Abstract
We study the identification of causal effects, motivated by two improvements to identifiability that can be attained if one knows that some variables in a causal graph are functionally determined by their parents (without needing to know the specific functions). First, an unidentifiable [...] Read more.
We study the identification of causal effects, motivated by two improvements to identifiability that can be attained if one knows that some variables in a causal graph are functionally determined by their parents (without needing to know the specific functions). First, an unidentifiable causal effect may become identifiable when certain variables are functional. Secondly, certain functional variables can be excluded from being observed without affecting the identifiability of a causal effect, which may significantly reduce the number of needed variables in observational data. Our results are largely based on an elimination procedure that removes functional variables from a causal graph while preserving key properties in the resulting causal graph, including the identifiability of causal effects. Our treatment of functional dependencies in this context mandates a formal, systematic, and general treatment of positivity assumptions, which are prevalent in the literature on causal effect identifiability and which interact with functional dependencies, leading to another contribution of the presented work. Full article
(This article belongs to the Special Issue Causal Graphical Models and Their Applications)
Show Figures

Figure 1

Figure 1
<p>Mutilated and projected graphs of a causal graph. Hidden variables are circled. A bidirected edge (<math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mn>1</mn> </msub> <mo>⤎</mo> <mo>⤏</mo> <msub> <mi>V</mi> <mn>2</mn> </msub> </mrow> </semantics></math>) is aa compact notation for <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mn>1</mn> </msub> <mo>←</mo> <mi>H</mi> <mo>→</mo> <msub> <mi>V</mi> <mn>2</mn> </msub> </mrow> </semantics></math>, where <span class="html-italic">H</span> is an auxiliary hidden variable. (<b>a</b>) Causal graph; (<b>b</b>) mutilated graph; (<b>c</b>) projected graph.</p>
Full article ">Figure 2
<p>Examples for positivity.</p>
Full article ">Figure 3
<p>Contrasting projection with functional projection. <span class="html-italic">C</span> and <span class="html-italic">D</span> are functional. Hidden variables are circled. (<b>a</b>) DAG; (<b>b</b>) proj. (<b>a</b>) on <span class="html-italic">A</span>, <span class="html-italic">B</span>, <span class="html-italic">G</span>, <span class="html-italic">H</span>, <span class="html-italic">I</span>; (<b>c</b>) eliminate <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>,</mo> <mi>D</mi> </mrow> </semantics></math> from (<b>a</b>); (<b>d</b>) proj. (<b>c</b>) on <span class="html-italic">A</span>, <span class="html-italic">B</span>, <span class="html-italic">G</span>, <span class="html-italic">H</span>, <span class="html-italic">I</span>.</p>
Full article ">Figure 4
<p><span class="html-italic">B</span> is functional. (<b>a</b>) DAG; (<b>b</b>) projection.</p>
Full article ">Figure 5
<p>Variables <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>,</mo> <mi>B</mi> <mo>,</mo> <mi>C</mi> <mo>,</mo> <mi>F</mi> <mo>,</mo> <mi>X</mi> </mrow> </semantics></math>, and <span class="html-italic">Y</span> are observed. Variables <span class="html-italic">D</span> and <span class="html-italic">E</span> are functional (and hidden). (<b>a</b>) Causal graph; (<b>b</b>) proj. of (<b>a</b>); (<b>c</b>) F-proj. of (<b>a</b>); (<b>d</b>) F-elim. <span class="html-italic">F</span>; (<b>e</b>) F-elim. <span class="html-italic">B</span>.</p>
Full article ">
22 pages, 1599 KiB  
Article
Single-Stage Entity–Relation Joint Extraction of Pesticide Registration Information Based on HT-BES Multi-Dimensional Labeling Strategy
by Chenyang Dong, Shiyu Xi, Yinchao Che, Shufeng Xiong, Xinming Ma, Lei Xi and Shuping Xiong
Algorithms 2024, 17(12), 559; https://doi.org/10.3390/a17120559 - 6 Dec 2024
Viewed by 366
Abstract
Pesticide registration information is an essential part of the pesticide knowledge base. However, the large amount of unstructured text data that it contains pose significant challenges for knowledge storage, retrieval, and utilization. To address the characteristics of pesticide registration text such as high [...] Read more.
Pesticide registration information is an essential part of the pesticide knowledge base. However, the large amount of unstructured text data that it contains pose significant challenges for knowledge storage, retrieval, and utilization. To address the characteristics of pesticide registration text such as high information density, complex logical structures, large spans between entities, and heterogeneous entity lengths, as well as to overcome the challenges faced when using traditional joint extraction methods, including triplet overlap, exposure bias, and redundant computation, we propose a single-stage entity–relation joint extraction model based on HT-BES multi-dimensional labeling (MD-SERel). First, in the encoding layer, to address the complex structural characteristics of pesticide registration texts, we employ RoBERTa combined with a multi-head self-attention mechanism to capture the deep semantic features of the text. Simultaneously, syntactic features are extracted using a syntactic dependency tree and graph neural networks to enhance the model’s understanding of text structure. Subsequently, we integrate semantic and syntactic features, enriching the character vector representations and thus improving the model’s ability to represent complex textual data. Secondly, in the multi-dimensional labeling framework layer, we use HT-BES multi-dimensional labeling, where the model assigns multiple labels to each character. These labels include entity boundaries, positions, and head–tail entity association information, which naturally resolves overlapping triplets. Through utilizing a parallel scoring function and fine-grained classification components, the joint extraction of entities and relations is transformed into a multi-label sequence labeling task based on relation dimensions. This process does not involve interdependent steps, thus enabling single-stage parallel labeling, preventing exposure bias and reducing computational redundancy. Finally, in the decoding layer, entity–relation triplets are decoded based on the predicted labels from the fine-grained classification. The experimental results demonstrate that the MD-SERel model performs well on both the Pesticide Registration Dataset (PRD) and the general DuIE dataset. On the PRD, compared to the optimal baseline model, the training time is 1.2 times faster, the inference time is 1.2 times faster, and the F1 score is improved by 1.5%, demonstrating its knowledge extraction capabilities in pesticide registration documents. On the DuIE dataset, the MD-SERel model also achieved better results compared to the baseline, demonstrating its strong generalization ability. These findings will provide technical support for the construction of pesticide knowledge bases. Full article
(This article belongs to the Special Issue Algorithms for Feature Selection (3rd Edition))
Show Figures

Figure 1

Figure 1
<p>MD-SERel model.</p>
Full article ">Figure 2
<p>Self-attention mechanism architecture diagram.</p>
Full article ">Figure 3
<p>Syntactic dependency matrix. In the <a href="#algorithms-17-00559-f003" class="html-fig">Figure 3</a>, (<b>a</b>) is the result of semantic analysis of example sentences. (<b>b</b>) is a semantic adjacency matrix constructed from (<b>a</b>).</p>
Full article ">Figure 4
<p>HT-BES interactive annotation strategy.</p>
Full article ">Figure 5
<p>The type and quantity distribution of entities and relations.</p>
Full article ">Figure 6
<p>Entity lengths.</p>
Full article ">Figure 7
<p>The results for different overlapping patterns of triples.</p>
Full article ">Figure 8
<p>The results of different self-attention head numbers.</p>
Full article ">
19 pages, 3072 KiB  
Article
Coordinate-Corrected and Graph-Convolution-Based Hand Pose Estimation Method
by Dang Rong and Feng Gang
Sensors 2024, 24(22), 7289; https://doi.org/10.3390/s24227289 - 14 Nov 2024
Viewed by 456
Abstract
To address the problem of low accuracy in joint point estimation in hand pose estimation methods due to the self-similarity of fingers and easy self-obscuration of hand joints, a hand pose estimation method based on coordinate correction and graph convolution is proposed. First, [...] Read more.
To address the problem of low accuracy in joint point estimation in hand pose estimation methods due to the self-similarity of fingers and easy self-obscuration of hand joints, a hand pose estimation method based on coordinate correction and graph convolution is proposed. First, the standard coordinate encoding is improved by generating an unbiased heat map, and the distribution-aware method is used for decoding coordinates to reduce the error in decoding the coordinate encoding of joints. Then, the complex dependency relationship between the joints and the relationship between pixels and joints of the hand are modeled by using graph convolution, and the feature information of the hand joints is enhanced by determining the relationship between the hand joints. Finally, the skeletal constraint loss function is used to impose constraints on the joints, and a natural and undistorted hand skeleton structure is generated. Training tests are conducted on the public gesture interaction dataset STB, and the experimental results show that the method in this paper can reduce errors in hand joint point detection and improve the estimation accuracy. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

Figure 1
<p>A global network model for hand pose estimation.</p>
Full article ">Figure 2
<p>Hourglass network model.</p>
Full article ">Figure 3
<p>Residual block module.</p>
Full article ">Figure 4
<p>Joint graph reasoning module.</p>
Full article ">Figure 5
<p>Skeletal topology of the hand.</p>
Full article ">Figure 6
<p>Hand pose estimation visualization results.</p>
Full article ">Figure 7
<p>Comparison of the experimental results of different methods.</p>
Full article ">
11 pages, 1613 KiB  
Article
Quantitative Evaluation of Enamel Thickness in Maxillary Central Incisors in Different Age Groups Utilizing Cone Beam Computed Tomography a Retrospective Analysis
by Kinga Mária Jánosi, Diana Cerghizan, Izabella Éva Mureșan, Alpár Kovács, Andrea Szász, Emese Rita Markovics, Krisztina Ildikó Mártha and Silvia Izabella Pop
Diagnostics 2024, 14(22), 2518; https://doi.org/10.3390/diagnostics14222518 - 11 Nov 2024
Viewed by 617
Abstract
Background/Objectives: The presence of enamel on the tooth surface is crucial for the long-term success of minimally invasive adhesive restorations such as dental veneers. Our study aims to evaluate the enamel thickness in the incisal, middle, and cervical portions of the labial surface [...] Read more.
Background/Objectives: The presence of enamel on the tooth surface is crucial for the long-term success of minimally invasive adhesive restorations such as dental veneers. Our study aims to evaluate the enamel thickness in the incisal, middle, and cervical portions of the labial surface of the upper central incisors using cone beam computed tomography (CBCT). This imaging method provides detailed and accurate three-dimensional images with a low radiation dose, allowing an accurate assessment of enamel thickness. The analysis aims to identify variations in enamel thickness depending on the age and different levels of the labial tooth surface. Methods: 800 CBCT scans performed for diagnostic or therapeutic purposes on patients aged 18–60 years were analyzed. The data were gathered from the imaging archives of private practitioners from Targu Mures and the “George Emil Palade” University of Medicine, Pharmacy, Science, and Technology of Targu Mures. Enamel thickness measurements were conducted using the OnDemand3D Communicator CBCT evaluation program, with subsequent statistical analysis performed using GraphPad Instat Prism software. Results: Results showed significant variation in enamel thickness between the incisal, middle, and cervical segments of the labial surface of the upper central incisors. A decrease in enamel thickness with age has been observed. In patients aged 18–40, mean values of enamel thickness 1 mm and 3 mm above the cementoenamel junction (CEJ) were 0.48 ± 0.092, respectively, 0.819 ± 0.158. In patients over 40, the mean values were 0.454 ± 0.116 and 0.751 ± 0.067 at 1 mm, respectively, 3 mm above the CEJ. Statistically significant differences were found between the two age groups at 1 mm and 3 mm above the CEJ, with p < 0.0001 and p = 0.0214. Conclusions: A statistically significant decrease can be observed in enamel thickness in almost the entire labial surface of the upper central incisors with aging. The varied thickness of the enamel at different tooth levels requires individualized planning for each patient to maximize the long-term aesthetic and functional results. Full article
(This article belongs to the Special Issue Advances in Oral Diseases Diagnosis and Management: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>The visualization of the CBCT images: (<b>a</b>) the Dental module of the OnDemand3D communicator software version 1.0 (Cybermed, Daejeon, Republic of Korea); (<b>b</b>) the landmarks used for the measurements.</p>
Full article ">Figure 2
<p>The differences between the values recorded by measuring the thickness of the enamel at the level of the right central incisor in the two groups studied: (<b>a</b>) difference at the landmark placed 1 mm incisally from CEJ; (<b>b</b>) difference at the landmark placed 3 mm incisally from CEJ; (<b>c</b>) difference at the landmark placed 5 mm incisally from CEJ; (<b>d</b>) difference at the landmark placed 1 mm apically from the IE.</p>
Full article ">Figure 3
<p>The differences between the values recorded by measuring the thickness of the enamel at the level of the left central incisor in the two groups studied: (<b>a</b>) difference at the landmark placed 1 mm incisally from CEJ; (<b>b</b>) difference at the landmark placed 3 mm incisally from CEJ; (<b>c</b>) difference at the landmark placed 5 mm incisally from CEJ; (<b>d</b>) difference at the landmark placed 1 mm apically from the IE.</p>
Full article ">
22 pages, 2513 KiB  
Article
CURATE: Scaling-Up Differentially Private Causal Graph Discovery
by Payel Bhattacharjee and Ravi Tandon
Entropy 2024, 26(11), 946; https://doi.org/10.3390/e26110946 - 5 Nov 2024
Viewed by 534
Abstract
Causal graph discovery (CGD) is the process of estimating the underlying probabilistic graphical model that represents the joint distribution of features of a dataset. CGD algorithms are broadly classified into two categories: (i) constraint-based algorithms, where the outcome depends on conditional independence (CI) [...] Read more.
Causal graph discovery (CGD) is the process of estimating the underlying probabilistic graphical model that represents the joint distribution of features of a dataset. CGD algorithms are broadly classified into two categories: (i) constraint-based algorithms, where the outcome depends on conditional independence (CI) tests, and (ii) score-based algorithms, where the outcome depends on optimized score function. Because sensitive features of observational data are prone to privacy leakage, differential privacy (DP) has been adopted to ensure user privacy in CGD. Adding the same amount of noise in this sequential-type estimation process affects the predictive performance of algorithms. Initial CI tests in constraint-based algorithms and later iterations of the optimization process of score-based algorithms are crucial; thus, they need to be more accurate and less noisy. Based on this key observation, we present CURATE (CaUsal gRaph AdapTivE privacy), a DP-CGD framework with adaptive privacy budgeting. In contrast to existing DP-CGD algorithms with uniform privacy budgeting across all iterations, CURATE allows for adaptive privacy budgeting by minimizing error probability (constraint-based), maximizing iterations of the optimization problem (score-based) while keeping the cumulative leakage bounded. To validate our framework, we present a comprehensive set of experiments on several datasets and show that CURATE achieves higher utility compared to existing DP-CGD algorithms with less privacy leakage. Full article
(This article belongs to the Special Issue Information-Theoretic Security and Privacy)
Show Figures

Figure 1

Figure 1
<p>Generic workflow of constraint-based CGD algorithms, showing the skeleton orientation phases. The skeleton phase starts with a fully connected graph consisting of <span class="html-italic">d</span> nodes, where <span class="html-italic">d</span> is the number of features/variables and <math display="inline"><semantics> <msub> <mi>k</mi> <mi>i</mi> </msub> </semantics></math> is the maximum number of CI tests in order <span class="html-italic">i</span>. The sequence and number of tests in any order <span class="html-italic">i</span> are dependent on the outcomes of the order <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>i</mi> <mo>−</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math> tests. Notably, the skeleton phase is prone to privacy leakage.</p>
Full article ">Figure 2
<p>The composition mechanism in constraint-based <span class="html-italic">CURATE</span> across all orders of CI tests. For every order (i), the total privacy leakage is calculated with advanced composition, as the privacy budgets and failure probabilities for all order-<math display="inline"><semantics> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </semantics></math> tests are the same. The total leakage across all orders is then calculated by constraint-based <span class="html-italic">CURATE</span> using basic composition.</p>
Full article ">Figure 3
<p>The threshold marginalization mechanism adopted in the constraint-based CURATE algorithm. The margins <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>β</mi> <mn>2</mn> </msub> </mrow> </semantics></math> allow for additional flexibility during hypothesis testing with noisy CI tests.</p>
Full article ">Figure 4
<p>Possible number of iterations <span class="html-italic">I</span> given a total amount of privacy budget <math display="inline"><semantics> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> </semantics></math> and initial privacy budget <math display="inline"><semantics> <msub> <mi>ϵ</mi> <mn>0</mn> </msub> </semantics></math>. For varied total privacy budget <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>0.1</mn> <mo>,</mo> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>1.0</mn> </mrow> </semantics></math>,<math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>10.0</mn> </mrow> </semantics></math> and different initial budget <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mn>0</mn> </msub> <mo>&lt;</mo> <mo>&lt;</mo> <mn>1.0</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mn>0</mn> </msub> <mo>&gt;</mo> <mn>1.0</mn> </mrow> </semantics></math>, it can be observed that the multiplicative method executes more iterations in the high-privacy regime (i.e., <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mn>0</mn> </msub> <mo>&lt;</mo> <mo>&lt;</mo> <mn>1.0</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>Dataset description and CGD results for the non-private PC algorithm [<a href="#B1-entropy-26-00946" class="html-bibr">1</a>] on six public CGD datasets with Kendall’s <math display="inline"><semantics> <mi>τ</mi> </semantics></math> CI test statistic. The results were obtained with the following parameters: subsampling rate <math display="inline"><semantics> <mrow> <mo>=</mo> <mn>1.0</mn> </mrow> </semantics></math>, test threshold <math display="inline"><semantics> <mrow> <mo>=</mo> <mn>0.05</mn> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Part (<b>a</b>) presents the performance evaluation results of the differentially private CGD algorithms (EM-PC [<a href="#B21-entropy-26-00946" class="html-bibr">21</a>], SVT-PC, Priv-PC [<a href="#B20-entropy-26-00946" class="html-bibr">20</a>], NOLEAKS [<a href="#B22-entropy-26-00946" class="html-bibr">22</a>], and both score-based and constraint-based <span class="html-italic">CURATE</span>) in terms of total leakage vs. F1 score on six public CGD datasets: Cancer, Earthquake, Survey, Asia, Sachs, and Child. Part (<b>b</b>) presents the mean and standard deviation of the F1-score for 50 consecutive runs and for three privacy regimes (<math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>0.1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>5.0</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>10.0</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 7
<p>Average number of CI tests needed to achieve the maximum F1-score with a comparatively large amount of total leakage (<math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mi>Total</mi> </msub> <mo>=</mo> <mn>1.0</mn> </mrow> </semantics></math>) on the Cancer, Earthquake, Survey, Asia, Sachs, and Child datasets. The average CI tests of <span class="html-italic">CURATE</span> converges to that of the non-private PC algorithm, whereas EM-PC [<a href="#B17-entropy-26-00946" class="html-bibr">17</a>], Priv-PC, and SVT-PC [<a href="#B20-entropy-26-00946" class="html-bibr">20</a>] tend to run more CI tests.</p>
Full article ">Figure 8
<p>Running time comparison (in seconds) of differentially private constraint-based and score-based algorithms on six public CGD datasets: Cancer, Earthquake, Survey, Asia, Sachs, and Child for 50 consecutive iterations.</p>
Full article ">
23 pages, 16776 KiB  
Article
A Joint Estimation Method of Distribution Network Topology and Line Parameters Based on Power Flow Graph Convolutional Networks
by Yu Wang, Xiaodong Shen, Xisheng Tang and Junyong Liu
Energies 2024, 17(21), 5272; https://doi.org/10.3390/en17215272 - 23 Oct 2024
Viewed by 693
Abstract
Accurate identification of network topology and line parameters is essential for effective management of distribution systems. An innovative joint estimation method for distribution network topology and line parameters is presented, utilizing a power flow graph convolutional network (PFGCN). This approach addresses the limitations [...] Read more.
Accurate identification of network topology and line parameters is essential for effective management of distribution systems. An innovative joint estimation method for distribution network topology and line parameters is presented, utilizing a power flow graph convolutional network (PFGCN). This approach addresses the limitations of traditional methods that rely on costly voltage phase angle measurements. The node correlation principle is applied to construct a node correlation matrix, and a minimum distance iteration algorithm is proposed to generate candidate topologies, which serve as graph inputs for the parameter estimation model. Based on the topological dependencies and convolutional properties of AC power flow equations, a PFGCN model is designed for line parameter estimation. Parameter refinement is achieved through an alternating iterative process of pseudo-trend calculation and neural network training. Training convergence and loss function values are used as feedback to filter and validate candidate topologies, enabling precise joint estimation of both topologies and parameters. The proposed method’s accuracy, transferability, and robustness are demonstrated through experiments on the IEEE-33 and modified IEEE-69 distribution systems. Multiple metrics, including MAPE, IAE, MAE, and R2, highlight the proposed method’s advantages over Adaptive Ridge Regression (ARR). In the C33 scenario, the proposed method achieves MAPEs of 4.6% for g and 5.7% for b, outperforming the ARR method with MAPEs of 7.1% and 7.9%, respectively. Similarly, in the IC69 scenario, the proposed method records MAPEs of 3.0% for g and 5.9% for b, surpassing the ARR method’s 5.1% and 8.3%. Full article
(This article belongs to the Special Issue Big Data Analysis and Application in Power System)
Show Figures

Figure 1

Figure 1
<p>A framework for joint estimation of topology and line parameters.</p>
Full article ">Figure 2
<p>The structure of a single line.</p>
Full article ">Figure 3
<p>The framework of the line parameter estimation model.</p>
Full article ">Figure 4
<p>Infrastructure for the power flow graph convolutional network.</p>
Full article ">Figure 5
<p>Topology of the 33-node system.</p>
Full article ">Figure 6
<p>Topology for the improved 69-node system.</p>
Full article ">Figure 7
<p>C33 scene, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> </mrow> </semantics></math> = 0.6, 6-group node correlation matrix <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mn>1</mn> </msub> <mo>−</mo> <msub> <mi>K</mi> <mn>6</mn> </msub> </mrow> </semantics></math> results.</p>
Full article ">Figure 8
<p>The values of the loss function <math display="inline"><semantics> <mi>F</mi> </semantics></math> for the training process in the C33 scenario for topology 1 and topology 2.</p>
Full article ">Figure 9
<p>C33 scene, the initial value of the convolution kernel obtained from regression estimation and the final result of the convolution kernel after training.</p>
Full article ">Figure 10
<p>Comparison between reference values and estimated results for C33 scenario line parameters.</p>
Full article ">Figure 11
<p>The average of the accuracy <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mn>1</mn> </msub> </mrow> </semantics></math> of the candidate topologies, C33 scene, <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> </mrow> </semantics></math> = 0.2, 0.4, 0.6, 0.8.</p>
Full article ">Figure 12
<p>IC69 scene, the initial value of the convolution kernel obtained from regression estimation and the final result of the convolution kernel after training.</p>
Full article ">Figure 13
<p>Comparison between reference values and estimated results for IC69 scene line parameters.</p>
Full article ">Figure 14
<p>Line parameter estimation accuracy of PFGCN and ARR Models for Scenario C33.</p>
Full article ">Figure 15
<p>Line parameter estimation accuracy of PFGCN and ARR Models for Scenario IC69.</p>
Full article ">Figure 16
<p>Candidate topology accuracy results for IEEE-33 system (C33, C33_0.1, C33_0.2) and improved IEEE-69 system (IC69, IC69_0.1, IC69_0.2) with different error levels (<math display="inline"><semantics> <mi>ε</mi> </semantics></math> = 0.1%, 0.2%).</p>
Full article ">
14 pages, 1035 KiB  
Article
Distributed Disturbance Observer-Based Containment Control of Multi-Agent Systems with Event-Triggered Communications
by Lin Hu and Long Jian
Mathematics 2024, 12(19), 3117; https://doi.org/10.3390/math12193117 - 5 Oct 2024
Viewed by 610
Abstract
This article investigates a class of multi-agent systems (MASs) with known dynamics external disturbances, where the communication graph is directed, and the followers have undirected connections. To eliminate the impacts of external disturbance, the technologies of disturbance observer-based control are introduced into the [...] Read more.
This article investigates a class of multi-agent systems (MASs) with known dynamics external disturbances, where the communication graph is directed, and the followers have undirected connections. To eliminate the impacts of external disturbance, the technologies of disturbance observer-based control are introduced into the containment control problems. Additionally, to save communication costs and energy consumption, a distributed disturbance observer-based event-triggered controller is employed to achieve containment control and reject disturbance. Furthermore, designing the event-triggered function using an exponential function is beneficial for a time-dependent term while ensuring the exclusion of Zeno behavior. Finally, a numerical simulation is provided to validate the effectiveness of the theoretical analysis. Full article
Show Figures

Figure 1

Figure 1
<p>Communication graph <math display="inline"><semantics> <msub> <mi mathvariant="script">G</mi> <mrow> <mi mathvariant="fraktur">F</mi> <mo>∪</mo> <mi mathvariant="fraktur">L</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>The first−state trajectories <math display="inline"><semantics> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> </semantics></math> of nine agents under controller (3).</p>
Full article ">Figure 3
<p>The second−state trajectories <math display="inline"><semantics> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> </semantics></math> of nine agents under controller (3).</p>
Full article ">Figure 4
<p>The three−dimensional trajectories of all agents.</p>
Full article ">Figure 5
<p>Triggering time of each follower.</p>
Full article ">
49 pages, 819 KiB  
Article
Copula Approximate Bayesian Computation Using Distribution Random Forests
by George Karabatsos
Stats 2024, 7(3), 1002-1050; https://doi.org/10.3390/stats7030061 - 17 Sep 2024
Viewed by 965
Abstract
Ongoing modern computational advancements continue to make it easier to collect increasingly large and complex datasets, which can often only be realistically analyzed using models defined by intractable likelihood functions. This Stats invited feature article introduces and provides an extensive simulation study of [...] Read more.
Ongoing modern computational advancements continue to make it easier to collect increasingly large and complex datasets, which can often only be realistically analyzed using models defined by intractable likelihood functions. This Stats invited feature article introduces and provides an extensive simulation study of a new approximate Bayesian computation (ABC) framework for estimating the posterior distribution and the maximum likelihood estimate (MLE) of the parameters of models defined by intractable likelihoods, that unifies and extends previous ABC methods proposed separately. This framework, copulaABCdrf, aims to accurately estimate and describe the possibly skewed and high-dimensional posterior distribution by a novel multivariate copula-based meta-t distribution based on univariate marginal posterior distributions that can be accurately estimated by distribution random forests (drf), while performing automatic summary statistics (covariates) selection, based on robustly estimated copula dependence parameters. The copulaABCdrf framework also provides a novel multivariate mode estimator to perform MLE and posterior mode estimation and an optional step to perform model selection from a given set of models using posterior probabilities estimated by drf. The posterior distribution estimation accuracy of the ABC framework is illustrated and compared with previous standard ABC methods through several simulation studies involving low- and high-dimensional models with computable posterior distributions, which are either unimodal, skewed, or multimodal; and exponential random graph and mechanistic network models, each defined by an intractable likelihood from which it is costly to simulate large network datasets. This paper also proposes and studies a new solution to the simulation cost problem in ABC involving the posterior estimation of parameters from datasets simulated from the given model that are smaller compared to the potentially large size of the dataset being analyzed. This proposal is motivated by the fact that, for many models defined by intractable likelihoods, such as the network models when they are applied to analyze massive networks, the repeated simulation of large datasets (networks) for posterior-based parameter estimation can be too computationally costly and vastly slow down or prohibit the use of standard ABC methods. The copulaABCdrf framework and standard ABC methods are further illustrated through analyses of large real-life networks of sizes ranging between 28,000 and 65.6 million nodes (between 3 million and 1.8 billion edges), including a large multilayer network with weighted directed edges. The results of the simulation studies show that, in settings where the true posterior distribution is not highly multimodal, copulaABCdrf usually produced similar point estimates from the posterior distribution for low-dimensional parametric models as previous ABC methods, but the copula-based method can produce more accurate estimates from the posterior distribution for high-dimensional models, and, in both dimensionality cases, usually produced more accurate estimates of univariate marginal posterior distributions of parameters. Also, posterior estimation accuracy was usually improved when pre-selecting the important summary statistics using drf compared to ABC employing no pre-selection of the subset of important summaries. For all ABC methods studied, accurate estimation of a highly multimodal posterior distribution was challenging. In light of the results of all the simulation studies, this article concludes by discussing how the copulaABCdrf framework can be improved for future research. Full article
(This article belongs to the Section Bayesian Methods)
Show Figures

Figure 1

Figure 1
<p>For each of the five model parameters (arranged in plots from left to right), trace plots of univariate marginal distributions, obtained from 10,000 MCMC Gibbs and slice samples of the exact multimodal posterior distribution, conditionally on the first data replication (for illustration). In each of the five trace plots, the x-axis refers to the sampling iteration number and the y-axis gives the realized sample value of the given model parameter.</p>
Full article ">
17 pages, 1690 KiB  
Article
Robust Optimization Research of Cyber–Physical Power System Considering Wind Power Uncertainty and Coupled Relationship
by Jiuling Dong, Zilong Song, Yuanshuo Zheng, Jingtang Luo, Min Zhang, Xiaolong Yang and Hongbing Ma
Entropy 2024, 26(9), 795; https://doi.org/10.3390/e26090795 - 17 Sep 2024
Viewed by 802
Abstract
To mitigate the impact of wind power uncertainty and power–communication coupling on the robustness of a new power system, a bi-level mixed-integer robust optimization strategy is proposed. Firstly, a coupled network model is constructed based on complex network theory, taking into account the [...] Read more.
To mitigate the impact of wind power uncertainty and power–communication coupling on the robustness of a new power system, a bi-level mixed-integer robust optimization strategy is proposed. Firstly, a coupled network model is constructed based on complex network theory, taking into account the coupled relationship of energy supply and control dependencies between the power and communication networks. Next, a bi-level mixed-integer robust optimization model is developed to improve power system resilience, incorporating constraints related to the coupling strength, electrical characteristics, and traffic characteristics of the information network. The upper-level model seeks to minimize load shedding by optimizing DC power flow using fuzzy chance constraints, thereby reducing the risk of power imbalances caused by random fluctuations in wind power generation. Furthermore, the deterministic power balance constraints are relaxed into inequality constraints that account for wind power forecasting errors through fuzzy variables. The lower-level model focuses on minimizing traffic load shedding by establishing a topology–function-constrained information network traffic model based on the maximum flow principle in graph theory, thereby improving the efficiency of network flow transmission. Finally, a modified IEEE 39-bus test system with intermittent wind power is used as a case study. Random attack simulations demonstrate that, under the highest link failure rate and wind power penetration, Model 2 outperforms Model 1 by reducing the load loss ratio by 23.6% and improving the node survival ratio by 5.3%. Full article
(This article belongs to the Special Issue Robustness and Resilience of Complex Networks)
Show Figures

Figure 1

Figure 1
<p>Topological structure of interdependent power–communication networks.</p>
Full article ">Figure 2
<p>Diagram of modified IEEE 39-bus system.</p>
Full article ">Figure 3
<p>Node survival ratio and load loss ratio of different models under IEEE 39-bus system. (<b>a</b>) Node survival ratio under different models. (<b>b</b>) Load loss ratio under different models.</p>
Full article ">Figure 4
<p>Node survival ratio and load loss ratio of different models under IEEE 118-bus system. (<b>a</b>) Node survival ratio under different models. (<b>b</b>) Load loss ratio under different models.</p>
Full article ">
10 pages, 448 KiB  
Article
Random Generation Topology Coding Technique in Asymmetric Topology Encryption
by Jing Su and Bing Yao
Mathematics 2024, 12(17), 2768; https://doi.org/10.3390/math12172768 - 6 Sep 2024
Viewed by 940
Abstract
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers on these mathematical problems. The security of this encryption algorithm depends [...] Read more.
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers on these mathematical problems. The security of this encryption algorithm depends on two types of NP-complete problems: subgraph isomorphism and graph coloring. Topological coding technology refers to the technology of generating key strings or topology signature strings through topological coding graphs. We take odd-graceful labeling and set-ordered odd-graceful labeling as limiting functions, and propose two kinds of topological coding generation technique, which we call the random leaf-adding operation and randomly adding edge-removing operation. Through these two techniques, graphs of the same scale and larger scales can be generated with the same type of labeling so as to derive more number strings, expand the key space, and analyze the topology and property of the generated graphs. Full article
Show Figures

Figure 1

Figure 1
<p>Scheme for asymmetric topology encryption.</p>
Full article ">Figure 2
<p>An example of number strings derived from a topological coding matrix.</p>
Full article ">Figure 3
<p>Keeping the odd-graceful labeling in the randomly adding edge-removing operation.</p>
Full article ">Figure 4
<p>An example of random leaf-adding operation, added leaves are marked with blue vertices and purple vertices.</p>
Full article ">Figure A1
<p>Keeping the odd-graceful labeling in the randomly adding edge-removing operation.</p>
Full article ">
Back to TopTop