Alternating Directions Method of Multipliers (ADMM) is a form of decomposition-coordination method that typically requires several iterations/communication rounds between the subproblems and the master problem to conv...
详细信息
ISBN:
(数字)9781665467612
ISBN:
(纸本)9781665467629
Alternating Directions Method of Multipliers (ADMM) is a form of decomposition-coordination method that typically requires several iterations/communication rounds between the subproblems and the master problem to converge. Repeatedly solving the subproblems over several iterations add to the total computation time. Noting that the subproblems solved from one iteration to the next differs only by a few variables, this paper proposes a novel sensitivity-assisted ADMM framework for nonlinear programming (NLP) problems, where the subproblems are cheaply approximated using the parametric sensitivities. By exploiting the parametric sensitivities, the computation of the subproblems can be reduced to a single linear solve instead of solving the full NLP problem, thereby reducing the overall computation cost. Different algorithmic variations are discussed and demonstrated using two numerical examples.
Background:Besides maintaining health precautions,vaccination has been the only prevention from SARS-CoV-2,though no clinically proved 100%effective vaccine has been developed till *** this stage,to withhold the debri...
详细信息
Background:Besides maintaining health precautions,vaccination has been the only prevention from SARS-CoV-2,though no clinically proved 100%effective vaccine has been developed till *** this stage,to withhold the debris of this pandemic-experts need to know the impact of the vaccine efficacy rates,the threshold level of vaccine effectiveness and how long this pandemic may extent with vaccines that have different efficacy *** this article,a mathematical model study has been done on the importance of vaccination and vaccine efficiency rate during an ongoing ***:We simulated a five compartment mathematical model to analyze the pandemic scenario in both California,and whole *** considered four vaccines,Pfizer(95%),Moderna(94%),AstraZeneca(79%),and Johnson&Johnson(72%),which are being used rigorously to control the SARS-CoV-2 pandemic,in addition with two special cases:a vaccine with 100%efficacy rate and no vaccine under ***-CoV-2 related data of California,and *** used in this ***:Both the infection and death rates are very high in *** model suggests that the pandemic situation in California will be under control in the last quartile of the year 2023 if vaccination program is continued with the Pfizer *** this time,six waves may happen from the beginning of the immunization where the case fatality and recovery rates will be 1.697%and 98.30%,***,according to the considered model,this period might be extended to the mid of 2024 when vaccines with lower efficacy rates are *** the other hand,the daily cases and deaths in the *** be under control at the end of 2026 with multiple *** the number of susceptible people will fall down to none in the beginning of 2027,there is less chance to stop the vaccination program if vaccinated with a vaccine other than a 100%effective vaccine or Pfizer,and at that case vaccination program must run till the mid of *** to this s
The popularity of WiFi networks has led to the adoption of fingerprint-based WiFi localization as one primary method for indoor location tracking. However, this technique requires a significant amount of time and effo...
The popularity of WiFi networks has led to the adoption of fingerprint-based WiFi localization as one primary method for indoor location tracking. However, this technique requires a significant amount of time and effort to collect data at numerous reference points (RPs) to ensure accuracy. To reduce the cost and improve efficiency, generative models can be used to generate received signal strength (RSS) fingerprints. This paper proposes a Deep Convolutional Generative Adversarial Network (DCGAN) based model for building RSS fingerprint maps that can generate a comprehensive fingerprint database using only the location of a wireless access point. The proposed approach is expected to lower the cost and effort involved in the collection of RSS fingerprints while maintaining a high level of accuracy.
This article studies the combined effect of spatial heterogeneity and capillary pressure on the saturation of two fluids during the injection of immiscible nanoparticles. Various literature review exhibited that the n...
详细信息
Car-to-car communication is besides autonomous driving and e-mobility one of today’s most important topics in automotive research. Currently, two transmission technologies are available for safety-critical applicatio...
详细信息
ISBN:
(纸本)9783800754878
Car-to-car communication is besides autonomous driving and e-mobility one of today’s most important topics in automotive research. Currently, two transmission technologies are available for safety-critical applications in vehicle-to-vehicle communication: WIFI-based ITS-G5 and cellular-based LTE-V2X [1]. In this article ITS-G5 is used as the primary transmission technology to support safety-critical applications within a wide range of traffic situations by exchanging information between individual vehicles. The resources of the LTE-V2X communication will be used to support the WIFI-based communication in case a reliable transmission via ITS-G5 is not or only partially possible. In a simulation environment several test series were developed to investigate different traffic scenarios, use cases and equipment rates for both transmission technologies. This will show how often and in which situations the resources of LTE-V2X are used.
In this paper, we consider a multi-sink underwater data aggregation network, in which a set of Internet-of-Underwater-Things devices survey an underwater area of interest and upload their data to a set of data gatheri...
详细信息
The Internet of Things (IoT) network topologies are now most commonly impacted by cyberattacks. The scale-free network topologies have demonstrated great robustness against random attacks by preserving the connectedne...
详细信息
In recent years, advancements in plasmonic devices have enabled the localization of electromagnetic fields at subwavelength scales, contributing to breakthroughs in various scientific and engineering fields (J. C. Ndu...
详细信息
ISBN:
(数字)9789463968119
ISBN:
(纸本)9798350359497
In recent years, advancements in plasmonic devices have enabled the localization of electromagnetic fields at subwavelength scales, contributing to breakthroughs in various scientific and engineering fields (J. C. Ndukaife, et al., ACS Nano, 2014,8,9,9035-9043). These structures are often made of metals and their electric properties are typically represented by the classical Drude model (S. A. Maier, 2007, Springer, New York). As the size of the plasmonic structures approaches the nanoscale, the classical Drude model falls short in explaining the collective movement of free electrons in metals. The interaction between moving charges and the electromagnetic fields can be described by a coupled system of the Maxwell and hydrodynamic equations (X. Zheng, et al., IEEE Trans. Antennas Propag., 2018,66,9, 4759-4771).
We analyze the sketching approximability of constraint satisfaction problems on Boolean domains, where the constraints are balanced linear threshold functions applied to literals. In particular, we explore the approxi...
详细信息
In recent years, mobile devices such as smartphones and tablets have become one of the most popular digital devices of choice in our daily lives when it comes to functionality and convenience. With only ever increasin...
详细信息
In recent years, mobile devices such as smartphones and tablets have become one of the most popular digital devices of choice in our daily lives when it comes to functionality and convenience. With only ever increasing popularity, mobile devices with Android operating systems have become a common target for malware especially through third-party markets. To make things worse, the emergence of obfuscation and adversarial example attacks enables malware to evade traditional security methods and steal a user’s private information. In this paper, we propose an ensemble learning-based framework for detecting malware by using risky permissions as features to train a classifier and determine whether a mobile application (a.k.a. app) is malware or not. To evaluate the performance of the proposed malware detection approach, we have conducted a series of experiments using real world Android app datasets that are composed of both malicious and benign apps. Experimental results clearly show that the proposed malware detection approach can effectively detect malware with a high accuracy.
暂无评论