Semi-Infinite Optimization with Implicit Functions

Size: px
Start display at page:

Download "Semi-Infinite Optimization with Implicit Functions"

Transcription

1 ubs.acs.org/iecr Semi-Infinite Otimization with Imlicit Functions Matthew D. Stuber and Paul I. Barton* Process Systems Engineering Laboratory, Det. of Chemical Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, United States ABSTRACT: In this work, equality-constrained bilevel otimization roblems, arising from engineering design, economics, and oerations research roblems, are reformulated as an equivalent semi-infinite rogram (SIP) with imlicit functions embedded, which are defined by the original equality constraints that model the system. Using recently develoed theoretical tools for bounding imlicit functions, a recently develoed algorithm for global otimization of imlicit functions, and a recently develoed algorithm for solving standard SIPs with elicit functions to global otimality, a method for solving SIPs with imlicit functions embedded is resented. The method is guaranteed to converge to ϵ-otimality in finitely many iterations given the eistence of a Slater oint arbitrarily close to a minimizer. Besides the Slater oint assumtion, it is assumed only that the functions are continuous and factorable and that the model equations are once continuously differentiable. INTRODUCTION Many engineering design feasibility and reliability roblems give rise to otimization rograms whose feasible sets are arametrized. This is because it is often of great interest to study erformance and/or safety of engineering systems under arametric uncertainty. Particularly, it is imortant to study the erformance and/or safety in the face of the worst case, giving rise to equality-constrained bilevel rograms of the following form: f*= min f( ) s.t.0 ma g(, y, ) y, s.t. h (, y, ) = 0 X = { : } P = { : } ny y D y It is assumed that the objective function f : D and the inequality constraint function g: D Dy D are continuous and are factorable in the sense that they are comosed from elementary arithmetic oerations and transcendental functions. The equality constraints of eq 1 are the system of equations reresenting a steady-state model of the system of interest: h (, y, ) = 0 (2) n with h: D Dy D y, also assumed factorable and continuously differentiable on its domain with n n D, D oen. Due to the comleity of the models to be considered in this roblem, the bilevel formulation eq 1 is intractable, or even imossible to solve. It is roosed in this work that, under some relatively mild assumtions, the equality constraints are used to eliminate y and eq 1 is reformulated as an equivalent semi-infinite rogram (1) (SIP) without equality constraints. If a y eists that satisfies eq 2 for each (,) X P D D, then it defines an imlicit function of (,), eressed as y(,). It must be assumed that there eists at least one imlicit function y:x P Y such that h(,y(,),) =0, (,) X P with Y D y. Conditions guaranteeing uniqueness of y Y are given by the semilocal imlicit function theorem. 1 Given the eistence of an imlicit function y (and its uniqueness in Y), the equality constraints can be eliminated and the rogram eq 1 can be eressed as min f ( ) s.t.0 ma g(, y(, ), ) X = { : } P = { : } Furthermore, the inner maimization rogram can be eressed as ma g(, y(, ), ) 0 g(, y(, ), ) 0, P P where the latter constraint is referred to as the (imlicit) semiinfinite constraint. The following SIP, equivalent to the original bilevel rogram in eq 1, can then be formulated: f*= min f( ) s.t. g(, y(, ), ) 0, P X = { : } P = { : } Received: July 21, 2014 Revised: Setember 26, 2014 Acceted: December 11, 2014 Published: December 11, 2014 (3) (4) (5) 2014 American Chemical Society 307

2 For a chemical engineering alication, y may reresent internal state variables, such as comosition, determined by an equation of state or some other hysics, the variables may reresent design variables such as chemical reactor dimensions or some ie lengths, and may reresent uncertain model arameters such as reaction rate constants. In this case, f may reresent some economic objective related to sizing and g may reresent a critical erformance and/or safety constraint. The global solution (if one eists) will corresond to the worst-case realization of uncertainty and address the question of otimal design under uncertainty. Alternatively, may reresent uncertainty in the system or environment and may reresent the controls. The function f may then reresent some metric of uncertainty and g may again reresent a erformance and/or safety constraint. In that case, the global solution (if one eists) will corresond to the worst-case realization of uncertainty for which there eists a control setting such that the system meets secification. This formulation addresses the question of feasibility of the design as well as the determination of the maimum allowable uncertainty realization such that the design remains feasible. In the net section, a background and literature review of semi-infinite rogramming is given. Then, the revious work on standard SIPs is etended to SIPs with imlicit functions embedded including the full statement of the algorithm for solving such SIPs. Following the resentation of the algorithm, three numerical eamles are resented and analyzed. BACKGROUND It has long been known that bilevel rograms and SIPs can be utilized to address roblems that are inherently uncertain. Kwak and Haug 2 addressed the question of otimal design under uncertainty using the bilevel formulation in eq 1 with first-order (affine) aroimations of f, g, and h. A stochastic version of the rogram in eq 1 was considered by Malik and Hughes 3 for otimal design of chemical rocesses under uncertainty. In Halemane and Grossmann, 4 the equality constraints were maniulated to give an elicit function of the control and uncertainty variables and a secial case of the SIP in eq 5, known as a ma min, min ma, or minima roblem. This aroach was elored further by Swaney and Grossmann 5 with alication to addressing the feasibility roblem. Two algorithms were resented by Swaney and Grossmann 6 for solving the roblem under certain conveity requirements. This formulation was further elored by Stuber and Barton, 7 with general nonconve g as in eq 5, in order to address the question of robust feasibility of engineering designs. A rigorous finite ϵ- convergent deterministic global otimization algorithm was resented that was based on the algorithm of Bhattacharjee et al. 8 The algorithm relies on the ability to solve the equality constraints aroimately for an imlicit function of the control and uncertainty variables using the successive-substitution fied-oint iteration 7 and so is limited to certain systems. Halemane and Grossmann 4 elained that the SIP formulation leads to an otimization roblem that is not necessarily differentiable. In order to maintain differentiability, a secial case of the bilevel formulation (eq 1), equivalent to that given by Halemane and Grossmann, 4 was further elored by Floudas et al. 9 The authors resented a rigorous deterministic algorithm, relying on twice-differentiability of h and g. 9 Ostrovsky and co-workers develoed algorithms for bounding solutions of the feasibility roblem as formulated by Halemane and Grossmann 4 and Swaney and Grossmann. 5 The algorithms rely on iteratively solving nonlinear rogramming roblems under similar certain conveity requirements. Therefore, the alicability is limited to such systems considered by Halemane and Grossmann 4 and Swaney and Grossmann. 5 Kwak and Haug 2 briefly discussed the relationshi between the min ma roblem formulation 3 7,9 and the bilevel formulation. In Mitsos et al., 13 the authors resented an algorithm to address the bilevel formulation with a nonconve inner rogram. However, their algorithm was limited in that it could only handle inequality constrained roblems and so cannot be alied to eq 1. This aer will focus on solving the general SIP in eq 5, without relying on aroimations of f, g, and h, such as in Kwak and Haug, 2 with alication to the min ma roblems that show u in economics and design feasibility roblems considered in the aforementioned articles, 3 7,9 only requiring continuity of f and g, once-differentiability of h, the eistence of a Slater oint arbitrarily close to a minimizer, and the eistence of a unique imlicit function y Y such that h(,y(,),) =0, (,) X P. Solving SIPs with elicit functions (e.g., without imlicit functions embedded as in eq 5), referred to as elicit SIPs herein, has been an active area of research for many years. An overview of the revious alication of elicit SIPs to realworld roblems with theoretical results and available methods can be found in revious works Contributions that have secific relevance to this work are summarized below. Blankenshi and Falk 17 resent a cutting-lane algorithm for aroimating solutions to elicit SIPs, which amounts to solving two nonlinear rograms (NLPs), to global otimality in the general case, at each iteration. Their algorithm generates a sequence of (not necessarily feasible) oints that converge to the solution of the SIP in the limit. 17 Under aroriate conveity assumtions, their algorithm converges finitely 17 to a feasible solution. Their method is alicable to SIPs in general and they make secific mention of the alication to the ma min roblem. The ma min roblem is further elored by Falk and Hoffman 18 for general nonconve functions. The cutting-lane algorithm relies on the techniques of discretization and what is called local reduction, which is a technique for theoretically describing (locally) the SIP feasible region with finitely many constraints. 19 Most SIP algorithms emloy these techniques in various ways. 16 Zuhe et al. 20 resented a method based on interval analysis for solving elicit min ma roblems, again, which are secial instances of elicit SIPs. Their method is alicable to minma roblems with twice continuously differentiable elicit functions. Interval analysis was used to dynamically eclude regions of the search sace guaranteed not to contain solutions. 20 It was suggested that, using the roerties of interval analysis and generalized bisection, their method converges in finitely many iterations. 20 Bhattacharjee et al. 21 alied interval analysis to the general case of elicit SIPs in order to construct what is called the inclusion-constrained reformulation, which is a valid restriction of the original elicit SIP. This idea was used further in the first algorithm for generating SIP-feasible oints finitely, that relies on the inclusion-constrained reformulation. 8 A lower-bounding rocedure that relies on McCormick s conve and concave relaations 22 and discretization was introduced. 8 Together with the inclusion-constrained reformulation and the branchand-bound (B&B) framework, Bhattacharjee et al. were able to solve SIPs to global otimality with guaranteed finite ϵ-otimal 308

3 convergence. 8 As reviously mentioned, this algorithm was emloyed by Stuber and Barton 7 to solve imlicit ma-min roblems cast as imlicit SIPs. Due to the overestimation of inclusion functions and the fact that the size of the uer- and lower-bounding roblems grow raidly with deth in the branch-and-bound tree, 8 this algorithm can be ineffective at solving imlicit SIPs modeling more comle rocesses. Stein and Still 23 solved elicit SIPs, with g conve, as a Stackelberg game using an interior-oint method. By conveity of g, they were able to eloit the first-order otimality conditions to characterize the solution set of the inner rogram and solve equivalent finite nonlinear rograms. 23 Floudas and Stein 24 used a similar idea and constructed concave relaations of g on P using αbb. 25 They then relaced the inner rogram with its KKT otimality conditions and solved the resulting finite nonlinear rogram with comlementarity constraints. 24 By doing so, the resulting rogram is a restriction of the original elicit SIP, and therefore, uon solution, it generates SIPfeasible oints. 24 This idea was concurrently discussed by Mitsos et al., 26 where they also considered a technique closely related to the inclusion-constrained reformulation 8,21 but instead used interval analysis to further construct Mc- Cormick-based concave relaations 22 of g on P to restrict the inner rogram and generate SIP-feasible oints finitely. More recently, Mitsos 27 develoed an algorithm based on the ideas of Blankenshi and Falk 17 that relies on a new restriction technique for the uer-bounding rocedure that requires the right-hand side of the semi-infinite constraint to be erturbed from zero. This formulation results in solving at least three NLP subroblems to global otimality at each iteration, in the general case, and the comutational results reorted 27 are quite romising. The key contribution is the novel uer-bounding rocedure that is guaranteed to generate SIP-feasible oints after finitely many iterations. It is stated elicitly that the algorithm only requires continuity of f and g and the eistence of a Slater oint arbitrarily close to a SIP minimizer, rovided the functions can be handled by the NLP solver. 27 Therefore, this algorithm could be alied to solve the SIP in eq 5 while handling the equality constraints directly, without requiring the introduction of the imlicit function, by formulating each nonconve subroblem as an equality-constrained global otimization roblem. However, this strategy is not advisable since the algorithm would then require the number of variables in the uer- and lower-bounding subroblems to increase with each iteration. Thus, these subroblems become increasingly more eensive to solve with each iteration. However, this algorithm is a romising candidate for the global solution of SIPs with imlicit functions embedded; the focus of this aer. With the ecetion of Stuber and Barton, 7 all of the aforementioned methods were develoed to solve elicit SIPs (or elicit min ma rograms). For clarity, it is worth mentioning that all of the reviously develoed methods that are guaranteed to generate a rigorous SIP-feasible oint in finitely many iterations rely on the eistence of a Slater oint or sequence of Slater oints arbitrarily close to an SIP minimizer. If one were to simly reformulate eq 1 as an SIP and handle the equality constraints, h, directly as a series of inequality constraints, as is commonly done in global otimization, the Slater oint assumtion would be violated. In other words, the rigorous methods are simly not alicable to rograms of the form of eq 1. The major comlication with formulating the bilevel rogram in eq 1 as the SIP in eq 5, is that an imlicit function y, which may not have a closed algebraic form, becomes embedded within the semi-infinite constraint g. Therefore, y (and g) cannot be evaluated directly but instead must be aroimated using a numerical method, such as Newton s method or some other fied-oint iteration. In order to modify reviously develoed methods that rely on relaations of the inner rogram, it must be ossible to construct relaations of g(,y(,),) onx, P. However, in order to rela g(,y(,),) onx, P, conve and concave relaations of the imlicit function y(,) on X must be calculable. As reviously mentioned, this has been achieved for roblems in which the imlicit function y could be aroimated using the successive-substitution fied-oint iteration. 7 The theoretical details of these relaations were resented by Scott et al. 28 This work will imrove on the revious results of Stuber and Barton 7 and consider solving SIPs with more general imlicit functions embedded that can be aroimated using any available method, such as Newton s method, instead of being restricted to the successivesubstitution case. This work will make use of a modified version of the algorithm develoed by Mitsos, 27 where the solution of each of the (imlicit) subroblems will be erformed using the novel relaation techniques and global otimization algorithm develoed in a recently ublished article. 29 In that article, 29 theoretical develoments were made to construct conve and concave relaations of more general imlicit functions. The construction of these relaations are analogous in many ways to how interval bounds can be calculated for imlicit functions using (arametric) interval Newton-tye methods. By alying (arametric) interval Newton-tye methods 1,7,30,31 to a function h, under certain conditions, an interval can be calculated that bounds a unique root, y, ofh over the set X P. Taking these bounds as initial relaations of y, they can be iteratively refined using the methods develoed by Stuber et al. 29 to roduce conve and concave relaations of y on X P. As a result, global otimization of imlicit functions was develoed. 29 It should be noted that although global otimization of imlicit functions will be relied uon in this aer, the intricate theoretical details of constructing relaations of imlicit functions and the workings of the B&B algorithm will not be necessary as these develoments will be called uon simly as art of the eternal otimization subroutines. In the net section, the global otimization algorithm for SIPs with imlicit functions embedded is discussed. The alication to min ma and ma min roblems is made elicit, immediately following the statement of the algorithm. Finally, three numerical eamles are given that illustrate the solution of imlicit SIPs to global otimality. GLOBAL SOLUTION OF SIPS WITH IMPLICIT FUNCTIONS EMBEDDED The global otimization algorithm for imlicit SIPs is based entirely on the cutting-lane algorithm resented by Mitsos, 27 which itself is based on the algorithm develoed by Blankenshi and Falk 17 but with a novel uer-bounding rocedure. The algorithm, as alied to elicit SIPs is guaranteed to roduce SIP-feasible oints after finitely many iterations under the assumtion that there eists a Slater oint arbitrarily close to a minimizer. 27 As reviously mentioned, the algorithm relies on the ability to solve three nonconve NLP subroblems to global otimality at each iteration. The three 309

4 subroblems are discussed below secialized to the case of imlicit SIPs. Lower-Bounding Problem. The lower-bounding rocedure comes from a simle relaation technique based on the adative discretization rocedure originally described by Blankenshi and Falk. 17 The SIP is reduced to an imlicit NLP, again by considering only a finite number of constraints corresonding to realizations of P LBD with P LBD P a finite set. The lower-bounding roblem is formulated as f LBD = min f( ) s.t. g(, y(, ), ) 0, P X = { : } LBD In order to guarantee f LBD f*, the lower-bounding roblem must be solved to global otimality. Inner Program. The inner rogram, stated elicitly in eqs 3 and 4, which is equivalent to the semi-infinite constraint, defines the SIP feasible region. Thus, given a candidate X, feasibility can be determined by solving the inner (in general nonconve) rogram: g ( ) = ma g(, y(, ), ) P (7) The oint is feasible in the original SIP given in eq 5 if g ( ) 0. Therefore, in order to determine feasibility of a candidate, the inner rogram (eq 7) must be solved to global otimality for the general case. Uer-Bounding Problem. The uer-bounding roblem comes from erturbing the right-hand side of the semi-infinite constraint away from zero by a arameter ϵ g > 0, referred to as the restriction arameter, 27 and reducing the SIP to an imlicit NLP by only considering a finite number of constraints corresonding to realizations of P UBD, where P UBD P is a finite set. The uer-bounding roblem is formulated as f UBD = min f( ) s.t. g(, y(, ), ) ϵ, P X = { : } g UBD As mentioned by Mitsos, 27 the uer-bounding roblem (eq 8) must be solved to global otimality in order for the algorithm to solve the original SIP (eq 5) to global otimality. However, a valid uer bound, f UBD f*, can be obtained by solving eq 8 locally for and verifying that it is feasible in the original SIP (eq 5). Algorithm. In this section, the algorithm used for solving globally SIPs with imlicit functions embedded to guaranteed ϵ-otimality is given. Again, as resented, this algorithm is an adatation of the algorithm given by Mitsos 27 to SIPs with imlicit functions embedded. Finite convergence of the algorithm for elicit SIPs was reviously roven. 27 The results roven by Mitsos 27 etend directly to the imlicit SIP algorithm rovided that finite convergence of each imlicit NLP subroblem can be guaranteed. The latter result was roven by Stuber et al. 29 The assumtions on which the SIP algorithm relies uon are stated elicitly in the following. Assumtion 1. (a) The functions f : D and g: D Dy D are factorable 28 and continuous on their domains. (6) (8) (b) Derivative information y h i, i = 1,...,n y is available and is factorable, say by automatic differentiation. 32,33 (c) There eists y:x P D y such that h(,y(,),) =0, (,) X P, and an interval Y D y is available such that y(x,p) Y and y(,) is unique for every (,) X P. (d) A matri Ψ n y n y is known such that A ΨJ y (X,Y,P) satisfies 0 A ii for all i, where J y is an inclusion monotonic interval etension of the Jacobian matri of h, J y,onx Y P. (e) There eists a oint S X with g( S,y( S,),)<0, P such that f( S ) f* < ϵ tol. Assumtion 1(a d) are essentially required by the eternal subroutines for constructing conve and concave relaations for global otimization of imlicit functions. 29 Assumtion 1(c) can be satisfied by alying arametric interval-newton methods 1,7,30,31 and their key theoretical results. For Assumtion 1(d), the matri Ψ is a reconditioning matri and has been the focus of many research articles. The alication to interval-newton methods is discussed by Kearfott, 34 among others. The interval-valued matri A can be calculated efficiently by taking natural interval etensions 1,35 and thus satisfying Assumtion 1(d). Assumtion 1(e) is the ϵ tol -otimal SIP-Slater oint condition, which guarantees that a sequence of feasible oints can be generated by the algorithm. Altogether, satisfying Assumtion 1 guarantees that the following SIP algorithm terminates in finitely many iterations with a certificate of otimality and a rigorous ϵ tol -otimal feasible oint. 27,29 The algorithm for semi-infinite otimization with imlicit functions embedded is resented in the following. Algorithm 1 (Global Otimization Algorithm for Imlicit SIPs) 1. (Initialization) (a) Set LBD =, UBD = +, ϵ tol >0,k := 0. (b) Set initial arameter sets P LBD = P LBD,0, P UBD = P UBD,0. (c) Set initial restriction arameter ϵ g,0 > 0 and r >1. 2. (Termination) Check UBD LBD ϵ tol. (a) If true, f* := UBD, terminate. (b) Else k := k (Lower-Bounding Problem) Solve the lower-bounding roblem (eq 6) to global otimality. (a) Set LBD := f LBD, set equal to the otimal solution found. 4. (Inner Program) Solve the inner rogram (eq 7) to global otimality. (a) If g(, y(, ), ) =g ( ) 0, set * :=, UBD := f( ), terminate algorithm. (b) Else, add to P LBD. 5. (Uer-Bounding Problem) Solve the uer-bounding roblem (8) to global otimality. (a) If feasible: i. Set equal to the otimal solution found and solve the inner rogram (eq 7) to global otimality. ii. If g ( ) <0: A. If f( ) UBD, set UBD := f( ), * :=. B. Set ϵ g,k+1 := ϵ g,k /r, goto2. iii. Else (g ( ) 0), add to P UBD,goto2. (b) Else (infeasible), set ϵ g,k+1 := ϵ g,k /r, goto2. 310

5 Industrial & Engineering Chemistry Research Figure 1. Flowchart for Algorithm 1. It should be noted that the subroblems can only be solved finitely to within some chosen tolerances. In order to guarantee that the SIP algorithm is rigorous, the convergence tolerances for the subroblems must be set such that they are lower than ϵ tol. In order to better visualize Algorithm 1, the flowchart is given in Figure 1. APPLICATION TO MAX MIN AND MIN MAX PROBLEMS Constrained min ma roblems of the form: min ma G(, y, ) X P, y Y s.t. h (, y, ) = 0 and constrained ma min roblems of the form: ma min G(, y, ) X P, y Y s.t. h (, y, ) = 0 (9) (10) can also be solved using Algorithm 1. The min ma case results in solving the imlicit rogram: G*= minma G(, y(, ), ) X P (11) which can be reformulated as an imlicit SIP by introducing a variable η H, with H a comact interval, and writing: min X, η s.t. η ma G(, y(, ), ). P (12) Using the relationshi given by eq 4, and setting g(,y(,),,η) = G(,y(,),) η, the following SIP can be written: min X, η s.t. g(, y(, ),, η) 0, P (13) which is equivalent to the imlicit SIP in eq 5. The imlicit SIP algorithm can be alied directly to this roblem without any modification by setting n := n + 1 and treating η as the n +1 comonent of. Here, an otimal solution value of η* 0 imlies that G* 0, and alternatively, η* > 0 imlies G* >0. The constrained ma min roblem reformulation is slightly different. This case results in solving G*= mamin G(, y(, ), ) X P (14) Again, the variable η H is introduced and eq 14 is written as ma X, η s.t. η min G(, y(, ), ) P which can be written as ma X, η s.t. η G(, y(, ), ), P or equivalently as min X, η s.t. g(, y(, ),, η) 0, P (15) (16) (17) by using the identity g(,y(,),,η) =η G(,y(,),). Now, the imlicit SIP algorithm can be alied without modification by again setting n :=n + 1 and treating η as the n +1 comonent of. Now, analogous to the min ma case, an otimal solution value of η* 0 imlies that G* 0 and η* > 0 imlies G* >0. 311

6 Figure 2. Objective function and imlicit semi-infinite constraint for Eamle 1. NUMERICAL EXAMPLES fluctuations in τ, K i is the vaor liquid equilibrium coefficient Eamle 1. Consider the following illustrative eamle with n for the i th chemical comonent, and z i is the mole-fraction of = n = n y =1: chemical comonent i in the feed. Solving h(τ,α,) = 0 for α defines the cut fraction as an imlicit function of temerature f( ) = ( 3.5) 5( 3.5) 2( 3.5) and ressure, α:t P Y. Any value α [0,1] is nonhysical so the interval Y = [0,1] was considered. For this system, the + 15( 3.5) vaor liquid equilibrium coefficient can be calculated as 3 5 h (, y, ) = y ( /6 + /120)/ y = 0 sat () τ i Ki( τ, ) = g (, y, ) = y+ cos( /90) 0, P X = [0.5, 8.0] for each chemical comonent i with P = [80, 120] sat Bi log ( τ) = A 10 i i C The objective function and imlicit semi-infinite constraint i + τ are shown in Figure 2. An interval Y = [68.8,149.9], guaranteed with τ in C and sat i in torr. The Antoine coefficients A i, B i, C i to contain a unique imlicit function y:p X Y was obtained are available in Table 1. using the arametric interval-newton method. 1,7 This illustrative eamle was chosen because the SIP feasible set and the Table 1. Antoine Coefficients for the Ternary Miture in objective function are obviously nonconve and the objective Eamle 2 36 function has a subotimal local minimum that is SIP-feasible. Eamle 2. Consider the robust design of an isothermal flash e. two antoine coefficients searator under uncertainty. We wish to verify robust oeration i A i B i C i tem. range ( C) of a roosed design in the face of the worst-case realization of 1: n-butane uncertainty. The flash searator is designed to searate a 2: n-entane ternary miture of n-butane, n-entane, and n-heane, with 3: n-heane molar fractions of 0.5, 0.4, and 0.1, resectively. The searator is designed to create a vaor roduct stream with no more than 0.05 mol-fraction of n-heane. To do so, it is designed to oerate at 85 C and a ressure no greater than 5100 torr (6.80 bar). It is eected that during oeration, the vessel temerature, error in the thermocoule reading, or both, may vary by as much as ±5 C. For this system, there are si For robust design roblems, one must consider the worstcase realization of uncertainty and eamine if there eists a control setting that allows the design to still meet the erformance and/or safety secification. This roblem can be formulated mathematically as a ma min roblem: unknowns: the comositions of the vaor and liquid streams. ma min G( τ, α( τ, ), ) Three secies balance equations and three hase-behavior τ T P equations can be written, resulting in a dimensionality n y =6. However, an alternative, and equivalent, model formulation T = [80, 90] with n y = 1 can be formulated by writing the stream P = [4400, 5100] comosition model equations in terms of the cut fraction α : h τ τ α = z i( K i(, ) 1) (,, ) ( K( τ, ) 1) α + 1 = 0 i i where τ will be the temerature (uncertain) variable, the cut fraction, α, isdefined as the fraction of the feed that leaves in the vaor stream (internal state variable), is the vessel ressure which can be controlled in order to mitigate which, if G(τ*,α(τ*,*),*) 0, the design is robustly feasible, or simly, for the worst-case realization of uncertainty, there eists a control setting such that the system meets secification. The lower bound on the control variable comes from a requirement that there are two hases resent in the searator at all times (i.e., any lower ressure will flash all of the liquid into the vaor hase). According to the revious discussion, this roblem can be reformulated as an imlicit SIP: 312

7 min τ T, η s.t. η G( τ, α( τ, ), ) 0, P with H =[ 1,1]. The erformance secification can be written as G τ τ α τ zk 3 3(, ) (, (, ), ) = ( K ( τ, ) 1) α( τ, ) which comes from material balances on the system. Figure 3 shows G lotted against τ. Figure 3. Design constraint function for Eamle 2. Eamle 3. Consider the otimal design of a continuousstirred tank reactor (CSTR) for the chlorination of benzene, shown in Figure 4. The reactions taking lace are k CH + Cl CHCl+ HCl k C H Cl + Cl C H Cl + HCl Figure 4. Continuous-stirred tank reactor for Eamle 3. where the rate constants k 1 and k 2 (h 1 ), as well as the feed flow rate F 1 (kmol/h), will be considered as uncertain arameters, =(k 1 k 2 F 1 ) T. The design variable will be the reactor volume (m 3 ), = v. The reaction kinetics can be considered to be firstorder with resect to benzene and chlorobenzene and the reactions are irreversible. 37 For simlicity, A will denote C 6 H 6, B will denote C 6 H 5 Cl, and C will denote C 6 H 4 Cl 2. Therefore, there are a total of four unknowns: the comosition (molefractions) of the roduct stream and the roduct stream flow rate in terms of A, B, and C, y = (y A y B y C F 2 ) T. In this formulation, n =1,n y = 4, and n = 3. Note that F 1 and F 2 are the flow rates (kmol/h) in terms of the chemical secies A, B, and C only. The model equations are then y y y r A, y y y + ( r r ) = B, h(, y, ) = 0 y y y + r C, y y y (18) with y i,1 as the mole-fraction of chemical secie i in the feed stream, and the reaction rates r 1 and r 2 are given by r = y /( yv + yv + yv ) A 2 B 3 C r = y /( yv + yv + yv ) A 2 B 3 C with V i as the molar volumes of chemical secie i: V A = m 3 /kmol, V B = m 3 /kmol, V C = m 3 /kmol. The feed was taken to be ure benzene. For this articular system, the design objective is to minimize the reactor volume while satisfying the erformance constraint that at least 22 kmol C 6 H 5 Cl/h is roduced: min X s.t. 22 y (, ) y (, ) 0, P 2 4 The uncertainty interval will be P = [0.38,0.42] [0.053,0.058] [60,70], the design interval will be X = [10,20]. From the arametric interval-newton method, 1,7 an interval Y = [0.15,0.85] [0.3,0.65] [0.0,0.12] [60,70] was calculated that encloses the imlicit function y:x P Y such that h(,y(,),) =0, (,) X P. EXPERIMENTAL CONDITIONS AND RESULTS Algorithm 1 was imlemented in C++. Each NLP subroblem was solved using the algorithm for global otimization of imlicit functions, 29 which was also imlemented in C++ and utilizes the library MC The algorithm for global otimization of imlicit functions relies on the ability to solve conve nonsmooth subroblems. This is because conve and concave relaations of imlicit functions 29 are in general nonsmooth. For this task, the nonsmooth bundle solvers PBUN and PBUNL 39 were utilized with default settings for the NLP lower-bounding roblems, and the objective function was evaluated at NLP feasible oints to obtain valid uer bounds on the NLP. Since the constrained bundle solver (PBUNL) can only handle affine constraints, affine relaations of the conve constraints with resect to reference oints must be calculated. In other words, once a nonconve rogram is conveified by constructing relaations of the nonconve objective function and nonconve constraints, the newly constructed conve constraints must be further relaed by constructing affine underestimating functions that PBUNL can handle. The hierarchy of information flow for global otimization of imlicit functions is shown in Figure 5. Two sets of eeriments were conducted. Case 1: A single reference oint taken as the midoint of X was used to construct affine relaations of constraints. Case 2: Three reference oints the lower bound, the midoint, and the uer bound of X were used to construct affine relaations of the constraints and used simultaneously. 313

8 Figure 5. Hierarchy of information flow for global otimization of imlicit functions. 29 The numerical eeriments were erformed using a PC with an Intel Core2 Quad 2.66 GHz CPU oerating Linu. For each eamle, absolute and relative convergence tolerances of 10 7 and 10 5, resectively, were used for the NLP subroblems unless otherwise noted. Eamle 1. For the SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, r = 2.0, and ϵ tol =10 4. For each set of eeriments, the imlicit SIP algorithm was alied and an aroimate global otimal solution with an objective function value of f* = at * = Convergence was observed in three iterations for each case and took s for Case 1 and s for Case 2. For this eamle, the algorithm terminates after the lower-bounding roblem furnishes a SIP-feasible oint (Ste 4a of the algorithm) and so the arameter r does not affect the erformance of the imlicit SIP algorithm. In an effort to elore the behavior of the algorithm, the NLP subroblem algorithm absolute and relative convergence tolerances were relaed to 10 6 and 10 4, resectively. Interestingly, for both cases, the SIP algorithm does not terminate with the lower-bounding roblem furnishing an SIPfeasible oint but instead terminates at Ste 2 of the algorithm. This suggests that sending more time solving the NLP subroblems to higher accuracy benefits the total algorithm runtime by heling to accelerate locating a global otimal SIPfeasible oint. The convergence results are lotted in Figure 6. Qualitatively, the algorithm erformed similarly to the elicit SIP algorithm by Mitsos 27 where the solution time and number of iterations raidly decreased with increasing reduction arameter. This behavior readily lateaued after a value of around r = 8. As eected, Case 2 ehibited higher comutational cost without reducing the overall solution time or number of iterations. Eamle 2. For the imlicit SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, r = 2.0, and ϵ tol =10 4. For both Case 1 and Case 2, the imlicit SIP algorithm was alied and an aroimate global otimal solution was obtained with η* = , τ* =90 C, * = 5100 torr. For both cases, the algorithm terminates in three iterations after the lower-bounding roblem furnishes an SIP-feasible oint. Thus, as reviously mentioned, the arameter r has no effect on the erformance of the algorithm. Relaing the NLP convergence tolerances did not have the same effect on the behavior of the algorithm as it did in Eamle 1. Case 1 converged just after s whereas Case 2 took s. This suggests that the choice of the reference oint for linearizing the constraints for the NLP subroblems was not very imortant and choosing more than one reference oint just increased the comutational comleity and, therefore, the solution time. Returning to the idea of robust design, since η* > 0, the flash searator design is not robust. However, as can be seen from Figure 3, if the design can be imroved such that the temerature (or thermocoule reading) may only vary by ±4 C, the design aears to be robust. This result was verified by the imlicit SIP algorithm converging after three iterations and s to an aroimate otimal solution with η* = Eamle 3. For the SIP algorithm, each constraint set was initialized as emty, ϵ g,0 = 0.9, and ϵ tol =10 4. For Case 2, the imlicit SIP algorithm was alied and an aroimate global otimal solution was obtained with f* = * = m 3, * = ( ) T. Therefore, in order to roduce at least 22 kmol/h of chlorobenzene, taking into account uncertainty in the inut flow rate and the reaction rate constants, the reactor volume must be m 3. The reader is reminded that, similar to Eamle 2, this eamle is looking to solve the roblem of robust design under uncertainty. However, there is a key difference in the formulation, between the two eamles. Eamle 2 is seeking a yes or no answer to whether or not Figure 6. Comutational effort in terms of the solution time (left) and the number of iterations (right) the algorithm takes to solve Eamle 1 versus the reduction arameter r. Note that the number of iterations is the same for both cases. 314

9 Figure 7. Comutational effort in terms of the number of solution time (left) and the number of iterations (right) the algorithm takes to solve Case 2 of Eamle 3 versus the reduction arameter r. the rocess is robust to the worst-case realization of uncertainty. Alternatively, this eamle is seeking to identify the actual size of the reactor such that the rocess will erform as desired in the face of the worst-case realization of uncertainty. Note that the worst-case realization of uncertainty is eactly what is to be eected; in order to have the least amount of chlorobenzene in the roduct stream, k 1 should be the smallest value it can take, k 2 should be the largest it can take, and the least amount of benzene should be fed to the reactor. For a value of r = 18, the algorithm converges in 7 iterations and s. The erformance of the algorithm for Case 2 can be found in Figure 7. Similar to Eamle 1, a small value for r resulted in the imlicit SIP algorithm taking many iterations to converge. As r was increased, the number of iterations required to converge, as well as the total solution time droed drastically and lateaued. A arameter value of r = 18 reduced the solution time and number of iterations by 94% over r = 1.1. Again, qualitatively, this behavior is similar to what Mitsos 27 demonstrated. In his elicit SIP eamles, the number of iterations was reduced from about 80 to between 5 and 20, deending on the eamle. For this eamle, Case 1 failed to converge within 200 iterations of the algorithm. This result is simly a consequence of using PBUNL which only accets affine constraints. In this case, since the affine constraints are being constructed with reference to the midoint of X, the solver aarently fails to ever return a oint that is feasible in the original SIP. CONCLUSION A method was resented for reformulating equality-constrained bilevel rograms as SIPs with embedded imlicit functions, requiring that (a) all functions involved are continuous and factorable, (b) derivative information on the equality constraint function is available and is factorable, (c) there eists at least one solution y to the system of equations in eq 2 for every (,) X P, and an interval Y can be found that bounds an isolated solution, (d) an aroriate matri for reconditioning the interval- Jacobian can be calculated such that their roduct has nonzero diagonal elements, and (e) there eists a Slater oint arbitrarily close to a SIP minimizer. To solve the resulting imlicit SIP, the global otimization algorithm develoed by Mitsos 27 has been adated. The algorithm relies on the ability to solve three nonconve imlicit NLP subroblems to global otimality. This is erformed utilizing the relaation methods and the deterministic algorithm for global otimization of imlicit functions which were develoed by Stuber et al. 29 The algorithm develoed by Stuber et al. 29 relies on the ability to solve nonsmooth lowerand/or uer-bounding roblems at each iteration. This can be done using any available nonsmooth otimization algorithm or using the calculated subgradient information to construct affine relaations and transform the roblem into a linear rogram and solved using any efficient LP otimization algorithm. For this aer, the nonsmooth bundle solvers PBUN and PBUNL 39 were utilized. Note that the requirements (b) and (c) are only due to current limitations of the algorithm for global otimization of imlicit functions. The requirements (d) and (e) imly that the SIP is feasible and (a) and (e) are required for guaranteed ϵ-otimal convergence of the original elicit SIP algorithm 27 after finitely many iterations. Altogether, these requirements guarantee ϵ-otimal convergence of Algorithm 1. As a roof-of-concet, three numerical eamles were resented that illustrate the global solution of imlicit SIPs using this algorithm. The first eamle illustrated the solution of a simle numerical system that fits the imlicit SIP form given in eq 5. This roblem is interesting because it is easy to visualize the nonconveity of the functions and identify the SIPfeasible subotimal local minimum. The second eamle was an engineering roblem of robust design under uncertainty, originally cast as a constrained ma-min roblem. It was then reformulated as an imlicit SIP of the form in eq 5 and solved using the imlicit SIP algorithm. Under the original design conditions and uncertainty interval, the design was not robustly feasible. After altering the design such that the uncertainty interval was reduced, the design was found to be robust. The third eamle was an engineering roblem of otimal design of a chemical reactor considering uncertainty in the kinetic arameters and feed rate which was formulated as an SIP. The eamles chosen offered varying levels of comleity as well as size which allowed various features and behavior of the imlicit SIP algorithm to be elored. Due to the limitations of the PBUNL solver, only affine constraints could be used. Since the imlicit semi-infinite constraint is almost surely nonlinear, affine relaations must be 315

10 constructed. For the numerical eamles, two sets of eeriments were conducted: one using a single reference oint for constructing affine relaations of the constraints and another using three reference oints for constructing affine relaations of the constraints and using them all simultaneously. The first method was hyothesized to be advantageous since it required less comutational effort to calculate the constraints. Alternatively, the second method was hyothesized to be advantageous since using multile reference oints results in better aroimations of the constraints, which in turn may seed u convergence of the overall algorithm. For Eeriments 1 and 2, it was observed that Case 2 offered no benefit over Case 1 and only added comutational comleity. However, for Eamle 3, Case 1 failed to converge after 200 iterations. This was likely due to the affine relaations of the semi-infinite constraint not being very tight, resulting in PBUNL failing to find a solution that is feasible in the original SIP. It was found that for this roblem, Case 2 and its multile reference oints for calculating affine relaations were clearly suerior with the algorithm converging after 7 iterations and s. Lastly, the generalization of eq 5 with the semi-infinite n constraint g to g g will be discussed. For this case, eq 5 would take the form f*= min f( ) s.t. g(, y(, ), ) 0, j = 1,..., n, P j X = { : } P = { : } g (19) The elicit case was discussed by Mitsos. 27 The inner rogram would of course need to be relaced with n g inner rograms: one for each j = 1,...,n g and instead of a single constraint inde set for the uer- and lower-bounding roblems there should be a set P UBD j and P LBD j for each j = 1,...,n g constraints, resectively. Furthermore, instead of a single restriction ϵ g,k, there should be one for each constraint, ϵ g,k j, j = 1,...,n g. As noted by Mitsos, 27 since the constraints can be sufficiently different from one another, having a single constraint inde set each for the lower-bounding roblem and the uer-bounding roblem would unnecessarily increase the roblem size and number of constraints of the subroblems. Investigation into other strategies is still an oen research objective. AUTHOR INFORMATION Corresonding Author * ib@mit.edu. Notes The authors declare no cometing financial interest. ACKNOWLEDGMENTS The authors give secial thanks to Prof. Aleander Mitsos, RWTH Aachen, for roviding information about the SIP algorithm on which this work was based. The authors acknowledge the Chevron University Partnershi Program for funding this work through the MIT Energy Initiative. REFERENCES (1) Neumaier, A. Interval Methods for Systems of Equations; Cambridge University Press: Cambridge, (2) Kwak, B. M.; Haug, J. E. J. Otimum design in the resence of arametric uncertainty. J. Otim. Theory Al. 1976, 19, (3) Malik, R. K.; Hughes, R. R. Otimal design of fleible chemical rocesses. Comut. Chem. Eng. 1979, 3, (4) Halemane, K. P.; Grossmann, I. E. Otimal rocess design under uncertainty. AIChE J. 1983, 29, (5) Swaney, R. E.; Grossmann, I. E. An inde for oerational fleibility in chemical rocess design. Part I: Formulation and theory. AIChE J. 1985, 31, (6) Swaney, R. E.; Grossmann, I. E. An inde for oerational fleibility in chemical rocess design. Part II: Comutational algorithms. AIChE J. 1985, 31, (7) Stuber, M. D.; Barton, P. I. Robust simulation and design using semi-infinite rograms with imlicit functions. Int. J. Reliability Safety 2011, 5, (8) Bhattacharjee, B.; Lemonidis, P.; Green, W. H., Jr.; Barton, P. I. Global solution of semi-infinite rograms. Math. Program 2005, 103, (9) Floudas, C. A.; Gumus, Z. H.; Ieraetritou, M. G. Global otimization in design under uncertainty: Feasibility test and fleibility inde roblems. Ind. Eng. Chem. Res. 2001, 40, (10) Ostrovsky, G. M.; Volin, Y. M.; Barit, E. I.; Senyavin, M. M. Fleibility analysis and otimization of chemical lants with uncertain arameters. Comut. Chem. Eng. 1994, 18, (11) Ostrovsky, G. M.; Volin, Y. M.; Golovashkin, D. V. Otimization roblem of comle system under uncertainty. Comut. Chem. Eng. 1998, 22, (12) Ostrovsky, G. M.; Achenie, L. E. K.; Wang, Y. A new algorithm for comuting rocess fleibility. Ind. Eng. Chem. Res. 2000, 39, (13) Mitsos, A.; Lemonidis, P.; Barton, P. I. Global Solution of bilevel rograms with a nonconve inner rogram. J. Global Otim. 2008, 42, (14) Hettich, R.; Kortanek, K. O. Semi-infinite rogramming: Theory, methods, and alications. SIAM Rev. 1993, 35, (15) Loez, M.; Still, G. Semi-infinite rogramming. Eur. J. Otim. Res. 2007, 180, (16) Semi-Infinite Programming; Reemtsen, R., Ru ckmann, J.-J., Eds.; Kluwer Academic Publishers: Boston, (17) Blankenshi, J. W.; Falk, J. E. Infinitely constrained otimization roblems. J. Otim. Theory Al. 1976, 19. (18) Falk, J. E.; Hoffman, K. A nonconve ma min roblem. Naval Res. Logistics Q. 1977, 24, (19) Reemtsen, R.; Go rner, S. In Semi-Infinite Programming (Nonconve Otimization and Its Alications); Reemtsen, R., Ru ckmann, J.-J., Eds.; Kluwer Academic Publishers: Boston, (20) Zuhe, S.; Neumaier, A.; Eiermann, M. C. Solving Minima Problems by Interval Methods. BIT Numerical Mathematics 1990, 30, (21) Bhattacharjee, B.; Green, W. H., Jr.; Barton, P. I. Interval methods for semi-infinite rograms. Comut. Otim. Al. 2005, 30, (22) McCormick, G. P. Comutability of global solutions to factorable nonconve rograms: Part I Conve underestimating roblems. Math. Program 1976, 10, (23) Stein, O.; Still, G. Solving semi-infinite otimization roblems with interior oint techniques. SIAM J. Control Otim. 2003, 42, (24) Floudas, C. A.; Stein, O. The adative conveification algorithm: A feasible oint method for semi-infinite rogramming. SIAM J. Otim. 2007, 18, (25) Adjiman, C. S.; Floudas, C. A. Rigorous conve underestimators for general twice-differentiable roblems. J. Global Otim. 1996, 9,

11 (26) Mitsos, A.; Lemonidis, P.; Lee, C. K.; Barton, P. I. Relaationbased bounds for semi-infinite rograms. SIAM J. Otim. 2008, 19, (27) Mitsos, A. Global otimization of semi-infinite rograms via restriction of the right-hand side. Otimization 2011, 60, (28) Scott, J. K.; Stuber, M. D.; Barton, P. I. Generalized McCormick relaations. J. Global Otim. 2011, 51, (29) Stuber, M. D.; Scott, J. K.; Barton, P. I. Conve and concave relaations of imlicit functions. Otim. Methods Software 2014, DOI: / (30) Hansen, E.; Walster, G. W. Global Otimization Using Interval Analysis, 2nd ed.; Marcel Dekker: New York, (31) Hansen, E. R.; Greenberg, R. I. Interval Newton methods. Al. Math.Comut. 1983, 12, (32) Bendtsen, C.; Stauning, O. FADBAD, a Fleible C++ Package for Automatic Differentiation; (33) Griewank, A.; Walther, A. Evaluating Derivatives: Princiles and Techniques of Algorithmic Differentiation, 2nd ed.; SIAM: Philadelhia, PA, (34) Kearfott, R. B. Preconditioners for the Interval Gauss Seidel Method. SIAM J. Numer. Anal. 1990, 27, (35) Moore, R. E. Methods and Alications of Interval Analysis; SIAM: Philadelhia, (36) Yaws, C. L.; Narasimhan, P. K.; Gabbula, C. Yaws Handbook of Antoine Coefficients for Vaor Pressure, 2nd electronic ed.; Knovel: New York, (37) Kokossis, A. C.; Floudas, C. A. Synthesis of isothermal reactor searator recycle systems. Chem. Eng. Sci. 1991, 46, (38) Chachuat, B. MC++: A Versatile Library for McCormick Relaations and Taylor Models. Available from htt://www3.imerial. ac.uk/eole/b.chachuat/research. (39) Luksan, L.; Vlcek, J. Algorithms for non-differentiable otimization. ACM Trans. Math. Software 2001, 27,

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

Optimal array pattern synthesis with desired magnitude response

Optimal array pattern synthesis with desired magnitude response Otimal array attern synthesis with desired magnitude resonse A.M. Pasqual a, J.R. Arruda a and P. erzog b a Universidade Estadual de Caminas, Rua Mendeleiev, 00, Cidade Universitária Zeferino Vaz, 13083-970

More information

1 Entropy 1. 3 Extensivity 4. 5 Convexity 5

1 Entropy 1. 3 Extensivity 4. 5 Convexity 5 Contents CONEX FUNCIONS AND HERMODYNAMIC POENIALS 1 Entroy 1 2 Energy Reresentation 2 3 Etensivity 4 4 Fundamental Equations 4 5 Conveity 5 6 Legendre transforms 6 7 Reservoirs and Legendre transforms

More information

Chapter 10. Supplemental Text Material

Chapter 10. Supplemental Text Material Chater 1. Sulemental Tet Material S1-1. The Covariance Matri of the Regression Coefficients In Section 1-3 of the tetbook, we show that the least squares estimator of β in the linear regression model y=

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

+++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic +++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic

+++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic +++ Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic Modeling of Structural-dynamic Systems by UML Statecharts in AnyLogic Daniel Leitner, Johannes Krof, Günther Zauner, TU Vienna, Austria, dleitner@osiris.tuwien.ac.at Yuri Karov, Yuri Senichenkov, Yuri

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Nonlinear programming

Nonlinear programming 08-04- htt://staff.chemeng.lth.se/~berntn/courses/otimps.htm Otimization of Process Systems Nonlinear rogramming PhD course 08 Bernt Nilsson, Det of Chemical Engineering, Lund University Content Unconstraint

More information

Controllability and Resiliency Analysis in Heat Exchanger Networks

Controllability and Resiliency Analysis in Heat Exchanger Networks 609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A

More information

A Model for Randomly Correlated Deposition

A Model for Randomly Correlated Deposition A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

A Test Set of Semi-Infinite Programs

A Test Set of Semi-Infinite Programs A Test Set of Semi-Infinite Programs Alexander Mitsos, revised by Hatim Djelassi Process Systems Engineering (AVT.SVT), RWTH Aachen University, Aachen, Germany February 26, 2016 (first published August

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Applied Fitting Theory VI. Formulas for Kinematic Fitting

Applied Fitting Theory VI. Formulas for Kinematic Fitting Alied Fitting heory VI Paul Avery CBX 98 37 June 9, 1998 Ar. 17, 1999 (rev.) I Introduction Formulas for Kinematic Fitting I intend for this note and the one following it to serve as mathematical references,

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

A Solution for the Dark Matter Mystery based on Euclidean Relativity

A Solution for the Dark Matter Mystery based on Euclidean Relativity Long Beach 2010 PROCEEDINGS of the NPA 1 A Solution for the Dark Matter Mystery based on Euclidean Relativity Frédéric Lassiaille Arcades, Mougins 06250, FRANCE e-mail: lumimi2003@hotmail.com The study

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Homework #11. (Due December 5 at the beginning of the class.) Numerical Method Series #6: Engineering applications of Newton-Raphson Method to

Homework #11. (Due December 5 at the beginning of the class.) Numerical Method Series #6: Engineering applications of Newton-Raphson Method to Homework #11 (Due December 5 at the beginning of the class.) Numerical Method Series #6: Engineering alications of Newton-Rahson Method to solving systems of nonlinear equations Goals: 1. Understanding

More information

Uniform Sample Generations from Contractive Block Toeplitz Matrices

Uniform Sample Generations from Contractive Block Toeplitz Matrices IEEE TRASACTIOS O AUTOMATIC COTROL, VOL 5, O 9, SEPTEMBER 6 559 Uniform Samle Generations from Contractive Bloc Toelitz Matrices Tong Zhou and Chao Feng Abstract This note deals with generating a series

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Empirical Bayesian EM-based Motion Segmentation

Empirical Bayesian EM-based Motion Segmentation Emirical Bayesian EM-based Motion Segmentation Nuno Vasconcelos Andrew Liman MIT Media Laboratory 0 Ames St, E5-0M, Cambridge, MA 09 fnuno,lig@media.mit.edu Abstract A recent trend in motion-based segmentation

More information

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Planar Transformations and Displacements

Planar Transformations and Displacements Chater Planar Transformations and Dislacements Kinematics is concerned with the roerties of the motion of oints. These oints are on objects in the environment or on a robot maniulator. Two features that

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Part III. for energy minimization

Part III. for energy minimization ICCV 2007 tutorial Part III Message-assing algorithms for energy minimization Vladimir Kolmogorov University College London Message assing ( E ( (,, Iteratively ass messages between nodes... Message udate

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

1 Convexity, Convex Relaxations, and Global Optimization

1 Convexity, Convex Relaxations, and Global Optimization 1 Conveity, Conve Relaations, and Global Optimization Algorithms 1 1.1 Minima Consider the nonlinear optimization problem in a Euclidean space: where the feasible region. min f(), R n Definition (global

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Setting up the Mathematical Model Review of Heat & Material Balances

Setting up the Mathematical Model Review of Heat & Material Balances Setting u the Mathematical Model Review of Heat & Material Balances Toic Summary... Introduction... Conservation Equations... 3 Use of Intrinsic Variables... 4 Well-Mixed Systems... 4 Conservation of Total

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Stochastic Dominance and Prospect Dominance with Subjective Weighting Functions

Stochastic Dominance and Prospect Dominance with Subjective Weighting Functions Journal of Risk and Uncertainty, 16:2 147 163 (1998) 1998 Kluwer Academic Publishers Stochastic Dominance and Prosect Dominance with Subjective Weighting Functions HAIM LEVY School of Business, The Hebrew

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Online Learning for Sparse PCA in High Dimensions: Exact Dynamics and Phase Transitions

Online Learning for Sparse PCA in High Dimensions: Exact Dynamics and Phase Transitions Online Learning for Sarse PCA in High Dimensions: Eact Dynamics and Phase Transitions Chuang Wang and Yue M. Lu John A. Paulson School of Engineering and Alied Sciences Harvard University Abstract We study

More information

ASPECTS OF POLE PLACEMENT TECHNIQUE IN SYMMETRICAL OPTIMUM METHOD FOR PID CONTROLLER DESIGN

ASPECTS OF POLE PLACEMENT TECHNIQUE IN SYMMETRICAL OPTIMUM METHOD FOR PID CONTROLLER DESIGN ASES OF OLE LAEMEN EHNIQUE IN SYMMERIAL OIMUM MEHOD FOR ID ONROLLER DESIGN Viorel Nicolau *, onstantin Miholca *, Dorel Aiordachioaie *, Emil eanga ** * Deartment of Electronics and elecommunications,

More information

A NEW GEOMETRIC ACCELERATION OF THE VON NEUMANN-HALPERIN PROJECTION METHOD

A NEW GEOMETRIC ACCELERATION OF THE VON NEUMANN-HALPERIN PROJECTION METHOD Electronic Transactions on Numerical Analysis. Volume 45,. 330 341, 2016. Coyright c 2016,. ISSN 1068 9613. ETNA A NEW GEOMETRIC ACCELERATION OF THE VON NEUMANN-HALPERIN PROJECTION METHOD WILLIAMS LÓPEZ

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions 17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach

More information

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm - (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

An analytical approximation method for the stabilizing solution of the Hamilton-Jacobi equation based on stable manifold theory

An analytical approximation method for the stabilizing solution of the Hamilton-Jacobi equation based on stable manifold theory Proceedings of the 27 American Control Conference Marriott Marquis Hotel at Times Square New York City, USA, July -3, 27 ThA8.4 An analytical aroimation method for the stabilizing solution of the Hamilton-Jacobi

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. III Stability Theory - Peter C. Müller

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. III Stability Theory - Peter C. Müller STABILITY THEORY Peter C. Müller University of Wuertal, Germany Keywords: Asymtotic stability, Eonential stability, Linearization, Linear systems, Lyaunov equation, Lyaunov function, Lyaunov stability,

More information

Synoptic Meteorology I: The Geostrophic Approximation. 30 September, 7 October 2014

Synoptic Meteorology I: The Geostrophic Approximation. 30 September, 7 October 2014 The Equations of Motion Synotic Meteorology I: The Geostrohic Aroimation 30 Setember, 7 October 2014 In their most general form, and resented without formal derivation, the equations of motion alicable

More information

ANALYTICAL MODEL FOR THE BYPASS VALVE IN A LOOP HEAT PIPE

ANALYTICAL MODEL FOR THE BYPASS VALVE IN A LOOP HEAT PIPE ANALYTICAL MODEL FOR THE BYPASS ALE IN A LOOP HEAT PIPE Michel Seetjens & Camilo Rindt Laboratory for Energy Technology Mechanical Engineering Deartment Eindhoven University of Technology The Netherlands

More information

Robust Performance Design of PID Controllers with Inverse Multiplicative Uncertainty

Robust Performance Design of PID Controllers with Inverse Multiplicative Uncertainty American Control Conference on O'Farrell Street San Francisco CA USA June 9 - July Robust Performance Design of PID Controllers with Inverse Multilicative Uncertainty Tooran Emami John M Watkins Senior

More information

3 More applications of derivatives

3 More applications of derivatives 3 More alications of derivatives 3.1 Eact & ineact differentials in thermodynamics So far we have been discussing total or eact differentials ( ( u u du = d + dy, (1 but we could imagine a more general

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Session 12 : Monopropellant Thrusters

Session 12 : Monopropellant Thrusters Session 12 : Monoroellant Thrusters Electrothermal augmentation of chemical rockets was the first form of electric roulsion alied in sace vehicles. In its original imlementation, resistojets were used

More information

On Erdős and Sárközy s sequences with Property P

On Erdős and Sárközy s sequences with Property P Monatsh Math 017 18:565 575 DOI 10.1007/s00605-016-0995-9 On Erdős and Sárközy s sequences with Proerty P Christian Elsholtz 1 Stefan Planitzer 1 Received: 7 November 015 / Acceted: 7 October 016 / Published

More information

FUGACITY. It is simply a measure of molar Gibbs energy of a real gas.

FUGACITY. It is simply a measure of molar Gibbs energy of a real gas. FUGACITY It is simly a measure of molar Gibbs energy of a real gas. Modifying the simle equation for the chemical otential of an ideal gas by introducing the concet of a fugacity (f). The fugacity is an

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Modelling and control of urban bus networks in dioids algebra

Modelling and control of urban bus networks in dioids algebra Modelling and control of urban bus networks in dioids algebra Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond To cite this version: Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond. Modelling

More information

A Closed-Form Solution to the Minimum V 2

A Closed-Form Solution to the Minimum V 2 Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month

More information

MODELING AND SIMULATION OF REFORMER AUTO- THERMAL REACTOR IN AMMONIA UNIT

MODELING AND SIMULATION OF REFORMER AUTO- THERMAL REACTOR IN AMMONIA UNIT Peet trool lleeuum & Cooaal ll IISSN 337-77 Available online at www.vuru.sk/c Petroleum & Coal 9 (), 6-7, 7 MODELING AND SIMULATION OF REFORMER AUTO- THERMAL REACTOR IN AMMONIA UNIT Kayvan Khorsand *,

More information

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured as Reservoirs F.E. onale, M.S. Thesis Defense 7 October 2003 Deartment of Petroleum Engineering Texas A&M University

More information

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy

More information

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

Actual exergy intake to perform the same task

Actual exergy intake to perform the same task CHAPER : PRINCIPLES OF ENERGY CONSERVAION INRODUCION Energy conservation rinciles are based on thermodynamics If we look into the simle and most direct statement of the first law of thermodynamics, we

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

An Introduction To Range Searching

An Introduction To Range Searching An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

On Using FASTEM2 for the Special Sensor Microwave Imager (SSM/I) March 15, Godelieve Deblonde Meteorological Service of Canada

On Using FASTEM2 for the Special Sensor Microwave Imager (SSM/I) March 15, Godelieve Deblonde Meteorological Service of Canada On Using FASTEM2 for the Secial Sensor Microwave Imager (SSM/I) March 15, 2001 Godelieve Deblonde Meteorological Service of Canada 1 1. Introduction Fastem2 is a fast model (multile-linear regression model)

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

A New GP-evolved Formulation for the Relative Permittivity of Water and Steam

A New GP-evolved Formulation for the Relative Permittivity of Water and Steam ew GP-evolved Formulation for the Relative Permittivity of Water and Steam S. V. Fogelson and W. D. Potter rtificial Intelligence Center he University of Georgia, US Contact Email ddress: sergeyf1@uga.edu

More information

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA) Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter

More information

Numerical Methods: Structured vs. unstructured grids. General Introduction: Why numerical methods? Numerical methods and their fields of application

Numerical Methods: Structured vs. unstructured grids. General Introduction: Why numerical methods? Numerical methods and their fields of application Numerical Methods: Structured vs. unstructured grids The goals o this course General : Why numerical methods? Numerical methods and their ields o alication Review o inite dierences Goals: Understanding

More information