首页 > 最新文献

计算机科学最新文献

英文 中文
IF:
Contrastive fine-grained domain adaptation network for EEG-based vigilance estimation. 基于脑电图的警觉性估计的对比性细粒度域适应网络。
IF 6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-01 Epub Date: 2024-08-08 DOI: 10.1016/j.neunet.2024.106617
Kangning Wang, Wei Wei, Weibo Yi, Shuang Qiu, Huiguang He, Minpeng Xu, Dong Ming

Vigilance state is crucial for the effective performance of users in brain-computer interface (BCI) systems. Most vigilance estimation methods rely on a large amount of labeled data to train a satisfactory model for the specific subject, which limits the practical application of the methods. This study aimed to build a reliable vigilance estimation method using a small amount of unlabeled calibration data. We conducted a vigilance experiment in the designed BCI-based cursor-control task. Electroencephalogram (EEG) signals of eighteen participants were recorded in two sessions on two different days. And, we proposed a contrastive fine-grained domain adaptation network (CFGDAN) for vigilance estimation. Here, an adaptive graph convolution network (GCN) was built to project the EEG data of different domains into a common space. The fine-grained feature alignment mechanism was designed to weight and align the feature distributions across domains at the EEG channel level, and the contrastive information preservation module was developed to preserve the useful target-specific information during the feature alignment. The experimental results show that the proposed CFGDAN outperforms the compared methods in our BCI vigilance dataset and SEED-VIG dataset. Moreover, the visualization results demonstrate the efficacy of the designed feature alignment mechanisms. These results indicate the effectiveness of our method for vigilance estimation. Our study is helpful for reducing calibration efforts and promoting the practical application potential of vigilance estimation methods.

警觉状态对于脑机接口(BCI)系统中用户的有效表现至关重要。大多数警觉性估计方法都依赖于大量标记数据来为特定对象训练一个令人满意的模型,这限制了这些方法的实际应用。本研究旨在利用少量非标记校准数据建立一种可靠的警觉性估计方法。我们在设计的基于BCI的光标控制任务中进行了警觉性实验。我们在两个不同的日期分两次记录了18名参与者的脑电图(EEG)信号。然后,我们提出了一种用于警觉性估计的对比度细粒度域自适应网络(CFGDAN)。在这里,我们建立了一个自适应图卷积网络(GCN),将不同域的脑电图数据投射到一个共同的空间。设计了细粒度特征对齐机制,以在脑电图通道级别对不同域的特征分布进行加权和对齐,并开发了对比信息保存模块,以在特征对齐过程中保存有用的目标特定信息。实验结果表明,在我们的 BCI 警戒数据集和 SEED-VIG 数据集中,所提出的 CFGDAN 优于同类方法。此外,可视化结果也证明了所设计的特征配准机制的有效性。这些结果表明了我们的方法在警觉性估计方面的有效性。我们的研究有助于减少校准工作,提高警觉性估计方法的实际应用潜力。
{"title":"Contrastive fine-grained domain adaptation network for EEG-based vigilance estimation.","authors":"Kangning Wang, Wei Wei, Weibo Yi, Shuang Qiu, Huiguang He, Minpeng Xu, Dong Ming","doi":"10.1016/j.neunet.2024.106617","DOIUrl":"10.1016/j.neunet.2024.106617","url":null,"abstract":"<p><p>Vigilance state is crucial for the effective performance of users in brain-computer interface (BCI) systems. Most vigilance estimation methods rely on a large amount of labeled data to train a satisfactory model for the specific subject, which limits the practical application of the methods. This study aimed to build a reliable vigilance estimation method using a small amount of unlabeled calibration data. We conducted a vigilance experiment in the designed BCI-based cursor-control task. Electroencephalogram (EEG) signals of eighteen participants were recorded in two sessions on two different days. And, we proposed a contrastive fine-grained domain adaptation network (CFGDAN) for vigilance estimation. Here, an adaptive graph convolution network (GCN) was built to project the EEG data of different domains into a common space. The fine-grained feature alignment mechanism was designed to weight and align the feature distributions across domains at the EEG channel level, and the contrastive information preservation module was developed to preserve the useful target-specific information during the feature alignment. The experimental results show that the proposed CFGDAN outperforms the compared methods in our BCI vigilance dataset and SEED-VIG dataset. Moreover, the visualization results demonstrate the efficacy of the designed feature alignment mechanisms. These results indicate the effectiveness of our method for vigilance estimation. Our study is helpful for reducing calibration efforts and promoting the practical application potential of vigilance estimation methods.</p>","PeriodicalId":49763,"journal":{"name":"Neural Networks","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142057086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning. 通过多代理强化学习实现车联网终端协作的联合计算卸载和资源分配。
IF 6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-01 Epub Date: 2024-08-08 DOI: 10.1016/j.neunet.2024.106621
Cong Wang, Yaoming Wang, Ying Yuan, Sancheng Peng, Guorui Li, Pengfei Yin

Vehicular edge computing (VEC), a promising paradigm for the development of emerging intelligent transportation systems, can provide lower service latency for vehicular applications. However, it is still a challenge to fulfill the requirements of such applications with stringent latency requirements in the VEC system with limited resources. In addition, existing methods focus on handling the offloading task in a certain time slot with statically allocated resources, but ignore the heterogeneous tasks' different resource requirements, resulting in resource wastage. To solve the real-time task offloading and heterogeneous resource allocation problem in VEC system, we propose a decentralized solution based on the attention mechanism and recurrent neural networks (RNN) with a multi-agent distributed deep deterministic policy gradient (AR-MAD4PG). First, to address the partial observability of agents, we construct a shared agent graph and propose a periodic communication mechanism that enables edge nodes to aggregate information from other edge nodes. Second, to help agents better understand the current system state, we design an RNN-based feature extraction network to capture the historical state and resource allocation information of the VEC system. Thirdly, to tackle the challenges of excessive joint observation-action space and ineffective information interference, we adopt the multi-head attention mechanism to compress the dimension of the observation-action space of agents. Finally, we build a simulation model based on the actual vehicle trajectories, and the experimental results show that our proposed method outperforms the existing approaches.

车载边缘计算(Vehicular Edge Computing,VEC)是发展新兴智能交通系统的一个前景广阔的范例,它可以为车载应用提供更低的服务延迟。然而,在资源有限的 VEC 系统中,如何满足此类应用对延迟的严格要求仍是一项挑战。此外,现有方法侧重于在某个时隙内利用静态分配的资源处理卸载任务,但忽略了异构任务对资源的不同需求,造成资源浪费。为了解决 VEC 系统中的实时任务卸载和异构资源分配问题,我们提出了一种基于注意力机制和递归神经网络(RNN)的多代理分布式深度确定性策略梯度(AR-MAD4PG)的分散式解决方案。首先,为了解决代理的部分可观测性问题,我们构建了一个共享代理图,并提出了一种定期通信机制,使边缘节点能够汇总来自其他边缘节点的信息。其次,为了帮助代理更好地了解当前系统状态,我们设计了基于 RNN 的特征提取网络,以捕捉 VEC 系统的历史状态和资源分配信息。第三,针对联合观测-行动空间过大和无效信息干扰的挑战,我们采用多头关注机制来压缩代理的观测-行动空间维度。最后,我们建立了基于实际车辆轨迹的仿真模型,实验结果表明我们提出的方法优于现有方法。
{"title":"Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning.","authors":"Cong Wang, Yaoming Wang, Ying Yuan, Sancheng Peng, Guorui Li, Pengfei Yin","doi":"10.1016/j.neunet.2024.106621","DOIUrl":"10.1016/j.neunet.2024.106621","url":null,"abstract":"<p><p>Vehicular edge computing (VEC), a promising paradigm for the development of emerging intelligent transportation systems, can provide lower service latency for vehicular applications. However, it is still a challenge to fulfill the requirements of such applications with stringent latency requirements in the VEC system with limited resources. In addition, existing methods focus on handling the offloading task in a certain time slot with statically allocated resources, but ignore the heterogeneous tasks' different resource requirements, resulting in resource wastage. To solve the real-time task offloading and heterogeneous resource allocation problem in VEC system, we propose a decentralized solution based on the attention mechanism and recurrent neural networks (RNN) with a multi-agent distributed deep deterministic policy gradient (AR-MAD4PG). First, to address the partial observability of agents, we construct a shared agent graph and propose a periodic communication mechanism that enables edge nodes to aggregate information from other edge nodes. Second, to help agents better understand the current system state, we design an RNN-based feature extraction network to capture the historical state and resource allocation information of the VEC system. Thirdly, to tackle the challenges of excessive joint observation-action space and ineffective information interference, we adopt the multi-head attention mechanism to compress the dimension of the observation-action space of agents. Finally, we build a simulation model based on the actual vehicle trajectories, and the experimental results show that our proposed method outperforms the existing approaches.</p>","PeriodicalId":49763,"journal":{"name":"Neural Networks","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141996788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An information-theoretic perspective of physical adversarial patches. 物理对抗补丁的信息论视角。
IF 6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-01 Epub Date: 2024-08-03 DOI: 10.1016/j.neunet.2024.106590
Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani

Real-world adversarial patches were shown to be successful in compromising state-of-the-art models in various computer vision applications. Most existing defenses rely on analyzing input or feature level gradients to detect the patch. However, these methods have been compromised by recent GAN-based attacks that generate naturalistic patches. In this paper, we propose a new perspective to defend against adversarial patches based on the entropy carried by the input, rather than on its saliency. We present Jedi, a new defense against adversarial patches that tackles the patch localization problem from an information theory perspective; leveraging the high entropy of adversarial patches to identify potential patch zones, and using an autoencoder to complete patch regions from high entropy kernels. Jedi achieves high-precision adversarial patch localization and removal, detecting on average 90% of adversarial patches across different benchmarks, and recovering up to 94% of successful patch attacks. Since Jedi relies on an input entropy analysis, it is model-agnostic, and can be applied to off-the-shelf models without changes to the training or inference of the models. Moreover, we propose a comprehensive qualitative analysis that investigates the cases where Jedi fails, comparatively with related methods. Interestingly, we find a significant core failure cases among the different defenses share one common property: high entropy. We think that this work offers a new perspective to understand the adversarial effect under physical-world settings. We also leverage these findings to enhance Jedi's handling of entropy outliers by introducing Adaptive Jedi, which boosts performance by up to 9% in challenging images.

在各种计算机视觉应用中,真实世界中的对抗性补丁已被证明能成功破坏最先进的模型。现有的大多数防御方法都依赖于分析输入或特征级梯度来检测补丁。然而,最近基于 GAN 的攻击破坏了这些方法,因为这种攻击会生成自然补丁。在本文中,我们提出了一个新的视角,即基于输入所携带的熵而非显著性来防御对抗性补丁。我们提出的 Jedi 是一种新的抵御对抗性补丁的方法,它从信息论的角度解决补丁定位问题;利用对抗性补丁的高熵来识别潜在的补丁区域,并使用自动编码器从高熵内核中完成补丁区域的识别。Jedi 实现了高精度的对抗性补丁定位和移除,在不同的基准测试中平均能检测到 90% 的对抗性补丁,并能恢复高达 94% 的成功补丁攻击。由于 Jedi 依靠的是输入熵分析,因此与模型无关,可以应用于现成的模型,而无需改变模型的训练或推理。此外,我们还提出了一项全面的定性分析,研究了绝地与相关方法相比失效的情况。有趣的是,我们发现不同的防御方法都有一个重要的核心失败案例,那就是高熵。我们认为,这项工作为理解物理世界环境下的对抗效应提供了一个新视角。我们还利用这些发现,通过引入自适应绝地,增强了绝地对熵异常值的处理能力,从而在具有挑战性的图像中将性能提高了 9%。
{"title":"An information-theoretic perspective of physical adversarial patches.","authors":"Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani","doi":"10.1016/j.neunet.2024.106590","DOIUrl":"10.1016/j.neunet.2024.106590","url":null,"abstract":"<p><p>Real-world adversarial patches were shown to be successful in compromising state-of-the-art models in various computer vision applications. Most existing defenses rely on analyzing input or feature level gradients to detect the patch. However, these methods have been compromised by recent GAN-based attacks that generate naturalistic patches. In this paper, we propose a new perspective to defend against adversarial patches based on the entropy carried by the input, rather than on its saliency. We present Jedi, a new defense against adversarial patches that tackles the patch localization problem from an information theory perspective; leveraging the high entropy of adversarial patches to identify potential patch zones, and using an autoencoder to complete patch regions from high entropy kernels. Jedi achieves high-precision adversarial patch localization and removal, detecting on average 90% of adversarial patches across different benchmarks, and recovering up to 94% of successful patch attacks. Since Jedi relies on an input entropy analysis, it is model-agnostic, and can be applied to off-the-shelf models without changes to the training or inference of the models. Moreover, we propose a comprehensive qualitative analysis that investigates the cases where Jedi fails, comparatively with related methods. Interestingly, we find a significant core failure cases among the different defenses share one common property: high entropy. We think that this work offers a new perspective to understand the adversarial effect under physical-world settings. We also leverage these findings to enhance Jedi's handling of entropy outliers by introducing Adaptive Jedi, which boosts performance by up to 9% in challenging images.</p>","PeriodicalId":49763,"journal":{"name":"Neural Networks","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142009846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-focus image fusion with parameter adaptive dual channel dynamic threshold neural P systems. 采用参数自适应双通道动态阈值神经 P 系统的多焦点图像融合。
IF 6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-01 Epub Date: 2024-08-08 DOI: 10.1016/j.neunet.2024.106603
Bo Li, Lingling Zhang, Jun Liu, Hong Peng, Qianying Wang, Jiaqi Liu

Multi-focus image fusion (MFIF) is an important technique that aims to combine the focused regions of multiple source images into a fully clear image. Decision-map methods are widely used in MFIF to maximize the preservation of information from the source images. While many decision-map methods have been proposed, they often struggle with difficulties in determining focus and non-focus boundaries, further affecting the quality of the fused images. Dynamic threshold neural P (DTNP) systems are computational models inspired by biological spiking neurons, featuring dynamic threshold and spiking mechanisms to better distinguish focused and unfocused regions for decision map generation. However, original DTNP systems require manual parameter configuration and have only one stimulus. Therefore, they are not suitable to be used directly for generating high-precision decision maps. To overcome these limitations, we propose a variant called parameter adaptive dual channel DTNP (PADCDTNP) systems. Inspired by the spiking mechanisms of PADCDTNP systems, we further develop a new MFIF method. As a new neural model, PADCDTNP systems adaptively estimate parameters according to multiple external inputs to produce decision maps with robust boundaries, resulting in high-quality fusion results. Comprehensive experiments on the Lytro/MFFW/MFI-WHU dataset show that our method achieves advanced performance and yields comparable results to the fourteen representative MFIF methods. In addition, compared to the standard DTNP systems, PADCDTNP systems improve the fusion performance and fusion efficiency on the three datasets by 5.69% and 86.03%, respectively. The codes for both the proposed method and the comparison methods are released at https://github.com/MorvanLi/MFIF-PADCDTNP.

多焦点图像融合(MFIF)是一项重要技术,旨在将多个源图像的焦点区域融合成一幅完全清晰的图像。决策图方法被广泛应用于 MFIF,以最大限度地保留源图像的信息。虽然已经提出了很多判定图方法,但它们往往难以确定焦点和非焦点的边界,从而进一步影响了融合图像的质量。动态阈值神经 P(DTNP)系统是一种受生物尖峰神经元启发的计算模型,具有动态阈值和尖峰机制,能更好地区分聚焦和非聚焦区域以生成决策图。然而,最初的 DTNP 系统需要手动配置参数,而且只有一个刺激。因此,它们不适合直接用于生成高精度的决策图。为了克服这些限制,我们提出了一种名为参数自适应双通道 DTNP(PADCDTNP)系统的变体。受 PADCDTNP 系统尖峰机制的启发,我们进一步开发了一种新的 MFIF 方法。作为一种新的神经模型,PADCDTNP 系统能根据多个外部输入自适应地估计参数,生成具有稳健边界的决策图,从而获得高质量的融合结果。在 Lytro/MFFW/MFI-WHU 数据集上进行的综合实验表明,我们的方法实现了先进的性能,其结果可与 14 种具有代表性的 MFIF 方法相媲美。此外,与标准 DTNP 系统相比,PADCDTNP 系统在三个数据集上的融合性能和融合效率分别提高了 5.69% 和 86.03%。拟议方法和比较方法的代码发布在 https://github.com/MorvanLi/MFIF-PADCDTNP 上。
{"title":"Multi-focus image fusion with parameter adaptive dual channel dynamic threshold neural P systems.","authors":"Bo Li, Lingling Zhang, Jun Liu, Hong Peng, Qianying Wang, Jiaqi Liu","doi":"10.1016/j.neunet.2024.106603","DOIUrl":"10.1016/j.neunet.2024.106603","url":null,"abstract":"<p><p>Multi-focus image fusion (MFIF) is an important technique that aims to combine the focused regions of multiple source images into a fully clear image. Decision-map methods are widely used in MFIF to maximize the preservation of information from the source images. While many decision-map methods have been proposed, they often struggle with difficulties in determining focus and non-focus boundaries, further affecting the quality of the fused images. Dynamic threshold neural P (DTNP) systems are computational models inspired by biological spiking neurons, featuring dynamic threshold and spiking mechanisms to better distinguish focused and unfocused regions for decision map generation. However, original DTNP systems require manual parameter configuration and have only one stimulus. Therefore, they are not suitable to be used directly for generating high-precision decision maps. To overcome these limitations, we propose a variant called parameter adaptive dual channel DTNP (PADCDTNP) systems. Inspired by the spiking mechanisms of PADCDTNP systems, we further develop a new MFIF method. As a new neural model, PADCDTNP systems adaptively estimate parameters according to multiple external inputs to produce decision maps with robust boundaries, resulting in high-quality fusion results. Comprehensive experiments on the Lytro/MFFW/MFI-WHU dataset show that our method achieves advanced performance and yields comparable results to the fourteen representative MFIF methods. In addition, compared to the standard DTNP systems, PADCDTNP systems improve the fusion performance and fusion efficiency on the three datasets by 5.69% and 86.03%, respectively. The codes for both the proposed method and the comparison methods are released at https://github.com/MorvanLi/MFIF-PADCDTNP.</p>","PeriodicalId":49763,"journal":{"name":"Neural Networks","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141989374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chronobridge: a novel framework for enhanced temporal and relational reasoning in temporal knowledge graphs Chronobridge:在时态知识图谱中增强时态和关系推理的新框架
IF 10.7 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-10-22 DOI: 10.1007/s10462-024-10983-0
Qian Liu, Siling Feng, Mengxing Huang, Uzair Aslam Bhatti

The task of predicting entities and relations in Temporal Knowledge Graph (TKG) extrapolation is crucial and has been studied extensively. Mainstream algorithms, such as Gated Recurrent Unit (GRU) models, primarily focus on encoding historical factual features within TKGs, often neglecting the importance of incorporating entities and relational features during decoding. This bias ultimately leads to loss of detail and inadequate prediction accuracy during the inference process. To address this issue, a novel ChronoBridge framework is proposed that features a dual mechanism of a chronological node encoder and a bridged feature fusion decoder. Specifically, the chronological node encoder employs an advanced recursive neural network with an enhanced GRU in an autoregressive manner to model historical KG sequences, thereby accurately capturing entity changes over time and significantly enhancing the model’s ability to identify and encode temporal patterns of facts across the timeline. Meanwhile, the bridged feature fusion decoder utilizes a new variant of GRU and a multilayer perception mechanism during the prediction phase to extract entity and relation features and fuse them for inference, thereby strengthening the reasoning capabilities of the model for future events. Testing on three standard datasets showed significant improvements, with a 25.21% increase in MRR accuracy and a 39.38% enhancement in relation inference. This advancement not only improves the understanding of temporal evolution in knowledge graphs but also sets a foundation for future research and applications of TKG reasoning.

在时态知识图谱(TKG)推断中预测实体和关系是一项至关重要的任务,人们对此进行了广泛的研究。主流算法,如门控循环单元(GRU)模型,主要侧重于对 TKG 中的历史事实特征进行编码,往往忽视了在解码过程中纳入实体和关系特征的重要性。这种偏差最终导致推理过程中细节丢失和预测准确性不足。为了解决这个问题,我们提出了一个新颖的 ChronoBridge 框架,它具有时间节点编码器和桥接特征融合解码器的双重机制。具体来说,年表节点编码器采用了先进的递归神经网络,并以自回归的方式增强了 GRU,对历史 KG 序列进行建模,从而准确捕捉实体随时间的变化,并显著增强了模型识别和编码整个时间轴上事实的时间模式的能力。同时,桥接特征融合解码器在预测阶段利用 GRU 的新变体和多层感知机制提取实体和关系特征,并将其融合进行推理,从而加强了模型对未来事件的推理能力。在三个标准数据集上进行的测试表明,该模型的推理能力有了显著提高,MRR 准确率提高了 25.21%,关系推理能力提高了 39.38%。这一进步不仅提高了人们对知识图谱中时间演化的理解,还为 TKG 推理的未来研究和应用奠定了基础。
{"title":"Chronobridge: a novel framework for enhanced temporal and relational reasoning in temporal knowledge graphs","authors":"Qian Liu,&nbsp;Siling Feng,&nbsp;Mengxing Huang,&nbsp;Uzair Aslam Bhatti","doi":"10.1007/s10462-024-10983-0","DOIUrl":"10.1007/s10462-024-10983-0","url":null,"abstract":"<div><p>The task of predicting entities and relations in Temporal Knowledge Graph (TKG) extrapolation is crucial and has been studied extensively. Mainstream algorithms, such as Gated Recurrent Unit (GRU) models, primarily focus on encoding historical factual features within TKGs, often neglecting the importance of incorporating entities and relational features during decoding. This bias ultimately leads to loss of detail and inadequate prediction accuracy during the inference process. To address this issue, a novel ChronoBridge framework is proposed that features a dual mechanism of a chronological node encoder and a bridged feature fusion decoder. Specifically, the chronological node encoder employs an advanced recursive neural network with an enhanced GRU in an autoregressive manner to model historical KG sequences, thereby accurately capturing entity changes over time and significantly enhancing the model’s ability to identify and encode temporal patterns of facts across the timeline. Meanwhile, the bridged feature fusion decoder utilizes a new variant of GRU and a multilayer perception mechanism during the prediction phase to extract entity and relation features and fuse them for inference, thereby strengthening the reasoning capabilities of the model for future events. Testing on three standard datasets showed significant improvements, with a 25.21% increase in MRR accuracy and a 39.38% enhancement in relation inference. This advancement not only improves the understanding of temporal evolution in knowledge graphs but also sets a foundation for future research and applications of TKG reasoning.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":null,"pages":null},"PeriodicalIF":10.7,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-10983-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142453024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpacking the complexity of online incivility: an analysis of characteristics and impact of uncivil behavior during the Hong Kong protests 解读网上不文明行为的复杂性:对香港抗议活动中不文明行为的特点和影响的分析
IF 5.9 3区 管理学 Q1 BUSINESS Pub Date : 2024-10-22 DOI: 10.1108/intr-12-2023-1169
Baiqi Li, Yunya Song, Yongren Shi, Hsuan-Ting Chen

Purpose

This study seeks to establish a new framework for categorizing incivility, differentiating between explicit and implicit forms, and to investigate their respective abilities to proliferate and mobilize conversations, along with behavioral outcomes in various social contexts.

Design/methodology/approach

Employing computational techniques, this research analyzed 10,145 protest-related threads from the HK Golden Forum, a prominent online discussion board in Hong Kong.

Findings

Our analysis revealed divergent effects of explicit and implicit incivility on their diffusion, influences on deliberative discussions, and user participation. Explicit incivility was found to impede deliberative conversations, while implicit incivility tended to provoke more responses. Explicit uncivil expressions encouraged the propagation of incivility but reduced the likelihood of individual involvement. In contrast, implicit incivility had a stronger dampening effect on further uncivil comments and achieved greater thread popularity. The results showed strong associations between uncivil expressions and the contextual norms surrounding social movements.

Originality/value

Theoretically, this research introduced a classification of incivility and underscored the importance of differentiating between implicit and explicit incivility by examining their effects on deliberation and engagement. Although previous studies have extensively covered explicit incivility, this study goes further by analyzing implicit incivility and comparing both forms of uncivil discourse in a less-studied context. Methodologically, the study developed a Cantonese dictionary to differentiate between two types of incivility, providing a practical reference for more nuanced analyses. By revealing how varying movement norms moderate the interplay between deliberative and uncivil expressions, the study drew attention to the highly situational nature of incivility.

目的本研究旨在建立一个新的不文明行为分类框架,区分显性和隐性的不文明行为,并研究它们各自在不同社会背景下扩散和动员对话的能力以及行为结果。研究结果我们的分析揭示了显性和隐性不文明行为对其扩散、商议讨论和用户参与的不同影响。我们发现,显性不文明行为会阻碍商议性对话,而隐性不文明行为往往会引发更多回应。明确的不文明表达鼓励了不文明行为的传播,但降低了个人参与的可能性。相比之下,隐性不文明对进一步的不文明评论有更强的抑制作用,并获得了更高的主题人气。研究结果表明,不文明表达与围绕社会运动的背景规范之间存在密切联系。原创性/价值从理论上讲,这项研究引入了不文明行为的分类,并通过研究隐性和显性不文明行为对审议和参与的影响,强调了区分这两种不文明行为的重要性。虽然以往的研究广泛涉及了显性不文明行为,但本研究更进一步,分析了隐性不文明行为,并在研究较少的情况下比较了这两种形式的不文明话语。在研究方法上,本研究编写了一本粤语词典来区分两种不文明行为,为更细致的分析提供了实用的参考。通过揭示不同的运动规范如何缓和议事表达与不文明表达之间的相互作用,该研究提请人们注意不文明行为的高度情境性。
{"title":"Unpacking the complexity of online incivility: an analysis of characteristics and impact of uncivil behavior during the Hong Kong protests","authors":"Baiqi Li, Yunya Song, Yongren Shi, Hsuan-Ting Chen","doi":"10.1108/intr-12-2023-1169","DOIUrl":"https://doi.org/10.1108/intr-12-2023-1169","url":null,"abstract":"<h3>Purpose</h3>\u0000<p>This study seeks to establish a new framework for categorizing incivility, differentiating between explicit and implicit forms, and to investigate their respective abilities to proliferate and mobilize conversations, along with behavioral outcomes in various social contexts.</p><!--/ Abstract__block -->\u0000<h3>Design/methodology/approach</h3>\u0000<p>Employing computational techniques, this research analyzed 10,145 protest-related threads from the HK Golden Forum, a prominent online discussion board in Hong Kong.</p><!--/ Abstract__block -->\u0000<h3>Findings</h3>\u0000<p>Our analysis revealed divergent effects of explicit and implicit incivility on their diffusion, influences on deliberative discussions, and user participation. Explicit incivility was found to impede deliberative conversations, while implicit incivility tended to provoke more responses. Explicit uncivil expressions encouraged the propagation of incivility but reduced the likelihood of individual involvement. In contrast, implicit incivility had a stronger dampening effect on further uncivil comments and achieved greater thread popularity. The results showed strong associations between uncivil expressions and the contextual norms surrounding social movements.</p><!--/ Abstract__block -->\u0000<h3>Originality/value</h3>\u0000<p>Theoretically, this research introduced a classification of incivility and underscored the importance of differentiating between implicit and explicit incivility by examining their effects on deliberation and engagement. Although previous studies have extensively covered explicit incivility, this study goes further by analyzing implicit incivility and comparing both forms of uncivil discourse in a less-studied context. Methodologically, the study developed a Cantonese dictionary to differentiate between two types of incivility, providing a practical reference for more nuanced analyses. By revealing how varying movement norms moderate the interplay between deliberative and uncivil expressions, the study drew attention to the highly situational nature of incivility.</p><!--/ Abstract__block -->","PeriodicalId":54925,"journal":{"name":"Internet Research","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142452105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counterfactuals in fuzzy relational models 模糊关系模型中的反事实
IF 10.7 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-10-22 DOI: 10.1007/s10462-024-10996-9
Rami Al-Hmouz, Witold Pedrycz, Ahmed Ammari

Given the pressing need for explainability in Machine Learning systems, the studies on counterfactual explanations have gained significant interest. This research delves into this timely problem cast in a unique context of relational systems described by fuzzy relational equations. We develop a comprehensive solution to the counterfactual problems encountered in this setting, which is a novel contribution to the field. An underlying optimization problem is formulated, and its gradient-based solution is constructed. We demonstrate that the non-uniqueness of the derived solution is conveniently formalized and quantified by admitting a result coming in the form of information granules of a higher type, namely type-2 or interval-valued fuzzy set. The construction of the solution in this format is realized by invoking the principle of justifiable granularity, another innovative aspect of our research. We also discuss ways of designing fuzzy relations and elaborate on methods of carrying out counterfactual explanations in rule-based models. Illustrative examples are included to present the performance of the method and interpret the obtained results.

鉴于机器学习系统对可解释性的迫切需求,有关反事实解释的研究获得了极大的关注。本研究在模糊关系方程描述的关系系统的独特背景下,深入探讨了这一适时的问题。我们针对这种情况下遇到的反事实问题开发了一种全面的解决方案,这是对该领域的一个新贡献。我们提出了一个基本的优化问题,并构建了基于梯度的解决方案。我们证明,推导出的解决方案的非唯一性可以很方便地形式化和量化,因为它允许以更高类型(即类型 2 或区间值模糊集)的信息颗粒形式出现的结果。以这种形式构建解决方案是通过引用合理粒度原则来实现的,这是我们研究的另一个创新方面。我们还讨论了设计模糊关系的方法,并阐述了在基于规则的模型中进行反事实解释的方法。我们还列举了一些示例,以展示该方法的性能并解释所获得的结果。
{"title":"Counterfactuals in fuzzy relational models","authors":"Rami Al-Hmouz,&nbsp;Witold Pedrycz,&nbsp;Ahmed Ammari","doi":"10.1007/s10462-024-10996-9","DOIUrl":"10.1007/s10462-024-10996-9","url":null,"abstract":"<div><p>Given the pressing need for explainability in Machine Learning systems, the studies on counterfactual explanations have gained significant interest. This research delves into this timely problem cast in a unique context of relational systems described by fuzzy relational equations. We develop a comprehensive solution to the counterfactual problems encountered in this setting, which is a novel contribution to the field. An underlying optimization problem is formulated, and its gradient-based solution is constructed. We demonstrate that the non-uniqueness of the derived solution is conveniently formalized and quantified by admitting a result coming in the form of information granules of a higher type, namely type-2 or interval-valued fuzzy set. The construction of the solution in this format is realized by invoking the principle of justifiable granularity, another innovative aspect of our research. We also discuss ways of designing fuzzy relations and elaborate on methods of carrying out counterfactual explanations in rule-based models. Illustrative examples are included to present the performance of the method and interpret the obtained results.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":null,"pages":null},"PeriodicalIF":10.7,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-10996-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142452893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing Influence in Social Networks Using Combined Local Features and Deep Learning-Based Node Embedding. 利用组合本地特征和基于深度学习的节点嵌入,最大化社交网络中的影响力。
IF 2.6 4区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1089/big.2023.0117
Asgarali Bouyer, Hamid Ahmadi Beni, Amin Golzari Oskouei, Alireza Rouhi, Bahman Arasteh, Xiaoyang Liu

The influence maximization problem has several issues, including low infection rates and high time complexity. Many proposed methods are not suitable for large-scale networks due to their time complexity or free parameter usage. To address these challenges, this article proposes a local heuristic called Embedding Technique for Influence Maximization (ETIM) that uses shell decomposition, graph embedding, and reduction, as well as combined local structural features. The algorithm selects candidate nodes based on their connections among network shells and topological features, reducing the search space and computational overhead. It uses a deep learning-based node embedding technique to create a multidimensional vector of candidate nodes and calculates the dependency on spreading for each node based on local topological features. Finally, influential nodes are identified using the results of the previous phases and newly defined local features. The proposed algorithm is evaluated using the independent cascade model, showing its competitiveness and ability to achieve the best performance in terms of solution quality. Compared with the collective influence global algorithm, ETIM is significantly faster and improves the infection rate by an average of 12%.

影响最大化问题有几个问题,包括低感染率和高时间复杂性。由于时间复杂性或自由参数的使用,许多建议的方法都不适合大规模网络。为了应对这些挑战,本文提出了一种名为 "影响力最大化嵌入技术"(ETIM)的局部启发式算法,该算法使用壳分解、图嵌入和还原,并结合了局部结构特征。该算法根据网络壳之间的连接和拓扑特征选择候选节点,从而减少了搜索空间和计算开销。它使用基于深度学习的节点嵌入技术创建候选节点的多维向量,并根据本地拓扑特征计算每个节点对传播的依赖性。最后,利用前一阶段的结果和新定义的本地特征识别出有影响力的节点。利用独立级联模型对所提出的算法进行了评估,结果表明该算法具有竞争力,能够在解决方案质量方面达到最佳性能。与集体影响全局算法相比,ETIM 的速度明显更快,感染率平均提高了 12%。
{"title":"Maximizing Influence in Social Networks Using Combined Local Features and Deep Learning-Based Node Embedding.","authors":"Asgarali Bouyer, Hamid Ahmadi Beni, Amin Golzari Oskouei, Alireza Rouhi, Bahman Arasteh, Xiaoyang Liu","doi":"10.1089/big.2023.0117","DOIUrl":"https://doi.org/10.1089/big.2023.0117","url":null,"abstract":"<p><p>The influence maximization problem has several issues, including low infection rates and high time complexity. Many proposed methods are not suitable for large-scale networks due to their time complexity or free parameter usage. To address these challenges, this article proposes a local heuristic called Embedding Technique for Influence Maximization (ETIM) that uses shell decomposition, graph embedding, and reduction, as well as combined local structural features. The algorithm selects candidate nodes based on their connections among network shells and topological features, reducing the search space and computational overhead. It uses a deep learning-based node embedding technique to create a multidimensional vector of candidate nodes and calculates the dependency on spreading for each node based on local topological features. Finally, influential nodes are identified using the results of the previous phases and newly defined local features. The proposed algorithm is evaluated using the independent cascade model, showing its competitiveness and ability to achieve the best performance in terms of solution quality. Compared with the collective influence global algorithm, ETIM is significantly faster and improves the infection rate by an average of 12%.</p>","PeriodicalId":51314,"journal":{"name":"Big Data","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142480288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Epitope-anchored contrastive transfer learning for paired CD8+ T cell receptor–antigen recognition CD8+T细胞受体-抗原配对识别的表位锚定对比迁移学习
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-10-22 DOI: 10.1038/s42256-024-00913-8
Yumeng Zhang, Zhikang Wang, Yunzhe Jiang, Dene R. Littler, Mark Gerstein, Anthony W. Purcell, Jamie Rossjohn, Hong-Yu Ou, Jiangning Song

Understanding the mechanisms of T cell antigen recognition that underpin adaptive immune responses is critical for developing vaccines, immunotherapies and treatments against autoimmune diseases. Despite extensive research efforts, accurate prediction of T cell receptor (TCR)–antigen binding pairs remains a great challenge due to the vast diversity and cross-reactivity of TCRs. Here we propose a deep-learning-based framework termed epitope-anchored contrastive transfer learning (EPACT) tailored to paired human CD8+ TCRs. Harnessing the pretrained representations and co-embeddings of peptide–major histocompatibility complex (pMHC) and TCR, EPACT demonstrated generalizability in predicting binding specificity for unseen epitopes and distinct TCR repertoires. Contrastive learning enabled highly precise predictions for immunodominant epitopes and interpretable analysis of epitope-specific T cells. We applied EPACT to SARS-CoV-2-responsive T cells, and the predicted binding strength aligned well with the surge in spike-specific immune responses after vaccination. We further fine-tuned EPACT on structural data to decipher the residue-level interactions involved in TCR–antigen recognition. EPACT was capable of quantifying interchain distance matrices and identifying contact residues, corroborating the presence of TCR cross-reactivity across multiple tumour-associated antigens. Together, EPACT can serve as a useful artificial intelligence approach with important potential in practical applications and contribute towards the development of TCR-based immunotherapies.

了解支撑适应性免疫反应的 T 细胞抗原识别机制对于开发疫苗、免疫疗法和治疗自身免疫性疾病至关重要。尽管开展了大量研究工作,但由于 TCR 的多样性和交叉反应性,准确预测 T 细胞受体(TCR)与抗原的结合对仍然是一项巨大的挑战。在这里,我们提出了一种基于深度学习的框架,称为表位锚定对比转移学习(EPACT),专门针对成对的人类 CD8+ TCR。利用肽-主要组织相容性复合体(pMHC)和TCR的预训练表征和共嵌入,EPACT在预测未知表位和不同TCR复合物的结合特异性方面展示了通用性。对比学习可以对免疫优势表位进行高度精确的预测,并对表位特异性 T 细胞进行可解释的分析。我们将 EPACT 应用于 SARS-CoV-2 反应性 T 细胞,预测的结合强度与接种疫苗后尖峰特异性免疫反应的激增非常吻合。我们根据结构数据进一步微调了 EPACT,以破译 TCR 与抗原识别中涉及的残基级相互作用。EPACT 能够量化链间距离矩阵并识别接触残基,从而证实多种肿瘤相关抗原之间存在 TCR 交叉反应。总之,EPACT可以作为一种有用的人工智能方法,在实际应用中具有重要潜力,并有助于开发基于TCR的免疫疗法。
{"title":"Epitope-anchored contrastive transfer learning for paired CD8+ T cell receptor–antigen recognition","authors":"Yumeng Zhang, Zhikang Wang, Yunzhe Jiang, Dene R. Littler, Mark Gerstein, Anthony W. Purcell, Jamie Rossjohn, Hong-Yu Ou, Jiangning Song","doi":"10.1038/s42256-024-00913-8","DOIUrl":"https://doi.org/10.1038/s42256-024-00913-8","url":null,"abstract":"<p>Understanding the mechanisms of T cell antigen recognition that underpin adaptive immune responses is critical for developing vaccines, immunotherapies and treatments against autoimmune diseases. Despite extensive research efforts, accurate prediction of T cell receptor (TCR)–antigen binding pairs remains a great challenge due to the vast diversity and cross-reactivity of TCRs. Here we propose a deep-learning-based framework termed epitope-anchored contrastive transfer learning (EPACT) tailored to paired human CD8<sup>+</sup> TCRs. Harnessing the pretrained representations and co-embeddings of peptide–major histocompatibility complex (pMHC) and TCR, EPACT demonstrated generalizability in predicting binding specificity for unseen epitopes and distinct TCR repertoires. Contrastive learning enabled highly precise predictions for immunodominant epitopes and interpretable analysis of epitope-specific T cells. We applied EPACT to SARS-CoV-2-responsive T cells, and the predicted binding strength aligned well with the surge in spike-specific immune responses after vaccination. We further fine-tuned EPACT on structural data to decipher the residue-level interactions involved in TCR–antigen recognition. EPACT was capable of quantifying interchain distance matrices and identifying contact residues, corroborating the presence of TCR cross-reactivity across multiple tumour-associated antigens. Together, EPACT can serve as a useful artificial intelligence approach with important potential in practical applications and contribute towards the development of TCR-based immunotherapies.</p>","PeriodicalId":48533,"journal":{"name":"Nature Machine Intelligence","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142486862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal policies for autonomous navigation in strong currents using fast marching trees 利用快速行进树在强水流中实现自主导航的最佳策略
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-10-22 DOI: 10.1007/s10514-024-10179-z
Bernardo Martinez Rocamora Jr., Guilherme A. S. Pereira

Several applications require that unmanned vehicles, such as UAVs and AUVs, navigate environmental flows. While the flow can improve the vehicle’s efficiency when directed towards the goal, it may also cause feasibility problems when it is against the desired motion and is too strong to be counteracted by the vehicle. This paper proposes the flow-aware fast marching tree algorithm (FlowFMT*) to solve the optimal motion planning problem in generic three-dimensional flows. Our method creates either an optimal path from start to goal or, with a few modifications, a vector field-based policy that guides the vehicle from anywhere in its workspace to the goal. The basic idea of the proposed method is to replace the original neighborhood set used by FMT* with two sets that consider the reachability from/to each sampled position in the space. The new neighborhood sets are computed considering the flow and the maximum speed of the vehicle. Numerical results that compare our methods with the state-of-the-art optimal control solver illustrate the simplicity and correctness of the method.

在一些应用中,无人飞行器(如无人潜航器和自动潜航器)需要导航环境流。当环境流指向目标时,可以提高飞行器的效率,但当环境流与飞行器的运动目标相悖且强度过大时,也可能导致可行性问题。 本文提出了流量感知快速行进树算法(FlowFMT*)来解决一般三维流中的最优运动规划问题。我们的方法既可以创建一条从起点到目标的最优路径,也可以在稍作修改后创建一个基于矢量场的策略,引导车辆从其工作空间的任意位置到达目标。 所提方法的基本思想是用两个考虑空间中每个采样位置的可达性的邻域集取代 FMT* 使用的原始邻域集。新的邻域集在计算时考虑了流量和车辆的最大速度。将我们的方法与最先进的最优控制求解器进行比较的数值结果表明了该方法的简便性和正确性。
{"title":"Optimal policies for autonomous navigation in strong currents using fast marching trees","authors":"Bernardo Martinez Rocamora Jr.,&nbsp;Guilherme A. S. Pereira","doi":"10.1007/s10514-024-10179-z","DOIUrl":"10.1007/s10514-024-10179-z","url":null,"abstract":"<div><p>Several applications require that unmanned vehicles, such as UAVs and AUVs, navigate environmental flows. While the flow can improve the vehicle’s efficiency when directed towards the goal, it may also cause feasibility problems when it is against the desired motion and is too strong to be counteracted by the vehicle. This paper proposes the flow-aware fast marching tree algorithm (FlowFMT*) to solve the optimal motion planning problem in generic three-dimensional flows. Our method creates either an optimal path from start to goal or, with a few modifications, a vector field-based policy that guides the vehicle from anywhere in its workspace to the goal. The basic idea of the proposed method is to replace the original neighborhood set used by FMT* with two sets that consider the reachability from/to each sampled position in the space. The new neighborhood sets are computed considering the flow and the maximum speed of the vehicle. Numerical results that compare our methods with the state-of-the-art optimal control solver illustrate the simplicity and correctness of the method.</p></div>","PeriodicalId":55409,"journal":{"name":"Autonomous Robots","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142453025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 J. Field Rob. J. Bionic Eng. ACTA INFORM Adv. Rob. AI MAG Ann. Math. Artif. Intell. Appl. Bionics Biomech. APPL INTELL APPL COMPUT ELECTROM APPL ARTIF INTELL Artif. Intell. ARTIF INTELL REV CHEMOMETR INTELL LAB China Commun. CMC-Comput. Mater. Continua Complex Intell. Syst. Comput. Sci. Eng. Commun. ACM COMPUTER Comput. Graphics Forum COMPUTING EMPIR SOFTW ENG Enterp. Inf. Syst. EPJ Data Sci. ETRI J EURASIP J WIREL COMM Evolving Systems FORM METHOD SYST DES Front. Neurorob. FRONT COMPUT SCI-CHI IEEE Trans. Commun. IEEE Trans. Comput. Social Syst. IEEE Trans. Dependable Secure Comput. IEEE Trans. Green Commun. Networking IEEE Trans. Cognit. Commun. Networking IEEE Access IEEE Trans. Comput. IEEE Antennas Propag. Mag. IEEE Micro IEEE Trans. Antennas Propag. IEEE Trans. Control Syst. Technol. IEEE Trans. Big Data IEEE Trans. Cybern. IEEE Internet Comput. IEEE Trans. Affective Comput. IEEE Trans. Emerging Top. Comput. Intell. IEEE SECUR PRIV IEEE Trans. Emerging Top. Comput. IEEE Trans. Aerosp. Electron. Syst. IEEE Trans. Broadcast. IEEE Intell. Syst. IEEE Commun. Lett. IEEE Trans. Autom. Control IEEE Trans. Cloud Comput. IEEE Trans. Evol. Comput. IEEE Trans. Consum. Electron. IEEE Trans. Fuzzy Syst. IEEE Trans. Haptic IEEE Trans. Image Process. IEEE Multimedia IEEE Rob. Autom. Lett. IEEE J. Sel. Areas Commun. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. IETE Tech. Rev. IEEE Trans. Serv. Comput. IEEE Trans. Parallel Distrib. Syst. IEEE Trans. Sustainable Comput. IEEE Trans. Multimedia IEEE Trans. Ind. Inf. IEEE Trans. Neural Networks Learn. Syst. IEEE Trans. Software Eng. IEEE-ACM T AUDIO SPE IEEE Wireless Commun. IEEE Wireless Commun. Lett. IET MICROW ANTENNA P IEEE Trans. Visual Comput. Graphics IEEE Trans. Ind. Electron. IET Optoelectron IEEE Trans. Veh. Technol. IEEE Trans. Netw. Serv. Manage. IEEE Trans. Pattern Anal. Mach. Intell. IEEE Trans. Wireless Commun. IEEE ACM T NETWORK IEEE Trans. Inf. Forensics Secur. IEEE Trans. Inf. Theory IEEE Trans. Knowl. Data Eng. INFORM SYST FRONT INFORMS J COMPUT INFOR Int. J. Comput. Vision Int. J. Approximate Reasoning Int. J. Control Int. J. Commun. Syst. Int. J. Imaging Syst. Technol. Int. J. Fuzzy Syst. Int. J. Intell. Syst. Int. J. Network Manage. Int. J. Parallel Program. Int. J. Social Rob. Int. J. Software Tools Technol. Trans.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1