4,025 research outputs found

    Stabilization of Unstable Procedures: The Recursive Projection Method

    Get PDF
    Fixed-point iterative procedures for solving nonlinear parameter dependent problems can converge for some interval of parameter values and diverge as the parameter changes. The Recursive Projection Method (RPM), which stabilizes such procedures by computing a projection onto the unstable subspace is presented. On this subspace a Newton or special Newton iteration is performed, and the fixed-point iteration is used on the complement. As continuation in the parameter proceeds, the projection is efficiently updated, possibly increasing or decreasing the dimension of the unstable subspace. The method is extremely effective when the dimension of the unstable subspace is small compared to the dimension of the system. Convergence proofs are given and pseudo-arclength continuation on the unstable subspace is introduced to allow continuation past folds. Examples are presented for an important application of the RPM in which a “black-box” time integration scheme is stabilized, enabling it to compute unstable steady states. The RPM can also be used to accelerate iterative procedures when slow convergence is due to a few slowly decaying modes

    Age-Optimal Information Updates in Multihop Networks

    Full text link
    The problem of reducing the age-of-information has been extensively studied in the single-hop networks. In this paper, we minimize the age-of-information in general multihop networks. If the packet transmission times over the network links are exponentially distributed, we prove that a preemptive Last Generated First Served (LGFS) policy results in smaller age processes at all nodes of the network (in a stochastic ordering sense) than any other causal policy. In addition, for arbitrary general distributions of packet transmission times, the non-preemptive LGFS policy is shown to minimize the age processes at all nodes of the network among all non-preemptive work-conserving policies (again in a stochastic ordering sense). It is surprising that such simple policies can achieve optimality of the joint distribution of the age processes at all nodes even under arbitrary network topologies, as well as arbitrary packet generation and arrival times. These optimality results not only hold for the age processes, but also for any non-decreasing functional of the age processes.Comment: arXiv admin note: text overlap with arXiv:1603.0618

    The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications

    Full text link
    The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security threats, as the grid becomes more vulnerable to cyber-attacks. In this paper, we study the impact of such malicious cyber-attacks on the energy efficiency of the grid in a simplified setup. More precisely, we consider a simple model where the energy demands of the smart grid consumers are intercepted and altered by an active attacker before they arrive at the operator, who is equipped with limited intrusion detection capabilities. We formulate the resulting optimization problems faced by the operator and the attacker and propose several scheduling and attack strategies for both parties. Interestingly, our results show that, as opposed to facilitating cost reduction in the smart grid, increasing the delay tolerance of the energy demands potentially allows the attacker to force increased costs on the system. This highlights the need for carefully constructed and robust intrusion detection mechanisms at the operator.Comment: Technical report - this work was accepted to IEEE Transactions on Control of Network Systems, 2016. arXiv admin note: substantial text overlap with arXiv:1209.176

    The EPICS Software Framework Moves from Controls to Physics

    No full text
    The Experimental Physics and Industrial Control System (EPICS), is an open-source software framework for high-performance distributed control, and is at the heart of many of the world’s large accelerators and telescopes. Recently, EPICS has undergone a major revision, with the aim of better computing supporting for the next generation of machines and analytical tools. Many new data types, such as matrices, tables, images, and statistical descriptions, plus users’ own data types, now supplement the simple scalar and waveform types of the former EPICS. New computational architectures for scientific computing have been added for high-performance data processing services and pipelining. Python and Java bindings have enabled powerful new user interfaces. The result has been that controls are now being integrated with modelling and simulation, machine learning, enterprise databases, and experiment DAQs. We introduce this new EPICS (version 7) from the perspective of accelerator physics and review early adoption cases in accelerators around the world

    Construction of an instant structured illumination microscope

    Get PDF
    A challenge in biological imaging is to capture high-resolution images at fast frame rates in live cells. The “instant structured illumination microscope” (iSIM) is a system designed for this purpose. Similarly to standard structured illumination microscopy (SIM), an iSIM provides a twofold improvement over widefield microscopy, in x, y and z, but also allows much faster image acquisition, with real-time display of super-resolution images. The assembly of an iSIM is reasonably complex, involving the combination and alignment of many optical components, including three micro-optics arrays (two lenslet arrays and an array of pinholes, all with a pitch of 222 μm) and a double-sided scanning mirror. In addition, a number of electronic components must be correctly controlled. Construction of the system is therefore not trivial, but is highly desirable, particularly for live-cell imaging. We report, and provide instructions for, the construction of an iSIM, including minor modifications to a previous design in both hardware and software. The final instrument allows us to rapidly acquire fluorescence images at rates faster than 100 fps, with approximately twofold improvement in resolution in both x-y and z; sub-diffractive biological features have an apparent size (full width at half maximum) of 145 nm (lateral) and 320 nm (axial), using a 1.49 NA objective and 488 nm excitation

    IS discipline in the IT services land : an exploratory study of IS in India

    Get PDF
    Information Systems (IS) research is characterized by plurality of methodologies, perspectives and contexts giving rise to various communities within the discipline. Studies of IS communities in North America, Europe and Asia-Pacific highlight the cognitive diversity, institutional distribution and research themes based on geography. While regional variations have been acknowledged, the debate on the identity and status of IS is on-going. In this paper we conduct an exploratory study of the IS research paradigm in India and contribute to IS discipline studies by bringing in the India perspective. We analyse the &lsquo;cognitive&rsquo; and &lsquo;behavioural&rsquo; legitimacy of IS discipline in India based on interviews conducted with Indian business school professors from IS and non-IS disciplines. The focus of the study is to understand the current state of IS research community in India. We find a need to establish a &lsquo;collective identity&rsquo; of IS research in India, which will benefit both the Indian and larger IS community to work on unique research possibilities presented by the socioeconomic context of India.<br /
    corecore