202 research outputs found

    Implementation of novel methods of global and nonsmooth optimization : GANSO programming library

    Get PDF
    We discuss the implementation of a number of modern methods of global and nonsmooth continuous optimization, based on the ideas of Rubinov, in a programming library GANSO. GANSO implements the derivative-free bundle method, the extended cutting angle method, dynamical system-based optimization and their various combinations and heuristics. We outline the main ideas behind each method, and report on the interfacing with Matlab and Maple packages. <br /

    Predicting and controlling the dynamics of infectious diseases

    Get PDF
    This paper introduces a new optimal control model to describe and control the dynamics of infectious diseases. In the present model, the average time of isolation (i.e. hospitalization) of infectious population is the main time-dependent parameter that defines the spread of infection. All the preventive measures aim to decrease the average time of isolation under given constraints

    Dynamics of Ebola epidemics in West Africa 2014

    Get PDF
    This paper investigates the dynamics of Ebola virus transmission in West Africa during 2014. The reproduction numbers for the total period of epidemic and for different consequent time intervals are estimated based on a newly suggested linear model. It contains one major variable - the average time of infectiousness (time from onset to hospitalization) that is considered as a parameter for controlling the future dynamics of epidemics. Numerical implementations are carried out on data collected from three countries Guinea, Sierra Leone and Liberia as well as the total data collected worldwide. Predictions are provided by considering different scenarios involving the average times of infectiousness for the next few months and the end of the current epidemic is estimated according to each scenario

    The Origin of Doping in Quasi-Free Standing Graphene on Silicon Carbide

    Full text link
    We explain the robust p-type doping observed for quasi-free standing graphene on hexagonal silicon carbide by the spontaneous polarization of the substrate. This mechanism is based on a bulk property of SiC, unavoidable for any hexagonal polytype of the material and independent of any details of the interface formation. We show that sign and magnitude of the polarization are in perfect agreement with the doping level observed in the graphene layer. With this mechanism, models based on hypothetical acceptor-type defects as they are discussed so far are obsolete. The n-type doping of epitaxial graphene is explained conventionally by donor-like states associated with the buffer layer and its interface to the substrate which overcompensate the polarization doping.Comment: 10 pages, 1 figur

    Accepting a scholarly identity: Gifted students, academic crowd membership, and identification with school

    Get PDF
    This study examined identification with school among middle school students and its relationship with academic crowd membership, a public expression of one’s academic orientation. Of the 127 Grade 6 to 8 students in the sample, 55 reported participation in a gifted program; 44% of these gifted students did not claim affiliation with the academic crowd. There was a positive correlation between identification with school and the importance placed on membership for students in the academic crowd, both gifted and nongifted. The California Bully Victimization Scale was used to determine that no group was more likely to have been victimized. Cluster analysis of crowd memberships indicated that gifted students not in the academic crowd had few other crowd memberships, suggesting that middle school may be an important time to encourage a willingness to be viewed by peers as academically oriented through promoting identification with school

    Computed tomography data colouring based on photogrammetric images

    Get PDF
    Nowadays various methods and sensors are available for 3D reconstruction tasks; however, it is still necessary to integrate advantages of different technologies for optimizing the quality 3D models. Computed tomography (CT) is an imaging technique which takes a large number of radiographic measurements from different angles, in order to generate slices of the object, however, without colour information. The aim of this study is to put forward a framework to extract colour information from photogrammetric images for corresponding Computed Tomography (CT) surface data with high precision. The 3D models of the same object from CT and photogrammetry methods are generated respectively, and a transformation matrix is determined to align the extracted CT surface to the photogrammetric point cloud through a coarse-to-fine registration process. The estimated pose information of images to the photogrammetric point clouds, which can be obtained from the standard image alignment procedure, also applies to the aligned CT surface data. For each camera pose, a depth image of CT data is calculated by projecting all the CT points to the image plane. The depth image is in principle should agree with the corresponding photogrammetric image. The points, which cannot be seen from the pose, but are also projected on the depth image, are excluded from the colouring process. This is realized by comparing the range values of neighbouring pixels and finding the corresponding 3D points with larger range values. The same procedure is implemented for all the image poses to obtain the coloured CT surface. Thus, by using photogrammetric images, we achieve a coloured CT dataset with high precision, which combines the advantages from both methods. Rather than simply stitching different data, we deep-dive into the photogrammetric 3D reconstruction process and optimize the CT data with colour information. This process can also provide an initial route and more options for other data fusion processes

    Psychological heterogeneity among honors college students

    Get PDF
    Greater knowledge of the psychology of honors college students will help to inform program administrators, counselors, residence life assistants, and faculty about how they may provide support to those with the greatest need. Via an online survey, personality, perfectionism, and suicidal ideation data were collected from honors college students (N = 410, 73% female). Using latent profile analysis, students were classified by their responses to the Big Five Inventory personality measure into five profiles. Risk factors of high perfectionism and suicidal ideation scores were found in two of the profiles, suggesting students with these personality characteristics may need enhanced psychological support. The largest profile (35% of students) had extraversion scores above the norm, but all other profiles had introverted scores below the norm. Neuroticism scores were also higher than the norm in the introverted profiles, which represented a majority of the honors college students

    Coverage in WLAN: Optimization Model and Algorithm

    Get PDF
    When designing wireless communication systems, it is very important to know the optimum numbers of access points (APs) in order to provide a reliable design. In this paper we describe a mathematical model developed for finding the optimal number and location of APs. A new Global Optimization Algorithm (AGOP) is used to solve the problem. Results obtained demonstrate that the model and software are able to solve optimal coverage problems for design areas with different types of obstacles and number of users

    МодСль ΠΈ ΠΌΠ΅Ρ‚ΠΎΠ΄ опрСдСлСния ΠΎΠΏΡ‚ΠΈΠΌΠ°Π»ΡŒΠ½ΠΎΠΉ структуры систСмы обСспСчСния бСзопасности для критичСской ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ инфраструктуры

    Get PDF
    The article investigates the problem of information security of critical information infrastructures. The features of critical objects from the point of view of collecting, processing, storing and transmitting information are analysed. The set of functions performed by the information security system in critical infrastructures and the dependencies between these functions are studied. A model of the security system is proposed and the require ments for this model are defined. At the same time, the set of relations between objects and threats is represented in the form of an object-threat relationship graph, in which an edge connecting the j-th object with the i-th threat exists only when the i-th threat can directly affect the j-th object. To protect objects of critical information infrastructures from possible threats, a set of necessary methods and tools has been introduced into the model of the security system, which converts a two-sided graph into a three-sided one, such as β€œobject – method – threat”. Further in the article, the problem of determining the optimal structure of the security system for critical information infrastructure objects is considered. It is assumed here that each threat can affect several objects, and that any object can be affected by more than one threat. The solution of this problem makes it possible to minimize the material costs to implement the methods and tools for protection and minimize damage from a security breach. ИсслСдована ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности критичСских ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… инфраструктур. ΠŸΡ€ΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ особСнности критичСски Π²Π°ΠΆΠ½Ρ‹Ρ… ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² с Ρ‚ΠΎΡ‡ΠΊΠΈ зрСния сбора, ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ, хранСния ΠΈ ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ. Π˜Π·ΡƒΡ‡Π΅Π½Ρ‹ ΡΠΎΠ²ΠΎΠΊΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ, выполняСмых систСмой обСспСчСния бСзопасности ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π² критичСских инфраструктурах, ΠΈ зависимости ΠΌΠ΅ΠΆΠ΄Ρƒ этими функциями. ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π° модСль систСмы обСспСчСния бСзопасности ΠΈ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Ρ‹ трСбования, ΠΏΡ€Π΅Π΄ΡŠΡΠ²Π»ΡΠ΅ΠΌΡ‹Π΅ ΠΊ Π½Π΅ΠΉ. ΠœΠ½ΠΎΠΆΠ΅ΡΡ‚Π²ΠΎ ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΉ ΠΌΠ΅ΠΆΠ΄Ρƒ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π°ΠΌΠΈ ΠΈ ΡƒΠ³Ρ€ΠΎΠ·Π°ΠΌΠΈ прСдставлСно Π² Π²ΠΈΠ΄Π΅ Π³Ρ€Π°Ρ„Π° ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΉ Β«ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ – ΡƒΠ³Ρ€ΠΎΠ·Π°Β», Π² ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Ρ€Π΅Π±Ρ€ΠΎ, ΡΠ²ΡΠ·Ρ‹Π²Π°ΡŽΡ‰Π΅Π΅ j-ΠΉ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ с i-ΠΉ ΡƒΠ³Ρ€ΠΎΠ·ΠΎΠΉ, сущСствуСт Ρ‚ΠΎΠ»ΡŒΠΊΠΎ Ρ‚ΠΎΠ³Π΄Π°, ΠΊΠΎΠ³Π΄Π° i-я ΡƒΠ³Ρ€ΠΎΠ·Π° ΠΌΠΎΠΆΠ΅Ρ‚ Π²ΠΎΠ·Π΄Π΅ΠΉΡΡ‚Π²ΠΎΠ²Π°Ρ‚ΡŒ Π½Π°ΠΏΡ€ΡΠΌΡƒΡŽ Π½Π° j-ΠΉ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚. Для Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² критичСских ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… инфраструктур ΠΎΡ‚ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Ρ… ΡƒΠ³Ρ€ΠΎΠ· Π² модСль систСмы обСспСчСния бСзопасности Π²Π²Π΅Π΄Π΅Π½ΠΎ мноТСство Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹Ρ… ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² ΠΈ срСдств, ΠΏΡ€Π΅ΠΎΠ±Ρ€Π°Π·ΡƒΡŽΡ‰Π΅Π΅ Π΄Π²ΡƒΡ…Π΄ΠΎΠ»ΡŒΠ½Ρ‹ΠΉ Π³Ρ€Π°Ρ„ Π² Ρ‚Ρ€Π΅Ρ…Π΄ΠΎΠ»ΡŒΠ½Ρ‹ΠΉ, Ρ‚ΠΈΠΏΠ° Β«ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ – ΠΌΠ΅Ρ‚ΠΎΠ΄ – ΡƒΠ³Ρ€ΠΎΠ·Π°Β». РассмотрСна Π·Π°Π΄Π°Ρ‡Π° опрСдСлСния ΠΎΠΏΡ‚ΠΈΠΌΠ°Π»ΡŒΠ½ΠΎΠΉ структуры систСмы обСспСчСния бСзопасности ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² критичСской ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ инфраструктуры, Ρ€Π΅ΡˆΠ΅Π½ΠΈΠ΅ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ ΠΏΠΎΠ·Π²ΠΎΠ»ΠΈΡ‚ свСсти ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡƒΠΌΡƒ ΠΌΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»ΡŒΠ½Ρ‹Π΅ Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π½Π° Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΡŽ срСдств Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈ ΡƒΡ‰Π΅Ρ€Π± ΠΎΡ‚ Π½Π°Ρ€ΡƒΡˆΠ΅Π½ΠΈΡ бСзопасности.

    Detecting K-complexes for sleep stage identification using nonsmooth optimisation

    Get PDF
    The process of sleep stage identification is a labour-intensive task that involves the specialized interpretation of the polysomnographic signals captured from a patient&rsquo;s overnight sleep session. Automating this task has proven to be challenging for data mining algorithms because of noise, complexity and the extreme size of data. In this paper we apply nonsmooth optimization to extract key features that lead to better accuracy. We develop a specific procedure for identifying K-complexes, a special type of brain wave crucial for distinguishing sleep stages. The procedure contains two steps. We first extract &ldquo;easily classified&rdquo; K-complexes, and then apply nonsmooth optimization methods to extract features from the remaining data and refine the results from the first step. Numerical experiments show that this procedure is efficient for detecting K-complexes. It is also found that most classification methods perform significantly better on the extracted features
    • …
    corecore