Driven by rapid advancements in the Internet, social networks, graph databases, and bioinformatics, vast amounts of graph data have emerged as a crucial medium for representing complex inter-entity relationships. Howe...
详细信息
ISBN:
(数字)9798331535087
ISBN:
(纸本)9798331535094
Driven by rapid advancements in the Internet, social networks, graph databases, and bioinformatics, vast amounts of graph data have emerged as a crucial medium for representing complex inter-entity relationships. However, traditional exact graph matching methods typically encounter significant challenges including high computational costs and suboptimal matching performance when addressing practical issues such as noise, missing data, and local structural deformations. To overcome these challenges, this study introduces an approximate subgraph matching algorithm that leverages dense substructure partitioning coupled with dual-index construction. By partitioning large graphs locally and efficiently pre-selecting candidate nodes, the proposed algorithm markedly reduces computational complexity while preserving high matching accuracy. Experimental results on the Protein, DBLP, and YAGO datasets show that the proposed method performs well in terms of accuracy and computational efficiency while exhibiting robust performance in noisy environments.
This paper describes the development of an algorithm for converting segmentation masks derived from neural networks into ordered sets of point coordinates representing road markings for highly automated vehicles (HAVs...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
This paper describes the development of an algorithm for converting segmentation masks derived from neural networks into ordered sets of point coordinates representing road markings for highly automated vehicles (HAVs). Several methods are considered, including the nearest neighbor method, polynomial approximation, Hough transform, and parallel contouring. Performance tests and complexity analyses are performed for each method. The parallel contour method with dynamic search for opposite points was the most effective, demonstrating linear complexity and high accuracy in approximating road marking contours. This solution ensures efficient processing of large real-time datasets, critical for HAV navigation. The study integrates the algorithm into a unified system, combining segmentation with mask-to-line conversion, enhancing autonomous driving precision.
Provable privacy typically requires involved analysis and is often associated with unacceptable accuracy loss. While many empirical verification or approximation methods, such as Membership Inference Attacks (MIA) and...
详细信息
ISBN:
(数字)9798331522360
ISBN:
(纸本)9798331522377
Provable privacy typically requires involved analysis and is often associated with unacceptable accuracy loss. While many empirical verification or approximation methods, such as Membership Inference Attacks (MIA) and Differential Privacy Auditing (DPA), have been proposed, these do not offer rigorous privacy guarantees. In this paper, we apply recently-proposed Probably Approximately Correct (PAC) Privacy to give formal, mechanized, simulation-based proofs for a range of practical, black-box algorithms: K-Means, Support Vector Machines (SVM), Principal Component Analysis (PCA) and Random Forests. To provide these proofs, we present a new simulation algorithm that efficiently determines anisotropic noise perturbation required for any given level of privacy. We provide a proof of correctness for this algorithm and demonstrate that anisotropic noise has substantive benefits over isotropic noise. Stable algorithms are easier to privatize, and we demonstrate privacy amplification resulting from introducing regularization in these algorithms; meaningful privacy guarantees are obtained with small losses in accuracy. We propose new techniques in order to reduce instability in algorithmic output and convert intractable geometric stability verification into efficient deterministic stability verification. Thorough experiments are included, and we validate our provable adversarial inference hardness against state-of-the-art empirical attacks.
We propose sublinear algorithms for probabilistic testing of the discrete and continuous Fréchet distance—a standard similarity measure for curves. We assume the algorithm is given access to the input curves via...
详细信息
Microphone arrays (MA) techniques are widely applied into numerous acoustic devices for speech enhancement. Because of the spatial information, MA beamforming has the capacity of processing multiple desired or undesir...
详细信息
ISBN:
(数字)9798331532635
ISBN:
(纸本)9798331532642
Microphone arrays (MA) techniques are widely applied into numerous acoustic devices for speech enhancement. Because of the spatial information, MA beamforming has the capacity of processing multiple desired or undesired sources in a complex and annoying environment, approximately localizing sound. Nowadays, various applications that are arising in the field of teleconference systems, hands-free mobile phones, automatic speech recognition, smart-home, surveillance equipment present new challenges for speech enhancement algorithms. Minimum Variance Distortionless Response (MVDR) beamformer is the most effective algorithm for saving the original clean speech data, eliminating the unwanted background noise without speech distortion. Because of the different microphone sensitivities, the error of sampling rate, the inaccurate estimation of preferred incident angle of useful signal, the imprecise MA distribution or designed MA geometry, the MVDR beamformer's performance significantly degraded. In this article, the author considered the problem of separating sound speech in the realistic consecutive conversation between two speakers. The authors proposed an additive method, which enhances the MVDR beamformer's evaluation in extracting each individual. The promising results obtained have confirmed the effectiveness of the author's proposed method in real-life situations. The author's illustrated approach can be integrated into a multi-channel signal processing system for solving several complex problems.
We present SimultaneousGreedys, a deterministic algorithm for constrained submodular maximization. At a high level, the algorithm maintains ℓ solutions and greedily updates them in a simultaneous fashion. Simultaneous...
详细信息
We present SimultaneousGreedys, a deterministic algorithm for constrained submodular maximization. At a high level, the algorithm maintains ℓ solutions and greedily updates them in a simultaneous fashion. SimultaneousGreedys achieves the tightest known approximation guarantees for both k-extendible systems and the more general k-systems, which are $(k+1)^2/k = k + \mathcal{O}(1)$ and $(1 + \sqrt{k+2})^2 = k + \mathcal{O}(\sqrt{k})$, respectively. We also improve the analysis of RepeatedGreedy, showing that it achieves an approximation ratio of k+O(√k) for k-systems when allowed to run for O(√k) iterations, an improvement in both the runtime and approximation over previous analyses. We demonstrate that both algorithms may be modified to run in nearly linear time with an arbitrarily small loss in the *** SimultaneousGreedys and RepeatedGreedy are flexible enough to incorporate the intersection of m additional knapsack constraints, while retaining similar approximation guarantees: both algorithms yield an approximation guarantee of roughly $k + 2m + \mathcal{O}(\sqrt{k+m})$ for k-systems and SimultaneousGreedys enjoys an improved approximation guarantee of k + 2m + O(√m) for k-extendible systems. To complement our algorithmic contributions, we prove that no algorithm making polynomially many oracle queries can achieve an approximation better than k + 1/2 - ε. We also present ***, a Julia package which implements these algorithms. Finally, we test these algorithms on real datasets.
This paper addresses the problem of Joint approximate diagonalization (JAD) of a set of given matrices and proposes a new efficient iterative algorithm for JAD that based on the rank-reducing structure of House-holder...
详细信息
This paper addresses the problem of Joint approximate diagonalization (JAD) of a set of given matrices and proposes a new efficient iterative algorithm for JAD that based on the rank-reducing structure of House-holder transform. The proposed algorithm, named as HJD, completes the simultaneous diagonalization of the target matrices by successive Householder transform from the point of view of matrix power concentration. Generally, the power of the elements below diagonal element was concentrated to the diagonal element by the rank-reducing Householder transform. Such a particular structure of Householder transform at each iteration prevents the divergence of matrix power. The diagonalization matrix was calculated by the product of all Householder matrices. By applying our algorithm to blind source separation, we demonstrate the efficiency and improvement of the proposed algorithm in estimating the separation matrix.
We propose in this paper two adapt-then-combine (ATC) distributed particle filters for cooperative estimation of 3D orientations. The first algorithm represents rotations as elements of the Special Orthogonal Group an...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
We propose in this paper two adapt-then-combine (ATC) distributed particle filters for cooperative estimation of 3D orientations. The first algorithm represents rotations as elements of the Special Orthogonal Group and builds Gaussian parametric approximations on a Lie Algebra to fuse posterior probability densities. The second algorithm, in turn, represents the orientations as unit-norm quaternions and resorts to directional statistics, fusing von Mises-Fisher parametric approximations. The proposed algorithms performances are then evaluated via numerical simulations.
Coexistence of device-to-device (D2D) communication and cell-free massive multiple-input multiple-output (CF-mMIM O) is a promising technology for future wireless systems. It is expected to enhance the spectral effici...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
Coexistence of device-to-device (D2D) communication and cell-free massive multiple-input multiple-output (CF-mMIM O) is a promising technology for future wireless systems. It is expected to enhance the spectral efficiency (SE), as well as reduce the transmission delay for user equipments. In this paper, we propose a joint access point (AP) selection and power control scheme to maximize the sum SE, oppositing to the existing paper which performs the power control based on the AP selection and the AP selection is performed by the heuristic algorithm, leading to the performance is limited. To address the non-convex optimization problem, the original problem is decomposed into two subproblems: AP selection and power control, both are all resolved by sequential convex approximation (SCA) method. Furthermore, the penalty method is applied in the AP selection, alleviating the narrowing of feasible region brought by the SCA which results in the feasible solution of the original problem unattainable. At the same time, the convergence prove of corresponding algorithm is presented. Numerical results demonstrate the superior performance compared to the existing scheme in terms of improving the performance of the system.
This paper considers the design and optimization of decentralized coded caching under heterogeneous file popularity. We propose a decentralized nested coded caching scheme (D-NCCS) that implements an improved nested c...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
This paper considers the design and optimization of decentralized coded caching under heterogeneous file popularity. We propose a decentralized nested coded caching scheme (D-NCCS) that implements an improved nested coded delivery strategy to avoid using zero-padding, a common sub-optimal approach for simplifying the coded delivery under heterogeneous file popularity. We formulate a joint optimization problem to jointly optimize the cache placement and nested coded delivery strategies of the D-NCCS, and develop a successive approximation algorithm to solve the problem. Numerical results demonstrate the close to optimal performance of the optimized D-NCCS.
暂无评论