期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Sequential Inverse Optimal Control of Discrete-Time Systems
1
作者 Sheng Cao Zhiwei Luo Changqin Quan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期608-621,共14页
This paper presents a novel sequential inverse optimal control(SIOC)method for discrete-time systems,which calculates the unknown weight vectors of the cost function in real time using the input and output of an optim... This paper presents a novel sequential inverse optimal control(SIOC)method for discrete-time systems,which calculates the unknown weight vectors of the cost function in real time using the input and output of an optimally controlled discrete-time system.The proposed method overcomes the limitations of previous approaches by eliminating the need for the invertible Jacobian assumption.It calculates the possible-solution spaces and their intersections sequentially until the dimension of the intersection space decreases to one.The remaining one-dimensional vector of the possible-solution space’s intersection represents the SIOC solution.The paper presents clear conditions for convergence and addresses the issue of noisy data by clarifying the conditions for the singular values of the matrices that relate to the possible-solution space.The effectiveness of the proposed method is demonstrated through simulation results. 展开更多
关键词 inverse optimal control promised calculation step sequential calculation
下载PDF
A Note on the Inverse Connected p-Median Problem on Block Graphs
2
作者 Chunsong Bai Liqi Zhang Jianjie Zhou 《Advances in Pure Mathematics》 2023年第4期181-186,共6页
Recently, the inverse connected p-median problem on block graphs G(V,E,w) under various cost functions, say rectilinear norm, Chebyshev norm, and bottleneck Hamming distance. Their contributions include finding a nece... Recently, the inverse connected p-median problem on block graphs G(V,E,w) under various cost functions, say rectilinear norm, Chebyshev norm, and bottleneck Hamming distance. Their contributions include finding a necessary and sufficient condition for the connected p-median problem on block graphs, developing algorithms and showing that these problems can be solved in O(n log n) time, where n is the number of vertices in the underlying block graph. Using similar technique, we show that some results are incorrect by a counter-example. Then we redefine some notations, reprove Theorem 1 and redescribe Theorem 2, Theorem 3 and Theorem 4. 展开更多
关键词 Location Theory Block Graphs inverse optimization Connected p-Median
下载PDF
Identification of Unknown Groundwater Pollution Sources and Determination of Optimal Well Locations Using ANN-GA Based Simulation-Optimization Model 被引量:1
3
作者 Sophia Leichombam Rajib Kumar Bhattacharjya 《Journal of Water Resource and Protection》 2016年第3期411-424,共14页
The linked simulation-optimization model can be used for solving a complex groundwater pollution source identification problem. Advanced simulators have been developed and successfully linked with numerous optimizatio... The linked simulation-optimization model can be used for solving a complex groundwater pollution source identification problem. Advanced simulators have been developed and successfully linked with numerous optimization algorithms for identification of groundwater pollution sources. However, the identification of pollution sources in a groundwater aquifer using linked simulation-optimization model has proven to be computationally expensive. To overcome this computational burden, an approximate simulator, the artificial neural network (ANN) model can be used as a surrogate model to replace the complex time-consuming numerical simulation model. However, for large-scale aquifer system, the performance of the ANN-based surrogate model is not satisfactory when a single ANN model is used to predict the concentration at different observation locations. In such a situation, the model efficiency can be enhanced by developing separate ANN model for each of the observation locations. The number of ANN models is equal to the number of observation wells in the aquifer. As a result, the complexity of the ANN-based simulation-optimization model will be related to the number of observation wells. Thus, this study used a modified formulation to find out the optimal numbers of observation wells which will eventually reduce the computational time of the model. The performance of the ANN-based simulation-optimization model is evaluated by identifying the groundwater pollutant sources of a hypothetical study area. The limited evaluation shows that the model has the potential for field application. 展开更多
关键词 Linked Simulation-optimization Groundwater Pollutant Source inverse optimization Artificial Neural Networks Genetic Algorithm
下载PDF
Seismic Vulnerability Assessment from Earthquake Damages Historical Data Using Constrained Optimization Technique
4
作者 Abed Benaichouche Caterina Negulescu +1 位作者 Olivier Sedan Zohra Boutaraa 《Journal of Geoscience and Environment Protection》 2018年第2期89-111,共23页
This present work falls within the context of efforts that have been made over the past many years, aimed in improving the seismic vulnerability modelling of structures when using historical data. The historical data ... This present work falls within the context of efforts that have been made over the past many years, aimed in improving the seismic vulnerability modelling of structures when using historical data. The historical data describe the intensity and the damages, but do not give information about the vulnerability, since only in the ’90 the concept of vulnerability classes was introduced through the EMS92 and EMS98 scales. Considering EMS98 definitions, RISK-UE project derived a method for physical damage estimation. It introduced an analytical equation as a function of an only one parameter (Vulnerability Index), which correlates the seismic input, in term of Macroseismic Intensity, with the physical damage. In this study, we propose a methodology that uses optimization algorithms allowing a combination of theoretical-based with expert opinion-based assessment data. The objective of this combination is to estimate the optimal Vulnerability Index that fits the historical data, and hence, to give the minimum error in a seismic risk scenario. We apply the proposed methodology to the El Asnam earthquake (1980), but this approach remains general and can be extrapolated to any other region, and more, it can be applied to predictive studies (before each earthquake scenarios). The mathematical formulation gives choice for regarding, to the optic of minimizing the error, either for the: 1) very little damaged building (D0-D2 degree) or 2) highly damaged building (D4-D5 degree). These two different kinds of optics are adapted for the people who make organizational decisions as for mitigation measures and urban planning in the first case and civil protection and urgent action after a seismic event in the second case. The insight is used in the framework of seismic scenarios and offers advancing of damage estimation for the area in which no recent data, or either no data regarding vulnerability, are available. 展开更多
关键词 Seismic Damage Scenario Damage Database Vulnerability Assessment inverse optimization Model Calibration El Asnam Earthquake RISK-UE
下载PDF
An improved multi-objective optimization algorithm for solving flexible job shop scheduling problem with variable batches 被引量:2
5
作者 WU Xiuli PENG Junjian +2 位作者 XIE Zirun ZHAO Ning WU Shaomin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第2期272-285,共14页
In order to solve the flexible job shop scheduling problem with variable batches,we propose an improved multiobjective optimization algorithm,which combines the idea of inverse scheduling.First,a flexible job shop pro... In order to solve the flexible job shop scheduling problem with variable batches,we propose an improved multiobjective optimization algorithm,which combines the idea of inverse scheduling.First,a flexible job shop problem with the variable batches scheduling model is formulated.Second,we propose a batch optimization algorithm with inverse scheduling in which the batch size is adjusted by the dynamic feedback batch adjusting method.Moreover,in order to increase the diversity of the population,two methods are developed.One is the threshold to control the neighborhood updating,and the other is the dynamic clustering algorithm to update the population.Finally,a group of experiments are carried out.The results show that the improved multi-objective optimization algorithm can ensure the diversity of Pareto solutions effectively,and has effective performance in solving the flexible job shop scheduling problem with variable batches. 展开更多
关键词 flexible job shop variable batch inverse scheduling multi-objective evolutionary algorithm based on decomposition a batch optimization algorithm with inverse scheduling
下载PDF
Stability in Probability and Inverse Optimal Control of Evolution Systems Driven by Levy Processes
6
作者 Khac Duc Do 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2020年第2期405-419,共15页
This paper first develops a Lyapunov-type theorem to study global well-posedness(existence and uniqueness of the strong variational solution)and asymptotic stability in probability of nonlinear stochastic evolution sy... This paper first develops a Lyapunov-type theorem to study global well-posedness(existence and uniqueness of the strong variational solution)and asymptotic stability in probability of nonlinear stochastic evolution systems(SESs)driven by a special class of Levy processes,which consist of Wiener and compensated Poisson processes.This theorem is then utilized to develop an approach to solve an inverse optimal stabilization problem for SESs driven by Levy processes.The inverse optimal control design achieves global well-posedness and global asymptotic stability of the closed-loop system,and minimizes a meaningful cost functional that penalizes both states and control.The approach does not require to solve a Hamilton-Jacobi-Bellman equation(HJBE).An optimal stabilization of the evolution of the frequency of a certain genetic character from the population is included to illustrate the theoretical developments. 展开更多
关键词 Evolution system inverse optimal control Levy processes stability in probability WELL-POSEDNESS
下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
7
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(DataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
On THE NUMERICAL INVERSION OF THE LAPLACE TRANSFORM BY THE USE OF AN OPTIMIZED LEGENDRE POLYNOMIALS
8
作者 Amin Boumenir Al-Shuaibi Abdulaziz 《Analysis in Theory and Applications》 2000年第4期17-32,共16页
A method for inverting the Laplace transform is presented, using a finite series of the classical Legendre polynomials. The method recovers a real valued function f(t) in a finite interval of the positive real axis wh... A method for inverting the Laplace transform is presented, using a finite series of the classical Legendre polynomials. The method recovers a real valued function f(t) in a finite interval of the positive real axis when f(t) belongs to a certain class βand requires the knowledge of its Laplace transform F(s) only at a finite number of discrete points on the real axis s>0. The choice of these points will be carefully considered so as to improve the approximation error as well as to minimize the number of steps needed in the evaluations. The method is tested on few examples, with particular emphasis on the estimation of the error bounds involved. 展开更多
关键词 On THE NUMERICAL INVERSION OF THE LAPLACE TRANSFORM BY THE USE OF AN OPTIMIZED LEGENDRE POLYNOMIALS
下载PDF
Optimal Algorithms for Integer Inverse Undesirable p-Median Location Problems on Weighted Extended Star Networks
9
作者 Esmaeil Afrashteh Behrooz Alizadeh Fahimeh Baroughi 《Journal of the Operations Research Society of China》 EI CSCD 2021年第1期99-117,共19页
This paper is concerned with the problem of modifying the edge lengths of a weighted extended star network with n vertices by integer amounts at the minimum total cost subject to be given modification bounds so that a... This paper is concerned with the problem of modifying the edge lengths of a weighted extended star network with n vertices by integer amounts at the minimum total cost subject to be given modification bounds so that a set of p prespecified vertices becomes an undesirable p-median location on the perturbed network.We call this problem as the integer inverse undesirable p-median location model.Exact combinatorial algorithms with O(p2n logn)and O(p2(n logn+n log nmax))running times are proposed for solving the problem under the weighted rectilinear and weighted Chebyshev norms,respectively.Furthermore,it is shown that the problem under the weighted sum-type Hamming distance with uniform modification bounds can be solved in O(p-n log n)time. 展开更多
关键词 Undesirable p-median location Combinatorial optimization inverse optimization Time complexity
原文传递
Discrete-time inverse linear quadratic optimal control over fnite time-horizon under noisy output measurements 被引量:1
10
作者 Han Zhang Yibei Li Xiaoming Hu 《Control Theory and Technology》 EI CSCD 2021年第4期563-572,共10页
In this paper,the problem of inverse quadratic optimal control over fnite time-horizon for discrete-time linear systems is considered.Our goal is to recover the corresponding quadratic objective function using noisy o... In this paper,the problem of inverse quadratic optimal control over fnite time-horizon for discrete-time linear systems is considered.Our goal is to recover the corresponding quadratic objective function using noisy observations.First,the identifability of the model structure for the inverse optimal control problem is analyzed under relative degree assumption and we show the model structure is strictly globally identifable.Next,we study the inverse optimal control problem whose initial state distribution and the observation noise distribution are unknown,yet the exact observations on the initial states are available.We formulate the problem as a risk minimization problem and approximate the problem using empirical average.It is further shown that the solution to the approximated problem is statistically consistent under the assumption of relative degrees.We then study the case where the exact observations on the initial states are not available,yet the observation noises are known to be white Gaussian distributed and the distribution of the initial state is also Gaussian(with unknown mean and covariance).EM-algorithm is used to estimate the parameters in the objective function.The efectiveness of our results are demonstrated by numerical examples. 展开更多
关键词 inverse optimal control Linear quadratic regulator Statistical consistency EM-ALGORITHM
原文传递
Inversion Optimization Strategy Based on Primitives with Complement Attributes
11
作者 Hui-Ming Tian Zhu-Fei Chu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第5期1145-1154,共10页
Inverters or logic primitives that have complement attributes are essential to building a logical complement system.NAND and NOR operations which have complement attributes are of high interest for complementary metal... Inverters or logic primitives that have complement attributes are essential to building a logical complement system.NAND and NOR operations which have complement attributes are of high interest for complementary metal-oxidesemiconductor(CMOS)technology,as they can be easily implemented in transistors.Different from the logic models used in standard CMOS,several nano-emerging technologies,such as quantum-dot cellular automata(QCA)and spin torque majority gates,are in favor of realizing a majority voter function but imposing difficulties in implementing inversions.Previous studies pay lots of effort in optimizing the number of inverters in logic representations,whereas the mapping using primitives with complement attributes is not a major concern.In this paper,we establish a technology mapping method from logic representations to nanotechnology primitives by considering NAND-NOR-Inverter(NNI)and exclusive-NOR(XNOR)operations.We adopt XOR-Majority Graph(XMG)as a logic representation.The proposed mapping method is evaluated using the QCA technology.Experimental results over EPFL benchmark suites show we achieve 11.77%and 30.13%reductions in the area and the number of inverters,respectively. 展开更多
关键词 inversion optimization quantum-dot cellular automata majority-of-three NAND-NOR-Inverter(NNI)
原文传递
Identifiability and Solvability in Inverse Linear Quadratic Optimal Control Problems
12
作者 LI Yibei WAHLBERG Bo HU Xiaoming 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2021年第5期1840-1857,共18页
In this paper, the inverse linear quadratic(LQ) problem over finite time-horizon is studied.Given the output observations of a dynamic process, the goal is to recover the corresponding LQ cost function. Firstly, by co... In this paper, the inverse linear quadratic(LQ) problem over finite time-horizon is studied.Given the output observations of a dynamic process, the goal is to recover the corresponding LQ cost function. Firstly, by considering the inverse problem as an identification problem, its model structure is shown to be strictly globally identifiable under the assumption of system invertibility. Next, in the noiseless case a necessary and sufficient condition is proposed for the solvability of a positive semidefinite weighting matrix and its unique solution is obtained with two proposed algorithms under the condition of persistent excitation. Furthermore, a residual optimization problem is also formulated to solve a best-fit approximate cost function from sub-optimal observations. Finally, numerical simulations are used to demonstrate the effectiveness of the proposed methods. 展开更多
关键词 inverse optimal control linear quadratic regulators model identifiability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部