164 research outputs found

    Solving the m-TSP Problem with Stochastic or Time Dependent Demands

    Full text link
    peer reviewedThere are many examples of problems in transportation where some elements are uncertain. In the distribution of goods as well as systems responding to calls for emergency, demands typically occur in a random fashion. Transportation systems have thus to be created in face of uncertainty about future levels of demands, making strategic decisions difficult to take. Similarly, traffic conditions vary randomly over time and travel routes are usually designed in face of uncertainty about traffic conditions, hence about effective travel times. Stochastic models, i.e. models that take uncertainty explicitly into account, have thus a central role to play in transportation

    Entretien avec François Louveaux

    Get PDF
    JG, MM : Merci d’avoir accepté notre invitation … François Louveaux : Merci à vous pour votre invitation, Il est essentiel que monde scolaire et monde universitaire apprennent à se connaître, à travailler ensemble. Cela ne va pas de soi, entre un monde scolaire dont le fonctionnement reste largement hiérarchique et vertical et un monde universitaire globalement horizontal. J’ai pris une pleine conscience de cet enjeu avec l’accompagnement des ESPE. Les uns attendaient du Ministère qu’il impos..

    Impact of Realistic Propagation Conditions on Reciprocity-Based Secret-Key Capacity

    Full text link
    Secret-key generation exploiting the channel reciprocity between two legitimate parties is an interesting alternative solution to cryptographic primitives for key distribution in wireless systems as it does not rely on an access infrastructure and provides information-theoretic security. The large majority of works in the literature generally assumes that the eavesdropper gets no side information about the key from her observations provided that (i) it is spaced more than a wavelength away from a legitimate party and (ii) the channel is rich enough in scattering. In this paper, we show that this condition is not always verified in practice and we analyze the secret-key capacity under realistic propagation conditions

    CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping

    Full text link
    Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers. Secret-key generation relying on wireless channel reciprocity is an interesting solution as it can be efficiently implemented at the physical layer of emerging wireless communication networks, while providing information-theoretic security guarantees. In this paper, we investigate and compare the secret-key capacity based on the sampling of the entire complex channel state information (CSI) or only its envelope, the received signal strength (RSS). Moreover, as opposed to previous works, we take into account the fact that the eavesdropper's observations might be correlated and we consider the high signal-to-noise ratio (SNR) regime where we can find simple analytical expressions for the secret-key capacity. As already found in previous works, we find that RSS-based secret-key generation is heavily penalized as compared to CSI-based systems. At high SNR, we are able to precisely and simply quantify this penalty: a halved pre-log factor and a constant penalty of about 0.69 bit, which disappears as Eve's channel gets highly correlated

    Introduction to Stochastic Programming

    Full text link

    Clustering and Kernel Density Estimation for Assessment of Measurable Residual Disease by Flow Cytometry

    Full text link
    peer reviewedStandardization, data mining techniques, and comparison to normality are changing the landscape of multiparameter flow cytometry in clinical hematology. On the basis of these principles, a strategy was developed for measurable residual disease (MRD) assessment. Herein, suspicious cell clusters are first identified at diagnosis using a clustering algorithm. Subsequently, automated multidimensional spaces, named “Clouds”, are created around these clusters on the basis of density calculations. This step identifies the immunophenotypic pattern of the suspicious cell clusters. Thereafter, using reference samples, the “Abnormality Ratio” (AR) of each Cloud is calculated, and major malignant Clouds are retained, known as “Leukemic Clouds” (L-Clouds). In follow-up samples, MRD is identified when more cells fall into a patient’s L-Cloud compared to reference samples (AR concept). This workflow was applied on simulated data and real-life leukemia flow cytometry data. On simulated data, strong patient-dependent positive correlation (R2 = 1) was observed between the AR and spiked-in leukemia cells. On real patient data, AR kinetics was in line with the clinical evolution for five out of six patients. In conclusion, we present a convenient flow cytometry data analysis approach for the follow-up of hematological malignancies. Further evaluation and validation on more patient samples and different flow cytometry panels is required before implementation in clinical practice

    Large-scale unit commitment under uncertainty: an updated literature survey

    Get PDF
    The Unit Commitment problem in energy management aims at finding the optimal production schedule of a set of generation units, while meeting various system-wide constraints. It has always been a large-scale, non-convex, difficult problem, especially in view of the fact that, due to operational requirements, it has to be solved in an unreasonably small time for its size. Recently, growing renewable energy shares have strongly increased the level of uncertainty in the system, making the (ideal) Unit Commitment model a large-scale, non-convex and uncertain (stochastic, robust, chance-constrained) program. We provide a survey of the literature on methods for the Uncertain Unit Commitment problem, in all its variants. We start with a review of the main contributions on solution methods for the deterministic versions of the problem, focussing on those based on mathematical programming techniques that are more relevant for the uncertain versions of the problem. We then present and categorize the approaches to the latter, while providing entry points to the relevant literature on optimization under uncertainty. This is an updated version of the paper "Large-scale Unit Commitment under uncertainty: a literature survey" that appeared in 4OR 13(2), 115--171 (2015); this version has over 170 more citations, most of which appeared in the last three years, proving how fast the literature on uncertain Unit Commitment evolves, and therefore the interest in this subject

    Statistique pour les sciences humaines. 1

    No full text
    • …
    corecore