Search results for "Data type"

showing 10 items of 1183 documents

Iterated greedy with variable neighborhood search for a multiobjective waste collection problem

2020

Abstract In the last few years, the application of decision making to logistic problems has become crucial for public and private organizations. Efficient decisions clearly contribute to improve operational aspects such as cost reduction or service improvement. The particular case of waste collection service considered in this paper involves a set of economic, labor and environmental issues that translate into difficult operational problems. They pose a challenge to nowadays optimization technologies since they have multiple constraints and multiple objectives that may be in conflict. We therefore need to resort to multiobjective approaches to model and solve this problem, providing efficie…

0209 industrial biotechnologyService (systems architecture)Mathematical optimizationComputer sciencemedia_common.quotation_subjectGeneral EngineeringWaste collection02 engineering and technologyMulti-objective optimizationComputer Science ApplicationsSet (abstract data type)020901 industrial engineering & automationArtificial Intelligence0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingIterated greedyFunction (engineering)Variable neighborhood searchmedia_commonExpert Systems with Applications
researchProduct

Networked Bio-Inspired Evolutionary Dynamics on a Multi-Population

2019

We consider a multi-population, represented by a network of groups of individuals. Every player of each group can choose between two options, and we study the problem of reaching consensus. The dynamics not only depend on the dynamics within the group, but they also depend on the topology of the network, so neighboring groups influence individuals as well. First, we develop a mathematical model of this networked bio-inspired evolutionary behavior and we study its steady-state. We look at the special case where the underlying network topology is a regular and unweighted graph and show that the steady-state is a consensus equilibrium. A sufficient condition for exponential stability is given.…

0209 industrial biotechnologyTheoretical computer scienceComputer scienceMulti-agent system020208 electrical & electronic engineering02 engineering and technologyNetwork topologyGroup decision-making020901 industrial engineering & automationExponential stability0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Special caseEvolutionary dynamicsTopology (chemistry)2019 18th European Control Conference (ECC)
researchProduct

Graph-theoretical derivation of brain structural connectivity

2020

Brain connectivity at the single neuron level can provide fundamental insights into how information is integrated and propagated within and between brain regions. However, it is almost impossible to adequately study this problem experimentally and, despite intense efforts in the field, no mathematical description has been obtained so far. Here, we present a mathematical framework based on a graph-theoretical approach that, starting from experimental data obtained from a few small subsets of neurons, can quantitatively explain and predict the corresponding full network properties. This model also changes the paradigm with which large-scale model networks can be built, from using probabilisti…

0209 industrial biotechnologyTheoretical computer scienceComputer scienceNeuronal network02 engineering and technologyMECHANISMSCENTRALITY020901 industrial engineering & automationSettore MAT/05 - Analisi MatematicaNeuronal networksConnectome0202 electrical engineering electronic engineering information engineeringINDEXComputer Science::DatabasesRandom graphsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaQuantitative Biology::Neurons and CognitionApplied MathematicsProbabilistic logicExperimental data020206 networking & telecommunicationsComputational MathematicsSYNCHRONIZATIONSIMULATIONGraph (abstract data type)Applied Mathematics and Computation
researchProduct

Do Randomized Algorithms Improve the Efficiency of Minimal Learning Machine?

2020

Minimal Learning Machine (MLM) is a recently popularized supervised learning method, which is composed of distance-regression and multilateration steps. The computational complexity of MLM is dominated by the solution of an ordinary least-squares problem. Several different solvers can be applied to the resulting linear problem. In this paper, a thorough comparison of possible and recently proposed, especially randomized, algorithms is carried out for this problem with a representative set of regression datasets. In addition, we compare MLM with shallow and deep feedforward neural network models and study the effects of the number of observations and the number of features with a special dat…

0209 industrial biotechnologyrandom projectionlcsh:Computer engineering. Computer hardwareComputational complexity theoryComputer scienceRandom projectionlcsh:TK7885-789502 engineering and technologyMachine learningcomputer.software_genresupervised learningapproximate algorithmsSet (abstract data type)regressioanalyysi020901 industrial engineering & automationdistance–based regressionalgoritmit0202 electrical engineering electronic engineering information engineeringordinary least–squaresbusiness.industrySupervised learningsingular value decompositionminimal learning machineMultilaterationprojektioRandomized algorithmkoneoppiminenmachine learningScalabilityFeedforward neural network020201 artificial intelligence & image processingArtificial intelligenceapproksimointibusinesscomputerMachine Learning and Knowledge Extraction
researchProduct

Comparison of fully non-stationary artificial accelerogram generation methods in reproducing seismicity at a given site

2020

Abstract Seismic input modelling is a crucial step when Non-Linear Time-History Analyses (NLTHAs) are performed, the seismic response of structures being highly responsive to the input employed. When natural accelerograms able to represent local seismicity are not available, the use of generated accelerograms is an efficient solution for input modelling. The aim of the present paper is to compare four methods for generating fully non-stationary artificial accelerograms on the basis of a target spectrum, identified using seven recorded accelerograms registered in the neighbourhood of the construction site during a single event, assumed as target accelerograms. For each method, seven accelero…

0211 other engineering and technologiesSoil Science020101 civil engineeringSpectrum-compatible02 engineering and technologyInduced seismicity0201 civil engineeringSet (abstract data type)Intensity measure parametermedicinePoint (geometry)Seismic site characteristic021101 geological & geomatics engineeringCivil and Structural EngineeringEvent (probability theory)Basis (linear algebra)business.industryFully non-stationaryStiffnessStructural engineeringGeotechnical Engineering and Engineering GeologySettore ICAR/09 - Tecnica Delle CostruzioniArtificial accelerogrammedicine.symptombusinessEnergy (signal processing)GeologySoil Dynamics and Earthquake Engineering
researchProduct

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Combined column-and-row-generation for the optimal communication spanning tree problem

2018

Abstract This paper considers the exact solution of the optimal communication spanning tree problem (OCSTP), which can be described as follows: Given an undirected graph with transportation costs on every edge and communication requirements for all pairs of vertices, the OCSTP seeks for a spanning tree that minimizes the sum of the communication costs between all pairs of vertices, where the communication cost of a pair of vertices is defined as their communication requirement multiplied by the transportation cost of the unique tree path that connects the two vertices. Two types of compact formulations for OCSTP were presented in the literature. The first one is a four-index model based on …

021103 operations researchSpanning treeGeneral Computer ScienceHeuristicComputer scienceIntersection (set theory)0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchFlow network01 natural sciencesTree (graph theory)GraphVertex (geometry)Combinatorics010201 computation theory & mathematicsModeling and SimulationPath (graph theory)Graph (abstract data type)MathematicsofComputing_DISCRETEMATHEMATICSComputers & Operations Research
researchProduct

The ELECTRE I method to support the FMECA

2018

Abstract In traditional Failure Modes, Effects and Criticality Analysis (FMECA), risk priorities of failure modes are determined through the Risk Priority Number (RPN), which is a function of the three risk parameters Occurrence (O), Severity (S), and Detection (D). In the present paper, an alternative approach to RPN is proposed for the criticality assessment of system failure modes. Particularly, the Multi-Criteria Decision Making (MCDM) method ELECTRE I is proposed to select the most critical failure mode in the set of the failure modes charactering a complex system. The method has been applied to a case study previously proposed by Zammori and Gabrielli (2012).

021110 strategic defence & security studies021103 operations researchComputer science0211 other engineering and technologies02 engineering and technologyFunction (mathematics)Multiple-criteria decision analysisReliability engineeringSet (abstract data type)Failure mode effects and criticality analysisSystem failureControl and Systems EngineeringELECTREFailure mode and effects analysisIFAC-PapersOnLine
researchProduct

Constructing Antidictionaries of Long Texts in Output-Sensitive Space

2021

AbstractA wordxthat is absent from a wordyis calledminimalif all its proper factors occur iny. Given a collection ofkwordsy1, … ,ykover an alphabetΣ, we are asked to compute the set$\mathrm {M}^{\ell }_{\{y_1,\ldots ,y_k\}}$M{y1,…,yk}ℓof minimal absent words of length at mostℓof the collection {y1, … ,yk}. The set$\mathrm {M}^{\ell }_{\{y_1,\ldots ,y_k\}}$M{y1,…,yk}ℓcontains all the wordsxsuch thatxis absent from all the words of the collection while there existi,j, such that the maximal proper suffix ofxis a factor ofyiand the maximal proper prefix ofxis a factor ofyj. In data compression, this corresponds to computing the antidictionary ofkdocuments. In bioinformatics, it corresponds to c…

0301 basic medicineAntidictionarySettore INF/01 - InformaticaOutput sensitive algorithm0102 computer and information sciencesSpace (mathematics)01 natural sciencesTheoretical Computer ScienceString algorithmPrefixSet (abstract data type)Combinatorics03 medical and health sciences030104 developmental biologyComputational Theory and Mathematics010201 computation theory & mathematicsData compressionOutput-sensitive algorithm[INFO]Computer Science [cs]SuffixAlphabetAbsent wordWord (group theory)MathematicsTheory of Computing Systems
researchProduct