Filters








52 Hits in 6.0 sec

Rational and self-adaptive evolutionary extreme learning machine for electricity price forecast

Chixin Xiao, Zhaoyang Dong, Yan Xu, Ke Meng, Xun Zhou, Xin Zhang
2016 Memetic Computing  
Given the sophisticated time-series of electricity price, various approaches of extreme learning machine (ELM) have been identified as effective prediction approaches.  ...  This paper proposes a new differential evolution (DE) like algorithm to enhance E-ELM for more accurate and reliable prediction of electricity price.  ...  The authors would like to thank Prof. Qingfu Zhang(UK & Hongkong) for his fruitful discussions and patient tutoring when I was in UK. Thank Dr. Jingqiao Zhang for providing the source code of JADE.  ... 
doi:10.1007/s12293-016-0195-0 fatcat:mj6t7kxl3zabfi54xq3pwhvez4

Generation of Cryptographic Keys from Personal Biometrics: An Illustration Based on Fingerprints [chapter]

Bon K., Arun P. Kumara Krish
2012 New Trends and Developments in Biometrics  
Acknowledμements This work was supported in part by a μrant λrom PSC-CUNY Collaborative Research "ward and a NSF DUE "ward.  ...  obtain a mXm matrix: ( P1(A1 + A2) ) 5 Compute ( ( P1 ( b1 + b2 ) v T ) P (g ,n ) ) 5 Compute the Moore-Penrose Pseudoinverse of ( (P1(A1 + A2)) ) to obtain R = ((P1(A1 + A2))) -1 6 Send the following  ...  Speciλically, the security and privacy oλ SLSSP will be analyzed under these model assumptions authenticated communication channels with computational security, the behavior oλ the participants beinμ rational  ... 
doi:10.5772/51372 fatcat:rnlm2v4vyvcqjja3axmgtj7esm

Truth Will Out

Wissam Aoudi, Mikel Iturbe, Magnus Almgren
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
Although traditional security mechanisms can be implemented at the IT-infrastructure level of such cyber-physical systems, the community has acknowledged that it is imperative to also monitor the process-level  ...  We demonstrate the effectiveness of our approach through simulations and experiments on data from real systems.  ...  ACKNOWLEDGMENTS The research leading to these results has been supported by the Swedish Civil Contingencies Agency (MSB) through the project "RICS", and the Department of Economic Development and Infrastructures  ... 
doi:10.1145/3243734.3243781 dblp:conf/ccs/AoudiIA18 fatcat:rh3bvs2wcbgdli3nngjohkv42e

Algorithm 921

Jonathan D. Hauenstein, Frank Sottile
2012 ACM Transactions on Mathematical Software  
Smale's α-theory uses estimates related to the convergence of Newton's method to certify that Newton iterations will converge quadratically to solutions to a square polynomial system.  ...  The program alphaCertified implements algorithms based on α-theory to certify solutions of polynomial systems using both exact rational arithmetic and arbitrary precision floating point arithmetic.  ...  Acknowledgements The authors would like to thank Mike Shub for his helpful comments and the first author would like to thank the organizers of the Foundations of Computational Mathematics thematic program  ... 
doi:10.1145/2331130.2331136 fatcat:ggckwfujb5evnhirfa5x52sq5a

alphaCertified: certifying solutions to polynomial systems [article]

Jonathan D. Hauenstein, Frank Sottile
2011 arXiv   pre-print
Smale's alpha-theory uses estimates related to the convergence of Newton's method to give criteria implying that Newton iterations will converge quadratically to solutions to a square polynomial system  ...  The program alphaCertified implements algorithms based on alpha-theory to certify solutions to polynomial systems using both exact rational arithmetic and arbitrary precision floating point arithmetic.  ...  Acknowledgements The authors would like to thank Mike Shub for his helpful comments and the first author would like to thank the organizers of the Foundations of Computational Mathematics thematic program  ... 
arXiv:1011.1091v2 fatcat:s64zub5cnnf5fevmuhsj2rudhm

Bit retrieval: intractability and application to digital watermarking [article]

Veit Elser
2003 arXiv   pre-print
Bit retrieval, the problem of determining a binary sequence from its cyclic autocorrelation, is a special case of the phase retrieval problem.  ...  This algorithm still has exponential complexity and motivates us to propose a new public key signature scheme based on the intractability of bit retrieval, and image watermarking as a possible application  ...  Linear transformations σ −1 and σ −1 0 , corresponding to the inverse Fourier transform, are defined in the sense of the Moore-Penrose pseudoinverse: σ −1 := σ † · (σ · σ † ) −1 = 1 N σ † (6) σ −1 0 :=  ... 
arXiv:math/0309387v1 fatcat:mzcluscvknhh5deytsuxmeiv54

On using the complex step method for the approximation of Fréchet derivatives of matrix functions in automorphism groups [article]

Tom Werner
2021 arXiv   pre-print
We show, that the complex step approximation Im(f(A+ihE))/h to the Fréchet derivative of matrix functions f:ℝ^m,n→ℝ^m,n is applicable to the matrix sign, square root and polar mapping using iterative schemes  ...  While this property was already discovered for the matrix sign using Newtons method, we extend the research to the family of Padé iterations, that allows us to introduce iterative schemes for finding function  ...  To conclude the section, we compare a direct and an iterative approach for computing the Fréchet derivative of any of the functions.  ... 
arXiv:2112.06786v1 fatcat:zcv7r2ku45bwviqetw2vwg7lfy

Verification for Machine Learning, Autonomy, and Neural Networks Survey [article]

Weiming Xiang and Patrick Musau and Ayana A. Wild and Diego Manzanas Lopez and Nathaniel Hamilton and Xiaodong Yang and Joel Rosenfeld and Taylor T. Johnson
2018 arXiv   pre-print
article presents a survey of many of these recent approaches.  ...  Recently, the formal methods and formal verification community has developed methods to characterize behaviors in these LECs with eventual goals of formally verifying specifications for LECs, and this  ...  Their approach makes use of output feedback control defined by the Moore-Penrose pseudoinverse and state feedback control laws using a high gain observer.  ... 
arXiv:1810.01989v1 fatcat:a5ax66lsxbho3fuxuh55ypnm6m

An enhanced predictive hierarchical power management framework for islanded microgrids

Jimiao Zhang, Jie Li, Ning Wang, Ben Wu
2021 IET Generation, Transmission & Distribution  
The primary control takes care of instantaneous system fluctuations due to loads and renewable energy sources (RESs) and allows for a realtime power balancing and sharing among distributed generators (  ...  This paper proposes an enhanced three-layer predictive hierarchical power management framework for secure and economic operation of islanded microgrids.  ...  covariances, and P * x k|k represents propagated state estimate error covariance matrix. † denotes the Moore-Penrose pseudoinverse of a matrix [40] , and P x k|k is the updated covariance matrix of state  ... 
doi:10.1049/gtd2.12297 fatcat:2t2qlplb7re27hj4rob6ybjaqa

Which Reference Should We Use for EEG and ERP practice?

Dezhong Yao, Yun Qin, Shiang Hu, Li Dong, Maria L. Bringas Vega, Pedro A. Valdés Sosa
2019 Brain Topography  
A thorough discussion of the advantages and limitations of references is provided with recommendations in the hope to clarify the role of each reference in the ERP and EEG practice.  ...  We also note from (Hu et al. 2019) that there is a general form for the reference problem, the 'no memory' property of the unipolar references, and a unified estimator for the potentials at infinity termed  ...  Acknowledgements This study was funded by the National Natural Science Foundation of China (Grant Nos. 81861128001; 61871105), and the 111 project B12027. Thank Makoto Miyakoshi and Thomas  ... 
doi:10.1007/s10548-019-00707-x pmid:31037477 pmcid:PMC6592976 fatcat:gtpecqzw7vcihfm7fxjxypbnk4

Derivative pricing based on local utility maximization

Jan Kallsen
2002 Finance and Stochastics  
We also introduce the sensitivity process of a contingent claim. This process quantifies the reliability of the neutral derivative price and it can be used to construct price bounds.  ...  This paper discusses a new approach to contingent claim valuation in general incomplete market models.  ...  Acknowledgements Parts of this paper are based on parts of my doctoral dissertation. I want to thank my advisor Prof. Ernst Eberlein for his support.  ... 
doi:10.1007/s780-002-8403-x fatcat:axq7y64qorawjnyuianugdeehu

Randomized Iterative Methods for Linear Systems: Momentum, Inexactness and Gossip [article]

Nicolas Loizou
2019 arXiv   pre-print
A large part of the thesis is also devoted to the development of efficient methods for obtaining average consensus on large scale networks.  ...  In the last decade there has been a surge in the demand from practitioners, in fields such as machine learning, computer vision, artificial intelligence, signal processing and data science, for new methods  ...  By † we denote the Moore-Penrose pseudoinverse.  ... 
arXiv:1909.12176v1 fatcat:f56ttz5wlzd4bna5fka4glcejq

Model reduction of dynamical systems on nonlinear manifolds using deep convolutional autoencoders [article]

Kookjin Lee, Kevin Carlberg
2019 arXiv   pre-print
In addition, we propose a computationally practical approach for computing the nonlinear manifold, which is based on convolutional autoencoders from deep learning.  ...  Unfortunately, restricting the state to evolve in a linear subspace imposes a fundamental limitation to the accuracy of the resulting reduced-order model (ROM).  ...  After the nonlinearity, a pooling function is typically applied to the output, extracting a statistical summary of the neighboring units of the output at certain locations.  ... 
arXiv:1812.08373v3 fatcat:4c2okiwzmbejnewrc6mzkv34di

From model-based control to data-driven control: Survey, classification and perspective

Zhong-Sheng Hou, Zhuo Wang
2013 Information Sciences  
This paper is a brief survey on the existing problems and challenges inherent in modelbased control (MBC) theory, and some important issues in the analysis and design of data-driven control (DDC) methods  ...  The necessity of data-driven control is discussed from the aspects of the history, the present, and the future of control theories and applications.  ...  The first author of this paper would like to thank the National Science Foundation of China for their invitation to present talks on this topic in seminars held in November 2008 and November 2010.  ... 
doi:10.1016/j.ins.2012.07.014 fatcat:hx3tfm56unebbps3qlax7rmsfi

4 Some Control-Theoretic Examples [chapter]

2018 The Control Systems Handbook  
transpose of A ∈ C n×m A + the Moore-Penrose pseudoinverse of A A the spectral norm of A (i.e., the matrix norm subordinate to the Euclidean vector norm: A = max x 2 =1 Ax 2 ) diag (a 1 , . . . , a n  ...  The iterative computation of the H ∞ norm, which can be carried out efficiently using a bisection search over γ, is to be expected given that by definition we must search for the largest value of σ max  ...  Thus, the H ∞ controller does not have a separation structure that is analogous to that of the H 2 controller.  ... 
doi:10.1201/b10384-147 fatcat:m3bdoincxraurlrxxaw4xez37m
« Previous Showing results 1 — 15 out of 52 results