Dynamic Time Warping (DTW) is a widely used similarity measure for comparing strings that encode time series data, with applications to areas including bioinformatics, signature verification, and speech recognition. T...
详细信息
We investigate the problem of preselecting a subset of buyers (also called agents) participating in a market so as to optimize the performance of stable outcomes. We consider four scenarios arising from the combinatio...
详细信息
As a crucial and widely researched application in social networks, social advertising refers to selecting seed users for several advertisers to propagate their advertisements in the network via a information cascade e...
详细信息
We study the art gallery problem for opposing half guards: guards that can either see to their left or to their right only. We present art gallery theorems, show that the problem is NP-hard in monotone polygons, prese...
详细信息
Motivated by practical applications, recent works have considered maximization of sums of a submodular function g and a linear function . Almost all such works, to date, studied only the special case of this problem i...
详细信息
In quantum swarm intelligence algorithms, the tunneling effect of the particles is determined by the potential energy acting on the particles. The tunneling effect of the particles affects the global search ability an...
详细信息
In quantum swarm intelligence algorithms, the tunneling effect of the particles is determined by the potential energy acting on the particles. The tunneling effect of the particles affects the global search ability and convergence speed of the algorithm. Quantum algorithms with a single potential energy are prone to premature convergence under certain complex test functions. In this paper, we propose a multiscale quantum gradual approximation algorithm (MQGAA), which simply uses different approximation strategies to obtain different potential energy functions, to solve the premature problem of the optimization algorithm. In the MQGAA, particles undergo a transition from an unconstrained state to a constrained state at each scale. To demonstrate the effectiveness of the proposed algorithm, experiments are carried out with several common and effective stochastic algorithms on N-dimensional double-well potential functions and classical benchmark functions. We also use the Wilcoxon rank test to detect the performance of MQGAA. The experimental results show that the algorithm using a step-by-step approximation strategy achieves a better optimization performance on some complex test functions.
Recently, Guruganesh et al. [1] proposed the Fractionally Subadditive Network Design (f-SAND) problem. In this problem, we are given a weighted graph G with a special root vertex r together with k subsets of its verti...
详细信息
Recently, Guruganesh et al. [1] proposed the Fractionally Subadditive Network Design (f-SAND) problem. In this problem, we are given a weighted graph G with a special root vertex r together with k subsets of its vertices called scenarios. We need to assign capacities to the edges of G so that for every scenario, the assigned capacities support a unit flow from the root to all vertices in the scenario, simultaneously. The goal is to minimize the total cost of the solution. f-SAND is a fairly natural problem and it generalizes several well -studied problems, such as the Steiner Tree problem. The added interest to this problem stems from the fact that standard tools used for approximating network design problems do not seem to apply to f-SAND. Despite this, Guruganesh et al. conjecture the existence of an algorithm with an approximation ratio bounded by a constant, i.e. independent of k. They make a step towards this goal by giving a 3 -approximation algorithm for k = 2. In this paper, we present an algorithm similar to that of [1], together with an analysis that not only yields an improved approximation ratio of 4, but is also significantly simpler. We also generalize it to arbitrary k, giving a 4k-approximation. On the negative side, we argue that without additional insights, the techniques used are not likely to produce a constant factor approximation algorithm. (C) 2019 Elsevier B.V. All rights reserved.
In this study, we consider a new customer choice model which we call the single transition choice model. In this model, there is a universe of products and customers arrive at each product with a certain probability. ...
详细信息
In this study, we consider a new customer choice model which we call the single transition choice model. In this model, there is a universe of products and customers arrive at each product with a certain probability. If the arrived product is unavailable, then the seller can recommend a subset of available products and the customer will purchase one of the recommended products or choose not to purchase with certain transition probabilities. The distinguishing features of the model are that the seller can control which products to recommend depending on the arrived product, and each customer either purchases a product or leaves the market after one transition. We study the assortment optimization problem under this model. Particularly, we show that it is NP-Hard even if the customer can transition from each product to at most two products. Despite the computational complexity, we provide polynomial time algorithms or approximation algorithms for several special cases, such as when the customer can only transition from each product to at most a given number of products and the size of each recommended set is bounded. Our approximation algorithms are developed by invoking the submodularity arguments, or connecting the problem with maximum constraint satisfaction problem and applying randomized rounding techniques to its semidefinite programming relaxation. We also provide a tight worst-case performance bound for revenue-ordered assortments. In addition, we propose a compact mixed-integer program formulation, which is efficient for moderate size problems. Finally, we conduct numerical experiments to demonstrate the effectiveness of the proposed algorithms.
This letter proposes a robust beamforming (BF) scheme to enhance physical layer security (PLS) of the downlink of a multibeam satellite system in the presence of either uncoordinated or coordinated eavesdroppers (Eves...
详细信息
This letter proposes a robust beamforming (BF) scheme to enhance physical layer security (PLS) of the downlink of a multibeam satellite system in the presence of either uncoordinated or coordinated eavesdroppers (Eves). Specifically, with knowing only the approximate locations of the Eves, we aim at maximizing the worst-case achievable secrecy rate (ASR) of the legitimate user (LU), subject to the constraints of per-antenna transmit power and quality of service (QoS) requirement of the LU. Since the optimization problem is non-convex, we first adopt the discretization method to deal with the unknown regions of the Eves and then exploit the log-sum-exp function to approximate the objective function. Afterwards, a BF method joint alternating direction method of multipliers (ADMM) with Dinkelbach iteration is presented to solve this non-convex problem. Finally, simulation results verify that our robust BF algorithm can effectively improve the security of multibeam satellite systems.
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are ...
详细信息
The omega-k synthetic aperture radar (SAR) algorithm is a computationally efficient algorithm for near-field 3-D monostatic SAR imaging in nondestructive testing (NDT) applications. However, bistatic measurements are preferred in order to obtain high dynamic range, in particular when real-time imaging arrays are used. This article investigates the image distortion caused by using an equivalent monostatic imaging algorithm for bistatic measurements. Simulations and measurements at millimeter-wave frequencies in the Ka-band (26.5-40 GHz) are used to investigate the resultant image distortion. Furthermore, the image distortion is quantified through the root-mean-square (rms) error, which is calculated as a function of the bistatic transmitterreceiver separation distance, range, and noise power. Simulations and measurements are conducted for imaging using the raster scanning of a pair of antennas and for nonuniform imaging arrays. In addition, an approximate method for phase compensation is introduced to improve the image error from the monostatic approximation of bistatic measurement.
暂无评论