254 research outputs found

    An Asymptotic Analysis on Generalized Secretary Problem

    Full text link
    As a famous result, the ``37\% Law'' for Secretary Problem has widely influenced peoples' perception on online decision strategies about choice. However, using this strategy, too many attractive candidates may be rejected in the first 37\%, and in practice people also tend to stop earlier\cite{Bearden_early}. In this paper, we argued that in most cases, the best-only optimization does not obtain an optimal outcome, while the optimal cutoff should be O(n)O(\sqrt{n}). And we also showed that in some strict objective that only cares several best candidates, Θ(n)\Theta(n) skips are still needed.Comment: low quality as is my undergraduate wor

    Noise-Stable Rigid Graphs for Euclidean Embedding

    Full text link
    We proposed a new criterion \textit{noise-stability}, which revised the classical rigidity theory, for evaluation of MDS algorithms which can truthfully represent the fidelity of global structure reconstruction; then we proved the noise-stability of the cMDS algorithm in generic conditions, which provides a rigorous theoretical guarantee for the precision and theoretical bounds for Euclidean embedding and its application in fields including wireless sensor network localization and satellite positioning. Furthermore, we looked into previous work about minimum-cost globally rigid spanning subgraph, and proposed an algorithm to construct a minimum-cost noise-stable spanning graph in the Euclidean space, which enabled reliable localization on sparse graphs of noisy distance constraints with linear numbers of edges and sublinear costs in total edge lengths. Additionally, this algorithm also suggests a scheme to reconstruct point clouds from pairwise distances at a minimum of O(n)O(n) time complexity, down from O(n3)O(n^3) for cMDS

    Musical Instrument Classification via Low-Dimensional Feature Vectors

    Full text link
    Music is a mysterious language that conveys feeling and thoughts via different tones and timbre. For better understanding of timbre in music, we chose music data of 6 representative instruments, analysed their timbre features and classified them. Instead of the current trend of Neural Network for black-box classification, our project is based on a combination of MFCC and LPC, and augmented with a 6-dimensional feature vector designed by ourselves from observation and attempts. In our white-box model, we observed significant patterns of sound that distinguish different timbres, and discovered some connection between objective data and subjective senses. With a totally 32-dimensional feature vector and a naive all-pairs SVM, we achieved improved classification accuracy compared to a single tool. We also attempted to analyze music pieces downloaded from the Internet, found out different performance on different instruments, explored the reasons and suggested possible ways to improve the performance

    Bayesian Mechanism Design for Blockchain Transaction Fee Allocation

    Full text link
    In blockchain systems, the design of transaction fee mechanisms is essential for stability and satisfaction for both miners and users. A recent work has proven the impossibility of collusion-proof mechanisms that achieve both non-zero miner revenue and Dominating-Strategy-Incentive-Compatible (DSIC) for users. However, a positive miner revenue is important in practice to motivate miners. To address this challenge, we consider a Bayesian game setting and relax the DSIC requirement for users to Bayesian-Nash-Incentive-Compatibility (BNIC). In particular, we propose an auxiliary mechanism method that makes connections between BNIC and DSIC mechanisms. With the auxiliary mechanism method, we design a transaction fee mechanism (TFM) based on the multinomial logit (MNL) choice model, and prove that the TFM has both BNIC and collusion-proof properties with an asymptotic constant-factor approximation of optimal miner revenue for i.i.d. bounded valuations. Our result breaks the zero-revenue barrier while preserving truthfulness and collusion-proof properties.Comment: 58 pages, CESC 202

    RecRecNet: Rectangling Rectified Wide-Angle Images by Thin-Plate Spline Model and DoF-based Curriculum Learning

    Full text link
    The wide-angle lens shows appealing applications in VR technologies, but it introduces severe radial distortion into its captured image. To recover the realistic scene, previous works devote to rectifying the content of the wide-angle image. However, such a rectification solution inevitably distorts the image boundary, which changes related geometric distributions and misleads the current vision perception models. In this work, we explore constructing a win-win representation on both content and boundary by contributing a new learning model, i.e., Rectangling Rectification Network (RecRecNet). In particular, we propose a thin-plate spline (TPS) module to formulate the non-linear and non-rigid transformation for rectangling images. By learning the control points on the rectified image, our model can flexibly warp the source structure to the target domain and achieves an end-to-end unsupervised deformation. To relieve the complexity of structure approximation, we then inspire our RecRecNet to learn the gradual deformation rules with a DoF (Degree of Freedom)-based curriculum learning. By increasing the DoF in each curriculum stage, namely, from similarity transformation (4-DoF) to homography transformation (8-DoF), the network is capable of investigating more detailed deformations, offering fast convergence on the final rectangling task. Experiments show the superiority of our solution over the compared methods on both quantitative and qualitative evaluations. The code and dataset are available at https://github.com/KangLiao929/RecRecNet.Comment: Accepted to ICCV 202

    Analysis on almost Abelian Lie groups: Groups, subgroups and quotients

    Full text link
    The subject of investigation are real almost Abelian Lie groups with their Lie group theoretical aspects, such as the exponential map, faithful matrix representations, discrete and connected subgroups, quotients and automorphisms. The emphasis is put on explicit description of all technical details

    ClusterSLAM: A SLAM backend for simultaneous rigid body clustering and motion estimation

    Get PDF
    We present a practical backend for stereo visual SLAM which can simultaneously discover individual rigid bodies and compute their motions in dynamic environments. While recent factor graph based state optimization algorithms have shown their ability to robustly solve SLAM problems by treating dynamic objects as outliers, the dynamic motions are rarely considered. In this paper, we exploit the consensus of 3D motions among the landmarks extracted from the same rigid body for clustering and estimating static and dynamic objects in a unified manner. Specifically, our algorithm builds a noise-aware motion affinity matrix upon landmarks, and uses agglomerative clustering for distinguishing those rigid bodies. Accompanied by a decoupled factor graph optimization for revising their shape and trajectory, we obtain an iterative scheme to update both cluster assignments and motion estimation reciprocally. Evaluations on both synthetic scenes and KITTI demonstrate the capability of our approach, and further experiments considering online efficiency also show the effectiveness of our method for simultaneous tracking of ego-motion and multiple objects

    ClusterSLAM: A SLAM backend for simultaneous rigid body clustering and motion estimation

    Get PDF
    We present a practical backend for stereo visual SLAM which can simultaneously discover individual rigid bodies and compute their motions in dynamic environments. While recent factor graph based state optimization algorithms have shown their ability to robustly solve SLAM problems by treating dynamic objects as outliers, their dynamic motions are rarely considered. In this paper, we exploit the consensus of 3D motions for landmarks extracted from the same rigid body for clustering, and to identify static and dynamic objects in a unified manner. Specifically, our algorithm builds a noise-aware motion affinity matrix from landmarks, and uses agglomerative clustering to distinguish rigid bodies. Using decoupled factor graph optimization to revise their shapes and trajectories, we obtain an iterative scheme to update both cluster assignments and motion estimation reciprocally. Evaluations on both synthetic scenes and KITTI demonstrate the capability of our approach, and further experiments considering online efficiency also show the effectiveness of our method for simultaneously tracking ego-motion and multiple objects

    Measurement of CP asymmetries and branching fraction ratios of B− decays to two charm mesons

    Get PDF
    The CPCP asymmetries of seven B−B^- decays to two charm mesons are measured using data corresponding to an integrated luminosity of 9fb−19\text{fb}^{-1} of proton-proton collisions collected by the LHCb experiment. Decays involving a D∗0D^{*0} or Ds∗−D^{*-}_s meson are analysed by reconstructing only the D0D^0 or Ds−D^-_s decay products. This paper presents the first measurement of ACP(B−→Ds∗−D0)\mathcal{A}^{CP}(B^- \rightarrow D^{*-}_s D^0) and ACP(B−→Ds−D∗0)\mathcal{A}^{CP}(B^- \rightarrow D^{-}_s D^{*0}), and the most precise measurement of the other five CPCP asymmetries. There is no evidence of CPCP violation in any of the analysed decays. Additionally, two ratios between branching fractions of selected decays are measured.The CP asymmetries of seven B−^{−} decays to two charm mesons are measured using data corresponding to an integrated luminosity of 9 fb−1^{−1} of proton-proton collisions collected by the LHCb experiment. Decays involving a D∗0^{*0} or Ds∗− {D}_s^{\ast -} meson are analysed by reconstructing only the D0^{0} or Ds− {D}_s^{-} decay products. This paper presents the first measurement of ACP \mathcal{A} ^{CP}(B−^{−}→Ds∗− {D}_s^{\ast -} D0^{0}) and ACP \mathcal{A} ^{CP}(B−^{−}→Ds− {D}_s^{-} D∗0^{∗0}), and the most precise measurement of the other five CP asymmetries. There is no evidence of CP violation in any of the analysed decays. Additionally, two ratios between branching fractions of selected decays are measured.[graphic not available: see fulltext]The CPCP asymmetries of seven B−B^- decays to two charm mesons are measured using data corresponding to an integrated luminosity of 9 fb−19\text{ fb}^{-1} of proton-proton collisions collected by the LHCb experiment. Decays involving a D∗0D^{*0} or Ds∗−D^{*-}_s meson are analysed by reconstructing only the D0D^0 or Ds−D^-_s decay products. This paper presents the first measurement of ACP(B−→Ds∗−D0)\mathcal{A}^{CP}(B^- \rightarrow D^{*-}_s D^0) and ACP(B−→Ds−D∗0)\mathcal{A}^{CP}(B^- \rightarrow D^{-}_s D^{*0}), and the most precise measurement of the other five CPCP asymmetries. There is no evidence of CPCP violation in any of the analysed decays. Additionally, two ratios between branching fractions of selected decays are measured

    A Prognostics Method Based on Back Propagation Neural Network for Corroded Pipelines

    No full text
    A method that employs the back propagation (BP) neural network is used to predict the growth of corrosion defect in pipelines. This method considers more diversified parameters that affect the pipeline’s corrosion rate, including pipe parameters, service life, corrosion type, corrosion location, corrosion direction, and corrosion amount in a three-dimensional direction. The initial corrosion time is also considered, and, on this basis, the uncertainties of the initial corrosion time and the corrosion size are added to the BP neural network model. In this paper, three kinds of pipeline corrosion growth models are constructed: the traditional corrosion model, the corrosion model considering the uncertainties of initial corrosion time and corrosion depth, and corrosion model also considering the uncertainties of corrosion size (length, width, depth). The rationality and effectiveness of the proposed prediction models are verified by three case studies: the uniform model, the exponential model, and the gamma process model. The proposed models can be widely used in the prediction and management of pipeline corrosion
    • …
    corecore