mal Data-driven parameterizations of suboptimal LQR and H2 controllers. (arXiv:1912.07671v2 [math.OC] UPDATED) By arxiv.org Published On :: In this paper we design suboptimal control laws for an unknown linear system on the basis of measured data. We focus on the suboptimal linear quadratic regulator problem and the suboptimal H2 control problem. For both problems, we establish conditions under which a given data set contains sufficient information for controller design. We follow up by providing a data-driven parameterization of all suboptimal controllers. We will illustrate our results by numerical simulations, which will reveal an interesting trade-off between the number of collected data samples and the achieved controller performance. Full Article
mal Equivariant Batalin-Vilkovisky formalism. (arXiv:1907.07995v3 [hep-th] UPDATED) By arxiv.org Published On :: We study an equivariant extension of the Batalin-Vilkovisky formalism for quantizing gauge theories. Namely, we introduce a general framework to encompass failures of the quantum master equation, and we apply it to the natural equivariant extension of AKSZ solutions of the classical master equation (CME). As examples of the construction, we recover the equivariant extension of supersymmetric Yang-Mills in 2d and of Donaldson-Witten theory. Full Article
mal Nonlinear stability of explicit self-similar solutions for the timelike extremal hypersurfaces in R^{1+3}. (arXiv:1907.01126v2 [math.AP] UPDATED) By arxiv.org Published On :: This paper is devoted to the study of the singularity phenomenon of timelike extremal hypersurfaces in Minkowski spacetime $mathbb{R}^{1+3}$. We find that there are two explicit lightlike self-similar solutions to a graph representation of timelike extremal hypersurfaces in Minkowski spacetime $mathbb{R}^{1+3}$, the geometry of them are two spheres. The linear mode unstable of those lightlike self-similar solutions for the radially symmetric membranes equation is given. After that, we show those self-similar solutions of the radially symmetric membranes equation are nonlinearly stable inside a strictly proper subset of the backward lightcone. This means that the dynamical behavior of those two spheres is as attractors. Meanwhile, we overcome the double roots case (the theorem of Poincar'{e} can't be used) in solving the difference equation by construction of a Newton's polygon when we carry out the analysis of spectrum for the linear operator. Full Article
mal Decentralized and Parallelized Primal and Dual Accelerated Methods for Stochastic Convex Programming Problems. (arXiv:1904.09015v10 [math.OC] UPDATED) By arxiv.org Published On :: We introduce primal and dual stochastic gradient oracle methods for decentralized convex optimization problems. Both for primal and dual oracles the proposed methods are optimal in terms of the number of communication steps. However, for all classes of the objective, the optimality in terms of the number of oracle calls per node in the class of methods with optimal number of communication steps takes place only up to a logarithmic factor and the notion of smoothness. By using mini-batching technique we show that all proposed methods with stochastic oracle can be additionally parallelized at each node. Full Article
mal Optimal construction of Koopman eigenfunctions for prediction and control. (arXiv:1810.08733v3 [math.OC] UPDATED) By arxiv.org Published On :: This work presents a novel data-driven framework for constructing eigenfunctions of the Koopman operator geared toward prediction and control. The method leverages the richness of the spectrum of the Koopman operator away from attractors to construct a rich set of eigenfunctions such that the state (or any other observable quantity of interest) is in the span of these eigenfunctions and hence predictable in a linear fashion. The eigenfunction construction is optimization-based with no dictionary selection required. Once a predictor for the uncontrolled part of the system is obtained in this way, the incorporation of control is done through a multi-step prediction error minimization, carried out by a simple linear least-squares regression. The predictor so obtained is in the form of a linear controlled dynamical system and can be readily applied within the Koopman model predictive control framework of [12] to control nonlinear dynamical systems using linear model predictive control tools. The method is entirely data-driven and based purely on convex optimization, with no reliance on neural networks or other non-convex machine learning tools. The novel eigenfunction construction method is also analyzed theoretically, proving rigorously that the family of eigenfunctions obtained is rich enough to span the space of all continuous functions. In addition, the method is extended to construct generalized eigenfunctions that also give rise Koopman invariant subspaces and hence can be used for linear prediction. Detailed numerical examples with code available online demonstrate the approach, both for prediction and feedback control. Full Article
mal Extremal values of the Sackin balance index for rooted binary trees. (arXiv:1801.10418v5 [q-bio.PE] UPDATED) By arxiv.org Published On :: Tree balance plays an important role in different research areas like theoretical computer science and mathematical phylogenetics. For example, it has long been known that under the Yule model, a pure birth process, imbalanced trees are more likely than balanced ones. Therefore, different methods to measure the balance of trees were introduced. The Sackin index is one of the most frequently used measures for this purpose. In many contexts, statements about the minimal and maximal values of this index have been discussed, but formal proofs have never been provided. Moreover, while the number of trees with maximal Sackin index as well as the number of trees with minimal Sackin index when the number of leaves is a power of 2 are relatively easy to understand, the number of trees with minimal Sackin index for all other numbers of leaves was completely unknown. In this manuscript, we fully characterize trees with minimal and maximal Sackin index and also provide formulas to explicitly calculate the number of such trees. Full Article
mal A Hamilton-Jacobi Formulation for Time-Optimal Paths of Rectangular Nonholonomic Vehicles. (arXiv:2005.03623v1 [math.OC]) By arxiv.org Published On :: We address the problem of optimal path planning for a simple nonholonomic vehicle in the presence of obstacles. Most current approaches are either split hierarchically into global path planning and local collision avoidance, or neglect some of the ambient geometry by assuming the car is a point mass. We present a Hamilton-Jacobi formulation of the problem that resolves time-optimal paths and considers the geometry of the vehicle. Full Article
mal A Model for Optimal Human Navigation with Stochastic Effects. (arXiv:2005.03615v1 [math.OC]) By arxiv.org Published On :: We present a method for optimal path planning of human walking paths in mountainous terrain, using a control theoretic formulation and a Hamilton-Jacobi-Bellman equation. Previous models for human navigation were entirely deterministic, assuming perfect knowledge of the ambient elevation data and human walking velocity as a function of local slope of the terrain. Our model includes a stochastic component which can account for uncertainty in the problem, and thus includes a Hamilton-Jacobi-Bellman equation with viscosity. We discuss the model in the presence and absence of stochastic effects, and suggest numerical methods for simulating the model. We discuss two different notions of an optimal path when there is uncertainty in the problem. Finally, we compare the optimal paths suggested by the model at different levels of uncertainty, and observe that as the size of the uncertainty tends to zero (and thus the viscosity in the equation tends to zero), the optimal path tends toward the deterministic optimal path. Full Article
mal Minimal acceleration for the multi-dimensional isentropic Euler equations. (arXiv:2005.03570v1 [math.AP]) By arxiv.org Published On :: Among all dissipative solutions of the multi-dimensional isentropic Euler equations there exists at least one that minimizes the acceleration, which implies that the solution is as close to being a weak solution as possible. The argument is based on a suitable selection procedure. Full Article
mal Derivatives of normal Jacobi operator on real hypersurfaces in the complex quadric. (arXiv:2005.03483v1 [math.DG]) By arxiv.org Published On :: In cite{S 2017}, Suh gave a non-existence theorem for Hopf real hypersurfaces in the complex quadric with parallel normal Jacobi operator. Motivated by this result, in this paper, we introduce some generalized conditions named $mathcal C$-parallel or Reeb parallel normal Jacobi operators. By using such weaker parallelisms of normal Jacobi operator, first we can assert a non-existence theorem of Hopf real hypersurfaces with $mathcal C$-parallel normal Jacobi operator in the complex quadric $Q^{m}$, $m geq 3$. Next, we prove that a Hopf real hypersurface has Reeb parallel normal Jacobi operator if and only if it has an $mathfrak A$-isotropic singular normal vector field. Full Article
mal Augmented Valuation and Minimal Pair. (arXiv:2005.03298v1 [math.AC]) By arxiv.org Published On :: Let $(K, u)$ be a valued field, the notions of emph{augmented valuation}, of emph{limit augmented valuation} and of emph{admissible family} of valuations enable to give a description of any valuation $mu$ of $K [x]$ extending $ u$. In the case where the field $K$ is algebraically closed, this description is particularly simple and we can reduce it to the notions of emph{minimal pair} and emph{pseudo-convergent family}. Let $(K, u )$ be a henselian valued field and $ar u$ the unique extension of $ u$ to the algebraic closure $ar K$ of $K$ and let $mu$ be a valuation of $ K [x]$ extending $ u$, we study the extensions $armu$ from $mu$ to $ar K [x]$ and we give a description of the valuations $armu_i$ of $ar K [x]$ which are the extensions of the valuations $mu_i$ belonging to the admissible family associated with $mu$. Full Article
mal Optimality for the two-parameter quadratic sieve. (arXiv:2005.03162v1 [math.NT]) By arxiv.org Published On :: We study the two-parameter quadratic sieve for a general test function. We prove, under some very general assumptions, that the function considered by Barban and Vehov [BV68] and Graham [Gra78] for this problem is optimal up to the second-order term. We determine that second-order term explicitly. Full Article
mal Sharp p-bounds for maximal operators on finite graphs. (arXiv:2005.03146v1 [math.CA]) By arxiv.org Published On :: Let $G=(V,E)$ be a finite graph and $M_G$ be the centered Hardy-Littlewood maximal operator defined there. We found the optimal value $C_{G,p}$ such that the inequality $$Var_{p}(M_{G}f)le C_{G,p}Var_{p}(f)$$ holds for every every $f:V o mathbb{R},$ where $Var_p$ stands for the $p$-variation, when: (i)$G=K_n$ (complete graph) and $pin [frac{ln(4)}{ln(6)},infty)$ or $G=K_4$ and $pin (0,infty)$;(ii) $G=S_n$(star graph) and $1ge pge frac{1}{2}$; $pin (0,frac{1}{2})$ and $nge C(p)<infty$ or $G=S_3$ and $pin (1,infty).$ We also found the optimal value $L_{G,2}$ such that the inequality $$|M_{G}f|_2le L_{G,2}|f|_2$$ holds for every $f:V o mathbb{R}$, when: (i)$G=K_n$ and $nge 3$;(ii)$G=S_n$ and $nge 3.$ Full Article
mal Quantization of Lax integrable systems and Conformal Field Theory. (arXiv:2005.03053v1 [math-ph]) By arxiv.org Published On :: We present the correspondence between Lax integrable systems with spectral parameter on a Riemann surface, and Conformal Field Theories, in quite general set-up suggested earlier by the author. This correspondence turns out to give a prequantization of the integrable systems in question. Full Article
mal A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus. (arXiv:2005.02911v2 [quant-ph] UPDATED) By arxiv.org Published On :: Quantum computing has evolved quickly in recent years and is showing significant benefits in a variety of fields. Malware analysis is one of those fields that could also take advantage of quantum computing. The combination of software used to locate the most frequent hashes and $n$-grams between benign and malicious software (KiloGram) and a quantum search algorithm could be beneficial, by loading the table of hashes and $n$-grams into a quantum computer, and thereby speeding up the process of mapping $n$-grams to their hashes. The first phase will be to use KiloGram to find the top-$k$ hashes and $n$-grams for a large malware corpus. From here, the resulting hash table is then loaded into a quantum machine. A quantum search algorithm is then used search among every permutation of the entangled key and value pairs to find the desired hash value. This prevents one from having to re-compute hashes for a set of $n$-grams, which can take on average $O(MN)$ time, whereas the quantum algorithm could take $O(sqrt{N})$ in the number of table lookups to find the desired hash values. Full Article
mal Optimal Adjacent Vertex-Distinguishing Edge-Colorings of Circulant Graphs. (arXiv:2004.12822v2 [cs.DM] UPDATED) By arxiv.org Published On :: A k-proper edge-coloring of a graph G is called adjacent vertex-distinguishing if any two adjacent vertices are distinguished by the set of colors appearing in the edges incident to each vertex. The smallest value k for which G admits such coloring is denoted by $chi$'a (G). We prove that $chi$'a (G) = 2R + 1 for most circulant graphs Cn([[1, R]]). Full Article
mal Maximal Closed Set and Half-Space Separations in Finite Closure Systems. (arXiv:2001.04417v2 [cs.AI] UPDATED) By arxiv.org Published On :: Several problems of artificial intelligence, such as predictive learning, formal concept analysis or inductive logic programming, can be viewed as a special case of half-space separation in abstract closure systems over finite ground sets. For the typical scenario that the closure system is given via a closure operator, we show that the half-space separation problem is NP-complete. As a first approach to overcome this negative result, we relax the problem to maximal closed set separation, give a greedy algorithm solving this problem with a linear number of closure operator calls, and show that this bound is sharp. For a second direction, we consider Kakutani closure systems and prove that they are algorithmically characterized by the greedy algorithm. As a first special case of the general problem setting, we consider Kakutani closure systems over graphs, generalize a fundamental characterization result based on the Pasch axiom to graph structured partitioning of finite sets, and give a sufficient condition for this kind of closures systems in terms of graph minors. For a second case, we then focus on closure systems over finite lattices, give an improved adaptation of the greedy algorithm for this special case, and present two applications concerning formal concept and subsumption lattices. We also report some experimental results to demonstrate the practical usefulness of our algorithm. Full Article
mal Games Where You Can Play Optimally with Arena-Independent Finite Memory. (arXiv:2001.03894v2 [cs.GT] UPDATED) By arxiv.org Published On :: For decades, two-player (antagonistic) games on graphs have been a framework of choice for many important problems in theoretical computer science. A notorious one is controller synthesis, which can be rephrased through the game-theoretic metaphor as the quest for a winning strategy of the system in a game against its antagonistic environment. Depending on the specification, optimal strategies might be simple or quite complex, for example having to use (possibly infinite) memory. Hence, research strives to understand which settings allow for simple strategies. In 2005, Gimbert and Zielonka provided a complete characterization of preference relations (a formal framework to model specifications and game objectives) that admit memoryless optimal strategies for both players. In the last fifteen years however, practical applications have driven the community toward games with complex or multiple objectives, where memory -- finite or infinite -- is almost always required. Despite much effort, the exact frontiers of the class of preference relations that admit finite-memory optimal strategies still elude us. In this work, we establish a complete characterization of preference relations that admit optimal strategies using arena-independent finite memory, generalizing the work of Gimbert and Zielonka to the finite-memory case. We also prove an equivalent to their celebrated corollary of great practical interest: if both players have optimal (arena-independent-)finite-memory strategies in all one-player games, then it is also the case in all two-player games. Finally, we pinpoint the boundaries of our results with regard to the literature: our work completely covers the case of arena-independent memory (e.g., multiple parity objectives, lower- and upper-bounded energy objectives), and paves the way to the arena-dependent case (e.g., multiple lower-bounded energy objectives). Full Article
mal IPG-Net: Image Pyramid Guidance Network for Small Object Detection. (arXiv:1912.00632v3 [cs.CV] UPDATED) By arxiv.org Published On :: For Convolutional Neural Network-based object detection, there is a typical dilemma: the spatial information is well kept in the shallow layers which unfortunately do not have enough semantic information, while the deep layers have a high semantic concept but lost a lot of spatial information, resulting in serious information imbalance. To acquire enough semantic information for shallow layers, Feature Pyramid Networks (FPN) is used to build a top-down propagated path. In this paper, except for top-down combining of information for shallow layers, we propose a novel network called Image Pyramid Guidance Network (IPG-Net) to make sure both the spatial information and semantic information are abundant for each layer. Our IPG-Net has two main parts: the image pyramid guidance transformation module and the image pyramid guidance fusion module. Our main idea is to introduce the image pyramid guidance into the backbone stream to solve the information imbalance problem, which alleviates the vanishment of the small object features. This IPG transformation module promises even in the deepest stage of the backbone, there is enough spatial information for bounding box regression and classification. Furthermore, we designed an effective fusion module to fuse the features from the image pyramid and features from the backbone stream. We have tried to apply this novel network to both one-stage and two-stage detection models, state of the art results are obtained on the most popular benchmark data sets, i.e. MS COCO and Pascal VOC. Full Article
mal Multi-group Multicast Beamforming: Optimal Structure and Efficient Algorithms. (arXiv:1911.08925v2 [eess.SP] UPDATED) By arxiv.org Published On :: This paper considers the multi-group multicast beamforming optimization problem, for which the optimal solution has been unknown due to the non-convex and NP-hard nature of the problem. By utilizing the successive convex approximation numerical method and Lagrangian duality, we obtain the optimal multicast beamforming solution structure for both the quality-of-service (QoS) problem and the max-min fair (MMF) problem. The optimal structure brings valuable insights into multicast beamforming: We show that the notion of uplink-downlink duality can be generalized to the multicast beamforming problem. The optimal multicast beamformer is a weighted MMSE filter based on a group-channel direction: a generalized version of the optimal downlink multi-user unicast beamformer. We also show that there is an inherent low-dimensional structure in the optimal multicast beamforming solution independent of the number of transmit antennas, leading to efficient numerical algorithm design, especially for systems with large antenna arrays. We propose efficient algorithms to compute the multicast beamformer based on the optimal beamforming structure. Through asymptotic analysis, we characterize the asymptotic behavior of the multicast beamformers as the number of antennas grows, and in turn, provide simple closed-form approximate multicast beamformers for both the QoS and MMF problems. This approximation offers practical multicast beamforming solutions with a near-optimal performance at very low computational complexity for large-scale antenna systems. Full Article
mal Performance of the smallest-variance-first rule in appointment sequencing. (arXiv:1812.01467v4 [math.PR] UPDATED) By arxiv.org Published On :: A classical problem in appointment scheduling, with applications in health care, concerns the determination of the patients' arrival times that minimize a cost function that is a weighted sum of mean waiting times and mean idle times. One aspect of this problem is the sequencing problem, which focuses on ordering the patients. We assess the performance of the smallest-variance-first (SVF) rule, which sequences patients in order of increasing variance of their service durations. While it was known that SVF is not always optimal, it has been widely observed that it performs well in practice and simulation. We provide a theoretical justification for this observation by proving, in various settings, quantitative worst-case bounds on the ratio between the cost incurred by the SVF rule and the minimum attainable cost. We also show that, in great generality, SVF is asymptotically optimal, i.e., the ratio approaches 1 as the number of patients grows large. While evaluating policies by considering an approximation ratio is a standard approach in many algorithmic settings, our results appear to be the first of this type in the appointment scheduling literature. Full Article
mal Defending Hardware-based Malware Detectors against Adversarial Attacks. (arXiv:2005.03644v1 [cs.CR]) By arxiv.org Published On :: In the era of Internet of Things (IoT), Malware has been proliferating exponentially over the past decade. Traditional anti-virus software are ineffective against modern complex Malware. In order to address this challenge, researchers have proposed Hardware-assisted Malware Detection (HMD) using Hardware Performance Counters (HPCs). The HPCs are used to train a set of Machine learning (ML) classifiers, which in turn, are used to distinguish benign programs from Malware. Recently, adversarial attacks have been designed by introducing perturbations in the HPC traces using an adversarial sample predictor to misclassify a program for specific HPCs. These attacks are designed with the basic assumption that the attacker is aware of the HPCs being used to detect Malware. Since modern processors consist of hundreds of HPCs, restricting to only a few of them for Malware detection aids the attacker. In this paper, we propose a Moving target defense (MTD) for this adversarial attack by designing multiple ML classifiers trained on different sets of HPCs. The MTD randomly selects a classifier; thus, confusing the attacker about the HPCs or the number of classifiers applied. We have developed an analytical model which proves that the probability of an attacker to guess the perfect HPC-classifier combination for MTD is extremely low (in the range of $10^{-1864}$ for a system with 20 HPCs). Our experimental results prove that the proposed defense is able to improve the classification accuracy of HPC traces that have been modified through an adversarial sample generator by up to 31.5%, for a near perfect (99.4%) restoration of the original accuracy. Full Article
mal Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting. (arXiv:2005.03633v1 [eess.AS]) By arxiv.org Published On :: In this paper, we focus on the task of small-footprint keyword spotting under the far-field scenario. Far-field environments are commonly encountered in real-life speech applications, and it causes serve degradation of performance due to room reverberation and various kinds of noises. Our baseline system is built on the convolutional neural network trained with pooled data of both far-field and close-talking speech. To cope with the distortions, we adopt the multi-task learning scheme with alignment loss to reduce the mismatch between the embedding features learned from different domains of data. Experimental results show that our proposed method maintains the performance on close-talking speech and achieves significant improvement on the far-field test set. Full Article
mal Subquadratic-Time Algorithms for Normal Bases. (arXiv:2005.03497v1 [cs.SC]) By arxiv.org Published On :: For any finite Galois field extension $mathsf{K}/mathsf{F}$, with Galois group $G = mathrm{Gal}(mathsf{K}/mathsf{F})$, there exists an element $alpha in mathsf{K}$ whose orbit $Gcdotalpha$ forms an $mathsf{F}$-basis of $mathsf{K}$. Such an $alpha$ is called a normal element and $Gcdotalpha$ is a normal basis. We introduce a probabilistic algorithm for testing whether a given $alpha in mathsf{K}$ is normal, when $G$ is either a finite abelian or a metacyclic group. The algorithm is based on the fact that deciding whether $alpha$ is normal can be reduced to deciding whether $sum_{g in G} g(alpha)g in mathsf{K}[G]$ is invertible; it requires a slightly subquadratic number of operations. Once we know that $alpha$ is normal, we show how to perform conversions between the working basis of $mathsf{K}/mathsf{F}$ and the normal basis with the same asymptotic cost. Full Article
mal Continuous maximal covering location problems with interconnected facilities. (arXiv:2005.03274v1 [math.OC]) By arxiv.org Published On :: In this paper we analyze a continuous version of the maximal covering location problem, in which the facilities are required to be interconnected by means of a graph structure in which two facilities are allowed to be linked if a given distance is not exceed. We provide a mathematical programming framework for the problem and different resolution strategies. First, we propose a Mixed Integer Non Linear Programming formulation, and derive properties of the problem that allow us to project the continuous variables out avoiding the nonlinear constraints, resulting in an equivalent pure integer programming formulation. Since the number of constraints in the integer programming formulation is large and the constraints are, in general, difficult to handle, we propose two branch-&-cut approaches that avoid the complete enumeration of the constraints resulting in more efficient procedures. We report the results of an extensive battery of computational experiments comparing the performance of the different approaches. Full Article
mal Online Proximal-ADMM For Time-varying Constrained Convex Optimization. (arXiv:2005.03267v1 [eess.SY]) By arxiv.org Published On :: This paper considers a convex optimization problem with cost and constraints that evolve over time. The function to be minimized is strongly convex and possibly non-differentiable, and variables are coupled through linear constraints.In this setting, the paper proposes an online algorithm based on the alternating direction method of multipliers(ADMM), to track the optimal solution trajectory of the time-varying problem; in particular, the proposed algorithm consists of a primal proximal gradient descent step and an appropriately perturbed dual ascent step. The paper derives tracking results, asymptotic bounds, and linear convergence results. The proposed algorithm is then specialized to a multi-area power grid optimization problem, and our numerical results verify the desired properties. Full Article
mal An Optimal Control Theory for the Traveling Salesman Problem and Its Variants. (arXiv:2005.03186v1 [math.OC]) By arxiv.org Published On :: We show that the traveling salesman problem (TSP) and its many variants may be modeled as functional optimization problems over a graph. In this formulation, all vertices and arcs of the graph are functionals; i.e., a mapping from a space of measurable functions to the field of real numbers. Many variants of the TSP, such as those with neighborhoods, with forbidden neighborhoods, with time-windows and with profits, can all be framed under this construct. In sharp contrast to their discrete-optimization counterparts, the modeling constructs presented in this paper represent a fundamentally new domain of analysis and computation for TSPs and their variants. Beyond its apparent mathematical unification of a class of problems in graph theory, the main advantage of the new approach is that it facilitates the modeling of certain application-specific problems in their home space of measurable functions. Consequently, certain elements of economic system theory such as dynamical models and continuous-time cost/profit functionals can be directly incorporated in the new optimization problem formulation. Furthermore, subtour elimination constraints, prevalent in discrete optimization formulations, are naturally enforced through continuity requirements. The price for the new modeling framework is nonsmooth functionals. Although a number of theoretical issues remain open in the proposed mathematical framework, we demonstrate the computational viability of the new modeling constructs over a sample set of problems to illustrate the rapid production of end-to-end TSP solutions to extensively-constrained practical problems. Full Article
mal On Optimal Control of Discounted Cost Infinite-Horizon Markov Decision Processes Under Local State Information Structures. (arXiv:2005.03169v1 [eess.SY]) By arxiv.org Published On :: This paper investigates a class of optimal control problems associated with Markov processes with local state information. The decision-maker has only local access to a subset of a state vector information as often encountered in decentralized control problems in multi-agent systems. Under this information structure, part of the state vector cannot be observed. We leverage ab initio principles and find a new form of Bellman equations to characterize the optimal policies of the control problem under local information structures. The dynamic programming solutions feature a mixture of dynamics associated unobservable state components and the local state-feedback policy based on the observable local information. We further characterize the optimal local-state feedback policy using linear programming methods. To reduce the computational complexity of the optimal policy, we propose an approximate algorithm based on virtual beliefs to find a sub-optimal policy. We show the performance bounds on the sub-optimal solution and corroborate the results with numerical case studies. Full Article
mal Optimally Convergent Mixed Finite Element Methods for the Stochastic Stokes Equations. (arXiv:2005.03148v1 [math.NA]) By arxiv.org Published On :: We propose some new mixed finite element methods for the time dependent stochastic Stokes equations with multiplicative noise, which use the Helmholtz decomposition of the driving multiplicative noise. It is known [16] that the pressure solution has a low regularity, which manifests in sub-optimal convergence rates for well-known inf-sup stable mixed finite element methods in numerical simulations, see [10]. We show that eliminating this gradient part from the noise in the numerical scheme leads to optimally convergent mixed finite element methods, and that this conceptual idea may be used to retool numerical methods that are well-known in the deterministic setting, including pressure stabilization methods, so that their optimal convergence properties can still be maintained in the stochastic setting. Computational experiments are also provided to validate the theoretical results and to illustrate the conceptional usefulness of the proposed numerical approach. Full Article
mal Strong replica symmetry in high-dimensional optimal Bayesian inference. (arXiv:2005.03115v1 [math.PR]) By arxiv.org Published On :: We consider generic optimal Bayesian inference, namely, models of signal reconstruction where the posterior distribution and all hyperparameters are known. Under a standard assumption on the concentration of the free energy, we show how replica symmetry in the strong sense of concentration of all multioverlaps can be established as a consequence of the Franz-de Sanctis identities; the identities themselves in the current setting are obtained via a novel perturbation of the prior distribution of the signal. Concentration of multioverlaps means that asymptotically the posterior distribution has a particularly simple structure encoded by a random probability measure (or, in the case of binary signal, a non-random probability measure). We believe that such strong control of the model should be key in the study of inference problems with underlying sparse graphical structure (error correcting codes, block models, etc) and, in particular, in the derivation of replica symmetric formulas for the free energy and mutual information in this context. Full Article
mal Optimal Location of Cellular Base Station via Convex Optimization. (arXiv:2005.03099v1 [cs.IT]) By arxiv.org Published On :: An optimal base station (BS) location depends on the traffic (user) distribution, propagation pathloss and many system parameters, which renders its analytical study difficult so that numerical algorithms are widely used instead. In this paper, the problem is studied analytically. First, it is formulated as a convex optimization problem to minimize the total BS transmit power subject to quality-of-service (QoS) constraints, which also account for fairness among users. Due to its convex nature, Karush-Kuhn-Tucker (KKT) conditions are used to characterize a globally-optimum location as a convex combination of user locations, where convex weights depend on user parameters, pathloss exponent and overall geometry of the problem. Based on this characterization, a number of closed-form solutions are obtained. In particular, the optimum BS location is the mean of user locations in the case of free-space propagation and identical user parameters. If the user set is symmetric (as defined in the paper), the optimal BS location is independent of pathloss exponent, which is not the case in general. The analytical results show the impact of propagation conditions as well as system and user parameters on optimal BS location and can be used to develop design guidelines. Full Article
mal Near-optimal Detector for SWIPT-enabled Differential DF Relay Networks with SER Analysis. (arXiv:2005.03096v1 [cs.IT]) By arxiv.org Published On :: In this paper, we analyze the symbol error rate (SER) performance of the simultaneous wireless information and power transfer (SWIPT) enabled three-node differential decode-and-forward (DDF) relay networks, which adopt the power splitting (PS) protocol at the relay. The use of non-coherent differential modulation eliminates the need for sending training symbols to estimate the instantaneous channel state informations (CSIs) at all network nodes, and therefore improves the power efficiency, as compared with the coherent modulation. However, performance analysis results are not yet available for the state-of-the-art detectors such as the approximate maximum-likelihood detector. Existing works rely on Monte-Carlo simulation to show that there exists an optimal PS ratio that minimizes the overall SER. In this work, we propose a near-optimal detector with linear complexity with respect to the modulation size. We derive an accurate approximate SER expression, based on which the optimal PS ratio can be accurately estimated without requiring any Monte-Carlo simulation. Full Article
mal Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT. (arXiv:2005.03003v1 [cs.AI]) By arxiv.org Published On :: In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient. Full Article
mal Football High: Small Hits Add Up By feedproxy.google.com Published On :: Tue, 10 Dec 2013 00:00:00 EST Research is showing that the accumulation of sub-concussive hits in sports like football can be just as damaging as one or two major concussions. Full Article video
mal Despite risks, many in small town continue to support youth football By feedproxy.google.com Published On :: Thu, 04 Feb 2016 00:00:00 EST Despite multiple concussions, a high school freshman continues to play football. Will family tradition outweigh the risks? Full Article video
mal 20 Company Website Designs to Inspire Your Small Business By feedproxy.google.com Published On :: Fri, 14 Feb 2020 15:49:14 +0000 As a small or midsize business (SMB), your company website is often the first touchpoint for potential clients — and you want it to make a great first impression. The secret to hitting home with your audience is to have a sophisticated and lively website design that’s aesthetically pleasing and provides great user experience (UX). […] The post 20 Company Website Designs to Inspire Your Small Business appeared first on WebFX Blog. Full Article Web Design
mal Local distilleries are relying on curbside bottle sales - and small batches of hand sanitizer - to stay afloat By www.inlander.com Published On :: Thu, 07 May 2020 01:30:00 -0700 Drink Local In tumultuous times, one thing remains true: People still want their spirits.… Full Article Food/Food News
mal For workers, no sign of ‘what normal is going to look like’ By www.inlander.com Published On :: Thu, 07 May 2020 10:28:15 -0700 By Patricia Cohen and Tiffany Hsu The New York Times Company… Full Article News/Nation & World
mal Adjacent to a ski resort, this mountainside hamlet offers plenty of small-town pleasures By www.inlander.com Published On :: Wed, 08 Apr 2020 18:30:00 -0700 If you've ever been compelled to visit Chewelah, it has likely been related to a trip to 49 Degrees North.… Full Article Health
mal Monitoring method and subsystem that detects abnormal system states By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The current application is directed to monitoring subsystems, and monitoring methods incorporated within the monitoring subsystems, that monitor operation of devices and systems in order to identify normal states and to quickly determine when a device or system transitions from a normal state to an abnormal state. The methods and monitoring components to which the current application is directed employ self-organizing maps and moving-average self-organizing maps to both characterize normal system behavior and to identify transitions to abnormal system behaviors. Full Article
mal Methods for the synthesis of 13C labeled plasmalogen By www.freepatentsonline.com Published On :: Tue, 14 Apr 2015 08:00:00 EDT A method for preparing 13C labeled plasmalogens as represented by Formula B: The method involves producing a 13C labeled cyclic plasmalogen precursor of Formula A: and conversion of the precursor to a plasmalogen of Formula B. Full Article
mal Certain heterocyclic substituted diphosphonate compounds pharmaceutical compositions, and methods of treating abnormal calcium and phosphate metabolism By www.freepatentsonline.com Published On :: Tue, 10 Dec 1991 08:00:00 EST The present invention relates to novel heterocycle-substituted diphosphonic acids, and the pharmaceutically-acceptable salts and esters thereof, in which the diphosphonate-substituted carbon atom moiety is attached to a carbon atom in a nitrogen-containing six membered ring heterocycle, preferably a piperidine ring. The heterocycle-substituted diphosphonic acid compounds have the general structure: ##STR1## wherein Z is a nitrogen-containing six membered ring heterocycle moiety selected from piperidinyl, diazinyl and triazinyl; m, n and m+n are from 0 to 10; Q is a covalent bond or a moiety selected from oxygen, sulfur or nitrogen; and R1, R2, R3 and R4 are substituent groups.The present invention further relates to pharmaceutical compositions containing these novel compounds. Finally this invention relates to methods for treating or preventing diseases characterized by abnormal calcium and phosphate metabolism by utilizing a compound or pharmaceutical composition of the present invention. Full Article
mal Method for removing parasites and in particular ectoparasites of vertebrates, in particular of mammals, and compositions for the implementation of this method By www.freepatentsonline.com Published On :: Tue, 19 Dec 2000 08:00:00 EST Methods for removing parasites and in particular ectoparasites of vertebrates, in particular of mammals, and compositions for the implementation of this method.Methods for removing parasites of vertebrates, and in particular arthropods, mainly insects and Arachnida, wherein an effectively parasiticidal amount of a compound of formula (I) ##STR1## in particular of fipronil, is administered to the animal via an administration route which makes possible systemic distribution and good absorption. Full Article
mal Method for increasing thermal stability of a fuel composition using a solid phosphoric acid catalyst By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT This invention relates to a method for increasing thermal stability of fuel, as well as in reducing nitrogen content and/or enhancing color quality of the fuel. According to the method, a fuel feedstock can be treated with a solid phosphoric acid catalyst under appropriate catalyst conditions, e.g., to increase the thermal stability of the fuel feedstock. Preferably, the fuel feedstock can be treated with the solid phosphoric acid catalyst at a ratio of catalyst mass within a contact zone to a mass flow rate of feedstock through the zone of at least about 18 minutes to increase the thermal stability of the fuel feedstock, along with reducing nitrogen content and/or enhancing color quality. Full Article
mal Thermal treatment of carbonaceous waste By www.freepatentsonline.com Published On :: Tue, 30 Dec 2014 08:00:00 EST A method is provided for the decontamination of radioactive carbonaceous material, such as graphite, in which an injection of steam is planned into the material, concurrent with a first roasting thermal treatment of the material at a temperature between 1200° C. and 1500° C. Advantageously, the first treatment may be followed by a second treatment at a lower temperature with an injection of carbon oxide for oxidation according to the Boudouard reaction. Full Article
mal Hydrothermal conversion of biomass to hydrocarbon products By www.freepatentsonline.com Published On :: Tue, 27 Jan 2015 08:00:00 EST A process for the conversion of biomass to hydrocarbon products such as transportation fuels, kerosene, diesel oil, fuel oil, chemical and refinery plant feeds. The instant process uses a hydrocarbon or synthesis gas co-feed and hot pressurized water to convert the biomass in a manner commonly referred to as hydrothermal liquefaction. Full Article
mal Process and apparatus for the thermal treatment of refinery sludge By www.freepatentsonline.com Published On :: Tue, 03 Mar 2015 08:00:00 EST A continuous process for the thermal treatment of a refinery sludge, comprising the following operations: a. drying of the refinery sludge, possibly mixed with pet-coke, at a temperature ranging from 110 to 120° C.; b. gasification of the dried sludge, at a temperature ranging from 750 to 950° C., for a time of 30 to 60 minutes, in the presence of a gas containing oxygen and water vapour, with the associated production of synthesis gas (CO+H2) and a solid residue; c. combustion of the synthesis gas at a temperature ranging from 850 to 1,200° C. and recycling of the combustion products for the drying and gasification phases; and d. inertization of the solid residue, at a temperature ranging from 1,300 to 1,500° C., by vitrification with plasma torches. Full Article
mal Ambient light curable ethylene propylene diene terpolymer rubber coating devoid of thermally activated accelerators By www.freepatentsonline.com Published On :: Tue, 02 Dec 2014 08:00:00 EST A durable ambient light curable waterproof liquid rubber coating with volatile organic compound (VOC) content of less than 450 grams per liter made from ethylene propylene diene terpolymer (EPDM) in a solvent, a photoinitiator, an additive, pigments, and fillers, and a co-agent and a method for making the formulation, wherein the formulation is devoid of thermally activated accelerators. Full Article
mal Thermally resistant optical siloxane resin composition By www.freepatentsonline.com Published On :: Tue, 30 Dec 2014 08:00:00 EST The present disclosure relates to a thermally resistant optical siloxane resin composition including siloxane containing photo-cationically polymerizable epoxy group, a photo initiator, and an antioxidant. Full Article
mal Emulsions of heat transfer fluids including nanodroplets to enhance thermal conductivities of the fluids By www.freepatentsonline.com Published On :: Tue, 27 Jan 2015 08:00:00 EST A heat transfer fluid emulsion includes a heat transfer fluid, and liquid droplets dispersed within the heat transfer fluid, where the liquid droplets are substantially immiscible with respect to the heat transfer fluid and have dimensions that are no greater than about 100 nanometers. In addition, the thermal conductivity of the heat transfer fluid emulsion is greater than the thermal conductivity of the heat transfer fluid. Full Article