We study a new optimization problem that minimizes the ratio of two monotone k-submodular functions. The problem has applications in sensor placement, influence maximization, and feature selection among many others wh...
详细信息
ISBN:
(纸本)9783030676643;9783030676636
We study a new optimization problem that minimizes the ratio of two monotone k-submodular functions. The problem has applications in sensor placement, influence maximization, and feature selection among many others where one wishes to make a tradeoff between two objectives, measured as a ratio of two functions (e.g., solution cost vs. quality). We develop three greedy based algorithms for the problem, with approximation ratios that depend on the curvatures and/or the values of the functions. We apply our algorithms to a sensor placement problem where one aims to install k types of sensors, while minimizing the ratio between cost and uncertainty of sensor measurements, as well as to an influence maximization problem where one seeks to advertise k products to minimize the ratio between advertisement cost and expected number of influenced users. Our experimental results demonstrate the effectiveness of minimizing the respective ratios and the runtime efficiency of our algorithms. Finally, we discuss various extensions of our problems.
The extractive text summarization (ETS) method for finding the salient information from a text automatically uses the exact sentences from the source text. In this article, we answer the question of what quality of a ...
详细信息
The extractive text summarization (ETS) method for finding the salient information from a text automatically uses the exact sentences from the source text. In this article, we answer the question of what quality of a summary we can achieve with ETS methods? To maximize the ROUGE-1 score, we used five approaches: (1) adapted reduced variable neighborhood search (RVNS), (2) greedy algorithm, (3) VNS initialized by greedy algorithm results, (4) genetic algorithm, and (5) genetic algorithm initialized by the greedy algorithm results. Furthermore, we ran experiments on articles from the arXive dataset. As a result, we found 0.59 and 0.25 scores for ROUGE-1 and ROUGE-2, respectively achievable by the approach, where the genetic algorithm initialized by the greedy algorithm results, which happens to yield the best results out of the tested approaches. Moreover, those scores appear to be higher than scores obtained by the current state-of-the-art text summarization models: the best score in the literature for ROUGE-1 on the same data set is 0.46. Therefore, we have room for the development of ETS methods, which are now undeservedly forgotten.
A Radial Basis Function (RBF) mesh deformation is implemented and coupled with the discrete adjoint framework within the open-source toolkit SU2. The RBF allows to handle more complex geometry than the current elastic...
详细信息
ISBN:
(数字)9781624106101
ISBN:
(纸本)9781624106101
A Radial Basis Function (RBF) mesh deformation is implemented and coupled with the discrete adjoint framework within the open-source toolkit SU2. The RBF allows to handle more complex geometry than the current elastic deformation approach, while enabling large deformations to expand the design space. Data reduction schemes including multilevel greedy algorithms are used to improve the efficiency of RBF mesh deformation on large data sets. Numerical experiments show a significant reduction of memory usage over the linear elasticity analogy both for two-dimensional cases and for large, three-dimensional problems. Additionally, the mesh deformation process is differentiated by Automatic Differentiation within the discrete adjoint approach, resulting in method-dependent surface sensitivity, thus allowing the Sequential Least Squares Programming optimizer to converge to a new local minimum by modifying the geometrical shape towards the final design.
This paper help CFA design a drones use system that determine the number and the location of SSA drones and Radio Repeater drones to facilitate wildfifires *** establish a model to determine the optimal combination of...
详细信息
This paper help CFA design a drones use system that determine the number and the location of SSA drones and Radio Repeater drones to facilitate wildfifires *** establish a model to determine the optimal combination of SSA drones and Radio Repeater *** number of Radio Repeater drones needs to be calculated based on the distance from the EOC to the center of the fire *** the number of SSA drones,we consider the factors of capability,safety,topography and so *** the genetic algorithm,we determine the shortest path of each SSA *** data sigmoid normalization and determining the weight through coefficient of variation,we build a comprehensive capability and safety evaluation index to choose the optimal number of SSA ***,we use DUDC Model to determine the location of hovering radio-repeater *** determine the straight line where the Radio Repeater drones are located,and then use the straight line obtained as the abscissa,uniformly determine the coordinate axis direction and use greedy algorithm to solve where should Radio Repeater drones ***,we summarize the model and explain the strengths of the model.
The acquisition of point cloud data from a space frame using terrestrial laser scanning is usually affected by many occluding components and site conditions and therefore needs to achieve optimal priori planning, whic...
详细信息
The acquisition of point cloud data from a space frame using terrestrial laser scanning is usually affected by many occluding components and site conditions and therefore needs to achieve optimal priori planning, which is handled as the planning for scanning (P4S) problem. This paper describes a three-dimensional model-based P4S approach for space frame structures, where a space modeling solution is employed to simulate the scanning target and environment. The P4S problem modeling is used to define the visibility analysis and constraints. Lastly, a two-phase optimization is proposed to solve the P4S problem and compared with a weighted greedy algorithm. Experiments were conducted on a full-scale space frame to validate the proposed approach.
Traveling salesman problem, with extensive potential applications in industries of all sorts, has been studied for decades. Although there are massive solutions put forward, the most efficient and exact way has never ...
详细信息
ISBN:
(纸本)9781665427098
Traveling salesman problem, with extensive potential applications in industries of all sorts, has been studied for decades. Although there are massive solutions put forward, the most efficient and exact way has never been widely acknowledged since this problem is typically NP-hard. We selected three types of most commonly used algorithms to solve this problem: greedy algorithm, Ant Colony algorithm and Simulated Annealing algorithm. With data sets given in TSPLIB, we computed and compared these algorithms in both the shortest distance and the time cost. Based on the statistics obtained from experiments, it can be found that greedy algorithm runs the fastest with a sacrifice of accuracy, whereas Simulated Annealing algorithm searches out the shortest path in a relatively small group of cities and Ant Colony algorithm performs even better when the points increase.
A matching M in a graph G is acyclic if the subgraph of G induced by the vertices that are incident to an edge in M is a forest. Even restricted to graphs of bounded maximum degree, the maximum acyclic matching proble...
详细信息
ISBN:
(纸本)9783030581503;9783030581497
A matching M in a graph G is acyclic if the subgraph of G induced by the vertices that are incident to an edge in M is a forest. Even restricted to graphs of bounded maximum degree, the maximum acyclic matching problem is hard. We contribute efficient approximation algorithms for this problem, based on greedy and local search strategies, that have performance guarantees involving the maximum degree of the input graphs.
Automl,a rapidly growing field which is aiming to apply the machine to solve problems that human can't easily deal with. This includes tasks such as feature selection,model selection, and hyperparameter tuning. On...
详细信息
Automl,a rapidly growing field which is aiming to apply the machine to solve problems that human can't easily deal with. This includes tasks such as feature selection,model selection, and hyperparameter tuning. One of the many advantages about Auto Ml is that it can greatly shorten the cost of researchs and resources cost by applying machine learning to a problem. This makes it accessible to a wider range of users, including those without a background in computer science or *** spite of some advantages of AutoML,many challenges are waiting to be addressed. The main challenge is that it is often challenging to ensure that the models generated by AutoML are of high quality and generalize well to new data. Another challenge is that AutoML can be computationally expensive, which can make it infeasible for some problems. Overall, AutoML has the potential to revolutionize the way we apply machine learning to real-world problems, but it is important to be aware of its limitations and challenges.
We study the problem of noisy information propagation in networks, where a small number of sources send messages across the network and agents use Bayesian updates to make inferences about the state of the world from ...
详细信息
ISBN:
(纸本)9781450394321
We study the problem of noisy information propagation in networks, where a small number of sources send messages across the network and agents use Bayesian updates to make inferences about the state of the world from the received messages. We provide upper bounds on the total number of sources necessary for learning on a given network and refine the bound in the case of small-world networks. We then extend the model to include an adversarial attacker, who can corrupt some of the information sources. We find that there is an optimal greedy attacking strategy in the case of a single learner, while the multi-learner case is not always solved optimally using greedy approaches. However, despite the influence function not being submodular, we show that the greedy algorithm performs well in practice. We also show that much simpler heuristics, which only look at centrality measures, can also provide a good basis to calculate successful attacking strategies. Finally we analyse the loss of optimality in the case when the attacker has incomplete information about the network and has to estimate the influence of source corruption heuristically. We use real-world social networks, as well as random network models, to empirically evaluate the effectiveness of attacking strategies and suggest a variety of measures to counteract them.
The beamforming (BF) algorithm is widely used in sound source recognition due to its superior perfor-mance, but its main lobe is wide, side lobes are high, and its running speed is slow. Therefore, a method based on t...
详细信息
The beamforming (BF) algorithm is widely used in sound source recognition due to its superior perfor-mance, but its main lobe is wide, side lobes are high, and its running speed is slow. Therefore, a method based on the compressed sensing beamforming method is proposed. The sound source measurement model is established, the compressed sensing reconstruction matrix is applied to the beamforming method, and propose a compressed sensing beamforming sound source recognition method. The sound source recognition performance of orthogonal matching pursuit (OMP), generalized orthogonal matching pursuit (gOMP), and regularized orthogonal matching pursuit (ROMP) is compared and analyzed through MATLAB simulation, and the OMP algorithm is selected to combine with the beamforming method. Further study the OMP-BF way and compare and analyze the recognition accuracy and running time of OMP-BF with functional beamforming (F-BF) and L1 minimum norm method beamforming (L1-BF). The results show that the OMP-BF method can accurately identify the sound source location, and the run-ning time is much lower than L1-BF and F-BF. Finally, through experiments, the effectiveness of the algo-rithm is verified. (c) 2022 Elsevier Ltd. All rights reserved.
暂无评论