Using virtue of an inequality and some analysis techniques, we give a sufficiency and necessity condition on convergencon the modification Ishikawa iterative process with errors for uniformly asymptotically pseudocontractive mappings in Banach space, The results improve, extend, and include some recent results due to Zhang shi-sen Liu Q H etc.
{"title":"A Sufficiency and Necessity Condition on Convergence of Ishikawa Iterative Process for Asymptotically Pseudocontractive Mapping","authors":"Hongshan Du, Guanglan Wang","doi":"10.1109/CSO.2010.10","DOIUrl":"https://doi.org/10.1109/CSO.2010.10","url":null,"abstract":"Using virtue of an inequality and some analysis techniques, we give a sufficiency and necessity condition on convergencon the modification Ishikawa iterative process with errors for uniformly asymptotically pseudocontractive mappings in Banach space, The results improve, extend, and include some recent results due to Zhang shi-sen Liu Q H etc.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123858217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a no monotone conjugate gradient method for nonlinear optimization is proposed. Under weaker assumption on search direction dk and the mild assumptions on objective function f, the global convergence of the method is established.
{"title":"A Nonmonotone Conjugate Gradient Method for Nonlinear Optimization","authors":"Ying Song, Liying Liu","doi":"10.1109/CSO.2010.218","DOIUrl":"https://doi.org/10.1109/CSO.2010.218","url":null,"abstract":"In this paper, a no monotone conjugate gradient method for nonlinear optimization is proposed. Under weaker assumption on search direction dk and the mild assumptions on objective function f, the global convergence of the method is established.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we analyzed ``St. Louis Risk Research Data'', which has a general missing pattern and conclude that the parental psychological disorders have significant effects on various aspects of the development of their children, specifically, the effects on the first child might be bigger than the second child.
在本文中,我们分析了St。Louis Risk Research Data),该研究发现了一个普遍缺失的模式,并得出结论,父母的心理障碍对孩子发展的各个方面都有显著影响,特别是对第一个孩子的影响可能比第二个孩子更大。
{"title":"Missing Data Analysis of St. Louis Risk Research Data","authors":"Xue Zhao","doi":"10.1109/CSO.2010.89","DOIUrl":"https://doi.org/10.1109/CSO.2010.89","url":null,"abstract":"In this paper, we analyzed ``St. Louis Risk Research Data'', which has a general missing pattern and conclude that the parental psychological disorders have significant effects on various aspects of the development of their children, specifically, the effects on the first child might be bigger than the second child.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121451978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a stochastic-combination search direction method for monotone variational inequality (VI) problems. Existing methods are developed with regard to one or some of the specified characteristics of the VI problem, but few of them are designed to solve all types of the VI problems. To investigate a more flexible method, which may perform fast convergence for all monotone VI problems, a new stochastic search direction is proposed in this paper. Such a search direction is a stochastic combination of two profitable search directions via two random weighting parameters. At each iteration, a best search direction together with its step size is selected in order to obtain a maximal progress of such iteration. The descent proposition of the stochastic direction is proved, which is useful to guarantee the convergence. Numerical examples are provided to show the efficiency of the proposed new solution algorithm. It is shown that the stochastic search direction is better than either or both of the other two search directions among a majority of the iterations. Therefore, it has the potential to achieve a faster convergence rate.
{"title":"Stochastic-Combination Search Direction Method for Monotone Variational Inequality Problems","authors":"H. Shao, Guodong Wang","doi":"10.1109/CSO.2010.14","DOIUrl":"https://doi.org/10.1109/CSO.2010.14","url":null,"abstract":"This paper proposes a stochastic-combination search direction method for monotone variational inequality (VI) problems. Existing methods are developed with regard to one or some of the specified characteristics of the VI problem, but few of them are designed to solve all types of the VI problems. To investigate a more flexible method, which may perform fast convergence for all monotone VI problems, a new stochastic search direction is proposed in this paper. Such a search direction is a stochastic combination of two profitable search directions via two random weighting parameters. At each iteration, a best search direction together with its step size is selected in order to obtain a maximal progress of such iteration. The descent proposition of the stochastic direction is proved, which is useful to guarantee the convergence. Numerical examples are provided to show the efficiency of the proposed new solution algorithm. It is shown that the stochastic search direction is better than either or both of the other two search directions among a majority of the iterations. Therefore, it has the potential to achieve a faster convergence rate.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A basic problem in computer vision is to recover the projective structure of a set of 3D points from its 2D images. It is known that 3D projective invariants of six points can be computed from three uncalibrated view images. In the previous method, three homogeneous polynomial equations in four variables relating the geometry of the six 3D points and their 2D projections were derived first. Then an eighth degree polynomial equation in single variable was derived by means of the classical resultant technique. Numerical method was applied to obtain an equation of a third degree. So the form of the equation is implicit and hard to apply in real applications. This paper adopts a novel method to eliminate variables. A third degree polynomial equation in single variable is derived symbolically. The equation is presented in explicit form. It can be used in real applications directly.
{"title":"The Projective Invariants of Six 3D Points from Three 2D Uncalibrated Images","authors":"Yuanbin Wang, Bin Zhang, F. Hou","doi":"10.1109/CSO.2010.49","DOIUrl":"https://doi.org/10.1109/CSO.2010.49","url":null,"abstract":"A basic problem in computer vision is to recover the projective structure of a set of 3D points from its 2D images. It is known that 3D projective invariants of six points can be computed from three uncalibrated view images. In the previous method, three homogeneous polynomial equations in four variables relating the geometry of the six 3D points and their 2D projections were derived first. Then an eighth degree polynomial equation in single variable was derived by means of the classical resultant technique. Numerical method was applied to obtain an equation of a third degree. So the form of the equation is implicit and hard to apply in real applications. This paper adopts a novel method to eliminate variables. A third degree polynomial equation in single variable is derived symbolically. The equation is presented in explicit form. It can be used in real applications directly.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to obtain a new steering control structure for vehicles equipped with four-wheel steering system, a linear model of the lateral dynamics is used in this paper. By introducing vehicle sideslip control and yaw rate control decoupling, a more accurate sideslip and yaw rate controller is used for lateral dynamics model of four-wheel steering vehicle, the sideslip and yaw rate controller is based on a linear multivariable combined with lateral dynamics model and the front and rear steering angles. For illustration, a simulation example is utilized to show the robustness of the new designed controller. Empirical results show that the controller based on partial decoupling design has good robustness. The four-wheel steering system with good handling robustness stability can effectively restrain exoteric lateral interference and thus active rolling handling control and tracking performance are solved.
{"title":"Control Strategy for Four-Wheel Steering Vehicle Handling Stability Based on Partial Decoupling Design","authors":"Bin Yang, M. Wan, Q. Sun","doi":"10.1109/CSO.2010.67","DOIUrl":"https://doi.org/10.1109/CSO.2010.67","url":null,"abstract":"In order to obtain a new steering control structure for vehicles equipped with four-wheel steering system, a linear model of the lateral dynamics is used in this paper. By introducing vehicle sideslip control and yaw rate control decoupling, a more accurate sideslip and yaw rate controller is used for lateral dynamics model of four-wheel steering vehicle, the sideslip and yaw rate controller is based on a linear multivariable combined with lateral dynamics model and the front and rear steering angles. For illustration, a simulation example is utilized to show the robustness of the new designed controller. Empirical results show that the controller based on partial decoupling design has good robustness. The four-wheel steering system with good handling robustness stability can effectively restrain exoteric lateral interference and thus active rolling handling control and tracking performance are solved.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The road traffic flow evolutionary patterns of metropolitan areas evolve slowly through a complex multi-dimensional travel decision-making behavior (including travel mode, departure time and route choice joint decision-making). How to forecast the long run evolutionary trend of traffic flow on the entire network? Does the traffic evolution track converge to equilibrium? If it can, what’s the condition should be satisfied? And what’s the relationship between trip costs and traffic flow evolutionary patterns? In order to answer these related questions, this paper aims at the general travel behavioral decision-making process, a novel dynamical systems formulation of the traffic assignment problem using evolutionary game theory is proposed. The assumptions on drivers’ behavior in multi-dimensional travel choice are supposed to be fairly general and reasonable. And the stable properties of this dynamical system on its equilibrium points are investigated using Lyapunov method in a general network. It shows that the evolutionary dynamical system exist only one solution on the condition that the traveler population satisfies some hypotheses which individual’s trip payoff satisfy some constraint conditions. These means that there maybe exist inherent motive power which drive the traffic flow evolve to some stable patterns from long run view point. It can improve our understandings to urban traffic flow evolution process and provide significant reference for relevant management section.
{"title":"Evolutionary Analysis on the Dynamical Systems of Travel Behavioral Decision-Making","authors":"Xing-Guang Chen, Jing Zhou, Zhuojun Li, S. Huang","doi":"10.1109/CSO.2010.44","DOIUrl":"https://doi.org/10.1109/CSO.2010.44","url":null,"abstract":"The road traffic flow evolutionary patterns of metropolitan areas evolve slowly through a complex multi-dimensional travel decision-making behavior (including travel mode, departure time and route choice joint decision-making). How to forecast the long run evolutionary trend of traffic flow on the entire network? Does the traffic evolution track converge to equilibrium? If it can, what’s the condition should be satisfied? And what’s the relationship between trip costs and traffic flow evolutionary patterns? In order to answer these related questions, this paper aims at the general travel behavioral decision-making process, a novel dynamical systems formulation of the traffic assignment problem using evolutionary game theory is proposed. The assumptions on drivers’ behavior in multi-dimensional travel choice are supposed to be fairly general and reasonable. And the stable properties of this dynamical system on its equilibrium points are investigated using Lyapunov method in a general network. It shows that the evolutionary dynamical system exist only one solution on the condition that the traveler population satisfies some hypotheses which individual’s trip payoff satisfy some constraint conditions. These means that there maybe exist inherent motive power which drive the traffic flow evolve to some stable patterns from long run view point. It can improve our understandings to urban traffic flow evolution process and provide significant reference for relevant management section.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lidong He, Weichang Shen, Yongjin Li, Anlei Shi, D. Zhao
This paper outlines the MPI+OpenMPprogramming model, and implements the matrix multiplication based on rowwise and columnwise block-striped decomposition of the matrices with MPI+OpenMPprogramming model in the multi-core cluster system. Experimental results show that the running time of the parallel algorithm is reduced significantly. By further analyzing the running results, the running time is reduced obviously once again
{"title":"MPI+OpenMP Implementation and Results Analysis of Matrix Multiplication Based on Rowwise and Columnwise Block-Striped Decomposition of the Matrices","authors":"Lidong He, Weichang Shen, Yongjin Li, Anlei Shi, D. Zhao","doi":"10.1109/CSO.2010.123","DOIUrl":"https://doi.org/10.1109/CSO.2010.123","url":null,"abstract":"This paper outlines the MPI+OpenMPprogramming model, and implements the matrix multiplication based on rowwise and columnwise block-striped decomposition of the matrices with MPI+OpenMPprogramming model in the multi-core cluster system. Experimental results show that the running time of the parallel algorithm is reduced significantly. By further analyzing the running results, the running time is reduced obviously once again","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122886103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to characteristics of bracing engineering for deep foundation pit in metro, an index system for supporting scheme is established. Using the theory of fuzzy probability and analytic hierarchy process (AHP), a comprehensive assessment model is constructed to optimize supporting scheme for deep excavation of metro. In order to assess the index weights scientifically, the fuzzy weighted value is proposed to avoid the limitation while determining the index weights. The practical example, with 4 supporting schemes for deep foundation pit of metro in Guangzhou, is introduced and compared to the results obtained by other methods. The method is based on clear concept and rigorous theories, and can be applied extensively to obtain objective and dependable result for the managers of civil engineering.
{"title":"Fuzzy Probability Theory-Based Optimization Scheme for Deep Foundation Pit of Metro","authors":"Zhangjun Liu, Yaolong Lei, Min Xiong","doi":"10.1109/CSO.2010.22","DOIUrl":"https://doi.org/10.1109/CSO.2010.22","url":null,"abstract":"According to characteristics of bracing engineering for deep foundation pit in metro, an index system for supporting scheme is established. Using the theory of fuzzy probability and analytic hierarchy process (AHP), a comprehensive assessment model is constructed to optimize supporting scheme for deep excavation of metro. In order to assess the index weights scientifically, the fuzzy weighted value is proposed to avoid the limitation while determining the index weights. The practical example, with 4 supporting schemes for deep foundation pit of metro in Guangzhou, is introduced and compared to the results obtained by other methods. The method is based on clear concept and rigorous theories, and can be applied extensively to obtain objective and dependable result for the managers of civil engineering.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.
{"title":"A Secure Virtual Verification Model for Wireless Sensor Network","authors":"Yang Li, Yingjie Xia, Guo-hua Zhan","doi":"10.1109/CSO.2010.78","DOIUrl":"https://doi.org/10.1109/CSO.2010.78","url":null,"abstract":"the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}