We consider the problem of finding (possibly non connected) discrete surfaces spanning a finite set of discrete boundary curves in the three-dimensional space and minimizing (globally) a discrete energy involving mean...
详细信息
ISBN:
(纸本)9783642274121
We consider the problem of finding (possibly non connected) discrete surfaces spanning a finite set of discrete boundary curves in the three-dimensional space and minimizing (globally) a discrete energy involving mean curvature. Although we consider a fairly general class of energies, our main focus is on the Willmore energy, i.e. the total squared mean curvature. Most works in the literature have been devoted to the approximation of a surface evolving by the Willmore flow and, in particular, to the approximation of the so-called Willmore surfaces, i.e., the critical points of the Willmore energy. Our purpose is to address the delicate task of approximating global minimizers of the energy under boundary constraints. the main contribution of this work is to translate the nonlinear boundary value problem into an integer linear program, using a natural formulation involving pairs of elementary triangles chosen in a pre-specified dictionary and allowing self-intersection. the reason for such strategy is the well-known existence of algorithms that can compute global minimizers of a large class of linear optimization problems, however at a significant computational and memory cost. the case of integer linear programming is particularly delicate and usual strategies consist in relaxing the integral constraint x ∈ {0,1} into x ∈ [0,1] which is easier to handle. Our work focuses essentially on the connection between the integer linear program and its relaxation. We prove that: One cannot guarantee the total unimodularity of the constraint matrix, which is a sufficient condition for the global solution of the relaxed linear program to be always integral, and therefore to be a solution of the integer program as well;Furthermore, there are actually experimental evidences that, in some cases, solving the relaxed problem yields a fractional solution. these facts indicate that the problem cannot be tackled with classical linear programming solvers, but only with pure integer linea
In this paper we present an adaptive driver alert system that uses passive techniques for extracting psycho-physiological features from the user, and a head-up display actuator that hands preprocessed information abou...
详细信息
Cognitive radio networks suffer from dynamic interruptions from primary users. the joint congestion control and routing are tackled using stochastic control techniques. Centralized dynamic programming is applied for t...
详细信息
Cognitive radio networks suffer from dynamic interruptions from primary users. the joint congestion control and routing are tackled using stochastic control techniques. Centralized dynamic programming is applied for the primal optimization, which provides a performance upper bound. Q-learning is applied when the primary user knowledge is unknown. Dual optimization based decomposition is used to decentralize the stochastic control. A heuristic scheme based on the limited lookahead policy (LLP) and binary pricing is proposed to tackle the prohibitive difficulty in the dual optimization. Numerical simulation shows that the proposed algorithms achieve the optimal or near-optimal performance.
For a long time since the anisotropy basically confined to a single crystal, used as a polycrystalline ceramic materials generally considered to be isotropic. In this paper, the anisotropic mechanical, thermal expansi...
详细信息
ISBN:
(纸本)9783037854259;9783038138396
For a long time since the anisotropy basically confined to a single crystal, used as a polycrystalline ceramic materials generally considered to be isotropic. In this paper, the anisotropic mechanical, thermal expansion coefficient and thermal conductivity of a double perovskite slab-rocksalt layer Nd2SrAl2O7 was studied by first principles as an example. the method is using density functionaltheory (DFT) and crystal parameters, which has been used to calculate the modulus of elasticity of anisotropic in a three-dimensional space. While combined with traditional thermal conductivity theory, we have obtained the tensor of thermal diffusion, thermal conductivity in 3D space for the first time in the world within no. the results are in good agreement withthe experiment. the advantage of method is avoiding the difficulty of experimental measurement, reducing the time and obtaining relatively accurate results.
Mobile learning represents a paradigm shift in the delivery of curricula in higher education. Hand held or mobile devices make use of immediacy, and engage withthe problems as they are set. Based partly on students...
详细信息
ISBN:
(纸本)9781467302418
Mobile learning represents a paradigm shift in the delivery of curricula in higher education. Hand held or mobile devices make use of immediacy, and engage withthe problems as they are set. Based partly on students' interest in technology, universities are adapting to take advantage of these changes, especially in computer-based disciplines. By using mobile devices, computer science students can enhance their learning experience. this study concerns computer science lecturers' attitudes towards using mobile technology during programming lectures. Interviews were conducted with instructors who teach programming courses to explore their views on integrating these learning tools into the lecture. the research found that the issues raised by the study participants were not fundamental to their acceptance of such technology. However, the lecturers' positive attitudes towards change were not reflected in their classroom practices. Two findings are discussed: factors affecting educators' willingness to integrate mobile learning as a delivery system during lectures and factors that influence successful integration of such devices into the learning environment for programming courses. Further, the identified factors were classified into two main themes: personal attitudes and curricular issues. this research argues that instructors' acceptance of mobile devices as a learning aid during programming lectures underpins adoption.
the undesired effects of data gathered from real world can be produced by the noise in the process, the bias of the sensors and the presence of hysteresis, among other uncertainty sources. Data gathered by this way ar...
详细信息
ISBN:
(纸本)9783642289309;9783642289316
the undesired effects of data gathered from real world can be produced by the noise in the process, the bias of the sensors and the presence of hysteresis, among other uncertainty sources. Data gathered by this way are called Low Quality Data (LQD). thus, uncertainty representation tools are needed for using in learning models withthis kind of data. this work presents a method to represent the uncertainty and an approach for learning white box Equation Based Models (EBM). the proficiency of the representations with different noise levels and fitness functions typology is compared. the numerical results show that the use of the described objectives improves the proficiency of the algorithms. It has been also proved that each meta-heuristic determines the typology of fitness function.
Semiring-based constraint models and frameworks have been extensively used in literature to optimize different security-related metrics, in order to represent trust scores, levels of security and, in general, quantita...
详细信息
Semiring-based constraint models and frameworks have been extensively used in literature to optimize different security-related metrics, in order to represent trust scores, levels of security and, in general, quantitative information on shared resources to be securely managed. In this tutorial, we summarize four approaches that show an application of these formal models to different security-related problems, as Access Control List-like rights, policy-based access with weighted credentials, propagation of trust on trust-networks, and the cascade vulnerability problem.
In this paper, we use types for ensuring that programs involving streams are well-behaved. We extend pure type systems with a type constructor for streams, a modal operator next and a fixed point operator for expressi...
详细信息
In this paper, we use types for ensuring that programs involving streams are well-behaved. We extend pure type systems with a type constructor for streams, a modal operator next and a fixed point operator for expressing corecursion. this extension is called Pure Type Systems with Corecursion (CoPTS). the typed lambda calculus for reactive programs defined by Krishnaswami and Benton can be obtained as a CoPTS. CoPTSs allow us to study a wide range of typed lambda calculi extended with corecursion using only one framework. In particular, we study this extension for the calculus of constructions which is the underlying formal language of Coq. We use the machinery of infinitary rewriting and formalise the idea of well-behaved programs using the concept of infinitary normalisation. the set of finite and infinite terms is defined as a metric completion. We establish a precise connection between the modal operator (center dot A) and the metric at a syntactic level by relating a variable of type (center dot A) withthe depth of all its occurrences in a term. this syntactic connection between the modal operator and the depth is the key to the proofs of infinitary weak and strong normalisation.
this document intends to present a study of configurations for the uniform illumination over a square-target-surface (of task-lighting dimensions) using power LEDs. A particular application of this is the illumination...
详细信息
this document intends to present a study of configurations for the uniform illumination over a square-target-surface (of task-lighting dimensions) using power LEDs. A particular application of this is the illumination of a carrom board. A lighting scheme involving a distributed arrangement of LEDs that provides a near-uniform illumination level for a given height, is proposed. the optimized parameters for the variables in the arrangement are obtained by the use of MATLAB functions for optimization. the existing lighting system for the illumination of the carrom boards at NITK Surathkal is measured and compared withthe proposed arrangement.
Successful deployment of cognitive radios requires efficient sensing of the spectrum and dynamic adaptation of the available resources according to the sensed (imperfect) information. While most works design these two...
详细信息
Successful deployment of cognitive radios requires efficient sensing of the spectrum and dynamic adaptation of the available resources according to the sensed (imperfect) information. While most works design these two tasks separately, in this paper the sensing and resource allocation schemes are designed jointly. We investigate an interweave CR with multiple secondary users that access orthogonally a set frequency bands originally devoted to primary users. the schemes are designed to optimize the performance of the secondary users while limiting the “probability of interfering” the primary users. the joint design is addressed using dynamic programming and nonlinear optimization techniques. A two-step strategy that first finds the optimal resource allocation for any sensing scheme and then uses that solution as input to solve for the optimal sensing policy is implemented. the two-step strategy is optimal and entails a computational complexity much lower than that required to solve the original formulation.
暂无评论