Given the graph G=(V,E), the concept of minimal spanning forest (msf) is an extension of the minimal spanning tree (mst) of G. However, an msf is not necessarily a subgraph of mst. Therefore, no immediate extension ...
详细信息
Given the graph G=(V,E), the concept of minimal spanning forest (msf) is an extension of the minimal spanning tree (mst) of G. However, an msf is not necessarily a subgraph of mst. Therefore, no immediate extension of the classical algorithms to determine mst applies to msf. The problem of determining an msf can be viewed as a special case of the degree constrained subgraph problem. This review discusses some properties of msf and presents a linear time algorithm to build an msf for a chain graph.
An elegant and general way to apply graph partitioning algorithms to hypergraphs would be to model hypergraphs by graphs and apply the graph algorithms to these models. Of course such models have to simulate the given...
详细信息
An elegant and general way to apply graph partitioning algorithms to hypergraphs would be to model hypergraphs by graphs and apply the graph algorithms to these models. Of course such models have to simulate the given hypergraphs with respect to their cut properties. An edge-weighted graph (V, E) is a cut-model for an edge-weighted hypergraph (V, H) if the weight of the edges cut by any bipartition of V in the graph is the same as the weight of the hyperedges cut by the same bipartition in the hypergraph. We show that there is no cut-model in general. Next we examine whether the addition of dummy vertices helps: An edge-weighted graph (V or D, E) is a mincut-model for an edge-weighted hypergraph (V, H) if the weight of the hyperedges cut by a bipartition of the hypergraphs vertices is the same as the weight of a minimum cut separating the two parts in the graph. We construct such models using positive and negative weights. On the other hand, we show that there is no mincut-model in general if only positive weights are allowed.
Remote sensing algorithms often invert multiple measurements simultaneously to retrieve a group of geophysical parameters. In order to create a robust retrieval algorithm, it is necessary to ensure that there are more...
详细信息
Remote sensing algorithms often invert multiple measurements simultaneously to retrieve a group of geophysical parameters. In order to create a robust retrieval algorithm, it is necessary to ensure that there are more unique measurements than parameters to be retrieved. If this is not the case, the inversion might have multiple solutions and be sensitive to noise. In this letter, we introduce a methodology to calculate the number of (possibly fractional) "degrees of information" in a set of measurements, representing the number of parameters that can be retrieved robustly from that set. Since different measurements may not be mutually independent, the amount of duplicate information is calculated using the information-theoretic concept of total correlation (a generalization of mutual information). The total correlation is sensitive to the full distribution of each measurement and therefore accounts for duplicate information even if multiple measurements are related only partially and nonlinearly. The method is illustrated using several examples, and applications to a variety of sensor types are discussed.
Small spacecraft platforms are a promising low-cost approach to accelerate exploration of small bodies, addressing the space community's interest in origin science, planetary resources, and planetary defense. Howe...
详细信息
Small spacecraft platforms are a promising low-cost approach to accelerate exploration of small bodies, addressing the space community's interest in origin science, planetary resources, and planetary defense. However, they can be challenging platforms for detecting and imaging low brightness targets. Difficulties include constrained bandwidth, which limits the volume of data that can be downlinked;attitude instability, which limits exposure time;small instrument apertures, which reduce sensitivity;and cosmic ray contamination, which creates illusory sources. Mission designers can address all these problems simultaneously by shifting image analysis across the communications gap. Spacecraft can use onboard data analysis to detect sources directly, or downlink parsimonious summary products for detection on the ground. One promising approach is to acquire stacks of short consecutive exposures, and then coregister and coadd them onboard. This work analyzes a coaddition algorithm that is designed to be robust against small spacecraft challenges. We evaluate factors affecting performance, such as attitude control and camera noise systematics, in regimes typical of small spacecraft missions. We motivate the algorithm design by considering its application to NEAScout, a mission representing a new generation of small (sub-50kg) exploration spacecraft having very small instrument apertures and data rates below 1kbytes(-1). Here, onboard analysis allows detection and rendezvous with far smaller and fainter objects, dramatically reducing the cost and complexity of primitive bodies exploration.
The nearest neighbor interchange (nni) metric is a distance measure providing a quantitative measure of dissimilarity between two unrooted binary trees with labeled leaves. The metric has a transparent definition in t...
详细信息
The nearest neighbor interchange (nni) metric is a distance measure providing a quantitative measure of dissimilarity between two unrooted binary trees with labeled leaves. The metric has a transparent definition in terms of a simple transformation of binary trees, but its use in nontrivial problems is usually prevented by the absence of a computationally efficient algorithm. Since recent attempts to discover such an algorithm continue to be unsuccessful, we address the complementary problem of designing an approximation to the nni metric. Such an approximation should be well-defined, efficient to compute, comprehensible to users, relevant to applications, and a close fit to the nni metric; the challenge, of course, is to compromise these objectives in such a way that the final design is acceptable to users with practical and theoretical orientations. We describe an approximation algorithm that appears to satisfy adequately these objectives. The algorithm requires O(n) space to compute dissimilarity between binary trees withn labeled leaves; it requires O(n logn) time for rooted trees and O(n 2 logn) time for unrooted trees. To help the user interpret the dissimilarity measures based on this algorithm, we describe empirical distributions of dissimilarities between pairs of randomly selected trees for both rooted and unrooted cases.
Let Rn denote the set of rooted trees with n leaves in which the leaves are labeled by the integers in { 1, . . . , n};and among interior vertices only the root may have degree 2. Associated with each interior vertex ...
详细信息
Let Rn denote the set of rooted trees with n leaves in which the leaves are labeled by the integers in { 1, . . . , n};and among interior vertices only the root may have degree 2. Associated with each interior vertex v in such a tree is the subset, or cluster, of leaf labels in the subtree rooted at v. Cluster {1, . . . , n} is called trivial. Clusters are used in quantitative measures of similarity, dissimilarity and consensus among trees. For any k trees in Rn, the strict consensus tree C(T1, . . . , Tk) is that tree in Rn containing exactly those clusters common to every one of the k trees. Similarity between trees T1 and T2 in Rn is measured by the number S(T1, T2) of nontrivial clusters in both T1 and T2;dissimilarity, by the number D(T1, T2) of clusters in T1 or T2 but not in both. algorithms are known to compute C(T1, . . . , Tk) in O(kn2) time, and S(T1, T2) and D(T1, T2) in O(N2) time. A special representation of the clusters of any tree T in Rn, is proposed that permits testing in constant time whether a given cluster exists in T. algorithms are described that exploit this representation to compute C(T1, . . . , Tk) in O(kn) time, and S(T1, T2) and D(T1, T2) in O(n) time. These algorithms are optimal in a technical sense. They enable well-known indices of consensus between 2 [phylogenetic] trees to be computed in O(n) time. All these results apply as well to comparable problems involving unrooted trees with labeled leaves.
The data transmission in the wireless sensor network is affected by the forwarding randomness of the relay node, resulting in poor security encryption performance. In order to improve the security encryption capabilit...
详细信息
The data transmission in the wireless sensor network is affected by the forwarding randomness of the relay node, resulting in poor security encryption performance. In order to improve the security encryption capability of wireless sensor network, a wireless sensor network security encryption algorithm based on node trust value is proposed. The linear coding design of sensor network transmission data is carried out according to the trust degree and the composite chaotic model is used for recursive analysis of vector quantisation in wireless sensor network encryption process and then the linear block code design of encryption key and decryption key is realised. The regression analysis results of node trust value are used to realise wireless sensor network security encryption. Simulation results show that the security of wireless sensor network encryption used proposed method is better, the distortion of encrypted transmission is lower and the performance is better.
We consider a marketplace where a recommender system provider (the firm) offers incentives to acquire prospective consumers by leveraging information that a market intermediary collects about these consumers. We inves...
详细信息
We consider a marketplace where a recommender system provider (the firm) offers incentives to acquire prospective consumers by leveraging information that a market intermediary collects about these consumers. We investigate a model of consumer acquisition that incorporates several factors affecting acquisition decisions, including the value that a consumer contributes to the recommender system, the cost of participation to the consumer (e.g., privacy loss), and the value that a consumer can derive from the system due to network externality created by existing consumers. Our model is dynamic in nature, where the firm iteratively decides the next acquisition target based on previously realized acquisition outcomes. We propose flexible data-driven procedures to estimate some of the key parameters in the model using consumers' data collected by the market intermediary, for example their historical consumption data or the consumption data of other similar consumers. We also design an algorithm to compute the dynamic acquisition sequence and the corresponding incentives to offer. We conduct simulation-based empirical evaluations on two canonical recommendation tasks: movie recommendation based on numerical ratings and product offer recommendation based on browsing (clicking) behaviors and benchmark our acquisition model with random acquisition sequences with respect to (i) firm utility, (ii) recommender system performance, and (iii) consumer surplus. We find nuanced relationships between the firm's choice of incentive strategies and acquisition outcomes. Specifically, neither a constant strategy (setting the same incentive for all consumers) nor a fully greedy strategy (extracting all cumulative network externality) is optimal on all acquisition outcomes. Under a moderately greedy strategy, where the firm only partially extracts the cumulative network externality from consumers, the dynamic acquisition sequence can outperform random sequences on three acquisition outcomes
Finding the lines and their frequencies in public transportation is the well-studied line planning problem. In this problem, it is common to assume that a line pool consisting of a set of potential lines is given. The...
详细信息
Finding the lines and their frequencies in public transportation is the well-studied line planning problem. In this problem, it is common to assume that a line pool consisting of a set of potential lines is given. The goal is to choose a set of lines from the line pool that is convenient for the passengers and has low costs. The chosen lines then form the line plan to be established by the public transportation company. The line pool hence has a significant impact on the quality of the line plan. The more lines are in the line pool, the more flexible can we choose the resulting line plan and hence increase its quality. It hence would be preferable to allow all possible lines to choose from. However, the resulting instances of the line planning problem become intractable if all lines would be allowed. In this work, we study the effect of line pools for line planning models and propose an algorithm to generate 'good' line pools. To this end, we formally introduce the line pool generation problem and investigate its properties. The line pool generation problem asks for choosing a subset of paths (the line pool) of limited cardinality such that in a next step a good line concept can be constructed based on this subset. We show that this problem is NP-hard. We then discuss how reasonable line pools may be constructed. Our approach allows to construct line pools with different properties and even to engineer the properties of the pools to fit to the objective function of the line planning model to be used later on. Our numerical experiments on close-to real-world data show that the quality of a line plan significantly depends on the underlying line pool, and that it can be influenced by the parameters of our approach.
The accurate recognition of the connection relationship of the substation secondary wiring drawings is a key link in the operation and maintenance of the power system, but the traditional manual recognition method has...
详细信息
The accurate recognition of the connection relationship of the substation secondary wiring drawings is a key link in the operation and maintenance of the power system, but the traditional manual recognition method has the problems of time-consuming, labor-intensive and error-prone. Therefore, this paper proposes an intelligent recognition algorithm for substation secondary wiring drawings based on D-LLE algorithm. The composition of the substation secondary layout diagram is analyzed, and the connection relationship feature image is preprocessed, including smoothing and contrast enhancement, to improve the image quality. D-LLE algorithm (Denoised Locally Linear Embedding) is used to effectively extract the connection features in the drawings, which improves the feature expression ability and recognition accuracy. The improved Canny operator is used to extract the feature edge of the connection relationship, and the feature recognition algorithm is used to realize the intelligent recognition of the connection relationship. The experimental results show that the completeness of connection information extraction of substation secondary wiring drawings obtained by the proposed algorithm is between 98.56% and 99.98%, and the mean absolute error of intelligent recognition drawings connection relationship is always lower than 0.01. It shows that the proposed algorithm can accurately and quickly identify the connection relationship in the substation secondary wiring drawings, significantly improve the recognition efficiency, and has strong robustness and versatility, which can provide strong support for the intelligent operation and maintenance of the power system.
暂无评论