2,199 results
Search Results
2. Fixed-time bounded control of nonlinear systems without initial-state constraint.
- Author
-
Gao, Hui, Wang, Ziyan, Ma, Jing, and Yin, Le
- Subjects
- *
NONLINEAR systems , *BACKSTEPPING control method , *PROBLEM solving , *COMPUTER simulation , *ITERATIVE learning control , *ALGORITHMS - Abstract
To solve the control problem of time-varying state-scale nonlinear systems whose initial state is not affected by settling time, fixed-time convergence algorithms are proposed for first-order systems and higher-order systems in this paper. First, a scalar model is used to illustrate how the time-varying feedback parameter can guarantee that the system achieves asymptotic stability while achieving finite-time convergence, and it is proved that the settling time obtained in this paper is only related to the prescribed boundary. This allows us to design the settling time with an appropriate parameter based on the prescribed boundary. To exhibit the effectiveness and extensibility of the proposed algorithm for first-order scalar systems, the results are subsequently extended to general higher-order systems based on the backstepping method. By introducing numerical simulation results, this paper verifies that the proposed algorithm will make the system achieve asymptotic stability and its output can converge to a given boundary, regardless of the system's initial states. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Resilient event‐triggered fault‐tolerant optimization for Euler–Lagrange plants with intermittent communication and asynchronous DoS attacks.
- Author
-
Yuan, Xin‐Rui, Yao, Xiang‐Yu, Park, Ju H., and Ge, Ming‐Feng
- Subjects
- *
DENIAL of service attacks , *COST control , *EULER-Lagrange system , *COMPUTER simulation , *ALGORITHMS - Abstract
This paper investigates the distributed optimization problem of networked Euler–Lagrange (EL) systems with actuator faults and unknown model parameters. In order to solve this issue, some event‐triggered fault‐tolerant (ETFT) optimal coordination algorithms with the mechanism of intermittent communication and intermittent controller update are designed for the first time to compensate for the impact of physical faults on the system, and reduce communication costs and control resource consumption. For practical applications, it is difficult for the system to have a secure environment if there exist malicious attacks blocking network channels among agents. Therefore, the resilient ETFT optimal coordination with intermittent communication subject to asynchronous denial‐of‐service (DoS) attacks is considered. Especially, auxiliary systems with adaptive gains are introduced in the algorithms due to the unavailability of the EL model parameters, which also enable virtual data exchange between agents and protect actual state information. Note that the algorithms are fully distributed as the global topology information is not required. Finally, the feasibility of the proposed algorithms is verified through numerical simulation of examples. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Distributed dynamic event-triggered algorithm for optimization problem with time delay.
- Author
-
Jiang, Lu, Xia, Lunchao, and Zhao, Zhongyuan
- Subjects
- *
MULTIAGENT systems , *UNDIRECTED graphs , *COMPUTER simulation , *ALGORITHMS , *DISTRIBUTED algorithms - Abstract
This paper focuses on studying the optimization problem of multi-agent systems (MAS) under undirected graph. To reduce the communication frequency among agents, a zero-gradient-sum (ZGS) algorithm based on dynamic event-triggered (DET) mechanism is investigated. The event-triggered condition of each agent only uses its own state information and the neighbor's state information at the previous triggering instants, without requiring continuous state information from the neighbor. In addition, the designed algorithm allows for the sampling period to be arbitrarily large. The Lyapunov method is utilized to derive the sufficient conditions that incorporate time delay and parameters. As the event is only checked at the periodic moment, zeno behavior can be directly excluded. Finally, numerical simulations demonstrate the effectiveness of the theoretical results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Experimenting with computational thinking for knowledge transfer in engineering robotics.
- Author
-
Chichekian, Tanya, Trudeau, Joel, Jawhar, Tawfiq, and Corliss, Dylan
- Subjects
- *
COMPUTER simulation , *SCHOOL environment , *TASK performance , *RESEARCH funding , *ENGINEERING , *UNDERGRADUATE programs , *UNDERGRADUATES , *TEACHING methods , *PROBLEM solving , *DESCRIPTIVE statistics , *ROBOTICS , *ABILITY , *ONLINE education , *COMPUTER assisted instruction , *STUDENT attitudes , *PSYCHOLOGY of college students , *DATA analysis software , *TRAINING , *ALGORITHMS - Abstract
Background: Despite its obvious relevance to computer science, computational thinking (CT) is transdisciplinary with the potential of impacting one's analytical ability. Although countless efforts have been invested across K‐12 education, there is a paucity of research at the postsecondary level about the extent to which CT can contribute to sustainable learning outcomes. Objectives: The current study examines how a series of Arduino‐based robotics learning activities capture the fuller essence of concepts related to CT. Methods: College students (n = 50) completed a series of six robotics learning activities. Think‐alouds, student reflections and performance scores were used to assess students' CT through a robotics challenge in virtual and physical learning environments. Results and Conclusions: Students verbalized CT concepts related to algorithmic thinking much more than abstraction, problem decomposition and testing and debugging. Students exposed to active learning performed better in a virtual robotics challenge compared to their peers in a traditional‐oriented classroom. Students' scores on the physical robotics challenge increased as a function of the number of references they made to CT concepts during the think‐alouds. It is possible to design pedagogical experiences that tap into various dimensions of CT at incremental levels of complexity through a series of Arduino‐based robotics activities. With the integration of an online simulation, students can visualize and transfer their CT skills between a virtual and physical learning environment, thus leading to more sustainable learning outcomes. Lay Description: What is already known about this topic: Computational thinking (CT) is the conceptual foundation for problem‐solving.CT shifted from unplugged to plugged activities.CT concepts can be fostered through educational robotics. What this paper adds: A multi‐dimensional approach to assessing CT.Applications of CT provide insights into skill transfer.An integrative theoretical approach to study the 'how' and the 'what' of CT. Implications for practice: Educational robotics activities can cater to a fuller range of CT skills.Virtual simulations with constructive feedback are beneficial for students in traditional settings.Mixed learning environments contribute to making links between lectures and labs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Mechatronic system parameters for automatic assembly of products from tape materials: Choice substantiation.
- Author
-
Zamuragin, Yu. M., Salamandra, K. B., and Salamandra, B. L.
- Subjects
- *
COMPUTER simulation , *ALGORITHMS , *AUTOMATIC speech recognition - Abstract
The paper analyzes the influence of the adaptive mechatronic system parameters on the process of stabilizing the step of moving materials during automatic assembly. Dependences of variances and mathematical expectations of the displacement step are obtained depending on the parameters of the system under a random external action. Numerical simulation of the operation of the algorithms used is carried out, recommendations are given for the optimal choice of system parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps.
- Author
-
Naeem, Ensherah A., Joshi, Anand B., Kumar, Dhanesh, and El-Samie, Fathi E. Abd
- Subjects
- *
IMAGE encryption , *ALGORITHMS , *STATISTICS , *STATISTICAL correlation , *COMPUTER simulation - Abstract
This paper presents a solution for the security of few-detail images in real-time applications over open or unsecure networks depending on diffusion and confusion operations. The diffusion and confusion operations are both performed based on Henon and Baker chaotic maps. XOR and permutation operations are used to allow diffusion and confusion in the algorithm. In the proposed algorithm, a high-detail image is used as a key. The computer simulation results and security analysis are given to ensure the validity and strength of the proposed algorithm. In the security analysis, we have performed key-space analysis, cropping attack analysis, noise attack analysis, and differential attack analysis. Some statistical analyses based on entropy, histogram, and correlation coefficient estimation are also given to check the strength of the presented algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Performance evaluation of LIBTA/hybrid time-slot selection algorithm for cellular systems<FNR></FNR><FN>This paper was partially presented at the IASTED International Conference on Modelling, Simulation and Optimization, Singapore, August 1997. </FN>.
- Author
-
Jyh-Horng Wen, Wen-Jiang Chen, Shang-Yo Lin, and Kuo-Ting Huang
- Subjects
- *
TELECOMMUNICATION systems , *ALGORITHMS , *PERFORMANCE evaluation , *CELL phone systems , *COMPUTER simulation - Abstract
This paper studies the performance of radio assignment algorithms for portable access in cellular systems. Several channel access procedures are proposed and simulated using block oriented network simulator (BONeS) simulation of a model 36-port system. Simulation results exhibit that load-sharing system with LIBTA algorithm is better than directed retry system with the same algorithm by around 0.9 erlangs while better than quasi-fixed channel assignment (QFCA) system by around 2 erlangs if the grade of service (GOS) is constrained to less than 10 per cent. Plus, a hybrid time-slot selection procedure is proposed to enhance the system performance. It is observed that systems with hybrid time-slot selection perform better than those with LIBTA algorithm in GOS under heavy load. It is also observed that load sharing system with hybrid time-slot selection algorithm is better than directed retry system with the same algorithm by around 0.7 erlangs and better than QFCA system by around 2 erlangs. Copyright © 2001 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
9. An Error Estimation System for Close-Range Photogrammetric Systems and Algorithms †.
- Author
-
Poroykov, Anton, Pechinskaya, Olga, Shmatko, Ekaterina, Eremin, Danil, and Sivov, Nikita
- Subjects
- *
MEASUREMENT errors , *STEREOPHONIC sound systems , *ALGORITHMS , *SHAPE measurement , *COMPUTER simulation , *PROBLEM solving - Abstract
Close-range photogrammetry methods are widely used for non-contact and accurate measurements of surface shapes. These methods are based on calculating the three-dimensional coordinates of an object from two-dimensional images using special digital processing algorithms. Due to the relatively complex measurement principle, the accurate estimation of the photogrammetric measurement error is a non-trivial task. Typically, theoretical estimations or computer modelling are used to solve this problem. However, these approaches cannot provide an accurate estimate because it is impossible to consider all factors that influence the measurement results. To solve this problem, we propose the use of physical modelling. The measurement results from the photogrammetric system under test were compared with the results of a more accurate reference measurement method. This comparison allowed the error to be estimated under controlled conditions. The test object was a flexible surface whose shape could vary smoothly over a wide range. The estimation of the measurement accuracy for a large number of different surface shapes allows us to obtain new results that are difficult to obtain using standard approaches. To implement the proposed approach, a laboratory system for the error estimation of close-range photogrammetric measurements was developed. The paper contains a detailed description of the developed system and the proposed technique for a comparison of the measurement results. The error in the reference method, which was chosen to be phasogrammetry, was evaluated experimentally. Experimental testing of the stereo photogrammetric system was performed according to the proposed technique. The obtained results show that the proposed technique can reveal dependencies that may not be detected by standard approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Efficient algorithm for full-state quantum circuit simulation with DD compression while maintaining accuracy.
- Author
-
Song, Yuhong, Sha, Edwin Hsing-Mean, Zhuge, Qingfeng, Xu, Rui, and Wang, Han
- Subjects
- *
QUANTUM communication , *ALGORITHMS , *SHORT-term memory , *QUBITS , *QUANTUM wells , *COMPUTER simulation - Abstract
With the development of noisy intermediate-scale quantum machines, quantum processors show their supremacy in specific applications. To better understand the quantum behavior and verify larger quantum bit (qubit) algorithms, simulation on classical computers becomes crucial. However, as the simulated number of qubits increases, the full-state simulation suffers exponential memory increment for state vector storing. In order to compress the state vector, some existing works reduce the memory by data encoding compressors. Nevertheless, the memory requirement remains massive. Meanwhile, others utilize compact decision diagrams (DD) to represent the state vector, which only demands linear memory size. However, the existing DD-based simulation algorithm possesses many redundant calculations that require further exploration. Besides, the traditional normalization-based nodes merging method of DD amplifies the side influences of approximate error. Therefore, to tackle the above challenges, in this paper, we first fully explore the redundancies in the recursive-based DD simulation (RecurSim) algorithm. Inspired by the regularities of the quantum circuit model, a scale-based simulation (ScaleSim) algorithm is proposed, which removes plenty of unnecessary computations. Furthermore, to eliminate the influences of approximate error, we propose a new pre-check DD building method, namely PCB, which maintains the accuracy of DD representation and produces more memory saving. Comprehensive experiments show that our method achieves up to 24124.2 × acceleration and 3.2 × 10 7 × memory reduction than traditional DD-based methods on quantum algorithms while maintaining the representation accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm.
- Author
-
Borisov, A. V., Bosov, A. V., and Ivanov, A. V.
- Subjects
- *
PERSONALLY identifiable information , *APPLICATION software , *COMPUTER simulation , *ALGORITHMS , *ELECTRONIC data processing , *STATISTICAL sampling - Abstract
This paper describes the second part of our study devoted to automated anonymization of personal data. The overview and analysis of research prospects is supplemented with a practical result. An anonymization model is proposed, which reduces anonymization of personal data to manipulation of samples of random elements of different types. The key idea of our approach to anonymization of personal data with preservation of their usefulness is the use of the synthesis method, i.e., the complete replacement of all non-anonymized data with synthetic values. In the proposed model, a set of element types is selected, for which corresponding synthesys templates are proposed. The set of templates constitutes a synthesis-based anonymization algorithm. Technically, each template is based on a well-known statistical tool: frequency estimates of probabilities, Parzen–Rosenblatt kernel density estimates, statistical means, and covariances. The proposed approach is illustrated by a simple example from civil aviation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Event-triggered disturbance attenuation for multi-agent systems with input delay.
- Author
-
Li, Yunhan, Wang, Chunyan, Liu, Junhui, and Wang, Jianan
- Subjects
- *
MULTIAGENT systems , *POWER resources , *ALGORITHMS , *COMPUTER simulation - Abstract
This paper designs event-triggered delay compensation and disturbance attenuation control algorithms for multi-agent systems. First, through predictor-based model reduction method, an unknown large input delay can be compensated and delay-free dynamics is obtained. Based on the transformed systems, predictive descriptor observers are proposed to obtain estimated system states and sensor faults. Then, an event-triggered fault-tolerant algorithm is designed to save energy resources for communication among the agents while attenuating the disturbances. Moreover, it is validated that the systems do not exhibit Zeno behaviour using the designed event-triggering sequence. Numerical simulations are conducted to demonstrate the effectiveness of designed algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. 基于反向感染的复合种群网络传播溯源算法.
- Author
-
阳成, 王建波, 许小可, and 杜占玮
- Subjects
- *
MARKOV processes , *ALGORITHMS , *EPIDEMICS , *INFORMATION processing , *COMPUTER simulation - Abstract
The spread of epidemics poses a significant threat to the entire human community. Therefore, it is critical to identify the sources of transmission quickly and take timely control measures. However, the diversity of epidemic transmission processes and information uncertainty makes it challenging to identify the sources of transmission quickly and accurately. This paper proposed a new algorithm for identifying transmission sources in a metapopulation network by combining the reverse infection algorithm and Markov chain theory. The algorithm first uses a Markov chain to initially estimate the time when a subpopulation is infected, and the infected subpopulation obtains its own identity information based on the infection time. Then, it traverses all subpopulations that obtain the identity information of the infected subpopulation and spreads the collected identity information of the infected subpopulation to all its neighbors. Finally, the spreading source of the metapopulation network can be inferred based on the temporal order in which all the identity information of the infected subpopulation is obtained. Simulation experiments conducted on real airports networks and artificial networks show that the accuracy of this algorithm is significantly improved compared to other algorithms, regardless of whether all or partial of the infection snapshots are known. This algorithm is well-suited for metapopulation networks such as aviation networks and is also useful for real-world epidemic transmission tracing and control. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. Study on centroid type-reduction of general type-2 fuzzy logic systems with sensible beginning weighted enhanced Karnik–Mendel algorithms.
- Author
-
Chen, Yang
- Subjects
- *
FUZZY logic , *FUZZY systems , *ALGORITHMS , *NUMERICAL integration , *CENTROID , *COMPUTER simulation - Abstract
General type-2 fuzzy logic systems have received wide concerns in current academic subject. Type-reduction is the kernel module for the systems. This paper shows the interpretations for the beginning of Karnik–Mendel (KM) algorithms. According to the famous numerical integration technique, the weighting approaches of enhanced Karnik–Mendel (EKM) algorithms are put forward. Then, the sensible beginning weighted enhanced Karnik–Mendel (SBWEKM) algorithms are put forward to perform the centroid type-reduction. Compared with the EKM algorithms, WEKM algorithms and SBEKM algorithms, this approach helps to improve both the absolute errors and convergence speeds as shown in four computer simulation experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Distributed projection‐free algorithm for constrained aggregative optimization.
- Author
-
Wang, Tongyu and Yi, Peng
- Subjects
- *
COST functions , *DISTRIBUTED algorithms , *SMOOTHNESS of functions , *TIME-varying networks , *TRACKING algorithms , *CONJUGATE gradient methods , *CONSTRAINED optimization , *ALGORITHMS , *COMPUTER simulation - Abstract
In this paper, we focus on solving a distributed convex aggregative optimization problem in a network, where each agent has its own cost function which depends not only on its own decision variables but also on the aggregated function of all agents' decision variables. The decision variable is constrained within a feasible set. In order to minimize the sum of the cost functions when each agent only knows its local cost function, we propose a distributed Frank–Wolfe algorithm based on gradient tracking for the aggregative optimization problem where each node maintains two estimates, namely an estimate of the sum of agents' decision variable and an estimate of the gradient of global function. The algorithm is projection‐free, but only involves solving a linear optimization to get a search direction at each step. We show the convergence of the proposed algorithm for convex and smooth objective functions over a time‐varying network. Finally, we demonstrate the convergence and computational efficiency of the proposed algorithm via numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Joint two‐stage multi‐innovation recursive least squares parameter and fractional‐order estimation algorithm for the fractional‐order input nonlinear output‐error autoregressive model.
- Author
-
Hu, Chong, Ji, Yan, and Ma, Caiqing
- Subjects
- *
AUTOREGRESSIVE models , *ALGORITHMS , *PARAMETER estimation , *PARAMETER identification , *LEAST squares , *COMPUTER simulation - Abstract
Summary: This paper mainly investigates the issue of parameter identification for the fractional‐order input nonlinear output error autoregressive (IN‐OEAR) model. In order to avoid the problem of large computation of redundant parameter estimation, the output form of the system can be expressed by a linear combination of unknown parameters through the key term separation. Through employing the hierarchial identification principle, the fractional‐order IN‐OEAR model is decomposed into two sub‐models with a smaller number of parameters. On the basis of the recursive identification methods, a recursive least squares sub‐algorithm and a gradient stochastic sub‐algorithm are proposed to estimate the parameters and the fractional‐order, respectively. With the aim of achieving more accurate parameter estimates, a two‐stage multi‐innovation least recursive algorithm is proposed by means of the multi‐innovation identification theory. The numerical simulation results test the effectiveness of the proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Distributed online convex optimization with a bandit primal-dual mirror descent push-sum algorithm.
- Author
-
Wang, Cong, Xu, Shengyuan, Yuan, Deming, Zhang, Baoyong, and Zhang, Zhengqiang
- Subjects
- *
DISTRIBUTED algorithms , *COST functions , *ALGORITHMS , *TIME-varying networks , *COMPUTER simulation - Abstract
The distributed online convex optimization problem with time-varying constraints for multi-agent networks is addressed in this article. The purpose is to optimize a sequence of time-varying global cost functions defined as the accumulated values of local cost functions, also attempt to meet the requirement of a sequence of time-varying coupled constraint functions which denote the sum of local constraint functions. Cost functions and constraint functions are unknown to agents beforehand. It is supposed that each agent in the network communicates with its neighbours through a uniformly strongly connected sequence of time-varying directed communication topologies. This paper proposes the bandit distributed primal-dual mirror descent push-sum (BDPDMDPS) algorithm constructed by bandit primal-dual, mirror descent and push-sum methods. Operational performance of the presented algorithm is measured by expected regret and expected constraint violation, both of which are proved to be sublinear with respect to the total iteration span T in this paper. Finally, a numerical simulation example is shown, which confirms the results for expected regret and expected constraint violation of BDPDMDPS algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. GNSSseg, a Statistical Method for the Segmentation of Daily GNSS IWV Time Series.
- Author
-
Quarello, Annarosa, Bock, Olivier, and Lebarbier, Emilie
- Subjects
- *
DYNAMIC programming , *WATER vapor , *DATA analysis , *COMPUTER simulation , *ALGORITHMS - Abstract
Homogenization is an important and crucial step to improve the usage of observational data for climate analysis. This work is motivated by the analysis of long series of GNSS Integrated Water Vapour (IWV) data, which have not yet been used in this context. This paper proposes a novel segmentation method called segfunc that integrates a periodic bias and a heterogeneous, monthly varying, variance. The method consists in estimating first the variance using a robust estimator and then estimating the segmentation and periodic bias iteratively. This strategy allows for the use of the dynamic programming algorithm, which is the most efficient exact algorithm to estimate the change point positions. The performance of the method is assessed through numerical simulation experiments. It is implemented in the R package GNSSseg, which is available on the CRAN. This paper presents the application of the method to a real data set from a global network of 120 GNSS stations. A hit rate of 32% is achieved with respect to available metadata. The final segmentation is made in a semi-automatic way, where the change points detected by three different penalty criteria are manually selected. In this case, the hit rate reaches 60% with respect to the metadata. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. "All mimsy were the borogoves" – a discriminative learning model of morphological knowledge in pseudo-word inflection.
- Author
-
Nieder, Jessica, van de Vijver, Ruben, and Tomaschek, Fabian
- Subjects
- *
COMPUTER simulation , *COMPARATIVE grammar , *LEARNING strategies , *LANGUAGE acquisition , *INTELLECT , *PHONETICS , *RESEARCH funding , *VOCABULARY , *ARTIFICIAL neural networks , *ALGORITHMS - Abstract
Grammatical knowledge has often been investigated in wug tests, in which participants inflect pseudo-words. It was argued that in inflecting these pseudo-words, speakers apply their knowledge of word formation. However, it remains unclear what exactly this knowledge is and how it is learned. According to one theory, the knowledge is best characterised as abstractions that specify how units are combined. Another theory maintains that it is best characterised by memory-based analogy. In both cases the knowledge is learned by association based on positive evidence alone. In this paper, we model the classification of pseudo-words to Maltese plurals using a shallow neural network trained with an error-driven learning algorithm. We demonstrate that the classifications mirror those of Maltese speakers in a wug test. Our results indicate that speakers rely on gradient knowledge of a relation between the phonetics of whole words and plural classes, which is learned in an error-driven way. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. GBScleanR: robust genotyping error correction using a hidden Markov model with error pattern recognition.
- Author
-
Tomoyuki Furuta, Toshio Yamamoto, and Motoyuki Ashikari
- Subjects
- *
COMPUTER simulation , *SEQUENCE analysis , *COMPARATIVE studies , *GENOTYPES , *GENOMICS , *GENETIC markers , *RESEARCH funding , *PROBABILITY theory , *ALGORITHMS - Abstract
Reduced-representation sequencing (RRS) provides cost-effective and time-saving genotyping platforms. Despite the outstanding advantage of RRS in throughput, the obtained genotype data usually contain a large number of errors. Several error correction methods employing the hidden Markov model (HMM) have been developed to overcome these issues. These methods assume that markers have a uniform error rate with no bias in the allele read ratio. However, bias does occur because of uneven amplification of genomic fragments and read mismapping. In this paper, we introduce an error correction tool, GBScleanR, which enables robust and precise error correction for noisy RRS-based genotype data by incorporating marker-specific error rates into the HMM. The results indicate that GBScleanR improves the accuracy by more than 25 percentage points at maximum compared to the existing tools in simulation data sets and achieves the most reliable genotype estimation in real data even with error-prone markers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. System simulation of computer image recognition technology application by using improved neural network algorithm.
- Author
-
Wang, Xin
- Subjects
- *
COMPUTER simulation , *OPTIMIZATION algorithms , *COMPUTER systems , *ALGORITHMS , *SIMULATION methods & models , *IMAGE recognition (Computer vision) - Abstract
Digital image technology is penetrating into various fields of people's life, and it has been very mature and can effectively store and transmit data. Moreover, there are still various researches on image recognition, the core of this technology. The algorithm is mainly based on computer technology to obtain the target image for different scene categories, thus completely replacing the traditional classification form. Because of the limitations of traditional identification technology, there are some problems in the actual use. It does not depend on the prior knowledge requirements and can carry out complex feature space division. In this paper, an image recognition computer system is established by introducing an improved neural network algorithm. The algorithm is designed and tested, and the results show it has lower image recognition error rate. Subsequently, this research result is applied to the actual scene for testing. The test results show that the improved neural network optimization algorithm can make the extracted features more accurately expressed in the image processing, which is more effective than the traditional algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Adaptive Optical Closed-Loop Control Based on the Single-Dimensional Perturbation Descent Algorithm.
- Author
-
Chen, Bo, Zhou, Yilin, Li, Zhaoyi, Jia, Jingjing, and Zhang, Yirui
- Subjects
- *
OPTIMIZATION algorithms , *OPTICAL control , *ADAPTIVE optics , *MATHEMATICAL models , *ALGORITHMS , *WAVEFRONTS (Optics) , *COMPUTER simulation - Abstract
Modal-free optimization algorithms do not require specific mathematical models, and they, along with their other benefits, have great application potential in adaptive optics. In this study, two different algorithms, the single-dimensional perturbation descent algorithm (SDPD) and the second-order stochastic parallel gradient descent algorithm (2SPGD), are proposed for wavefront sensorless adaptive optics, and a theoretical analysis of the algorithms' convergence rates is presented. The results demonstrate that the single-dimensional perturbation descent algorithm outperforms the stochastic parallel gradient descent (SPGD) and 2SPGD algorithms in terms of convergence speed. Then, a 32-unit deformable mirror is constructed as the wavefront corrector, and the SPGD, single-dimensional perturbation descent, and 2SPSA algorithms are used in an adaptive optics numerical simulation model of the wavefront controller. Similarly, a 39-unit deformable mirror is constructed as the wavefront controller, and the SPGD and single-dimensional perturbation descent algorithms are used in an adaptive optics experimental verification device of the wavefront controller. The outcomes demonstrate that the convergence speed of the algorithm developed in this paper is more than twice as fast as that of the SPGD and 2SPGD algorithms, and the convergence accuracy of the algorithm is 4% better than that of the SPGD algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Tragedy of the Non-Visible: Aesthetic and Ontological Differences in Early Computer versus Conceptual Art.
- Author
-
Samuels, Miranda
- Subjects
- *
COMPUTER art , *ART & technology , *DIGITIZATION , *DIGITAL images , *CONCEPTUAL art , *ALGORITHMS , *DATA visualization , *COMPUTER simulation , *CRYPTOGRAPHY in art - Abstract
This article considers the complex relationship between early computer and Conceptual art in the late 1960s and early 1970s in the United States and Europe. It assesses a range of accounts that explain the simultaneous decline in art world support for computer art and growing institutional traction enjoyed by Conceptual art. The author argues that these accounts overlook a subtle but consequential difference in the aesthetic and ontological conditions of the two art forms. Comparative analysis of writings by computer and Conceptual artists and theorists ultimately shows that the relationship between the visible output and the non-visible code or algorithm in computer art is not akin to the relationship between materiality and immateriality in Conceptual art, as is oftentimes assumed. The paper suggests that historical accounts explaining the divergent trajectories of computer and Conceptual art address this difference to avoid oversimplifying computer art's aesthetic and ontological conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Identification of Novel Endochitinase Class I Based Allergens.
- Author
-
CAVAS, Levent and YILMAZ-ABESKA, Yesim
- Subjects
- *
FOOD allergy prevention , *LIFE sciences , *COMPUTER simulation , *ALLERGY desensitization , *IMMUNOLOGY , *MATHEMATICAL models , *AVOCADO , *CINNAMON , *BIOINFORMATICS , *PLANTS , *GLYCOSIDASES , *FOOD , *THEORY , *RESEARCH funding , *FOOD allergy , *ALLERGENS , *ALGORITHMS , *PEPTIDES , *CITRUS - Abstract
Objective: Bioinformatics analyses have been becoming important research tools in the field of life science since 2000. New tools have been developed for the detection of allergens in food sources. This study investigated potential allergen proteins similar to the endochitinase class 1(Pers a 1) protein found in avocado using bioinformatics analysis tools. Materials and Methods: The potential allergens were examined with four different in silico tools: Clustal W for multiple sequence comparison, Swiss-MODEL for homology modeling, ProtParam for comparing protein parameters, and AlgPred for allergen prediction. Results: In silico analyses revealed high rates of similarities in protein sequences among the studied species. The highest percent identity was found in Cinnamomum micranthum f. kanehirae as 97.55 while the lowest percent identity was found in Diospyros kaki as 70.23. It is very important to note that 9 of the 10 potential allergen species investigated are plats consumed in daily life and these species were identified as allergens. According to the algorithm of BLAST search on allergen representative peptides (ARPs), ARPs were found in eight potential allergen proteins except for Prunus avium and Citrus unshiu. The ARP sequence related to Persea americana is LQLTWNYNYGAAGNSIGFNGLSNP. Conclusion: People who are allergic to avocado (Persea americana) may be advised to be careful while consuming foods such as Phoenix dactylifera, Allium sativum, Citrus unshiu, Diospyros kaki, and Spinacia oleracea. The present paper can be considered as a model study for understanding allergens in foods by using in silico tools. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Implementation of Computer-Aided Piano Music Automatic Notation Algorithm in Psychological Detoxification.
- Author
-
Zhang, Xinmei
- Subjects
- *
MENTAL illness treatment , *WELL-being , *COMPUTER simulation , *COMPUTER software , *PSYCHOLOGY , *MUSIC therapy , *OCCUPATIONAL therapy , *CONCEPTUAL models , *SIGNAL processing , *DATA security , *MUSIC , *SOUND , *ARTIFICIAL neural networks , *ALGORITHMS , *INFORMATION technology - Abstract
This paper analyzes the modeling of a computer-aided piano music automatic notation algorithm, combines the influence of music on psychological detachment, and designs the piano music automatic notation algorithm in psychological detachment model construction. This paper investigates the multiresolution time-frequency representation constant Q-transform (CQT), which is common in music signal analysis, and finds that although CQT has higher frequency resolution at low frequencies, it also leads to lower temporal resolution. The variable Q-transform is introduced as a tool for multibasic frequency estimation of the time-frequency representation of music signals, which has better temporal resolution than CQT at the exact frequency resolution and efficient coefficient calculation. The short-time Fourier transform and constant Q-transform time-frequency analysis methods are implemented, respectively, and note onset detection and multibasic tone detection are implemented based on CNN models. The network structure, training method, and postprocessing method of CNN are optimized. This paper proposes a temporal structure model for maintaining music coherence to avoid manual input and ensure interdependence between tracks in music generation. This paper also investigates and implements a method for generating discrete music events based on multiple channels, including a multitrack correlation model and a discretization process. In this paper, the automatic piano music notation algorithm can play an influential role in significantly enhancing the actual effect of psychological detoxification. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Modal Identification of Civil Structures via Stochastic Subspace Algorithm with Monte Carlo–Based Stabilization Diagram.
- Author
-
Zhou, Kang, Li, Qiu-Sheng, and Han, Xu-Liang
- Subjects
- *
ALGORITHMS , *COMPUTER simulation , *PARAMETER estimation , *TYPHOONS , *IDENTIFICATION - Abstract
The stochastic subspace algorithm is one of the most widely used structural identification techniques, which is generally involved with the stabilization diagram for estimating modal parameters. However, the conventional stabilization diagram has an inherent problem: some spurious modes may be identified as stable results, resulting in adverse effects on structural modal identification. To address this critical issue, this paper proposes an improved stochastic subspace algorithm involving a Monte Carlo–based stabilization diagram. Through a numerical simulation study, the good performance of the Monte Carlo–based stabilization diagram for discriminating the poles denoting the physical modes from those representing spurious modes is demonstrated. The numerical simulation results show that the proposed method can estimate structural modal parameters with high accuracy and robustness. Moreover, the proposed method is applied to field measurements on a 600-m-high skyscraper during Super Typhoon Mangkhut, and the results verify the applicability and effectiveness of the proposed method to field measurements. This paper aims to provide an effective tool for accurate estimation of modal parameters of civil structures. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Uncertainty Quantification in Reservoir Simulation Using Modern Data Assimilation Algorithm.
- Author
-
Tuczyński, Tomasz and Stopa, Jerzy
- Subjects
- *
GEOLOGICAL modeling , *ALGORITHMS , *GAS industry , *PETROLEUM industry , *PROCEDURE manuals , *COMPUTER simulation - Abstract
Production forecasting using numerical simulation has become a standard in the oil and gas industry. The model construction process requires an explicit definition of multiple uncertain parameters; thus, the outcome of the modelling is also uncertain. For the reservoirs with production data, the uncertainty can be reduced by history-matching. However, the manual matching procedure is time-consuming and usually generates one deterministic realization. Due to the ill-posed nature of the calibration process, the uncertainty cannot be captured sufficiently with only one simulation model. In this paper, the uncertainty quantification process carried out for a gas-condensate reservoir is described. The ensemble-based uncertainty approach was used with the ES-MDA algorithm, conditioning the models to the observed data. Along with the results, the author described the solutions proposed to improve the algorithm's efficiency and to analyze the factors controlling modelling uncertainty. As a part of the calibration process, various geological hypotheses regarding the presence of an active aquifer were verified, leading to important observations about the drive mechanism of the analyzed reservoir. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Majority networks and local consensus algorithm.
- Author
-
Goles, Eric, Medina, Pablo, and Santiváñez, Julio
- Subjects
- *
DISTRIBUTED algorithms , *ALGORITHMS , *COMPUTER simulation - Abstract
In this paper, we study consensus behavior based on the local application of the majority consensus algorithm (a generalization of the majority rule) over four-connected bi-dimensional networks. In this context, we characterize theoretically every four-vicinity network in its capacity to reach consensus (every individual at the same opinion) for any initial configuration of binary opinions. Theoretically, we determine all regular grids with four neighbors in which consensus is reached and in which ones not. In addition, in those instances in which consensus is not reached, we characterize statistically the proportion of configurations that reach spurious fixed points from an ensemble of random initial configurations. Using numerical simulations, we also analyze two observables of the system to characterize the algorithm: (1) the quality of the achieved consensus, that is if it respects the initial majority of the network; and (2) the consensus time, measured as the average amount of steps to reach convergence. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Direct numerical simulation of spray and dispersion of liquid fuel droplets.
- Author
-
Slavinskaya, N. and Haidn, O. J.
- Subjects
- *
COMPUTER simulation , *LIQUID fuels , *PARTICLES , *EULERIAN graphs , *ALGORITHMS - Abstract
A review of the existing phenomenological models was carried out, which gives a deep understanding of the features and characteristics of the formation of spray and dispersion of a liquid jet. These models give insight into the mechanisms of primary and secondary atomization of a liquid jet by tracing the behavior of a single fuel droplet placed in a stationary gaseous medium. The paper uses the direct numerical simulation method to present the computer simulation results of the atomization, dispersion, and evaporation of octane and dodecane droplets. To describe the interfacial interactions and track the particle's shape and position in the dispersed phase, the volume of fluid (VOF) method was used, which belongs to the class of Eulerian methods and is a non-autonomous algorithm. According to the results of computational experiments on the study of the processes of spraying, dispersion, and evaporation of octane and dodecane, the optimal combustion mode was established. Obtained results in this work have scientific and practical applications in constructing the fundamental theory of combustion and designing the injection systems structure with optimal parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Computational study of textured ferroelectric polycrystals: Texture development during itemplated grain growth.
- Author
-
Zhou, Jie E., Yongke Yan, Priya, Shashank, and Wang, Yu U.
- Subjects
- *
POLYCRYSTALS , *POLYCRYSTALLINE silicon , *FERROELECTRIC materials , *COMPUTER simulation , *ALGORITHMS , *THERMAL properties , *CRYSTALLOGRAPHY - Abstract
Quantitative relationships between processing, microstructure, and properties in textured ferroelectric polycrystals and the underlying responsible mechanisms are investigated by phase field modeling and computer simulation. This study focuses on three important aspects of textured ferroelectric ceramics: (i) grain microstructure evolution during templated grain growth processing, (ii) crystallographic texture development as a function of volume fraction and seed size of the templates, and (iii) dielectric and piezoelectric properties of the obtained template-matrix composites of textured polycrystals. Findings on the first two aspects are presented here, while an accompanying paper of this work reports findings on the third aspect. In this paper, grain microstructure evolution in the polycrystalline matrix with different template volume fractions and seed sizes is simulated. To quantitatively characterize the crystallographic texture development during templated grain growth processing, a numerical algorithm is developed to compute the diffraction peak intensities and Lotgering factor of the simulated polycrystals during grain microstructure evolution. This novel approach provides a direct link between phase field simulation and diffraction experiment. This computational study clarifies the effects of the template volume fraction and template seed size on the final grain microstructure and texture. It is found that, while the degree of crystallographic texture generally increases with increasing template volume fraction, it is the average distance between template seeds that plays an important role. This finding suggests that reducing the template seed size and shortening the seed distance is an effective way to achieve higher texture at a lower template volume fraction, which is highly desired for enhancing the piezoelectric properties of ferroelectric polycrystals. The computational results are compared with complementary experiments, where good agreement is obtained. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
31. Flood-Risk Analysis on Terrains.
- Author
-
Lowe, Aaron, Agarwal, Pankaj K., and Rav, Mathias
- Subjects
- *
RISK assessment , *FLOODS , *ALGORITHMS , *COMPUTER simulation - Abstract
An important problem in terrain analysis is modeling how water flows across a terrain and creates floods by filling up depressions. In this paper, we study a number of flood-risk related problems: given a terrain Σ, represented as a triangulated xy-monotone surface with n vertices, a rain distribution, and a volume of rain ψ, determine which portions of Σ are flooded. We give an overview of efficient algorithms for these problems as well as explore the efficacy and efficiency of these algorithms on real terrains. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
32. Application of the ADMM Algorithm for a High-Dimensional Partially Linear Model.
- Author
-
Feng, Aifen, Chang, Xiaogai, Shang, Youlin, and Fan, Jingya
- Subjects
- *
ALGORITHMS , *REGRESSION analysis , *HIGH-dimensional model representation , *COMPUTER simulation - Abstract
This paper focuses on a high-dimensional semi-parametric regression model in which a partially linear model is used for the parametric part and the B-spline basis function approach is used to estimate the unknown function for the non-parametric part. Within the framework of this model, the constrained least squares estimation is investigated, and the alternating-direction multiplier method (ADMM) is used to solve the model. The convergence is proved under certain conditions. Finally, numerical simulations are performed and applied to workers' wage data from CPS85. The results show that the ADMM algorithm is very effective in solving high-dimensional partially linear models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
33. Distributed model-free adaptive predictive control for heterogeneous nonlinear multi-agent systems.
- Author
-
Pan, Zhenzhen, Hou, Zhongsheng, and Chi, Ronghu
- Subjects
- *
ADAPTIVE control systems , *MULTIAGENT systems , *NONLINEAR systems , *DATA modeling , *COMPUTER simulation , *ALGORITHMS - Abstract
This paper investigates the data-driven consensus tracking problem for heterogeneous multi-agent systems. All of the heterogeneous dynamics, disturbances and measurement noises are considered for the output tracking consensus of nonlinear multi-agent network under a data-driven scheme. A dynamic linearisation method is introduced to deal with the nonlinear nonaffine structures of the agents and a heterogeneous linear data model for the agent is obtained due to the heterogeneous dynamics of the agent itself. On this basis, a distributed model-free adaptive predictive control (DMFAPC) algorithm is constructed by the use of consensus errors and the robustness analysis is conducted in the presence of disturbances. Further, the results are modified by using measured outputs to replace the system outputs, and thus a measured output-based DMFAPC is presented to deal with the omnipresent measurement noises in practical applications. The two proposed DMFAPC methods are data driven since no mechanistic model information is required wherein. And thus, no unmodelled dynamics affects the consensus performance. Instead, they can improve the control performance by utilising additional predictive information. The two proposed DMFAPC methods are verified using numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. 采用混合搜索策略的阿奎拉优化算法.
- Author
-
付小朋, 王勇, and 冯爱武
- Subjects
- *
DIFFERENTIAL evolution , *MATHEMATICAL optimization , *SEARCH algorithms , *PARTICLE swarm optimization , *COMPUTER simulation , *ALGORITHMS , *SPEED - Abstract
Aiming at the shortcomings of aquila optimization algorithm(AO), this paper proposed an aquila optimization algorithm using hybrid search strategy. Firstly, the algorithm introduced dynamic adjustment function to balance global exploration and local exploitation; Secondly, it introduced chaotic adaptive weights to enhance the global search capability of the algorithm and accelerate the convergence speed of the algorithm; Thirdly, it introduced a new individual mutation probability coefficient and an improved differential mutation strategy, and used individuals with better fitness values to lead other individuals in the population to carry out search activities, which maintained the diversity of the population and enhanced the ability of the algorithm to jump out of the local optimum. Through the numerical experiment simulation of 8 benchmark test functions, 10 CEC2019 test functions and 1 engineering application problem, The experimental results show that the algorithm has a significant improvement in global convergence speed and optimization accuracy, and has a better ability to jump out of the local optimum. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
35. 一种基于复合混沌序列的图像加密算法安全分析.
- Author
-
胡迎春 and 禹思敏
- Subjects
- *
IMAGE encryption , *NUMERICAL analysis , *COMPUTER simulation , *PERMUTATIONS , *ALGORITHMS , *SECURITY management , *CRYPTOSYSTEMS - Abstract
This paper analyzed the security of an image encryption algorithm based on compound chaotic sequence, the proposed algorithm adopted three-level encryption structure of permutation-forward diffusion-reverse diffusion. Due to the forward diffusion and the reverse diffusion used the same one-dimensional diffusion sequence, therefore, this paper simplified the two level encryption structure of the forward diffusion and reverse diffusion to one-level diffusion encryption structure, further, simplified the three-level encryption structure of permutation-forward diffusion-reverse diffusion to two-level encryption structure of permutation and diffusion. Moreover, the chaotic sequences generated by the encryption algorithm were independent of the plaintext images or ciphertext images, consequently, it could crack the corresponding equivalent diffusion keys and equivalent permutation keys by chosen-plaintext attack. Theoretical analysis and numerical simulation experiment results verify the effectiveness of the analytical method. Finally, this paper proposed some improved suggestions for the original encryption algorithm to promote the security. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. A Computationally Efficient Algorithm for DOA Estimation with Unfolded Coprime Linear Array.
- Author
-
Pan, Gong and Huafei, Yin
- Subjects
- *
COMPUTATIONAL complexity , *ALGORITHMS , *COMPUTER simulation - Abstract
In this paper, we investigate the direction of arrival (DOA) estimation problem with unfolded coprime linear array (UCLA) and propose a low computational complexity signal-subspace fitting (SF) algorithm. SF algorithm is able to achieve excellent DOA estimation performance while it requires global angular search (GAS). Especially in the several source signals situation, expensive complexity cost causes. To decrease computational complexity, we propose an initialized based SF (ISF) algorithm, which involves the several one dimensional (1D) partial angular search (PAS) instead of the multidimensional GAS. Consequently, the complexity is significantly decreased. Due to the full utilization of the array aperture, the proposed method in UCLA can attain better performance than general CLA (GCLA). In addition, as the SF is attractive in practical application, the proposed ISF algorithm lowers the computational cost, while achieving almost approximate estimation performance as traditional SF and noise subspace fitting (NF). Moreover, numerical simulations are provided and verify the effectiveness and the superiority of the proposed algorithm for the UCLA. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Motion control of an articulated mobile manipulator in 3D using the Lyapunov-based control scheme.
- Author
-
Prasad, Avinesh, Sharma, Bibhya, Vanualailai, Jito, and Kumar, Sandeep
- Subjects
- *
MOBILE operating systems , *COMPUTER simulation , *MOTION , *ALGORITHMS - Abstract
Finding feasible solutions to motion planning and control problem of robotic systems in different environments with various applications is an active area of research. This article presents a new solution to the motion planning and control problem of a three-dimensional articulated mobile manipulator comprising a car-like mobile platform and a three-dimensional n-link articulated arm using the Lyapunov-based control scheme. The motion of the system is described as twofold: first, the car-like mobile platform moves from an initial position to its pseudo-target, and second, when the mobile platform is within some predefined distance from the pseudo-target, the end-effector of the robot arm is attracted to its designated target. Therefore, presenting a new 2-Step Algorithm in this paper for dual movement of the articulated mobile manipulator in 3D. In addition, a workspace cluttered with fixed spherical and rod obstacles of random sizes and positions is considered in this research. For the mobile manipulator to avoid an obstacle, the Minimum Distance Technique is adapted where a point on the robot that is closest to an obstacle will avoid the obstacle. The convergence of the two bodies and the stability of the mechanical system are guaranteed by the Lyapunov's direct method. The continuous nonlinear control laws proposed from the control scheme also take into account all mechanical singularities and velocity limitations associated with the system. Theoretical proofs and computer simulations validate the new continuous, acceleration-based, nonlinear, time-invariant control laws. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. Numerical simulation of hydraulic fracturing: A hybrid FEM‐based algorithm.
- Author
-
Wrobel, Michal, Papanastasiou, Panos, and Peck, Daniel
- Subjects
- *
HYDRAULIC fracturing , *COMPUTER simulation , *ALGORITHMS , *HYDRAULIC models , *NEWTONIAN fluids , *FRACTURING fluids , *SHALE gas - Abstract
In this paper, a problem of numerical simulation of hydraulic fractures is considered. An efficient algorithm of solution is proposed for the plain strain model of hydraulic fracturing. The algorithm utilizes a FEM‐based subroutine to compute deformation of the fractured material. The flow of generalized Newtonian fluid in the fracture is modeled in the framework of lubrication theory. In this way, the architecture of the computational scheme is relatively simple and enables one to deal with advanced cases of the fractured material properties and configurations as well as various rheological models of fluid. In particular, the problems of poroelasticity, plasticity, and spatially varying properties of the fractured material can be analyzed. The accuracy and efficiency of the proposed algorithm are verified against analytical benchmark solutions. The algorithm capabilities are demonstrated using the example of the hydraulic fracture propagating in complex geological settings. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
39. Rigorous justification for the spaceâ€"split sensitivity algorithm to compute linear response in Anosov systems.
- Author
-
Chandramoorthy, Nisha and Jézéquel, Malo
- Subjects
- *
VECTOR fields , *ALGORITHMS , *APPLIED sciences , *SENSITIVITY analysis , *COMPUTER simulation - Abstract
Ruelle (1997 Commun. Math. Phys. 187 227â€"41; 2003 Commun. Math. Phys. 234 185â€"90) (see also Jiang 2012 Ergod. Theor. Dynam. Syst. 32 1350â€"69) gave a formula for linear response of transitive Anosov diffeomorphisms. Recently, practically computable realizations of Ruelle’s formula have emerged that potentially enable sensitivity analysis of certain high-dimensional chaotic numerical simulations encountered in the applied sciences. In this paper, we provide full mathematical justification for the convergence of one such efficient computation, the spaceâ€"split sensitivity, or S3, algorithm (Chandramoorthy and Wang 2022 SIAM J. Appl. Dyn. Syst. 21 735â€"81). In S3, Ruelle’s formula is computed as a sum of two terms obtained by decomposing the perturbation vector field into a coboundary and a remainder that is parallel to the unstable direction. Such a decomposition results in a splitting of Ruelle’s formula that is amenable to efficient computation. We prove the existence of the S3 decomposition and the convergence of the computations of both resulting components of Ruelle’s formula. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
40. Computational Topic Models of the Library Quarterly.
- Author
-
Hennesy, Cody and Naughton, David
- Subjects
- *
COMPUTER simulation , *RESEARCH , *DATA curation , *ENGLISH language , *ACADEMIC libraries , *METADATA , *LEADERSHIP , *WOMEN , *CONCEPTUAL structures , *ELECTRONIC publications , *CLUSTER analysis (Statistics) , *LIBRARIANS , *ALGORITHMS , *AUTHORSHIP - Abstract
This case study demonstrates the application of an unsupervised topic modeling algorithm to 7,773 English-language articles published in the Library Quarterly from 1931 to 2015. The analysis of 85 years of the journal's output follows an exploratory data analysis framework to generate novel hypotheses about the history of LIS using topic modeling, a method for identifying clusters of co-occurring words within large collections of text. The paper closely examines two topics that suggest differences in gender representation in the journal to propose and support a new hypothesis regarding the historical inclusion of gendered objects of study in LIS literature. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. Using Numerical Methods to Design Simulations: Revisiting the Balancing Intercept.
- Author
-
Robertson, Sarah E, Steingrimsson, Jon A, and Dahabreh, Issa J
- Subjects
- *
COMPUTER simulation , *EXPERIMENTAL design , *STATISTICS , *STATISTICAL models , *LOGISTIC regression analysis , *STATISTICAL correlation , *DATA analysis , *EPIDEMIOLOGICAL research , *ALGORITHMS - Abstract
In this paper, we consider methods for generating draws of a binary random variable whose expectation conditional on covariates follows a logistic regression model with known covariate coefficients. We examine approximations for finding a "balancing intercept," that is, a value for the intercept of the logistic model that leads to a desired marginal expectation for the binary random variable. We show that a recently proposed analytical approximation can produce inaccurate results, especially when targeting more extreme marginal expectations or when the linear predictor of the regression model has high variance. We then formulate the balancing intercept as a solution to an integral equation, implement a numerical approximation for solving the equation based on Monte Carlo methods, and show that the approximation works well in practice. Our approach to the basic problem of the balancing intercept provides an example of a broadly applicable strategy for formulating and solving problems that arise in the design of simulation studies used to evaluate or teach epidemiologic methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. 基于事件触发机制的自主车辆队列协同控制.
- Author
-
申通, 唐晔, and 李立
- Subjects
- *
LYAPUNOV functions , *INFORMATION resources , *COMPUTER simulation , *INFORMATION processing , *ALGORITHMS - Abstract
This paper proposed an event-triggered mechanism based on cooperative control algorithm for the stability of autonomous vehicle platoon system,which could deal with the disturbance in the communication process and reduce the information redundancy and resource waste in the platoon control.Firstly,this paper designed a vehicle platoon algorithm for the directed topology on the basis of event-triggered mechanism.Even if there was disturbance,the follower autonomous vehicles could be consistent with the speed of leader autonomous vehicle,and each two consecutive autonomous vehicles could keep the desired safe distance.In addition,it constructed a Lyapunov function and gave the analysis of Zeno behavior to testify the validity and security of the proposed algorithm.Finally,the numerical simulation proves the correctness of the control algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
43. Minimum variance beamforming combined with covariance matrix-based adaptive weighting for medical ultrasound imaging.
- Author
-
Wang, Yuanguo, Wang, Yadan, Liu, Mingzhou, Lan, Zhengfeng, Zheng, Chichao, and Peng, Hu
- Subjects
- *
DIGITAL image processing , *COMPUTER simulation , *ULTRASONIC imaging , *SIGNAL processing , *RESEARCH funding , *IMAGING phantoms , *ALGORITHMS - Abstract
Background: The minimum variance (MV) beamformer can significantly improve the image resolution in ultrasound imaging, but it has limited performance in noise reduction. We recently proposed the covariance matrix-based statistical beamforming (CMSB) for medical ultrasound imaging to reduce sidelobes and incoherent clutter.Methods: In this paper, we aim to improve the imaging performance of the MV beamformer by introducing a new pixel-based adaptive weighting approach based on CMSB, which is named as covariance matrix-based adaptive weighting (CMSAW). The proposed CMSAW estimates the mean-to-standard-deviation ratio (MSR) of a modified covariance matrix reconstructed by adaptive spatial smoothing, rotary averaging, and diagonal reducing. Moreover, adaptive diagonal reducing based on the aperture coherence is introduced in CMSAW to enhance the performance in speckle preservation.Results: The proposed CMSAW-weighted MV (CMSAW-MV) was validated through simulation, phantom experiments, and in vivo studies. The phantom experimental results show that CMSAW-MV obtains resolution improvement of 21.3% and simultaneously achieves average improvements of 96.4% and 71.8% in average contrast and generalized contrast-to-noise ratio (gCNR) for anechoic cyst, respectively, compared with MV. in vivo studies indicate that CMSAW-MV improves the noise reduction performance of MV beamformer.Conclusion: Simulation, experimental, and in vivo results all show that CMSAW-MV can improve resolution and suppress sidelobes and incoherent clutter and noise. These results demonstrate the effectiveness of CMSAW in improving the imaging performance of MV beamformer. Moreover, the proposed CMSAW with a computational complexity of [Formula: see text] has the potential to be implemented in real time using the graphics processing unit. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
44. 采用多模式飞行的乌鸦搜索算法.
- Author
-
冯爱武, 王 勇, and 付小朋
- Subjects
- *
SEARCH algorithms , *LEARNING strategies , *COMPUTER simulation , *ALGORITHMS , *ENGINEERING , *FORAGE , *PARTICLE swarm optimization - Abstract
Aiming at the shortcomings of crow search algorithm ( CSA), this paper proposed a crow search algorithm using multi-mode flight ( MFCSA) . Based on the strength of foraging ability, the algorithm divided the population into two groups: strong and weak foraging ability. Those with strong foraging ability adopted the strategy of trailing and tracking the optimal target of the current group, and flied to the vicinity of the current optimal position of the group under the guidance of the group information to carry out search activities, which enhanced the local exploitation ability of the algorithm. Those with weaker foraging ability adopted the two strategies of observing and learning the foraging methods of the strong, and flying away quickly when encountering danger, the former could improve the global exploration ability of the algorithm, and the latter could maintain the diversity of the population. Through the numerical experiment simulation of 15 benchmark test functions and 2 engineering application problems, the results show that the MFCSA has better performance in optimization accuracy, convergence speed, etc., enhances the ability to avoid falling into the local optimum, and has better stability. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. A novel method for distributed optimization with globally coupled constraints based on multi-agent systems.
- Author
-
Ge, Yiyang, Mei, Xuehui, Jiang, Haijun, Qiu, Jianlong, and Yu, Zhiyong
- Subjects
- *
DISTRIBUTED algorithms , *MULTIAGENT systems , *NONSMOOTH optimization , *ALGORITHMS , *COMPUTER simulation - Abstract
A continuous-time distributed algorithm based on multi-agent systems is proposed to solve the convex nonsmooth optimization with globally coupled constraints in this paper. Firstly, the relationship of equivalence between the equilibrium and the optimal solution of the system is proved by using the properties of projection operator and saddle point. In addition, the stability of the algorithm is analyzed by means of Lie derivative and set-valued LaSalle's invariance principle. In particular, the trajectory of the proposed algorithm from any initial point can converge to the global optimal solution. Finally, the effectiveness of the designed algorithm is verified by numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. A Symplectic Algorithm for Constrained Hamiltonian Systems.
- Author
-
Fu, Jingli, Zhang, Lijun, Cao, Shan, Xiang, Chun, and Zao, Weijia
- Subjects
- *
HAMILTONIAN systems , *QUANTUM theory , *HAMILTONIAN graph theory , *ALGORITHMS , *SIMULATION methods & models , *COMPUTER simulation - Abstract
In this paper, a symplectic algorithm is utilized to investigate constrained Hamiltonian systems. However, the symplectic method cannot be applied directly to the constrained Hamiltonian equations due to the non-canonicity. We firstly discuss the canonicalization method of the constrained Hamiltonian systems. The symplectic method is used to constrain Hamiltonian systems on the basis of the canonicalization, and then the numerical simulation of the system is carried out. An example is presented to illustrate the application of the results. By using the symplectic method of constrained Hamiltonian systems, one can solve the singular dynamic problems of nonconservative constrained mechanical systems, nonholonomic constrained mechanical systems as well as physical problems in quantum dynamics, and also available in many electromechanical coupled systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Study of the Algorithm for Wind Shear Detection with Lidar Based on Shear Intensity Factor.
- Author
-
Zhao, Shijun and Shan, Yulong
- Subjects
- *
WIND shear , *LIDAR , *WIND speed , *ALGORITHMS , *TROPICAL cyclones , *COMPUTER simulation - Abstract
Low-level wind shear is a vital weather process affecting aircraft safety while taking off and landing and is known as the "aircraft killer" in the aviation industry. As a result, effective monitoring and warning are required. Several ramps detection algorithms for low-level wind shear based on glide path scanning of lidar have been developed, including double and simple ramp detection, with the ramp length extension and contraction strategies corresponding to the algorithm. However, current algorithms must be improved to determine the maximum shear value and location. In this paper, a new efficient algorithm based on the shear intensity factor value is presented, in which wind speed changes and distance are both considered when calculating wind shear. Simultaneously, the effectiveness of the improved algorithm has been validated through numerical simulation experiments. Results reveal that the improved algorithm can determine the maximum intensity value and wind shear location more accurately than the traditional algorithm. In addition, the new algorithm improved the detection ability of lidar for weak wind shear. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Modified Group Lottery Scheduling Algorithm for Ready Queue Mean Time Estimation in Multiprocessor Environment.
- Author
-
Shukla, Diwakar and More, Sarla
- Subjects
- *
ALGORITHMS , *MEAN time to repair , *COMPUTER simulation - Abstract
The problem of ready queue mean time estimation in the multiprocessor environment was discussed by Shukla et. al. [5] and several others. In recent years, most of the existing and relating contributions assume that all processes in the ready queue might have been completed before a particular instant of time occur like a sudden failure or interrupt. Due to this, data of time consumed by processes remain available. The idea of improvement in this paper is to assume that at the instant of occurrence of breakdown, some processes are partially completed and remaining is completely processed. Under this situation, the time computation and allocation strategies need to be re-designed. Therefore this has been taken into account in this paper with a proposal of a modified scheme. It contains arbitrary, Type-A, and Type- B allocations of sample units to the processors. Confidence intervals for the sample mean values are calculated and simulated over many samples using cumulative probabilities. It was found that Type-A allocation has the lowest variance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
49. Optimal New Sliding Mode Controller Combined with Modified Supertwisting Algorithm for a Perturbed Quadrotor UAV.
- Author
-
El Houm, Yassine, Abbou, Ahmed, Labbadi, Moussa, and Cherkaoui, Mohamed
- Subjects
- *
ALGORITHMS , *TRACKING control systems , *TIME-varying systems , *COMPUTER simulation - Abstract
This paper deals with the design of a novel modified supertwisting fast nonlinear sliding mode controller (MSTFNSMC) to stabilize a quadrotor system under time-varying disturbances. The suggested control strategy is based on a modified supertwisting controller with a fast nonlinear sliding surface to improve the tracking performance. The paper suggests a simple optimization tool built-in MATLAB/Simulink to tune the proposed controller parameters. Fast convergence of state variables is established by using a nonlinear sliding surface for rotational and translational subsystems. The modified supertwisting controller is developed to suppress the effect of chattering, reject disturbances, and ensure robustness against external disturbance effect. The stability of the proposed controller (MSTFNSMC) is proved using the Lyapunov theory. The performance of the proposed MSTFNSMC approach is compared with the supertwisting sliding mode controller (STSMC) by numerical simulations to verify its effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
50. Bayesian-Based Search Decision Framework and Search Strategy Analysis in Probabilistic Search.
- Author
-
Yu, Liang and Lin, Da
- Subjects
- *
SEARCH engines , *ALGORITHMS , *RISK-taking behavior , *PSYCHOLOGICAL feedback , *COMPUTER simulation - Abstract
In this paper, a sequence decision framework based on the Bayesian search is proposed to solve the problem of using an autonomous system to search for the missing target in an unknown environment. In the task, search cost and search efficiency are two competing requirements because they are closely related to the search task. Especially in the actual search task, the sensor assembled by the searcher is not perfect, so an effective search strategy is needed to guide the search agent to perform the task. Meanwhile, the decision-making method is crucial for the search agent. If the search agent fully trusts the feedback information of the sensor, the search task will end when the target is "detected" for the first time, which means it must take the risk of founding a wrong target. Conversely, if the search agent does not trust the feedback information of the sensor, it will most likely miss the real target, which will waste a lot of search resources and time. Based on the existing work, this paper proposes two search strategies and an improved algorithm. Compared with other search methods, the proposed strategies greatly improve the efficiency of unmanned search. Finally, the numerical simulations are provided to demonstrate the effectiveness of the search strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.