463 research outputs found

    Optimizing Taxi Carpool Policies via Reinforcement Learning and Spatio-Temporal Mining

    Full text link
    In this paper, we develop a reinforcement learning (RL) based system to learn an effective policy for carpooling that maximizes transportation efficiency so that fewer cars are required to fulfill the given amount of trip demand. For this purpose, first, we develop a deep neural network model, called ST-NN (Spatio-Temporal Neural Network), to predict taxi trip time from the raw GPS trip data. Secondly, we develop a carpooling simulation environment for RL training, with the output of ST-NN and using the NYC taxi trip dataset. In order to maximize transportation efficiency and minimize traffic congestion, we choose the effective distance covered by the driver on a carpool trip as the reward. Therefore, the more effective distance a driver achieves over a trip (i.e. to satisfy more trip demand) the higher the efficiency and the less will be the traffic congestion. We compared the performance of RL learned policy to a fixed policy (which always accepts carpool) as a baseline and obtained promising results that are interpretable and demonstrate the advantage of our RL approach. We also compare the performance of ST-NN to that of state-of-the-art travel time estimation methods and observe that ST-NN significantly improves the prediction performance and is more robust to outliers.Comment: Accepted at IEEE International Conference on Big Data 2018. arXiv admin note: text overlap with arXiv:1710.0435

    The Complex Function Method Roadway Section Design of the Soft Coal Seam

    Get PDF
    As for the sophisticated advanced support technique of vertical wall semicircle arch roadway in the three-soft coal seam, a design of flat top U-shape roadway section was put forward. Based on the complex function method, the surrounding rock displacement and stress distribution laws both of vertical wall semicircle arch roadway and of flat top U-shape roadway were obtained. The results showed that the displacement distribution laws in the edge of roadway surrounding rock were similar between the two different roadways and the area of plasticity proportion of flat top U-shape roadway approximately equals that of vertical wall semicircle arch roadway. Based on finite element method, the bearing behaviors of the U-type steel support under the interaction of surrounding rock in vertical wall semicircle arch roadway and flat top U-shape roadway were analyzed. The results showed that, from a mechanics perspective, U-type steel support can fulfill the requirement of surrounding rock supporting in flat top U-shape roadway and vertical wall semicircle arch roadway. The field measurement of mining roadway surrounding rock displacement in Zouzhuang coal mine working face 3204 verified the accuracy of theoretical analysis and numerical simulation

    Boundary Guided Mixing Trajectory for Semantic Control with Diffusion Models

    Full text link
    Applying powerful generative denoising diffusion models (DDMs) for downstream tasks such as image semantic editing usually requires either fine-tuning pre-trained DDMs or learning auxiliary editing networks. In this work, we achieve SOTA semantic control performance on various application settings by optimizing the denoising trajectory solely via frozen DDMs. As one of the first optimization-based diffusion editing work, we start by seeking a more comprehensive understanding of the intermediate high-dimensional latent spaces by theoretically and empirically analyzing their probabilistic and geometric behaviors in the Markov chain. We then propose to further explore the critical step in the denoising trajectory that characterizes the convergence of a pre-trained DDM. Last but not least, we further present our method to search for the semantic subspaces boundaries for controllable manipulation, by guiding the denoising trajectory towards the targeted boundary at the critical convergent step. We conduct extensive experiments on various DPMs architectures (DDPM, iDDPM) and datasets (CelebA, CelebA-HQ, LSUN-church, LSUN-bedroom, AFHQ-dog) with different resolutions (64, 256) as empirical demonstrations.Comment: 24 pages including appendices, code will be available at https://github.com/L-YeZhu/BoundaryDiffusio

    Unseen Image Synthesis with Diffusion Models

    Full text link
    While the current trend in the generative field is scaling up towards larger models and more training data for generalized domain representations, we go the opposite direction in this work by synthesizing unseen domain images without additional training. We do so via latent sampling and geometric optimization using pre-trained and frozen Denoising Diffusion Probabilistic Models (DDPMs) on single-domain datasets. Our key observation is that DDPMs pre-trained even just on single-domain images are already equipped with sufficient representation abilities to reconstruct arbitrary images from the inverted latent encoding following bi-directional deterministic diffusion and denoising trajectories. This motivates us to investigate the statistical and geometric behaviors of the Out-Of-Distribution (OOD) samples from unseen image domains in the latent spaces along the denoising chain. Notably, we theoretically and empirically show that the inverted OOD samples also establish Gaussians that are distinguishable from the original In-Domain (ID) samples in the intermediate latent spaces, which allows us to sample from them directly. Geometrical domain-specific and model-dependent information of the unseen subspace (e.g., sample-wise distance and angles) is used to further optimize the sampled OOD latent encodings from the estimated Gaussian prior. We conduct extensive analysis and experiments using pre-trained diffusion models (DDPM, iDDPM) on different datasets (AFHQ, CelebA-HQ, LSUN-Church, and LSUN-Bedroom), proving the effectiveness of this novel perspective to explore and re-think the diffusion models' data synthesis generalization ability.Comment: 28 pages including appendice

    Outlier-Resilient Web Service QoS Prediction

    Get PDF
    The proliferation of Web services makes it difficult for users to select the most appropriate one among numerous functionally identical or similar service candidates. Quality-of-Service (QoS) describes the non-functional characteristics of Web services, and it has become the key differentiator for service selection. However, users cannot invoke all Web services to obtain the corresponding QoS values due to high time cost and huge resource overhead. Thus, it is essential to predict unknown QoS values. Although various QoS prediction methods have been proposed, few of them have taken outliers into consideration, which may dramatically degrade the prediction performance. To overcome this limitation, we propose an outlier-resilient QoS prediction method in this paper. Our method utilizes Cauchy loss to measure the discrepancy between the observed QoS values and the predicted ones. Owing to the robustness of Cauchy loss, our method is resilient to outliers. We further extend our method to provide time-aware QoS prediction results by taking the temporal information into consideration. Finally, we conduct extensive experiments on both static and dynamic datasets. The results demonstrate that our method is able to achieve better performance than state-of-the-art baseline methods.Comment: 12 pages, to appear at the Web Conference (WWW) 202

    Re-Attention Transformer for Weakly Supervised Object Localization

    Full text link
    Weakly supervised object localization is a challenging task which aims to localize objects with coarse annotations such as image categories. Existing deep network approaches are mainly based on class activation map, which focuses on highlighting discriminative local region while ignoring the full object. In addition, the emerging transformer-based techniques constantly put a lot of emphasis on the backdrop that impedes the ability to identify complete objects. To address these issues, we present a re-attention mechanism termed token refinement transformer (TRT) that captures the object-level semantics to guide the localization well. Specifically, TRT introduces a novel module named token priority scoring module (TPSM) to suppress the effects of background noise while focusing on the target object. Then, we incorporate the class activation map as the semantically aware input to restrain the attention map to the target object. Extensive experiments on two benchmarks showcase the superiority of our proposed method against existing methods with image category annotations. Source code is available in \url{https://github.com/su-hui-zz/ReAttentionTransformer}.Comment: 11 pages, 5 figure

    HGAttack: Transferable Heterogeneous Graph Adversarial Attack

    Full text link
    Heterogeneous Graph Neural Networks (HGNNs) are increasingly recognized for their performance in areas like the web and e-commerce, where resilience against adversarial attacks is crucial. However, existing adversarial attack methods, which are primarily designed for homogeneous graphs, fall short when applied to HGNNs due to their limited ability to address the structural and semantic complexity of HGNNs. This paper introduces HGAttack, the first dedicated gray box evasion attack method for heterogeneous graphs. We design a novel surrogate model to closely resemble the behaviors of the target HGNN and utilize gradient-based methods for perturbation generation. Specifically, the proposed surrogate model effectively leverages heterogeneous information by extracting meta-path induced subgraphs and applying GNNs to learn node embeddings with distinct semantics from each subgraph. This approach improves the transferability of generated attacks on the target HGNN and significantly reduces memory costs. For perturbation generation, we introduce a semantics-aware mechanism that leverages subgraph gradient information to autonomously identify vulnerable edges across a wide range of relations within a constrained perturbation budget. We validate HGAttack's efficacy with comprehensive experiments on three datasets, providing empirical analyses of its generated perturbations. Outperforming baseline methods, HGAttack demonstrated significant efficacy in diminishing the performance of target HGNN models, affirming the effectiveness of our approach in evaluating the robustness of HGNNs against adversarial attacks

    Investigation of equilibrium and dynamic performance of SrCl2-expanded graphite composite in chemisorption refrigeration system

    Get PDF
    This work experimentally investigated adsorption equilibrium and reaction kinetics of ammonia adsorption/desorption on the composite of strontium chloride (SrCl2) impregnated into expanded graphite, and also discussed the potential influence of the addition of expanded graphite on the SrCl2-NH3 reaction characteristics. The measured and analysed results can be very useful information to design the system and operating conditions using the similar chemisorption composites. Equilibrium concentration characteristics of ammonia within the studied composite were measured using the heat sources at 90 °C, 100 °C and 110 °C for the decomposition process, where the degree of conversion achieved 50%, 78% and 96% respectively. Therefore, the equilibrium equation reflecting the relationship between temperature, pressure and concentration was developed, and a pseudo-equilibrium zone was found, which should be useful information to setup the system operating condition for the desired global transformation. It was suspected that the addition of expanded graphite altered the reaction equilibrium due to the pore effect and the salt-confinement. The concept of two-stage kinetic model was proposed and kinetic parameters were determined by fitting experimental data. The developed kinetic equations can predict dynamic cyclic performance of a reactive bed in similar geometric structure with reasonable accuracy. Such a chemisorption cycle using the SrCl2-expnaded graphite (mass ratio 2:1) composite can be used for cooling application, and the maximum SCP value can be achieved as high as 656 W/kg at t = 2.5 min, and the COP can be 0.3 after one hour of synthesis process under the condition of Tev = 0 °C, Tcon = 20 °C, Theat = 110 °C
    • …
    corecore