In this paper, for any odd n and any integer m ≥ 1 with n tu(x, t) = ((−∆)m + V(x))u(x, t), t ∈ , x ∈ n, where V is a real-valued potential with certain decay. Let Pac(H) denote the projection onto the absolutely c...
详细信息
In this paper, we propose an augmented subspace based adaptive proper orthogonal decomposition (POD) method for solving the time dependent partial differential equations. By augmenting the POD subspace with some auxil...
详细信息
In this system paper, we present our approach to the DJI Robomaster AI Challenge, 2022 where our team ERA-IITK was ranked 3 rd worldwide among 83 teams. We primarily focus on system hardware design and algorithmic co...
In this system paper, we present our approach to the DJI Robomaster AI Challenge, 2022 where our team ERA-IITK was ranked 3 rd worldwide among 83 teams. We primarily focus on system hardware design and algorithmic components to achieve full autonomy. We first detail the hardware infrastructure, including intricate details on sensors and communication setup. Then we comprehensively describe our algorithmic pipeline and a state machine based on them to realize an autonomous system. Our major novelty is the high-speed and accurate visual perception module for target detection, and high-speed self-localization to maximize the likelihood of a target being shot. Our research endeavor in this paper can serve as a foundation for more complex systems and holds immense potential for various real-world applications.
Automatic recognition of facial expressions is a common problem in human-computer interaction. While humans can recognize facial expressions very easily, machines cannot do it as easily as humans. Analyzing facial cha...
详细信息
In this paper, we investigate the elastic wave full-waveform inversion (FWI) based on the trust region method. The FWI is an optimization problem of minimizing the misfit between the observed data and simulated data. ...
详细信息
In this paper, we investigate the elastic wave full-waveform inversion (FWI) based on the trust region method. The FWI is an optimization problem of minimizing the misfit between the observed data and simulated data. Usually, the line search method is used to update the model parameters iteratively. The line search method generates a search direction first and then finds a suitable step length along the direction. In the trust region method, it defines a trial step length within a certain neighborhood of the current iterate point and then solves a trust region subproblem. The theoretical methods for the trust region FWI with the Newton type method are described. The algorithms for the truncated Newton method with the line search strategy and for the Gauss-Newton method with the trust region strategy are presented. Numerical computations of FWI for the Marmousi model by the L-BFGS method, the Gauss-Newton method and the truncated Newton method are completed. The comparisons between the line search strategy and the trust region strategy are given and show that the trust region method is more efficient than the line search method and both the Gauss-Newton and truncated Newton methods are more accurate than the L-BFGS method.
With the rapid expansion of large-scale renewable energy bases in China, optimizing the allocation of renewable energy and energy storage capacity is crucial for improving system efficiency. In this paper, a joint opt...
With the rapid expansion of large-scale renewable energy bases in China, optimizing the allocation of renewable energy and energy storage capacity is crucial for improving system efficiency. In this paper, a joint optimal configuration method of wind-photovoltaic-energy storage capacity based on time series production simulation is proposed for renewable energy transmission base. Its aim is to minimize the total investment cost of the system under certain constraints about the proportion of renewable energy power generation, renewable energy utilization rate, conventional thermal power operation, energy storage power station operation, ultra-high voltage direct current (UHVDC) regulation and power transmission. To handle the nonlinear constraints, linearization is achieved by introducing integer variables. For the complex operation constraints of conventional thermal power and UHVDC channel, a simplified modeling method of start-stop cycle and adjustment cycle is proposed, which can effectively reduce the number of integer variables and improve the solving efficiency. The effectiveness of the proposed method is tested on the data of a renewable energy base in Northwest China.
In this work,we proposed a diffuse-interface model for the dendritic growth with thermosolutal *** this model,the sharp boundary between the fluid and solid dendrite is firstly replaced by a thin but nonzero thickness...
详细信息
In this work,we proposed a diffuse-interface model for the dendritic growth with thermosolutal *** this model,the sharp boundary between the fluid and solid dendrite is firstly replaced by a thin but nonzero thickness diffuse interface,which is described by the order parameter,and the diffuse-interface based governing equations for the dendritic growth are *** solve the model for the dendritic growth with thermosolutal convection,we also developed a diffuse-interface multirelaxation-time lattice Boltzmann(LB)*** this method,the order parameter in the phase-field equation is combined into the force caused by the fluid-solid interaction,and the treatment on the complex fluid-solid interface can be *** addition,four LB models are designed for the phase-field equation,concentration equation,temperature equation and the Navier-Stokes equations in a unified ***,we performed some simulations of the dendritic growth to test the present diffuse-interface LB method,and found that the numerical results are in good agreements with some previous works.
作者:
Jiang, XueLyu, MaohuiYin, TaoZheng, WeiyingDepartment of Mathematics
Faculty of Science Beijing University of Technology Beijing100124 China LSEC
Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China
This work is focused on the modelling of signal propagations in myelinated axons to characterize the functions of the myelin sheath in the neural structure. Based on reasonable assumptions on the medium properties, we...
详细信息
In this paper, we establish local well-posedness of the Cauchy problem for a recently proposed dispersion generalized Camassa-Holm equation by using Kato’s semigroup approach for quasi-linear evolution equations. We ...
详细信息
In (t, n)-threshold secret sharing, a secret S is distributed among n participants such that any subset of size t can recover S, while any subset of size t − 1 or fewer learns nothing about it. For information-theoret...
详细信息
暂无评论