improve algorithm
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 5)

H-INDEX

3
(FIVE YEARS 0)

Energies ◽  
2021 ◽  
Vol 14 (16) ◽  
pp. 4839
Author(s):  
Diego B. Vilar ◽  
Carolina M. Affonso

This paper proposes a novel dynamic pricing scheme for demand response with individualized tariffs by consumption profile, aiming to benefit both customers and utility. The proposed method is based on the genetic algorithm, and a novel operator called mutagenic agent is proposed to improve algorithm performance. The demand response model is set by using price elasticity theory, and simulations are conducted based on elasticity, demand, and photovoltaic generation data from Brazil. Results are evaluated considering the integration effects of renewable energy sources and compared with other two pricing strategies currently adopted by Brazilian utilities: flat tariff and time-of-use tariff. Simulation results show the proposed dynamic tariff brings benefits to both utilities and consumers. It reduces the peak load and average cost of electricity and increases utility profit and load factor without the undesirable rebound effect.


Author(s):  
Marie Anastacio

The performance of state-of-the-art algorithms is highly dependent on their parameter values, and choosing the right configuration can make the difference between solving a problem in a few minutes or hours. Automated algorithm configurators have shown their efficiency on a wide range of applications. However, they still encounter limitations when confronted to a large number of parameters to tune or long algorithm running time. We believe that there is untapped knowledge that can be gathered from the elements of the configuration problem, such as the default value in the configuration space, the source code of the algorithm, and the distribution of the problem instances at hand. We aim at utilising this knowledge to improve algorithm configurators.


2021 ◽  
Vol 71 ◽  
pp. 175-189
Author(s):  
Imke Van Heerden ◽  
Anil Bas

Anticipating the rise in Artificial Intelligence’s ability to produce original works of literature, this study suggests that literariness, or that which constitutes a text as literary, is understudied in relation to text generation. From a computational perspective, literature is particularly challenging because it typically employs figurative and ambiguous language. Literary expertise would be beneficial to understanding how meaning and emotion are conveyed in this art form but is often overlooked. We propose placing experts from two dissimilar disciplines – machine learning and literary studies – in conversation to improve the quality of AI writing. Concentrating on evaluation as a vital stage in the text generation process, the study demonstrates that benefit could be derived from literary theoretical perspectives. This knowledge would improve algorithm design and enable a deeper understanding of how AI learns and generates. This article appears in the special track on AI and Society.


Author(s):  
Songhao Wang ◽  
Szu Hui Ng ◽  
William Benjamin Haskell

A quantile is a popular performance measure for a stochastic system to evaluate its variability and risk. To reduce the risk, selecting the actions that minimize the tail quantiles of some loss distributions is typically of interest for decision makers. When the loss distribution is observed via simulations, evaluating and optimizing its quantile can be challenging, especially when the simulations are expensive as it may cost a large number of simulation runs to obtain accurate quantile estimators. In this work, we propose a multilevel metamodel (cokriging)-based algorithm to optimize quantiles more efficiently. Utilizing nondecreasing properties of quantiles, we first search on cheaper and informative lower quantiles, which are more accurate and easier to optimize. The quantile level iteratively increases to the objective level, and the search has a focus on the possible promising regions identified by the previous levels. This enables us to leverage the accurate information from the lower quantiles to find the optimums faster and improve algorithm efficiency.


2021 ◽  
Vol 11 (2) ◽  
pp. 14
Author(s):  
Jennifer Hasler ◽  
Eric Black

Physical computing unifies real value computing including analog, neuromorphic, optical, and quantum computing. Many real-valued techniques show improvements in energy efficiency, enable smaller area per computation, and potentially improve algorithm scaling. These physical computing techniques suffer from not having a strong computational theory to guide application development in contrast to digital computation’s deep theoretical grounding in application development. We consider the possibility of a real-valued Turing machine model, the potential computational and algorithmic opportunities of these techniques, the implications for implementation applications, and the computational complexity space arising from this model. These techniques have shown promise in increasing energy efficiency, enabling smaller area per computation, and potentially improving algorithm scaling.


Author(s):  
Benedikt Berger ◽  
Martin Adam ◽  
Alexander Rühr ◽  
Alexander Benlian

AbstractOwing to advancements in artificial intelligence (AI) and specifically in machine learning, information technology (IT) systems can support humans in an increasing number of tasks. Yet, previous research indicates that people often prefer human support to support by an IT system, even if the latter provides superior performance – a phenomenon called algorithm aversion. A possible cause of algorithm aversion put forward in literature is that users lose trust in IT systems they become familiar with and perceive to err, for example, making forecasts that turn out to deviate from the actual value. Therefore, this paper evaluates the effectiveness of demonstrating an AI-based system’s ability to learn as a potential countermeasure against algorithm aversion in an incentive-compatible online experiment. The experiment reveals how the nature of an erring advisor (i.e., human vs. algorithmic), its familiarity to the user (i.e., unfamiliar vs. familiar), and its ability to learn (i.e., non-learning vs. learning) influence a decision maker’s reliance on the advisor’s judgement for an objective and non-personal decision task. The results reveal no difference in the reliance on unfamiliar human and algorithmic advisors, but differences in the reliance on familiar human and algorithmic advisors that err. Demonstrating an advisor’s ability to learn, however, offsets the effect of familiarity. Therefore, this study contributes to an enhanced understanding of algorithm aversion and is one of the first to examine how users perceive whether an IT system is able to learn. The findings provide theoretical and practical implications for the employment and design of AI-based systems.


2020 ◽  
Vol 27 (3) ◽  
pp. 15-28
Author(s):  
Ruizhe Ma ◽  
Liangli Zuo ◽  
Li Yan

A shapelet is a time-series subsequence that can represent local, phase-independent similarity in shape. Time series classification with subsequences can save computing cost, improve computing speed and improve algorithm accuracy. The shapelet-based approaches for time series classification have an advantage of interpretability. Concentrating on uncertain time series, this paper tries to apply the shapelet-based method to classify uncertain time series. Due to the high dimensions of time series, the number of the generated candidate shapelets is generally huge. As a result, the calculation amount is large too. To deal with this problem, in this paper, we introduce a piecewise linear representation (PLR) method for uncertain time series based on key points so that the traditional shapelet discovery algorithm can be improved efficiently. We verify our approach with experiments. The experimental results show that the proposed shapelet algorithm can be used for uncertain time series and it can provide classification accuracy well while reducing time cost.


2020 ◽  
Vol 34 (10) ◽  
pp. 13899-13900
Author(s):  
Damir Pulatov ◽  
Lars Kotthoff

Meta-algorithmics, the field of leveraging machine learning to use algorithms more efficiently, has achieved impressive performance improvements in many areas of AI. It treats the algorithms to improve on as black boxes – nothing is known about their inner workings. This allows meta-algorithmic techniques to be deployed in many applications, but leaves potential performance improvements untapped by ignoring information that the algorithms could provide. In this paper, we open the black box without sacrificing the universal applicability of meta-algorithmic techniques by automatically analyzing the source code of the algorithms under consideration and show how to use it to improve algorithm selection performance. We demonstrate improvements of up to 82% on the standard ASlib benchmark library.


2020 ◽  
Vol 30 (04) ◽  
pp. 839-851
Author(s):  
Valeriy G. Bardakov ◽  
Mikhail V. Neshchadim ◽  
Manoj K. Yadav
Keyword(s):  

We improve Algorithm 5.1 of [Math. Comp. 86 (2017) 2519–2534] for computing all nonisomorphic skew left braces, and enumerate left braces and skew left braces of orders up to 868 with some exceptions. Using the enumerated data, we state some conjectures for further research.


Symmetry ◽  
2020 ◽  
Vol 12 (2) ◽  
pp. 282 ◽  
Author(s):  
Anyu Du ◽  
Liejun Wang ◽  
Shuli Cheng ◽  
Naixiang Ao

With the development of multimedia technology, the secure image retrieval scheme has become a hot research topic. However, how to further improve algorithm performance in the ciphertext needs to be further explored. In this paper, we propose a secure image retrieval scheme based on a deep hash algorithm for index encryption and an improved 4-Dimensional(4-D)hyperchaotic system. The main contributions of this paper are as follows: (1) A novel secure retrieval scheme is proposed to control data transmission. (2) An improved 4-D hyperchaotic system is proposed to preserve privacy. (3) We propose an improved deep pairwise-supervised hashing (DPSH) algorithm and secure kNN to perform index encryption and propose an improved loss function to train the network model. (4) A secure access control scheme is shown, which aims to achieve secure access for users. The experimental results show that the proposed scheme has better retrieval efficiency and better security.


Sign in / Sign up

Export Citation Format

Share Document