Energy Storage Arbitrage in Real-Time Markets Via Reinforcement Learning

In this paper, we derive a temporal arbitrage policy for storage via reinforcement learning. Real-time price arbitrage is an important source of revenue for storage units, but designing good strategies have proven to be difficult because of the highly uncertain nature of the prices. Instead of current model predictive or dynamic programming approaches, we use reinforcement learning to design a two-thresholds policy. This policy is learned through repeated charge and discharge actions performed by the storage unit through updating a value matrix. We design a reward function that does not only reflect the instant profit of charge/discharge decisions but also incorporate the history information. Simulation results demonstrate our designed reward function leads to significant performance improvement compared with existing algorithms.


EnergyNet: Energy-based Adaptive Structural Learning of Artificial Neural Network Architectures

We present ENERGYNET , a new framework for analyzing and building artificial neural network architectures. Our approach adaptively learns the structure of the networks in an unsupervised manner. The methodology is based upon the theoretical guarantees of the energy function of restricted Boltzmann machines (RBM) of infinite number of nodes. We present experimental results to show that the final network adapts to the complexity of a given problem.


Discovering Order in Unordered Datasets: Generative Markov Networks

The assumption that data samples are independently identically distributed is the backbone of many learning algorithms. Nevertheless, datasets often exhibit rich structures in practice, and we argue that there exist some unknown orders within the data instances. Aiming to find such orders, we introduce a novel Generative Markov Network (GMN) which we use to extract the order of data instances automatically. Specifically, we assume that the instances are sampled from a Markov chain. Our goal is to learn the transitional operator of the chain as well as the generation order by maximizing the generation probability under all possible data permutations. One of our key ideas is to use neural networks as a soft lookup table for approximating the possibly huge, but discrete transition matrix. This strategy allows us to amortize the space complexity with a single model and make the transitional operator generalizable to unseen instances. To ensure the learned Markov chain is ergodic, we propose a greedy batch-wise permutation scheme that allows fast training. Empirically, we evaluate the learned Markov chain by showing that GMNs are able to discover orders among data instances and also perform comparably well to state-of-the-art methods on the one-shot recognition benchmark task.


Deep Hyperspherical Learning

Convolution as inner product has been the founding basis of convolutional neural networks (CNNs) and the key to end-to-end visual representation learning. Benefiting from deeper architectures, recent CNNs have demonstrated increasingly strong representation abilities. Despite such improvement, the increased depth and larger parameter space have also led to challenges in properly training a network. In light of such challenges, we propose hyperspherical convolution (SphereConv), a novel learning framework that gives angular representations on hyperspheres. We introduce SphereNet, deep hyperspherical convolution networks that are distinct from conventional inner product based convolutional networks. In particular, SphereNet adopts SphereConv as its basic convolution operator and is supervised by generalized angular softmax loss – a natural loss formulation under SphereConv. We show that SphereNet can effectively encode discriminative representation and alleviate training difficulty, leading to easier optimization, faster convergence and comparable (even better) classification accuracy over convolutional counterparts. We also provide some theoretical insights for the advantages of learning on hyperspheres. In addition, we introduce the learnable SphereConv, i.e., a natural improvement over prefixed SphereConv, and SphereNorm, i.e., hyperspherical learning as a normalization method. Experiments have verified our conclusions.


Creating Credible Models

In many settings, it is important that a model be capable of providing reasons for its predictions (i.e., the model must be interpretable). However, the model’s reasoning may not conform with well-established knowledge. In such cases, while interpretable, the model lacks \textit{credibility}. In this work, we formally define credibility in the linear setting and focus on techniques for learning models that are both accurate and credible. In particular, we propose a regularization penalty, expert yielded estimates (EYE), that incorporates expert knowledge about well-known relationships among covariates and the outcome of interest. We give both theoretical and empirical results comparing our proposed method to several other regularization techniques. Across a range of settings, experiments on both synthetic and real data show that models learned using the EYE penalty are significantly more credible than those learned using other penalties. Applied to a large-scale patient risk stratification task, our proposed technique results in a model whose top features overlap significantly with known clinical risk factors, while still achieving good predictive performance.


Long-Term Sequential Prediction Using Expert Advice

For the prediction with expert advice setting, we consider methods to construct forecasting algorithms that suffer loss not much more than of any expert in the pool. In contrast to the standard approach, we investigate the case of long-term interval forecasting of time series, that is, each expert issues a sequence of forecasts for a time interval ahead and the master algorithm combines these forecasts into one aggregated sequence of forecasts. Two new approaches for aggregating experts long-term interval predictions are presented. One is based on Vovk’s aggregation algorithm and considers sliding experts, the other applies the approach of Mixing Past Posteriors method to the long-term prediction. The upper bounds for regret of these algorithms for adversarial case are obtained. We also present results of numerical experiments of time series long-term prediction.


Elascale: Autoscaling and Monitoring as a Service

Auto-scalability has become an evident feature for cloud software systems including but not limited to big data and IoT applications. Cloud application providers now are in full control over their applications’ microservices and macroservices; virtual machines and containers can be provisioned or deprovisioned on demand at runtime. Elascale strives to adjust both micro/macro resources with respect to workload and changes in the internal state of the whole application stack. Elascale leverages Elasticsearch stack for collection, analysis and storage of performance metrics. Elascale then uses its default scaling engine to elastically adapt the managed application. Extendibility is guaranteed through provider, schema, plug-in and policy elements in the Elascale by which flexible scalability algorithms, including both reactive and proactive techniques, can be designed and implemented for various technologies, infrastructures and software stacks. In this paper, we present the architecture and initial implementation of Elascale; an instance will be leveraged to add auto-scalability to a generic IoT application. Due to zero dependency to the target software system, Elascale can be leveraged to provide auto-scalability and monitoring as-a-service for any type of cloud software system.


CogSciK: Clustering for Cognitive Science Motivated Decision Making

Computational models of decisionmaking must contend with the variance of context and any number of possible decisions that a defined strategic actor can make at a given time. Relying on cognitive science theory, the authors have created an algorithm that captures the orientation of the actor towards an object and arrays the possible decisions available to that actor based on their given intersubjective orientation. This algorithm, like a traditional K-means clustering algorithm, relies on a core-periphery structure that gives the likelihood of moves as those closest to the cluster’s centroid. The result is an algorithm that enables unsupervised classification of an array of decision points belonging to an actor’s present state and deeply rooted in cognitive science theory.


Feed Forward and Backward Run in Deep Convolution Neural Network

Convolution Neural Networks (CNN), known as ConvNets are widely used in many visual imagery application, object classification, speech recognition. After the implementation and demonstration of the deep convolution neural network in Imagenet classification in 2012 by krizhevsky, the architecture of deep Convolution Neural Network is attracted many researchers. This has led to the major development in Deep learning frameworks such as Tensorflow, caffe, keras, theno. Though the implementation of deep learning is quite possible by employing deep learning frameworks, mathematical theory and concepts are harder to understand for new learners and practitioners. This article is intended to provide an overview of ConvNets architecture and to explain the mathematical theory behind it including activation function, loss function, feedforward and backward propagation. In this article, grey scale image is taken as input information image, ReLU and Sigmoid activation function are considered for developing the architecture and cross-entropy loss function are used for computing the difference between predicted value and actual value. The architecture is developed in such a way that it can contain one convolution layer, one pooling layer, and multiple dense layers


Modeling long correlation times using additive binary Markov chains: applications to wind generation time series

Wind power generation exhibits a strong temporal variability, which is crucial for system integration in highly renewable power systems. Different methods exist to simulate wind power generation but they often cannot represent the crucial temporal fluctuations properly. We apply the concept of additive binary Markov chains to model a wind generation time series consisting of two states: periods of high and low wind generation. The only input parameter for this model is the empirical autocorrelation function. The two state model is readily extended to stochastically reproduce the actual generation per period. To evaluate the additive binary Markov chain method, we introduce a coarse model of the electric power system to derive backup and storage needs. We find that the temporal correlations of wind power generation, the backup need as a function of the storage capacity and the resting time distribution of high and low wind events for different shares of wind generation can be reconstructed.


Analysis of Dropout in Online Learning

Deep learning is the state-of-the-art in fields such as visual object recognition and speech recognition. This learning uses a large number of layers and a huge number of units and connections. Therefore, overfitting is a serious problem with it, and the dropout which is a kind of regularization tool is used. However, in online learning, the effect of dropout is not well known. This paper presents our investigation on the effect of dropout in online learning. We analyzed the effect of dropout on convergence speed near the singular point. Our results indicated that dropout is effective in online learning. Dropout tends to avoid the singular point for convergence speed near that point.


Dimension Reduction of High-Dimensional Datasets Based on Stepwise SVM

The current study proposes a dimension reduction method, stepwise support vector machine (SVM), to reduce the dimensions of large p small n datasets. The proposed method is compared with other dimension reduction methods, namely, the Pearson product difference correlation coefficient (PCCs), recursive feature elimination based on random forest (RF-RFE), and principal component analysis (PCA), by using five gene expression datasets. Additionally, the prediction performance of the variables selected by our method is evaluated. The study found that stepwise SVM can effectively select the important variables and achieve good prediction performance. Moreover, the predictions of stepwise SVM for reduced datasets was better than those for the unreduced datasets. The performance of stepwise SVM was more stable than that of PCA and RF-RFE, but the performance difference with respect to PCCs was minimal. It is necessary to reduce the dimensions of large p small n datasets. We believe that stepwise SVM can effectively eliminate noise in data and improve the prediction accuracy in any large p small n dataset.


From trees to graphs: collapsing continuous-time branching processes

Continuous-time branching processes (CTBPs) are powerful tools in random graph theory, but are not appropriate to describe real-world networks, since they produce trees rather than (multi)graphs. In this paper we analyze collapsed branching processes (CBPs), obtained by a collapsing procedure on CTBPs, in order to define multigraphs where vertices have fixed out-degree m\geq 2. A key example consists of preferential attachment models (PAMs), as well as generalized PAMs where vertices are chosen according to their degree and age. We identify the degree distribution of CBPs, showing that it is closely related to the limiting distribution of the CTBP before collapsing. In particular, this is the first time that CTBPs are used to investigate the degree distribution of PAMs beyond the tree setting.


Multi-Relevance Transfer Learning

Transfer learning aims to faciliate learning tasks in a label-scarce target domain by leveraging knowledge from a related source domain with plenty of labeled data. Often times we may have multiple domains with little or no labeled data as targets waiting to be solved. Most existing efforts tackle target domains separately by modeling the `source-target’ pairs without exploring the relatedness between them, which would cause loss of crucial information, thus failing to achieve optimal capability of knowledge transfer. In this paper, we propose a novel and effective approach called Multi-Relevance Transfer Learning (MRTL) for this purpose, which can simultaneously transfer different knowledge from the source and exploits the shared common latent factors between target domains. Specifically, we formulate the problem as an optimization task based on a collective nonnegative matrix tri-factorization framework. The proposed approach achieves both source-target transfer and target-target leveraging by sharing multiple decomposed latent subspaces. Further, an alternative minimization learning algorithm is developed with convergence guarantee. Empirical study validates the performance and effectiveness of MRTL compared to the state-of-the-art methods.


Open-World Knowledge Graph Completion

Knowledge Graphs (KGs) have been applied to many tasks including Web search, link prediction, recommendation, natural language processing, and entity linking. However, most KGs are far from complete and are growing at a rapid pace. To address these problems, Knowledge Graph Completion (KGC) has been proposed to improve KGs by filling in its missing connections. Unlike existing methods which hold a closed-world assumption, i.e., where KGs are fixed and new entities cannot be easily added, in the present work we relax this assumption and propose a new open-world KGC task. As a first attempt to solve this task we introduce an open-world KGC model called ConMask. This model learns embeddings of the entity’s name and parts of its text-description to connect unseen entities to the KG. To mitigate the presence of noisy text descriptions, ConMask uses a relationship-dependent content masking to extract relevant snippets and then trains a fully convolutional neural network to fuse the extracted snippets with entities in the KG. Experiments on large data sets, both old and new, show that ConMask performs well in the open-world KGC task and even outperforms existing KGC models on the standard closed-world KGC task.


Deep Learning for Real-time Gravitational Wave Detection and Parameter Estimation: Results with Advanced LIGO Data
MarrNet: 3D Shape Reconstruction via 2.5D Sketches
A Weak Compatibility Condition for Newest Vertex Bisection in any dimension
On the incorporation of interval-valued fuzzy sets into the Bousi-Prolog system: declarative semantics, implementation and applications
Weighted functional inequalities: Concentration properties
An asymptotic analysis of distributed nonparametric methods
On the inverse stable prior for exponential models
Powers of Ginibre Eigenvalues
Weighted functional inequalities: Constructive approach
Deep Mean Field Games for Learning Optimal Behavior Policy of Large Populations
Weighted second-order Poincaré inequalities: Application to RSA models
Micromagnetic simulation study of a disordered model for one-dimensional granular perovskite manganite oxide nanostructures
Computing exact minimum cuts without knowing the graph
Penalized Orthogonal Iteration for Sparse Estimation of Generalized Eigenvalue Problem
Curve Reconstruction via the Global Statistics of Natural Curves
The Sufficient and Necessary Condition for the Identifiability and Estimability of the DINA Model
R(QPS-Serena) and R(QPS-Serenade): Two Novel Augmenting-Path Based Algorithms for Computing Approximate Maximum Weight Matching
Multi-stage Suture Detection for Robot Assisted Anastomosis based on Deep Learning
Deep D-bar: Real time Electrical Impedance Tomography Imaging with Deep Neural Networks
Arctic Curves in path models from the Tangent Method
Every Binary Code Can Be Realized by Convex Sets
Optimal Purchasing Policy For Mean-Reverting Items in a Finite Horizon
Chromatic numbers of spheres
Information Directed Sampling for Stochastic Bandits with Graph Feedback
Estimating global species richness using symbolic data meta-analysis
A Grammar Compression Algorithm based on Induced Suffix Sorting
A non-smooth trust-region method for B-differentiable functions with application to optimization problems constrained by variational inequalities
The wall-crossing formula and Lagrangian mutations
CyCADA: Cycle-Consistent Adversarial Domain Adaptation
Fingerprint Orientation Refinement through Iterative Smoothing
Kyle-Back Equilibrium Models and Linear Conditional Mean-field SDEs
Large-scale Cloze Test Dataset Designed by Teachers
Overcoming Limited Supervision in Relation Extraction: A Pattern-enhanced Distributional Representation Approach
A Dwarf-based Scalable Big Data Benchmarking Methodology
An Empirical Analysis of Multiple-Turn Reasoning Strategies in Reading Comprehension Tasks
Performance Analysis of Convex LRMR based Passive SAR Imaging
Cellular Offloading via Downlink Cache Placement
Modeling A Micro-Nexus of Water and Energy for Smart Villages/Cities/Buildings
Learning to select examples for program synthesis
Scalable and massively parallel Monte Carlo photon transport simulations for heterogeneous computing platforms
The nonsmooth landscape of phase retrieval
Harnessing the Kelvin-Helmholtz Instability: Feedback Stabilization of an Inviscid Vortex Sheet
Distances in and Layering of a DAG
Estimating Tail Probabilities of the Ratio of the Largest Eigenvalue to the Trace of a Wishart Matrix
Multiray generalization of the arcsine laws for occupation times of infinite ergodic transformations
Predicting Scene Parsing and Motion Dynamics in the Future
An extension of estimation of critical points in ground state for random spin systems
Go with the Flow: Compositional Abstractions for Concurrent Data Structures (Extended Version)
Two-stream Collaborative Learning with Spatial-Temporal Attention for Video Classification
A matrix realization of spectral bounds of the spectral radius of a nonnegative matrix
Crafting Adversarial Examples For Speech Paralinguistics Applications
Chimera states in networks of logistic maps with hierarchical connectivities
Portfolio Optimization and Model Predictive Control: A Kinetic Approach
Fast camera focus estimation for gaze-based focus control
Self-Dual Cyclic and Quantum Codes Over Z2^α x (Z2 + uZ2)^β
Weak Flip Codes and their Optimality on the Binary Erasure Channel
Why is Kemeny’s constant a constant?
Perspectives on characteristics based curse-of-dimensionality-free numerical approaches for solving Hamilton-Jacobi equations
Projection process with definable right-hand side
Non universality for the variance of the number of real roots of random trigonometric polynomials
A Separation Principle for Control in the Age of Deep Learning
Automated Distribution System Planning for Large-Scale Network Integration Studies
Orchestrating Complex Application Architectures in Heterogeneous Clouds
Improved Encoding and Counting of Uniform Hypertrees
Toward perfect reads
Some remarks on Rogers-Szegö polynomials and Losanitsch’s triangle
Oracle inequalities for sign constrained generalized linear models
Frangi-Net: A Neural Network Approach to Vessel Segmentation
Compact Neural Networks based on the Multiscale Entanglement Renormalization Ansatz
Fast Distributed Approximation for TAP and 2-Edge-Connectivity
Multi-antenna Interference Management for Coded Caching
Finite Sample Correction for Two-Sample Inference with Sparse Covariate Adjusted Functional Data
One-pass Person Re-identification by Sketch Online Discriminant Analysis
SemRe-Rank: Incorporating Semantic Relatedness to Improve Automatic Term Extraction Using Personalized PageRank
The equivariant cohomology of weighted flag orbifolds
Tracking of enriched dialog states for flexible conversational information access
Fractional clique decompositions of dense graphs
Match Made in Heaven: Practical Compressed Sensing and Network Coding for Intelligent Distributed Communication Networks
Performance Evaluation of Deep Learning Tools in Docker Containers
Individual eigenvalue distributions of crossover chiral random matrices and low-energy constants of SU(2)$\times$U(1) lattice gauge theory
Counting hypergraph colorings in the local lemma regime
On First-order Cons-free Term Rewriting and PTIME
Yet Another Proof of the Aperiodicity of Robinson Tiles
A random matrix analysis and improvement of semi-supervised learning for large dimensional data
Higher-order Cons-free Interpreters
Using Phone Sensors and an Artificial Neural Network to Detect Gait Changes During Drinking Episodes in the Natural Environment
Non-deterministic Characterisations
A Further Analysis of The Role of Heterogeneity in Coevolutionary Spatial Games
Rigid continuation paths I. Quasilinear average complexity for solving polynomial systems
Synchronization in Networks with Strongly Delayed Couplings
Cons-free Programming with Immutable Functions
Defining Tourism Domains for Semantic Annotation of Web Content
Repairing Ontologies via Axiom Weakening
Can clustering scale sublinearly with its clusters? A variational EM acceleration of GMMs and $k$-means
Galois coverings of Schreier graphs of groups generated by bounded automata
Smooth Primal-Dual Coordinate Descent Algorithms for Nonsmooth Convex Optimization
Regret Minimization in Behaviorally-Constrained Zero-Sum Games
Fingerprint Invariant of Partitions and Construction
Stationary Distributions of Second Order Stochastic Evolution Equations with Memory in Hilbert Spaces
Optimization-Based Collision Avoidance
Slow Convergence in Generalized Central Limit Theorems
On relations between extreme value statistics, extreme random matrices and Peak-Over-Threshold method
The Strong Colors of Flowers – The Structure of Graphs with Chordal Squares
On Strong Equilibria and Improvement Dynamics in Network Creation Games
Worm-level Control through Search-based Reinforcement Learning
AC Transmission Network Expansion Planning: A Semidefinite Programming Branch-and-Cut Approach
Making a long story short: A Multi-Importance Semantic for Fast-Forwarding Egocentric Videos
Achievable Rates and Training Overheads for a Measured LOS Massive MIMO Channel
Markov chain traces
Scalable Log Determinants for Gaussian Process Kernel Learning
Learning Multi-Modal Word Representation Grounded in Visual Context
The dimension of the boundary of super-Brownian motion
A Hamilton-Jacobi point of view on mean-field Gibbs-non-Gibbs transitions
Multi-cell Device-to-Device Communications: A Spectrum Sharing and Densification Study
Invariant states of linear quantum stochastic systems under Weyl perturbations of the Hamiltonian and coupling operators
Fast Meta-Learning for Adaptive Hierarchical Classifier Design
Hartmann–Tzeng bound and Skew Cyclic Codes of Designed Hamming Distance
A Submodular Approach for Electricity Distribution Network Reconfiguration
Improvement on the Redundancy of the Knuth Balancing Scheme for Communication Systems
Toward Depth Estimation Using Mask-Based Lensless Cameras
The Ghirlanda-Guerra identities for a randomized Riemann zeta function

Advertisements