• Title/Summary/Keyword: GREEDY

Search Result 428, Processing Time 0.031 seconds

Sparse Signal Recovery Using A Tree Search (트리검색 기법을 이용한 희소신호 복원기법)

  • Lee, Jaeseok;Shim, Byonghyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.12
    • /
    • pp.756-763
    • /
    • 2014
  • In this paper, we introduce a new sparse signal recovery algorithm referred to as the matching pursuit with greedy tree search (GTMP). The tree search in our proposed method is implemented to minimize the cost function to improve the recovery performance of sparse signals. In addition, a pruning strategy is employed to each node of the tree for efficient implementation. In our performance guarantee analysis, we provide the condition that ensures the exact identification of the nonzero locations. Through empirical simulations, we show that GTMP is effective for sparse signal reconstruction and outperforms conventional sparse recovery algorithms.

Sparse Signal Recovery via Tree Search Matching Pursuit

  • Lee, Jaeseok;Choi, Jun Won;Shim, Byonghyo
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.699-712
    • /
    • 2016
  • Recently, greedy algorithm has received much attention as a cost-effective means to reconstruct the sparse signals from compressed measurements. Much of previous work has focused on the investigation of a single candidate to identify the support (index set of nonzero elements) of the sparse signals. Well-known drawback of the greedy approach is that the chosen candidate is often not the optimal solution due to the myopic decision in each iteration. In this paper, we propose a tree search based sparse signal recovery algorithm referred to as the tree search matching pursuit (TSMP). Two key ingredients of the proposed TSMP algorithm to control the computational complexity are the pre-selection to put a restriction on columns of the sensing matrix to be investigated and the tree pruning to eliminate unpromising paths from the search tree. In numerical simulations of Internet of Things (IoT) environments, it is shown that TSMP outperforms conventional schemes by a large margin.

Tracking a Moving Object Using an Active Contour Model Based on a Frame Difference Map (차 영상 맵 기반의 능동 윤곽선 모델을 이용한 이동 물체 추적)

  • 이부환;김도종;최일;전기준
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.5
    • /
    • pp.153-163
    • /
    • 2004
  • This paper presents a video tracking method for a deformable moving object using an active contour model in the image sequences. It is quite important to decide the local convergence directions of the contour points for correctly extracting the boundary of the moving object with deformable shape. For this purpose, an energy function for the active contour model is newly proposed by adding a directional energy term using a frame difference map to tile Greedy algorithm. In addition, an updating rule of tile frame difference map is developed to encourage the stable convergence of the contour points. Experimental results on a set of synthetic and real image sequences showed that the proposed method can fully track the deformable object while extracting the boundary of the object elaborately in every frame.

Multiple Candidate Matching Pursuit (다중 후보 매칭 퍼슛)

  • Kwon, Seokbeop;Shim, Byonghyo
    • Journal of Broadcast Engineering
    • /
    • v.17 no.6
    • /
    • pp.954-963
    • /
    • 2012
  • As a greedy algorithm reconstructing the sparse signal from underdetermined system, orthogonal matching pursuit (OMP) algorithm has received much attention. In this paper, we multiple candidate matching pursuit (MuCaMP), which builds up candidate support set in every iteration and uses the minimum residual at last iteration. Using the restricted isometry property (RIP), we derive the sufficient condition for MuCaMP to recover the sparse signal exactly. The MuCaMP guarantees to reconstruct the K-sparse signal when the sensing matrix satisfies the RIP constant ${\delta}_{N+K}<\frac{\sqrt{N}}{\sqrt{K}+3\sqrt{N}}$. In addition, we show a recovery performance both noiseless and noisy measurements.

A Dynamic Placement Mechanism of Service Function Chaining Based on Software-defined Networking

  • Liu, Yicen;Lu, Yu;Chen, Xingkai;Li, Xi;Qiao, Wenxin;Chen, Liyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4640-4661
    • /
    • 2018
  • To cope with the explosive growth of Internet services, Service Function Chaining (SFC) based on Software-defined Networking (SDN) is an emerging and promising technology that has been suggested to meet this challenge. Determining the placement of Virtual Network Functions (VNFs) and routing paths that optimize the network utilization and resource consumption is a challenging problem, particularly without violating service level agreements (SLAs). This problem is called the optimal SFC placement problem and an Integer Linear Programming (ILP) formulation is provided. A greedy heuristic solution is also provided based on an improved two-step mapping algorithm. The obtained experimental results show that the proposed algorithm can automatically place VNFs at the optimal locations and find the optimal routing paths for each online request. This algorithm can increase the average request acceptance rate by about 17.6% and provide more than 20-fold reduction of the computational complexity compared to the Greedy algorithm. The feasibility of this approach is demonstrated via NetFPGA-10G prototype implementation.

Greedy Merging Method Based on Weighted Geometric Properties for User-Steered Mesh Segmentation (사용자 의도의 메쉬분할을 위한 기하적 속성 가중치 기반의 그리디 병합 방법)

  • Ha, Jong-Sung;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.52-59
    • /
    • 2007
  • This paper presents a greedy method for user-steered mesh segmentation, which is based on the merging priority metric defined for representing the geometric properties of meaningful parts. The priority metric is a weighted function composed of five geometric parameters: distribution of Gaussian map, boundary path concavity, boundary path length, cardinality, and segmentation resolution. This scheme can be extended without any modification only by defining more geometric parameters and adding them. Our experimental results show that the shapes of segmented parts can be controlled by setting up the weight values of geometric parameters.

Optimization Model for Location Management in WCDMA Networks (WCDMA 네트워크에서의 일치관리 최적화 모형)

  • Chung, Yong-Joo
    • Korean Management Science Review
    • /
    • v.26 no.3
    • /
    • pp.23-35
    • /
    • 2009
  • This study deals with the location management in WCDMA (Wideband Code Division Multiple Access) networks. The new location management method is the one of the many techniques used to provide the packet switched (PS) services effectively in WCDMA networks. WCDMA introduces RA (routing area) for the PS services in addition to LA (location area) for the circuit switched (CS) services. WCDMA system also adopts the cooperative paging and the combined area update which are to decrease signaling traffic using the PS network resources for the CS services. Considering the characteristics of the WCDMA networks, this study formulate into the mathematical programming problem for the location management. Rather than the existing researches which consider the single MSC/SGSN networks, we deal with the multi MSC/SGSN networks, where both MSC area and SGSN area should be determined as well. Fairness between traffic loads of MSC/SGSN and the system cost incurred to MSC/SGSN are also incorporated into our model, which make the model more realistic. We propose greedy algorithms for the problems, which consists of the merger of two neighboring areas and the movement of an area. Extensive experiment has been done based on the realistic problem examples. Followed by the analysis of parameter effect on the final solutions and the quality of final solutions obtained by our greedy algorithms. Our proposed model and analysis result can be used to determine WCDMA system areas and to predict the system performance measures by the determination.

Multi-objective Unbalanced Distribution Network Reconfiguration through Hybrid Heuristic Algorithm

  • Mahendran, G.;Sathiskumar, M.;Thiruvenkadam, S.;Lakshminarasimman, L.
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.2
    • /
    • pp.215-222
    • /
    • 2013
  • Electrical power distribution systems are critical links between the utility and customer. In general, power distribution systems have unbalanced feeders due to the unbalanced loading. The devices that dependent on balanced three phase supply are affected by the unbalanced feeders. This necessitates the balancing of feeders. The main objective of reconfiguration is to balance the loads among the phases subject to constraints such as load flow equations, capacity and voltage constraints and to reduce the real power loss, while subject to a radial network structure in which all loads must be energized. Therefore, the distribution system reconfiguration problem has been viewed as multi-objective problem. In this paper, the hybrid heuristic algorithm has been used for reconfiguration, which is the combination of fuzzy and greedy algorithms. The purpose of the introduction of greedy is to refrain the searching for the period of phase balancing. The incorporation of fuzzy helps to take up more objectives amid phase balancing in the searching. The effectiveness of the proposed method is demonstrated through modified IEEE 33 bus and modified IEEE 125 bus radial distribution system.

A Shaking Snake for Contour Extraction of an Object (물체의 윤곽선 추출을 위한 진동 스네이크)

  • Yoon, Jin-Sung;Kim, Kwan-Jung;Kim, Gye-Young;Paik, Doo-Won
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.527-534
    • /
    • 2003
  • An active contour model called snake is powerful tool for object contour extraction. But, conventional snakes require exhaustive computing time, sometimes can´t extract complex shape contours due to the properties of energy function, and are also heavily dependent on the position and the shape of an initial snake. To solving these problems, we propose in this paper an improved snake called "shaking snake", based on a greedy algorithm. A shaking snake consist of two steps. According to their appropriateness, we in the first step move each points directly to locations where contours are likely to be located. In the second step, we then align some snake points with a tolerable bound in order to prevent local minima. These processes shake the proposed snake. In the experimental results, we show the process of shaking the proposed shake and comparable performance with a greedy snake. The proposed snake can extract complex shape contours very accurately and run fast, approximately by the factor of five times, than a greedy snake.

A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks (무선 센서네트워크에서 침입탐지를 위한 탐지노드 활성화기법 연구)

  • Seong, Ki-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5238-5244
    • /
    • 2011
  • Recently, wireless sensor networks have become increasingly interesting areas over extensive application fields such as military, ecological, and health-related areas. Almost sensor networks have mission-critical tasks that requires very high security. Therefore, extensive work has been done for securing sensor networks from outside attackers, efficient cryptographic systems, secure key management and authorization, but little work has yet been done to protect these networks from inside threats. This paper proposed an method to select which nodes should activate their idle nodes as detectors to be able to watch all packets in the sensor network. Suggested method is modeled as optimization equation, and heuristic Greedy algorithm based simulation results are presented to verify my approach.