scholarly journals Using soft constraints to learn semantic models of descriptions of shapes

Author(s):  
Sergio Guadarrama ◽  
David P. Pancho
Author(s):  
Anastasia Fedorova

In Linguistics the terms model and modelling have a vast array of meanings, which depends on the purpose and the object, and the type of the scientific research. The article is dedicated to the investigation of a special procedure of semantic processes modelling, deducing and substantiating the notion “evolutional semantic model”, the content and operational opportunities of which differ drastically from the essence and purpose of the known from the scientific literature phenomenon of the same name. In the proposed research this variety of modelling is oriented towards the description of the dynamics of the legal terms content loading, the estimation of possible vectors of the semantic evolution on the way of its terminalization/determinalization. The evolutional model of semantics has here as its basis the succession of sememes or series of sememes, the order of which is determined with accounting of a number of parameters. The typical schemes of the meaning development, illustrated by the succession of sememes, are considered to be the models of semantic laws (evolutional semantic models = EMS). Their function is the explanation of the mechanism and the order of the stages of the semantic evolution of the system of the words which sprung from one root on the way of its legal specialization, and, therefore, the proposed in the paper experience of semantic laws modelling differs from the expertise of the “catalogue of semantic derivations”, proposed by H. A. Zaliznjak, which doesn’t have as its purpose the explanation of meaning displacements, and from the notion of semantic derivation, models of derivation, dynamic models, worked out by O. V. Paducheva, which also only state such a displacement, without proving its reality. Key words: evolutional semantic model (EMS), modelling, semantic law, sememe, pre(law).


2014 ◽  
Author(s):  
Masoud Rouhizadeh ◽  
Emily Prud'hommeaux ◽  
Jan van Santen ◽  
Richard Sproat

2020 ◽  
Author(s):  
Niranjan Raghunathan ◽  
Mikhail Bragin ◽  
Bing Yan ◽  
Peter Luh ◽  
Khosrow Moslehi ◽  
...  

Unit commitment (UC) is an important problem solved on a daily basis within a strict time limit. While hourly UC problems are currently considered, they may not be flexible enough with the fast-changing demand and the increased penetration of intermittent renewables. Sub-hourly UC is therefore recommended. This, however, will significantly increase problem complexity even under the deterministic setting, and current methods may not be able to obtain good solutions within the time limit. In this paper, deterministic sub-hourly UC is considered, with the innovative exploitation of soft constraints – constraints that do not need to be strictly satisfied, but with predetermined penalty coefficients for their violations. The key idea is the “surrogate optimization” concept that ensures multiplier convergence within “surrogate” Lagrangian relaxation as long as the “surrogate optimality condition” is satisfied without the need to optimally solve the “relaxed problem.” Consequently, subproblems can still be formed and optimized when soft constraints are not relaxed, leading to a drastically reduced number of multipliers and improved performance. To further enhance the method, a parallel version is developed. Testing results on the Polish system demonstrate the effectiveness and robustness of both the sequential and parallel versions at finding high-quality solutions within the time limit.


2012 ◽  
Vol 2012 ◽  
pp. 1-22 ◽  
Author(s):  
Li Wang ◽  
Yong Qin ◽  
Jie Xu ◽  
Limin Jia

A fuzzy optimization model based on improved symmetric tolerance approach is introduced, which allows for rescheduling high-speed railway timetable under unexpected interferences. The model nests different parameters of the soft constraints with uncertainty margin to describe their importance to the optimization purpose and treats the objective in the same manner. Thus a new optimal instrument is expected to achieve a new timetable subject to little slack of constraints. The section between Nanjing and Shanghai, which is the busiest, of Beijing-Shanghai high-speed rail line in China is used as the simulated measurement. The fuzzy optimization model provides an accurate approximation on train running time and headway time, and hence the results suggest that the number of seriously impacted trains and total delay time can be reduced significantly subject to little cost and risk.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Yu Zhang ◽  
Wei Huo ◽  
Kunpeng Jian ◽  
Ji Shi ◽  
Longquan Liu ◽  
...  

AbstractSOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited due to the lack of input specification, lack of routers’ internal running states, and lack of testing environment recovery mechanisms. Moreover, existing works for device fuzzing are more likely to detect memory corruption vulnerabilities.In this paper, we propose a solution ESRFuzzer to address these issues. It is a fully automated fuzzing framework for testing physical SOHO devices. It continuously and effectively generates test cases by leveraging two input semantic models, i.e., KEY-VALUE data model and CONF-READ communication model, and automatically recovers the testing environment with power management. It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities. With the guidance of the two semantic models, ESRFuzzer can work in two ways: general mode fuzzing and D-CONF mode fuzzing. General mode fuzzing can discover both issues which occur in the CONF and READ operation, while D-CONF mode fuzzing focus on the READ-op issues especially missed by general mode fuzzing.We ran ESRFuzzer on 10 popular routers across five vendors. In total, it discovered 136 unique issues, 120 of which have been confirmed as 0-day vulnerabilities we found. As an improvement of SRFuzzer, ESRFuzzer have discovered 35 previous undiscovered READ-op issues that belong to three vulnerability types, and 23 of them have been confirmed as 0-day vulnerabilities by vendors. The experimental results show that ESRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found.


Author(s):  
Duo Fu ◽  
Jin Huang ◽  
Wen-Bin Shangguan ◽  
Hui Yin

This article formulates the control problem of underactuated mobile robot as servo constraint-following, and develops a novel constraint-following servo control approach for underactuated mobile robot under both servo soft and hard constraints. Servo soft constraints are expressed as equalities, which may be holonomic or non-holonomic. Servo hard constraints are expressed as inequalities. It is required that the underactuated mobile robot motion eventually converges to servo soft constraints, and satisfies servo hard constraints at all times. Diffeomorphism is employed to incorporate hard constraints into soft constraints, yielding new soft constraints to relax hard constraints. By this, we design a constraint-following servo control based on the new servo soft constraints, which drives the system to strictly follow the original servo soft and hard constraints. The effectiveness of the proposed approach is proved by rigorous proof and simulations.


1984 ◽  
Vol 12 (3) ◽  
pp. 306-313 ◽  
Author(s):  
William J. Friedman
Keyword(s):  

Constraints ◽  
2010 ◽  
Vol 15 (4) ◽  
pp. 574-595 ◽  
Author(s):  
Markus Zanker ◽  
Markus Jessenitschnig ◽  
Wolfgang Schmid

Sign in / Sign up

Export Citation Format

Share Document