1,488 research outputs found

    Submodularity of Energy Related Controllability Metrics

    Full text link
    The quantification of controllability and observability has recently received new interest in the context of large, complex networks of dynamical systems. A fundamental but computationally difficult problem is the placement or selection of actuators and sensors that optimize real-valued controllability and observability metrics of the network. We show that several classes of energy related metrics associated with the controllability Gramian in linear dynamical systems have a strong structural property, called submodularity. This property allows for an approximation guarantee by using a simple greedy heuristic for their maximization. The results are illustrated for randomly generated systems and for placement of power electronic actuators in a model of the European power grid.Comment: 7 pages, 2 figures; submitted to the 2014 IEEE Conference on Decision and Contro

    On Submodularity and Controllability in Complex Dynamical Networks

    Full text link
    Controllability and observability have long been recognized as fundamental structural properties of dynamical systems, but have recently seen renewed interest in the context of large, complex networks of dynamical systems. A basic problem is sensor and actuator placement: choose a subset from a finite set of possible placements to optimize some real-valued controllability and observability metrics of the network. Surprisingly little is known about the structure of such combinatorial optimization problems. In this paper, we show that several important classes of metrics based on the controllability and observability Gramians have a strong structural property that allows for either efficient global optimization or an approximation guarantee by using a simple greedy heuristic for their maximization. In particular, the mapping from possible placements to several scalar functions of the associated Gramian is either a modular or submodular set function. The results are illustrated on randomly generated systems and on a problem of power electronic actuator placement in a model of the European power grid.Comment: Original arXiv version of IEEE Transactions on Control of Network Systems paper (Volume 3, Issue 1), with a addendum (located in the ancillary documents) that explains an error in a proof of the original paper and provides a counterexample to the corresponding resul

    Preventive Strategies for Ovarian Cancer

    Get PDF

    What Will Italy Become Without Its Elders?

    Get PDF
    Our elders are dying one by one, oak trees struck down by an acceleration of greed and skepticism. The generation that was raised in the angst of World War II is gone. Coffins, too many to bury. Lined up at the Monumental Cemetery, in churches, in convoys in the streets around Borgo Palazzo—our elders, waiting to be turned back to ashes. The crematorium fire never ceases burning, smoldering 24 hours a day. Crackling, it consumes bones, lace collars, mustaches, and memories

    Twinning Automata and Regular Expressions for String Static Analysis

    Get PDF
    In this paper we formalize TARSIS, a new abstract domain based on the abstract interpretation theory that approximates string values through finite state automata. The main novelty of TARSIS is that it works over an alphabet of strings instead of single characters. On the one hand, such an approach requires a more complex and refined definition of the widening operator, and the abstract semantics of string operators. On the other hand, it is in position to obtain strictly more precise results than state-of-the-art approaches. We implemented a prototype of TARSIS, and we applied it to some case studies taken from some of the most popular Java libraries manipulating string values. The experimental results confirm that TARSIS is in position to obtain strictly more precise results than existing analyses

    Static analysis for dummies: Experiencing LiSA

    Get PDF
    Semantics-based static analysis requires a significant theoretical background before being able to design and implement a new analysis. Unfortunately, the development of even a toy static analyzer from scratch requires to implement an infrastructure (parser, control flow graphs representation, fixpoint algorithms, etc.) that is too demanding for bachelor and master students in computer science. This approach difficulty can condition the acquisition of skills on software verification which are of major importance for the design of secure systems. In this paper, we show how LiSA (Library for Static Analysis) can play a role in that respect. LiSA implements the basic infrastructure that allows a non-expert user to develop even simple analyses (e.g., dataflow and numerical non-relational domains) focusing only on the design of the appropriate representation of the property of interest and of the sound approximation of the program statements

    A Quantile-Based Watermarking Approach for Distortion Minimization

    Get PDF
    Distortion-based watermarking techniques embed the watermark by performing tolerable changes in the digital assets being protected. For relational data, mark insertion can be performed over the different data types of the database relations’ attributes. An important goal for distortion-based approaches is to minimize as much as possible the changes that the watermark embedding provokes into data, preserving their usability, watermark robustness, and capacity. This paper proposes a quantile-based watermarking technique for numerical cover type focused on preserving the distribution of attributes used as mark carriers. The experiments performed to validate our proposal show a significant distortion reduction compared to traditional approaches while maintaining watermark capacity levels. Also, positive achievements regarding robustness are visible, evidencing our technique’s resilience against subset attacks

    Measurement of the water vapour vertical profile and of the Earth's outgoing far infrared flux

    No full text
    International audienceOur understanding of global warming depends on the accuracy with which the atmospheric components that modulate the Earth's radiation budget are known. Many uncertainties still exist on the radiative effect of water in the different spectral regions, among which the far infrared where few observations have been made. An assessment is shown of the atmospheric outgoing flux obtained from a balloon-borne platform with wideband spectrally resolved nadir measurements at the top-of-atmosphere over the full spectral range, including the far infrared, from 100 to 1400 cm?1, made by a Fourier transform spectrometer with uncooled detectors. From these measurements, we retrieve 15 pieces of information about water vapour and temperature profiles, and surface temperature, with a precision of 5% for the mean water vapour profile and a major improvement of the upper troposphere-lower stratosphere knowledge. The retrieved atmospheric state makes it possible to calculate the emitted radiance as a function of the zenith angle and to determine the outgoing radiation flux, proving that spectrally resolved observations can be used to derive accurate information on the integrated flux. While the retrieved temperature is in good agreement with ECMWF analysis, the retrieved water vapour profile differs significantly, and, depending on time and location, the derived flux differs in the far infrared (0?600 cm?1) from that derived from ECMWF by 2?3.5 W/m2±0.4 W/m2. The observed discrepancy is larger than current estimates of radiative forcing due to CO2 increases since pre-industrial time. The error with which the flux is determined is caused mainly by calibration uncertainties while detector noise has a negligible effect, proving that uncooled detectors are adequate for top of the atmosphere radiometry

    Postmenopausal hormone therapy in BRCA gene mutation carriers: to whom and which?

    Get PDF
    Introduction: Risk-reducing-salpingo-oophorectomy (RRSO) inevitably leads BRCA mutation carriers to premature menopause. Areas covered: To evaluate the existing evidence for use of postmenopausal hormone therapy (HT) in BRCAmc, after RRSO or menopause occurring naturally, for both breast cancer (BC) survivors and those without BC. Expert opinion: All BC survivors are excluded from any HT treatment: in other BRCAmc, before 51 years of age the benefits of HT overcome the risks after RRSO and/or premature ovarian insufficiency (POF). After 51 years of age, it is important to treat only women with important vasomotor symptoms, after the failure of alternative therapies. Estrogens-only therapy plays a key role in hysterectomized women (HW). In the case of an intact uterus (UW), associations with the lowest dose of progestins/natural progesterone derivatives have to be preferred, as progestins has been shown to play an important role in BC transformation, especially in BRCA1mc. No studies have been performed in BRCAmc with regard to ‘progestin-free’ HT, in particular the old tibolone (both in HW and UW) and the new tissue-selective estrogen complex (in UW). However, preliminary data obtained from the general population are reassuring about the use of these ‘progestin-free’ preparations and BC safety

    HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data

    Get PDF
    Most of the watermarking techniques designed to protect relational data often use the Primary Key (PK) of relations to perform the watermark synchronization. Despite offering high confidence to the watermark detection, these approaches become useless if the PK can be erased or updated. A typical example is when an attacker wishes to use a stolen relation, unlinked to the rest of the database. In that case, the original values of the PK lose relevance, since they are not employed to check the referential integrity. Then, it is possible to erase or replace the PK, compromising the watermark detection with no need to perform the slightest modification on the rest of the data. To avoid the problems caused by the PK-dependency some schemes have been proposed to generate Virtual Primary Keys (VPK) used instead. Nevertheless, the quality of the watermark synchronized using VPKs is compromised due to the presence of duplicate values in the set of VPKs and the fragility of the VPK schemes against the elimination of attributes. In this paper, we introduce the metrics to allow precise measuring of the quality of the VPKs generated by any scheme without requiring to perform the watermark embedding. This way, time waste can be avoided in case of low-quality detection. We also analyze the main aspects to design the ideal VPK scheme, seeking the generation of high-quality VPK sets adding robustness to the process. Finally, a new scheme is presented along with the experiments carried out to validate and compare the results with the rest of the schemes proposed in the literature
    • …
    corecore