Aiming at improving the application of reflux self-excited oscillating nozzles (RSONs) in underwater cleaning, this study focuses on the influence of nozzle structure parameters on jet morphology evolution and cavitat...
详细信息
This paper presents a novel split parallel algorithm for solving quasi-static multiple-network poroelasticity (MPET) equations. By introducing a total pressure variable, the MPET system can be reformulated into a coup...
详细信息
Benefiting from the performance enhancement brought by multistatic cooperative sensing, integrated sensing and communication (ISAC) can capture more environmental information to address the security risk of informatio...
详细信息
A framework for parallel algebraic multilevel preconditioning methods presented for solving large sparse systems of linear equstions with symmetric positive definite coefficient matrices,which arise in suitable finite...
详细信息
A framework for parallel algebraic multilevel preconditioning methods presented for solving large sparse systems of linear equstions with symmetric positive definite coefficient matrices,which arise in suitable finite element discretizations of many second-order self-adjoint elliptic boundary value problems. This framework not only covers all known parallel algebraic multilevel preconditioning methods, but also yields new ones. It is shown that all preconditioners within this framework have optimal orders of complexities for problems in two-dimensional(2-D) and three-dimensional (3-D) problem domains, and their relative condition numbers are bounded uniformly with respect to the numbers of both levels and nodes.
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol...
详细信息
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this *** this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography *** the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by *** on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is *** last,the complete setup for realizing the PFM attack is presented with all ***,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.
Based on the dual mixed variational formulation with three variants (stress, displacement, displacement on contact boundary) and the unilateral beaming problem of finite element discretization, an Uzawa type iterative...
详细信息
Based on the dual mixed variational formulation with three variants (stress, displacement, displacement on contact boundary) and the unilateral beaming problem of finite element discretization, an Uzawa type iterative algorithm is presented. The convergence of this iterative algorithm is proved, and then the efficiency of the algorithm is tested by a numerical example.
Trust region (TR) algorithms are a class of recently developed algorithms for nonlinear optimization. A new family of TR algorithms for unconstrained optimization, which is the extension of the usual TR method, is pre...
详细信息
Trust region (TR) algorithms are a class of recently developed algorithms for nonlinear optimization. A new family of TR algorithms for unconstrained optimization, which is the extension of the usual TR method, is presented in this paper. When the objective function is bounded below and continuously, differentiable, and the norm of the Hesse approximations increases at most linearly with the iteration number, we prove the global convergence of the algorithms. Limited numerical results are reported, which indicate that our new TR algorithm is competitive.
Weakly supervised 3D semantic segmentation has successfully mitigated the labor-intensive and time-consuming task of annotating 3D point clouds. However, reliably utilizing the minimal point-wise annotations for unlab...
详细信息
Linear systems associated with numerical methods for constrained optimization are discussed in this paper. It is shown that the corresponding subproblems arise in most well-known methods, no matter line search methods...
详细信息
Linear systems associated with numerical methods for constrained optimization are discussed in this paper. It is shown that the corresponding subproblems arise in most well-known methods, no matter line search methods or trust region methods for constrained optimization can be expressed as similar systems of linear equations. All these linear systems can be viewed as some kinds of approximation to the linear system derived by the Lagrange-Newton method. Some properties of these linear systems are analyzed.
The Beale\|Powell restart algorithm is highly useful for large\|scale unconstrained optimization. An example is taken to show that the algorithm may fail to converge. The global convergence of a slightly modified algo...
详细信息
The Beale\|Powell restart algorithm is highly useful for large\|scale unconstrained optimization. An example is taken to show that the algorithm may fail to converge. The global convergence of a slightly modified algorithm is proved.
暂无评论