Inspired by the recent success of deep learning in multiscale information encoding, we introduce a variational autoencoder (VAE) based semi-supervised method for detection of faulty traffic data, which is cast as a classification problem. Continuous wavelet transform (CWT) is applied to the time series of traffic volume data to obtain rich features embodied in time-frequency representation, followed by a twin of VAE models to separately encode normal data and faulty data. The resulting multiscale dual encodings are concatenated and fed to an attention-based classifier, consisting of a self-attention module and a multilayer perceptron. For comparison, the proposed architecture is evaluated against five different encoding schemes, including (1) VAE with only normal data encoding, (2) VAE with only faulty data encoding, (3) VAE with both normal and faulty data encodings, but without attention module in the classifier, (4) siamese encoding, and (5) cross-vision transformer (CViT) encoding. The first four encoding schemes adopt the same convolutional neural network (CNN) architecture while the fifth encoding scheme follows the transformer architecture of CViT. Our experiments show that the proposed architecture with the dual encoding scheme, coupled with attention module, outperforms other encoding schemes and results in classification accuracy of 96.4%, precision of 95.5%, and recall of 97.7%.
Citation: Yongcan Huang, Jidong J. Yang. Semi-supervised multiscale dual-encoding method for faulty traffic data detection[J]. Applied Computing and Intelligence, 2022, 2(2): 99-114. doi: 10.3934/aci.2022006
[1] | Shuhai Li, Lina Ma, Huo Tang . Meromorphic harmonic univalent functions related with generalized (p, q)-post quantum calculus operators. AIMS Mathematics, 2021, 6(1): 223-234. doi: 10.3934/math.2021015 |
[2] | Bakhtiar Ahmad, Muhammad Ghaffar Khan, Basem Aref Frasin, Mohamed Kamal Aouf, Thabet Abdeljawad, Wali Khan Mashwani, Muhammad Arif . On q-analogue of meromorphic multivalent functions in lemniscate of Bernoulli domain. AIMS Mathematics, 2021, 6(4): 3037-3052. doi: 10.3934/math.2021185 |
[3] | Ying Yang, Jin-Lin Liu . Some geometric properties of certain meromorphically multivalent functions associated with the first-order differential subordination. AIMS Mathematics, 2021, 6(4): 4197-4210. doi: 10.3934/math.2021248 |
[4] | Hari Mohan Srivastava, Muhammad Arif, Mohsan Raza . Convolution properties of meromorphically harmonic functions defined by a generalized convolution q-derivative operator. AIMS Mathematics, 2021, 6(6): 5869-5885. doi: 10.3934/math.2021347 |
[5] | Tao He, Shu-Hai Li, Li-Na Ma, Huo Tang . Closure properties of generalized λ-Hadamard product for a class of meromorphic Janowski functions. AIMS Mathematics, 2021, 6(2): 1715-1726. doi: 10.3934/math.2021102 |
[6] | Zhuo Wang, Weichuan Lin . The uniqueness of meromorphic function shared values with meromorphic solutions of a class of q-difference equations. AIMS Mathematics, 2024, 9(3): 5501-5522. doi: 10.3934/math.2024267 |
[7] | Pinhong Long, Xing Li, Gangadharan Murugusundaramoorthy, Wenshuai Wang . The Fekete-Szegö type inequalities for certain subclasses analytic functions associated with petal shaped region. AIMS Mathematics, 2021, 6(6): 6087-6106. doi: 10.3934/math.2021357 |
[8] | Ekram E. Ali, Nicoleta Breaz, Rabha M. El-Ashwah . Subordinations and superordinations studies using q-difference operator. AIMS Mathematics, 2024, 9(7): 18143-18162. doi: 10.3934/math.2024886 |
[9] | Erhan Deniz, Hatice Tuǧba Yolcu . Faber polynomial coefficients for meromorphic bi-subordinate functions of complex order. AIMS Mathematics, 2020, 5(1): 640-649. doi: 10.3934/math.2020043 |
[10] | Huo Tang, Muhammad Arif, Khalil Ullah, Nazar Khan, Bilal Khan . Majorization results for non vanishing analytic functions in different domains. AIMS Mathematics, 2022, 7(11): 19727-19738. doi: 10.3934/math.20221081 |
Inspired by the recent success of deep learning in multiscale information encoding, we introduce a variational autoencoder (VAE) based semi-supervised method for detection of faulty traffic data, which is cast as a classification problem. Continuous wavelet transform (CWT) is applied to the time series of traffic volume data to obtain rich features embodied in time-frequency representation, followed by a twin of VAE models to separately encode normal data and faulty data. The resulting multiscale dual encodings are concatenated and fed to an attention-based classifier, consisting of a self-attention module and a multilayer perceptron. For comparison, the proposed architecture is evaluated against five different encoding schemes, including (1) VAE with only normal data encoding, (2) VAE with only faulty data encoding, (3) VAE with both normal and faulty data encodings, but without attention module in the classifier, (4) siamese encoding, and (5) cross-vision transformer (CViT) encoding. The first four encoding schemes adopt the same convolutional neural network (CNN) architecture while the fifth encoding scheme follows the transformer architecture of CViT. Our experiments show that the proposed architecture with the dual encoding scheme, coupled with attention module, outperforms other encoding schemes and results in classification accuracy of 96.4%, precision of 95.5%, and recall of 97.7%.
Let ∑ denote the class of meromorphic function of the form:
λ(ω)=1ω+∞∑t=0atωt, | (1.1) |
which are analytic in the punctured open unit disc U∗={ω:ω∈C and 0<|ω|<1}=U−{0}, where U=U∗∪{0}. Let δ(ω)∈∑, be given by
δ(ω)=1ω+∞∑t=0btωt, | (1.2) |
then the Convolution (Hadamard product) of λ(ω) and δ(ω) is denoted and defined as:
(λ∗δ)(ω)=1ω+∞∑t=0atbtωt. |
In 1967, MacGregor [17] introduced the concept of majorization as follows.
Definition 1. Let λ and δ be analytic in U∗. We say that λ is majorized by δ in U∗ and written as λ(ω)≪δ(ω)ω∈U∗, if there exists a function φ(ω), analytic in U∗, satisfying
|φ(ω)|≤1, and λ(ω)=φ(ω)δ(ω), ω∈U∗. | (1.3) |
In 1970, Robertson [19] gave the idea of quasi-subordination as:
Definition 2. A function λ(ω) is subordinate to δ(ω) in U and written as: λ(ω)≺δ(ω), if there exists a Schwarz function k(ω), which is holomorphic in U∗ with |k(ω)|<1, such that λ(ω)=δ(k(ω)). Furthermore, if the function δ(ω) is univalent in U∗, then we have the following equivalence (see [16]):
λ(ω)≺δ(ω)andλ(U)⊂δ(U). | (1.4) |
Further, λ(ω) is quasi-subordinate to δ(ω) in U∗ and written is
λ(ω)≺qδ(ω) ( ω∈U∗), |
if there exist two analytic functions φ(ω) and k(ω) in U∗ such that λ(ω)φ(ω) is analytic in U∗ and
|φ(ω)|≤1 and k(ω)≤|ω|<1 ω∈U∗, |
satisfying
λ(ω)=φ(ω)δ(k(ω)) ω∈U∗. | (1.5) |
(ⅰ) For φ(ω)=1 in (1.5), we have
λ(ω)=δ(k(ω)) ω∈U∗, |
and we say that the λ function is subordinate to δ in U∗, denoted by (see [20])
λ(ω)≺δ(ω) ( ω∈U∗). |
(ⅱ) If k(ω)=ω, the quasi-subordination (1.5) becomes the majorization given in (1.3). For related work on majorization see [1,4,9,21].
Let us consider the second order linear homogenous differential equation (see, Baricz [6]):
ω2k′′(ω)+αωk′(ω)+[βω2−ν2+(1−α)]k(ω)=0. | (1.6) |
The function kν,α,β(ω), is known as generalized Bessel's function of first kind and is the solution of differential equation given in (1.6)
kν,α,β(ω)=∞∑t=0(−β)tΓ(t+1)Γ(t+ν+1+α+12)(ω2)2t+ν. | (1.7) |
Let us denote
Lν,α,βλ(ω)=2νΓ(ν+α+12)ων2+1kν,α,β(ω12), =1ω+∞∑t=0(−β)t+1Γ(ν+α+12)4t+1Γ(t+2)Γ(t+ν+1+α+12)(ω)t, |
where ν,α and β are positive real numbers. The operator Lν,α,β is a variation of the operator introduced by Deniz [7] (see also Baricz et al. [5]) for analytic functions. By using the convolution, we define the operator Lν,α,β as follows:
( Lν,α,βλ)(ω)=Lν,α,β(ω)∗λ(ω),=1ω+∞∑t=0(−β)t+1Γ(ν+α+12)4t+1Γ(t+2)Γ(t+ν+1+α+12)at(ω)t. | (1.8) |
The operator Lν,α,β was introduced and studied by Mostafa et al. [15] (see also [2]). From (1.8), we have
ω(Lν,α,βλ(ω))j+1=(ν−1+α+12)(Lν−1,α,βλ(ω))j−(ν+α+12)(Lν,α,βλ(ω))j. | (1.9) |
By taking α=β=1, the above operator reduces to ( Lνλ)(ω) studied by Aouf et al. [2].
Definition 3. Let −1≤B<A≤1,η∈C−{0},j∈W and ν,α,β>0. A function λ∈∑ is said to be in the class Mν,jα,β(η,ϰ;A,B) of meromorphic functions of complex order η≠0 in U∗ if and only if
1−1η(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+ν+j)−ϰ|−1η(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+ν+j)|≺1+Aω1+Bω. | (1.10) |
Remark 1.
(i). For A=1,B=−1 and ϰ=0, we denote the class
Mν,jα,β(η,0;1,−1)=Mν,jα,β(η). |
So, λ∈Mν,jα,β(η,ϰ;A,B) if and only if
ℜ[1−1η(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+ν+j)]>0. |
(ii). For α=1,β=1, Mν,j1,1(η,0;1,−1) reduces to the class Mν,j(η).
ℜ[1−1η(ω(Lνλ(ω))j+1(Lνλ(ω))j+ν+j)]>0. |
Definition 4. A function λ∈∑ is said to be in the class Nν,jα,β(θ,b;A,B) of meromorphic spirllike functions of complex order b≠0 in U∗, if and only if
1−eiθbcosθ(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+j+1)≺1+Aω1+Bω, | (1.11) |
where,
(−π2<θ<π2, −1≤β<A≤1,η∈C−{0}, j∈W, ν,α,β>0andω∈U∗ ). |
(i). For A=1 and B=−1, we set
Nν,jα,β(θ,b;1,−1)=Nν,jα,β(θ,b), |
where Nν,jα,β(θ,b) denote the class of functions λ∈∑ satisfying the following inequality:
ℜ[eiθbcosθ(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+j+1)]<1. |
(ii). For θ=0 and α=β=1 we write
Nν,j1,1(0,b;1,−1)=Nν,j(b), |
where Nν,j(b) denote the class of functions λ∈∑ satisfying the following inequality:
ℜ[1b(ω(Lνλ(ω))j+1(Lνλ(ω))j+j+1)]<1. |
A majorization problem for the normalized class of starlike functions has been examined by MacGregor [17] and Altintas et al. [3,4]. Recently, Eljamal et al. [8], Goyal et al. [12,13], Goswami et al. [10,11], Li et al. [14], Tang et al. [21,22] and Prajapat and Aouf [18] generalized these results for different classes of analytic functions.
The objective of this paper is to examined the problems of majorization for the classes Mν,jα,β(η,ϰ;A,B) and Nν,jα,β(θ,b;A,B).
In Theorem 1, we prove majorization property for the class Mν,jα,β(η,ϰ;A,B).
Theorem 1. Let the function λ∈∑ and suppose that δ∈Mν,jα,β(η,ϰ;A,B). If (Lν,α,βλ(ω))j is majorized by (Lν,α,βδ(ω))j in U∗, then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r0), | (2.1) |
where r0=r0(η,ϰ,ν,α,β,A,B) is the smallest positive roots of the equation
−ρ(ν−1+α+12)[(A−B)|η|1−ϰ−(α+12)|B|]r3−(ν−1+α+12)[ρ(α+12)+ρ2|B|−|B|]r2−(ν−1+α+12)[(A−B)|η|1−ϰ−(α+12)|B|+ρ2|B|−1]r+ρ(ν−1+α+12)(α+12)=0. | (2.2) |
Proof. Since δ∈Mν,jα,β(η,ϰ;A,B), we have
1−1η(ω(Lν,α,βδ(ω))j+1(Lν,α,βδ(ω))j+ν+j)−ϰ|−1η(ω(Lν,α,βδ(ω))j+1(Lν,α,βδ(ω))j+ν+j)|=1+Ak(ω)1+Bk(ω), | (2.3) |
where k(ω)=c1ω+c2ω2+..., is analytic and bounded functions in U∗ with
|k(ω)|≤|ω| (ω∈U∗). | (2.4) |
Taking
§(ω)=1−1η(ω(Lν,α,βδ(ω))j+1(Lν,α,βδ(ω))j+ν+j), | (2.5) |
In (2.3), we have
§(ω)−ϰ|§(ω)−1|=1+Ak(ω)1+Bk(ω), |
which implies
§(ω)=1+(A−Bϰe−iθ1−ϰe−iθ)k(ω)1+Bk(ω). | (2.6) |
Using (2.6) in (2.5), we get
ω(Lν,α,βδ(ω))j+1(Lν,α,βδ(ω))j=−ν+j+[(A−B)η1−ϰe−iθ+(ν+j)B]k(ω)1+Bk(ω). | (2.7) |
Application of Leibnitz's Theorem on (1.9) gives
ω(Lν,α,βδ(ω))j+1=(ν−1+α+12)(Lν−1,α,βδ(ω))j−(ν+j+α+12)(Lν,α,βδ(ω))j. | (2.8) |
By using (2.8) in (2.7) and making simple calculations, we have
(Lν−1,α,βδ(ω))j(Lν,α,βδ(ω))j=α+12−[(A−B)η1−ϰe−iθ−(α+12)B]k(ω)(1+Bk(ω))(ν−1+α+12). | (2.9) |
Or, equivalently
(Lν,α,βδ(ω))j=(1+Bk(ω))(ν−1+α+12)α+12−[(A−B)η1−ϰe−iθ−(α+12)B]k(ω)(Lν−1,α,βδ(ω))j. | (2.10) |
Since |k(ω)|≤|ω|, (2.10) gives us
|(Lν,α,βδ(ω))j|≤[1+|B||ω|](ν−1+α+12)α+12−|(A−B)η1−ϰe−iθ−(α+12)B||ω||(Lν−1,α,βδ(ω))j|≤[1+|B||ω|](ν−1+α+12)α+12−[(A−B)|η|1−ϰ−(α+12)|B|]|ω||(Lν−1,α,βδ(ω))j| | (2.11) |
Since (Lν,α,βλ(ω))j is majorized by (Lν,α,βδ(ω))j in U∗. So from (1.3), we have
(Lν,α,βλ(ω))j=φ(ω)(Lν,α,βδ(ω))j. | (2.12) |
Differentiating (2.12) with respect to ω then multiplying with ω, we get
(Lν,α,βλ(ω))j=ωφ′(ω)(Lν,α,βδ(ω))j+ωφ(ω)(Lν,α,βδ(ω))j+1. | (2.13) |
By using (2.8), (2.12) and (2.13), we have
(Lν,α,βλ(ω))j+1=1(ν−1+α+12)ωφ′(ω)(Lν,α,βδ(ω))j+φ(ω)(Lν−1,α,βδ(ω))j+1. | (2.14) |
On the other hand, noticing that the Schwarz function φ satisfies the inequality
|φ′(ω)|≤1−|φ(ω)|21−|ω|2 (ω∈U∗). | (2.15) |
Using (2.8) and (2.15) in (2.14), we get
|(Lν,α,βλ(ω))j|≤[|φ(ω)|+ω(1−|φ(ω)|2)[1+|B||ω|](ν−1+α+12)(ν−1+α+12)(1−|ω|2)(α+12−[(A−B)|η|1−ϰ−(α+12)B]|ω|)]×|(Lν−1,α,βδ(ω))j|, |
By taking
|ω|=r, |φ(ω)|=ρ (0≤ρ≤1), |
reduces to the inequality
|(Lν,α,βλ(ω))j|≤Φ1(ρ)(ν−1+α+12)(1−r2)(α+12−[(A−B)|η|1−ϰ−(α+12)B]r)|(Lν−1,α,βδ(ω))j|, |
where
Φ1(ρ)=[ρ(ν−1+α+12)(1−r2)(α+12−[(A−B)|η|1−ϰ−(α+12)B]r)+r(1−ρ2)[1+|B|r](ν−1+α+12)]=−r[1+|B|r](ν−1+α+12)ρ2+ρ(ν−1+α+12)(1−r2)(α+12−[(A−B)|η|1−ϰ−(α+12)B]r)+r[1+|B|r](ν−1+α+12), | (2.16) |
takes in maximum value at ρ=1 with r0=r0(η,ϰ,ν,α,β,A,B) where r0 is the least positive root of the (2.2). Furthermore, if 0≤ξ0≤r0(η,ϰ,ν,α,β,A,B), then the function ψ1(ρ) defined by
ψ1(ρ)=−ξ0[1+|B|ξ0](ν−1+α+12)ρ2+ρ(ν−1+α+12)(1−ξ20)(α+12−[(A−B)|η|1−ϰ−(α+12)B]ξ0)+ξ0[1+|B|ξ0](ν−1+α+12), | (2.17) |
is an increasing function on the interval (0≤ρ≤1), so that
ψ1(ρ)≤ψ1(1)=(ν−1+α+12)(1−ξ20)[α+12−((A−B)|η|1−ϰ−(α+12)B)ξ0](0≤ρ≤1, 0≤ξ0≤r0(η,ϰ,A,B)). |
Hence, upon setting ρ=1 in (2.17), we achieve (2.1).
Special Cases: Let A=1 and B=−1 in Theorem 1, we obtain the following corollary.
Corollary 1. Let the function λ∈∑ and suppose that δ∈Mν,jα,β(η,ϰ;A,B). If (Lν,α,βλ(ω))j is majorized by (Lν,α,βδ(ω))j in U∗, then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r1), |
where r1=r1(η,ϰ,ν,α,β) is the least positive roots of the equation
ρ(ν−1+α+12)[2|η|1−ϰ−(α+12)]r3−(ν−1+α+12)[ρ(α+12)+ρ2−1]r2−(ν−1+α+12)[ρ{2|η|1−ϰ−(α+12)}+ρ2−1]r+ρ(ν−1+α+12)(α+12)=0. | (2.18) |
Here, r=−1 is one of the roots (2.18) and the other roots are given by
r1=k0−√k20−4ρ2(ν−1+α+12)[2|η|1−ϰ−(α+12)](ν−1+α+12)(α+12)2ρ(ν−1+α+12)[2|η|1−ϰ−(α+12)], |
where
k0=(ν−1+α+12)[ρ{2|η|1−ϰ−2(α+12)}+ρ2−1]. |
Taking ϰ=0 in corollary 1, we state the following:
Corollary 2. Let the function λ∈∑ and suppose that δ∈Mν,jα,β(η,ϰ;A,B). If (Lν,α,βλ(ω))j is majorized by (Lν,α,βδ(ω))j in U∗, then
|(Lv,α,βλ(ω))j+1|≤|(Lv,α,βδ(ω))j+1|,(|ω|<r2), |
where r2=r2(η,ν,α,β) is the lowest positive roots of the equation
ρ(ν−1+α+12)[2|η|−(α+12)]r3−(ν−1+α+12)[ρ(α+12)+ρ2−1]r2−(ν−1+α+12)[ρ{2|η|−(α+12)}+ρ2−1]r+ρ(ν−1+α+12)(α+12)=0, | (2.19) |
given by
r2=k1−√k21−4ρ2(ν−1+α+12)[2|η|−(α+12)](ν−1+α+12)(α+12)2ρ(ν−1+α+12)[2|η|−(α+12)], |
where
k1=(ν−1+α+12)[ρ{2|η|−2(α+12)}+ρ2−1]. |
Taking α=β=1 in corollary 2, we get the following:
Corollary 3. Let the function λ∈∑ and suppose that δ∈Mν,jα,β(η,ϰ;A,B). If (Lν,α,βλ(ω))j is majorized by (Lν,α,βδ(ω))j in U∗, then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r3), |
where r3=r3(η,ν) is the lowest positive roots of the equation
ρν[2|η|−1]r3−ν[ρ+ρ2−1]r2−ν[ρ(2|η|−1)+ρ2−1]r+ρν=0, | (2.20) |
given by
r3=k2−√k22−4ρ2ν[2|η|−1]ν2ρν[2|η|−1], |
where
k2=ν[ρ{2|η|−2}+ρ2−1]. |
Secondly, we exam majorization property for the class Nν,jα,β(θ,b;A,B).
Theorem 2. Let the function λ∈∑ and suppose that δ∈Nν,jα,β(θ,b;A,B). If
(Lν,α,βλ(ω))j≪(Lν,α,βδ(ω))j,(j∈0,1,2...), |
then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r4), | (3.1) |
where r4=r4(θ,b,ν,α,β,A,B) is the smallest positive roots of the equation
−ρ[|(B−A)bcosθ+(ν+α+12−1)|B||]r3−[ρ{ν+α+12−1}−|B|(1−ρ2)(ν−1+α+12)]r2+[ρ{|(B−A)bcosθ+(ν+α+12−1)|B||}+(1−ρ2)(ν−1+α+12)]r+ρ[ν+α+12−1]=0,(−π2<θ<π2,−1≤β<A≤1,η∈C−{0},ν,α,β>0,andω∈U∗). | (3.2) |
Proof. Since δ∈Nν,jα,β(θ,b;A,B), so
1−eiθbcosθ(ω(Lν,α,βλ(ω))j+1(Lν,α,βλ(ω))j+j+1)=1+Aω1+Bω, | (3.3) |
where, k(ω) is defined as (2.4).
From (3.3), we have
ω(Lν,α,βδ(ω))j+1(Lν,α,βδ(ω))j=[(B−A)bcosθ−(j+1)Beiθ]k(ω)−(j+1)eiθeiθ(1+Bk(ω)). | (3.4) |
Now, using (2.8) in (3.4) and making simple calculations, we obtain
(Lν−1,α,βδ(ω))j(Lν,α,βδ(ω))j=[(B−A)bcosθ+(ν+α+12−1)Beiθ]k(ω)+[(ν+j+α+12)−1]eiθeiθ(1+Bk(ω))(ν−1+α+12), | (3.5) |
which, in view of |k(ω)|≤|ω| (ω∈U∗), immediately yields the following inequality
|(Lν,α,βδ(ω))j|≤|eiθ|(1+|B||k(ω)|)(ν−1+α+12)[|(B−A)bcosθ+(ν+α+12−1)Beiθ|]|k(ω)|+[(ν+α+12)−1]|eiθ|×|(Lν−1,α,βδ(ω))j|. | (3.6) |
Now, using (2.15) and (3.6) in (2.14) and working on the similar lines as in Theorem 1, we have
|(Lν−1,α,βλ(ω))j|≤[|φ(ω)|+|ω|(1−|φ(ω)|2)(1+|B||ω|)(ν−1+α+12)(1−|ω|2)[{|(B−A)bcosθ+(ν+α+12−1)B|}|ω|+[(ν+α+12)−1]]]×|(Lν−1,α,βδ(ω))j|. |
By setting |ω|=r,|φ(ω)|=ρ(0≤ρ≤1), leads us to the inequality
|(Lν−1,α,βλ(ω))j|≤[Φ2(ρ)(1−r2)[{|(B−A)bcosθ+(ν+α+12−1)B|}r+(ν+α+12)−1]]×|(Lν−1,α,βδ(ω))j|, | (3.7) |
where the function Φ2(ρ) is given by
Φ2(ρ)=ρ(1−r2)[{|(B−A)bcosθ+(ν+α+12−1)B|}r+(ν+α+12)−1]+r(1−ρ2)(1+Br)(ν−1+α+12). |
Φ2(ρ) its maximum value at ρ=1 with r4=r4(θ,b,ν,α,β,A,B) given in (3.2). Moreover if 0≤ξ1≤r4(θ,b,ν,α,β,A,B), then the function.
ψ2(ρ)=ρ(1−ξ21)[{|(B−A)bcosθ+(ν+α+12−1)B|}ξ1+(ν+α+12)−1]+ξ1(1−ρ2)(1+Bξ1)(ν−1+α+12), |
increasing on the interval 0≤ρ≤1, so that ψ2(ρ) does not exceed
ψ2(1)=(1−ξ21)[{|(B−A)bcosθ+(ν+α+12−1)B|}ξ1+(ν+α+12)−1]. |
Therefore, from this fact (3.7) gives the inequality (3.1). We complete the proof.
Special Cases: Let A=1 and B=−1 in Theorem 2, we obtain the following corollary.
Corollary 4. Let the function λ∈∑ and suppose that δ∈Nν,jα,β(θ,b;A,B). If
(Lν,α,βλ(ω))j≪(Lν,α,βδ(ω))j,(j∈0,1,2,...), |
then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r5), |
where r5=r5(θ,b,ν,α,β) is the lowest positive roots of the equation
−ρ[|−2bcosθ+(ν+α+12−1)|]r3−[ρ{ν+α+12−1}−(1−ρ2)(ν−1+α+12)]r2+[ρ{|−2bcosθ+(ν+α+12−1)|}+(1−ρ2)(ν−1+α+12)]r+ρ[ν+α+12−1]=0. | (3.8) |
Where r=−1 is first roots and the other two roots are given by
r5=κ0−√κ20+4ρ2[|−2bcosθ+(ν+α+12−1)|][ν+α+12−1]−2ρ[|−2bcosθ+(ν+α+12−1)|], |
and
κ0=[(1−ρ2)(ν−1+α+12)−ρ{|−2bcosθ+2(ν+α+12−1)|}]. |
Which reduces to Corollary 4 for θ=0.
Corollary 5. Let the function λ∈∑ and suppose that δ∈Nν,jα,β(θ,b;A,B). If
(Lν,α,βλ(ω))j≪(Lν,α,βδ(ω))j,(j∈0,1,2,...), |
then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r6), |
where r6=r6(b,ν,α,β) is the least positive roots of the equation
−ρ[|−2b+(ν+α+12−1)|]r3−[ρ{ν+α+12−1}−(1−ρ2)(ν−1+α+12)]r2+[ρ{|−2b+(ν+α+12−1)|}+(1−ρ2)(ν−1+α+12)]r+ρ[ν+α+12−1]=0, | (3.9) |
given by
r6=κ1−√κ21+4ρ2[|−2b+(ν+α+12−1)|][ν+α+12−1]−2ρ[|−2b+(ν+α+12−1)|], |
and
κ1=[(1−ρ2)(ν−1+α+12)−ρ{|−2b+2(ν+α+12−1)|}]. |
Taking α=β=1 in corollary 5, we get.
Corollary 6. Let the function λ∈∑ and suppose that δ∈Nν,jα,β(θ,b;A,B). If
(Lν,α,βλ(ω))j≪(Lν,α,βδ(ω))j,(j∈0,1,2,...), |
then
|(Lν,α,βλ(ω))j+1|≤|(Lν,α,βδ(ω))j+1|,(|ω|<r7), |
where r7=r7(b,ν) is the lowest positive roots of the equation
−ρ|−2b+ν|r3−[ρν−(1−ρ2)ν]r2+[ρ|−2b+ν|+(1−ρ2)ν]r+ρ[ν]=0, | (3.10) |
given by
r7=κ2−√κ22+4ρ2[|−2b+ν|][ν]−2ρ[|−2b+ν|], |
and
κ2=[(1−ρ2)ν−ρ{|−2b+2ν|}]. |
In this paper, we explore the problems of majorization for the classes Mν,jα,β(η,ϰ;A,B) and Nν,jα,β(θ,b;A,B) by using a convolution operator Lν,α,β. These results generalizes and unify the theory of majorization which is an active part of current ongoing research in Geometric Function Theory. By specializing different parameters like ν,η,ϰ,θ and b, we obtain a number of important corollaries in Geometric Function Theory.
The work here is supported by GUP-2019-032.
The authors agree with the contents of the manuscript, and there is no conflict of interest among the authors.
[1] | Transportation Research Board, Advancing Highway Traffic Monitoring Through Strategic Research, Transportation Research Circular E-C227, 2017. |
[2] |
S. Turner, Defining and measuring traffic data quality: White paper on recommended approaches, Transport. Res. Rec., 1870 (2004), 62–69. https://doi.org/10.3141/1870-08 doi: 10.3141/1870-08
![]() |
[3] | C. L. Wen, F. Y. Lv, Z. J. Bao, M. Q. Liu, A review of data driven-based incipient fault diagnosis, Acta Automatica Sinica, 42 (2016), 1285–1299. |
[4] |
W. Bounoua, A. Bakdi, Fault detection and diagnosis of nonlinear dynamical processes through correlation dimension and fractal analysis based dynamic kernel PCA, Chem. Eng. Sci., 229 (2021), 116099. https://doi.org/10.1016/j.ces.2020.116099 doi: 10.1016/j.ces.2020.116099
![]() |
[5] |
R. Rubini, U. Meneghetti, Application of the envelope and wavelet transform analyses for the diagnosis of incipient faults in ball bearings, Mech. Syst. Signal Process., 15 (2001), 287–302. https://doi.org/10.1006/mssp.2000.1330 doi: 10.1006/mssp.2000.1330
![]() |
[6] |
E. Aker, M. L. Othman, V. Veerasamy, I. B. Aris, N. I. A. Wahab, H. Hizam, Fault detection and classification of shunt compensated transmission line using discrete wavelet transform and naive bayes classifier, Energies, 13 (2020), 243. https://doi.org/10.3390/en13010243 doi: 10.3390/en13010243
![]() |
[7] |
M. Rhif, A. ben Abbes, I. R. Farah, B. Martinez, Y. Sang, Wavelet transform application for/in non-stationary time-series analysis: a review. Applied Sciences, 9 (2019), 1345. https://doi.org/10.3390/app9071345 doi: 10.3390/app9071345
![]() |
[8] |
D. Jiang, C. Yao, Z. Xu, W. Qin, Multi‐scale anomaly detection for high‐speed network traffic, T. Emerg. Telecommun. T., 26 (2015), 308–317. https://doi.org/10.1002/ett.2619 doi: 10.1002/ett.2619
![]() |
[9] |
E. Ayaz, A. Öztürk, S. Şeker, B. R. Upadhyaya, Fault detection based on continuous wavelet transform and sensor fusion in electric motors, COMPEL-The international journal for computation and mathematics in electrical and electronic engineering, 28 (2009), 454–470. https://doi.org/10.1108/03321640910929326 doi: 10.1108/03321640910929326
![]() |
[10] | M. Golgowski, S. Osowski, Anomaly detection in ECG using wavelet transformation, 2020 IEEE 21st International Conference on Computational Problems of Electrical Engineering (CPEE), 1–4. https://doi.org/10.1109/CPEE50798.2020.9238709 |
[11] | G. Boquet, A. Morell, J. Serrano, J. L. Vicario, A variational autoencoder solution for road traffic forecasting systems: Missing data imputation, dimension reduction, model selection and anomaly detection, Transport. Res. C-Emer., 115 (2020), 102622. https://doi.org/10.1016/j.trc.2020.102622 |
[12] |
C. Morris, J. J. Yang, M. G. Chorzepa, S. S. Kim, S. A. Durham, Self-Supervised Deep Learning Framework for Anomaly Detection in Traffic Data, J. Transp. Eng. A- Syst., 148 (2022), 04022020. https://doi.org/10.1061/JTEPBS.0000666 doi: 10.1061/JTEPBS.0000666
![]() |
[13] | B. Gunay, G. Erdemir, Using wavelet transforms for better interpretation of traffic simulation, Traffic Engineering and Control, 50 (2009), 450–453. |
[14] |
Z. Zheng, S. Ahn, D. Chen, J. Laval, Applications of wavelet transform for analysis of freeway traffic: Bottlenecks, transient traffic, and traffic oscillations, Transport. Res. B-Meth., 45 (2011), 372–384. https://doi.org/10.1016/j.trb.2010.08.002 doi: 10.1016/j.trb.2010.08.002
![]() |
[15] |
F. König, C. Sous, A. O. Chaib, G. Jacobs, Machine learning based anomaly detection and classification of acoustic emission events for wear monitoring in sliding bearing systems, Tribol. Int., 155 (2021), 106811. https://doi.org/10.1016/j.triboint.2020.106811 doi: 10.1016/j.triboint.2020.106811
![]() |
[16] | C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, et al., Going deeper with convolutions, Proceedings of the IEEE conference on computer vision and pattern recognition, (2015), 1‒9. https://doi.org/10.1109/CVPR.2015.7298594 |
[17] |
M. Jalayer, C. Orsenigo, C. Vercellis, Fault detection and diagnosis for rotating machinery: A model based on convolutional LSTM, Fast Fourier and continuous wavelet transforms, Comput. Ind., 125 (2021), 103378. https://doi.org/10.1016/j.compind.2020.103378 doi: 10.1016/j.compind.2020.103378
![]() |
[18] |
A. Krizhevsky, I. Sutskever, G. E. Hinton, Imagenet classification with deep convolutional neural networks, Commun. ACM, 60 (2017), 84‒90. https://doi.org/10.1145/3065386 doi: 10.1145/3065386
![]() |
[19] | Z. Wang, T. Oates, Imaging time-series to improve classification and imputation, Twenty-Fourth International Joint Conference on Artificial Intelligence, (2015), 3939‒3945. |
[20] | N. Hatami, Y. Gavet, J. Debayle, Classification of time-series images using deep convolutional neural networks, Tenth international conference on machine vision (ICMV 2017), 10696 (2018), 242–249. |
[21] |
C. Pelletier, G. I. Webb, F. Petitjean, Temporal convolutional neural network for the classification of satellite image time series, Remote Sensing, 11 (2019), 523. https://doi.org/10.3390/rs11050523 doi: 10.3390/rs11050523
![]() |
[22] |
C. L. Yang, Z. X. Chen, C. Y. Yang, Sensor classification using convolutional neural network by encoding multivariate time series as two-dimensional colored images, Sensors, 20 (2019), 168. https://doi.org/10.3390/s20010168 doi: 10.3390/s20010168
![]() |
[23] | K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv: 1409.1556. |
[24] | Y. Shi, X. Xue, J. Xue, Y. Qu, Fault Detection in Nuclear Power Plants using Deep Leaning based Image Classification with Imaged Time-series Data, Int. J. Comput. Commun., 17 (2022). https://doi.org/10.15837/ijccc.2022.1.4714 |
[25] |
J. Lin, L. Qu, Feature extraction based on Morlet wavelet and its application for mechanical fault diagnosis, J. Sound Vib., 234 (2000), 135–148. https://doi.org/10.1006/jsvi.2000.2864 doi: 10.1006/jsvi.2000.2864
![]() |
[26] |
B. T. Carroll, B. M. Whitaker, W. Dayley, D. V. Anderson, Outlier learning via augmented frozen dictionaries, IEEE/ACM Transactions on Audio, Speech, and Language Processing, 25 (2017), 1207–1215. https://doi.org/10.1109/TASLP.2017.2690567 doi: 10.1109/TASLP.2017.2690567
![]() |
[27] | D. P. Kingma, M. Welling, Auto-encoding variational bayes. arXiv preprint arXiv: 13126114. |
[28] | A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, et al., Attention is all you need, Adv. Neural Inf. Process. Syst., 30 (2017). |
[29] | A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai, T. Unterthiner, et al., An image is worth 16 x 16 words: Transformers for image recognition at scale. arXiv preprint arXiv: 2010.11929. |
[30] | G. Koch, R. Zemel, R. Salakhutdinov, Siamese neural networks for one-shot image recognition, ICML deep learning workshop, 2 (2015). |
[31] | C. F. Chen, Q. Fan, R. Panda, Crossvit: Cross-attention multi-scale vision transformer for image classification, Proceedings of the IEEE/CVF international conference on computer vision, (2021), 357–366. https://doi.org/10.1109/ICCV48922.2021.00041 |
[32] | G. Lee, R. Gommers, F. Waselewski, K. Wohlfahrt, A. O'Leary, PyWavelets: A Python package for wavelet analysis, Journal of Open Source Software, 4 (2019), 1237. https://doi.org/10.21105/joss.01237 |
[33] | D. P. Kingma, J. Ba, Adam: A method for stochastic optimization. arXiv preprint arXiv: 1412.6980. |
1. | Syed Ghoos Ali Shah, Saqib Hussain, Akhter Rasheed, Zahid Shareef, Maslina Darus, Fanglei Wang, Application of Quasisubordination to Certain Classes of Meromorphic Functions, 2020, 2020, 2314-8888, 1, 10.1155/2020/4581926 | |
2. | Syed Ghoos Ali Shah, Saima Noor, Saqib Hussain, Asifa Tasleem, Akhter Rasheed, Maslina Darus, Rashad Asharabi, Analytic Functions Related with Starlikeness, 2021, 2021, 1563-5147, 1, 10.1155/2021/9924434 | |
3. | Syed Ghoos Ali Shah, Saqib Hussain, Saima Noor, Maslina Darus, Ibrar Ahmad, Teodor Bulboaca, Multivalent Functions Related with an Integral Operator, 2021, 2021, 1687-0425, 1, 10.1155/2021/5882343 | |
4. | Syed Ghoos Ali Shah, Shahbaz Khan, Saqib Hussain, Maslina Darus, q-Noor integral operator associated with starlike functions and q-conic domains, 2022, 7, 2473-6988, 10842, 10.3934/math.2022606 | |
5. | Neelam Khan, Muhammad Arif, Maslina Darus, Abdellatif Ben Makhlouf, Majorization Properties for Certain Subclasses of Meromorphic Function of Complex Order, 2022, 2022, 1099-0526, 1, 10.1155/2022/2385739 | |
6. | Ibrar Ahmad, Syed Ghoos Ali Shah, Saqib Hussain, Maslina Darus, Babar Ahmad, Firdous A. Shah, Fekete-Szegö Functional for Bi-univalent Functions Related with Gegenbauer Polynomials, 2022, 2022, 2314-4785, 1, 10.1155/2022/2705203 | |
7. | F. Müge SAKAR, Syed Ghoos Ali SHAH, Saqib HUSSAİN, Akhter RASHEED, Muhammad NAEEM, q-Meromorphic closed-to-convex functions related with Janowski function, 2022, 71, 1303-5991, 25, 10.31801/cfsuasmas.883970 | |
8. | Syed Ghoos Ali Shah, Sa’ud Al-Sa’di, Saqib Hussain, Asifa Tasleem, Akhter Rasheed, Imran Zulfiqar Cheema, Maslina Darus, Fekete-Szegö functional for a class of non-Bazilevic functions related to quasi-subordination, 2023, 56, 2391-4661, 10.1515/dema-2022-0232 | |
9. | Abdul Basir, Muhammad Adil Khan, Hidayat Ullah, Yahya Almalki, Saowaluck Chasreechai, Thanin Sitthiwirattham, Derivation of Bounds for Majorization Differences by a Novel Method and Its Applications in Information Theory, 2023, 12, 2075-1680, 885, 10.3390/axioms12090885 | |
10. | Shatha S. Alhily, Alina Alb Lupas, Certain Class of Close-to-Convex Univalent Functions, 2023, 15, 2073-8994, 1789, 10.3390/sym15091789 |