7,234 results on '"Constraint (information theory)"'
Search Results
2. Non-bias Allocation of Export Capacity for Distribution Network Planning with High Distributed Energy Resource Integration
- Author
-
Barry Hayes and Juan Jose Cuenca
- Subjects
Mathematical optimization ,Power distribution planning ,Search methods ,Distribution networks ,Power generation planning ,Computer science ,Energy Engineering and Power Technology ,Distribution (economics) ,Distribution system ,Transformers ,Resource integration ,Electrical and Electronic Engineering ,Energy resources ,business.industry ,Resource management ,Circuit faults ,Grid ,Reliability ,Constraint (information theory) ,Planning ,Distributed generation ,Power distribution reliability ,Security ,State (computer science) ,business - Abstract
A novel distributed energy resources (DER) allocation method focused on grid constraints that avoids topological bias is proposed for distribution networks. A technology-agnostic approach is used, where a non-bias allocation of export capacity (NAEC) not specific to generation type is calculated. Moreover, the proposed NAEC is extended from an export capacity into a hosting capacity (HC) using a statistical approach. The methods are tested using the IEEE 33-bus distribution system, and two typical Irish distribution feeders -one urban, one rural- as case studies. Using a high-resolution year-long quasi-static time series simulation (QSTS) and three different generation profiles, the proposed NAEC method is validated against current practices and state of the art allocation methods in terms of active balancing, security of supply, interactions between users, operational concerns, and fairness. Results show that an equivalent or higher level of DER penetration is achieved using the proposed methodology. There are no additional constraint violations using the NAEC methodology, moreover, time slots with violations are reduced, improving security of supply. Furthermore, results suggest that avoiding topological bias makes the network accessible for more users, and prioritises self-consumption.
- Published
- 2022
3. Exploring the Theoretical Limit of Voltage Transfer Ratio of Matrix Converter Under the Constraint of Rotating Vector
- Author
-
Jiayi Tang, Wenwu Xie, Bingnan Ji, Xin Fu, and Weitao Deng
- Subjects
Physics ,Voltage transfer ratio ,rotating vector ,General Computer Science ,Phase angle ,General Engineering ,Interval (mathematics) ,Topology ,TK1-9971 ,Constraint (information theory) ,permanent magnet synchronous motor ,Limit (music) ,Range (statistics) ,General Materials Science ,matrix converter ,Minification ,Electrical engineering. Electronics. Nuclear engineering ,Low voltage ,Voltage - Abstract
The rotating vectors of a matrix converter are uniquely featured by producing zero common-mode voltage, and control methods using them have the advantage of inherently achieving common-mode voltage minimization. However, the existing knowledge of their low voltage transfer ratio (VTR) has made it difficult for rotating vectors to get practical applications. This paper derives the theoretical limit of the VTR under the constraint of rotating vector. Firstly, the principle of selecting the voltage vector for maximum VTR is analyzed. Then the range of matrix converter input voltage phase angle is divided into intervals, and the phase angle of the selected rotating vector within each interval is determined. Finally, through integral and average calculations, the maximum VTR, 9/ $\pi ^{2}$ , is obtained, which is more than 80% higher than that of the linear modulation limit. Simulation and experiments are carried out to verify the correctness of the conclusion.
- Published
- 2021
4. Correlation Tracking via Spatial-Temporal Constraints and Structured Sparse Regularization
- Author
-
Shouyu Zang, Binbin Tu, and Dan Tian
- Subjects
0209 industrial biotechnology ,General Computer Science ,Computer science ,structured sparse regularization ,Boundary (topology) ,02 engineering and technology ,Object tracking ,Grayscale ,020901 industrial engineering & automation ,Discriminative model ,correlation filter ,Histogram ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,spatial-temporal constraints ,business.industry ,Orientation (computer vision) ,General Engineering ,deep feature ,Pattern recognition ,TK1-9971 ,Constraint (information theory) ,Filter design ,Eye tracking ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical engineering. Electronics. Nuclear engineering ,business - Abstract
Discriminative correlation filter (DCF) has achieved promising performance in visual tracking for its high efficiency and high accuracy. However, DCF trackers usually suffer from some challenges, such as boundary effects and appearance changes. In this paper, we propose a novel correlation tracking method via spatial-temporal constraints and structured sparse regularization. Firstly, we introduce the background-aware selection strategy to extract real negative examples, and penalize the filter coefficients close to the boundary locations for spatial protection, both of which can alleviate the boundary effects. Secondly, we restrict the filters with structured sparse regularization to handle the local appearance changes, and exploit temporal consistent constraint on the filters to address the global appearance changes. Finally, we employ the alternative direction method of multipliers to optimize our correlation tracking model. In our optimization framework, we combine grayscale, color names, histogram of orientation gradient with deep features for appearance learning to improve the discrimination. Meanwhile, we penalize spatial constraint and structured sparse regularization alternatively based on occlusion detection to enhance processing efficiency. The qualitative and quantitative experiments are conducted on the OTB dataset. Experimental results demonstrate that the proposed tracker has better performance than other state-of-the-art trackers.
- Published
- 2021
5. Contextual Prior Constrained Deep Networks for Mitosis Detection With Point Annotations
- Author
-
Xinggang Wang, Jiangxiao Han, and Wenyu Liu
- Subjects
Backbone network ,Ground truth ,General Computer Science ,Pixel ,Computer science ,business.industry ,Deep learning ,Feature extraction ,General Engineering ,spatial area constraint ,Pattern recognition ,Image segmentation ,TK1-9971 ,Constraint (information theory) ,contextual prior constraint mechanism ,multiple instance learning ,image semantic segmentation ,General Materials Science ,Segmentation ,Artificial intelligence ,Electrical engineering. Electronics. Nuclear engineering ,business ,Mitosis detection - Abstract
We study the problem of training an accurate deep learning mitosis detection model with only point annotations. To address this challenging label-efficient deep learning problem, we propose a novel contextual prior constraint mechanism and spatial area constrained loss to generate the reference ground truth for segmentation and to restrain incorrectly predicted pixels, respectively. The spatial area constraint mechanism is not strictly cast at the pixel-level and restrains the mitosis and non-mitosis areas as positive/negative bags under the framework of multiple instance learning. The experimental results show that our contextual prior mechanism with PSPNet as the segmentation baseline achieves state-of-the-art performance with an F-score of 69.92%, 56.22%, and 85.29% on the mitosis detection task of AMIDA 2013, ICPR MITOSIS 2014, and point-annotated ICPR MITOSIS 2012, respectively. Especially, using our spatial area constraint mechanism and reference ground truth, the detection result on point-annotated ICPR MITOSIS 2012 even outperforms the result using the same backbone network with pixel-level annotations. The experimental results demonstrate the advancement and effectiveness of our proposed method. In addition, they indicate that our work can definitely improve the performance of mitosis detection on point-annotated datasets and be extended to other medical image analysis tasks with limited annotations.
- Published
- 2021
6. An Artificial-Noise-Based Approach for the Secrecy Rate Maximization of MISO VLC Wiretap Channel With Multi-Eves
- Author
-
Ge Shi, Wenjie Zhang, Yong Li, Wei Cheng, and Xiang Gao
- Subjects
Beamforming ,Semidefinite programming ,Mathematical optimization ,secrecy rate maximization ,visible light communication ,General Computer Science ,Computer science ,General Engineering ,physical layer security ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Maximization ,Covariance ,TK1-9971 ,Constraint (information theory) ,Artificial noise ,0203 mechanical engineering ,Transmission (telecommunications) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Communication channel - Abstract
In this paper, we consider improving the secure performance of multiple-input single-output visible light communication channel in the presence of multiple eavesdroppers with multiple photodiodes. Our goal is to design an optimal artificial-noise (AN) aided transmission strategy to maximize the achievable secrecy rate subject to both sum power constraint and peak amplitude constraint. We consider a joint optimization of the transmit covariance and AN covariance for the non-convex secrecy rate maximization (SRM) problem. In order to solve it, the SRM problem is transformed into a series of single-variable semidefinite programming (SDP) problems without losing any optimality, and a one-dimensional search based algorithm is proposed to handle the converted problem, with polynomial complexity. By exploiting Karush-Kuhn-Tucker conditions of the problem, beamforming is found to be optimal for the confidential information transmission. Simulation results show the superior performance of the proposed AN-aided method compared with two other AN-aided methods and no AN-aided method.
- Published
- 2021
7. Applying InSAR and GNSS Data to Obtain 3-D Surface Deformations Based on Iterated Almost Unbiased Estimation and Laplacian Smoothness Constraint
- Author
-
Guang-Cai Sun, Qi Chen, Xiaolei Lv, Panfeng Ji, and Jingchuan Yao
- Subjects
Atmospheric Science ,010504 meteorology & atmospheric sciences ,Computer science ,Geophysics. Cosmic physics ,0211 other engineering and technologies ,variance component estimation (VCE) ,02 engineering and technology ,Global navigation satellite system (GNSS) ,01 natural sciences ,Laplacian smoothness constraint (LSC) ,Approximation error ,iterated almost unbiased estimation (IAUE) ,Interferometric synthetic aperture radar ,Computers in Earth Sciences ,TC1501-1800 ,021101 geological & geomatics engineering ,0105 earth and related environmental sciences ,Second derivative ,Smoothness ,QC801-809 ,3-D ,Constraint (information theory) ,Ocean engineering ,Iterated function ,GNSS applications ,Algorithm ,interferometric synthetic aperture radar (InSAR) ,Interpolation - Abstract
Global navigation satellite system (GNSS) and interferometric synthetic aperture radar (InSAR) data are integrated to extract the 3-D surface deformations, which are of great significance for studying geological hazards. In this study, two major problems are focused on integration. For one thing, we propose an iterated almost unbiased estimation (IAUE) method to estimate the variance components of GNSS and InSAR for the case where the estimation of variance components of multisource data by traditional variance component estimation methods may be negative and inaccurate. For another, considering that heterogeneous data errors may lead to unstable 3-D solutions, we propose adding the Laplacian smoothness constraint (LSC) to the function model, which can smooth the solutions by minimizing the second derivative of the displacements. These two methods are abbreviated as IAUE-LSC. In the simulation experiment, the performance of traditional Helmert variance component estimation is first compared with IAUE. IAUE can not only converge more quickly, but also avoid negative variances. Furthermore, we find that the excessively large relative error ratio between GNSS and InSAR is an essential factor leading to the instability of the 3-D solutions. The IAUE-LSC method is immune to this instability and can obtain more stable results. In addition, the 2018 Hawaii case demonstrates that IAUE achieves improvements of 2.58, 2.77, and 7.69 cm in the east, north, and up directions relative to the traditional weighted least-squares method, while the combined IAUE-LSC achieves improvements of 2.29, 0.32, and 1.68 cm compared to the IAUE alone.
- Published
- 2021
8. Synchronization of Variable-Length Constrained Sequence Codes
- Author
-
Ivan J. Fair and Congzhe Cao
- Subjects
construction ,General Computer Science ,Computer science ,Code word ,02 engineering and technology ,020210 optoelectronics & photonics ,Encoding (memory) ,Synchronization (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Electrical and Electronic Engineering ,error propagation ,Sequence ,Finite-state machine ,Constrained sequence codes ,variable-length codes ,General Engineering ,020206 networking & telecommunications ,Construct (python library) ,capacity-approaching codes ,Constraint (information theory) ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,synchronization ,lcsh:TK1-9971 ,Decoding methods - Abstract
We study the ability of recently developed variable-length constrained sequence codes to determine codeword boundaries in the received sequence upon initial receipt of the sequence and if errors in the received sequence cause synchronization to be lost. We first investigate construction of these codes based on the finite state machine description of a given constraint, and develop new construction criteria to achieve high synchronization probabilities. Given these criteria, we propose a guided partial extension algorithm to construct variable-length constrained sequence codes with high synchronization probabilities. With this algorithm we construct new codes and determine the number of codewords and coded bits that are needed to recover synchronization once synchronization is lost. We consider a large variety of constraints including the runlength limited (RLL) constraint, the DC-free constraint, the Pearson constraint and constraints for inter-cell interference mitigation in flash memories. Simulation results show that the codes we construct exhibit excellent synchronization properties, often resynchronizing within a few bits.
- Published
- 2021
9. A Two-Step Method for Remote Sensing Images Registration Based on Local and Global Constraints
- Author
-
Zhenglei Xiao, Fei Xie, Yang Zhang, Wenping Ma, Shaodi Liu, Yue Wu, Qiguang Miao, and Maoguo Gong
- Subjects
Atmospheric Science ,Computer science ,Geophysics. Cosmic physics ,0211 other engineering and technologies ,Image registration ,02 engineering and technology ,Image (mathematics) ,Set (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,global information ,scale-invariant feature transform (SIFT) ,Point (geometry) ,Feature descriptor ,Computers in Earth Sciences ,Time complexity ,TC1501-1800 ,021101 geological & geomatics engineering ,Remote sensing ,locality preserving ,QC801-809 ,Constraint (information theory) ,Ocean engineering ,image registration ,Feature (computer vision) ,Outlier ,020201 artificial intelligence & image processing - Abstract
In this article, we propose an effective method for remote sensing image registration. Point features are robust to remote sensing images with low quality, small overlapping area, and local deformation. Therefore, we extract point features from remote sensing images and convert the problem of remote sensing image registration into the problem of feature point matching. A correspondence set constructed solely on the similar of features often contains many false correspondences or outliers, so our key idea is to remove the mismatches in the initial correspondence set and obtain a stable correspondence through a two-step strategy. First, we use two constraints to construct the optimization model which can solve in linear time. The first constraint is that the topology of the points and their neighbors can be maintained after the spatial transformation. Another constraint is that the feature distance of the correct matches are similar to the neighbors. Then, we design a strategy to increase the number of inliers and raise the precision by a global constraint calculated from the solution in the previous step. Experiments on a variety of remote sensing image datasets demonstrate that our method is more robust and accurate than state-of-the-art methods.
- Published
- 2021
10. Enhancing Metric-Based Few-Shot Classification With Weighted Large Margin Nearest Center Loss
- Author
-
Meiyu Huang, Xueshuang Xiang, and Wei Bao
- Subjects
Similarity (geometry) ,General Computer Science ,Mean squared error ,Computer science ,General Engineering ,Few-shot classification ,metric learning ,large margin nearest center loss ,Separable space ,weighted large margin nearest center loss ,TK1-9971 ,Constraint (information theory) ,Discriminative model ,Margin (machine learning) ,Metric (mathematics) ,Embedding ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Algorithm - Abstract
Metric-learning-based methods, which attempt to learn a deep embedding space on extremely large episodes, have been successfully applied to few-shot classification problems. In this paper, we propose the adoption of large margin nearest center (LMNC) loss during episodic training to enhance metric-learning-based few-shot classification methods. Loss functions (such as cross-entropy and mean square error) commonly used in episodic training strive to achieve the strict goal that differently labeled examples in the embedding space are separated by an infinite distance. However, the learned embedding space cannot guarantee that this goal will be achieved for every episode sampled from a large number of classes. Instead of an infinite distance, LMNC loss requires only that differently labeled examples be separated by a large margin, which can well relax the strict constraint of the traditional loss functions, easily leading to a discriminative embedding space. Moreover, considering the multilevel similarity between various classes, we alleviate the constraint of a fixed large margin and extend LMNC loss to weighted LMNC (WLMNC) loss, which can effectively take advantage of interclass information, achieving a more separable embedding space with adaptive interclass margins. Experiments on state-of-the-art benchmarks demonstrate that the adoption of LMNC and WLMNC losses can strongly improve the embedding learning performance and classification accuracy of metric-based few-shot classification methods for various few-shot scenarios. In particular, LMNC and WLMNC losses can obtain 1.86% and 2.46% gains in prototypical network on miniImageNet for 5-way 1-shot scenario, respectively.
- Published
- 2021
11. Trajectory Planning of Spray Gun With Variable Posture for Irregular Plane Based on Boundary Constraint
- Author
-
Liu Yi, Xueya Zhao, Yu Yongqing, Jiuxuan Liu, Yong Zeng, and Liu Dezhi
- Subjects
General Computer Science ,Physics::Instrumentation and Detectors ,Boundary (topology) ,02 engineering and technology ,Curvature ,variable posture ,Physics::Fluid Dynamics ,0203 mechanical engineering ,Control theory ,General Materials Science ,boundary constraint ,Mathematics ,spraying robot ,Computer simulation ,Plane (geometry) ,Mathematics::Complex Variables ,General Engineering ,Radius ,Division (mathematics) ,021001 nanoscience & nanotechnology ,TK1-9971 ,Constraint (information theory) ,020303 mechanical engineering & transports ,Line (geometry) ,Mathematics::Differential Geometry ,Electrical engineering. Electronics. Nuclear engineering ,0210 nano-technology ,trajectory planning ,Irregular plane - Abstract
In order to solve the problem of low spraying efficiency and excessive paint waste caused by overspray when the robot automatically sprays irregular plane, a method of spray trajectory planning with boundary-constrained considering spray gun changing posture is proposed. The static spraying model of the spray gun with variable posture, and the dynamic spraying model of the spray gun along the arc path are established separately, an optimization method for the symmetry of coating distribution based on the variable spray angle when the gun spraying along the arc path is proposed. Orthogonal experiment method based on numerical simulation is used to clarify the influence of boundary curve shape and spray gun posture on boundary constraint distance, the prediction of the value range of the boundary constraint distance at the boundary of different curvature radius is realized. Within the range of the value of the boundary constraint, combined with the equal division method of the plane intercept line and the distance search method, a boundary constraint spray path generation algorithm is established by setting a uniform boundary constraint distance value. Finally, a multivariable spraying parameter optimization algorithm based on PSO is established, the spraying velocity, spraying height and spraying angle in the dynamic spraying process are solved, and the coating uniformity is optimized. The effectiveness and feasibility of the proposed spray trajectory planning method is verified by robot spraying experiment for any irregular plane.
- Published
- 2021
12. Constructing Independent Spanning Trees on Generalized Recursive Circulant Graphs
- Author
-
Kai-Hsun Yao, Dun-Wei Cheng, and Sun-Yuan Hsieh
- Subjects
Vertex (graph theory) ,Discrete mathematics ,Interconnection ,General Computer Science ,Series (mathematics) ,Computer science ,General Engineering ,Topology (electrical circuits) ,generalized recursive circulant graphs ,Independent spanning trees ,TK1-9971 ,Constraint (information theory) ,Shortest path problem ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,Circulant matrix ,interconnection networks - Abstract
The generalized recursive circulant networking can be widely used in the design and implementation of interconnection networks. It consists of a series of processors, each is connected through bidirectional, point-to-point communication channels to different neighbors. In this work, we apply the shortest path routing concept to build independent spanning trees on the generalized recursive circulant graphs. The proposed strategy loosen the restricted conditions in previous research and extended the result to a more general vertex setting by design the specific algorithm to deal with the constraint issue.
- Published
- 2021
13. Boolean Matrix Factorization via Nonnegative Auxiliary Optimization
- Author
-
Duc P. Truong, Erik Skau, Derek DeSantis, and Boian S. Alexandrov
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Optimization problem ,General Computer Science ,Computer science ,Non-negative matrix factorization ,Matrix decomposition ,Machine Learning (cs.LG) ,Matrix (mathematics) ,Computer Science - Data Structures and Algorithms ,FOS: Mathematics ,Applied mathematics ,General Materials Science ,Data Structures and Algorithms (cs.DS) ,Electrical and Electronic Engineering ,Greedy algorithm ,Mathematics - Optimization and Control ,General Engineering ,Approximation algorithm ,nonnegative matrix factorization ,TK1-9971 ,Constraint (information theory) ,Optimization and Control (math.OC) ,Electrical engineering. Electronics. Nuclear engineering ,Boolean data type ,Boolean matrix factorization - Abstract
A novel approach to Boolean matrix factorization (BMF) is presented. Instead of solving the BMF problem directly, this approach solves a nonnegative optimization problem with an additional constraint over an auxiliary matrix whose Boolean structure is identical to the initial Boolean data. This additional auxiliary matrix constraint forces the support of the NMF solution to adhere to that of a BMF solution. The solution of the nonnegative auxiliary optimization problem is thresholded to provide a solution for the BMF problem. We provide the proofs for the equivalencies of the two solution spaces under the existence of an exact solution. Moreover, the nonincreasing property of the algorithm is also proven. Experiments on synthetic and real datasets are conducted to show the effectiveness and complexity of the algorithm compared to other current methods.
- Published
- 2021
14. Exponential Stability for a Class of Linear Delay Differential Systems Under Logic Impulsive Control
- Author
-
Chunxiang Li
- Subjects
Class (set theory) ,General Computer Science ,Stochastic process ,Computer Science::Information Retrieval ,General Engineering ,logic choice ,Differential systems ,Exponential stability ,TK1-9971 ,Constraint (information theory) ,linear delay differential system ,Control theory ,impulsive control ,Applied mathematics ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Control (linguistics) ,Numerical stability ,Mathematics - Abstract
This paper is concerned with the exponential stability for a class of linear delay differential systems under logic impulsive control. Based on logic impulsive control, the strong constraint that the coefficient functions of this kind of linear delay differential system need to be non-negative, which is required in most of the previous studies, is reduced. By establishing the relationship between the logic impulsive system and a corresponding non-impulsive system, some exponential stability criteria for linear delay differential systems under logic impulsive control are presented in the following two cases: Case A–The coefficient functions are non-negative, Case B–The coefficient functions can be negative. Two numerical examples are discussed to verify the results.
- Published
- 2021
15. Adaptive Robust Constraint Following Control for Omnidirectional Mobile Robot: An Indirect Approach
- Author
-
Xiaomin Zhao, Fangfang Dong, Jiang Han, and Dong Jin
- Subjects
General Computer Science ,Computer science ,uniformly bounded ,PID controller ,02 engineering and technology ,01 natural sciences ,Udwadia-Kalaba theory ,Control theory ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,adaptive robust control ,General Materials Science ,uncertainty ,010301 acoustics ,Nonholonomic system ,Robot kinematics ,Holonomic ,General Engineering ,constraint following ,Mobile robot ,Constraint (information theory) ,Trajectory ,Robot ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Robust control ,lcsh:TK1-9971 ,Servo - Abstract
The tracking performance of mobile robot is often affected by uncertainties from the deviation of initial conditions, external disturbances and varying loads, etc. An Udwadia-Kalaba based adaptive robust control is proposed for the trajectory tracking of an omnidirectional mobile robot in the presence of uncertainties. The proposed control includes nominal control part based on Udwadia-Kalaba theory and adaptive robust control part. The desired trajectory is considered as a virtual servo constraint applied to the robot system and converted into the second order standard form. So that the analytical form of constraint force could be obtained via Udwadia-Kalaba Fundamental Equation (UKFE). The system will precisely obey the given constraint (i.e., the desired trajectory) under the obtained constraint force in ideal cases. No auxiliary variables are required and it is effective whether the constraints are holonomic or nonholonomic. The designed adaptive law is in leakage type and the adaptive parameters are adjusted according to the performance of the system in order to compensate for the effect caused by uncertainty in the system. No extra information of uncertainty is needed except for the existence of uncertainty bound. Comparing with PID control, it can be found that the proposed control has better performance and can realize higher precision trajectory tracking control.
- Published
- 2021
16. Regularized Building Boundary Extraction From Remote Sensing Imagery Based on Augment Feature Pyramid Network and Morphological Constraint
- Author
-
Sifan Xiong, Yakun Xie, Jun Zhu, Jinlin Hu, Qiang Li, Dejun Feng, and Minjun Hu
- Subjects
Atmospheric Science ,Computer science ,business.industry ,QC801-809 ,morphological constraint ,Geophysics. Cosmic physics ,Boundary (topology) ,Constraint (information theory) ,Ocean engineering ,Augment feature pyramid network (AFPN) ,Feature (computer vision) ,Remote sensing (archaeology) ,building boundary extraction ,remote sensing imagery ,Computer vision ,Extraction (military) ,Pyramid (image processing) ,Artificial intelligence ,Computers in Earth Sciences ,business ,TC1501-1800 - Abstract
Automatic building boundariesextraction methods are important for urban planning, change monitoring, and smart city construction. In this article, we propose a regularized building boundaries extraction from remote sensing imagery based on augment feature pyramid network (AFPN) and morphological constraint. First, we build an AFPN, which can provide more accurate and dense global features for semantic segmentation tasks to avoid the loss of feature information. Second, the building shape is manually divided into linear and curved by analyzing the morphological characteristics. The extraction results are regularized to achieve the refined expression of contour according to different types of building shapes. Finally, we conduct experiments on the benchmark dataset to test the availability of the proposed approach. The results showed that the F1-score and intersection over union (IOU) reached 93.7% and 88.8%, respectively. Besides, our proposed approach is compared with some of the excellent research in recent years of models, such as PSPNet, Unet++, RefineNet, and DeconvNet. On the benchmark dataset, the proposed method increases the IOU by 0.9–2.7% and improves the F1-score by 0.2–2.5%. In addition, the results prove that our method considering morphological constraint can achieve better visual effects.
- Published
- 2021
17. A Constrained Multi/Many-Objective Particle Swarm Optimization Algorithm With a Two-Level Balance Scheme
- Author
-
Li Chen, Wusi Yang, Yanyan Li, and Jue Zhang
- Subjects
Optimization problem ,General Computer Science ,fitness ranking ,two-level balance scheme ,General Engineering ,Particle swarm optimization ,Function (mathematics) ,Multi-objective optimization ,Constrained multi/many-objective optimization ,TK1-9971 ,Constraint (information theory) ,Ranking ,Convergence (routing) ,General Materials Science ,Decomposition method (constraint satisfaction) ,constraint dominance principle ,Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,Algorithm - Abstract
Constrained multi-objective optimization problems are common in practical engineering and are more difficult to handle than unconstrained problems. In general, it is necessary to find a balance between the convergence and diversity of solutions, as well as its feasibility. For the constrained multi/many-objective optimization problem, a particle swarm optimization algorithm based on a two-level balance strategy is proposed. In contrast to existing views, the first level of the proposed algorithmic framework emphasizes convergence, while diversity and feasibility are considered together as the second-level scheme. An ensemble fitness ranking was used to improve the convergence of the proposed algorithm. To balance the diversity and solution feasibility, the solutions are selected by combining the angles between the solutions using the constraint dominance principle. A penalty-based boundary-crossing approach is used as a utility function to calculate the fitness of the populations, which is compared with six state-of-the-art constrained multi/many-objective evolutionary optimization algorithms on multiple constrained test suites, and the experimental results show that the proposed algorithm is highly competitive in most test problems. Furthermore, to illustrate the effect of different utility functions on the performance of the algorithm, the Chebyshev decomposition method is employed and compared with the former, and the results show that different utility functions need to be chosen to cope with problems of different characteristics.
- Published
- 2021
18. Integrated Chassis Control With Four-Wheel Independent Steering Under Constraint on Front Slip Angles
- Author
-
Seongjin Yim
- Subjects
Chassis ,General Computer Science ,Computer science ,Control (management) ,General Engineering ,Integrated chassis control (ICC) ,control allocation ,four-wheel independent steering (4WIS) ,Slip (materials science) ,constraint on front slip angles ,Constraint (information theory) ,Control theory ,in-wheel motor system ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Actuator ,independent steering system ,lcsh:TK1-9971 ,Slip (vehicle dynamics) ,Front (military) - Abstract
This paper presents a method to design an integrated chassis controller with four-wheel independent steering (4WIS) under the constraint on front slip angles for electric vehicles (EVs) adopting in-wheel motor (IWM) driving system. To improve lateral stability and maneuverability of a vehicle, direct yaw moment control strategy is adopted. A control allocation method is adopted to distribute control yaw moment into tire forces, generated by 4WIS. If corrective steering angles of 4WIS are added to front steering angles generated by a driver, it can deteriorate control performance because the lateral tire force of front wheels easily saturated and it causes loss of required yaw moment needed to stabilize a vehicle. To cope with the problem, it is necessary to impose constraints on front slip angles. To compensate the loss of control yaw moment caused by the constraint on front slip angles, a constrained control allocation method is presented. Simulation on driving simulation tool, CarSim®, shows that the proposed integrated chassis controller is capable of maintaining lateral stability and maneuverability without performance deterioration under the constraint on the front slip angles.
- Published
- 2021
19. Performance Comparison of Typical Binary-Integer Encodings in an Ising Machine
- Author
-
Hosho Katsura, Kensuke Tamura, Nozomu Togawa, Shu Tanaka, and Tatsuhiko Shirai
- Subjects
General Computer Science ,Linear programming ,Unary operation ,quadratic knapsack problem ,MathematicsofComputing_NUMERICALANALYSIS ,Binary number ,02 engineering and technology ,01 natural sciences ,Encoding (memory) ,0103 physical sciences ,Ising model ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Electrical and Electronic Engineering ,010306 general physics ,Discrete mathematics ,binary-integer encoding ,General Engineering ,020206 networking & telecommunications ,Binary Integer Decimal ,quadratic unconstrained binary optimization ,TK1-9971 ,Constraint (information theory) ,Ising machine ,combinatorial optimization problem ,Quadratic unconstrained binary optimization ,Electrical engineering. Electronics. Nuclear engineering - Abstract
The differences in performance among binary-integer encodings in an Ising machine, which can solve combinatorial optimization problems, are investigated. Many combinatorial optimization problems can be mapped to find the lowest-energy (ground) state of an Ising model or its equivalent model, the Quadratic Unconstrained Binary Optimization (QUBO). Since the Ising model and QUBO consist of binary variables, they often express integers as binary when using Ising machines. A typical example is the combinatorial optimization problem under inequality constraints. Here, the quadratic knapsack problem is adopted as a prototypical problem with an inequality constraint. It is solved using typical binary-integer encodings: one-hot encoding, binary encoding, and unary encoding. Unary encoding shows the best performance for large-sized problems.
- Published
- 2021
20. A Novel Operation Sequence Similarity-Based Approach for Typical Process Route Knowledge Discovery
- Author
-
Yan Wang, Zhicheng Ji, and Binzi Xu
- Subjects
Sequence ,Jaccard index ,General Computer Science ,Computer science ,typical process route ,knowledge discovery ,General Engineering ,Process (computing) ,Similarity measure ,computer.software_genre ,TK1-9971 ,Constraint (information theory) ,manufacturing ,Similarity (network science) ,Knowledge extraction ,Operation sequence similarity ,soft constraint ,General Materials Science ,Data mining ,Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,Cluster analysis ,computer - Abstract
A typical process route essentially represents the commonly used process planning-related knowledge and can be modified to generate new process routes easily. Hence, its quality directly affects the performance of newly generated process routes and thereby the goodness of products. To effectively discover typical process route knowledge, a reasonable similarity measure and a clustering method specifically for process routes are required. However, existing operation sequence similarity coefficients often assign coarse-grained similarities, which leads to inaccurate clustering results. For the clustering problem, most researchers have not considered the practical constraints during typical process route discovery. In this paper, an operation sequence similarity-based discovery method is presented. First, the characteristics and information requirements of the operation sequence similarity problem are analysed, and a novel comprehensive similarity coefficient combined with a modified pseudo-longest-common-subsequence (pseudo-LCS) and Jaccard similarity coefficient is proposed based on this analysis and principal component analysis (PCA). This coefficient considers the precedence relationship, the number of common operations, and the operation similarity simultaneously to handle all the potential similarity situations. Second, two soft constraints, namely, quantity constraint and size constraint, are introduced in the traditional process route clustering problem to ensure the quality and validity of the discovered typical process routes. To solve this more practical problem and achieve a balance between these two conflicting constraints, the K-medoids method is improved with an adjustment mechanism to generate valid results under these two soft constraints. Finally, numerical illustrations are presented to verify the effectiveness of the proposed methods. The results show that compared with existing similarity coefficients, the proposed comprehensive similarity coefficient is more sensitive and much better at distinguishing the tiny difference between the process routes. In addition, the modified K-medoids method can perform much better than existing methods on process route discovery data sets under two conflicting soft constraints.
- Published
- 2021
21. Spectral-Spatial Constrained Nonnegative Matrix Factorization for Spectral Mixture Analysis of Hyperspectral Images
- Author
-
Ge Zhang, Yan Feng, Qian Du, and Shaohui Mei
- Subjects
Atmospheric Science ,Endmember ,Computer science ,Hyperspectral remote sensing ,QC801-809 ,Geophysics. Cosmic physics ,linear mixture model (LMM) ,Hyperspectral imaging ,nonnegative matrix factorization (NMF) ,Mixture model ,Non-negative matrix factorization ,Matrix decomposition ,Constraint (information theory) ,Ocean engineering ,Statistics::Machine Learning ,ComputingMethodologies_PATTERNRECOGNITION ,Norm (mathematics) ,Computer Science::Computer Vision and Pattern Recognition ,spectral mixture analysis (SMA) ,Computers in Earth Sciences ,Algorithm ,TC1501-1800 ,Sparse matrix - Abstract
Hyperspectral spectral mixture analysis (SMA), which intends to decompose mixed pixels into a collection of endmembers weighted by their corresponding fraction abundances, has been successfully used to tackle mixed-pixel problem in hyperspectral remote sensing applications. As an approach of decomposing a high-dimensional data matrix into the multiplication of two nonnegative matrices, nonnegative matrix factorization (NMF) has shown its advantages and been widely applied to SMA. Unfortunately, most of the NMF-based unmixing methods can easily lead to an unsuitable solution, due to inadequate mining of spatial and spectral information and the influence of outliers and noise. To overcome such limitations, a spatial constraint over abundance and a spectral constraint over endmembers are imposed over NMF-based unmixing model for spectral-spatial constrained unmixing. Specifically, a spatial neighborhood preserving constraint is proposed to preserve the local geometric structure of the hyperspectral data by assuming that pixels in a spatial neighborhood generally fall into a low-dimensional manifold, while a minimum spectral distance constraint is formulated to optimize endmember spectra as compact as possible. Furthermore, to handle non-Gaussian noises or outliers, an $ {L}_{2,1}$-norm based loss function is ultimately adopted for the proposed spectral-spatial constrained nonnegative matrix factorization model and a projected gradient based optimization algorithm is designed for optimization. Experimental results over both synthetic and real-world datasets demonstrate that the proposed spatial and spectral constraints can certainly improve the performance of NMF-based unmixing and outperform state-of-the-art NMF-based unmixing algorithms.
- Published
- 2021
22. Traveling Salesman Problems With Replenishment Arcs and Improved Ant Colony Algorithms
- Author
-
Qinglei Liu, Qi Song, Zhiqiang Tian, Song Yao, and Xiaoxu Zeng
- Subjects
General Computer Science ,Heuristic (computer science) ,Computer science ,Ant colony optimization algorithms ,General Engineering ,MathematicsofComputing_NUMERICALANALYSIS ,traveling salesman problem ,Cumulative travel constraints ,Ant colony ,Travelling salesman problem ,Engineering optimization ,TK1-9971 ,Constraint (information theory) ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Shortest path problem ,Transportation industry ,improved ant colony algorithm ,General Materials Science ,dynamic replenishment arc ,Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
The traveling salesman problem (TSP), can be used as a typical combinatorial optimization problem, to describe a wide variety of practical engineering optimization problems in various fields. In this study, the problem of personnel and equipment utilization in the transportation industry was abstracted, a more general class of TSPs with replenishment arcs was proposed, an optimization model to minimize the total travel time was established, the ant colony optimization algorithm to solve the standard TSP was improved, and an improved ant colony algorithm based on dynamic heuristic information was designed. Simulation experiments showed that the algorithm can account for the cumulative mileage constraint and search for the shortest path, effectively solving the TSP with replenishment arcs.
- Published
- 2021
23. Optimal Risk Operation for a Coupled Electricity and Heat System Considering Different Operation Modes
- Author
-
Wenxia Pan, Zhu Zhu, Mingyang Liu, and Tongchui Liu
- Subjects
Mathematical optimization ,General Computer Science ,Computer science ,020209 energy ,DRCC ,CEHS ,DROM ,02 engineering and technology ,Energy transition ,Electric power system ,Cogeneration ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Limit (mathematics) ,business.industry ,020208 electrical & electronic engineering ,General Engineering ,CROM ,Renewable energy ,Moment (mathematics) ,Constraint (information theory) ,Distributed algorithm ,Electricity ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,ADMM ,OROM ,lcsh:TK1-9971 ,Efficient energy use - Abstract
The coupled electricity and heat system (CEHS) is considered one of the most efficient energy utilization schemes for the energy transition to solve energy crises and environmental problems. However, the individual data between the power system (PS) and heat system (HS) probably limit the high share and optimization operation. Moreover, the uncertain renewables and complex coupled network create challenges regarding the operation risk of CEHS. Given that the CEHS may be affiliated with different operation entities, this paper proposes two operation modes to achieve the solution of the optimal risk operation model (OROM), including the distributionally robust chance constraint (DRCC)-based centralized risk operation mode (CROM) and the DRCC-based alternating direction method of multipliers (ADMM) distributed risk operation mode (DROM). By formulating the moment-based ambiguity set estimated from historical data and introducing the operation risk constraints, a tractable reformulation of two-stage DRCC OROM problems is presented under CROM. Moreover, the DRCC-based ADMM distributed algorithm with the guarantee of convergence is developed to optimize the PS and HS independently under DROM considering the operation risk. The two operation modes achieve the minimum amount of information shared between the two systems regarding the underlying distribution. In the numerical case, the approximate OROM solution is obtained between CROM and DROM. The two proposed approaches based on different operation modes outperform the existing methods according to the risk level depicted by different forms of the violation probability and the risk cost compared with Gaussian chance constraint (GCC) under CROM, while the safety coefficient $\epsilon $ is set as 0.25. Then, the impact of the iteration number on the convergence is also discussed with comparison of the classical ADMM under DROM.
- Published
- 2021
24. Research on Quantitative Calculation Method of Lane-Line Region of Interest and Structural Constraints in Constant Speed Cruise Mode
- Author
-
Wei Niu, Jincao Zhou, and Weiping Fu
- Subjects
General Computer Science ,Computer science ,Cruise ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Lane detection ,Vehicle dynamics ,Region of interest ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,structural constraints ,General Materials Science ,Projection (set theory) ,050210 logistics & transportation ,05 social sciences ,vehicle dynamics ,General Engineering ,Constraint (information theory) ,ComputingMethodologies_PATTERNRECOGNITION ,Line (geometry) ,020201 artificial intelligence & image processing ,region of interest ,constant speed cruise ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,lcsh:TK1-9971 - Abstract
Appropriate region of interest (ROI) and lane structure restriction conditions can improve the ac-curacy of lane detection. Most previously reported approaches require human experience to set up the constraint conditions of the ROI and lane structure. Few of these studies involved quantitative calculation methods of the constraint conditions of the ROI and lane structure. To solve this problem, constant-speed cruise mode, which relies on lane recognition, was examined. A vehicle dynamics model with a charge-coupled device (CCD) camera was constructed based on the vehicle dynamics and camera projection. The projection of lane line feature points from the world coordinate system to the image coordinate system under different vehicle positions and postures was analyzed. A quantitative calculation method of the ROI lateral constraint equation and the lane structure constraint equation in constant-speed cruise mode is given. Actual road test data showed that the constraint condition calculation method not only agreed with the actual road test results but also improved the real-time accuracy.
- Published
- 2021
25. Constrained Generative Adversarial Networks
- Author
-
Jiangzhong Cao, Dai Qingyun, Lu Yuqin, Shangsong Liang, and Chao Xiaopeng
- Subjects
TheoryofComputation_MISCELLANEOUS ,Mathematical optimization ,Generative adversarial networks ,General Computer Science ,Function space ,Computer science ,05 social sciences ,General Engineering ,Lipschitz constraint ,Function (mathematics) ,010501 environmental sciences ,Mixture model ,01 natural sciences ,Nash equilibrium ,Constraint (information theory) ,symbols.namesake ,0502 economics and business ,symbols ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,050207 economics ,lcsh:TK1-9971 ,MNIST database ,0105 earth and related environmental sciences - Abstract
Generative Adversarial Networks (GANs) are a powerful subclass of generative models. Yet, how to effectively train them to reach Nash equilibrium is a challenge. A number of experiments have indicated that one possible solution is to bound the function space of the discriminator. In practice, when optimizing the standard loss function without limiting the discriminator’s output, the discriminator may suffer from lack of convergence. To be able to reach the Nash equilibrium in a faster way during training and obtain better generative data, we propose constrained generative adversarial networks, GAN-C, where a constraint on the discriminator’s output is introduced. We theoretically prove that our proposed loss function shares the same Nash equilibrium as the standard one, and our experiments on mixture of Gaussians, MNIST, CIFAR-10, STL-10, FFHQ, and CAT datasets show that our loss function can better stabilize training and yield even better high-quality images.
- Published
- 2021
26. Link Scheduling in Rechargeable Wireless Sensor Networks With Imperfect Battery and Memory Effects
- Author
-
Sieteng Soh, Kwan-Wu Chin, Tony Tony, and Mihai Lazarescu
- Subjects
Battery (electricity) ,Charge cycle ,General Computer Science ,Computer science ,Time division multiple access ,02 engineering and technology ,Scheduling (computing) ,Hardware_GENERAL ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,link schedule ,Greedy algorithm ,harvesting time ,wireless sensor networks ,Leakage (electronics) ,050210 logistics & transportation ,business.industry ,05 social sciences ,General Engineering ,020206 networking & telecommunications ,Constraint (information theory) ,Battery cycle constraint ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Energy harvesting ,Wireless sensor network ,lcsh:TK1-9971 ,Computer network - Abstract
This paper considers the novel problem of deriving a Time Division Multiple Access (TDMA) link schedule for rechargeable wireless sensor networks (rWSNs). Unlike past works, it considers: (i) the energy harvesting time of nodes, (ii) a battery cycle constraint that is used to overcome so called memory effects , and (iii) battery imperfections, i.e., leakage. This paper shows analytically that the battery cycle constraint and leaking batteries lead to unscheduled links. Further, it presents a greedy heuristic that schedules links according to when their corresponding nodes have sufficient energy. Our simulations show that enforcing the battery cycle constraint increases the link schedule by up to 1.71 (0.31) times for nodes equipped with a leaking (leak-free) battery. When nodes have a leaking battery, the derived schedules are on average 1.05 times longer than the case where nodes have a leak-free battery. Finally, the battery cycle constraint reduces the number of charge/discharge cycles by up to 47.41% (45.67)% when nodes have a leak (leak-free) battery. Between leak-free and leak battery scenarios, using the former produces up to 51.46% fewer cycles than the latter.
- Published
- 2021
27. Exclusive Feature Constrained Class Activation Mapping for Better Visual Explanation
- Author
-
Xunpeng Zhang, Pengda Wang, Weikuo Guo, and Xiangwei Kong
- Subjects
General Computer Science ,Computer science ,02 engineering and technology ,010501 environmental sciences ,class activation mapping ,01 natural sciences ,visual explanation ,Set (abstract data type) ,Bounding overwatch ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Interpretability ,interpretability evaluation ,0105 earth and related environmental sciences ,Artificial neural network ,business.industry ,General Engineering ,Pattern recognition ,Visualization ,TK1-9971 ,Constraint (information theory) ,Feature (computer vision) ,Metric (mathematics) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical engineering. Electronics. Nuclear engineering ,business - Abstract
Whereas Deep Neural Network(DNN) shows wonderful performance on large scale data, lacking interpretability limits their usage in scenarios relevant to security. To make visual explanations less noisy and more class-discriminative, in this work, we propose a visual explanation method of DNN, named Exclusive Feature Constrained Class Activation Mapping(EFC-CAM). A new exclusive feature constraint is introduced to optimize the weight calculated from Grad-CAM or initialized from a constant vector. To better measure visual explanation methods, we design an effective evaluation metric which does not need bounding boxes as auxiliary information. Extensive quantitative experiments and visual inspection on ImageNet and Fashion validation set show the effectiveness of the proposed method.
- Published
- 2021
28. Explicit Size-Reduction of Circularly Polarized Antennas Through Constrained Optimization With Penalty Factor Adjustment
- Author
-
Slawomir Koziel and Marzieh Mahrokh
- Subjects
Mathematical optimization ,General Computer Science ,Computer science ,General Engineering ,Constrained optimization ,Constraint satisfaction ,Communications system ,constrained optimization ,TK1-9971 ,Constraint (information theory) ,Microstrip antenna ,penalty functions ,Circular polarization antennas ,simulation-driven design ,Miniaturization ,compact antennas ,General Materials Science ,Penalty method ,Electrical engineering. Electronics. Nuclear engineering ,Antenna (radio) - Abstract
Modern communication systems of high data capacity incorporate circular polarization (CP) as the preferred antenna radiation field configuration. In many applications, integration of the system circuitry with antennas imposes size limitations on CP radiators, which makes their development process a challenging endeavor. This can be mitigated by means of simulation-driven design, specifically, constrained numerical optimization. Majority of the performance-related constraints are expensive to evaluate, i.e. require full-wave electromagnetic (EM) analysis of the system. Their practical handling can be realized using a penalty function approach, where the primary objective (antenna size reduction) is complemented by contributions proportional to properly quantified constraint violations. The coefficients determining the contribution of the penalty terms are normally set up using designer’s experience, which is unlikely to render their optimum values in terms of the achievable miniaturization rates as well as constraint satisfaction. This paper proposes a procedure for automated penalty factor adjustment in the course of the optimization process. Our methodology seeks for the most suitable coefficient levels based on the detected constraint violations and feasibility status of the design. It is validated using two CP antenna structures. The results demonstrate a possibility of a precise constraint control as well as superior miniaturization rates as compared to the manual penalty term setup.
- Published
- 2021
29. Modified Graph Laplacian Model With Local Contrast and Consistency Constraint for Small Target Detection
- Author
-
Xiaorun Li, Liaoying Zhao, Chaoqun Xia, and Shaoqi Yu
- Subjects
Atmospheric Science ,local contrast indicator ,Exploit ,Computer science ,business.industry ,QC801-809 ,Geophysics. Cosmic physics ,Contrast (statistics) ,Pattern recognition ,Object detection ,Constraint (information theory) ,graph Laplacian (GL) model ,small target detection ,Ocean engineering ,Consistency (database systems) ,Contrast consistency indicator ,Outlier ,Clutter ,Artificial intelligence ,Computers in Earth Sciences ,Laplacian matrix ,business ,TC1501-1800 - Abstract
The traditional graph Laplacian model has been widely used in many computer vision tasks. The small target detection technique is one of the most challenging computer vision tasks in various practical applications. This article presents a small target detection method by developing a modified graph Laplacian model with additional constraints. The proposed method is designed based on specific characteristics of small target: Global rarity, local contrast, and contrast consistency. First, we analyze the primal graph Laplacian model, and exploit its ability to describe global rarity, and isolate outliers from nonoutliers. Next, indicators measuring local contrast and contrast consistency are constructed to delineate local characteristics of small targets. Then, we integrate the indicators with the primal graph Laplacian model, and propose a modified graph Laplacian model for small target detection. In the confidence maps obtained by the proposed model, small targets are well enhanced, while backgrounds are significantly suppressed. Finally, a small target detection method is proposed based on the graph model. Extensive experiments on various real datasets demonstrate the effectiveness and superiority of the proposed method in detecting small targets.
- Published
- 2020
30. Person Re-Identification Using Additive Distance Constraint With Similar Labels Loss
- Author
-
Shen Li, Chunli Han, Guofa Li, Xie Heng, Xu Gang, Yaoyu Chen, Huang Lisha, and Liangwen Tang
- Subjects
person re-identification ,Ground truth ,General Computer Science ,Computer science ,business.industry ,distance constraint ,General Engineering ,deep learning ,Pattern recognition ,Function (mathematics) ,Re identification ,Bottleneck ,Task (project management) ,Constraint (information theory) ,Discriminative model ,similar labels ,Softmax function ,General Materials Science ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,business ,Intelligent safety systems ,lcsh:TK1-9971 - Abstract
Despite the promising progress made in recent years, person re-identification (Re-ID) remains a challenging task due to the intra-class variations. Most of the current studies used the traditional Softmax loss for solutions, but its discriminative capability encounters a bottleneck. Therefore, how to improve person Re-ID performance is still a challenging task. To address this problem, we proposed a novel loss function, namely additive distance constraint with similar labels loss (ADCSLL). Specifically, we reformulated the Softmax loss by adding a distance constraint to the ground truth label, based on which similar labels were introduced to enhance the learned features to be much more stable and centralized. Experimental evaluations were conducted on two popular datasets (Market-1501 and DukeMTMC-reID) to examine the effectiveness of our proposed method. The results showed that our proposed ADCSLL was more discriminative than most of the other compared state-of-the-art methods. The rank-1 accuracy and the mAP on Market-1501 were 95.0% and 87.0%, respectively. The numbers were 88.6% and 77.2% on DukeMTMC-reID, respectively.
- Published
- 2020
31. Constrained Optimization Based on Ensemble Differential Evolution and Two-Level-Based Epsilon Method
- Author
-
Zonghao Zhang and Bin Xu
- Subjects
0209 industrial biotechnology ,Mathematical optimization ,General Computer Science ,Linear programming ,Population ,02 engineering and technology ,Evolutionary algorithms ,Search engine ,020901 industrial engineering & automation ,Search algorithm ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Electrical and Electronic Engineering ,education ,education.field_of_study ,differential evolution ,ensemble ,General Engineering ,Constrained optimization ,twolevel-based comparison ,constrained optimization ,Constraint (information theory) ,Differential evolution ,Mutation (genetic algorithm) ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 - Abstract
Constrained optimization problems (COPs) are common in many fields, and the search algorithm and constraint handling technique play important roles in the constrained evolution algorithms. In this article, we propose a new optimization algorithm named CETDE based on ensemble differential evolution (DE) and a two-level epsilon-constrained method. In the ensemble DE variant, some promising parameters and mutation strategies constitute the candidate pool, and each element in the pool coexists throughout the search process and competes to generate new solutions. The two-level epsilon method is proposed by incorporating a generation and a population comparison level to retain more promising solutions without degrading the solution quality. Moreover, a diversity promotion scheme is developed to improve the population distribution when the search becomes trapped in a small region. The superior performance of CETDE is validated by comparison with some state-of-the-art COEAs over two sets of artificial benchmarks and five real-world problems. The competitive results show that CETDE is an effective method for solving COPs.
- Published
- 2020
32. Impact Angle Constraint Dual-Layer Adaptive Guidance Law With Actuator Faults
- Author
-
Yi Ji, Niu Zhiqi, Qiuxiong Gou, Liangyu Zhao, and Qiancai Ma
- Subjects
General Computer Science ,Computer simulation ,Computer science ,Guidance law ,General Engineering ,finite-time convergence ,impact angle ,Signal ,Azimuth ,Constraint (information theory) ,Missile ,actuator fault ,Law ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Robust control ,Actuator ,adaptive dual-layer control ,lcsh:TK1-9971 ,Independence (probability theory) - Abstract
To intercept maneuvering target considering impact angle constraint and actuator faults, a novel three-dimensional (3D) guidance law is proposed in this paper. To guarantee the interception, the multi-variable super-twisting-algorithm-like (STA-like) is adopted in the proposed guidance law, so as to drive the line-of-sight (LOS) angle to the desired value and its rate to zero in finite time in both pitch and azimuth directions. However, it is usually a difficult task for STA-like to select the proper design parameters, and the necessary disturbance gradient for STA-like is also not clearly known, owing to realistic actuator faults and the independence between missile and target. Moreover, the actuator faults in this paper are formulated as disturbances in the control scheme, and the necessary disturbance gradient for STA-like is not clearly known as well. To solve these problems, a multi-variable dual-layer adaptive scheme is employed to adjust the control gains and guarantees its precision. The theoretical analysis and numerical simulation results demonstrate the effectiveness of the proposed guidance law. The combination of STA-like and adaptive theory in the presented guidance law for the first time can guarantee the successful interception and can generate precise and robust control signal simultaneously with impact angle constraint and actuator faults consideration.
- Published
- 2020
33. New Optimization Algorithm Inspired by Kernel Tricks for the Economic Emission Dispatch Problem With Valve Point
- Author
-
Shengsheng Wang and Ruyi Dong
- Subjects
Mathematical optimization ,Optimization problem ,General Computer Science ,Computer science ,020209 energy ,02 engineering and technology ,symbols.namesake ,Kernel search optimization ,meta-heuristic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Point (geometry) ,Penalty method ,Newton's method ,swarm intelligence ,General Engineering ,Process (computing) ,Economic emission dispatch ,021001 nanoscience & nanotechnology ,Constraint (information theory) ,Kernel (statistics) ,symbols ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,0210 nano-technology ,lcsh:TK1-9971 - Abstract
With the increasing concern over environment protection, Economic Emission Dispatch (EED) problem has received much attention. It is essentially a Multi-objective Optimization Problem, which minimizes both fuel cost and emission pollution simultaneously, as well as meets some system limits. This study transforms EED problem to a single-objective problem with weighted sum method, and then use Newton method to solve the equality constraint iteratively and introduce a common penalty function to deal with the inequality constraint. Moreover, this study tries to propose a new meta-heuristic algorithm inspired by kernel tricks to solve EED problem with no hyper parameters to be tuned. The new algorithm can map a non-linear objective function into a linear one with higher-dimension. Thus the optimization process could be transformed into a linear process, which is more likely to get the optimum solution. When applied in the 3 real-world EED cases with valve point, the new algorithm achieved a better performance compared with other algorithms in the literature.
- Published
- 2020
34. Smoothed L0-Constraint Dictionary Learning for Low-Dose X-Ray CT Reconstruction
- Author
-
Temitope Emmanuel Komolafe, Gang Yuan, Kang Wang, Cheng Zhang, Jian Zheng, Qiang Du, Ming Li, Xiaodong Yang, and Hu Tao
- Subjects
Computer tomography (CT) ,General Computer Science ,Computer science ,General Engineering ,streaking artifacts and bias ,Regularization (mathematics) ,030218 nuclear medicine & medical imaging ,Image (mathematics) ,Constraint (information theory) ,03 medical and health sciences ,0302 clinical medicine ,Image texture ,smoothed L₀ norm-constraint dictionary learning (SL0-DL) ,low dose ,030220 oncology & carcinogenesis ,Norm (mathematics) ,General Materials Science ,Noise (video) ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Representation (mathematics) ,Algorithm ,lcsh:TK1-9971 - Abstract
The iterative algorithms of computed tomography (CT) reconstruction derived from the dictionary learning (DL) regularization have been developed to make high quality recovery from the under-sampled data acquired by a low dose protocol. However, when they are applied to noisy data with low sampling rate, streaking artifacts and bias tends to appear in early iteration results. Since the dictionary is over-complete, the artifacts and bias can also be represented well by the dictionary, resulting in the reservation of these unexpected structures in the final image. We proposed a smoothed L0 norm-constraint dictionary learning (SL0-DL) algorithm to deal with these unexpected structures. For the proposed algorithm, we introduce smoothed-L0 norm regularization to the objective function. In each iteration process, the intermediate image generated by the DL representation will be smoothed using SL0 norm, and then the smoothed image is used to update the output of this iteration. The raw data from both the numerical simulation and actual CT acquisition are used to test the performances of the proposed SL0-DL method. Experimental results demonstrate that the proposed method performs better than other competing algorithms with better noise and artifacts suppression performance while preserving image texture details. And the results show a significant improvement in the quality of the reconstructed image, which demonstrates that the proposed algorithm is really effective.
- Published
- 2020
35. Factorization Meets Neural Networks: A Scalable and Efficient Recommender for Solving the New User Problem
- Author
-
Lin Zheng, Zhichao Liu, Dazhi Jiang, and Jianwei Chen
- Subjects
context-aware recommendation ,General Computer Science ,Computer science ,02 engineering and technology ,Recommender system ,Machine learning ,computer.software_genre ,01 natural sciences ,010305 fluids & plasmas ,Factorization ,efficient training ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Recommender systems ,General Materials Science ,Artificial neural network ,business.industry ,General Engineering ,user behavior ,new user problems ,Complement (complexity) ,Constraint (information theory) ,Projection (relational algebra) ,Scalability ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,lcsh:TK1-9971 - Abstract
Predicting new user behavior has always been a challenging issue in intelligent recommender systems. This challenge is mainly due to the extreme asymmetry of information between new users and old users. Existing factorization models can efficiently process and map asymmetric information, but they are not good at mining deep relationships between contexts when compressing high-dimensional data. In contrast, neural network methods can deeply exploit the relationship between contexts; however, their training cost is much larger than factorization approaches. Therefore, this paper proposes a scalable and efficient recommender to solve the new user problem by filling the gap between factorization models and neural networks. The scalable part is a neural network that can jointly encode, compress, and fuse various types of contexts. The efficient part is a factorization model based on a correlation constraint mechanism and a projection strategy, which enables an asymmetric mapping of information between old and new users. The entire recommender fuses the two parts so that the factorization model and the neural network can complement each other. The experimental results show that our approach can achieve a good balance between performance and training efficiency compared to state-of-the-art methods.
- Published
- 2020
36. Semantic Consistency Cross-Modal Retrieval With Semi-Supervised Graph Regularization
- Author
-
Xiaomei Li, Zhijun Zhang, and Gongwen Xu
- Subjects
General Computer Science ,Graph embedding ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,semi-supervised ,Semantics ,graph regularization ,01 natural sciences ,Discriminative model ,0202 electrical engineering, electronic engineering, information engineering ,Cross-modal retrieval ,General Materials Science ,business.industry ,General Engineering ,Pattern recognition ,Constraint (information theory) ,Projection (relational algebra) ,Modal ,010201 computation theory & mathematics ,Norm (mathematics) ,subspace learning ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Subspace topology - Abstract
Most of the existing cross-modal retrieval methods make use of labeled data to learn projection matrices for different modal data. These methods usually learn the original semantic space to bridge the heterogeneous gap, ignoring the rich semantic information contained in unlabeled data. Accordingly, a semantic consistency cross-modal retrieval with semi-supervised graph regularization (SCCMR) algorithm is proposed, which integrates the prediction of labels and the optimization of projection matrices into a unified framework to ensure that the solution obtained is globally optimal. At the same time, the method uses graph embedding to consider the nearest neighbors in the potential subspace of paired images and texts as well as images and texts with the same semantics. ${l_{21}}$ -norm constraint is applied to the projection matrices to select the discriminative features for different modal data. The results show that our method outperforms several advanced methods on four commonly used cross-modal retrieval datasets.
- Published
- 2020
37. Human Motion Target Recognition Using Convolutional Neural Network and Global Constraint Block Matching
- Author
-
Shangbin Li and Wei Liu
- Subjects
spatial constraints ,Matching (statistics) ,General Computer Science ,business.industry ,Computer science ,matching ,global constraint block ,General Engineering ,Pattern recognition ,Convolutional neural network ,Constraint (information theory) ,Feature (computer vision) ,Key (cryptography) ,feature block ,Key frame ,General Materials Science ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,business ,Spatial analysis ,lcsh:TK1-9971 ,human motion target ,Block (data storage) - Abstract
The traditional human behavior recognition algorithm is easy to ignore the spatial constraint problem of feature blocks, which leads to poor recognition effect and low correct rate. Therefore, we proposed a human motion target recognition algorithm based on Convolution Neural Network (referred to as the “CNN”) and global constraint block matching. First, key frames of the human motion video were extracted, second, the local feature and global feature of key frames were analyzed, and CNN was used to perform feature fusion, then, according to the result of the feature fusion, a feature block was formed and the closest matching feature block is obtained, using the definition of spatial constraint, we considered the spatial data of human motion in the vertical direction, calculates the spatial constraint weight, and further completes the matching. Finally, the score of matching block and the spatial constraint weight were calculated, and the human motion targets are recognized based on the cumulative score. The experimental results show that the proposed algorithm has a high key frame extraction accuracy of more than 90% and less time consumed in feature fusion, high matching accuracy of feature blocks of more than 80%, and high feature blocks, the F-measure of human behavior recognition is 0.95 on average, and the overall recognition performance is good.
- Published
- 2020
38. Improved Binary Artificial Fish Swarm Algorithm and Fast Constraint Processing for Large Scale Unit Commitment
- Author
-
Yongli Zhu and Hui Gao
- Subjects
environmental economic dispatch ,General Computer Science ,Heuristic (computer science) ,Computer science ,Heuristic ,General Engineering ,Swarm behaviour ,Large-scale unit commitment ,heuristic greedy search ,Constraint (information theory) ,Electric power system ,Power system simulation ,improved binary artificial fish swarm algorithm ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Greedy algorithm ,Algorithm ,lcsh:TK1-9971 ,UC fast processing mechanism for constraint - Abstract
As the power systems in some large developing and developed countries are getting bigger, solving large-scale unit commitment (UC) is an urgent need and significant task to ensure their economic operation and contribute green energy consummation to society. In this article optimization models covering economy and environmental protection are established, and an improved binary artificial fish swarm algorithm (IBAFSA) is presented to solve the large-scale UC problems. The parameters of IBAFSA are improved by Lévy flight and adaptive average visual distance to search space more actively, and a double threshold selection strategy is used to enhance the effectiveness of population evolution in the optimization. Meanwhile, a heuristic greedy search algorithm among the best individuals of all generations in the iterative process of the optimization is proposed, which is beneficial to improve computation convergence and reach the optimum solution. A fast constraints processing mechanism based on the heuristic modifying strategy of unit violation is established to handle the coupling between system spinning reserve constraint and unit minimum up and down time constraint. The effectiveness of the proposed approach is verified by the UC simulations of test systems of 10-1000 units, the IEEE 118-bus system, and a large-scale power system of 270 units. The numerical simulating results show that the proposed UC solution method can achieve the near-optimal solutions in a reasonable time, improve the economic and environmental benefits of a large-scale power system, and is a general method to adapt to the changes of the objective function and constraints of a UC optimization.
- Published
- 2020
39. Recognizing Polyps in Wireless Endoscopy Images Using Deep Stacked Auto Encoder With Constraint Image Model in Flexible Medical Sensor Platform
- Author
-
Liangfu Li
- Subjects
0301 basic medicine ,General Computer Science ,Wireless endoscopy ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,k-nearest neighbors algorithm ,Image (mathematics) ,03 medical and health sciences ,constraint image ,0302 clinical medicine ,Wireless ,General Materials Science ,Computer vision ,business.industry ,General Engineering ,Object (computer science) ,Autoencoder ,Constraint (information theory) ,Range (mathematics) ,030104 developmental biology ,Feature (computer vision) ,deep stacked auto encoder ,recognizing polyps ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,030217 neurology & neurosurgery - Abstract
In the recent past, Wireless endoscopy (WE) helps physicians to study the digestive tract at the cost of a wide range of images without surgery. The major challenge arises from the complication of robust image characterization in computer-aided WE pictorial diagnostics. The purpose of the research is to provide a biased definition of WE images and to enable medical professionals to automatically identify polyp images. In this paper, the learning feature approach called Deep Stacked Auto Encoder with Constraint Image (DSAECI) for recognizing polyps in WE images has been proposed. This DSAECI differs from the Traditional Method of Auto Encoder (TMAE) due to the introduction of constraint image, created by the nearest neighbor's image and describing inherent object structures. The multiple limitations of images force users to keep images in the same category far away, which share similar learned characteristics and images in various categories and utilized the Flexible medical sensor platform for data analysis. The learned characteristics thus retain large inter-variances and small intra-images. The average total accuracy (OA) of our WE images method is 98.00%. The full results showed that the proposed DSAECI can correctly identify polyps in a WE-image and provide definition characterization for web images. In clinical trials, this approach could be further used to help doctors interpret repetitive images.
- Published
- 2020
40. Distributed Sensor Management Based on Target Losing Probability for Maneuvering Multi-Target Tracking
- Author
-
Ganlin Shan and Ce Pang
- Subjects
distributed sensor networks ,General Computer Science ,Scope (project management) ,Computer science ,Real-time computing ,General Engineering ,Mode (statistics) ,Tracking (particle physics) ,law.invention ,Constraint (information theory) ,Sensor management ,target losing probability ,law ,Management methods ,Multi target tracking ,General Materials Science ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Radar ,target tracking ,Management process ,lcsh:TK1-9971 - Abstract
This paper proposed a distributed sensor management method in the constraint of target losing probability for maneuvering multi-target tracking. Three main contributions existed in this paper, including adding the emission interception risk to the sensor management objective function, analyzing actual working modes of radars and regarding the target losing probability as one of constraints in sensor management. Two kind of radar working modes were introduced. They were the single target tracking mode and the multiple target tracking mode, leading to different kinds of sensor management methods. Then two sensor management models, containing sensor management in a large defending scope and in a small defending scope, were built. After that, the distributed sensor management process was introduced. Finally, simulations were conducted to show the effectiveness and efficiency of the proposed sensor management methods. By applying the proposed sensor management method, targets couldn't be easily lost and radar could be well protected at the same time.
- Published
- 2020
41. Constraint-Based Schedulability Analysis in Multiprocessor Real-Time Systems
- Author
-
Jin-Young Choi and Hyuk Lee
- Subjects
real-time schedulability analysis ,General Computer Science ,Computer science ,Distributed computing ,media_common.quotation_subject ,Constraint satisfaction problem ,General Engineering ,Multiprocessing ,satisfiability modulo theories ,Solver ,Scheduling (computing) ,Constraint (information theory) ,Set (abstract data type) ,Task (computing) ,multiprocessor schedulability analysis ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Function (engineering) ,lcsh:TK1-9971 ,media_common - Abstract
As the demand for more functions and capabilities in the system increases, the application of multiprocessors has brought advantages in many ways. Many systems now have multiprocessors, and safety-critical systems with real-time properties are no exception. In these systems where the satisfaction of real-time properties is directly linked to the safety of life, the predictability of the behavior is very important, and the behavior of the system can be predicted using the schedulability analysis. In this paper, we propose the schedulability analysis of a real-time system in a homogeneous multiprocessor environment through constraint solving approach. First, the constraints that must be satisfied in order for the system to function properly were derived. These include the constraints of the task behavior, the scheduling behavior, and the operating conditions of a homogeneous multiprocessor environment. Once all the constraints were identified, they were encoded in the form of first-order logic expressions. The encoded constraints are then entered into a constraint solver along with a set of tasks. Finally, the solver provides a schedulable answer if the set of tasks satisfies all the constraints.
- Published
- 2020
42. Optimal Generator Dispatching With Uncertain Conditions for Islanded Microgrid
- Author
-
Thi Thanh Binh Phan, Trong Nghia Le, Khang Nguyen, and Quoc Dung Phan
- Subjects
linear parametric optimization ,Mathematical optimization ,General Computer Science ,Computer science ,General Engineering ,PSO ,Particle swarm optimization ,Linearization ,load shedding ,Interval (mathematics) ,Bellman- Zadeh approach ,Generator (circuit theory) ,Constraint (information theory) ,microgrid ,Power Balance ,General Materials Science ,Microgrid ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Low voltage ,lcsh:TK1-9971 - Abstract
This paper proposes the models to solve the optimal generator dispatching problem in an islanded Micro grid with different uncertainties in the constraint and in the objective coefficient. The optimal problem with interval in the power balance constraint is considered as a linear parametric optimization problem, focusing on optimal solutions based on the lower and upper ends of this interval. When the coefficients of cost per power unit caused by load shedding are imprecise and expressed as intervals, the proposed model will be based on the two ends of interval and the problem is converted to a two-objective problem. With uncertainties in both constraint and objective coefficient, the problem will be treated as a four-objective one, considering the lower and upper ends of all intervals. All models are expressed in the linear forms and the linearization is carried out by Max-Affine method. To solve this multi-objective problem, the Bellman-Zadeh approach and Particle Swarm Optimization (PSO) algorithm are applied. The rationality of the proposed models is confirmed in the case study with one low voltage Micro Grid.
- Published
- 2020
43. A Novel and Adaptive Transient Fault-Tolerant Algorithm Considering Timing Constraint on Heterogeneous Systems
- Author
-
Chunhua Deng, Ziqi Zhu, and Jing Liu
- Subjects
fault-tolerant ,task scheduling ,General Computer Science ,Computer science ,Distributed computing ,General Engineering ,Reliability ,Replication (computing) ,Task (project management) ,Constraint (information theory) ,Fault tolerant algorithms ,deadline ,Benchmark (computing) ,General Materials Science ,Transient (computer programming) ,heterogeneous system ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Latency (engineering) ,lcsh:TK1-9971 ,Reliability (statistics) - Abstract
Due to high performance and low power consumption, heterogeneous processors are widely used in many real-time systems. In these systems, if tasks are not completed before deadline, it will cause disastrous consequences, and thus it is important to provide fault-tolerance. This paper proposes a novel, adaptive and transient fault-tolerant scheduling algorithm to solve the fault-tolerant problem in heterogeneous real-time systems, aiming to improve system reliability within a given deadline. Since task replication is efficient in improving system reliability, the proposed algorithm supports multiple replicas for each primary task and allows the primary tasks and their replicas to be scheduled on the same processor to increase reliability and lower latency. Also, the algorithm can dynamically adjust the number of replicas for each task to accommodate the deadline and ensure higher reliability. Simulated results show that the proposed algorithm can achieve higher reliability in comparison with existing and related fault-tolerant algorithms. To be specific, the proposed algorithm can obtain the reliability of 89.37% whereas the two existing algorithms DB-FTSA and FTSA obtain the reliability of 47.05% and 84.75% for the benchmark of sixty tasks, respectively, to be detailed in Fig. 4 in experiment.
- Published
- 2020
44. Improving the Shearer Positioning Accuracy Using the Shearer Motion Constraints in Longwall Panels
- Author
-
Wang Shijia and Shibo Wang
- Subjects
General Computer Science ,Shearer positioning ,inertial navigation system ,Computer science ,General Engineering ,Filter (signal processing) ,Motion (physics) ,Constraint (information theory) ,Control theory ,Position (vector) ,Face (geometry) ,General Materials Science ,Longwall mining ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,Inertial navigation system ,Information filtering system ,information filter - Abstract
The shearer positioning method with an inertial navigation system (INS) is feasible in a longwall mining face. However, INS error greatly increases with time, which reduces the shearer positioning accuracy. This study aims to improve the shearer positioning accuracy using the shearer motion constraints. Firstly, according to the longwall mining method, two constraints on the shearer velocity and position were obtained. Then, velocity constraint information and position constraint information were modeled to obtain the observation equations in the filter. In order to improve the shearer positioning accuracy, an information filter was utilized to integrate the velocity constraint information and position constraint information. Finally, an experiment was performed to validate the effectiveness of the proposed algorithm. The result showed that the shearer positioning accuracy improved by 56% in the east and 54% in the north.
- Published
- 2020
45. Properties and Constructions of Constrained Codes for DNA-Based Data Storage
- Author
-
Kui Cai and Kees A. Schouhamer Immink
- Subjects
0301 basic medicine ,Imagination ,General Computer Science ,Computer science ,media_common.quotation_subject ,balanced words ,Binary number ,maximum runlength ,02 engineering and technology ,03 medical and health sciences ,Search engine ,Constrained coding ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,General Materials Science ,Electrical and Electronic Engineering ,media_common ,storage systems ,Repetition (rhetorical device) ,business.industry ,General Engineering ,020206 networking & telecommunications ,Constraint (information theory) ,030104 developmental biology ,Computer data storage ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Algorithm ,lcsh:TK1-9971 ,DNA-based storage - Abstract
We describe properties and constructions of constraint-based codes for DNA-based data storage which account for the maximum repetition length and AT/GC balance. Generating functions and approximations are presented for computing the number of sequences with maximum repetition length and AT/GC balance constraint. We describe routines for translating binary runlength limited and/or balanced strings into DNA strands, and compute the efficiency of such routines. Expressions for the redundancy of codes that account for both the maximum repetition length and AT/GC balance are derived.
- Published
- 2020
46. Design of Non-Adaptive Querying Policies Based on Error Control Coding
- Author
-
Qin Huang, Zulin Wang, Simeng Zheng, and Shuai Wang
- Subjects
Block code ,LDPC ,General Computer Science ,Mean squared error ,Computer science ,Small number ,Minimum distance ,General Engineering ,quantized mean squared error ,Function (mathematics) ,Error control coding ,linear codes ,Constraint (information theory) ,RC constraint ,Hamming distance ,Bounded function ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,Querying policies ,lcsh:TK1-9971 - Abstract
This paper designs non-adaptive querying policies (NQPs) for the noisy 20 questions game based on error-correction codes. The querying accuracy of a specific NQP is upper bounded by a function of the minimum distance among its codewords. As a result, the row-column constraint is put on codewords of NQPs for scenarios with limited detection to enlarge their minimum distance for improving the querying accuracy, where the limited detection means that only a small number of intervals can be detected at each querying round. Then, it is used to protect the least significant bits in unequal error protection NQPs with linear codes for unlimited detection scenarios. In particular, these structures allow us to deterministically optimize parameters for better querying accuracy. Simulation results show that our methods achieve quantized mean squared error up to several magnitudes compared with the NQPs based on random block coding.
- Published
- 2020
47. Integrated Strapdown Missile Guidance and Control With Field-of-View Constraint and Actuator Saturation
- Author
-
Shifeng Zhang, Jiayi Tian, Haifeng Chen, Huabo Yang, and Xuancen Liu
- Subjects
Inertial frame of reference ,integrated guidance and control (IGC) ,General Computer Science ,Computer science ,Angle of attack ,General Engineering ,Actuator saturation ,FOV constraint ,Field of view ,integral-type barrier Lyapunov function (iBLF) ,Missile guidance ,Tracking (particle physics) ,body-LOS (BLOS) angle ,dynamic surface control ,Constraint (information theory) ,Missile ,Control theory ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 - Abstract
This paper presents an integrated guidance and control (IGC) law for the strapdown homing missile with consideration of the field-of-view (FOV) constraint and actuator saturation. Given that the commonly-required guidance information, such as the inertial line-of-sight (LOS) angle and/or its angular rate, cannot be measured by the strapdown seeker, a detailed IGC model considering the gravity and time-varying missile velocity is first derived based on the only measurable information, the body-LOS (BLOS) angle. Then a novel IGC controller is designed for this model by means of the integral-type Barrier Lyapunov Function (iBLF) based dynamic surface control technique. This IGC controller following the pure tracking principle is capable of forcing the BLOS angle to track the negative angle of attack while satisfying the FOV constraint and actuator saturation in an integrated manner, thereby guaranteeing a precise attack on a stationary ground target. The stability of closed-loop system and the boundedness of constrained BLOS angle are both proved strictly, and the performance of proposed IGC controller is thoroughly testified by method comparisons and Monte-Carlo analysis.
- Published
- 2020
48. Constellation Design for Single Photodetector Based CSK With Probabilistic Shaping and White Color Balance
- Author
-
Anand Srivastava and Dil Nashin Anwar
- Subjects
General Computer Science ,Colour shift keying (CSK) ,probabilistic shaping (PS) ,Computer science ,Transmitter ,General Engineering ,Color balance ,Photodetector ,Keying ,constellation optimization ,Constraint (information theory) ,Tone (musical instrument) ,Modulation ,visible light communication (VLC) ,Modulation (music) ,General Materials Science ,Forward error correction ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,lcsh:TK1-9971 - Abstract
Research and development of Li-Fi (Light Fidelity) in Internet-of-things (IoT) has created significant interest among researchers. The low-cost version of standard color shift keying (CSK) modulation scheme having single photodetector (PD) at the receiver can become an alternative to on-off keying (OOK) in IoT sensor networks as an M -ary CSK modulation scheme provides log2M times more data rate than that of OOK. This work revolves around optimizing the constellation points of single PD based CSK (CSK-1PD) to achieve a more power-efficient modulation scheme. The optimization has been done with and without average white tone constraint for uniform and non-uniform (exponential, Maxwell-Boltzmann, Pareto) source distributions. The constellation design strategy is based on maximizing the minimum distance among the differently distributed symbols. In the case of non-uniform distributions, the constellations points have been optimized by geometrically shaping the points based on their probabilistic shaping (PS). The optimized constellation points (OCPs) of CSK-1PD without white tone constraint provide higher signal-to-noise ratio (SNR) gain at forward error correction (FEC) limit symbol error rate (SER) as compared with strict white tone constraint. Further, the strict white tone constraint has been relaxed by considering the whole white light region in the CIE 1931 chromaticity diagram as white tone. The OCPs for uniform data with relaxed white tone constraint achieves SNR gain similar to without white tone constraint. However, for probabilistically shaped symbols, the SNR gain achieved from OCPs improves from strict white tone constraint but remains less than the without white tone constraint. A novel method to utilize an additional RGB LED at the transmitter side has been proposed and designed to maintain any white tone light in the white light region without degrading the maximum achieved SNR gain.
- Published
- 2020
49. An Effective Discrete Grey Wolf Optimization Algorithm for Solving the Packing Problem
- Author
-
Peng Wang, Yunqing Rao, and Qiang Luo
- Subjects
Mathematical optimization ,General Computer Science ,Optimization algorithm ,Computer science ,swarm intelligence ,discrete grey wolf optimization ,General Engineering ,Strip packing ,Measure (mathematics) ,Constraint (information theory) ,Packing problems ,Packing problem ,meta-heuristic algorithm ,Benchmark (computing) ,General Materials Science ,Rectangle ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,Coding (social sciences) - Abstract
This article proposes a novel discrete grey wolf optimization for the packing problem, called the two-dimensional strip packing (2DSP) problem without guillotine constraint. The 2DSP involves cutting pieces from a stock sheet with the objective of minimizing waste. To solve the 2DSP problem by the discrete grey wolf algorithm, many strategies are originally proposed. The searching and attacking operators in the algorithm are redesigned to guarantee coding effectiveness. A novel approach to measure the distance between the wolves is presented. In addition, an improved best-fit strategy is developed to solve this packing problem. The best-fit strategy divides the situation into five cases based on the width and length of the rectangle. Computational results on widely used benchmark instances show that the novel discrete grey wolf algorithm can solve the 2DSP problem effectively, and surpasses most of the previously reported meta-heuristic algorithms.
- Published
- 2020
50. Constant Reflection Attenuation Constraint for Incoming Signals on Metasurface in Positional Modulation Design
- Author
-
Bin Liang, Jun Shi, and Bo Zhang
- Subjects
Physics ,General Computer Science ,Acoustics ,Attenuation ,020208 electrical & electronic engineering ,constant reflection attenuation constraint ,General Engineering ,Process (computing) ,020206 networking & telecommunications ,02 engineering and technology ,Signal ,Constraint (information theory) ,metasurface ,Amplitude ,Modulation ,0202 electrical engineering, electronic engineering, information engineering ,Reflection (physics) ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,Constant (mathematics) ,lcsh:TK1-9971 ,Positional modulation - Abstract
Metasurface based positional modulation design has been introduced recently, where a given modulation pattern can only be received at certain desired positions by the proposed method. However, the magnitude of weight coefficient of each element on metasurface varies from one other, representing an attenuation of the amplitude of incoming signal in different degrees. In this paper, a constant reflection attenuation constraint for incoming signals is proposed for the first time, and the proposed method can be extended with a post-processing process to the ideal case where there is no reflection attenuation.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.