Skip to main content

Showing 1–32 of 32 results for author: Chong, E K P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.05020  [pdf, other

    eess.SY cs.DS

    A Performance Bound for the Greedy Algorithm in a Generalized Class of String Optimization Problems

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We present a simple performance bound for the greedy scheme in string optimization problems that obtains strong results. Our approach vastly generalizes the group of previously established greedy curvature bounds by Conforti and Cornuéjols (1984). We consider three constants, $α_G$, $α_G'$, and $α_G''$ introduced by Conforti and Cornuéjols (1984), that are used in performance bounds of greedy sche… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

  2. arXiv:2404.06669  [pdf, other

    eess.SY cs.DS

    On Bounds for Greedy Schemes in String Optimization based on Greedy Curvatures

    Authors: Bowen Li, Brandon Van Over, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We consider the celebrated bound introduced by Conforti and Cornuéjols (1984) for greedy schemes in submodular optimization. The bound assumes a submodular function defined on a collection of sets forming a matroid and is based on greedy curvature. We show that the bound holds for a very general class of string problems that includes maximizing submodular functions over set matroids as a special c… ▽ More

    Submitted 8 September, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

    Comments: This version has been accepted as an invited paper in the 63rd IEEE Conference on Decision and Control, Milan, Italy, December 16--19, 2024

  3. arXiv:2308.15758  [pdf, other

    cs.DS cs.DM eess.SY

    An Improved Greedy Curvature Bound in Finite-Horizon String Optimization with Application to a Sensor Coverage Problem

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We study the optimization problem of choosing strings of finite length to maximize string submodular functions on string matroids, which is a broader class of problems than maximizing set submodular functions on set matroids. We provide a lower bound for the performance of the greedy algorithm in our problem, and then prove that our bound is superior to the greedy curvature bound of Conforti and C… ▽ More

    Submitted 7 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

  4. arXiv:2207.06746  [pdf

    eess.IV cs.CV

    Single-Pixel Image Reconstruction Based on Block Compressive Sensing and Deep Learning

    Authors: Stephen L. H. Lau, Edwin K. P. Chong

    Abstract: Single-pixel imaging (SPI) is a novel imaging technique whose working principle is based on the compressive sensing (CS) theory. In SPI, data is obtained through a series of compressive measurements and the corresponding image is reconstructed. Typically, the reconstruction algorithm such as basis pursuit relies on the sparsity assumption in images. However, recent advances in deep learning have f… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  5. arXiv:2201.02275  [pdf, ps, other

    eess.SP cs.IT eess.SY stat.CO

    Well-Conditioned Linear Minimum Mean Square Error Estimation

    Authors: Edwin K. P. Chong

    Abstract: Linear minimum mean square error (LMMSE) estimation is often ill-conditioned, suggesting that unconstrained minimization of the mean square error is an inadequate approach to filter design. To address this, we first develop a unifying framework for studying constrained LMMSE estimation problems. Using this framework, we explore an important structural property of constrained LMMSE filters involvin… ▽ More

    Submitted 21 March, 2022; v1 submitted 6 January, 2022; originally announced January 2022.

  6. Automated Pavement Crack Segmentation Using U-Net-based Convolutional Neural Network

    Authors: Stephen L. H. Lau, Edwin K. P. Chong, Xu Yang, Xin Wang

    Abstract: Automated pavement crack image segmentation is challenging because of inherent irregular patterns, lighting conditions, and noise in images. Conventional approaches require a substantial amount of feature engineering to differentiate crack regions from non-affected regions. In this paper, we propose a deep learning technique based on a convolutional neural network to perform segmentation tasks on… ▽ More

    Submitted 30 June, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: Accepted for publication in IEEE Access

  7. arXiv:1910.00699  [pdf, other

    cs.AI eess.SY math.OC stat.AP stat.CO

    Decision Automation for Electric Power Network Recovery

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce R. Ellingwood

    Abstract: Critical infrastructure systems such as electric power networks, water networks, and transportation systems play a major role in the welfare of any community. In the aftermath of disasters, their recovery is of paramount importance; orderly and efficient recovery involves the assignment of limited resources (a combination of human repair workers and machines) to repair damaged infrastructure compo… ▽ More

    Submitted 18 October, 2019; v1 submitted 1 October, 2019; originally announced October 2019.

    Comments: Submitted to IEEE Transactions on Automation Science and Engineering (13 pages and 6 figures)

  8. An approximate dynamic programming approach to food security of communities following hazards

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: Food security can be threatened by extreme natural hazard events for households of all social classes within a community. To address food security issues following a natural disaster, the recovery of several elements of the built environment within a community, including its building portfolio, must be considered. Building portfolio restoration is one of the most challenging elements of recovery o… ▽ More

    Submitted 15 December, 2018; originally announced December 2018.

    Comments: As opposed to the preemptive scheduling problem, which was addressed in multiple works by us, we deal with a non-preemptive stochastic scheduling problem in this work. Submitted to 13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP13 Seoul, South Korea, May 26-30, 2019

    Journal ref: 13th Int. Conf. Appl. Statistics and Prob. Civ. Eng. (ICASP13), Seoul, South Korea, May 26-30, 2019

  9. arXiv:1806.08492  [pdf

    cs.CY

    An Approximate Dynamic Programming Approach to Community Recovery Management (Extended Abstract)

    Authors: Saeed Nozhati, Bruce R. Ellingwood, Hussam Mahmoud, Yugandhar Sarkale, Edwin K. P. Chong, Nathanael Rosenheim

    Abstract: The functioning of interdependent civil infrastructure systems in the aftermath of a disruptive event is critical to the performance and vitality of any modern urban community. Post-event stressors and chaotic circumstances, time limitations, and complexities in the community recovery process highlight the necessity for a comprehensive decision-making framework at the community-level for post-even… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: The material in this work provides a gist of the material in the journal version of our work (arXiv:1803.01451) that has in-detailed description of the methods employed in this article in addition to a more comprehensive treatment. This work will serve as a suitable introduction to the interested reader

    Journal ref: Presented at Engineering Mechanics Institute Conference 2018 (EMI 2018 -- MS36 Robustness of Infrastructures), Cambridge -- Boston, MA, May 29--June 1, 2018

  10. arXiv:1804.00250  [pdf

    cs.CE eess.SY

    A Modified Approximate Dynamic Programming Algorithm for Community-level Food Security Following Disasters

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: In the aftermath of an extreme natural hazard, community residents must have access to functioning food retailers to maintain food security. Food security is dependent on supporting critical infrastructure systems, including electricity, potable water, and transportation. An understanding of the response of such interdependent networks and the process of post-disaster recovery is the cornerstone o… ▽ More

    Submitted 15 May, 2018; v1 submitted 31 March, 2018; originally announced April 2018.

    Comments: The material presented here might have some overlap with arXiv:1803.04144 and arXiv:1803.01451. Nonetheless, this material contains substantial additions

    Journal ref: Proceedings of the 9th International Congress on Environmental Modelling and Software (iEMSs 2018), Fort Collins, CO, June 24--28, 2018

  11. arXiv:1803.04144  [pdf, other

    math.OC cs.CE eess.SY

    Solving Markov decision processes for network-level post-hazard recovery via simulation optimization and rollout

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce Ellingwood, Hussam Mahmoud

    Abstract: Computation of optimal recovery decisions for community resilience assurance post-hazard is a combinatorial decision-making problem under uncertainty. It involves solving a large-scale optimization problem, which is significantly aggravated by the introduction of uncertainty. In this paper, we draw upon established tools from multiple research communities to provide an effective solution to this c… ▽ More

    Submitted 12 April, 2018; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Submitted to Simulation Optimization for Cyber Physical Energy Systems (Special Session) in 14th IEEE International Conference on Automation Science and Engineering

    Journal ref: 2018 IEEE 14th Int. Conf. Autom. Sci. and Eng. (CASE) 906 - 912

  12. arXiv:1803.01451  [pdf, other

    math.OC cs.CE eess.SY

    Near-optimal planning using approximate dynamic programming to enhance post-hazard community resilience management

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: The lack of a comprehensive decision-making approach at the community level is an important problem that warrants immediate attention. Network-level decision-making algorithms need to solve large-scale optimization problems that pose computational challenges. The complexity of the optimization problems increases when various sources of uncertainty are considered. This research introduces a sequent… ▽ More

    Submitted 19 April, 2018; v1 submitted 4 March, 2018; originally announced March 2018.

    Comments: The first two authors contributed equally and are listed alphabetically

    Journal ref: Reliab. Eng. & Syst. Saf. 181 (2019) 116-126

  13. arXiv:1710.02619  [pdf, ps, other

    cs.LG stat.ML

    Ranking and Selection as Stochastic Control

    Authors: Yijie Peng, Edwin K. P. Chong, Chun-Hung Chen, Michael C. Fu

    Abstract: Under a Bayesian framework, we formulate the fully sequential sampling and selection decision in statistical ranking and selection as a stochastic control problem, and derive the associated Bellman equation. Using value function approximation, we derive an approximately optimal allocation policy. We show that this policy is not only computationally efficient but also possesses both one-step-ahead… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

    Comments: 15 pages, 8 figures, to appear in IEEE Transactions on Automatic Control

    MSC Class: IEEE

  14. arXiv:1706.09192  [pdf, other

    cs.SI

    Network Topology Inference Using Information Cascades with Limited Statistical Knowledge

    Authors: Feng Ji, Wenchang Tang, Wee Peng Tay, Edwin K. P. Chong

    Abstract: We study the problem of inferring network topology from information cascades, in which the amount of time taken for information to diffuse across an edge in the network follows an unknown distribution. Unlike previous studies, which assume knowledge of these distributions, we only require that diffusion along different edges in the network be independent together with limited moment information (e… ▽ More

    Submitted 4 March, 2019; v1 submitted 28 June, 2017; originally announced June 2017.

  15. arXiv:1703.08589  [pdf, other

    math.OC cs.DS

    Polynomial-Time Methods to Solve Unimodular Quadratic Programs With Performance Guarantees

    Authors: Shankarachary Ragi, Edwin K. P. Chong, Hans D. Mittelmann

    Abstract: We develop polynomial-time heuristic methods to solve unimodular quadratic programs (UQPs) approximately, which are known to be NP-hard. In the UQP framework, we maximize a quadratic function of a vector of complex variables with unit modulus. Several problems in active sensing and wireless communication applications boil down to UQP. With this motivation, we present three new heuristic methods wi… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  16. arXiv:1603.04893  [pdf, ps, other

    math.OC cs.GT

    Performance Bounds for Nash Equilibria in Submodular Utility Systems with User Groups

    Authors: Yajing Liu, Edwin K. P. Chong, Ali Pezeshki

    Abstract: In this paper, we consider variations of the utility system considered by Vetta, in which users are grouped together. Our aim is to establish how grouping and cooperation among users affect performance bounds. We consider two types of grouping. The first type is from \cite{Zhang2014}, where each user belongs to a group of users having social ties with it. For this type of utility system, each user… ▽ More

    Submitted 11 October, 2017; v1 submitted 15 March, 2016; originally announced March 2016.

    Comments: This paper was accepted by Journal of Control and Decision

  17. arXiv:1507.04822  [pdf, ps, other

    cs.IT

    Subspace selection for projection maximization with matroid constraints

    Authors: Zhenliang Zhang, Yuan Wang, Edwin K. P. Chong, Ali Pezeshki, Louis Scharf

    Abstract: Suppose that there is a ground set which consists of a large number of vectors in a Hilbert space. Consider the problem of selecting a subset of the ground set such that the projection of a vector of interest onto the subspace spanned by the vectors in the chosen subset reaches the maximum norm. This problem is generally NP-hard, and alternative approximation algorithms such as forward regression… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

  18. Robust Decentralized Detection and Social Learning in Tandem Networks

    Authors: Jack Ho, Wee Peng Tay, Tony Q. S. Quek, Edwin K. P. Chong

    Abstract: We study a tandem of agents who make decisions about an underlying binary hypothesis, where the distribution of the agent observations under each hypothesis comes from an uncertainty class. We investigate both decentralized detection rules, where agents collaborate to minimize the error probability of the final agent, and social learning rules, where each agent minimizes its own local minimax erro… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  19. Intersection Information based on Common Randomness

    Authors: Virgil Griffith, Edwin K. P. Chong, Ryan G. James, Christopher J. Ellison, James P. Crutchfield

    Abstract: The introduction of the partial information decomposition generated a flurry of proposals for defining an intersection information that quantifies how much of "the same information" two or more random variables specify about a target random variable. As of yet, none is wholly satisfactory. A palatable measure of intersection information would provide a principled way to quantify slippery concepts,… ▽ More

    Submitted 10 June, 2015; v1 submitted 6 October, 2013; originally announced October 2013.

    Comments: 19 pages, 5 figures

    Journal ref: Entropy (2014) Volume 16, Issue 4

  20. String Submodular Functions with Curvature Constraints

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: The problem of objectively choosing a string of actions to optimize an objective function that is string submodular has been considered in [1]. There it is shown that the greedy strategy, consisting of a string of actions that only locally maximizes the step-wise gain in the objective function achieves at least a (1-e^{-1})-approximation to the optimal strategy. This paper improves this approximat… ▽ More

    Submitted 25 May, 2015; v1 submitted 12 March, 2013; originally announced March 2013.

    Comments: to appear in IEEE Transaction on Automatic Control

  21. Hypothesis Testing in Feedforward Networks with Broadcast Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: Consider a countably infinite set of nodes, which sequentially make decisions between two given hypotheses. Each node takes a measurement of the underlying truth, observes the decisions from some immediate predecessors, and makes a decision between the given hypotheses. We consider two classes of broadcast failures: 1) each node broadcasts a decision to the other nodes, subject to random erasure i… ▽ More

    Submitted 25 March, 2013; v1 submitted 19 November, 2012; originally announced November 2012.

  22. arXiv:1210.4507  [pdf, other

    cs.IT cs.MA

    Submodularity and Optimality of Fusion Rules in Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in a balanced binary relay tree, where the leaves of the tree are sensors generating binary messages. The root of the tree is a fusion center that makes the overall decision. Every other node in the tree is a fusion node that fuses two binary messages from its child nodes into a new binary message and sends it to the parent node at the next level. We assu… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

  23. Learning in Hierarchical Social Networks

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study a social network consisting of agents organized as a hierarchical M-ary rooted tree, common in enterprise and military organizational structures. The goal is to aggregate information to solve a binary hypothesis testing problem. Each agent at a leaf of the tree, and only such an agent, makes a direct measurement of the underlying true hypothesis. The leaf agent then makes a decision and s… ▽ More

    Submitted 21 November, 2012; v1 submitted 30 May, 2012; originally announced June 2012.

  24. Detection Performance in Balanced Binary Relay Trees with Node and Link Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in the context of a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent sensors generating binary messages. The root of the tree is a fusion center making an overall decision. Every other node is a relay node that aggregates the messages received from its child nodes into a new message and sends it up towar… ▽ More

    Submitted 19 November, 2012; v1 submitted 1 June, 2012; originally announced June 2012.

  25. arXiv:1202.3913  [pdf, other

    cs.IT

    Greedy Adaptive Compression in Signal-Plus-Noise Models

    Authors: Entao Liu, Edwin K. P. Chong, Louis L. Scharf

    Abstract: The purpose of this article is to examine the greedy adaptive measurement policy in the context of a linear Guassian measurement model with an optimization criterion based on information gain. In the special case of sequential scalar measurements, we provide sufficient conditions under which the greedy policy actually is optimal in the sense of maximizing the net information gain. In the general s… ▽ More

    Submitted 17 August, 2012; v1 submitted 17 February, 2012; originally announced February 2012.

  26. arXiv:1202.2319   

    cs.IT

    Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection performance of $M$-ary relay trees, where only the leaves of the tree represent sensors making measurements. The root of the tree represents the fusion center which makes an overall detection decision. Each of the other nodes is a relay node which aggregates $M$ messages sent by its child nodes into a new compressed message and sends the message to its parent node. Building… ▽ More

    Submitted 1 November, 2012; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: Submitted to SSP workshop 2012

  27. arXiv:1202.1354   

    cs.IT

    Error Probability Bounds for M-ary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection error probabilities associated with an M-ary relay tree, where the leaves of the tree correspond to identical and independent sensors. Only these leaves are sensors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree is a relay node that combines M summarized messages from its immediate child nodes t… ▽ More

    Submitted 1 November, 2012; v1 submitted 7 February, 2012; originally announced February 2012.

    Comments: Submitted to ISIT 2012

  28. arXiv:1107.1824  [pdf, other

    cs.IT

    Measurement Design for Detecting Sparse Signals

    Authors: Ramin Zahedi, Ali Pezeshki, Edwin K. P. Chong

    Abstract: We consider the problem of testing for the presence (or detection) of an unknown sparse signal in additive white noise. Given a fixed measurement budget, much smaller than the dimension of the signal, we consider the general problem of designing compressive measurements to maximize the measurement signal-to-noise ratio (SNR), as increasing SNR improves the detection performance in a large class of… ▽ More

    Submitted 9 July, 2011; originally announced July 2011.

  29. arXiv:1106.4288  [pdf, ps, other

    cs.NI cs.IT math.AP

    Continuum Limits of Markov Chains with Application to Network Modeling

    Authors: Yang Zhang, Edwin K. P. Chong, Jan Hannig, Donald Estep

    Abstract: In this paper we investigate the continuum limits of a class of Markov chains. The investigation of such limits is motivated by the desire to model very large networks. We show that under some conditions, a sequence of Markov chains converges in some sense to the solution of a partial differential equation. Based on such convergence we approximate Markov chains modeling networks with a large numbe… ▽ More

    Submitted 21 June, 2011; originally announced June 2011.

    Comments: 15 pages, 10 figures

  30. arXiv:1106.0061  [pdf, other

    cs.IT

    Error Probability Bounds for Binary Relay Trees with Crummy Sensors

    Authors: Zhenliang Zhang, Ali Pezeshki, William Moran, Stephen D. Howard, Edwin K. P. Chong

    Abstract: We study the detection error probability associated with balanced binary relay trees, in which sensor nodes fail with some probability. We consider N identical and independent crummy sensors, represented by leaf nodes of the tree. The root of the tree represents the fusion center, which makes the final decision between two hypotheses. Every other node is a relay node, which fuses at most two binar… ▽ More

    Submitted 31 May, 2011; originally announced June 2011.

  31. arXiv:1105.1187  [pdf, other

    cs.IT stat.AP

    Error Probability Bounds for Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Ali Pezeshki, William Moran, Stephen D. Howard, Edwin K. P. Chong

    Abstract: We study the detection error probability associated with a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent detectors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree are relay nodes that combine two binary messages to form a single output binary message. In this way,… ▽ More

    Submitted 5 May, 2011; originally announced May 2011.

  32. arXiv:0710.1254  [pdf, ps, other

    cs.IT

    A Group Theoretic Model for Information

    Authors: Hua Li, Edwin K. P. Chong

    Abstract: In this paper we formalize the notions of information elements and information lattices, first proposed by Shannon. Exploiting this formalization, we identify a comprehensive parallelism between information lattices and subgroup lattices. Qualitatively, we demonstrate isomorphisms between information lattices and subgroup lattices. Quantitatively, we establish a decisive approximation relation b… ▽ More

    Submitted 5 October, 2007; originally announced October 2007.

    Comments: Submitted to IEEE Transactions on Information Theory