29,427 research outputs found
Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
How to develop slim and accurate deep neural networks has become crucial for
real- world applications, especially for those employed in embedded systems.
Though previous work along this research line has shown some promising results,
most existing methods either fail to significantly compress a well-trained deep
network or require a heavy retraining process for the pruned deep network to
re-boost its prediction performance. In this paper, we propose a new layer-wise
pruning method for deep neural networks. In our proposed method, parameters of
each individual layer are pruned independently based on second order
derivatives of a layer-wise error function with respect to the corresponding
parameters. We prove that the final prediction performance drop after pruning
is bounded by a linear combination of the reconstructed errors caused at each
layer. Therefore, there is a guarantee that one only needs to perform a light
retraining process on the pruned network to resume its original prediction
performance. We conduct extensive experiments on benchmark datasets to
demonstrate the effectiveness of our pruning method compared with several
state-of-the-art baseline methods
Learning Robustness with Bounded Failure: An Iterative MPC Approach
We propose an approach to design a Model Predictive Controller (MPC) for
constrained Linear Time Invariant systems performing an iterative task. The
system is subject to an additive disturbance, and the goal is to learn to
satisfy state and input constraints robustly. Using disturbance measurements
after each iteration, we construct Confidence Support sets, which contain the
true support of the disturbance distribution with a given probability. As more
data is collected, the Confidence Supports converge to the true support of the
disturbance. This enables design of an MPC controller that avoids conservative
estimate of the disturbance support, while simultaneously bounding the
probability of constraint violation. The efficacy of the proposed approach is
then demonstrated with a detailed numerical example.Comment: Added GitHub link to all source code
Efficient Database Generation for Data-driven Security Assessment of Power Systems
Power system security assessment methods require large datasets of operating
points to train or test their performance. As historical data often contain
limited number of abnormal situations, simulation data are necessary to
accurately determine the security boundary. Generating such a database is an
extremely demanding task, which becomes intractable even for small system
sizes. This paper proposes a modular and highly scalable algorithm for
computationally efficient database generation. Using convex relaxation
techniques and complex network theory, we discard large infeasible regions and
drastically reduce the search space. We explore the remaining space by a highly
parallelizable algorithm and substantially decrease computation time. Our
method accommodates numerous definitions of power system security. Here we
focus on the combination of N-k security and small-signal stability.
Demonstrating our algorithm on IEEE 14-bus and NESTA 162-bus systems, we show
how it outperforms existing approaches requiring less than 10% of the time
other methods require.Comment: Database publicly available at:
https://github.com/johnnyDEDK/OPs_Nesta162Bus - Paper accepted for
publication at IEEE Transactions on Power System
Recommended from our members
Chapter 2Â -Â Data-Driven Energy Efficient Driving Control in Connected Vehicle Environment
- …