The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] strain(346hit)

61-80hit(346hit)

  • Semi-Supervised Clustering Based on Exemplars Constraints

    Sailan WANG  Zhenzhi YANG  Jin YANG  Hongjun WANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/03/21
      Vol:
    E100-D No:6
      Page(s):
    1231-1241

    In general, semi-supervised clustering can outperform unsupervised clustering. Since 2001, pairwise constraints for semi-supervised clustering have been an important paradigm in this field. In this paper, we show that pairwise constraints (ECs) can affect the performance of clustering in certain situations and analyze the reasons for this in detail. To overcome these disadvantages, we first outline some exemplars constraints. Based on these constraints, we then describe a semi-supervised clustering framework, and design an exemplars constraints expectation-maximization algorithm. Finally, standard datasets are selected for experiments, and experimental results are presented, which show that the exemplars constraints outperform the corresponding unsupervised clustering and semi-supervised algorithms based on pairwise constraints.

  • A Noise Inference Method Based on Fast Context-Aware Tensor Decomposition

    Qingfu FAN  Lei ZHANG  Wen LI  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2017/03/08
      Vol:
    E100-D No:6
      Page(s):
    1360-1363

    Existing noise inference algorithms neglected the smooth characteristics of noise data, which results in executing slowly of noise inference. In order to address this problem, we present a noise inference algorithm based on fast context-aware tensor decomposition (F-CATD). F-CATD improves the noise inference algorithm based on context-aware tensor decomposition algorithm. It combines the smoothness constraint with context-aware tensor decomposition to speed up the process of decomposition. Experiments with New York City 311 noise data show that the proposed method accelerates the noise inference. Compared with the existing method, F-CATD reduces 4-5 times in terms of time consumption while keeping the effectiveness of the results.

  • Joint Source and Relay Beamformer Design for General MIMO Relaying Broadcast Channel with Imperfect Channel State Information

    Yun LI  Haibin WAN  Wen CHEN  Tohru ASAMI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/01
      Vol:
    E100-B No:5
      Page(s):
    852-864

    Effective communication strategies with a properly designed source precoding matrix (PM) and a properly designed relay beamforming matrix (BM) can significantly improve the spectral efficiency of multiple-input multiple-output (MIMO) relaying broadcast channels (RBCs). In the present paper, we first propose a general communication scheme with non-regenerative relay that can overcome the half-duplex relay constraint of the general MIMO-RBC. Based on the proposed scheme, the robust source PM and relay BM are designed for imperfect channel state information at the transmitter (CSIT). In contrast to the conventional non-regenerative relaying communication scheme for the MIMO-RBC, in the proposed scheme, the source can send information continuously to the relay and users during two phases. Furthermore, in conjunction with the advanced precoding strategy, the proposed scheme can achieve a full-degree-of-freedom (DoF) MIMO-RBC with that each entry in the related channel matrix is considered to an i.i.d. complex Gaussian variable. The robust source PM and relay BM designs were investigated based on both throughput and fairness criteria with imperfect CSIT. However, solving the problems associated with throughput and fairness criteria for the robust source PM and relay BM designs is computationally intractable because these criteria are non-linear and non-convex. In order to address these difficulties, we first set up equivalent optimization problems based on a tight lower bound of the achievable rate. We then decompose the equivalent throughput problem into several decoupled subproblems with tractable solutions. Finally, we obtain the suboptimal solution for the throughput problem by an alternating optimization approach. We solve the fairness problem by introducing an adjusted algorithm according to the throughput problem. Finally, we demonstrate that, in both cases of throughput and fairness criteria, the proposed relaying communication scheme with precoding algorithms outperforms existing methods.

  • Encoding Argumentation Semantics by Boolean Algebra

    Fuan PU  Guiming LUO  Zhou JIANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/01/18
      Vol:
    E100-D No:4
      Page(s):
    838-848

    In this paper, a Boolean algebra approach is proposed to encode various acceptability semantics for abstract argumentation frameworks, where each semantics can be equivalently encoded into several Boolean constraint models based on Boolean matrices and a family of Boolean operations between them. Then, we show that these models can be easily translated into logic programs, and can be solved by a constraint solver over Boolean variables. In addition, we propose some querying strategies to accelerate the calculation of the grounded, stable and complete extensions. Finally, we describe an experimental study on the performance of our encodings according to different semantics and querying strategies.

  • Polynomial Time Inductive Inference of Languages of Ordered Term Tree Patterns with Height-Constrained Variables from Positive Data

    Takayoshi SHOUDAI  Kazuhide AIKOH  Yusuke SUZUKI  Satoshi MATSUMOTO  Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E100-A No:3
      Page(s):
    785-802

    An efficient means of learning tree-structural features from tree-structured data would enable us to construct effective mining methods for tree-structured data. Here, a pattern representing rich tree-structural features common to tree-structured data and a polynomial time algorithm for learning important tree patterns are necessary for mining knowledge from tree-structured data. As such a tree pattern, we introduce a term tree pattern t such that any edge label of t belongs to a finite alphabet Λ, any internal vertex of t has ordered children and t has a new kind of structured variable, called a height-constrained variable. A height-constrained variable has a pair of integers (i, j) as constraints, and it can be replaced with a tree whose trunk length is at least i and whose height is at most j. This replacement is called height-constrained replacement. A sequence of consecutive height-constrained variables is called a variable-chain. In this paper, we present polynomial time algorithms for solving the membership problem and the minimal language (MINL) problem for term tree patternshaving no variable-chain. The membership problem for term tree patternsis to decide whether or not a given tree can be obtained from a given term tree pattern by applying height-constrained replacements to all height-constrained variables in the term tree pattern. The MINL problem for term tree patternsis to find a term tree pattern t such that the language generated by t is minimal among languages, generated by term tree patterns, which contain all given tree-structured data. Finally, we show that the class, i.e., the set of all term tree patternshaving no variable-chain, is polynomial time inductively inferable from positive data if |Λ| ≥ 2.

  • Reduction of Max-Plus Algebraic Equations to Constraint Satisfaction Problems for Mixed Integer Programming

    Hiroyuki GOTO  

     
    LETTER

      Vol:
    E100-A No:2
      Page(s):
    427-430

    This letter presents a method for solving several linear equations in max-plus algebra. The essential part of these equations is reduced to constraint satisfaction problems compatible with mixed integer programming. This method is flexible, compared with optimization methods, and suitable for scheduling of certain discrete event systems.

  • Online Unit Clustering with Capacity Constraints

    Tetsuya ARAKI  Koji M. KOBAYASHI  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E100-A No:1
      Page(s):
    301-303

    The online unit clustering problem is one of the most basic clustering problems proposed by Chan and Zarrabi-Zadeh (WAOA2007 and Theory of Computing Systems 45(3), 2009). Several variants of this problem have been extensively studied. In this letter, we propose a new variant of the online unit clustering problem, called the online unit clustering problem with capacity constraints. For this problem, we use competitive analysis to evaluate the performance of an online algorithm. Then, we develop an online algorithm whose competitive ratio is at most 3.178, and show that a lower bound on the competitive ratio of any online algorithm is 2.

  • A New Iterative Algorithm for Weighted Sum Outage Rate Maximization in MISO Interference Channels

    Jun WANG  Desheng WANG  Yingzhuang LIU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/07/29
      Vol:
    E100-B No:1
      Page(s):
    187-193

    In this paper, we investigate the problem of maximizing the weighted sum outage rate in multiuser multiple-input single-output (MISO) interference channels, where the transmitters have no knowledge of the exact values of channel coefficients, only the statistical information. Unfortunately, this problem is nonconvex and very difficult to deal with. We propose a new, provably convergent iterative algorithm where in each iteration, the original problem is approximated as second-order cone programming (SOCP) by introducing slack variables and using convex approximation. Simulation results show that the proposed SOCP algorithm converges in a few steps, and yields a better performance gain with a lower computational complexity than existing algorithms.

  • On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint

    Yuki TAKEDA  Yuichi KAJI  Minoru ITO  

     
    PAPER-Networks and Network Coding

      Vol:
    E99-A No:12
      Page(s):
    2211-2217

    An information flow problem is a graph-theoretical formalization of the transportation of information over a complicated network. It is known that a linear network code plays an essential role in a certain type of information flow problems, but it is not understood clearly how contributing linear network codes are for other types of information flow problems. One basic problem concerning this aspect is the linear solvability of information flow problems, which is to decide if there is a linear network code that is a solution to the given information flow problem. Lehman et al. characterize the linear solvability of information flow problems in terms of constraints on the sets of source and sink nodes. As an extension of Lehman's investigation, this study introduces a hierarchy constraint of messages, and discusses the computational complexity of the linear solvability of information flow problems with the hierarchy constraints. Nine classes of problems are newly defined, and classified to one of three categories that were discovered by Lehman et al.

  • Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints

    Hiroyuki ENDO  Te Sun HAN  Masahide SASAKI  

     
    PAPER-Information Theoretic Security

      Vol:
    E99-A No:12
      Page(s):
    2136-2146

    The wiretap channel is now a fundamental model for information-theoretic security. After introduced by Wyner, Csiszár and Körner have generalized this model by adding an auxiliary random variable. Recently, Han, Endo and Sasaki have derived the exponents to evaluate the performance of wiretap channels with cost constraints on input variable plus such an auxiliary random variable. Although the constraints on two variables were expected to provide larger-valued (or tighter) exponents, some non-trivial theoretical problems had been left open. In this paper, we investigate these open problems, especially concerning the concavity property of the exponents. Furthermore, we compare the exponents derived by Han et al. with the counterparts derived by Gallager to reveal that the former approach has a significantly wider applicability in contrast with the latter one.

  • A Novel Clutter Cancellation Method Utilizing Joint Multi-Domain Information for Passive Radar

    Yonghui ZHAI  Ding WANG  Jiang WU  Shengheng LIU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:10
      Page(s):
    2203-2211

    Considering that existing clutter cancellation methods process information either in the time domain or in the spatial domain, this paper proposes a new clutter cancellation method that utilizes joint multi-domain information for passive radar. Assuming that there is a receiving array at the surveillance channel, firstly we propose a multi-domain information clutter cancellation model by constructing a time domain weighted matrix and a spatial weighted vector. Secondly the weighted matrix and vector can be updated adaptively utilizing the constant modulus constraint. Finally the weighted matrix is derived from the principle of optimal filtering and the recursion formula of weighted vector is obtained utilizing the Gauss-Newton method. Making use of the information in both time and spatial domain, the proposed method attenuates the noise and residual clutter whose directions are different from that of the target echo. Simulation results prove that the proposed method has higher clutter attenuation (CA) compared with the traditional methods in the low signal to noise ratio condition, and it also improves the detection performance of weak targets.

  • CCP-Based Plant-Wide Optimization and Application to the Walking-Beam-Type Reheating Furnace

    Yan ZHANG  Hongyan MAO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/06/17
      Vol:
    E99-D No:9
      Page(s):
    2239-2247

    In this paper, the integration of dynamic plant-wide optimization and distributed generalized predictive control (DGPC) is presented for serially connected processes. On the top layer, chance-constrained programming (CCP) is employed in the plant-wide optimization with economic and model uncertainties, in which the constraints containing stochastic parameters are guaranteed to be satisfied at a high level of probability. The deterministic equivalents are derived for linear and nonlinear individual chance constraints, and an algorithm is developed to search for the solution to the joint probability constrained problem. On the lower layer, the distributed GPC method based on neighborhood optimization with one-step delay communication is developed for on-line control of the whole system. Simulation studies for furnace temperature set-points optimization problem of the walking-beam-type reheating furnace are illustrated to verify the effectiveness and practicality of the proposed scheme.

  • A Search-Based Constraint Elicitation in Test Design

    Hiroyuki NAKAGAWA  Tatsuhiro TSUCHIYA  

     
    PAPER

      Pubricized:
    2016/07/06
      Vol:
    E99-D No:9
      Page(s):
    2229-2238

    Pair-wise testing is an effective test planning technique for finding interaction faults using a small set of test cases. Constraint elicitation is an important process in the pair-wise testing design since constraints determine the test space; however, the constraint elicitation process has not been well studied. It usually requires manual capturing and precise definition of constraints. In this paper, we propose a constraint elicitation process that helps combinatorial test design. Our elicitation process consists of two steps: parameter combination identification and value pair determination. We conduct experiments on some test models, and demonstrate that some extracted rules match constraints and others helps to define constraints.

  • Robust Non-Parametric Template Matching with Local Rigidity Constraints

    Chao ZHANG  Haitian SUN  Takuya AKASHI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/06/03
      Vol:
    E99-D No:9
      Page(s):
    2332-2340

    In this paper, we address the problem of non-parametric template matching which does not assume any specific deformation models. In real-world matching scenarios, deformation between a template and a matching result usually appears to be non-rigid and non-linear. We propose a novel approach called local rigidity constraints (LRC). LRC is built based on an assumption that the local rigidity, which is referred to as structural persistence between image patches, can help the algorithm to achieve better performance. A spatial relation test is proposed to weight the rigidity between two image patches. When estimating visual similarity under an unconstrained environment, high-level similarity (e.g. with complex geometry transformations) can then be estimated by investigating the number of LRC. In the searching step, exhaustive matching is possible because of the simplicity of the algorithm. Global maximum is given out as the final matching result. To evaluate our method, we carry out a comprehensive comparison on a publicly available benchmark and show that our method can outperform the state-of-the-art method.

  • A Broadened and Deepened Anti-Jamming Technology for High-Dynamic GNSS Array Receivers

    Li-wen CHEN  Jian-sheng ZHENG  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:9
      Page(s):
    2055-2061

    Outside wireless signals often obstruct GNSS receivers from acquiring satellite signals. Traditional anti-jamming algorithms are used to suppress interference using a convex optimization method based on minimizing output power. These algorithms can reduce interference. However, these models suppress satellite signals as well as jamming interference. Under the high-dynamic condition, the output signal-to-interference-and-noise ratio (SINR) deteriorates seriously and the success rate in acquiring satellite signals falls accordingly. This paper introduces a novel, broadened model with a no-main-lobe-and-multi-virtual-null-constraints (NMLCB) method based on maximizing output power and constraining interference sources. With the new method, GNSS receivers can receive satellite signals more easily than using the power inversion (PI) and power minimization with derivative constraints null (NB) methods under the high-dynamic condition.

  • Energy Efficient Power Control and Resource Allocation in Downlink OFDMA HetNets with Cross-Tier Interference Constraint

    Guodong ZHANG  Wei HENG  Jinming HU  Tian LIANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:7
      Page(s):
    1599-1608

    Heterogeneous network (HetNet) is now considered to be a promising technique for enhancing the coverage and reducing the transmit power consumption of the next 5G system. Deploying small cells such as femtocells in the current macrocell networks achieves great spatial reuse at the cost of severe cross-tier interference from concurrent transmission. In this situation, two novel energy efficient power control and resource allocation schemes in terms of energy efficiency (EE)-fairness and EE-maximum, respectively, are investigated in this paper. In the EE-fairness scheme, we aim to maximize the minimum EE of the femtocell base stations (FBSs). Generalized Dinkelbach's algorithm (GDA) is utilized to tackle this optimization problem and a distributed algorithm is proposed to solve the subproblem in GDA with limited intercell coordination, in which only a few scalars are shared among FBSs. In the EE-maximum scheme, we aim to maximize the global EE of all femtocells which is defined as the aggregate capacity over the aggregate power consumption in the femtocell networks. Leveraged by means of the lower-bound of logarithmic function, a centralized algorithm with limited computational complexity is proposed to solve the global EE maximization problem. Simulation results show that the proposed algorithms outperform previous schemes in terms of the minimum EE, fairness and global EE.

  • Learning a Similarity Constrained Discriminative Kernel Dictionary from Concatenated Low-Rank Features for Action Recognition

    Shijian HUANG  Junyong YE  Tongqing WANG  Li JIANG  Changyuan XING  Yang LI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/11/16
      Vol:
    E99-D No:2
      Page(s):
    541-544

    Traditional low-rank feature lose the temporal information among action sequence. To obtain the temporal information, we split an action video into multiple action subsequences and concatenate all the low-rank features of subsequences according to their time order. Then we recognize actions by learning a novel dictionary model from concatenated low-rank features. However, traditional dictionary learning models usually neglect the similarity among the coding coefficients and have bad performance in dealing with non-linearly separable data. To overcome these shortcomings, we present a novel similarity constrained discriminative kernel dictionary learning for action recognition. The effectiveness of the proposed method is verified on three benchmarks, and the experimental results show the promising results of our method for action recognition.

  • Compact Analytical Threshold Voltage Model of Strained Gate-All-Around MOSFET Fabricated on Si1-xGex Virtual Substrate

    Yefei ZHANG  Zunchao LI  Chuang WANG  Feng LIANG  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E99-C No:2
      Page(s):
    302-307

    In this paper, an analytical threshold voltage model of the strained gate-all-around MOSFET fabricated on the Si1-xGex virtual substrate is presented by solving the two-dimensional Poisson equation. The impact of key parameters such as the strain, channel length, gate oxide thickness and radius of the silicon cylinder on the threshold voltage has been investigated. It has been demonstrated that the threshold voltage decreases as the strain in the channel increases. The threshold voltage roll-off becomes severe when increasing the Ge content in the Si1-xGex virtual substrate. The model is found to tally well with the device simulator.

  • A Line-Direction-Free and Character-Orientation-Free On-Line Handwritten Japanese Text Recognition System

    Yuechan HAO  Bilan ZHU  Masaki NAKAGAWA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2015/10/01
      Vol:
    E99-D No:1
      Page(s):
    197-207

    This paper describes a significantly improved recognition system for on-line handwritten Japanese text free from line direction and character orientation constraints. The recognition system separates handwritten text of arbitrary character orientation and line direction into text line elements, estimates and normalizes character orientation and line direction, applies two-stage over-segmentation, constructs a segmentation-recognition candidate lattice and evaluates the likelihood of candidate segmentation-recognition paths by combining the scores of character recognition, geometric features and linguistic context. Enhancements over previous systems are made in line segmentation, over-segmentation and context integration model. The results of experiments on text from the HANDS-Kondate_t_bf-2001-11 database demonstrate significant improvements in the character recognition rate compared with the previous systems. Its recognition rate on text of arbitrary character orientation and line direction is now comparable with that possible on horizontal text with normal character orientation. Moreover, its recognition speed and memory requirement do not limit the platforms or applications that employ the recognition system.

  • Optimal Source-Power Splitting in Non-Orthogonal Cooperative Relaying Communications

    Jihyun SHIN  Dongwoo KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:1
      Page(s):
    249-256

    This paper proposes an application of splitting source-node power for a two-phase cooperative relaying system where the transmit powers of the source and the relay node are individually constrained. In the proposed usage, the limited source power is divided into two parts that are used in the first and the second phase. Unlike conventional relaying methods, in the second phase the source retransmits its signal with the split power and, at the same time, the relay forwards the signal received at the first phase, which causes interference between the signals. In order to avoid the intervention, so-called a co-phasing weight for aligning the phases of the two signals is used at at the source before the second transmission. The forwarding operation at the relay however is exactly the same as the conventional techniques. Optimal power-splitting as well as the co-phasing weight is provided in this paper. With numerical investigation, the proposed power-splitting is shown to significantly improve the achievable throughput as well as reduce the outage probability compared with the conventional individual power allocation.

61-80hit(346hit)