129 research outputs found

    Shared Vision Planning for Hydrological System: Fuzzy Evaluation and Heuristic Algorithms for Water Level Prediction

    Get PDF
    Effectively managing hydrological systems requires a comprehensive strategy involving data collection, predictive modeling, and stakeholder engagement. This study integrates “Shared Vision Planning” principles with fuzzy evaluation and heuristic search, aiming for a balanced and sustainable hydrological system management strategy. The synergy between fuzzy evaluation and heuristic algorithms establishes a robust decision-making framework, optimizing water resource utilization and addressing varied interest groups’ concerns. Tested using data from the Great Lakes region in North America, our model demonstrates effectiveness in achieving coordinated water resource management, contributing to a resilient water resource management paradigm with positive implications for regional development

    Lowering minimum eye height to increase peak knee and hip flexion during landing

    Get PDF
    The purpose was to determine the effect of lowering minimum eye height through an externally focused object on knee and hip flexion and impact forces during jump-landing. Kinematics and ground reaction forces were collected when 20 male and 19 female participants performed jump-landing trials with their natural minimum eye height, and trials focusing on lowering their minimum eye height to an external object, which was set at 5% or 10% of standing height lower. Participants demonstrated decreased minimum eye height and increased peak knee and hip flexion during early-landing and stance phase when focusing on lowering eye height to the external object (p \u3c 0.01). Peak vertical ground reaction forces during early-landing also decreased for the greater force group (p \u3c 0.001). Jump-landing training through manipulating eye height provides a strategy that involves an external focus and intrinsic feedback, which may have advantages in promoting learning and practical application

    Quantifying and Mitigating Privacy Risks for Tabular Generative Models

    Full text link
    Synthetic data from generative models emerges as the privacy-preserving data-sharing solution. Such a synthetic data set shall resemble the original data without revealing identifiable private information. The backbone technology of tabular synthesizers is rooted in image generative models, ranging from Generative Adversarial Networks (GANs) to recent diffusion models. Recent prior work sheds light on the utility-privacy tradeoff on tabular data, revealing and quantifying privacy risks on synthetic data. We first conduct an exhaustive empirical analysis, highlighting the utility-privacy tradeoff of five state-of-the-art tabular synthesizers, against eight privacy attacks, with a special focus on membership inference attacks. Motivated by the observation of high data quality but also high privacy risk in tabular diffusion, we propose DP-TLDM, Differentially Private Tabular Latent Diffusion Model, which is composed of an autoencoder network to encode the tabular data and a latent diffusion model to synthesize the latent tables. Following the emerging f-DP framework, we apply DP-SGD to train the auto-encoder in combination with batch clipping and use the separation value as the privacy metric to better capture the privacy gain from DP algorithms. Our empirical evaluation demonstrates that DP-TLDM is capable of achieving a meaningful theoretical privacy guarantee while also significantly enhancing the utility of synthetic data. Specifically, compared to other DP-protected tabular generative models, DP-TLDM improves the synthetic quality by an average of 35% in data resemblance, 15% in the utility for downstream tasks, and 50% in data discriminability, all while preserving a comparable level of privacy risk

    NeutronStream: A Dynamic GNN Training Framework with Sliding Window for Graph Streams

    Full text link
    Existing Graph Neural Network (GNN) training frameworks have been designed to help developers easily create performant GNN implementations. However, most existing GNN frameworks assume that the input graphs are static, but ignore that most real-world graphs are constantly evolving. Though many dynamic GNN models have emerged to learn from evolving graphs, the training process of these dynamic GNNs is dramatically different from traditional GNNs in that it captures both the spatial and temporal dependencies of graph updates. This poses new challenges for designing dynamic GNN training frameworks. First, the traditional batched training method fails to capture real-time structural evolution information. Second, the time-dependent nature makes parallel training hard to design. Third, it lacks system supports for users to efficiently implement dynamic GNNs. In this paper, we present NeutronStream, a framework for training dynamic GNN models. NeutronStream abstracts the input dynamic graph into a chronologically updated stream of events and processes the stream with an optimized sliding window to incrementally capture the spatial-temporal dependencies of events. Furthermore, NeutronStream provides a parallel execution engine to tackle the sequential event processing challenge to achieve high performance. NeutronStream also integrates a built-in graph storage structure that supports dynamic updates and provides a set of easy-to-use APIs that allow users to express their dynamic GNNs. Our experimental results demonstrate that, compared to state-of-the-art dynamic GNN implementations, NeutronStream achieves speedups ranging from 1.48X to 5.87X and an average accuracy improvement of 3.97%.Comment: 12 pages, 15 figure

    Bridge damage identification from moving load induced deflection based on wavelet transform and Lipschitz exponent

    Get PDF
    The wavelet transform and Lipschitz exponent perform well in detecting signal singularity.With the bridge crack damage modeled as rotational springs based on fracture mechanics, the deflection time history of the beam under the moving load is determined with a numerical method. The continuous wavelet transformation (CWT) is applied to the deflection of the beam to identify the location of the damage, and the Lipschitz exponent is used to evaluate the damage degree. The influence of different damage degrees,multiple damage, different sensor locations, load velocity and load magnitude are studied.Besides, the feasibility of this method is verified by a model experiment
    • …
    corecore