共查询到20条相似文献,搜索用时 15 毫秒
1.
Vildan Çetkin Halis Aygün 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(12):4779-4790
The goal of this paper is to focus on the notions of merotopy and also merotopology in the soft universe. First of all, we propose L-soft merotopic (nearness) spaces and L-soft guild. Then, we study binary, contigual, regular merotopic spaces and also relations between them. We show that the category of binary L-soft nearness spaces is bireflective in the category of L-soft nearness spaces. Later, we define L-approach soft merotopological (nearness) spaces by giving several examples. Finally, we define a simpler characterization of L-approach soft grill merotopological space called grill-determined L-approach soft merotopological space. We investigate the categorical structures of these notions such as we prove that the category of grill-determined L-approach soft merotopological spaces is a topological category over the category of L-soft topological spaces. At the end, we define a partial order on the family of all L-approach soft grill merotopologies and show that this family is a completely distributive complete lattice with respect to the defined partial order. 相似文献
2.
3.
Given a graph with a source and a sink node, the NP-hard maximum k-splittable s,t-flow (M
k
SF) problem is to find a flow of maximum value from s to t with a flow decomposition using at most k paths. The multicommodity variant of this problem is a natural generalization of disjoint paths and unsplittable flow problems.
Constructing a k-splittable flow requires two interdepending decisions. One has to decide on k paths (routing) and on the flow values for the paths (packing). We give efficient algorithms for computing exact and approximate
solutions by decoupling the two decisions into a first packing step and a second routing step. Usually the routing is considered
before the packing. Our main contributions are as follows:
(i) We show that for constant k a polynomial number of packing alternatives containing at least one packing used by an optimal M
k
SF solution can be constructed in polynomial time. If k is part of the input, we obtain a slightly weaker result. In this case we can guarantee that, for any fixed ε>0, the computed set of alternatives contains a packing used by a (1−ε)-approximate solution. The latter result is based on the observation that (1−ε)-approximate flows only require constantly many different flow values. We believe that this observation is of interest in
its own right.
(ii) Based on (i), we prove that, for constant k, the M
k
SF problem can be solved in polynomial time on graphs of bounded treewidth. If k is part of the input, this problem is still NP-hard and we present a polynomial time approximation scheme for it. 相似文献
4.
Babette Babich 《AI & Society》2017,32(2):157-166
The question of the contemporary relevance of Heidegger’s reflections on technology to today’s advanced technology is here explored with reference to the notion of “entanglement” towards a review of Heidegger’s understanding of technology and media, including the entertainment industry and modern digital life. Heidegger’s reflections on Gelassenheit have been connected with the aesthetics of the tea ceremony, disputing the material aesthetics of porcelain versus plastic. Here by approaching the art of wabi-sabi as the art of Verfallenheit, I argue that Gelassenheit may be understood in these terms. 相似文献
5.
In this paper we present a robust polynomial classifier based on L
1-norm minimization. We do so by reformulating the classifier training process as a linear programming problem. Due to the inherent
insensitivity of the L
1-norm to influential observations, class models obtained via L
1-norm minimization are much more robust than their counterparts obtained by the classical least squares minimization (L
2-norm). For validation purposes, we apply this method to two recognition problems: character recognition and sign language recognition.
Both are examined under different signal to noise ratio (SNR) values of the test data. Results show that L
1-norm minimization provides superior recognition rates over L
2-norm minimization when the training data contains influential observations especially if the test dataset is noisy. 相似文献
6.
Sparse Support Vector Machine with <Emphasis Type="Italic">L</Emphasis><Subscript><Emphasis Type="Italic">p</Emphasis></Subscript> Penalty for Feature Selection
下载免费PDF全文

We study the strategies in feature selection with sparse support vector machine (SVM). Recently, the socalled L p -SVM (0 < p < 1) has attracted much attention because it can encourage better sparsity than the widely used L 1-SVM. However, L p -SVM is a non-convex and non-Lipschitz optimization problem. Solving this problem numerically is challenging. In this paper, we reformulate the L p -SVM into an optimization model with linear objective function and smooth constraints (LOSC-SVM) so that it can be solved by numerical methods for smooth constrained optimization. Our numerical experiments on artificial datasets show that LOSC-SVM (0 < p < 1) can improve the classification performance in both feature selection and classification by choosing a suitable parameter p. We also apply it to some real-life datasets and experimental results show that it is superior to L 1-SVM. 相似文献
7.
In this paper, a steganographic scheme adopting the concept of the generalized K d -distance N-dimensional pixel matching is proposed. The generalized pixel matching embeds a B-ary digit (B is a function of K and N) into a cover vector of length N, where the order-d Minkowski distance-measured embedding distortion is no larger than K. In contrast to other pixel matching-based schemes, a N-dimensional reference table is used. By choosing d, K, and N adaptively, an embedding strategy which is suitable for arbitrary relative capacity can be developed. Additionally, an optimization algorithm, namely successive iteration algorithm (SIA), is proposed to optimize the codeword assignment in the reference table. Benefited from the high dimensional embedding and the optimization algorithm, nearly maximal embedding efficiency is achieved. Compared with other content-free steganographic schemes, the proposed scheme provides better image quality and statistical security. Moreover, the proposed scheme performs comparable to state-of-the-art content-based approaches after combining with image models. 相似文献
8.
Vincent Lepetit Francesc Moreno-Noguer Pascal Fua 《International Journal of Computer Vision》2009,81(2):155-166
We propose a non-iterative solution to the PnP problem—the estimation of the pose of a calibrated camera from n 3D-to-2D point correspondences—whose computational complexity grows linearly with n. This is in contrast to state-of-the-art methods that are O(n
5) or even O(n
8), without being more accurate. Our method is applicable for all n≥4 and handles properly both planar and non-planar configurations. Our central idea is to express the n 3D points as a weighted sum of four virtual control points. The problem then reduces to estimating the coordinates of these
control points in the camera referential, which can be done in O(n) time by expressing these coordinates as weighted sum of the eigenvectors of a 12×12 matrix and solving a small constant number of quadratic equations to pick the right weights. Furthermore, if maximal precision is required, the output of the
closed-form solution can be used to initialize a Gauss-Newton scheme, which improves accuracy with negligible amount of additional
time. The advantages of our method are demonstrated by thorough testing on both synthetic and real-data. 相似文献
9.
In spite of significant improvements in video data retrieval, a system has not yet been developed that can adequately respond
to a user’s query. Typically, the user has to refine the query many times and view query results until eventually the expected
videos are retrieved from the database. The complexity of video data and questionable query structuring by the user aggravates
the retrieval process. Most previous research in this area has focused on retrieval based on low-level features. Managing
imprecise queries using semantic (high-level) content is no easier than queries based on low-level features due to the absence
of a proper continuous distance function. We provide a method to help users search for clips and videos of interest in video
databases. The video clips are classified as interesting and uninteresting based on user browsing. The attribute values of clips are classified by commonality, presence, and frequency within each
of the two groups to be used in computing the relevance of each clip to the user’s query. In this paper, we provide an intelligent
query structuring system, called I-Quest, to rank clips based on user browsing feedback, where a template generation from the set of interesting and uninteresting
sets is impossible or yields poor results.
相似文献
Ramazan Savaş Aygün (Corresponding author)Email: |
10.
R. V. Skuratovsky 《Cybernetics and Systems Analysis》2009,45(1):25-37
The corepresentation of a Sylow p-subgroup of a symmetric group in the form of generating relations is investigated, and a
Sylow subgroup of a group , i.e., an n-fold wreath product of regular cyclic groups of prime order, that is isomorphic to the group of automorphisms
of a spherically homogeneous root tree is also studied.
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 27–41, January–February 2009. 相似文献
11.
Wiesław A. Dudek Jianming Zhan Bijan Davvaz 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(12):1229-1238
The concept of intuitionistic fuzzy subhyperquasigroups in a hyperquasigroup with respect to an s-norm and a t-norm on intuitionistic fuzzy sets is introduced and their properties of such hyperquasigroups are studied. Intuitionistic
(S, T)-fuzzy relations on a hyperquasigroup G are discussed. In particular, we investigate connections hyperquasigroups with binary quasigroups. 相似文献
12.
A particular class of incomplete factorizations is proposed as preconditioners for the linear system Ax = b where A is a symmetric, large and sparse matrix. The ILDL
T<
(p) factorization (p = 1,2,3, …) determines the density of the lower triangular matrix L selecting the p largest off-diagonal entries of each column during the Gaussian elimination process. This selection may be computationally
expensive, but the effectiveness of the preconditioner allows us to choose very low-density factors to reduce both work time
and storage requirements. This incomplete factorization can be performed reliably on H-matrices. When A is a positive definite matrix, but not an H-matrix, one can perform an incomplete factorization if positive off-diagonal entries are removed or reduced and diagonally
compensated. Numerical results for a variety of problems and comparisons
with other incomplete factorizations are presented.
Received: August 2002 / Accepted: December 2002
RID="*"
ID="*"This work was supported by the Spanish grant BFM 2001-2641. 相似文献
13.
Jan Paseka Sergey A. Solovyov Milan Stehlík 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(7):2503-2512
This paper shows that given a certain frame L, the construct of strict L-bornological spaces, introduced by Abel and ?ostak, is a topological universe. 相似文献
14.
Bin Qin Fanping Zeng Kesong Yan 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(9):3497-3504
Binary relations play an important role in rough set theory. This paper investigates the similarity of binary relations based on L-fuzzy topologies, where L is a boolean algebra. First, rough approximations based on a boolean algebra are proposed through successor neighborhoods on binary relations. Next, L-fuzzy topologies induced by binary relations are investigated. Finally, similarity of binary relations is introduced by using the L-fuzzy topologies and the fact that every binary relation is solely similar to some preorder relation is proved. It is worth mentioning that similarity of binary relations are both originated in the L-fuzzy topology and independent of the L-fuzzy topology. 相似文献
15.
Raymond Chi-Wing Wong M. Tamer Özsu Ada Wai-Chee Fu Philip S. Yu Lian Liu Yubao Liu 《The VLDB Journal The International Journal on Very Large Data Bases》2011,20(6):893-919
Bichromatic reverse nearest neighbor (BRNN) has been extensively studied in spatial database literature. In this paper, we
study a related problem called MaxBRNN: find an optimal region that maximizes the size of BRNNs for L
p
-norm in two- and three- dimensional spaces. Such a problem has many real-life applications, including the problem of finding
a new server point that attracts as many customers as possible by proximity. A straightforward approach is to determine the
BRNNs for all possible points that are not feasible since there are a large (or infinite) number of possible points. To the
best of our knowledge, there are no existing algorithms which solve MaxBRNN for any L
p
-norm space of two- and three-dimensionality. Based on some interesting properties of the problem, we come up with an efficient
algorithm called MaxOverlap for to solve this problem. Extensive experiments are conducted to show that our algorithm is efficient. 相似文献
16.
In this paper, a novel multi-party quantum private comparison protocol with a semi-honest third party (TP) is proposed based on the entanglement swapping of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own, but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties’ secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties’ secrets except the end comparison result on whether all private secrets from n parties are equal. 相似文献
17.
S. A. Dudin 《Automation and Remote Control》2010,71(1):28-38
We consider a multiline queueing system with joint or single queries. The number of queries in a connection is random and
is not known when the connection is established. Queries arriving during each connection are described by the phase type input
steam. Accepting a connection in the system is restricted by tokens. Connections arriving when no free tokens are present
are refused. Single queries arrive without tokens. If the number of free slots in the system is not enough, the system is
blocked. 相似文献
18.
19.
S. A. Dudin 《Automation and Remote Control》2009,70(5):872-884
The single-server queuing system with finite buffer was considered. The customers may arrive one-by-one or in batches. Arrivals of single customers and their batches obey the Markov input processes. The customers from a batch taken for servicing come one at a time at the exponentially distributed time intervals. The numbers of customers in batches are distributed geometrically. The time of customer servicing has a phase-type distribution. The numbers of batches and single customers that may be simultaneously accepted by the system are controllable parameters. The joint distribution of the number of batches and the number of customers in system, loss probabilities, distribution of the time of batch sojourn, and problems of optimization were analyzed. 相似文献
20.
L. A. Bassalygo V. A. Zinoviev V. S. Lebedev 《Problems of Information Transmission》2018,54(3):245-252
We introduce m-near-resolvable block designs. We establish a correspondence between such block designs and a subclass of (optimal equidistant) q-ary constant-weight codes meeting the Johnson bound. We present constructions of m-near-resolvable block designs, in particular based on Steiner systems and super-simple t-designs. 相似文献