231,919 results
Search Results
2. A BLUEPRINT FOR MAKING QUANTUM COMPUTERS EASIER TO PROGRAM
- Subjects
Artificial intelligence ,Computer science ,Algorithms ,Algorithm ,Artificial intelligence ,News, opinion and commentary ,Massachusetts Institute of Technology - Abstract
CAMBRIDGE, Mass. -- The following information was released by the Massachusetts Institute of Technology (MIT): A CSAIL study highlights why it is so challenging to program a quantum computer to [...]
- Published
- 2024
3. Israeli mathematician Avi Wigderson clinches ACM A.M. Turing Award
- Subjects
Computer science ,Algorithms ,Algorithm - Abstract
Byline: Just Earth News ACM, the Association for Computing Machinery, has named Avi Wigderson as recipient of the 2023 ACM A.M. Turing Award for foundational contributions to the theory of [...]
- Published
- 2024
4. AVI WIGDERSON RECEIVES ACM A.M. TURING AWARD FOR GROUNDBREAKING INSIGHTS ON RANDOMNESS
- Subjects
Defined contribution plans ,Scientists -- Achievements and awards ,Computer science ,Algorithms ,Algorithm ,Business ,News, opinion and commentary - Abstract
Leading Theoretical Computer Scientist Cited for Field-Defining Contributions NEW YORK, April 10, 2024 /PRNewswire/ -- ACM, the Association for Computing Machinery, today named Avi Wigderson as recipient of the 2023 [...]
- Published
- 2024
5. The utilization of machine learning on studying Hadith in Islam: A systematic literature review
- Author
-
Sulistio, Bambang, Ramadhan, Arief, Abdurachman, Edi, Zarlis, Muhammad, and Trisetyarso, Agung
- Published
- 2024
- Full Text
- View/download PDF
6. AHiLS—An Algorithm for Establishing Hierarchy among Detected Weak Local Reflection Symmetries in Raster Images.
- Author
-
Podgorelec, David, Kolingerová, Ivana, Lovenjak, Luka, and Žalik, Borut
- Abstract
A new algorithm is presented for detecting the local weak reflection symmetries in raster images. It uses contours extracted from the segmented image. A convex hull is constructed on the contours, and so-called anchor points are placed on it. The bundles of symmetry line candidates are placed in these points. Each line splits the plane into two open half-planes and arranges the contours into three sets: the first contains the contours pierced by the considered line, while the second and the third include the contours located in one or the other half-plane. The contours are then checked for the reflection symmetry. This means looking for self-symmetries in the first set, and symmetric pairs with one contour in the second set and one contour in the third set. The line which is evaluated as the best symmetry line is selected. After that, the symmetric contours are removed from sets two and three. The remaining contours are then checked again for symmetry. A multi-branch tree representing the hierarchy of the detected local symmetries is the result of the algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. New Computer Science Study Findings Reported from Institute of Information Technologies (A Rule-Based Algorithm and Its Specializations for Measuring the Complexity of Software in Educational Digital Environments)
- Subjects
Computer programming ,Computer science ,Algorithms ,Computer programming ,Algorithm - Abstract
2024 MAR 27 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- Investigators discuss new findings in computer science. According to news reporting from Moscow, Russia, […]
- Published
- 2024
8. Studies from School of Computer Science and Technology Provide New Data on Applied Sciences (GS-AGC: An Adaptive Glare Suppression Algorithm Based on Regional Brightness Perception)
- Subjects
Food processing machinery industry ,Computer science ,Algorithms ,Health ,Science and technology ,Algorithm - Abstract
2024 MAR 1 (NewsRx) -- By a News Reporter-Staff News Editor at Science Letter -- A new study on applied sciences is now available. According to news reporting out of [...]
- Published
- 2024
9. New Computer Science Study Findings Reported from Laboratory of Pure and Applied Mathematics (Optimized Fixed-Time Synergetic Controller via a modified Salp Swarm Algorithm for Acute and Chronic HBV Transmission System)
- Subjects
Mathematical optimization ,Hepatitis B ,Computer science ,Algorithms ,Algorithm - Abstract
2023 DEC 13 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- A new study on computer science is now available. According to news reporting out […]
- Published
- 2023
10. Study Findings on Computer Science Discussed by Researchers at Department of Informatics (A New Integral Function Algorithm for Global Optimization and Its Application to the Data Clustering Problem)
- Subjects
Computer science ,Algorithms ,Algorithm - Abstract
2023 DEC 13 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- Data detailed on computer science have been presented. According to news reporting out of […]
- Published
- 2023
11. A New Transformation Technique for Reducing Information Entropy: A Case Study on Greyscale Raster Images.
- Author
-
Žalik, Borut, Strnad, Damjan, Podgorelec, David, Kolingerová, Ivana, Lukač, Luka, Lukač, Niko, Kolmanič, Simon, Žalik, Krista Rizman, and Kohek, Štefan
- Subjects
- *
HILBERT space , *ENTROPY (Information theory) - Abstract
This paper proposes a new string transformation technique called Move with Interleaving (MwI). Four possible ways of rearranging 2D raster images into 1D sequences of values are applied, including scan-line, left-right, strip-based, and Hilbert arrangements. Experiments on 32 benchmark greyscale raster images of various resolutions demonstrated that the proposed transformation reduces information entropy to a similar extent as the combination of the Burrows–Wheeler transform followed by the Move-To-Front or the Inversion Frequencies. The proposed transformation MwI yields the best result among all the considered transformations when the Hilbert arrangement is applied. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Algorithms for the Uniqueness of the Longest Common Subsequence.
- Author
-
Wang, Yue
- Subjects
ALGORITHMS ,COMPUTER science - Abstract
Given several number sequences, determining the longest common subsequence is a classical problem in computer science. This problem has applications in bioinformatics, especially determining transposable genes. Nevertheless, related works only consider how to find one longest common subsequence. In this paper, we consider how to determine the uniqueness of the longest common subsequence. If there are multiple longest common subsequences, we also determine which number appears in all/some/none of the longest common subsequences. We focus on four scenarios: (1) linear sequences without duplicated numbers; (2) circular sequences without duplicated numbers; (3) linear sequences with duplicated numbers; (4) circular sequences with duplicated numbers. We develop corresponding algorithms and apply them to gene sequencing data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Research Results from Department of Computer Science Update Knowledge of Engineering (A Novel Multi-Objective Evolutionary Algorithm to Address Turnover in the Software Project Scheduling Problem Based on Best Fit Skills Criterion)
- Subjects
Algorithm ,Computer science ,Algorithms - Abstract
2023 SEP 13 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- Fresh data on engineering are presented in a new report. According to news reporting […]
- Published
- 2023
14. Federal Research Center Researcher Describes Advances in Computer Science (Adaptive Sparse Grids with Nonlinear Basis in Interval Problems for Dynamical Systems)
- Subjects
Computer science ,Algorithms ,Algorithm - Abstract
2023 AUG 23 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- Researchers detail new data in computer science. According to news reporting out of Moscow, […]
- Published
- 2023
15. An Iterative Wavelet Threshold for Signal Denoising
- Author
-
Renato J. Cintra, Alice de Jesus Kozakevicius, and Fábio M. Bayer
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Iterative method ,Computer science ,Noise reduction ,Monte Carlo method ,FOS: Physical sciences ,Mathematics - Statistics Theory ,Statistics Theory (math.ST) ,02 engineering and technology ,Signal ,Methodology (stat.ME) ,Wavelet ,FOS: Mathematics ,FOS: Electrical engineering, electronic engineering, information engineering ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Numerical Analysis ,Electrical and Electronic Engineering ,Electrical Engineering and Systems Science - Signal Processing ,Statistics - Methodology ,020206 networking & telecommunications ,Numerical Analysis (math.NA) ,Filter (signal processing) ,Adaptive filter ,Control and Systems Engineering ,Physics - Data Analysis, Statistics and Probability ,Signal Processing ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Algorithm ,Data Analysis, Statistics and Probability (physics.data-an) ,Software - Abstract
This paper introduces an adaptive filtering process based on shrinking wavelet coefficients from the corresponding signal wavelet representation. The filtering procedure considers a threshold method determined by an iterative algorithm inspired by the control charts application, which is a tool of the statistical process control (SPC). The proposed method, called SpcShrink, is able to discriminate wavelet coefficients that significantly represent the signal of interest. The SpcShrink is algorithmically presented and numerically evaluated according to Monte Carlo simulations. Two empirical applications to real biomedical data filtering are also included and discussed. The SpcShrink shows superior performance when compared with competing algorithms., 19 pages, 10 figures, 2 tables
- Published
- 2023
16. Greedy Sparsification WM Algorithm for Endmember Induction in Hyperspectral Images
- Author
-
Ion Marques and Manuel Graña
- Subjects
Endmember ,Spectral signature ,Statistics::Applications ,Pixel ,business.industry ,Computer science ,Hyperspectral imaging ,Pattern recognition ,Row and column spaces ,Statistics::Machine Learning ,Computer Science::Computer Vision and Pattern Recognition ,Conjugate gradient method ,Convex polytope ,Affine transformation ,Artificial intelligence ,business ,Algorithm - Abstract
The Linear Mixing Model (LMM) of hyperspectral images asumes that pixel spectra are affine combinations of basic spectral signatures, called endmembers, which are the vertices of a convex polytope covering the image data. Endmember induction algorithms (EIA) extract the endmembers from the image data, obtaining a precise spectral characterization of the image. The WM algorithm assumes that a set of Affine Independent vectors can be extracted from the rows and columns of dual Lattice Autoassociative Memories (LAAM) built on the image spectra. Indeed, the set of endmembers induced by this algorithm defines a convex polytope covering the hyperspectral image data. However, the number of induced endmembers obtained by this procedure is too high for practical purposes, besides they are highly correlated. In this paper, we apply a greedy sparsification algorithm aiming to select the minimal set of endmembers that explains the data in the image. We report results on a well known benchmark image.
- Published
- 2013
17. Data on Computer Science Detailed by Researchers at Shenzhen Institute of Information Technology (Backtracking search optimization algorithm with dual scatter search strategy for automated test case generation)
- Subjects
Mathematical optimization ,Computer science ,Algorithms ,Algorithm - Abstract
2023 JUL 5 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- Data detailed on computer science have been presented. According to news originating from Guangdong, […]
- Published
- 2023
18. Data Mining for Faster, Interpretable Solutions to Inverse Problems: A Case Study Using Additive Manufacturing
- Author
-
Ravi Ponmalai, Juliette Franzman, and Chandrika Kamath
- Subjects
Self-organizing map ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer science ,Diagonal ,Tapering ,Machine Learning (cs.LG) ,symbols.namesake ,FOS: Mathematics ,Neural and Evolutionary Computing (cs.NE) ,Mathematics - Numerical Analysis ,Gaussian process ,Kohonen maps ,Block (data storage) ,Covariance matrix ,Computer Science - Neural and Evolutionary Computing ,QA75.5-76.95 ,Numerical Analysis (math.NA) ,Inverse problem ,Code surrogate ,Electronic computers. Computer science ,symbols ,Q300-390 ,Cybernetics ,Algorithm ,Cholesky decomposition - Abstract
Solving inverse problems, where we find the input values that result in desired values of outputs, can be challenging. The solution process is often computationally expensive and it can be difficult to interpret the solution in high-dimensional input spaces. In this paper, we use a problem from additive manufacturing to address these two issues with the intent of making it easier to solve inverse problems and exploit their results. First, focusing on Gaussian process surrogates that are used to solve inverse problems, we describe how a simple modification to the idea of tapering can substantially speed up the surrogate without losing accuracy in prediction. Second, we demonstrate that Kohonen self-organizing maps can be used to visualize and interpret the solution to the inverse problem in the high-dimensional input space. For our data set, as not all input dimensions are equally important, we show that using weighted distances results in a better organized map that makes the relationships among the inputs obvious., 16 figures and 4 tables
- Published
- 2023
19. Traffic-aware efficient consistency update in NFV-enabled software defined networking
- Author
-
Li, Pan, Liu, Guiyan, Guo, Songtao, and Zeng, Yue
- Subjects
Traffic congestion ,Virtualization ,Computer science ,Algorithms ,Algorithm ,Business ,Computers ,Telecommunications industry - Abstract
Keywords Consistency update; Policy consistency; Transient congestion; Software defined networking; Network function virtualization Abstract In network function virtualization(NFV)-enabled software defined networks, the controller needs to frequently update the flow forwarding rules in the data plane to adapt to dynamic changes in network topologies or service requests. However, inconsistent rule updates may lead to blackholes, loops, transient congestion or policy violations (e.g., packets do not traverse designated network functions in a specific order), resulting in service interruption and throughput degradation. Therefore, this paper proposes an effective rule consistent update mechanism to avoid the above four problems simultaneously, while improving network throughput and satisfying user requests. Specifically, we first build three effective models to avoid blackholes, loops, and policy violations. Then, considering that network function nodes may change the sizes of their processed flows, we build a congestion avoidance model based on traffic changes to avoid congestion, which can reduce unnecessary rule update delays and packet loss. Subsequently, we prove that the consistent update problem constructed above is NP-hard, and then design an effective heuristic rule consistent update algorithm to obtain the rule update sequence that can simultaneously avoid blackholes, loops, congestion, and policy violations. Extensive trace-driven simulation results show that compared with the existing update methods, our proposed method can improve the success rate by up to 20.6% and reduce the maximum link utilization by up to 7.5%. Author Affiliation: (a) College of Electronic and Information Engineering, Southwest University, Chongqing, 400715, China (b) College of Computer Science, Chongqing University, Chongqing, 400044, China (c) Department of Computer Science and Technology, Nanjing University, Nanjing, 210023, China * Corresponding authors. Article History: Received 19 October 2022; Revised 25 March 2023; Accepted 31 March 2023 Byline: Pan Li (a), Guiyan Liu [gyliu@cqu.edu.cn] (b,*), Songtao Guo [guosongtao@cqu.edu.cn] (b,*), Yue Zeng (c)
- Published
- 2023
- Full Text
- View/download PDF
20. Optimal algorithm for min-max line barrier coverage with mobile sensors on 2-dimensional plane
- Author
-
Yao, Pei, Guo, Longkun, Li, Peng, and Lin, Jiawei
- Subjects
Sensors ,Computer science ,Algorithms ,Energy consumption ,Algorithm ,Business ,Computers ,Telecommunications industry - Abstract
Keywords Barrier coverage; Mobile sensor; Exact algorithm; Optimal solution; Approximation algorithm Abstract Emerging IoT applications impose line barrier coverage (LBC) tasks with min--max movement objective due to requirements of energy balance, fairness, etc. In LBC, we are given a line barrier and a set of n sensors distributed on the plane. The aim is to move the sensors to fully cover the given barrier, such that the maximum movement of the mobile sensors is minimized and hence the energy consumption of the sensors are balanced. This paper proposes an exact algorithm to optimally solve LBC, which deserves a runtime O(n.sup.2) compared favorably to the previous state-of-art runtime O(n.sup.2logn). The key idea of the improvement is acceleration-via-approximation: devise a novel approximation algorithm and then use it to accelerate the calculation of optimum solutions. Extensive numerical experiments were carried out to evaluate the practical performance of our algorithm against other baselines, demonstrating its performance gain over the previous state-of-art algorithms. Author Affiliation: (a) College of Mathematics and Statistics, Anhui Normal University, Wuhu 241002, PR China (b) School of Computer Science, Qilu University of Technology, Jinan 250301, PR China (c) School of Mathematics and Statistics, Fuzhou University, Fuzhou 360116, PR China (d) Google LLC, Kirkland, WA, Unite States (e) College of Computer and Data Science/ College of Software, Fuzhou University, Fuzhou 360116, PR China * Corresponding author. Article History: Received 4 August 2022; Revised 15 February 2023; Accepted 14 March 2023 Byline: Pei Yao [pei.yao@foxmail.com] (a,c), Longkun Guo [longkun.guo@fzu.edu.cn] (b,c,*), Peng Li [penl@google.com] (d), Jiawei Lin [jiawei.lin_1931@foxmail.com] (e)
- Published
- 2023
- Full Text
- View/download PDF
21. Concurrent error detection and fault-tolerance in linear digital state variable systems
- Author
-
M.A. d'Abreu and A. Chatterjee
- Subjects
Data flow diagram ,State variable ,Soft error ,business.industry ,Computer science ,Electronic engineering ,Fault tolerance ,business ,Fault (power engineering) ,Error detection and correction ,Algorithm ,Digital signal processing ,Data-flow analysis - Abstract
The problem of error detection and correction (both transient and permanent) in linear digital state variable systems, a very large class of circuits used in digital signal processing and control, is considered. The case of single faulty modules (adders, multipliers, shifters, etc.) is studied, and general circuit data flow graphs (with and without fanout) that realize linear digital state variable systems are analyzed to determine how additional system states might be added to the data flow graph to achieve error detection and correction. It is seen that error detection and correction can be achieved by the addition of a relatively small amount of additional hardware which functions as the checking circuitry. Next, error detection under multiple faulty modules with and without fanout of the module outputs is studied. An analysis tool called the gain matrix is introduced. The problem of fault location and correction of single faults is discussed. Recursive as well as nonrecursive systems can be handled. >
- Published
- 2002
22. Algorithms and Bounds for Dynamic Causal Modeling of Brain Connectivity
- Author
-
A. Lee Swindlehurst and Shun-Chi Wu
- Subjects
Nonlinear system ,Quantitative Biology::Neurons and Cognition ,medicine.diagnostic_test ,Computer science ,Estimation theory ,Signal Processing ,medicine ,Electrical and Electronic Engineering ,Electroencephalography ,Algorithm ,Causal model - Abstract
Recent advances in neurophysiology have led to the development of complex dynamical models that describe the connections and causal interactions between different regions of the brain. These models are able to accurately mimic the event-related potentials observed by EEG/MEG measurement systems, and are considered to be key components for understanding brain functionality. In this paper, we focus on a class of nonlinear dynamic causal models (DCM) that are described by a set of connectivity parameters. In practice, the DCM parameters are inferred using data obtained by an EEG or MEG sensor array in response to a certain event or stimulus, and then used to analyze the strength and direction of the causal interactions between different brain regions. The usefulness of these parameters in this process will depend on how accurately they can be estimated, which in turn will depend on noise, the sampling rate, number of data samples collected, the accuracy of the source localization and reconstruction steps, etc. The goals of this paper are to present several algorithms for DCM parameter estimation, derive Cramer-Rao performance bounds for the estimates, and compare the accuracy of the algorithms against the theoretical performance limits under a variety of circumstances. The influence of noise and sampling rate will be explicitly investigated.
- Published
- 2013
23. Hierarchical Fault Location Method for Active Distribution Network with High Penetration of Distributed Generation
- Author
-
Ma Rui, Shenxi Zhang, Li Xuefeng, Qingping Zhang, Huang Mingyu, Zhendong Li, Gao Bo, and Yan Zhenhua
- Subjects
Smart grid ,Location model ,business.industry ,Computer science ,Distributed generation ,Genetic algorithm ,Convergence (routing) ,Fault tolerance ,business ,Fault (power engineering) ,Integer programming ,Algorithm - Abstract
With the increasingly integration of distributed generator (DG) in active distribution network (ADN), the fault location problem is facing more challenges. This paper proposes a hierarchical fault location model for ADN, in which the upper-layer model is to determine the area location of the fault and the lower-layer model is to get the section location of the fault. To solve the hierarchical fault location model in an efficient way, a hybrid solving strategy combing the genetic algorithm and the integer linear programming method is applied. Case studies are carried out on a modified IEEE 33-bus distribution network, in which the DGs are of high penetration. The results show that when a single or multiple fault occurs in the ADN, the hierarchical fault location method can detect the fault location more accurately than the traditional single-layer fault location method. And the results also indicate that the model and algorithm used in this paper perform significantly better than the single model and single algorithm in terms of convergence speed, accuracy, and fault tolerance.
- Published
- 2020
24. A general approach for error modeling of machine tools
- Author
-
Wenjie Tian, Dawei Zhang, Tian Huang, and Weiguo Gao
- Subjects
Generality ,business.product_category ,business.industry ,Computer science ,Mechanical Engineering ,Kinematics ,Machine learning ,computer.software_genre ,Industrial and Manufacturing Engineering ,Field (computer science) ,Machine tool ,Compensation (engineering) ,Linear map ,Component (UML) ,Artificial intelligence ,business ,Algorithm ,computer ,Human error assessment and reduction technique - Abstract
This paper presents a general and systematic approach for geometric error modeling of machine tools due to the geometric errors arising from manufacturing and assembly. The approach can be implemented in three steps: (1) development of a linear map between the pose error twist and source errors within machine tool kinematic chains using homogeneous transformation matrix method; (2) formulation of a linear map between the pose error twist and the error intensities of a machine tool; (3) combination of these two models for error separation. The merit of this approach lies in that it enables the source errors affecting the compensatable and uncompensatable pose accuracy of the machine tool to be explicitly separated, thereby providing designers and/or field engineers with an informative guideline for the accuracy improvement by suitable measures, i.e. component tolerancing in design, manufacturing and assembly processes, and error compensation. Two typical multi-axis machine tools are taken as examples to illustrate the generality and effectiveness of this approach.
- Published
- 2014
25. An early CU partition mode decision algorithm in VVC based on variogram for virtual reality 360 degree videos
- Author
-
Yan Hou, Zhi Liu, and Mengmeng Zhang
- Subjects
Degree (graph theory) ,Computer science ,Signal Processing ,Mode (statistics) ,Virtual reality ,Electrical and Electronic Engineering ,Variogram ,Algorithm ,Partition (database) ,Information Systems - Abstract
360-degree videos have become increasingly popular with the application of virtual reality (VR) technology. To encode such kind of videos with ultra-high resolution, an efficient and real-time video encoder becomes a key requirement. The Versatile Video Coding (VVC) standard has good coding performance. However, it has pretty high computational complexity which increasing the application cost of 360-degree videos. Among them, the decision of the quadtree with nested multi-type tree (QTMT) partitioning structure is one of the time-consuming procedures. In this paper, based on the characteristics of 360-degree video with Equirectangular projection (ERP) format, the empirical variogram combined with Mahalanobis distance is introduced to measure the difference between the horizontal and vertical directions of the CU, and a fast partition algorithm is proposed. The experimental results show that the algorithm saves 32.13% of the coding time with only an increase of 0.66% in BDBR.
- Published
- 2023
26. Autoregressive Text Generation Beyond Feedback Loops
- Author
-
Thomas Hofmann, Florian Schmidt, Stephan Mandt, Padó, Sebastian, and Huang, Ruihong
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Science - Computation and Language ,State-space representation ,Computer science ,Machine Learning (stat.ML) ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Machine Learning (cs.LG) ,Autoregressive model ,Statistics - Machine Learning ,0202 electrical engineering, electronic engineering, information engineering ,Text generation ,020201 artificial intelligence & image processing ,State (computer science) ,Algorithm ,Computation and Language (cs.CL) ,Word (computer architecture) ,0105 earth and related environmental sciences - Abstract
Autoregressive state transitions, where predictions are conditioned on past predictions, are the predominant choice for both deterministic and stochastic sequential models. However, autoregressive feedback exposes the evolution of the hidden state trajectory to potential biases from well-known train-test discrepancies. In this paper, we combine a latent state space model with a CRF observation model. We argue that such autoregressive observation models form an interesting middle ground that expresses local correlations on the word level but keeps the state evolution non-autoregressive. On unconditional sentence generation we show performance improvements compared to RNN and GAN baselines while avoiding some prototypical failure modes of autoregressive models., Comment: emnlp camera ready
- Published
- 2019
- Full Text
- View/download PDF
27. Very Short-Term Renewable Energy Power Prediction Using XGBoost Optimized by TPE Algorithm
- Author
-
Haijun Chang, Fusuo Liu, Wei Li, Dongning Zhao, Sun Zhongqing, Zhenchuan Ma, and Chen Chunmeng
- Subjects
Support vector machine ,Hyperparameter ,Electric power system ,Wind power ,Computer science ,business.industry ,Economic dispatch ,Wind power forecasting ,Feature selection ,business ,Algorithm ,Renewable energy - Abstract
Renewable energy power prediction is crucial to economic dispatch and reliable operation of power systems. This paper proposes a wind power forecasting approach based on the Extreme Gradient Boosting (XGBoost) algorithm. XGBoost is not only an effective feature selection method but also an accurate forecasting approach. In order to avoid excessive manual interventions for hyperparameter tuning, the Tree-Structured Parzen Estimator (TPE) model is presented to optimize the hyperparameters of XGBoost. This forecasting strategy has been tested in a real wind farm in Spain, compared with Persistence and Support Vector Regression (SVR). The results show that the XGBoost algorithm has higher accuracy and is a novel effective approach for very short-term wind power prediction.
- Published
- 2020
28. Isoparametric fitting: A method for approximating full-field experimental data distributed on any shaped 3D domain
- Author
-
Luigi Bruno
- Subjects
Surface (mathematics) ,Mathematical optimization ,Computer science ,Mechanical Engineering ,B-spline ,Experimental data ,Image processing ,02 engineering and technology ,021001 nanoscience & nanotechnology ,01 natural sciences ,Atomic and Molecular Physics, and Optics ,Domain (mathematical analysis) ,Electronic, Optical and Magnetic Materials ,010309 optics ,Speckle pattern ,Noise ,Interferometry ,0103 physical sciences ,Electrical and Electronic Engineering ,0210 nano-technology ,Algorithm - Abstract
With the present paper, the author proposes a fitting method for approximating experimental data retrieved from any full-field technique. Unlike most of the fitting procedures, the method works on data distributed on a surface of any shape, and the mathematical model is able to take into account of both the 3D shape of the surface and of the experimental quantity to be fitted. The paper reports all the mathematical steps necessary for applying the method, which was tested on two sets of experimental data obtained by an out-of-plane speckle interferometer working in two different conditions of noise. Experimental results showed the capability of the method to work in presence of high level of noise.
- Published
- 2016
29. I Unintentionally Created a Biased AI Algorithm 25 Years Ago--Tech Companies Are Still Making the Same Mistake
- Subjects
Artificial intelligence ,Racism ,Computer science ,Algorithms ,News, opinion and commentary ,Sports and fitness ,Algorithm ,Artificial intelligence - Abstract
A 'horrible déjà vu moment' with lessons for today by Professor of Computer Science John MacCormick In 1998, I unintentionally created a racially biased artificial intelligence algorithm. There are lessons [...]
- Published
- 2023
30. The PC Algorithm and the Inference to Constitution
- Author
-
Lorenzo Casini and Michael Baumgartner
- Subjects
Philosophy ,History ,Variable (computer science) ,History and Philosophy of Science ,Computer science ,Constitution ,media_common.quotation_subject ,Bayesian network ,Inference ,Causation ,Algorithm ,Underwriting ,media_common - Abstract
Alexander Gebharter (2017) has proposed to use one of the best known Bayesian network (BN) causal discovery algorithms, PC, to identify the constitutive dependencies underwriting mechanistic explanations. His proposal assumes that mechanistic constitution behaves like deterministic direct causation, such that PC is directly applicable to mixed variable sets featuring both causal and constitutive dependencies. Gebharter claims that such mixed sets, under certain restrictions, comply with PC’s background assumptions. The aim of this paper is to show that Gebharter’s proposal incurs severe problems, ultimately rooted in the widespread non-compliance of mechanistic systems with PC’s assumptions. This casts severe doubts on the attempt to implicitly define constitution as a form of deterministic direct causation complying with PC’s assumptions.
- Published
- 2023
31. The n-Diffie-Hellman Problem and Its Applications
- Author
-
Liqun Chen and Yu Chen
- Subjects
Discrete mathematics ,Computer science ,Probabilistic encryption ,business.industry ,Ciphertext ,Diffie–Hellman problem ,Attribute-based encryption ,Encryption ,business ,Algorithm ,ElGamal encryption ,Oracle ,Random oracle - Abstract
The main contributions of this paper are twofold. On the one hand, the twin Diffie-Hellman (twin DH) problem proposed by Cash, Kiltz and Shoup is extended to the n-Diffie-Hellman (n-DH) problem for an arbitrary integer n, and this new problem is shown to be at least as hard as the ordinary DH problem. Like the twin DH problem, the n-DH problem remains hard even in the presence of a decision oracle that recognizes solution to the problem. On the other hand, observe that the double-size key in the Cash et al. twin DH based encryption scheme can be replaced by two separated keys each for one entity, that results in a 2-party encryption scheme which holds the same security feature as the original scheme but removes the key redundancy. This idea is further extended to an n-party case, which is also known as n-out-of-n encryption. As examples, a variant of ElGamal encryption and a variant of Boneh-Franklin IBE have been presented; both of them have proved to be CCA secure under the computational DH assumption and the computational bilinear Diffie-Hellman (BDH) assumption respectively, in the random oracle model. The two schemes are efficient, due partially to the size of their ciphertext, which is independent to the value n.
- Published
- 2011
32. Numerical strategies for the bifurcation analysis of perfectly stirred reactors with detailed combustion mechanisms
- Author
-
Luigi Acampora and Francesco Saverio Marra
- Subjects
Computer science ,General Chemical Engineering ,Computation ,Detailed kinetic mechanism ,Parametric continuation ,CHEMKIN ,Solver ,Combustion ,Computer Science Applications ,Computational science ,Bifurcation analysis ,Perfectly stirred reactor ,Ignition and extinction limits ,Cantera ,Jet fuels ,MATLAB ,computer ,Algorithm ,computer.programming_language ,Continuation algorithm - Abstract
The paper introduces a numerical tool based on a predictor–corrector continuation algorithm to obtain the bifurcation analysis of a perfectly stirred reactor with detailed reaction mechanisms. Each step of the continuation algorithm is reviewed and adapted to handle reaction mechanisms with hundreds of species and thousands of reactions. Particularly, the adoption of a Broyden solver in the predictor–corrector algorithm and a new formulation of the test functions are proposed. The implementation in Matlab and the adoption of the CANTERA Toolbox, make the tool easily applicable to reaction mechanisms available in CHEMKIN format. To validate and demonstrate the capability of the tool, the full equilibrium curves have been obtained for three different cases, having increasing number of species and reactions: methane–air (GRIMech.1.2), simple surrogates of Jet-A in air (JetSurF2.0) and a ternary surrogate of Jet-A in air (CRECK). The tool gets performances that make affordable the computations even with desktop computers.
- Published
- 2015
- Full Text
- View/download PDF
33. Minimum Probability of Error-Based Methods for Adaptive Multiuser Detection in Multipath DS-CDMA Channels
- Author
-
Uday B. Desai, Aditya Dua, and Ranjan K. Mallik
- Subjects
Theoretical computer science ,Mean squared error ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,Receiver ,Least mean squares filter ,Channel capacity ,Measurement Errors ,Least Squares Approximations ,Electrical and Electronic Engineering ,Computer Science::Information Theory ,Recursive least squares filter ,Minimum mean square error ,Capacity ,Code division multiple access ,Channel Capacity ,Applied Mathematics ,Detector ,Systems ,Conditional probability ,Interference Suppression ,Multiuser detection ,Wireless Communications ,Computer Science Applications ,Adaptive filter ,Spread spectrum ,Space-time adaptive processing ,Signal Processing ,Bit error rate ,Algorithm ,Multipath propagation ,Communication channel - Abstract
Direct-sequence code-division multiple-access (DS-CDMA) is a popular multiple-access technology for wireless communications. However, its performance is limited by multiple-access interference and multipath distortion. Multiuser detection and space-time processing are two signal processing techniques employed to improve the performance of DS-CDMA. Two minimum probability of error-based space-time multiuser detection algorithms are proposed in this paper. The first algorithm, minimum joint probability of error (MJPOE), aims to minimize the joint probability of error for all users. The second algorithm, minimum conditional probability of error (MCPOE), minimizes the probability of error of each user conditioned on the transmitted bit vector, for each user individually. In both the algorithms, the optimal filter weights are computed adaptively using a gradient descent approach. The MJPOE algorithm is blind and offers a bit-error-rate (BER) performance better than the nonadaptive minimum mean squared error (MMSE) algorithm, at the cost of higher computational complexity. An approach for reducing the computational overheads of MJPOE using Gram-Schmidt orthogonalization is suggested. The BER performance of the MCPOE algorithm is slightly inferior to MMSE, however, it has a computational complexity linear in the number of users. Both blind and training-based implementations for MCPOE are proposed. Both MJPOE and MCPOE have a convergence rate much faster than earlier known adaptive implementations of the MMSE detector, viz. least mean square and recursive least squares. Simulation results are presented for synchronous single path channels as well as asynchronous multipath channels, with multiple antennas employed at the receiver., IEEE
- Published
- 2004
34. FDA RELEASES TWO DISCUSSION PAPERS TO SPUR CONVERSATION ABOUT ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN DRUG DEVELOPMENT AND MANUFACTURING
- Subjects
United States. Food and Drug Administration ,Artificial intelligence ,Machine learning ,Computer science ,Algorithms ,Pharmaceutical industry ,News, opinion and commentary ,Algorithm ,Artificial intelligence - Abstract
SILVER SPRING, MD -- The following information was released by the U.S. Food and Drug Administration (FDA): By: Patrizia Cavazzoni, M.D., Director of the Center for Drug Evaluation and Research [...]
- Published
- 2023
35. Study Results from Institute of Computer Science Update Understanding of Information and Data Encoding and Encryption (Linguistic Methods of Image Division for Visual Data Security)
- Subjects
Data security -- Safety and security measures -- Methods ,Computer science ,Algorithms -- Safety and security measures -- Methods ,Algorithm ,Data security issue ,Computers - Abstract
2023 MAY 2 (VerticalNews) -- By a News Reporter-Staff News Editor at Information Technology Newsweekly -- New study results on information and data encoding and encryption have been published. According [...]
- Published
- 2023
36. Reinforcement learning based joint trajectory design and resource allocation for RIS-aided UAV multicast networks
- Author
-
Ji, Pengshuo, Jia, Jie, Chen, Jian, Guo, Liang, Du, An, and Wang, Xingwei
- Subjects
Drone aircraft ,Computer science ,Algorithms ,Algorithm ,Business ,Computers ,Telecommunications industry - Abstract
Keywords Reconfigurable intelligent surface; UAV network; Multicast communication; Resource allocation; MP-DQN Abstract This paper investigates an unmanned aerial vehicle (UAV)-enabled multicast network, where the UAV serves as a mobile transmitter to send typical contents to its corresponding ground receivers. A reconfigurable intelligent surface (RIS) is deployed to enhance the service quality with a limited power supply in the UAV-enabled multicast network. It can reconfigure the signal propagation environment and improve the received power of ground receivers by adjusting the reflection coefficients. The sum rate maximization problem is formulated by jointly designing the UAV movement, RIS reflection matrix, and beamforming design from the UAV to users. This paper proposes a Beamforming control and Trajectory design algorithm based on a Multi-Pass Deep Q-Network (BT-MP-DQN). In the proposed algorithm, the UAV acts as an agent for periodically observing the state of the UAV multicast network and takes actions to adapt to the dynamic environment. Specifically, the movement of the UAV is discrete action, and the beamforming design is continuous action. The simulation results show that this proposed algorithm can effectively improve the achievable rate and satisfy the minimum rate of multicast group users. The deployment of the RIS is beneficial to network performance enhancement. In addition, the multicast network with UAV also outperforms the conventional multicast channel with a fixed-location transmitter. Author Affiliation: (a) School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, 110819, China (b) Engineering Research Center of Security Technology of Complex Network System, Ministry of Education, China * Corresponding author at: School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, 110819, China. Article History: Received 8 October 2022; Revised 22 February 2023; Accepted 9 March 2023 Byline: Pengshuo Ji (a,b), Jie Jia [jiajie@mail.neu.edu.cn] (a,b,*), Jian Chen (a,b), Liang Guo (a), An Du (a), Xingwei Wang (a)
- Published
- 2023
- Full Text
- View/download PDF
37. DroidRL: Feature selection for android malware detection with reinforcement learning
- Author
-
Wu, Yinwei, Li, Meijin, Zeng, Qi, Yang, Tao, Wang, Junfeng, Fang, Zhiyang, and Cheng, Luyu
- Subjects
Natural language interfaces -- Rankings ,Spyware ,Computational linguistics -- Rankings ,Language processing -- Rankings ,Machine learning ,Data mining ,Computer science ,Neural networks -- Rankings ,Algorithms ,Data warehousing/data mining ,Neural network ,Algorithm ,Business ,Computers and office automation industries - Abstract
Keywords Reinforcement learning; Android malware detection; Feature selection; RNN; Sequence processing Highlights * This paper applied reinforcement learning algorithms to the feature selection phase of Android malware detection, reducing the burden of feature selection tasks. * This paper adopts Natural Language Processing methods to tackle the feature selection methods. * This paper presented a modifiable framework that can be easily ported to other feature selection tasks for malware detection. Abstract Due to the completely open-source nature of Android, the exploitable vulnerability of malware attacks is increasing. Machine learning, leading to a great evolution in Android malware detection in recent years, is typically applied in the classification phase. Since the correlation between features is ignored in some traditional ranking-based feature selection algorithms, applying wrapper-based feature selection models is a topic worth investigating. Though considering the correlation between features, wrapper-based approaches are time-consuming for exploring all possible valid feature subsets when processing a large number of Android features. To reduce the computational expense of wrapper-based feature selection, a framework named DroidRL is proposed. The framework deploys DDQN algorithm to obtain a subset of features which can be used for effective malware classification. To select a valid subset of features over a larger range, the exploration-exploitation policy is applied in the model training phase. The recurrent neural network (RNN) is used as the decision network of DDQN to give the framework the ability to sequentially select features. Word embedding is applied for feature representation to enhance the framework's ability to find the semantic relevance of features. The framework's feature selection exhibits high performance without any human intervention and can be ported to other feature selection tasks with minor changes. The experiment results show a significant effect when using the Random Forest as DroidRL's classifier, which reaches 95.6% accuracy with only 24 features selected. Author Affiliation: (a) College of Software Engineering, Sichuan University, Chengdu, China (b) School of Cyber Science and Engineering, Sichuan University, Chengdu, China (c) College of Computer Science, Sichuan University, Chengdu, China (d) School of Business, Sichuan University, Chengdu, China * Corresponding author. Article History: Received 21 September 2022; Revised 21 December 2022; Accepted 26 January 2023 Byline: Yinwei Wu (a), Meijin Li (a), Qi Zeng (c), Tao Yang (c), Junfeng Wang (c), Zhiyang Fang [fangzhiyang@scu.edu.cn] (*,b), Luyu Cheng (d)
- Published
- 2023
- Full Text
- View/download PDF
38. Elliptic Localization of a Moving Object by Transmitter at Unknown Position and Velocity: A Semidefinite Relaxation Approach
- Author
-
Dominic K. C. Ho, Gang Wang, and Ruichao Zheng
- Subjects
Mean squared error ,Computer Networks and Communications ,Computer science ,Transmitter ,Regular polygon ,Upper and lower bounds ,Local convergence ,symbols.namesake ,Gaussian noise ,Position (vector) ,symbols ,Relaxation (approximation) ,Electrical and Electronic Engineering ,Algorithm ,Software ,Computer Science::Information Theory - Abstract
This paper investigates the elliptic localization for moving object problem from time delay (TD) and Doppler frequency shift (DFS) measurements, where the transmitter position and velocity are unknown. The transmitter is not perfectly time syncronized such that unknown offsets exist in the TD and DFS measurements. We propose to jointly estimate the object and transmitter positions and velocities and the offsets. Using the TD and DFS measurements from both the indirect and direct paths between the transmitter and the receivers, we formulate a non-convex weighted least squares (WLS) problem. Local convergence may occur when solving the non-convex WLS problem, implying that good estimate is not guaranteed. Thus, we relax the non-convex WLS problem into a convex semidefinite program by applying semidefinite relaxation (SDR). Moreover, we theoretically show that the performance can be improved by using multiple transmitters as compared to that using single transmitter, although more unknown parameters are introduced. We then extend the proposed SDR method to handle the multiple transmitters case. Finally, the mean square error analysis is provided to show that the proposed WLS method reaches the Cramer-Rao lower bound accuracy under small Gaussian noise condition. Simulation results validate the theoretical analysis and show the superior performance over the existing methods.
- Published
- 2023
39. On DoF Conservation in MIMO Interference Cancellation Based on Signal Strength in the Eigenspace
- Author
-
Brian Jalaian, Chengzhang Li, Shaoran Li, Thomas Hou, Yongce Chen, Wenjing Lou, and Huacheng Zeng
- Subjects
Rank (linear algebra) ,Computer Networks and Communications ,Data stream mining ,Computer science ,Noise (signal processing) ,MIMO ,Physical layer ,Signal ,Computer Science::Robotics ,Interference (communication) ,Single antenna interference cancellation ,Electrical and Electronic Engineering ,Algorithm ,Software ,Computer Science::Information Theory - Abstract
Degree-of-freedom (DoF)-based models have been proven to be highly successful in modeling and analysis of MIMO systems. Among existing DoF-based models, the number of DoFs used for interference cancellation (IC) is solely based on the number of interfering data streams. However, from both experimental and simulation results, we find that signal strengths of an interference link vary significantly in different directions in the eigenspace. In this paper, we exploit the difference in interference signal strengths in the eigenspace and perform IC with DoFs only on those directions with strong signals. To differentiate interference signal strengths on an interference link, we introduce a novel concept called ‘`effective rank threshold.’' Based on this threshold, DoFs are consumed only to cancel strong interferences in the eigenspace while weak interferences are treated as noise in throughput calculation. To better understand the benefits of this approach, we study a fundamental trade-off between network throughput and effective rank threshold for an MU-MIMO network. Our simulation results show that network throughput under optimal rank threshold is significantly higher than that under existing DoF IC models. To ensure the new DoF IC model is feasible at PHY layer, we propose an algorithm to set the weights for all nodes that can offer our desired DoF allocation.
- Published
- 2023
40. Very low-complexity coding of images using adaptive Modulo-PCM
- Author
-
Jose Prades-Nebot
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer science ,Real-time computing ,computer.file_format ,Pulse-code modulation ,Algorithm ,computer ,Coding tree unit ,Decoding methods ,Context-adaptive binary arithmetic coding ,Transform coding ,A-law algorithm - Abstract
Some video applications require the use of extremely simple source coding techniques. For these applications, Modulo-PCM is an interesting alternative to PCM since it has a very low complexity and performs better than PCM. In this paper, we present an adaptive Modulo-PCM algorithm for image coding. Our algorithm divides the image into blocks and performs a proper Modulo-PCM coding of each block. Since our algorithm allows different degrees of encoding complexity, it can adapt to the computational resources that are available in each video application. Experimental results show that our algorithm improves the coding efficiency of both non-adaptive MPCM and PCM. The magnitude of the improvements depends on the encoding complexity and the target rate.
- Published
- 2011
41. Research on APIT and Monte Carlo Method of Localization Algorithm for Wireless Sensor Networks
- Author
-
Fu Jingqi and Jia Wang
- Subjects
Positioning system ,Computer science ,Node (networking) ,Monte Carlo method ,Real-time computing ,Sampling (statistics) ,Sample (statistics) ,Energy consumption ,Wireless sensor network ,Algorithm ,Beacon - Abstract
Traditional approximate point-in-triangulation test (APIT) localization algorithm requiring low equipped hardware, having relatively high location accuracy, is easy to implement, and widely used in wireless sensor network positioning system. However, the location accuracy of unknown node in triangle overlap region should be further improved, especially in the sparse beacons' environment, the location accuracy is seriously affected. In this paper, MC-APIT algorithm is proposed, which implements random sampling using the Monte Carlo method in the overlap region, and filters samples through the target node's RSSI (Received Signal Strength) sequence values, in order that Mathematical expectation of the sample values could converge to that of the target node'. Simulation results show that: the algorithm can reduce the sampling area and the location energy consumption, to a certain extent restrained the propagation error. Compared with APIT algorithm, the location accuracy has been markedly improved.
- Published
- 2010
42. Improving state estimation in smart distribution grid using synchrophasor technology: a comparison study
- Author
-
Przemyslaw Komarnicki, Marc Richter, Ines Hauer, and Publica
- Subjects
accuracy analysis ,0106 biological sciences ,Estimation ,Computer science ,010604 marine biology & hydrobiology ,General Engineering ,010603 evolutionary biology ,01 natural sciences ,case study ,distribution grid state estimation ,Comparison study ,weighted least squares ,phasor measurement units ,Distribution grid ,State (computer science) ,Algorithm - Abstract
Both the growing number of dispersed generation plants and storage systems and the new roles and functions on the demand side (e.g. demand side management) are making the operation (monitoring and control) of electrical grids more complex, especially in distribution. This paper demonstrates how to integrate phasor measurements so that state estimation in a distribution grid profits optimally from the high accuracy of PMUs. Different measurement configurations consisting of conventional and synchronous measurement units, each with different fault tolerances for the quality of the calculated system state achieved, are analyzed and compared. Weighted least squares (WLS) algorithms for conventional, linear and hybrid state estimation provide the mathematical method used in this paper. A case study of an 18-bus test grid with real measured PMU data from a 110 kV distribution grid demonstrates the improving of the system's state variable's quality by using synchrophasors. The increased requirements, which are the prerequisite for the use of PMUs in the distribution grid, are identified by extensively analyzing the inaccuracy of measurement and subsequently employed to weight the measured quantities.
- Published
- 2023
43. Adaptive PARAFAC decomposition for third-order tensor completion
- Author
-
Nguyen Linh-Trung, Truong Minh-Chinh, Karim Abed-Meraim, and Viet-Dung Nguyen
- Subjects
Mathematical optimization ,Computer science ,Tensor completion ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science::Numerical Analysis ,Third order ,Matrix (mathematics) ,Dimension (vector space) ,0202 electrical engineering, electronic engineering, information engineering ,Decomposition (computer science) ,020201 artificial intelligence & image processing ,Tensor ,Algorithm ,Subspace topology - Abstract
This paper proposed a tensor completion algorithm by tracking the Parallel Factor (PARAFAC) decomposition of incomplete third-order tensors with one dimension growing with time. The proposed algorithm first tracks a low-dimensional subspace, then updates the loading matrices of the PARAFAC decomposition. Simulation results showed that the algorithm is reliable and fast, in comparison to the state-of-the-art PARAFAC Weighted OPTimization algorithm.
- Published
- 2016
44. The Impact of Active Learning Algorithm on a Cross-lingual model in a Persian Sentiment Task
- Author
-
Monire Shirghasemi, Mahmoud Bijankhan, and Mohammad Hadi Bokaei
- Subjects
Dependency (UML) ,Computer science ,business.industry ,Active learning (machine learning) ,Deep learning ,Sentiment analysis ,language.human_language ,Task (project management) ,Face (geometry) ,language ,Artificial intelligence ,business ,Algorithm ,Classifier (UML) ,Persian - Abstract
One of the most challenging problems that we may face in natural language processing tasks is the lack of annotated training datasets. In this paper our goal is to consider the impact of Active Learning algorithm on a cross-lingual model in sentiment analysis task on Persian language which is known as a low-resource language. Cross-lingual model trains a model by using a rich-resource language like English as a source language and apply it to a low-resource language, in this way the dependency to training datasets is decreased. Also using Active Learning strategy helps us to improve the functionality of our model by selecting most representative samples. Since labeling data is expensive and time consuming, by selecting the machine desirable data we can reduce the amount of labeled data required for our tasks. To do this we can select data which classifier is the least confident about them. When they are chosen, a user is asked to labeled them. There are lots of methods and factors to choose the appropriate data for Active Learning strategy. In the end these methods help our classifier to gain more knowledge about samples and work more properly.
- Published
- 2021
45. Joint detection and decoding for polar-coded OFDM-IDMA systems
- Author
-
Chuan Zhang, Xiaotian Zhou, Xiaohu You, Jin Sha, and Deng Xiangyun
- Subjects
Hardware architecture ,Scheme (programming language) ,Orthogonal frequency-division multiplexing ,Computer science ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Signal-to-noise ratio ,Control channel ,0202 electrical engineering, electronic engineering, information engineering ,Performance improvement ,Joint (audio engineering) ,computer ,Algorithm ,Decoding methods ,computer.programming_language - Abstract
Being one non-orthogonal multiple access (NOMA) scheme, interleave-division multiple access (IDMA) can increase the capacity of wireless communication systems, and therefore has drawn many attentions. In this paper, polar codes, which have been adopted by 3GPP eMBB control channel, are applied to OFDM-IDMA systems for further performance improvement. The corresponding joint detection and decoding (JDD) scheme is proposed as well. To further reduce the decoding complexity, a sign aided JDD (SA-JDD) scheme is introduced. According to numerical results, the proposed polar-coded OFDM-IDMA scheme outperforms the uncoded one. The proposed JDD scheme has nearly 1.5 dB gain over the separated detection and decoding (SDD) scheme when BER = 4 × 10−3. SA-JDD scheme requires only half complexity of JDD with no performance degradation when SNR = 8 dB. Finally, the corresponding hardware architecture is also proposed.
- Published
- 2017
46. Studies from Coimbatore Institute of Technology Have Provided New Data on Computer Science (Evaluation of Community Detection by Improving Influence Nodes in Complex Networks Using InfoMap with Sigmoid Fish Swarm Optimization Algorithm)
- Subjects
Mathematical optimization ,Computer science ,Social networks ,Algorithms ,Algorithm - Abstract
2023 APR 12 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Weekly News -- A new study on computer science is now available. According to news reporting from […]
- Published
- 2023
47. Specification and testing of models estimated by quadrature
- Author
-
Geert Dhaene and J.M.C. Santos Silva
- Subjects
Hybrid Monte Carlo ,Economics and Econometrics ,Computer science ,Monte Carlo method ,Dynamic Monte Carlo method ,Econometrics ,Algorithm ,Social Sciences (miscellaneous) ,Quadrature (mathematics) ,Monte Carlo molecular modeling - Abstract
This paper proposes a test to check the specification of models with unobserved individual effects integrated out by quadrature and also a simple way of increasing the flexibility of this type of model. The results of a Monte Carlo study and an application using a well-known data set illustrate the finite sample properties of the proposed methods and their implementation in practice.
- Published
- 2010
48. Electronic image stabilization algorithm based on fixed-lag smooth filtering
- Author
-
Fan Zhang, Xiao-tong Wang, Xiaogang Xu, and Changqing Yang
- Subjects
Sequence ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Inter frame ,Motion (geometry) ,Filter (signal processing) ,Condensed Matter Physics ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Compensation (engineering) ,Image stabilization ,Motion estimation ,Electrical and Electronic Engineering ,Algorithm ,Dykstra's projection algorithm - Abstract
An algorithm using fixed-lag smooth filtering to improve the precision of EIS algorithm is presented in this paper. Firstly, gray projection algorithm (GPA) is used to calculate the interframe global motion vectors. Secondly, the fixed-lag smooth filter is used to smoothen the motion track of the original video sequence, according to different motion models. At last, the original sequence is compensated by using the compensation vectors calculated from filtering. This algorithm has been proved superior in filtering precision by experiments of video sequences in different motion scenes. This algorithm also satisfies the real-time request.
- Published
- 2007
49. Delay and energy aware task scheduling mechanism for fog-enabled IoT applications: A reinforcement learning approach
- Author
-
Raju, Mekala Ratna and Mothku, Sai Krishna
- Subjects
Computer science ,Algorithms ,Algorithm ,Business ,Computers ,Telecommunications industry - Abstract
Keywords Task scheduling; Fog computing; Fuzzy inference system; Reinforcement learning; Service delay and energy consumption Abstract With the expansion of the internet of things (IoT) devices and their applications, the demand for executing complex and deadline-aware tasks is growing rapidly. Fog-enabled IoT architecture has evolved to accomplish these tasks at the fog layer. However, fog computing devices have limited power supply and computation resources compared to cloud devices. In delay-sensitive applications of fog-enabled IoT architecture, executing tasks with stringent deadlines while reducing the service latency and energy usage of fog resources is a difficult challenge. This paper presents an effective task scheduling strategy to allocate fog computing resources for IoT requests to meet the deadline of the requests and resource availability. Initially, the scheduling problem is formulated as mixed-integer nonlinear programming (MINLP) to reduce the energy consumption of the fog resources and service time of the tasks subject to the deadline and resource availability constraints. To address the high dimensionality issue of the tasks in a dynamic environment, a fuzzy-based reinforcement learning (FRL) mechanism is employed to reduce the service delay of the tasks and energy usage of the fog nodes. Initially, the tasks are prioritized using fuzzy logic. Then the prioritized tasks are scheduled using the on-policy reinforcement learning technique, which enhances the long-term reward compared to the Q-learning approach. Further, the evaluation outcomes reflect that the proposed task scheduling technique outperforms the existing algorithms with an improvement of up to 23% and 18% regarding service latency and energy consumption, respectively. Author Affiliation: Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, 620015, India * Corresponding author. Article History: Received 28 September 2022; Revised 9 January 2023; Accepted 31 January 2023 Byline: Mekala Ratna Raju [ratnarajumekala@gmail.com] (*), Sai Krishna Mothku [saikrishna@nitt.edu]
- Published
- 2023
- Full Text
- View/download PDF
50. Identification of Sparse Volterra Systems: An Almost Orthogonal Matching Pursuit Approach
- Author
-
Zhike Peng, Changming Cheng, and Er-Wei Bai
- Subjects
Set (abstract data type) ,Identification (information) ,Lasso (statistics) ,Matching (graph theory) ,Control and Systems Engineering ,Computer science ,Convergence (routing) ,Electrical and Electronic Engineering ,Algorithm ,Article ,Computer Science Applications ,Curse of dimensionality - Abstract
This paper considers identification of sparse Volterra systems. Two identification meth- ods based on the almost orthogonal matching pur- suit (AOMP) and the RIVAL (removing irrele- vant variables amidst Lasso iterations) algorithm are proposed. The AOMP algorithm allows one to estimate one non-zero coefficient at a time until all non-zero coefficients are found without losing the optimality and the sparsity, thus avoiding the curse of dimensionality often encountered in Volterra sys- tem identification. However, the conditions for the AOMP are strong. To this end, the RIVAL is pro- posed that solves the set identification and param- eter estimation problems simultaneously with the convergence results, and outperforms the standard Lasso-type algorithms.
- Published
- 2023
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.