Semi-Infinite Optimization with Implicit Functions
|
|
- Hector Blake
- 6 years ago
- Views:
Transcription
1 ubs.acs.org/iecr Semi-Infinite Otimization with Imlicit Functions Matthew D. Stuber and Paul I. Barton* Process Systems Engineering Laboratory, Det. of Chemical Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, United States ABSTRACT: In this work, equality-constrained bilevel otimization roblems, arising from engineering design, economics, and oerations research roblems, are reformulated as an equivalent semi-infinite rogram (SIP) with imlicit functions embedded, which are defined by the original equality constraints that model the system. Using recently develoed theoretical tools for bounding imlicit functions, a recently develoed algorithm for global otimization of imlicit functions, and a recently develoed algorithm for solving standard SIPs with elicit functions to global otimality, a method for solving SIPs with imlicit functions embedded is resented. The method is guaranteed to converge to ϵ-otimality in finitely many iterations given the eistence of a Slater oint arbitrarily close to a minimizer. Besides the Slater oint assumtion, it is assumed only that the functions are continuous and factorable and that the model equations are once continuously differentiable. INTRODUCTION Many engineering design feasibility and reliability roblems give rise to otimization rograms whose feasible sets are arametrized. This is because it is often of great interest to study erformance and/or safety of engineering systems under arametric uncertainty. Particularly, it is imortant to study the erformance and/or safety in the face of the worst case, giving rise to equality-constrained bilevel rograms of the following form: f*= min f( ) s.t.0 ma g(, y, ) y, s.t. h (, y, ) = 0 X = { : } P = { : } ny y D y It is assumed that the objective function f : D and the inequality constraint function g: D Dy D are continuous and are factorable in the sense that they are comosed from elementary arithmetic oerations and transcendental functions. The equality constraints of eq 1 are the system of equations reresenting a steady-state model of the system of interest: h (, y, ) = 0 (2) n with h: D Dy D y, also assumed factorable and continuously differentiable on its domain with n n D, D oen. Due to the comleity of the models to be considered in this roblem, the bilevel formulation eq 1 is intractable, or even imossible to solve. It is roosed in this work that, under some relatively mild assumtions, the equality constraints are used to eliminate y and eq 1 is reformulated as an equivalent semi-infinite rogram (1) (SIP) without equality constraints. If a y eists that satisfies eq 2 for each (,) X P D D, then it defines an imlicit function of (,), eressed as y(,). It must be assumed that there eists at least one imlicit function y:x P Y such that h(,y(,),) =0, (,) X P with Y D y. Conditions guaranteeing uniqueness of y Y are given by the semilocal imlicit function theorem. 1 Given the eistence of an imlicit function y (and its uniqueness in Y), the equality constraints can be eliminated and the rogram eq 1 can be eressed as min f ( ) s.t.0 ma g(, y(, ), ) X = { : } P = { : } Furthermore, the inner maimization rogram can be eressed as ma g(, y(, ), ) 0 g(, y(, ), ) 0, P P where the latter constraint is referred to as the (imlicit) semiinfinite constraint. The following SIP, equivalent to the original bilevel rogram in eq 1, can then be formulated: f*= min f( ) s.t. g(, y(, ), ) 0, P X = { : } P = { : } Received: July 21, 2014 Revised: Setember 26, 2014 Acceted: December 11, 2014 Published: December 11, 2014 (3) (4) (5) 2014 American Chemical Society 307
2 For a chemical engineering alication, y may reresent internal state variables, such as comosition, determined by an equation of state or some other hysics, the variables may reresent design variables such as chemical reactor dimensions or some ie lengths, and may reresent uncertain model arameters such as reaction rate constants. In this case, f may reresent some economic objective related to sizing and g may reresent a critical erformance and/or safety constraint. The global solution (if one eists) will corresond to the worst-case realization of uncertainty and address the question of otimal design under uncertainty. Alternatively, may reresent uncertainty in the system or environment and may reresent the controls. The function f may then reresent some metric of uncertainty and g may again reresent a erformance and/or safety constraint. In that case, the global solution (if one eists) will corresond to the worst-case realization of uncertainty for which there eists a control setting such that the system meets secification. This formulation addresses the question of feasibility of the design as well as the determination of the maimum allowable uncertainty realization such that the design remains feasible. In the net section, a background and literature review of semi-infinite rogramming is given. Then, the revious work on standard SIPs is etended to SIPs with imlicit functions embedded including the full statement of the algorithm for solving such SIPs. Following the resentation of the algorithm, three numerical eamles are resented and analyzed. BACKGROUND It has long been known that bilevel rograms and SIPs can be utilized to address roblems that are inherently uncertain. Kwak and Haug 2 addressed the question of otimal design under uncertainty using the bilevel formulation in eq 1 with first-order (affine) aroimations of f, g, and h. A stochastic version of the rogram in eq 1 was considered by Malik and Hughes 3 for otimal design of chemical rocesses under uncertainty. In Halemane and Grossmann, 4 the equality constraints were maniulated to give an elicit function of the control and uncertainty variables and a secial case of the SIP in eq 5, known as a ma min, min ma, or minima roblem. This aroach was elored further by Swaney and Grossmann 5 with alication to addressing the feasibility roblem. Two algorithms were resented by Swaney and Grossmann 6 for solving the roblem under certain conveity requirements. This formulation was further elored by Stuber and Barton, 7 with general nonconve g as in eq 5, in order to address the question of robust feasibility of engineering designs. A rigorous finite ϵ- convergent deterministic global otimization algorithm was resented that was based on the algorithm of Bhattacharjee et al. 8 The algorithm relies on the ability to solve the equality constraints aroimately for an imlicit function of the control and uncertainty variables using the successive-substitution fied-oint iteration 7 and so is limited to certain systems. Halemane and Grossmann 4 elained that the SIP formulation leads to an otimization roblem that is not necessarily differentiable. In order to maintain differentiability, a secial case of the bilevel formulation (eq 1), equivalent to that given by Halemane and Grossmann, 4 was further elored by Floudas et al. 9 The authors resented a rigorous deterministic algorithm, relying on twice-differentiability of h and g. 9 Ostrovsky and co-workers develoed algorithms for bounding solutions of the feasibility roblem as formulated by Halemane and Grossmann 4 and Swaney and Grossmann. 5 The algorithms rely on iteratively solving nonlinear rogramming roblems under similar certain conveity requirements. Therefore, the alicability is limited to such systems considered by Halemane and Grossmann 4 and Swaney and Grossmann. 5 Kwak and Haug 2 briefly discussed the relationshi between the min ma roblem formulation 3 7,9 and the bilevel formulation. In Mitsos et al., 13 the authors resented an algorithm to address the bilevel formulation with a nonconve inner rogram. However, their algorithm was limited in that it could only handle inequality constrained roblems and so cannot be alied to eq 1. This aer will focus on solving the general SIP in eq 5, without relying on aroimations of f, g, and h, such as in Kwak and Haug, 2 with alication to the min ma roblems that show u in economics and design feasibility roblems considered in the aforementioned articles, 3 7,9 only requiring continuity of f and g, once-differentiability of h, the eistence of a Slater oint arbitrarily close to a minimizer, and the eistence of a unique imlicit function y Y such that h(,y(,),) =0, (,) X P. Solving SIPs with elicit functions (e.g., without imlicit functions embedded as in eq 5), referred to as elicit SIPs herein, has been an active area of research for many years. An overview of the revious alication of elicit SIPs to realworld roblems with theoretical results and available methods can be found in revious works Contributions that have secific relevance to this work are summarized below. Blankenshi and Falk 17 resent a cutting-lane algorithm for aroimating solutions to elicit SIPs, which amounts to solving two nonlinear rograms (NLPs), to global otimality in the general case, at each iteration. Their algorithm generates a sequence of (not necessarily feasible) oints that converge to the solution of the SIP in the limit. 17 Under aroriate conveity assumtions, their algorithm converges finitely 17 to a feasible solution. Their method is alicable to SIPs in general and they make secific mention of the alication to the ma min roblem. The ma min roblem is further elored by Falk and Hoffman 18 for general nonconve functions. The cutting-lane algorithm relies on the techniques of discretization and what is called local reduction, which is a technique for theoretically describing (locally) the SIP feasible region with finitely many constraints. 19 Most SIP algorithms emloy these techniques in various ways. 16 Zuhe et al. 20 resented a method based on interval analysis for solving elicit min ma roblems, again, which are secial instances of elicit SIPs. Their method is alicable to minma roblems with twice continuously differentiable elicit functions. Interval analysis was used to dynamically eclude regions of the search sace guaranteed not to contain solutions. 20 It was suggested that, using the roerties of interval analysis and generalized bisection, their method converges in finitely many iterations. 20 Bhattacharjee et al. 21 alied interval analysis to the general case of elicit SIPs in order to construct what is called the inclusion-constrained reformulation, which is a valid restriction of the original elicit SIP. This idea was used further in the first algorithm for generating SIP-feasible oints finitely, that relies on the inclusion-constrained reformulation. 8 A lower-bounding rocedure that relies on McCormick s conve and concave relaations 22 and discretization was introduced. 8 Together with the inclusion-constrained reformulation and the branchand-bound (B&B) framework, Bhattacharjee et al. were able to solve SIPs to global otimality with guaranteed finite ϵ-otimal 308
3 convergence. 8 As reviously mentioned, this algorithm was emloyed by Stuber and Barton 7 to solve imlicit ma-min roblems cast as imlicit SIPs. Due to the overestimation of inclusion functions and the fact that the size of the uer- and lower-bounding roblems grow raidly with deth in the branch-and-bound tree, 8 this algorithm can be ineffective at solving imlicit SIPs modeling more comle rocesses. Stein and Still 23 solved elicit SIPs, with g conve, as a Stackelberg game using an interior-oint method. By conveity of g, they were able to eloit the first-order otimality conditions to characterize the solution set of the inner rogram and solve equivalent finite nonlinear rograms. 23 Floudas and Stein 24 used a similar idea and constructed concave relaations of g on P using αbb. 25 They then relaced the inner rogram with its KKT otimality conditions and solved the resulting finite nonlinear rogram with comlementarity constraints. 24 By doing so, the resulting rogram is a restriction of the original elicit SIP, and therefore, uon solution, it generates SIPfeasible oints. 24 This idea was concurrently discussed by Mitsos et al., 26 where they also considered a technique closely related to the inclusion-constrained reformulation 8,21 but instead used interval analysis to further construct Mc- Cormick-based concave relaations 22 of g on P to restrict the inner rogram and generate SIP-feasible oints finitely. More recently, Mitsos 27 develoed an algorithm based on the ideas of Blankenshi and Falk 17 that relies on a new restriction technique for the uer-bounding rocedure that requires the right-hand side of the semi-infinite constraint to be erturbed from zero. This formulation results in solving at least three NLP subroblems to global otimality at each iteration, in the general case, and the comutational results reorted 27 are quite romising. The key contribution is the novel uer-bounding rocedure that is guaranteed to generate SIP-feasible oints after finitely many iterations. It is stated elicitly that the algorithm only requires continuity of f and g and the eistence of a Slater oint arbitrarily close to a SIP minimizer, rovided the functions can be handled by the NLP solver. 27 Therefore, this algorithm could be alied to solve the SIP in eq 5 while handling the equality constraints directly, without requiring the introduction of the imlicit function, by formulating each nonconve subroblem as an equality-constrained global otimization roblem. However, this strategy is not advisable since the algorithm would then require the number of variables in the uer- and lower-bounding subroblems to increase with each iteration. Thus, these subroblems become increasingly more eensive to solve with each iteration. However, this algorithm is a romising candidate for the global solution of SIPs with imlicit functions embedded; the focus of this aer. With the ecetion of Stuber and Barton, 7 all of the aforementioned methods were develoed to solve elicit SIPs (or elicit min ma rograms). For clarity, it is worth mentioning that all of the reviously develoed methods that are guaranteed to generate a rigorous SIP-feasible oint in finitely many iterations rely on the eistence of a Slater oint or sequence of Slater oints arbitrarily close to an SIP minimizer. If one were to simly reformulate eq 1 as an SIP and handle the equality constraints, h, directly as a series of inequality constraints, as is commonly done in global otimization, the Slater oint assumtion would be violated. In other words, the rigorous methods are simly not alicable to rograms of the form of eq 1. The major comlication with formulating the bilevel rogram in eq 1 as the SIP in eq 5, is that an imlicit function y, which may not have a closed algebraic form, becomes embedded within the semi-infinite constraint g. Therefore, y (and g) cannot be evaluated directly but instead must be aroimated using a numerical method, such as Newton s method or some other fied-oint iteration. In order to modify reviously develoed methods that rely on relaations of the inner rogram, it must be ossible to construct relaations of g(,y(,),) onx, P. However, in order to rela g(,y(,),) onx, P, conve and concave relaations of the imlicit function y(,) on X must be calculable. As reviously mentioned, this has been achieved for roblems in which the imlicit function y could be aroimated using the successive-substitution fied-oint iteration. 7 The theoretical details of these relaations were resented by Scott et al. 28 This work will imrove on the revious results of Stuber and Barton 7 and consider solving SIPs with more general imlicit functions embedded that can be aroimated using any available method, such as Newton s method, instead of being restricted to the successivesubstitution case. This work will make use of a modified version of the algorithm develoed by Mitsos, 27 where the solution of each of the (imlicit) subroblems will be erformed using the novel relaation techniques and global otimization algorithm develoed in a recently ublished article. 29 In that article, 29 theoretical develoments were made to construct conve and concave relaations of more general imlicit functions. The construction of these relaations are analogous in many ways to how interval bounds can be calculated for imlicit functions using (arametric) interval Newton-tye methods. By alying (arametric) interval Newton-tye methods 1,7,30,31 to a function h, under certain conditions, an interval can be calculated that bounds a unique root, y, ofh over the set X P. Taking these bounds as initial relaations of y, they can be iteratively refined using the methods develoed by Stuber et al. 29 to roduce conve and concave relaations of y on X P. As a result, global otimization of imlicit functions was develoed. 29 It should be noted that although global otimization of imlicit functions will be relied uon in this aer, the intricate theoretical details of constructing relaations of imlicit functions and the workings of the B&B algorithm will not be necessary as these develoments will be called uon simly as art of the eternal otimization subroutines. In the net section, the global otimization algorithm for SIPs with imlicit functions embedded is discussed. The alication to min ma and ma min roblems is made elicit, immediately following the statement of the algorithm. Finally, three numerical eamles are given that illustrate the solution of imlicit SIPs to global otimality. GLOBAL SOLUTION OF SIPS WITH IMPLICIT FUNCTIONS EMBEDDED The global otimization algorithm for imlicit SIPs is based entirely on the cutting-lane algorithm resented by Mitsos, 27 which itself is based on the algorithm develoed by Blankenshi and Falk 17 but with a novel uer-bounding rocedure. The algorithm, as alied to elicit SIPs is guaranteed to roduce SIP-feasible oints after finitely many iterations under the assumtion that there eists a Slater oint arbitrarily close to a minimizer. 27 As reviously mentioned, the algorithm relies on the ability to solve three nonconve NLP subroblems to global otimality at each iteration. The three 309
4 subroblems are discussed below secialized to the case of imlicit SIPs. Lower-Bounding Problem. The lower-bounding rocedure comes from a simle relaation technique based on the adative discretization rocedure originally described by Blankenshi and Falk. 17 The SIP is reduced to an imlicit NLP, again by considering only a finite number of constraints corresonding to realizations of P LBD with P LBD P a finite set. The lower-bounding roblem is formulated as f LBD = min f( ) s.t. g(, y(, ), ) 0, P X = { : } LBD In order to guarantee f LBD f*, the lower-bounding roblem must be solved to global otimality. Inner Program. The inner rogram, stated elicitly in eqs 3 and 4, which is equivalent to the semi-infinite constraint, defines the SIP feasible region. Thus, given a candidate X, feasibility can be determined by solving the inner (in general nonconve) rogram: g ( ) = ma g(, y(, ), ) P (7) The oint is feasible in the original SIP given in eq 5 if g ( ) 0. Therefore, in order to determine feasibility of a candidate, the inner rogram (eq 7) must be solved to global otimality for the general case. Uer-Bounding Problem. The uer-bounding roblem comes from erturbing the right-hand side of the semi-infinite constraint away from zero by a arameter ϵ g > 0, referred to as the restriction arameter, 27 and reducing the SIP to an imlicit NLP by only considering a finite number of constraints corresonding to realizations of P UBD, where P UBD P is a finite set. The uer-bounding roblem is formulated as f UBD = min f( ) s.t. g(, y(, ), ) ϵ, P X = { : } g UBD As mentioned by Mitsos, 27 the uer-bounding roblem (eq 8) must be solved to global otimality in order for the algorithm to solve the original SIP (eq 5) to global otimality. However, a valid uer bound, f UBD f*, can be obtained by solving eq 8 locally for and verifying that it is feasible in the original SIP (eq 5). Algorithm. In this section, the algorithm used for solving globally SIPs with imlicit functions embedded to guaranteed ϵ-otimality is given. Again, as resented, this algorithm is an adatation of the algorithm given by Mitsos 27 to SIPs with imlicit functions embedded. Finite convergence of the algorithm for elicit SIPs was reviously roven. 27 The results roven by Mitsos 27 etend directly to the imlicit SIP algorithm rovided that finite convergence of each imlicit NLP subroblem can be guaranteed. The latter result was roven by Stuber et al. 29 The assumtions on which the SIP algorithm relies uon are stated elicitly in the following. Assumtion 1. (a) The functions f : D and g: D Dy D are factorable 28 and continuous on their domains. (6) (8) (b) Derivative information y h i, i = 1,...,n y is available and is factorable, say by automatic differentiation. 32,33 (c) There eists y:x P D y such that h(,y(,),) =0, (,) X P, and an interval Y D y is available such that y(x,p) Y and y(,) is unique for every (,) X P. (d) A matri Ψ n y n y is known such that A ΨJ y (X,Y,P) satisfies 0 A ii for all i, where J y is an inclusion monotonic interval etension of the Jacobian matri of h, J y,onx Y P. (e) There eists a oint S X with g( S,y( S,),)<0, P such that f( S ) f* < ϵ tol. Assumtion 1(a d) are essentially required by the eternal subroutines for constructing conve and concave relaations for global otimization of imlicit functions. 29 Assumtion 1(c) can be satisfied by alying arametric interval-newton methods 1,7,30,31 and their key theoretical results. For Assumtion 1(d), the matri Ψ is a reconditioning matri and has been the focus of many research articles. The alication to interval-newton methods is discussed by Kearfott, 34 among others. The interval-valued matri A can be calculated efficiently by taking natural interval etensions 1,35 and thus satisfying Assumtion 1(d). Assumtion 1(e) is the ϵ tol -otimal SIP-Slater oint condition, which guarantees that a sequence of feasible oints can be generated by the algorithm. Altogether, satisfying Assumtion 1 guarantees that the following SIP algorithm terminates in finitely many iterations with a certificate of otimality and a rigorous ϵ tol -otimal feasible oint. 27,29 The algorithm for semi-infinite otimization with imlicit functions embedded is resented in the following. Algorithm 1 (Global Otimization Algorithm for Imlicit SIPs) 1. (Initialization) (a) Set LBD =, UBD = +, ϵ tol >0,k := 0. (b) Set initial arameter sets P LBD = P LBD,0, P UBD = P UBD,0. (c) Set initial restriction arameter ϵ g,0 > 0 and r >1. 2. (Termination) Check UBD LBD ϵ tol. (a) If true, f* := UBD, terminate. (b) Else k := k (Lower-Bounding Problem) Solve the lower-bounding roblem (eq 6) to global otimality. (a) Set LBD := f LBD, set equal to the otimal solution found. 4. (Inner Program) Solve the inner rogram (eq 7) to global otimality. (a) If g(, y(, ), ) =g ( ) 0, set * :=, UBD := f( ), terminate algorithm. (b) Else, add to P LBD. 5. (Uer-Bounding Problem) Solve the uer-bounding roblem (8) to global otimality. (a) If feasible: i. Set equal to the otimal solution found and solve the inner rogram (eq 7) to global otimality. ii. If g ( ) <0: A. If f( ) UBD, set UBD := f( ), * :=. B. Set ϵ g,k+1 := ϵ g,k /r, goto2. iii. Else (g ( ) 0), add to P UBD,goto2. (b) Else (infeasible), set ϵ g,k+1 := ϵ g,k /r, goto2. 310
5 Industrial & Engineering Chemistry Research Figure 1. Flowchart for Algorithm 1. It should be noted that the subroblems can only be solved finitely to within some chosen tolerances. In order to guarantee that the SIP algorithm is rigorous, the convergence tolerances for the subroblems must be set such that they are lower than ϵ tol. In order to better visualize Algorithm 1, the flowchart is given in Figure 1. APPLICATION TO MAX MIN AND MIN MAX PROBLEMS Constrained min ma roblems of the form: min ma G(, y, ) X P, y Y s.t. h (, y, ) = 0 and constrained ma min roblems of the form: ma min G(, y, ) X P, y Y s.t. h (, y, ) = 0 (9) (10) can also be solved using Algorithm 1. The min ma case results in solving the imlicit rogram: G*= minma G(, y(, ), ) X P (11) which can be reformulated as an imlicit SIP by introducing a variable η H, with H a comact interval, and writing: min X, η s.t. η ma G(, y(, ), ). P (12) Using the relationshi given by eq 4, and setting g(,y(,),,η) = G(,y(,),) η, the following SIP can be written: min X, η s.t. g(, y(, ),, η) 0, P (13) which is equivalent to the imlicit SIP in eq 5. The imlicit SIP algorithm can be alied directly to this roblem without any modification by setting n := n + 1 and treating η as the n +1 comonent of. Here, an otimal solution value of η* 0 imlies that G* 0, and alternatively, η* > 0 imlies G* >0. The constrained ma min roblem reformulation is slightly different. This case results in solving G*= mamin G(, y(, ), ) X P (14) Again, the variable η H is introduced and eq 14 is written as ma X, η s.t. η min G(, y(, ), ) P which can be written as ma X, η s.t. η G(, y(, ), ), P or equivalently as min X, η s.t. g(, y(, ),, η) 0, P (15) (16) (17) by using the identity g(,y(,),,η) =η G(,y(,),). Now, the imlicit SIP algorithm can be alied without modification by again setting n :=n + 1 and treating η as the n +1 comonent of. Now, analogous to the min ma case, an otimal solution value of η* 0 imlies that G* 0 and η* > 0 imlies G* >0. 311
6 Figure 2. Objective function and imlicit semi-infinite constraint for Eamle 1. NUMERICAL EXAMPLES fluctuations in τ, K i is the vaor liquid equilibrium coefficient Eamle 1. Consider the following illustrative eamle with n for the i th chemical comonent, and z i is the mole-fraction of = n = n y =1: chemical comonent i in the feed. Solving h(τ,α,) = 0 for α defines the cut fraction as an imlicit function of temerature f( ) = ( 3.5) 5( 3.5) 2( 3.5) and ressure, α:t P Y. Any value α [0,1] is nonhysical so the interval Y = [0,1] was considered. For this system, the + 15( 3.5) vaor liquid equilibrium coefficient can be calculated as 3 5 h (, y, ) = y ( /6 + /120)/ y = 0 sat () τ i Ki( τ, ) = g (, y, ) = y+ cos( /90) 0, P X = [0.5, 8.0] for each chemical comonent i with P = [80, 120] sat Bi log ( τ) = A 10 i i C The objective function and imlicit semi-infinite constraint i + τ are shown in Figure 2. An interval Y = [68.8,149.9], guaranteed with τ in C and sat i in torr. The Antoine coefficients A i, B i, C i to contain a unique imlicit function y:p X Y was obtained are available in Table 1. using the arametric interval-newton method. 1,7 This illustrative eamle was chosen because the SIP feasible set and the Table 1. Antoine Coefficients for the Ternary Miture in objective function are obviously nonconve and the objective Eamle 2 36 function has a subotimal local minimum that is SIP-feasible. Eamle 2. Consider the robust design of an isothermal flash e. two antoine coefficients searator under uncertainty. We wish to verify robust oeration i A i B i C i tem. range ( C) of a roosed design in the face of the worst-case realization of 1: n-butane uncertainty. The flash searator is designed to searate a 2: n-entane ternary miture of n-butane, n-entane, and n-heane, with 3: n-heane molar fractions of 0.5, 0.4, and 0.1, resectively. The searator is designed to create a vaor roduct stream with no more than 0.05 mol-fraction of n-heane. To do so, it is designed to oerate at 85 C and a ressure no greater than 5100 torr (6.80 bar). It is eected that during oeration, the vessel temerature, error in the thermocoule reading, or both, may vary by as much as ±5 C. For this system, there are si For robust design roblems, one must consider the worstcase realization of uncertainty and eamine if there eists a control setting that allows the design to still meet the erformance and/or safety secification. This roblem can be formulated mathematically as a ma min roblem: unknowns: the comositions of the vaor and liquid streams. ma min G( τ, α( τ, ), ) Three secies balance equations and three hase-behavior τ T P equations can be written, resulting in a dimensionality n y =6. However, an alternative, and equivalent, model formulation T = [80, 90] with n y = 1 can be formulated by writing the stream P = [4400, 5100] comosition model equations in terms of the cut fraction α : h τ τ α = z i( K i(, ) 1) (,, ) ( K( τ, ) 1) α + 1 = 0 i i where τ will be the temerature (uncertain) variable, the cut fraction, α, isdefined as the fraction of the feed that leaves in the vaor stream (internal state variable), is the vessel ressure which can be controlled in order to mitigate which, if G(τ*,α(τ*,*),*) 0, the design is robustly feasible, or simly, for the worst-case realization of uncertainty, there eists a control setting such that the system meets secification. The lower bound on the control variable comes from a requirement that there are two hases resent in the searator at all times (i.e., any lower ressure will flash all of the liquid into the vaor hase). According to the revious discussion, this roblem can be reformulated as an imlicit SIP: 312
7 min τ T, η s.t. η G( τ, α( τ, ), ) 0, P with H =[ 1,1]. The erformance secification can be written as G τ τ α τ zk 3 3(, ) (, (, ), ) = ( K ( τ, ) 1) α( τ, ) which comes from material balances on the system. Figure 3 shows G lotted against τ. Figure 3. Design constraint function for Eamle 2. Eamle 3. Consider the otimal design of a continuousstirred tank reactor (CSTR) for the chlorination of benzene, shown in Figure 4. The reactions taking lace are k CH + Cl CHCl+ HCl k C H Cl + Cl C H Cl + HCl Figure 4. Continuous-stirred tank reactor for Eamle 3. where the rate constants k 1 and k 2 (h 1 ), as well as the feed flow rate F 1 (kmol/h), will be considered as uncertain arameters, =(k 1 k 2 F 1 ) T. The design variable will be the reactor volume (m 3 ), = v. The reaction kinetics can be considered to be firstorder with resect to benzene and chlorobenzene and the reactions are irreversible. 37 For simlicity, A will denote C 6 H 6, B will denote C 6 H 5 Cl, and C will denote C 6 H 4 Cl 2. Therefore, there are a total of four unknowns: the comosition (molefractions) of the roduct stream and the roduct stream flow rate in terms of A, B, and C, y = (y A y B y C F 2 ) T. In this formulation, n =1,n y = 4, and n = 3. Note that F 1 and F 2 are the flow rates (kmol/h) in terms of the chemical secies A, B, and C only. The model equations are then y y y r A, y y y + ( r r ) = B, h(, y, ) = 0 y y y + r C, y y y (18) with y i,1 as the mole-fraction of chemical secie i in the feed stream, and the reaction rates r 1 and r 2 are given by r = y /( yv + yv + yv ) A 2 B 3 C r = y /( yv + yv + yv ) A 2 B 3 C with V i as the molar volumes of chemical secie i: V A = m 3 /kmol, V B = m 3 /kmol, V C = m 3 /kmol. The feed was taken to be ure benzene. For this articular system, the design objective is to minimize the reactor volume while satisfying the erformance constraint that at least 22 kmol C 6 H 5 Cl/h is roduced: min X s.t. 22 y (, ) y (, ) 0, P 2 4 The uncertainty interval will be P = [0.38,0.42] [0.053,0.058] [60,70], the design interval will be X = [10,20]. From the arametric interval-newton method, 1,7 an interval Y = [0.15,0.85] [0.3,0.65] [0.0,0.12] [60,70] was calculated that encloses the imlicit function y:x P Y such that h(,y(,),) =0, (,) X P. EXPERIMENTAL CONDITIONS AND RESULTS Algorithm 1 was imlemented in C++. Each NLP subroblem was solved using the algorithm for global otimization of imlicit functions, 29 which was also imlemented in C++ and utilizes the library MC The algorithm for global otimization of imlicit functions relies on the ability to solve conve nonsmooth subroblems. This is because conve and concave relaations of imlicit functions 29 are in general nonsmooth. For this task, the nonsmooth bundle solvers PBUN and PBUNL 39 were utilized with default settings for the NLP lower-bounding roblems, and the objective function was evaluated at NLP feasible oints to obtain valid uer bounds on the NLP. Since the constrained bundle solver (PBUNL) can only handle affine constraints, affine relaations of the conve constraints with resect to reference oints must be calculated. In other words, once a nonconve rogram is conveified by constructing relaations of the nonconve objective function and nonconve constraints, the newly constructed conve constraints must be further relaed by constructing affine underestimating functions that PBUNL can handle. The hierarchy of information flow for global otimization of imlicit functions is shown in Figure 5. Two sets of eeriments were conducted. Case 1: A single reference oint taken as the midoint of X was used to construct affine relaations of constraints. Case 2: Three reference oints the lower bound, the midoint, and the uer bound of X were used to construct affine relaations of the constraints and used simultaneously. 313
8 Figure 5. Hierarchy of information flow for global otimization of imlicit functions. 29 The numerical eeriments were erformed using a PC with an Intel Core2 Quad 2.66 GHz CPU oerating Linu. For each eamle, absolute and relative convergence tolerances of 10 7 and 10 5, resectively, were used for the NLP subroblems unless otherwise noted. Eamle 1. For the SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, r = 2.0, and ϵ tol =10 4. For each set of eeriments, the imlicit SIP algorithm was alied and an aroimate global otimal solution with an objective function value of f* = at * = Convergence was observed in three iterations for each case and took s for Case 1 and s for Case 2. For this eamle, the algorithm terminates after the lower-bounding roblem furnishes a SIP-feasible oint (Ste 4a of the algorithm) and so the arameter r does not affect the erformance of the imlicit SIP algorithm. In an effort to elore the behavior of the algorithm, the NLP subroblem algorithm absolute and relative convergence tolerances were relaed to 10 6 and 10 4, resectively. Interestingly, for both cases, the SIP algorithm does not terminate with the lower-bounding roblem furnishing an SIPfeasible oint but instead terminates at Ste 2 of the algorithm. This suggests that sending more time solving the NLP subroblems to higher accuracy benefits the total algorithm runtime by heling to accelerate locating a global otimal SIPfeasible oint. The convergence results are lotted in Figure 6. Qualitatively, the algorithm erformed similarly to the elicit SIP algorithm by Mitsos 27 where the solution time and number of iterations raidly decreased with increasing reduction arameter. This behavior readily lateaued after a value of around r = 8. As eected, Case 2 ehibited higher comutational cost without reducing the overall solution time or number of iterations. Eamle 2. For the imlicit SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, r = 2.0, and ϵ tol =10 4. For both Case 1 and Case 2, the imlicit SIP algorithm was alied and an aroimate global otimal solution was obtained with η* = , τ* =90 C, * = 5100 torr. For both cases, the algorithm terminates in three iterations after the lower-bounding roblem furnishes an SIP-feasible oint. Thus, as reviously mentioned, the arameter r has no effect on the erformance of the algorithm. Relaing the NLP convergence tolerances did not have the same effect on the behavior of the algorithm as it did in Eamle 1. Case 1 converged just after s whereas Case 2 took s. This suggests that the choice of the reference oint for linearizing the constraints for the NLP subroblems was not very imortant and choosing more than one reference oint just increased the comutational comleity and, therefore, the solution time. Returning to the idea of robust design, since η* > 0, the flash searator design is not robust. However, as can be seen from Figure 3, if the design can be imroved such that the temerature (or thermocoule reading) may only vary by ±4 C, the design aears to be robust. This result was verified by the imlicit SIP algorithm converging after three iterations and s to an aroimate otimal solution with η* = Eamle 3. For the SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, and ϵ tol =10 4. For Case 2, the imlicit SIP algorithm was alied and an aroimate global otimal solution was obtained with f* = * = m 3, * = ( ) T. Therefore, in order to roduce at least 22 kmol/h of chlorobenzene, taking into account uncertainty in the inut flow rate and the reaction rate constants, the reactor volume must be m 3. The reader is reminded that, similar to Eamle 2, this eamle is looking to solve the roblem of robust design under uncertainty. However, there is a key difference in the formulation, between the two eamles. Eamle 2 is seeking a yes or no answer to whether or not Figure 6. Comutational effort in terms of the solution time (left) and the number of iterations (right) the algorithm takes to solve Eamle 1 versus the reduction arameter r. Note that the number of iterations is the same for both cases. 314
9 Figure 7. Comutational effort in terms of the number of solution time (left) and the number of iterations (right) the algorithm takes to solve Case 2 of Eamle 3 versus the reduction arameter r. the rocess is robust to the worst-case realization of uncertainty. Alternatively, this eamle is seeking to identify the actual size of the reactor such that the rocess will erform as desired in the face of the worst-case realization of uncertainty. Note that the worst-case realization of uncertainty is eactly what is to be eected; in order to have the least amount of chlorobenzene in the roduct stream, k 1 should be the smallest value it can take, k 2 should be the largest it can take, and the least amount of benzene should be fed to the reactor. For a value of r = 18, the algorithm converges in 7 iterations and s. The erformance of the algorithm for Case 2 can be found in Figure 7. Similar to Eamle 1, a small value for r resulted in the imlicit SIP algorithm taking many iterations to converge. As r was increased, the number of iterations required to converge, as well as the total solution time droed drastically and lateaued. A arameter value of r = 18 reduced the solution time and number of iterations by 94% over r = 1.1. Again, qualitatively, this behavior is similar to what Mitsos 27 demonstrated. In his elicit SIP eamles, the number of iterations was reduced from about 80 to between 5 and 20, deending on the eamle. For this eamle, Case 1 failed to converge within 200 iterations of the algorithm. This result is simly a consequence of using PBUNL which only accets affine constraints. In this case, since the affine constraints are being constructed with reference to the midoint of X, the solver aarently fails to ever return a oint that is feasible in the original SIP. CONCLUSION A method was resented for reformulating equality-constrained bilevel rograms as SIPs with embedded imlicit functions, requiring that (a) all functions involved are continuous and factorable, (b) derivative information on the equality constraint function is available and is factorable, (c) there eists at least one solution y to the system of equations in eq 2 for every (,) X P, and an interval Y can be found that bounds an isolated solution, (d) an aroriate matri for reconditioning the interval- Jacobian can be calculated such that their roduct has nonzero diagonal elements, and (e) there eists a Slater oint arbitrarily close to a SIP minimizer. To solve the resulting imlicit SIP, the global otimization algorithm develoed by Mitsos 27 has been adated. The algorithm relies on the ability to solve three nonconve imlicit NLP subroblems to global otimality. This is erformed utilizing the relaation methods and the deterministic algorithm for global otimization of imlicit functions which were develoed by Stuber et al. 29 The algorithm develoed by Stuber et al. 29 relies on the ability to solve nonsmooth lowerand/or uer-bounding roblems at each iteration. This can be done using any available nonsmooth otimization algorithm or using the calculated subgradient information to construct affine relaations and transform the roblem into a linear rogram and solved using any efficient LP otimization algorithm. For this aer, the nonsmooth bundle solvers PBUN and PBUNL 39 were utilized. Note that the requirements (b) and (c) are only due to current limitations of the algorithm for global otimization of imlicit functions. The requirements (d) and (e) imly that the SIP is feasible and (a) and (e) are required for guaranteed ϵ-otimal convergence of the original elicit SIP algorithm 27 after finitely many iterations. Altogether, these requirements guarantee ϵ-otimal convergence of Algorithm 1. As a roof-of-concet, three numerical eamles were resented that illustrate the global solution of imlicit SIPs using this algorithm. The first eamle illustrated the solution of a simle numerical system that fits the imlicit SIP form given in eq 5. This roblem is interesting because it is easy to visualize the nonconveity of the functions and identify the SIPfeasible subotimal local minimum. The second eamle was an engineering roblem of robust design under uncertainty, originally cast as a constrained ma-min roblem. It was then reformulated as an imlicit SIP of the form in eq 5 and solved using the imlicit SIP algorithm. Under the original design conditions and uncertainty interval, the design was not robustly feasible. After altering the design such that the uncertainty interval was reduced, the design was found to be robust. The third eamle was an engineering roblem of otimal design of a chemical reactor considering uncertainty in the kinetic arameters and feed rate which was formulated as an SIP. The eamles chosen offered varying levels of comleity as well as size which allowed various features and behavior of the imlicit SIP algorithm to be elored. Due to the limitations of the PBUNL solver, only affine constraints could be used. Since the imlicit semi-infinite constraint is almost surely nonlinear, affine relaations must be 315
10 constructed. For the numerical eamles, two sets of eeriments were conducted: one using a single reference oint for constructing affine relaations of the constraints and another using three reference oints for constructing affine relaations of the constraints and using them all simultaneously. The first method was hyothesized to be advantageous since it required less comutational effort to calculate the constraints. Alternatively, the second method was hyothesized to be advantageous since using multile reference oints results in better aroimations of the constraints, which in turn may seed u convergence of the overall algorithm. For Eeriments 1 and 2, it was observed that Case 2 offered no benefit over Case 1 and only added comutational comleity. However, for Eamle 3, Case 1 failed to converge after 200 iterations. This was likely due to the affine relaations of the semi-infinite constraint not being very tight, resulting in PBUNL failing to find a solution that is feasible in the original SIP. It was found that for this roblem, Case 2 and its multile reference oints for calculating affine relaations were clearly suerior with the algorithm converging after 7 iterations and s. Lastly, the generalization of eq 5 with the semi-infinite n constraint g to g g will be discussed. For this case, eq 5 would take the form f*= min f( ) s.t. g(, y(, ), ) 0, j = 1,..., n, P j X = { : } P = { : } g (19) The elicit case was discussed by Mitsos. 27 The inner rogram would of course need to be relaced with n g inner rograms: one for each j = 1,...,n g and instead of a single constraint inde set for the uer- and lower-bounding roblems there should be a set P UBD j and P LBD j for each j = 1,...,n g constraints, resectively. Furthermore, instead of a single restriction ϵ g,k, there should be one for each constraint, ϵ g,k j, j = 1,...,n g. As noted by Mitsos, 27 since the constraints can be sufficiently different from one another, having a single constraint inde set each for the lower-bounding roblem and the uer-bounding roblem would unnecessarily increase the roblem size and number of constraints of the subroblems. Investigation into other strategies is still an oen research objective. AUTHOR INFORMATION Corresonding Author * ib@mit.edu. Notes The authors declare no cometing financial interest. ACKNOWLEDGMENTS The authors give secial thanks to Prof. Aleander Mitsos, RWTH Aachen, for roviding information about the SIP algorithm on which this work was based. The authors acknowledge the Chevron University Partnershi Program for funding this work through the MIT Energy Initiative. REFERENCES (1) Neumaier, A. Interval Methods for Systems of Equations; Cambridge University Press: Cambridge, (2) Kwak, B. M.; Haug, J. E. J. Otimum design in the resence of arametric uncertainty. J. Otim. Theory Al. 1976, 19, (3) Malik, R. K.; Hughes, R. R. Otimal design of fleible chemical rocesses. Comut. Chem. Eng. 1979, 3, (4) Halemane, K. P.; Grossmann, I. E. Otimal rocess design under uncertainty. AIChE J. 1983, 29, (5) Swaney, R. E.; Grossmann, I. E. An inde for oerational fleibility in chemical rocess design. Part I: Formulation and theory. AIChE J. 1985, 31, (6) Swaney, R. E.; Grossmann, I. E. An inde for oerational fleibility in chemical rocess design. Part II: Comutational algorithms. AIChE J. 1985, 31, (7) Stuber, M. D.; Barton, P. I. Robust simulation and design using semi-infinite rograms with imlicit functions. Int. J. Reliability Safety 2011, 5, (8) Bhattacharjee, B.; Lemonidis, P.; Green, W. H., Jr.; Barton, P. I. Global solution of semi-infinite rograms. Math. Program 2005, 103, (9) Floudas, C. A.; Gumus, Z. H.; Ieraetritou, M. G. Global otimization in design under uncertainty: Feasibility test and fleibility inde roblems. Ind. Eng. Chem. Res. 2001, 40, (10) Ostrovsky, G. M.; Volin, Y. M.; Barit, E. I.; Senyavin, M. M. Fleibility analysis and otimization of chemical lants with uncertain arameters. Comut. Chem. Eng. 1994, 18, (11) Ostrovsky, G. M.; Volin, Y. M.; Golovashkin, D. V. Otimization roblem of comle system under uncertainty. Comut. Chem. Eng. 1998, 22, (12) Ostrovsky, G. M.; Achenie, L. E. K.; Wang, Y. A new algorithm for comuting rocess fleibility. Ind. Eng. Chem. Res. 2000, 39, (13) Mitsos, A.; Lemonidis, P.; Barton, P. I. Global Solution of bilevel rograms with a nonconve inner rogram. J. Global Otim. 2008, 42, (14) Hettich, R.; Kortanek, K. O. Semi-infinite rogramming: Theory, methods, and alications. SIAM Rev. 1993, 35, (15) Loez, M.; Still, G. Semi-infinite rogramming. Eur. J. Otim. Res. 2007, 180, (16) Semi-Infinite Programming; Reemtsen, R., Ru ckmann, J.-J., Eds.; Kluwer Academic Publishers: Boston, (17) Blankenshi, J. W.; Falk, J. E. Infinitely constrained otimization roblems. J. Otim. Theory Al. 1976, 19. (18) Falk, J. E.; Hoffman, K. A nonconve ma min roblem. Naval Res. Logistics Q. 1977, 24, (19) Reemtsen, R.; Go rner, S. In Semi-Infinite Programming (Nonconve Otimization and Its Alications); Reemtsen, R., Ru ckmann, J.-J., Eds.; Kluwer Academic Publishers: Boston, (20) Zuhe, S.; Neumaier, A.; Eiermann, M. C. Solving Minima Problems by Interval Methods. BIT Numerical Mathematics 1990, 30, (21) Bhattacharjee, B.; Green, W. H., Jr.; Barton, P. I. Interval methods for semi-infinite rograms. Comut. Otim. Al. 2005, 30, (22) McCormick, G. P. Comutability of global solutions to factorable nonconve rograms: Part I Conve underestimating roblems. Math. Program 1976, 10, (23) Stein, O.; Still, G. Solving semi-infinite otimization roblems with interior oint techniques. SIAM J. Control Otim. 2003, 42, (24) Floudas, C. A.; Stein, O. The adative conveification algorithm: A feasible oint method for semi-infinite rogramming. SIAM J. Otim. 2007, 18, (25) Adjiman, C. S.; Floudas, C. A. Rigorous conve underestimators for general twice-differentiable roblems. J. Global Otim. 1996, 9,
11 (26) Mitsos, A.; Lemonidis, P.; Lee, C. K.; Barton, P. I. Relaationbased bounds for semi-infinite rograms. SIAM J. Otim. 2008, 19, (27) Mitsos, A. Global otimization of semi-infinite rograms via restriction of the right-hand side. Otimization 2011, 60, (28) Scott, J. K.; Stuber, M. D.; Barton, P. I. Generalized McCormick relaations. J. Global Otim. 2011, 51, (29) Stuber, M. D.; Scott, J. K.; Barton, P. I. Conve and concave relaations of imlicit functions. Otim. Methods Software 2014, DOI: / (30) Hansen, E.; Walster, G. W. Global Otimization Using Interval Analysis, 2nd ed.; Marcel Dekker: New York, (31) Hansen, E. R.; Greenberg, R. I. Interval Newton methods. Al. Math.Comut. 1983, 12, (32) Bendtsen, C.; Stauning, O. FADBAD, a Fleible C++ Package for Automatic Differentiation; (33) Griewank, A.; Walther, A. Evaluating Derivatives: Princiles and Techniques of Algorithmic Differentiation, 2nd ed.; SIAM: Philadelhia, PA, (34) Kearfott, R. B. Preconditioners for the Interval Gauss Seidel Method. SIAM J. Numer. Anal. 1990, 27, (35) Moore, R. E. Methods and Alications of Interval Analysis; SIAM: Philadelhia, (36) Yaws, C. L.; Narasimhan, P. K.; Gabbula, C. Yaws Handbook of Antoine Coefficients for Vaor Pressure, 2nd electronic ed.; Knovel: New York, (37) Kokossis, A. C.; Floudas, C. A. Synthesis of isothermal reactor searator recycle systems. Chem. Eng. Sci. 1991, 46, (38) Chachuat, B. MC++: A Versatile Library for McCormick Relaations and Taylor Models. Available from htt://www3.imerial. ac.uk/eole/b.chachuat/research. (39) Luksan, L.; Vlcek, J. Algorithms for non-differentiable otimization. ACM Trans. Math. Software 2001, 27,
Convex Analysis and Economic Theory Winter 2018
Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is
More informationOptimal array pattern synthesis with desired magnitude response
Otimal array attern synthesis with desired magnitude resonse A.M. Pasqual a, J.R. Arruda a and P. erzog b a Universidade Estadual de Caminas, Rua Mendeleiev, 00, Cidade Universitária Zeferino Vaz, 13083-970
More information1 Entropy 1. 3 Extensivity 4. 5 Convexity 5
Contents CONEX FUNCIONS AND HERMODYNAMIC POENIALS 1 Entroy 1 2 Energy Reresentation 2 3 Etensivity 4 4 Fundamental Equations 4 5 Conveity 5 6 Legendre transforms 6 7 Reservoirs and Legendre transforms
More informationChapter 10. Supplemental Text Material
Chater 1. Sulemental Tet Material S1-1. The Covariance Matri of the Regression Coefficients In Section 1-3 of the tetbook, we show that the least squares estimator of β in the linear regression model y=
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationUniform Law on the Unit Sphere of a Banach Space
Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a
More information+++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic +++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic
Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic Daniel Leitner, Johannes Krof, Günther Zauner, TU Vienna, Austria, dleitner@osiris.tuwien.ac.at Yuri Karov, Yuri Senichenkov, Yuri
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationNonlinear programming
08-04- htt://staff.chemeng.lth.se/~berntn/courses/otimps.htm Otimization of Process Systems Nonlinear rogramming PhD course 08 Bernt Nilsson, Det of Chemical Engineering, Lund University Content Unconstraint
More informationControllability and Resiliency Analysis in Heat Exchanger Networks
609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationdn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential
Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system
More informationMODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS
MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A
More informationA Model for Randomly Correlated Deposition
A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationA Test Set of Semi-Infinite Programs
A Test Set of Semi-Infinite Programs Alexander Mitsos, revised by Hatim Djelassi Process Systems Engineering (AVT.SVT), RWTH Aachen University, Aachen, Germany February 26, 2016 (first published August
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationApplied Fitting Theory VI. Formulas for Kinematic Fitting
Alied Fitting heory VI Paul Avery CBX 98 37 June 9, 1998 Ar. 17, 1999 (rev.) I Introduction Formulas for Kinematic Fitting I intend for this note and the one following it to serve as mathematical references,
More informationNotes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationA Solution for the Dark Matter Mystery based on Euclidean Relativity
Long Beach 2010 PROCEEDINGS of the NPA 1 A Solution for the Dark Matter Mystery based on Euclidean Relativity Frédéric Lassiaille Arcades, Mougins 06250, FRANCE e-mail: lumimi2003@hotmail.com The study
More informationLecture 21: Quantum Communication
CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationHomework #11. (Due December 5 at the beginning of the class.) Numerical Method Series #6: Engineering applications of Newton-Raphson Method to
Homework #11 (Due December 5 at the beginning of the class.) Numerical Method Series #6: Engineering alications of Newton-Rahson Method to solving systems of nonlinear equations Goals: 1. Understanding
More informationUniform Sample Generations from Contractive Block Toeplitz Matrices
IEEE TRASACTIOS O AUTOMATIC COTROL, VOL 5, O 9, SEPTEMBER 6 559 Uniform Samle Generations from Contractive Bloc Toelitz Matrices Tong Zhou and Chao Feng Abstract This note deals with generating a series
More informationPositive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application
BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationEmpirical Bayesian EM-based Motion Segmentation
Emirical Bayesian EM-based Motion Segmentation Nuno Vasconcelos Andrew Liman MIT Media Laboratory 0 Ames St, E5-0M, Cambridge, MA 09 fnuno,lig@media.mit.edu Abstract A recent trend in motion-based segmentation
More informationAn efficient method for generalized linear multiplicative programming problem with multiplicative constraints
DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationPlanar Transformations and Displacements
Chater Planar Transformations and Dislacements Kinematics is concerned with the roerties of the motion of oints. These oints are on objects in the environment or on a robot maniulator. Two features that
More informationLINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL
LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationPart III. for energy minimization
ICCV 2007 tutorial Part III Message-assing algorithms for energy minimization Vladimir Kolmogorov University College London Message assing ( E ( (,, Iteratively ass messages between nodes... Message udate
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationChapter 1 Fundamentals
Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors
More information1 Convexity, Convex Relaxations, and Global Optimization
1 Conveity, Conve Relaations, and Global Optimization Algorithms 1 1.1 Minima Consider the nonlinear optimization problem in a Euclidean space: where the feasible region. min f(), R n Definition (global
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationSetting up the Mathematical Model Review of Heat & Material Balances
Setting u the Mathematical Model Review of Heat & Material Balances Toic Summary... Introduction... Conservation Equations... 3 Use of Intrinsic Variables... 4 Well-Mixed Systems... 4 Conservation of Total
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationStochastic Dominance and Prospect Dominance with Subjective Weighting Functions
Journal of Risk and Uncertainty, 16:2 147 163 (1998) 1998 Kluwer Academic Publishers Stochastic Dominance and Prosect Dominance with Subjective Weighting Functions HAIM LEVY School of Business, The Hebrew
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationOnline Learning for Sparse PCA in High Dimensions: Exact Dynamics and Phase Transitions
Online Learning for Sarse PCA in High Dimensions: Eact Dynamics and Phase Transitions Chuang Wang and Yue M. Lu John A. Paulson School of Engineering and Alied Sciences Harvard University Abstract We study
More informationASPECTS OF POLE PLACEMENT TECHNIQUE IN SYMMETRICAL OPTIMUM METHOD FOR PID CONTROLLER DESIGN
ASES OF OLE LAEMEN EHNIQUE IN SYMMERIAL OIMUM MEHOD FOR ID ONROLLER DESIGN Viorel Nicolau *, onstantin Miholca *, Dorel Aiordachioaie *, Emil eanga ** * Deartment of Electronics and elecommunications,
More informationA NEW GEOMETRIC ACCELERATION OF THE VON NEUMANN-HALPERIN PROJECTION METHOD
Electronic Transactions on Numerical Analysis. Volume 45,. 330 341, 2016. Coyright c 2016,. ISSN 1068 9613. ETNA A NEW GEOMETRIC ACCELERATION OF THE VON NEUMANN-HALPERIN PROJECTION METHOD WILLIAMS LÓPEZ
More informationUniformly best wavenumber approximations by spatial central difference operators: An initial investigation
Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations
More informationLogistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions
17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach
More informationNONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm
- (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationE-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula
e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics
More informationThe Fekete Szegő theorem with splitting conditions: Part I
ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationAn analytical approximation method for the stabilizing solution of the Hamilton-Jacobi equation based on stable manifold theory
Proceedings of the 27 American Control Conference Marriott Marquis Hotel at Times Square New York City, USA, July -3, 27 ThA8.4 An analytical aroimation method for the stabilizing solution of the Hamilton-Jacobi
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationCONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. III Stability Theory - Peter C. Müller
STABILITY THEORY Peter C. Müller University of Wuertal, Germany Keywords: Asymtotic stability, Eonential stability, Linearization, Linear systems, Lyaunov equation, Lyaunov function, Lyaunov stability,
More informationSynoptic Meteorology I: The Geostrophic Approximation. 30 September, 7 October 2014
The Equations of Motion Synotic Meteorology I: The Geostrohic Aroimation 30 Setember, 7 October 2014 In their most general form, and resented without formal derivation, the equations of motion alicable
More informationANALYTICAL MODEL FOR THE BYPASS VALVE IN A LOOP HEAT PIPE
ANALYTICAL MODEL FOR THE BYPASS ALE IN A LOOP HEAT PIPE Michel Seetjens & Camilo Rindt Laboratory for Energy Technology Mechanical Engineering Deartment Eindhoven University of Technology The Netherlands
More informationRobust Performance Design of PID Controllers with Inverse Multiplicative Uncertainty
American Control Conference on O'Farrell Street San Francisco CA USA June 9 - July Robust Performance Design of PID Controllers with Inverse Multilicative Uncertainty Tooran Emami John M Watkins Senior
More information3 More applications of derivatives
3 More alications of derivatives 3.1 Eact & ineact differentials in thermodynamics So far we have been discussing total or eact differentials ( ( u u du = d + dy, (1 but we could imagine a more general
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationSome results of convex programming complexity
2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that
More informationSolved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.
Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationSession 12 : Monopropellant Thrusters
Session 12 : Monoroellant Thrusters Electrothermal augmentation of chemical rockets was the first form of electric roulsion alied in sace vehicles. In its original imlementation, resistojets were used
More informationOn Erdős and Sárközy s sequences with Property P
Monatsh Math 017 18:565 575 DOI 10.1007/s00605-016-0995-9 On Erdős and Sárközy s sequences with Proerty P Christian Elsholtz 1 Stefan Planitzer 1 Received: 7 November 015 / Acceted: 7 October 016 / Published
More informationFUGACITY. It is simply a measure of molar Gibbs energy of a real gas.
FUGACITY It is simly a measure of molar Gibbs energy of a real gas. Modifying the simle equation for the chemical otential of an ideal gas by introducing the concet of a fugacity (f). The fugacity is an
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informationModelling and control of urban bus networks in dioids algebra
Modelling and control of urban bus networks in dioids algebra Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond To cite this version: Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond. Modelling
More informationA Closed-Form Solution to the Minimum V 2
Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month
More informationMODELING AND SIMULATION OF REFORMER AUTO- THERMAL REACTOR IN AMMONIA UNIT
Peet trool lleeuum & Cooaal ll IISSN 337-77 Available online at www.vuru.sk/c Petroleum & Coal 9 (), 6-7, 7 MODELING AND SIMULATION OF REFORMER AUTO- THERMAL REACTOR IN AMMONIA UNIT Kayvan Khorsand *,
More informationA Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs
A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured as Reservoirs F.E. onale, M.S. Thesis Defense 7 October 2003 Deartment of Petroleum Engineering Texas A&M University
More informationSTABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS
STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy
More informationChapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population
Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection
More informationSets of Real Numbers
Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact
More informationActual exergy intake to perform the same task
CHAPER : PRINCIPLES OF ENERGY CONSERVAION INRODUCION Energy conservation rinciles are based on thermodynamics If we look into the simle and most direct statement of the first law of thermodynamics, we
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationAn Introduction To Range Searching
An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationFault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls
CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls
More informationOn Using FASTEM2 for the Special Sensor Microwave Imager (SSM/I) March 15, Godelieve Deblonde Meteorological Service of Canada
On Using FASTEM2 for the Secial Sensor Microwave Imager (SSM/I) March 15, 2001 Godelieve Deblonde Meteorological Service of Canada 1 1. Introduction Fastem2 is a fast model (multile-linear regression model)
More informationHidden Predictors: A Factor Analysis Primer
Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationA New GP-evolved Formulation for the Relative Permittivity of Water and Steam
ew GP-evolved Formulation for the Relative Permittivity of Water and Steam S. V. Fogelson and W. D. Potter rtificial Intelligence Center he University of Georgia, US Contact Email ddress: sergeyf1@uga.edu
More informationUnsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)
Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter
More informationNumerical Methods: Structured vs. unstructured grids. General Introduction: Why numerical methods? Numerical methods and their fields of application
Numerical Methods: Structured vs. unstructured grids The goals o this course General : Why numerical methods? Numerical methods and their ields o alication Review o inite dierences Goals: Understanding
More information