Results 31 to 40 of about 26,453 (192)
In this paper, we propose a Mizuno-Todd-Ye predictor-corrector infeasible-interior-point method for symmetric optimization using the arc-search strategy.
Ximei Yang, Yinkui Zhang
doaj +1 more source
An infeasible interior-point algorithm for solving the $P_*$-matrix linear complementarity problem based on a kernel function with trigonometric barrier term is analyzed.
B. Kheirfam, M. Haghighi
doaj +1 more source
Exact duality in semidefinite programming based on elementary reformulations [PDF]
In semidefinite programming (SDP), unlike in linear programming, Farkas' lemma may fail to prove infeasibility. Here we obtain an exact, short certificate of infeasibility in SDP by an elementary approach: we reformulate any semidefinite system of the ...
Liu, Minghui, Pataki, Gabor
core +3 more sources
Optimal Control of Ascent Trajectory for Launch Vehicles: A Convex Approach
This paper presents an online ascent trajectory optimization algorithm based on optimal control and convex optimization without accurate initial guesses.
Yuan Li +3 more
doaj +1 more source
A Still Simpler Way of Introducing the Interior-Point Method for Linear Programming
Linear programming is now included in algorithm undergraduate and postgraduate courses for computer science majors. We give a self-contained treatment of an interior-point method which is particularly tailored to the typical mathematical background of CS
Mehlhorn, Kurt, Saxena, Sanjeev
core +1 more source
A New Full-Newton Step $O(n)$ Infeasible Interior-Point Algorithm for $P_*(\kappa)$-horizontal Linear Complementarity Problems [PDF]
In this paper, we first present a brief review about the feasible interior-point algorithm for $P_*(\kappa)$-horizontal linear complementarity problems (HLCPs) based on new directions.
Soodabeh Asadi, Hossein Mansouri
doaj
In this work, by considering a variety of realistic hardware impairments, we aim to enhance the security of a cooperative relaying network, where a source intends to transmit its confidential information to a destination in the presence of a group of ...
Majid Moradikia +4 more
doaj +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Incorporating a four-dimensional filter line search method into an interior point framework [PDF]
Here we incorporate a four-dimensional filter line search method into an infeasible primal-dual interior point framework for nonlinear programming.
Costa, M. Fernanda P. +1 more
core
A miniaturized drug sensitivity and resistance testing (DSRT) workflow based on the Droplet Microarray (DMA) platform enables functional drug testing using minimal patient‐derived tumor material. By screening nanoliter‐scale droplets containing as few as 300 cells, this approach generates reproducible and tumor‐specific drug response profiles ...
Maryam Salarian +7 more
wiley +1 more source

