We study hedonic editing principles that aim to find individuals' maximum utility when confronted with multiple outcomes Thaler (Mark Sci 4:199-214, 1985). These principles have been primarily defined and studied ...
详细信息
We study hedonic editing principles that aim to find individuals' maximum utility when confronted with multiple outcomes Thaler (Mark Sci 4:199-214, 1985). These principles have been primarily defined and studied for only two outcomes. However, when dealing with more than two outcomes, the principles become more ambiguous, and some of them may not continue to be valid. To address this, we present an algorithm designed to find the best solution over a partition set of a given vector of n outcomes. We demonstrate that this algorithm identifies the best-majorized vector for up to four outcomes and establish the conditions under which this vector is optimal for n outcomes. Our algorithm is fast since it requires at most n-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n-1$$\end{document} steps. We provide a detailed analysis of the algorithm's performance, characterizing the conditions that guarantee the optimal solution and identifying cases where the algorithm may not converge to the optimal solution. Nevertheless, in these cases, we demonstrate through numerical analysis that it can find the optimal solution with a high accuracy rate in most 'practical' instances, making it a reliable tool for solving hedonic editing problems.
Detecting targets in maritime domain is difficult due to the complex physical mechanism of the sea clutter. A basis pursuit clutter suppression method based on improved tunable Q-factor wavelet transform (TQWT) is pro...
详细信息
Detecting targets in maritime domain is difficult due to the complex physical mechanism of the sea clutter. A basis pursuit clutter suppression method based on improved tunable Q-factor wavelet transform (TQWT) is proposed on the analysis of tunable Q-factor. First, the calculation method for selecting an appropriate tunable Q-factor is given. Second, the TQWT with selected Q-factor is adopted to perform the sparse decomposition for the echo signals to obtain the wavelet coefficients. Then, the 'Basis Pursuit suppressing clutter' method is used to optimise coefficients. Finally, the target signal after sea clutter suppression is recovered by inverse TQWT. The authors also explored the influence of regularisation parameter on the algorithm performance which provides basis for the practical engineering applications. The experimental results on the CSIR public dataset demonstrated the effectiveness of the algorithm.
The main purpose of this paper is to use the students' English learning situation on the Internet to formally evaluate the students' final English performance *** of all,we introduce the concept of formative e...
详细信息
The main purpose of this paper is to use the students' English learning situation on the Internet to formally evaluate the students' final English performance *** of all,we introduce the concept of formative evaluation,and the principles of three kinds of data mining algorithms:naive Bayes classification,C4.5 decision tree,and Logistic regression;then,we use the student online learning data table to achieve the key calculation process of the above algorithm;Further,we use Matlab programming to predict the student's final grade level and compare the performance of each *** shows that,C4.5 performs better than Naive Bayes algorithm on predicting the four classifications of grades(great/good/medium/bad),but the accuracy is not very high;Naive Bayes performs better than the other two algorithms and has higher accuracy on predicting the two classifications of grades(good/bad).Considering the two factors of duration of online learning and number of submissions,the accuracy of the prediction has not been significantly ***,there is no need to consider both in terms of this formative *** assessment has a very important significance in teaching,and plays a key role in motivating students' learning and teacher *** to the forecast results,it can provide some help and guidance for students' follow-up study,so as to improve students' learning effect.
Today's CPU cores usually possess private L1 and L2 cache and share L3 cache with other cores of the chip (die). Private or shared cache could have significant impact to the algorithm performance in parallel imple...
详细信息
ISBN:
(纸本)9789532330731
Today's CPU cores usually possess private L1 and L2 cache and share L3 cache with other cores of the chip (die). Private or shared cache could have significant impact to the algorithm performance in parallel implementation, i.e. using tightly coupled CPU cores with the same last level L3 cache, or loosely coupled CPU cores with private L3 cache per chip. Private cache increases the overall cache size used during the execution. On the other side, shared cache provide implicit prefetching of the data reducing cache misses if all CPU cores of the chip use the same data. In this paper we analyze the matrix vector multiplication (MVM) algorithm performance represented with speed and speedup. We realize sequential and parallel implementation in multi-chip multi-core multiprocessor in order to determine the CPU affinity that provides the best performance for parallel implementation using the same number of tightly coupled CPU cores and their counterparts - loosely coupled CPU cores. The results show that working on loosely coupled cores with private L3 cache is better than working on tightly cores with shared last level L3 cache in the region where the problem size can be stored in the total L3 cache of loosely coupled CPU cores, but in the same time cannot be placed in only one L3 cache of tightly coupled CPU cores.
Central Venous Blood Temperature-based Adaptive algorithms are easy-to-implement, stable, specific, and directly correspond to the overall metabolic rate of the body. Some are already in use in commercial rate-adaptiv...
详细信息
ISBN:
(纸本)9781509037117
Central Venous Blood Temperature-based Adaptive algorithms are easy-to-implement, stable, specific, and directly correspond to the overall metabolic rate of the body. Some are already in use in commercial rate-adaptive cardiac pacemakers. In this paper, numerical simulations corresponding to different situations are performed and compared.
The human iris exhibits random and unique textural patterns that allow for identification with high accuracy. These patterns are evident in near-infrared (NIR) imagery, even for very dark irises. Iris templates are cr...
详细信息
ISBN:
(纸本)9781622762675
The human iris exhibits random and unique textural patterns that allow for identification with high accuracy. These patterns are evident in near-infrared (NIR) imagery, even for very dark irises. Iris templates are created from NIR iris imagery with the Ridge Energy Direction (RED) recognition algorithm and subsequently matched to measure performance. In this paper we investigate the feasibility of algorithm optimization by performing an initial fractional template comparison to eliminate high Hamming distance (HD) score matches followed by a full template re-comparison or iterative higher fractional template comparison on remaining templates. Recognition performance for different fractional template areas is analyzed with a view towards substantial improvement of algorithm identification time performance. The feasibility of identification time reduction by 60% or more is reported both ICE and Bath data sets.
In the past years,digital signature development has rapidly with new products combined with blockchain,named distribute networks,and quantum computers,while there plays a vitally important role in file authorization a...
详细信息
In the past years,digital signature development has rapidly with new products combined with blockchain,named distribute networks,and quantum computers,while there plays a vitally important role in file authorization and *** combination with various new technologies,digital signatures present a vigorous vitality,and new algorithms are widely used in varieties of scenarios including banking,financial services,and insurance(BFSI),education,E-government,healthcare,and the *** this case,there is no paper illustrating a summary of those new digital signature applications,which is the aim of this paper working *** paper indicates the technology details of digital signatures and *** the paper discusses which digital signature algorithms are used in different fields to give an overview of the relationship between algorithms and ***,the paper demonstrates the comparison in the most commonly used digital signature algorithm containing Rivest–Shamir–Adleman(RSA) algorithms,Lamport algorithms,Elliptic Curve Digital Signature algorithm(ECDSA),and Edwards-curve Digital Signature algorithm(EdDSA) algorithms on their difference in performance.
暂无评论