Results 41 to 50 of about 494,314 (293)

A new auxiliary function method for general constrained global optimization

open access: yesOptimization, 2013
In this article, we first propose a method to obtain an approximate feasible point for general constrained global optimization problems (with both inequality and equality constraints). Then we propose an auxiliary function method to obtain a global minimizer or an approximate global minimizer with a required precision for general global optimization ...
Z.Y. Wu   +3 more
openaire   +2 more sources

Efficient time second-order SCQ formula combined with a mixed element method for a nonlinear time fractional wave model

open access: yesElectronic Research Archive, 2022
In this article, a kind of nonlinear wave model with the Caputo fractional derivative is solved by an efficient algorithm, which is formulated by combining a time second-order shifted convolution quadrature (SCQ) formula in time and a mixed element ...
Yining Yang   +4 more
doaj   +1 more source

A Subgradient Method for Free Material Design [PDF]

open access: yes, 2016
A small improvement in the structure of the material could save the manufactory a lot of money. The free material design can be formulated as an optimization problem.
Kocvara, Michal   +2 more
core   +2 more sources

Solving nonlinearly constrained global optimization problem via an auxiliary function method

open access: yesJournal of Computational and Applied Mathematics, 2009
Constrained continuous global minimization problems can be converted to unconstrained ones by adding a penalty term to the objective function. Penalty function methods require usually the determination of parameters, so that constrained and unconstrained problems have global minimizers.
Zhu, Wenxing, Ali, M.M.
openaire   +1 more source

Efficient Computations of a Security Index for False Data Attacks in Power Networks [PDF]

open access: yes, 2013
The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements.
Hendrickx, Julien M.   +4 more
core   +1 more source

New approximate-analytical solutions to partial differential equations via auxiliary function method

open access: yesPartial Differential Equations in Applied Mathematics, 2021
In this article, the optimal auxiliary function method (OAFM) is extended to general partial differential equations (PDEs). Our proposed method is highly efficient and provides the means of controlling the approximate solution’s convergence. Illustrative
Laiq Zada   +6 more
doaj   +1 more source

Multi-Task Transformer with Adaptive Cross-Entropy Loss for Multi-Dialect Speech Recognition

open access: yesEntropy, 2022
At present, most multi-dialect speech recognition models are based on a hard-parameter-sharing multi-task structure, which makes it difficult to reveal how one task contributes to others.
Zhengjia Dan   +4 more
doaj   +1 more source

URBAN GREEN SPACE IDENTIFICATION BY FUSING SATELLITE IMAGES FROM GF-2 AND SENTINEL-2 [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2023
This paper combines class hierarchy construction and feature-preferred random forest classification method, and the classification results are the best. In the urban center area with complex features, this method can be used to extract small and complex ...
B. Kang, G. Cai
doaj   +1 more source

Initialisation of Optimisation Solvers for Nonlinear Model Predictive Control: Classical vs. Hybrid Methods

open access: yesEnergies, 2022
In nonlinear Model Predictive Control (MPC) algorithms, the number of cost-function evaluations and the resulting calculation time depend on the initial solution to the nonlinear optimisation task.
Maciej Ławryńczuk   +3 more
doaj   +1 more source

Hashing with binary autoencoders

open access: yes, 2015
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á.   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy