4,212 results on '"Academy of Mathematics '
Search Results
152. On Dirichet L-Series with the Character Modulus Equal to the Power of a Prime Number
- Author
-
Postnikov, A. G.; Institute of Mathematics, U.S.S.R. Academy of Scienoes, Moscow and Postnikov, A. G.; Institute of Mathematics, U.S.S.R. Academy of Scienoes, Moscow
- Abstract
It is a wellknown fact that the definition and properties of the index are analogous to those of the logarithmic function.
- Published
- 1956
153. Управление проектами и развитием организаций
- Author
-
Bilokon, A. I.; Department of Planning and Organization of Production, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», Trifonov, I. V.; Department of Planning and Organization of Production, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», Iliev, I. M.; Department of Applied Mathematics, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», Khamryk, A. V.; Ltd «Startline», Bilokon, A. I.; Department of Planning and Organization of Production, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», Trifonov, I. V.; Department of Planning and Organization of Production, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», Iliev, I. M.; Department of Applied Mathematics, State Higher Education Establishment «Pridneprovsk State Academy of Civil Engineering and Architecture», and Khamryk, A. V.; Ltd «Startline»
- Abstract
Сформировать целостное представление о системах управления поддерживающих развитие организаций с помощью проектов.Методика. Создавая товары и услуги, организации удовлетворяют наши потребности. В системном подходе организацию рассматривают как совокупность взаимосвязанных элементов. Люди, цели, структура, задачи, технологии – это переменные внутренней среды организации. К факторам внешнего окружения, которые влияют на организацию, можно отнести: поставщиков; трудовые ресурсы; законы; нормы; госрегулирование и т. д. Косвенное воздействие оказывают такие факторы, как: состояние экономики; научно-технические достижения; часть располагаемого дохода; культурные и политические изменения; влияние групповых интересов и др. Все изменения всегда начинаются за переделами организации (во внешней среде), поэтому менеджменту организаций необходимо уметь выявлять существенные факторы в окружении, которые повлияют на организацию и с помощью эффективной реализации проектов и программ, осуществлять изменения внутри себя.Результаты. В статье предложено решение задачи – создание поддерживающей системы для непрерывных улучшений деятельности организаций с помощью проектов. Научная новизна. Каждая организация, чтобы эффективно существовать, должна добавить управление изменениями к своей структуре. Для этого организациям потребуется создать необходимую среду, инициирующую и поддерживающую политику перемен. Предложенные направления развития внутренней среды организации позволяют создать систему для постоянных непрерывных улучшений на основе проектов.Практическая значимость. Предложенная в работе поддерживающая система поможет связать организацию, подчинить все имеющиеся ресурсы главной цели, сделать её конкурентной, способной создавать продукт с новыми потребительскими ценностями., Мета. Сформувати цілісне уявлення про системи управління що підтримують розвиток організацій за допомогою проектів. Методика. Створюючи товари та послуги організації задовольняють наші потреби. У системному підході організацію розглядають як сукупність взаємопов'язаних елементів. Люди, цілі, структура, завдання, технології – це змінні внутрішнього середовища організації. До факторів зовнішнього оточення, які впливають на організацію можна віднести: постачальників; трудові ресурси; закони; норми; держрегулювання і т. д. Непрямий вплив надають такі чинники, як: стан економіки; науково-технічні досягнення; частина наявного доходу; культурні та політичні зміни; вплив групових інтересів та ін. Всі зміни завжди починаються за переділами організації (у зовнішньому середовищі), тому менеджменту організацій необхідно вміти виявляти істотні фактори в оточенні, які вплинуть на організацію і за допомогою ефективної реалізації проектів і програм, здійснювати зміни всередині себе.Результати. У статті запропоновано вирішення завдання – створення підтримуючої системи для безперервних поліпшень діяльності організацій за допомогою проектів.Наукова новизна. Кожна організація, щоб ефективно існувати, повинна додати управління змінами до своєї структури. Для цього організаціям потрібно створити необхідну середу, що ініціює та підтримує політику змін. Запропоновані напрями розвитку внутрішнього середовища організації дозволяють створити систему для постійних безперервних поліпшень на основі проектів. Практична значимість. Запропонована в роботі підтримуюча система допоможе зв'язати організацію, підпорядкувати всі наявні ресурси головної мети, зробити її конкурентною, здатної створювати продукт з новими споживчими цінностями, Goal. Develop a holistic view of management systems supporting the development of organizations through projects. Methods. Creating products and services, the organizations satisfy our needs. The systematic approach considers the organization as a set of interrelated elements. People, goals, structure, tasks, technology are the variables of the internal environment of the organization. The factors of the external environment, which affect the organization, include: suppliers; human resources; laws; regulations; government regulation, etc. The indirect effect is performed by such factors as: the state of the economy; scientific technological advances; part of disposable income; cultural and political changes; the impact of group interest and others. All changes always start from outside of the organization (in the outer environment), so that the organization's management must be able to identify significant factors in the environment that will affect the organization and through effective implementation of projects and programs to implement the changes within themselves.Results. The article provides a solution to the problem, the creation of support systems for the continuous improvements of the organization activities with the help of the projects.Scientific novelty. Each organization, to be effective, must include the change management into its structure. To do this, organizations need to create the necessary environment which is initiating and supporting the policy of changes. The proposed directions of the internal environment development of the organization allow create a system for the permanent continuous improvements based on projects.Practical significance. Proposed in the work supporting system will help to bind the organization, to subordinate all available resources to the main goal, to make it competitive and able to create a product with new consumer values.
154. Tokamak magneto-hydrodynamics and reference magnetic coordinates for simulations of plasma disruptions
- Author
-
Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190, China]
- Published
- 2015
- Full Text
- View/download PDF
155. Cryptographic Protocols
- Author
-
Teşeleanu, George, Simion Stoilow Institute of Mathematics of the Romanian Academy, Simion Stoilow Institute of Mathematics of the Romanian Academy (Roumanie), Ferucio Laurentiu Tiplea, and Teseleanu, George
- Subjects
quasigroups ,bias amplifiers ,recreational cryptography ,signature scheme ,kleptographic attacks ,proof-of-knowledge protocol ,health tests ,constant blinding ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,substitution permutation network ,co-signing protocol ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,identity based encryption ,cryptography ,lightweight authentication protocol ,stream cipher ,quadratic residues ,SETUP attacks ,Grain cipher ,hash channels ,legally fair contract signing protocol ,zero-knowledge protocols ,Hill cipher ,random numbers generators ,cryptographie ,slide attacks - Abstract
Influenced by the plethora of concepts a cryptographer has to manage, in this work we touch on different areas of cryptography and we either take the role of the designer or of the attacker. By presenting both sides of the same coin, we wish that the reader will start to appreciate the beauty of this puzzling science and will begin to see the relationships that arise between seemingly different concepts. We further present a brief synopsis of the seven main chapters contained in this work. One of the most difficult things about structuring this work was the interdependency of some of the chapters. We have tried to present the material in this thesis in a logical and natural order. Without further ado, here is the thesis outline.Chapter 2 tackles secret key cryptography and is split into three parts. The first part analyses the security of the (affine) Hill cipher and their corresponding modes of operation. Definitions and background information are presented in Section 2.1.1. The core of the first part consists of Sections 2.1.2 and 2.1.3 that contain several key ranking functions and ciphertext only attacks. Experimental results are provided in Section 2.1.4 and some possible research directions are given in Section 2.1.5. The letter frequencies and the Vigenère attack used in Section 2.1.4 are given in Appendices A and B. Some possible methods for increasing the brute-force complexity for the Grain family of stream ciphers are presented in the second part of this chapter. We introduce notations and give a quick reminder of the Grain family technical specifications in Section 2.2.1. Section 2.2.2 describes generic attacks against the Grain ciphers. In Section 2.2.3 we provide the reader with a security analysis of IV padding schemes for Grain ciphers. We underline various interesting ideas as future work in Section 2.2.4. We recall Grain v1 in Appendix C, Grain-128 in Appendix D and Grain-128a in Appendix E. We do not recall the corresponding parameters of Grain v0, even though the results presented in this section still hold in that case. In Appendices F and G we provide test values for our proposed algorithms. The last part of this chapter studies the effect of using quasigroups isotopic to groups when designing SPNs. Hence, prerequisites are given in Section 2.3.1. An SPN generalization is introduced in Section 2.3.2 and its security is studied in Section 2.3.3.In Chapter 3 we discuss several public key protocols and some of their applications. The first part introduces several hardness assumptions necessary for proving the protocols' security. Zero-knowledge protocols are studied in the second part of this chapter. Therefore, we recall zero-knowledge concepts in Section 3.2.1. Inspired by Maurer's Unified-Zero Knowledge construction, in Section 3.2.2 we introduce a Unified Generic Zero-Knowledge protocol and prove it secure. We provide the reader with various special cases of UGZK in Section 3.2.3. A hash variant of our core protocol is tackled in Section 3.2.4 together with its security analysis. As a possible application for UGZK, in Section 3.2.5 we describe a lightweight authentication protocol, discuss security and complexity aspects and present implementation trade-offs which arise from small variations of the proposed result. In Section 3.2.6 we underline future work proposals. The third part of this chapter contains a signature scheme inspired by Maurer's UZK paradigm. The necessary prerequisites are given in Section 3.3.1 and the exact details of the UDS signature are provided in Section 3.3.2. An application for UDS is given in the fourth part of this chapter. More precisely, after introducing preliminaries in Section 3.4.1, we introduce a co-signing protocol built on the legally fair contract signing protocol of Ferradi et. al in Section 3.4.2. We discuss some related open problems in Section 3.4.3. Two public key encryption schemes are presented in the fifth part. In Section 3.5.1 we introduce definitions, security assumptions and schemes used throughout the section. First we introduce in Section 3.5.2 a slight modification of the generalized ElGamal encryption scheme, that will be used in a subsequent chapter. Then, inspired by the Joye-Libert PKE scheme and aiming at obtaining a relevant generalization, in Section 3.5.3 we propose a new scheme based on $2^k$ residues, prove it secure in the standard model and analyze its performance compared to other related cryptosystems. Future work is presented in Section 3.5.3.5 and in Appendix H we present some optimized decryption algorithms for our proposed scheme. The final part of this chapter provides the reader with an application of our Joye-Libert based scheme to biometric authentication. Thus, definitions and security requirements are presented in Section 3.6.1, while our proposed authentication protocol is described in Section 3.6.2.Some useful results for understating the security of Cocks' identity based encryption and of certain variations of it are provided in Chapter 4. Basic notions and Cocks' scheme are presented in the first part of the chapter. The second part considers sets of the form $a+X=\{(a+x)\bmod n\mid x\in X\}$, where $n$ is a prime or the product of two primes $n=pq$ and $X$ is a subset of $\mathbb Z_n^*$ whose elements have some given Jacobi symbols modulo prime factors of $n$. The third part of the chapter points out two applications of the previously mentioned results. The first one provides the reader with a deep analysis of some distributions related to Cocks' IBE scheme and Galbraith's test, providing thus rigorous proofs for Galbraith's test. The second application discussed, relates to the computational indistinguishability of some distributions used for proving the security of certain variations of Cocks' IBE. We were able to prove statistical indistinguishability of those distributions without any hardness assumption. The chapter concludes with Section 4.4.An unconventional method for backdooring cryptographic systems is studied in Chapter 5. The basic notions about kleptographic attacks are given in Section 5.1. The first part of this chapter deal with a threshold kleptographic attack that can be implemented in the generalized ElGamal signature. Thus, in Section 5.2.1 we describe a simplified attack on the generalized ElGamal signature and then extended it in Section 5.2.2. A series of signatures that support the implementation of our attack are provided in Section 5.2.3. Future work is presented in Section 5.2.4 and a two-party malicious signing protocol is presented in Appendix I. We provide a supplementary kleptographic mechanism in Appendix J. A method for infecting Maurer's UZK protocol is studied in the second part of this chapter. In Sections 5.3.1 and 5.3.2 we present our new general kleptographic attacks and prove them secure. Instantiations of our attacks can be found in Section 5.3.3. Some possible research directions are given in Section 5.3.4. In the third part, we introduce a subscription based marketing model suitable for selling infected devices. Hence, some additional preliminaries are given in Section 5.4.1. Based on the ElGamal encryption algorithm, a series of kleptographic subscriptions that fit different scenarios are provided in Sections 5.4.2 to 5.4.4. We discuss some open problems in Section 5.4.5. Hash channels are tackled in the last part of the chapter. By adapting and improving Wu's mechanism we introduce new hash channels in Section 5.5.1. A series of experiments are conducted in Section 5.5.2, while several applications are provided in Section 5.5.3.In Chapter 6 we study (pseudo)-random numbers generators. The first part of the chapter deals with Adobe Flash Player's vulnerability in the pseudo-random number generator used for constant blinding. We introduce the necessary prerequisites in Section 6.1.1. The core of our seed recovering mechanism consists of Sections 6.1.2 and 6.1.3 and contains a series of algorithms for inverting a generalized version of the hash function used by the Flash Player. Experimental result are given in Section 6.1.4. Supplementary algorithms may be found in Appendix K. The second part contain an architecture that can be used to implement health tests for random numbers generator. Definitions and background information are presented in Section 6.2.1. Two classes of digital filters that amplify existing biases are described in Sections 6.2.2 and 6.2.3. Some possible applications are given in Section 6.2.4. In Section 6.2.5 we apply our proposed architecture to broken Bernoulli noise sources and present some experimental results. The theoretical model is provided in Section 6.2.6. Some finer measurements are provided in Section 6.2.7. In Section 6.2.8 we underline future work proposals.Chapter 7 contains several protocols that fall in the category of recreational cryptography. Thus, in Section 7.1 we describe various schemes which aim at solving Yao's millionaires' problem and provide the reader with their corresponding security analyses. In Section 7.2 we present a set of protocols which act as solutions for comparing information without revealing it and discuss their security. In Section 7.3 we describe a public key cryptosystem constructed by means of an electrical scheme and tackle its security. In Appendix L we recall various physical cryptographic solutions which appeared in the literature, while in Appendix M we present a generic physical public key encryption scheme useful for introducing students to different properties of physical systems., Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'il commence à voir les relations qui existent entre des concepts apparemment différents. Nous présentons ensuite un bref synopsis des sept principaux chapitres contenus dans cet ouvrage. L'interdépendance de certains chapitres a été l'un des aspects les plus difficiles de la structuration de cet ouvrage. Nous avons essayé de présenter le matériel de cette thèse dans un ordre logique et naturel. Sans plus attendre, voici le plan de la thèse.Le chapitre 2 aborde la cryptographie à clé secrète et est divisé en trois parties. La première partie analyse la sécurité du chiffrement de Hill (affine) et les modes d'opération correspondants. Les définitions et les informations de base sont présentées dans la section 2.1.1. Le cœur de la première partie est constitué des sections 2.1.2 et 2.1.3 qui contiennent plusieurs fonctions de classement des clés et des attaques sur le texte chiffré uniquement. Les résultats expérimentaux sont présentés dans la section 2.1.4 et certaines directions de recherche possibles sont données dans la section 2.1.5. Les fréquences des lettres et l'attaque Vigen\`ere utilisée dans la Section 2.1.4 sont données dans les Annexes A et B. Certaines méthodes possibles pour augmenter la complexité de la force brute pour la famille de chiffrement de Grain sont présentées dans la deuxième partie de ce chapitre. La section 2.2.1 présente les notations et donne un bref rappel des spécifications techniques de la famille Grain. La Section 2.2.2 décrit les attaques génériques contre les ciphers Grain. Dans la section 2.2.3, nous fournissons au lecteur une analyse de sécurité des schémas de remplissage IV pour les chiffrements Grain. Dans la section 2.2.4, nous soulignons diverses idées intéressantes pour les travaux futurs. Nous rappelons Grain v1 dans l'annexe C, Grain-128 dans l'annexe D et Grain-128a dans l'annexe E. Nous ne rappelons pas les paramètres correspondants de Grain v0, même si les résultats présentés dans cette section sont toujours valables dans ce cas. Dans les annexes F et G, nous fournissons des valeurs de test pour nos algorithmes proposés. La dernière partie de ce chapitre étudie l'effet de l'utilisation de quasigroupes isotopiques aux groupes lors de la conception de SPNs. Les conditions préalables sont donc données dans la section 2.3.1. Une généralisation des SPN est présentée à la section 2.3.2 et sa sécurité est étudiée à la section 2.3.3.Dans le chapitre 3, nous discutons de plusieurs protocoles à clé publique et de certaines de leurs applications. La première partie présente plusieurs hypothèses de dureté nécessaires pour prouver la sécurité des protocoles. Les protocoles à connaissance nulle sont étudiés dans la deuxième partie de ce chapitre. Par conséquent, nous rappelons les concepts de connaissance zéro dans la section 3.2.1. Inspirés par la construction de la connaissance nulle unifiée de Maurer, nous présentons dans la section 3.2.2 un protocole générique unifié à connaissance nulle et prouvons sa sécurité. Nous présentons au lecteur divers cas particuliers de UGZK dans la section 3.2.3. Une variante de hachage de notre protocole de base est abordée à la section 3.2.4, ainsi que son analyse de sécurité. En tant qu'application possible de UGZK, nous décrivons dans la section 3.2.5 un protocole d'authentification léger, discutons des aspects de sécurité et de complexité et présentons les compromis de mise en œuvre qui découlent de petites variations du résultat proposé. Dans la section 3.2.6, nous soulignons les propositions de travaux futurs. La troisième partie de ce chapitre contient un schéma de signature inspiré du paradigme UZK de Maurer. Les conditions préalables nécessaires sont données dans la section 3.3.1 et les détails exacts de la signature UDS sont fournis dans la section 3.3.2. Une application d'UDS est donnée dans la quatrième partie de ce chapitre. Plus précisément, après avoir présenté les préliminaires dans la section 3.4.1, nous présentons un protocole de cosignature basé sur le protocole de signature de contrat légalement équitable de Ferradi et al. dans la section 3.4.2. La section 3.4.3 aborde certains problèmes connexes ouverts. Deux schémas de chiffrement à clé publique sont présentés dans la cinquième partie. Dans la Section 3.5.1, nous introduisons les définitions, les hypothèses de sécurité et les schémas utilisés tout au long de la section. Dans la section 3.5.2, nous présentons d'abord une légère modification du schéma de chiffrement ElGamal généralisé, qui sera utilisé dans un chapitre ultérieur. Ensuite, en s'inspirant du schéma PKE de Joye-Libert et en cherchant à obtenir une généralisation pertinente, nous proposons dans la Section 3.5.3 un nouveau schéma basé sur des résidus $2^k$, nous prouvons qu'il est sûr dans le modèle standard et nous analysons ses performances par rapport à d'autres cryptosystèmes connexes. Les travaux futurs sont présentés dans la section 3.5.3.5 et dans l'annexe H, nous présentons quelques algorithmes de décryptage optimisés pour notre schéma proposé. La dernière partie de ce chapitre présente au lecteur une application de notre schéma basé sur Joye-Libert à l'authentification biométrique. Ainsi, les définitions et les exigences de sécurité sont présentées dans la section 3.6.1, tandis que le protocole d'authentification que nous proposons est décrit dans la section 3.6.2.Certains résultats utiles pour comprendre la sécurité du chiffrement basé sur l'identité de Cocks et de certaines de ses variantes sont fournis au chapitre 4. Les notions de base et le schéma de Cocks sont présentés dans la première partie du chapitre. La deuxième partie considère des ensembles de la forme $a+X=\{(a+x)\bmod n\mid x\in X\}$, où $n$ est un nombre premier ou le produit de deux nombres premiers $n=pq$ et $X$ est un sous-ensemble de $\mathbb Z_n^*$ dont les éléments ont des symboles de Jacobi donnés modulo des facteurs premiers de $n$. La troisième partie du chapitremet en évidence deux applications des résultats mentionnés précédemment. La première fournit au lecteur une analyse approfondie de certaines distributions liées au schéma IBE de Cocks et au test de Galbraith, fournissant ainsi des preuves rigoureuses pour le test de Galbraith. La deuxième application discutée concerne l'indiscernabilité computationnelle de certaines distributions utilisées pour prouver la sécurité de certaines variations de l'IBE de Cocks. Nous avons pu prouver l'indiscernabilité statistique de ces distributions sans aucune hypothèse de dureté. Le chapitre se termine par la section 4.4.Une méthode non conventionnelle de backdooring des systèmes cryptographiques est étudiée dans le chapitre 5. Les notions de base sur les attaques kleptographiques sont données dans la Section 5.1. La première partie de ce chapitre traite d'une attaque kleptographique à seuil qui peut être implémentée dans la signature ElGamal généralisée. Ainsi, dans la Section 5.2.1, nous décrivons une attaque simplifiée sur la signature ElGamal généralisée, puis nous l'étendons dans la Section 5.2.2. Une série de signatures qui supportent l'implémentation de notre attaque est fournie dans la Section 5.2.3. Les travaux futurs sont présentés à la section 5.2.4 et un protocole de signature malveillant à deux parties est présenté à l'annexe I. Nous fournissons un mécanisme kleptographique supplémentaire dans l'annexe J. Une méthode pour infecter le protocole UZK de Maurer est étudiée dans la deuxième partie de ce chapitre. Dans les sections 5.3.1 et 5.3.2, nous présentons nos nouvelles attaques kleptographiques générales et prouvons leur sécurité. Des instanciations de nos attaques sont présentées dans la section 5.3.3. Quelques directions de recherche possibles sont données dans la Section 5.3.4. Dans la troisième partie, nous introduisons un modèle de marketing basé sur l'abonnement, adapté à la vente de dispositifs infectés. Par conséquent, la Section 5.4.1 présente quelques préliminaires supplémentaires. Sur la base de l'algorithme de chiffrement ElGamal, une série d'abonnements kleptographiques adaptés à différents scénarios sont fournis dans les sections 5.4.2 à 5.4.4. Nous discutons de certains problèmes ouverts dans la section 5.4.5. Les canaux de hachage sont abordés dans la dernière partie du chapitre. En adaptant et en améliorant le mécanisme de Wu, nous introduisons de nouveaux canaux de hachage dans la Section 5.5.1. Une série d'expériences est menée dans la Section 5.5.2, tandis que plusieurs applications sont fournies dans la Section 5.5.3.Dans le chapitre 6, nous étudions les générateurs de nombres (pseudo)-aléatoires. La première partie du chapitre traite de la vulnérabilité d'Adobe Flash Player dans le générateur de nombres pseudo-aléatoires utilisé pour l'aveuglement constant. Nous présentons les conditions préalables nécessaires dans la section 6.1.1. Le cœur de notre mécanisme de récupération des graines est constitué des sections 6.1.2 et 6.1.3 et contient une série d'algorithmes pour inverser une version généralisée de la fonction de hachage utilisée par le Flash Player. Les résultats expérimentaux sont donnés dans la Section 6.1.4. Des algorithmes supplémentaires se trouvent dans l'annexe K. La deuxième partie contient une architecture qui peut être utilisée pour mettre en œuvre des tests de santé pour le générateur de nombres aléatoires. Les définitions et les informations de base sont présentées dans la Section 6.2.1. Deux classes de filtres numériques qui amplifient les biais existants sont décrites dans les sections 6.2.2 et 6.2.3. La section 6.2.4 présente quelques applications possibles. Dans la section 6.2.5, nous appliquons l'architecture que nous proposons à des sources de bruit de Bernoulli brisé et présentons quelques résultats expérimentaux. Le modèle théorique est présenté à la section 6.2.6. La Section 6.2.7 présente des mesures plus fines. Dans la section 6.2.8, nous soulignons les propositions de travaux futurs.Le chapitre 7 contient plusieurs protocoles qui entrent dans la catégorie de la cryptographie récréative. Ainsi, dans la section 7.1, nous décrivons divers schémas qui visent à résoudre le problème des millionnaires de Yao et nous fournissons au lecteur les analyses de sécurité correspondantes. Dans la section 7.2, nous présentons un ensemble de protocoles qui servent de solutions pour comparer des informations sans les révéler et nous discutons de leur sécurité. Dans la section 7.3, nous décrivons un système de cryptage à clé publique construit au moyen d'un schéma électrique et abordons sa sécurité. Dans l'annexe L, nous rappelons diverses solutions de cryptographie physique apparues dans la littérature, tandis que dans l'annexe M, nous présentons un schéma générique de cryptage à clé publique physique utile pour initier les étudiants à différentes propriétés des systèmes physiques.
- Published
- 2021
156. Comment on “Velocity boundary conditions at a tokamak resistive wall” [Phys. Plasmas 21, 032506 (2014)]
- Author
-
Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing (China)]
- Published
- 2014
- Full Text
- View/download PDF
157. A stochastic multi-symplectic scheme for stochastic Maxwell equations with additive noise
- Author
-
Zhang, Liying [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)]
- Published
- 2014
- Full Text
- View/download PDF
158. Thek-Steiner Ratio in the Rectilinear Plane
- Author
-
Borchers, Al, Du, Ding-Zhu, Gao, Biao, and Wan, Pengjun
- Published
- 1998
- Full Text
- View/download PDF
159. Permutation Tests for Reflected Symmetry
- Author
-
Neuhaus, Georg and Zhu, Li-Xing
- Published
- 1998
- Full Text
- View/download PDF
160. Nonlinear Impulse Evolution Systems and Applications to Population Models
- Author
-
Rogovchenko, Yuri V
- Published
- 1997
- Full Text
- View/download PDF
161. Oscillation Criteria for Second Order Nonlinear Perturbed Differential Equations
- Author
-
Rogovchenko, Yuri V
- Published
- 1997
- Full Text
- View/download PDF
162. 2-Testability and Relabelings Produce Everything
- Author
-
Ilie, Lucian and Salomaa, Arto
- Published
- 1998
- Full Text
- View/download PDF
163. Some Characterizations of the Weil Representations of the Symplectic and Unitary Groups
- Author
-
Tiep, Pham Huu and Zalesskii, Alexander E.
- Published
- 1997
- Full Text
- View/download PDF
164. Mathematical Modelling of Collagen Fibers Rearrangement During Tendon Healing Process
- Author
-
Martin Parisot, José A. Carrillo, Zuzanna Szymańska, Mathematical Institute [Oxford] (MI), University of Oxford, Certified Adaptive discRete moDels for robust simulAtions of CoMplex flOws with Moving fronts (CARDAMOM), Institut de Mathématiques de Bordeaux (IMB), Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1 (UB)-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS)-Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1 (UB)-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS)-Inria Bordeaux - Sud-Ouest, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Institut of Mathematics - Polish Academy of Sciences (PAN), Polska Akademia Nauk = Polish Academy of Sciences (PAN), J.A. Carrillo was partially supported by the EPSRC grant number EP/P031587/1. J.A. Carrillo and M. Parisot acknowledge the support from Institute of Mathematics, Polish Academy of Sciences within the framework 'Małe spotkania badawcze'. Z. Szymanska was supported by the National Science Centre Poland Grant 2017/26/M/ST1/00783., University of Oxford [Oxford], and Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS)-Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS)-Inria Bordeaux - Sud-Ouest
- Subjects
Modern medicine ,Integro-differential equations ,Materials science ,Quantitative Biology::Tissues and Organs ,Tendon healing ,01 natural sciences ,Reduced model ,010305 fluids & plasmas ,Collagen remodelling ,Mathematical model ,Tendon cell ,Collagen fibres ,0103 physical sciences ,medicine ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,In patient ,0101 mathematics ,[PHYS.MECA.BIOM]Physics [physics]/Mechanics [physics]/Biomechanics [physics.med-ph] ,Process (anatomy) ,Alignment ,Numerical Analysis ,3. Good health ,Tendon ,010101 applied mathematics ,medicine.anatomical_structure ,Modeling and Simulation ,Biomedical engineering - Abstract
International audience; Tendon injuries present a significant clinical challenge to modern medicine as they heal slowly and rarely recover the structure and mechanical strength of a healthy tendon. Moreover, tendon represents a highly under-researched tissue with the process of healing not fully elucidated. To improve the understanding of tendon function and healing process we propose a new model of collagen fibers rearrangement during tendon 1 healing. The model consists of integro-differential equation describing the dynamics of collagen fibers distribution. We further reduce the model in a suitable asymptotic regime leading to a nonlinear non-local Fokker-Planck type equation for the spatial and orientation distribution of col-lagen fiber bundles. The reduced model allows for possible parameter estimation based on data due to its simplicity. We showcase some of the qualitative properties of this model simulating its long time asymptotic behavior and the total time for tendon fibers to align in terms of the model parameters. A possible biological interpretation of the numerical experiments performed leads us to the working hypothesis of the importance of the tendon cell size in patients' recovery.
- Published
- 2021
- Full Text
- View/download PDF
165. Minimal blow-up solutions of mass-critical inhomogeneous Hartree equation
- Author
-
Su, Yiming [Institute of Applied Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)]
- Published
- 2013
- Full Text
- View/download PDF
166. Modularity of minor-free graphs
- Author
-
Sulkowska, Małgorzata, Lasoń, Michał, Wroclaw University of Science and Technology, Combinatorics, Optimization and Algorithms for Telecommunications (COATI), COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Institut of Mathematics - Polish Academy of Sciences (PAN), Polska Akademia Nauk = Polish Academy of Sciences (PAN), Combinatorics, Optimization and Algorithms for Telecommunications [researchteam] (211142), Institute of Mathematics of the Polish Academy of Sciences, and Wrocław University of Science and Technology
- Subjects
[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] - Abstract
7 pages, 1 figure; We prove that a class of graphs with an excluded minor and with the maximum degree sublinear in the number of edges is maximally modular, that is, modularity tends to 1 as the number of edges tends to infinity.
- Published
- 2021
167. Numerical evolution of multiple black holes with accurate initial data
- Author
-
Zhoujian, Cao [Institute of Applied Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)]
- Published
- 2010
- Full Text
- View/download PDF
168. Newman-Penrose constants of stationary electrovacuum space-times
- Author
-
Xiaoning, Wu [Institute of Applied Mathematics, Academy of Mathematics and System Science, Chinese Academy of Sciences, P.O. Box 2734, Beijing, China, 100080 (China)]
- Published
- 2009
- Full Text
- View/download PDF
169. Riemannian geometry of noncommutative surfaces
- Author
-
Xiao, Zhang [Institute of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)]
- Published
- 2008
- Full Text
- View/download PDF
170. On the vertex operators of the elliptic quantum algebra U{sub q,p}(sl{sub 2}){sub k}
- Author
-
Xiangmao, Ding [Institute of Applied Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2734, Beijing 100190 (China)]
- Published
- 2008
- Full Text
- View/download PDF
171. Noncommutative fields and actions of twisted Poincare algebra
- Author
-
Xiao, Zhang [Institute of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences 100190, Beijing (China)]
- Published
- 2008
- Full Text
- View/download PDF
172. A Trust Region Method for Optimization Problem with Singular Solutions
- Author
-
Xiangsun, Zhang [Chinese Academy of Sciences, Institute of Applied Mathematics, Academy of Mathematics and Systems Science (China)]
- Published
- 2007
- Full Text
- View/download PDF
173. Multi-symplectic Runge-Kutta methods for nonlinear Dirac equations
- Author
-
Chun, Li [State Key Laboratory of Scientific and Engineering Computing, Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100080 (China) and Graduate School of the Chinese Academy of Sciences, Beijing 100080 (China)]
- Published
- 2006
- Full Text
- View/download PDF
174. Non-Interior Continuation Method for Solving the Monotone Semidefinite Complementarity Problem
- Author
-
Han, J [Institute of Applied Mathematics, Academy of Mathematics and System Sciences, Chinese Academy of Sciences, Beijing, 100080, P.O. Box 2734 (China)]
- Published
- 2003
- Full Text
- View/download PDF
175. Enumerating the morphologies of non-degenerate Darboux cyclides
- Author
-
Bernard Mourrain, Xiaohong Jia, Mingyang Zhao, Wenping Wang, Changhe Tu, Key Laboratory of Mathematics Mechanization (KLMM), Chinese Academy of Sciences [Changchun Branch] (CAS)-Institute of Systems Science (ISS), China-Academy of Mathematics and Systems Science [Beijing], National Center for Mathematics and Interdisciplinary Sciences [Beijing] (NCMIS), Academy of Mathematics and Systems Science (AMSS), Chinese Academy of Sciences [Beijing] (CAS)-Chinese Academy of Sciences [Beijing] (CAS), Computer Graphics Group [Hong Kong], Department of Computer Science [Hong Kong], City University of Hong Kong [Hong Kong] (CUHK)-City University of Hong Kong [Hong Kong] (CUHK), Shandong University, AlgebRe, geOmetrie, Modelisation et AlgoriTHmes (AROMATH), Inria Sophia Antipolis - Méditerranée (CRISAM), and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-National and Kapodistrian University of Athens (NKUA)
- Subjects
Surface (mathematics) ,Pure mathematics ,Quadric ,Degenerate energy levels ,Aerospace Engineering ,Stereographic projection ,020207 software engineering ,Darboux cyclides ,morphologies ,02 engineering and technology ,01 natural sciences ,Computer Graphics and Computer-Aided Design ,0104 chemical sciences ,Segre characteristic ,010404 medicinal & biomolecular chemistry ,stereographic projection ,Intersection ,Modeling and Simulation ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Enumeration ,[MATH.MATH-AG]Mathematics [math]/Algebraic Geometry [math.AG] ,Algebraic number ,index sequences ,Mathematics - Abstract
We provide an enumeration of all possible morphologies of non-degenerate Darboux cyclides. Based on the fact that every Darboux cyclide in R 3 is the stereographic projection of the intersection surface of a sphere and a quadric in R 4 , we transform the enumeration problem of morphologies of Darboux cyclides to the enumeration of the algebraic sequences that characterize the intersection of a sphere and a quadric in R 4 .
- Published
- 2019
- Full Text
- View/download PDF
176. The global existence issue for the compressible Euler system with Poisson or Helmholtz couplings
- Author
-
Šárka Nečasová, Raphaël Danchin, Xavier Blanc, Bernard Ducomet, andš Nečasová, Institute of Mathematics of the Academy of Sciences of the Czech Republic, Université Paris Diderot - Paris 7 (UPD7), Laboratoire d'Analyse et de Mathématiques Appliquées (LAMA), Université Paris-Est Marne-la-Vallée (UPEM)-Fédération de Recherche Bézout-Université Paris-Est Créteil Val-de-Marne - Paris 12 (UPEC UP12)-Centre National de la Recherche Scientifique (CNRS), Institute of Mathematics of the Czech Academy of Science (IM / CAS), Czech Academy of Sciences [Prague] (CAS), and Centre National de la Recherche Scientifique (CNRS)-Université Paris-Est Créteil Val-de-Marne - Paris 12 (UPEC UP12)-Fédération de Recherche Bézout-Université Paris-Est Marne-la-Vallée (UPEM)
- Subjects
General Mathematics ,76N10 ,Space (mathematics) ,Poisson distribution ,01 natural sciences ,symbols.namesake ,Mathematics - Analysis of PDEs ,decay AMS subject classification: 35Q30 ,Barotropic fluid ,global solution ,FOS: Mathematics ,Initial value problem ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,0101 mathematics ,Helmholtz ,Physics ,010102 general mathematics ,Mathematical analysis ,Euler system ,Poisson ,compressible Euler system ,010101 applied mathematics ,Helmholtz free energy ,symbols ,Compressibility ,Analysis ,Analysis of PDEs (math.AP) - Abstract
We consider the Cauchy problem for the barotropic Euler system coupled to Helmholtz or Poisson equations, in the whole space. We assume that the initial density is small enough, and that the initial velocity is close to some reference vector field [Formula: see text] such that the spectrum of [Formula: see text] is positive and bounded away from zero. We prove the existence of a global unique solution with (fractional) Sobolev regularity, and algebraic time decay estimates. Our work extends Grassin and Serre’s papers [Existence de solutions globales et régulières aux équations d’Euler pour un gaz parfait isentropique, C. R. Acad. Sci. Paris Sér. I 325 (1997) 721–726, 1997; Global smooth solutions to Euler equations for a perfect gas, Indiana Univ. Math. J. 47 (1998) 1397–1432; Solutions classiques globales des équations d’Euler pour un fluide parfait compressible, Ann. Inst. Fourier Grenoble 47 (1997) 139–159] dedicated to the compressible Euler system without coupling and with integer regularity exponents.
- Published
- 2019
177. Global existence of a radiative Euler system coupled to an electromagnetic field
- Author
-
Bernard Ducomet, Xavier Blanc, Šárka Nečasová, Laboratoire Jacques-Louis Lions (LJLL), Université Pierre et Marie Curie - Paris 6 (UPMC)-Université Paris Diderot - Paris 7 (UPD7)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Analyse et de Mathématiques Appliquées (LAMA), Centre National de la Recherche Scientifique (CNRS)-Université Paris-Est Créteil Val-de-Marne - Paris 12 (UPEC UP12)-Fédération de Recherche Bézout-Université Paris-Est Marne-la-Vallée (UPEM), Institute of Mathematics of the Czech Academy of Science (IM / CAS), Czech Academy of Sciences [Prague] (CAS), Université Paris-Est Marne-la-Vallée (UPEM)-Fédération de Recherche Bézout-Université Paris-Est Créteil Val-de-Marne - Paris 12 (UPEC UP12)-Centre National de la Recherche Scientifique (CNRS), and Institute of Mathematics of the Academy of Sciences of the Czech Republic
- Subjects
Electromagnetic field ,35Q30, 76N10 ,System of linear equations ,01 natural sciences ,symbols.namesake ,Euler ,Mathematics - Analysis of PDEs ,Compressible ,35q30 ,FOS: Mathematics ,Radiative transfer ,Initial value problem ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Limit (mathematics) ,0101 mathematics ,Physics ,QA299.6-433 ,010102 general mathematics ,Mathematical analysis ,76n10 ,MSC 2010: 35Q30, 76N10 ,Euler system ,010101 applied mathematics ,radiation hydrodynamics ,Euler's formula ,symbols ,Compressibility ,Analysis ,Analysis of PDEs (math.AP) - Abstract
We study the Cauchy problem for a system of equations corresponding to a singular limit of radiative hydrodynamics, namely, the 3D radiative compressible Euler system coupled to an electromagnetic field. Assuming smallness hypotheses for the data, we prove that the problem admits a unique global smooth solution and study its asymptotics.
- Published
- 2018
- Full Text
- View/download PDF
178. A course of life and a creative search of the famous ukrainian mathematician georgy voronoi
- Author
-
Horbachuk, M. L., Ptashnyk, B. I., Il’kiv, V. S., Інститут математики НАН України, Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Національний університет 'Львівська політехніка', Pidstryhach Institute of Mathematics National Academy of Sciences of Ukraine, Pidstryhach Institute for Applied Problems of Mechanics and Mathematics National Academy of Sciences of Ukraine, and Lviv Polytechnic National University
- Subjects
дiаграма Вороного ,51(09) ,паралелоедр ,parallelohedron ,analytical theory of numbers ,Voronoi diagram ,аналiтична теорiя чисел - Abstract
Висвiтлено життєвий i творчий шлях генiального українського вченого, свiтової слави математика Георгiя Вороного. The paper describes a course of life and a creative search of the great Ukrainian scientist, the world fame mathematician Georgy Voronoi.
- Published
- 2018
179. Constantin and Iyer’s representation formula for the Navier–Stokes equations on manifolds
- Author
-
Dejun Luo, Shizan Fang, Institut de Mathématiques de Bourgogne [Dijon] ( IMB ), Université de Bourgogne ( UB ) -Centre National de la Recherche Scientifique ( CNRS ), Key Laboratory of Random Complex Structures and Data Sciences [Beijing], Academy of Mathematics and Systems Science [Beijing], School of Mathematical Sciences [Beijing], University of the Chinese Academy of Sciences [Beijing] ( UCAS ), National Natural Science Foundation of China. Grant number: 11431014, 11571347, Seven Main Directions. Grant number: Y129161ZZ1, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Institut de Mathématiques de Bourgogne [Dijon] (IMB), Centre National de la Recherche Scientifique (CNRS)-Université de Franche-Comté (UFC), Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université de Bourgogne (UB), and University of the Chinese Academy of Sciences [Beijing] (UCAS)
- Subjects
Pure mathematics ,MSC: 35Q30, 58J65 ,01 natural sciences ,Square (algebra) ,Potential theory ,010104 statistics & probability ,Navier–Stokes equations ,Stochastic flow ,FOS: Mathematics ,0101 mathematics ,Representation (mathematics) ,Mathematics ,Probability (math.PR) ,010102 general mathematics ,Probabilistic logic ,Riemannian manifold ,Stochastic representation ,[MATH.MATH-PR]Mathematics [math]/Probability [math.PR] ,Pull-back vector field ,Vector field ,Mathematics::Differential Geometry ,Laplace operator ,[ MATH.MATH-PR ] Mathematics [math]/Probability [math.PR] ,Mathematics - Probability ,Analysis ,de Rham–Hodge Laplacian - Abstract
The purpose of this paper is to establish a probabilistic representation formula for the Navier--Stokes equations on compact Riemannian manifolds. Such a formula has been provided by Constantin and Iyer in the flat case of $\mathbb R^n$ or of $\mathbb T^n$. On a Riemannian manifold, however, there are several different choices of Laplacian operators acting on vector fields. In this paper, we shall use the de Rham--Hodge Laplacian operator which seems more relevant to the probabilistic setting, and adopt Elworthy--Le Jan--Li's idea to decompose it as a sum of the square of Lie derivatives., 26 pages. We add Section 4 discussing the Killing vector fields on Riemannian symmetric spaces which satisfy the conditions in Section 3
- Published
- 2018
- Full Text
- View/download PDF
180. Controllability of the Navier-Stokes equation in a rectangle with a little help of a distributed phantom force
- Author
-
Franck Sueur, Ping Zhang, Jean-Michel Coron, Frédéric Marbach, Laboratoire Jacques-Louis Lions (LJLL (UMR_7598)), Université Paris Diderot - Paris 7 (UPD7)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Control And GEometry (CaGE ), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jacques-Louis Lions (LJLL (UMR_7598)), Université Paris Diderot - Paris 7 (UPD7)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Université Paris Diderot - Paris 7 (UPD7)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), École normale supérieure - Rennes (ENS Rennes), Institut de Recherche Mathématique de Rennes (IRMAR), AGROCAMPUS OUEST, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Université de Rennes 2 (UR2), Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), Institut de Mathématiques de Bordeaux (IMB), Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS), Academy of Mathematics and Systems Science [Beijing], Advanced Grant 266907, European Research Council, 11371347, National Natural Science Foundation of China, Laboratoire Jacques-Louis Lions ( LJLL ), Université Pierre et Marie Curie - Paris 6 ( UPMC ) -Université Paris Diderot - Paris 7 ( UPD7 ) -Centre National de la Recherche Scientifique ( CNRS ), École normale supérieure - Rennes ( ENS Rennes ), Institut de Recherche Mathématique de Rennes ( IRMAR ), Université de Rennes 1 ( UR1 ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -AGROCAMPUS OUEST-École normale supérieure - Rennes ( ENS Rennes ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -Institut National des Sciences Appliquées ( INSA ) -Université de Rennes 2 ( UR2 ), Université de Rennes ( UNIV-RENNES ) -Centre National de la Recherche Scientifique ( CNRS ), Institut de Mathématiques de Bordeaux ( IMB ), Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1-Université de Bordeaux ( UB ) -Institut Polytechnique de Bordeaux ( Bordeaux INP ) -Centre National de la Recherche Scientifique ( CNRS ), Academy of Mathematics & Systems Science, Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Université de Rennes 2 (UR2)-Centre National de la Recherche Scientifique (CNRS)-INSTITUT AGRO Agrocampus Ouest, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro), Université Bordeaux Segalen - Bordeaux 2-Université Sciences et Technologies - Bordeaux 1 (UB)-Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS), ANR-16-CE40-0027,BORDS,Bords, oscillations et couches limites dans les systèmes différentiels(2016), ANR-11-LABX-0020,LEBESGUE,Centre de Mathématiques Henri Lebesgue : fondements, interactions, applications et Formation(2011), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-AGROCAMPUS OUEST-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Université de Rennes 2 (UR2), and Université de Rennes (UNIV-RENNES)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[ MATH.MATH-OC ] Mathematics [math]/Optimization and Control [math.OC] ,Pure mathematics ,Mathematics::Analysis of PDEs ,General Physics and Astronomy ,01 natural sciences ,Physics::Fluid Dynamics ,[ MATH.MATH-AP ] Mathematics [math]/Analysis of PDEs [math.AP] ,Mathematics - Analysis of PDEs ,FOS: Mathematics ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Rectangle ,Boundary value problem ,0101 mathematics ,Mathematics - Optimization and Control ,Mathematical Physics ,Mathematics ,Partial differential equation ,35Q30, 93B05, 93C20 ,Applied Mathematics ,010102 general mathematics ,010101 applied mathematics ,Controllability ,Sobolev space ,Arbitrarily large ,Optimization and Control (math.OC) ,Norm (mathematics) ,Geometry and Topology ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,Analysis ,Analytic function ,Analysis of PDEs (math.AP) - Abstract
We consider the 2D incompressible Navier-Stokes equation in a rectangle with the usual no-slip boundary condition prescribed on the upper and lower boundaries. We prove that for any positive time, for any finite energy initial data, there exist controls on the left and right boundaries and a distributed force, which can be chosen arbitrarily small in any Sobolev norm in space, such that the corresponding solution is at rest at the given final time. Our work improves earlier results where the distributed force is small only in a negative Sobolev space. It is a further step towards an answer to Jacques-Louis Lions' question about the small-time global exact boundary controllability of the Navier-Stokes equation with the no-slip boundary condition, for which no distributed force is allowed. Our analysis relies on the well-prepared dissipation method already used for Burgers and for Navier-Stokes in the case of the Navier slip-with-friction boundary condition. In order to handle the larger boundary layers associated with the no-slip boundary condition, we perform a preliminary regularization into analytic functions with arbitrarily large analytic radius and prove a long-time nonlinear Cauchy-Kovalevskaya estimate relying only on horizontal analyticity., Added remarks and detailed proof of Lemma 2.1
- Published
- 2018
- Full Text
- View/download PDF
181. Le louage tunisien : une alternative sociétale opérationnelle aux VTC et à la ubérisation à tout-va
- Author
-
Hassine, Mohamed, Canalda, Philippe, Hassine, Idriss, Academy of Mathematics and Systems Science (AMSS) (Academy of Mathematics and Systems Science (AMSS)), Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST), Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC), and Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA] ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation - Abstract
International audience; Le louage est un service de transport tunisien de taxi collectif pour les espaces intra et inter gouvernorats. Comme UBER, il complète opérationnellement l'offre globale de transport public et se déclenche suite à la demande des passagers. Dans cette étude, nous proposons une modélisation du problème d'optimisation sous-jacent au service de louage en Tunisie, et une implémentation de résolution exacte d'un algorithme glouton de ce problème. L'évaluation de la solution s'effectue à partir de cas réels du service de louage, mis en place sur le territoire tunisien.Les simulations effectuées ont permis de satisfaire à 20000 demandes et 4000 offres, et pour un temps de réponse de notre système réduit à quelques secondes. Ces résultats permettent d'informatiser ce système et de le rendre plus efficace.
- Published
- 2017
182. Characterizations for the fractional integral operators in generalized Morrey spaces on Carnot groups
- Author
-
Ahmet Eroglu, J. V. Azizov, Vagif S. Guliyev, 0-Belirlenecek, Eroglu, A., Niğde Ömer Halisdemir University, Niğde, Turkey -- Guliyev, V.S., Ahi Evran University, Kirsehir, Turkey, Institute of Mathematics and Mechanics, National Academy of Sciences of Azerbaijan, Baku, Azerbaijan -- Azizov, J.V., Institute of Mathematics and Mechanics, National Academy of Sciences of Azerbaijan, Baku, Azerbaijan, Khazar University, Baku, Azerbaijan, and Kırşehir Ahi Evran Üniversitesi, Fen-Edebiyat Fakültesi, Matematik Bölümü
- Subjects
Pure mathematics ,Mathematics::Functional Analysis ,Carnot group ,Mathematics::Complex Variables ,General Mathematics ,generalized Morrey space ,010102 general mathematics ,Mathematics::Classical Analysis and ODEs ,Mathematics::Analysis of PDEs ,Characterization (mathematics) ,Weak type ,01 natural sciences ,010101 applied mathematics ,symbols.namesake ,Operator (computer programming) ,fractional integral operator ,Fundamental solution ,symbols ,Embedding ,0101 mathematics ,Carnot cycle ,Mathematics - Abstract
In this paper, we study the boundedness of the fractional integral operator I ? on Carnot group G in the generalized Morrey spaces M p, ? (G). We shall give a characterization for the strong and weak type boundedness of I ? on the generalized Morrey spaces, respectively. As applications of the properties of the fundamental solution of sub-Laplacian L on G, we prove two Sobolev–Stein embedding theorems on generalized Morrey spaces in the Carnot group setting. © 2017, Pleiades Publishing, Ltd., Indian National Science Academy, The research of V. S. Guliyev was supported in part by the 2015 grant of the Presidium of the Azerbaijan National Academy of Science and by the Ahi Evran University Scientific Research Project under grant FEF. A3.16.024).
- Published
- 2017
183. Correlation of sequences and of measures, generic points for joinings and ergodicity of certain cocycles
- Author
-
Tomasz Downarowicz, Jean-Pierre Conze, Jacek Serafin, Institut de Recherche Mathématique de Rennes (IRMAR), AGROCAMPUS OUEST, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Université de Rennes 2 (UR2), Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), Institut of Mathematics - Polish Academy of Sciences (PAN), Polska Akademia Nauk = Polish Academy of Sciences (PAN), Wroclaw University of Science and Technology, Institut de Recherche Mathématique de Rennes ( IRMAR ), Université de Rennes 1 ( UR1 ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -AGROCAMPUS OUEST-École normale supérieure - Rennes ( ENS Rennes ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -Institut National des Sciences Appliquées ( INSA ) -Université de Rennes 2 ( UR2 ), Université de Rennes ( UNIV-RENNES ) -Centre National de la Recherche Scientifique ( CNRS ), Institut of Mathematics - Polish Academy of Sciences ( PAN ), Polska Akademia Nauk ( PAN ), Wroclaw University of Technology [Wroclaw], Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Université de Rennes 2 (UR2)-Centre National de la Recherche Scientifique (CNRS)-INSTITUT AGRO Agrocampus Ouest, and Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)
- Subjects
Pure mathematics ,Lemma (mathematics) ,Sequence ,Ergodic sequence ,Applied Mathematics ,General Mathematics ,[ MATH.MATH-DS ] Mathematics [math]/Dynamical Systems [math.DS] ,010102 general mathematics ,Ergodicity ,[MATH.MATH-DS]Mathematics [math]/Dynamical Systems [math.DS] ,Dynamical Systems (math.DS) ,0102 computer and information sciences ,16. Peace & justice ,01 natural sciences ,Measure (mathematics) ,010201 computation theory & mathematics ,37A05, 37A20, 37A45 ,Bounded function ,FOS: Mathematics ,Ergodic theory ,Invariant measure ,0101 mathematics ,Mathematics - Dynamical Systems ,Mathematics - Abstract
The main subject of the paper, motivated by a question raised by Boshernitzan, is to give criteria for a bounded complex-valued sequence to be uncorrelated to any strictly ergodic sequence. As a tool developed to study this problem we introduce the notion of correlation between two shift-invariant measures supported by the symbolic space with complex symbols. We also prove a "lifting lemma" for generic points: given a joining $\xi$ of two shift-invariant measures $\mu$ and $\nu$, every point $x$ generic for $\mu$ lifts to a pair $(x,y)$ generic for $\xi$ (such $y$ exists in the full symbolic space). This lemma allows us to translate correlation between bounded sequences to the language of correlation of measures. Finally, to establish that the property of an invariant measure being uncorrelated to any ergodic measure is essentially weaker than the property of being disjoint from any ergodic measure, we develop and apply criteria for ergodicity of four-jump cocycles over irrational rotations. We believe that apart from the applications to studying the notion of correlation, the two developed tools: the lifting lemma and the criteria for ergodicity of four-jump cocycles, are of independent interest. This is why we announce them also in the title. In the Appendix we also introduce the notion of conditional disjointness., Comment: 21 pages
- Published
- 2017
- Full Text
- View/download PDF
184. Modularity of minor‐free graphs
- Author
-
Michał Lasoń, Małgorzata Sulkowska, Wroclaw University of Science and Technology, Combinatorics, Optimization and Algorithms for Telecommunications (COATI), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), Institut of Mathematics - Polish Academy of Sciences (PAN), and Polska Akademia Nauk = Polish Academy of Sciences (PAN)
- Subjects
[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,05C83, 05C82 ,FOS: Mathematics ,Mathematics - Combinatorics ,Discrete Mathematics and Combinatorics ,Combinatorics (math.CO) ,Geometry and Topology ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
We prove that a class of graphs with an excluded minor and with the maximum degree sublinear in the number of edges is maximally modular, that is, modularity tends to 1 as the number of edges tends to infinity., 7 pages, 1 figure
- Published
- 2022
- Full Text
- View/download PDF
185. Local exact controllability to the steady states of a parabolic system with coupled nonlinear boundary conditions
- Author
-
Bhandari, Kuntal, Boyer, Franck, Institute of Mathematics of the Czech Academy of Science (IM / CAS), Czech Academy of Sciences [Prague] (CAS), Institut de Mathématiques de Toulouse UMR5219 (IMT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS), Institut Universitaire de France (IUF), and Ministère de l'Education nationale, de l’Enseignement supérieur et de la Recherche (M.E.N.E.S.R.)
- Subjects
method of moments ,Parabolic systems ,fixed-point argument ,boundary controllability ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,source term method - Abstract
In this article, we study the boundary local exact controllability to any steady state of a one-dimensional parabolic system with coupled nonlinear boundary conditions by means of only one control. The significant point is that the state components are interacting only at the boundary points in terms of some nonlinear terms. We consider two cases : either the control function is acting through a mixed nonlinear boundary condition on the first component or through a Neumann condition on the second component. The results are slightly different in the two cases. To study this problem, we first consider the associated linearized systems around the given steady state. The method of moments let us to prove its controllability and to obtain a suitable estimate of the control cost of the form $Me^{M/T}$. To this end, we need to develop a precise spectral analysis of a non self-adjoint operator. Thanks to those preliminary results, we can use the source term method developed in [Liu-Takahashi-Tucsnak 2013], followed by the Banach fixed point argument, to obtain the small-time local boundary exact controllability to the steady state for the original system.
- Published
- 2023
186. Structure of Rank-One Matrices Over the Domain of Principal Ideals Relative to Similarity Transformations
- Author
-
Prokip, V. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2019
- Full Text
- View/download PDF
187. Direct and Inverse Problems of Thermomechanics Concerning the Optimization and Identification of the Thermal Stressed State of Deformed Solids
- Author
-
Yasinskyy, A. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2019
- Full Text
- View/download PDF
188. On the Development of Investigations of the Thermomechanical Behavior of Thermally Sensitive Bodies
- Author
-
Protsyuk, B. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2019
- Full Text
- View/download PDF
189. Effective Thermal Contact Resistance of Regularly Textured Bodies in the Presence of Intercontact Heat-Conducting Media and the Phenomenon of Thermal Rectification
- Author
-
Martynyak, R. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2019
- Full Text
- View/download PDF
190. Two-Dimensional Problem of Thermoelasticity for a Half Space in the Presence of Heat Release in a Ribbon-Shaped Domain Parallel to its Boundary
- Author
-
Ivas’ko, N. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2019
- Full Text
- View/download PDF
191. About the regularity of degenerate non-local Kolmogorov operators under diffusive perturbations
- Author
-
Marino, Lorenzo, Menozzi, Stéphane, Priola, Enrico, Institut of Mathematics - Polish Academy of Sciences (PAN), Polska Akademia Nauk = Polish Academy of Sciences (PAN), Laboratoire de Mathématiques et Modélisation d'Evry (LaMME), Université d'Évry-Val-d'Essonne (UEVE)-ENSIIE-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Dipartimento di Matematica 'Felice Casorati' Department of Mathematics [Univ Pavia] (UNIPV), and Università degli Studi di Pavia = University of Pavia (UNIPV)
- Subjects
Schauder estimates ,[MATH.MATH-PR]Mathematics [math]/Probability [math.PR] ,Mathematics - Analysis of PDEs ,Degenerate Ornstein-Uhlenbeck operators ,Probability (math.PR) ,FOS: Mathematics ,Lp estimates ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Poisson process ,Mathematics - Probability ,non-local parabolic equations ,Analysis of PDEs (math.AP) ,MSC: 35K10, 35K15, 60J76 - Abstract
We study here the effects of a time-dependent second order perturbation to a degenerate Ornstein-Uhlenbeck type operator whose diffusive part can be either local or non-local. More precisely, we establish that some estimates, such as the Schauder and Sobolev ones, already known for the non-perturbed operator still hold, and with the same constants, when we perturb the Ornstein-Uhlenbeck operator with second order diffusions with coefficients only depending on time in a measurable way. The aim of the current work is twofold: we weaken the assumptions required on the perturbation in the local case which has been considered already in [KP17] and we extend the approach presented therein to a wider class of degenerate Kolmogorov operators with non-local diffusive part of symmetric stable type., Comments are welcome!
- Published
- 2023
192. A generalization of unaimed fire Lanchester’s model in multi-battle warfare
- Author
-
Cangiotti, Nicolò, Capolli, Marco, Sensi, Mattia, Polytechnic University of Milan, Institut of Mathematics - Polish Academy of Sciences (PAN), Polska Akademia Nauk = Polish Academy of Sciences (PAN), Mathématiques pour les Neurosciences (MATHNEURO), Inria Sophia Antipolis - Méditerranée (CRISAM), and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
[MATH]Mathematics [math] - Abstract
International audience; The classical Lanchester's model is shortly reviewed and analysed, with particular attention to the critical issues that intrinsically arise from the mathematical formalization of the problem. We then generalize a particular version of such a model describing the dynamics of warfare when three or more armies are involved in the conflict. Several numerical simulations are provided.
- Published
- 2023
- Full Text
- View/download PDF
193. Sparse Polynomial Optimization: Theory and Practice
- Author
-
Magron, Victor, Wang, Jie, Equipe Polynomial OPtimization (LAAS-POP), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Institut de Mathématiques de Toulouse UMR5219 (IMT), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS), Academy of Mathematics and Systems Science [Beijing], This work was supported by the FMJH Program PGMO (EPICS project), as well as the PEPS2 Program (FastOPF project) funded by AMIES and RTE.This research is part of the programme DesCartes and is supported by the National Research Foundation, Prime Minister’s Office, Singapore under its Campus for Research Excellence and Technological Enterprise (CREATE) programme., World Scientific Press, ANR-18-ERC2-0004,COPS,Optimisation garantie pour la vérification des systèmes cyber-physiques(2018), ANR-19-P3IA-0004,ANITI,Artificial and Natural Intelligence Toulouse Institute(2019), European Project: 813211,H2020-EU.1.3. - EXCELLENT SCIENCE - Marie Skłodowska-Curie Actions (Main Programme), H2020-EU.1.3.1. - Fostering new skills by means of excellent initial training of researchers ,10.3030/813211,POEMA(2019), Magron, Victor, TREMPLIN-ERC - Optimisation garantie pour la vérification des systèmes cyber-physiques - - COPS2018 - ANR-18-ERC2-0004 - TERC - VALID, Artificial and Natural Intelligence Toulouse Institute - - ANITI2019 - ANR-19-P3IA-0004 - P3IA - VALID, and Polynomial Optimization, Efficiency through Moments and Algebra - POEMA - - H20202019-01-01 - 2022-12-31 - 813211 - VALID
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Mathematics - Algebraic Geometry ,Optimization and Control (math.OC) ,Mathematics - Operator Algebras ,FOS: Mathematics ,[MATH.MATH-OC] Mathematics [math]/Optimization and Control [math.OC] ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,Operator Algebras (math.OA) ,Mathematics - Optimization and Control ,Algebraic Geometry (math.AG) ,Machine Learning (cs.LG) - Abstract
The problem of minimizing a polynomial over a set of polynomial inequalities is an NP-hard non-convex problem. Thanks to powerful results from real algebraic geometry, one can convert this problem into a nested sequence of finite-dimensional convex problems. At each step of the associated hierarchy, one needs to solve a fixed size semidefinite program, which can be in turn solved with efficient numerical tools. On the practical side however, there is no-free lunch and such optimization methods usually encompass severe scalability issues. Fortunately, for many applications, we can look at the problem in the eyes and exploit the inherent data structure arising from the cost and constraints describing the problem, for instance sparsity or symmetries. This book presents several research efforts to tackle this scientific challenge with important computational implications, and provides the development of alternative optimization schemes that scale well in terms of computational complexity, at least in some identified class of problems. The presented algorithmic framework in this book mainly exploits the sparsity structure of the input data to solve large-scale polynomial optimization problems. We present sparsity-exploiting hierarchies of relaxations, for either unconstrained or constrained problems. By contrast with the dense hierarchies, they provide faster approximation of the solution in practice but also come with the same theoretical convergence guarantees. Our framework is not restricted to static polynomial optimization, and we expose hierarchies of approximations for values of interest arising from the analysis of dynamical systems. We also present various extensions to problems involving noncommuting variables, e.g., matrices of arbitrary size or quantum physic operators., Comment: 220 pages, to appear in Series on Optimization and Its Applications, World Scientific Press
- Published
- 2023
194. Shape Sensitivity Analysis of a 2D Fluid–Structure Interaction Problem
- Author
-
Valentin Calisti, Ilaria Lucardesi, Jean-François Scheid, Institute of Mathematics of the Czech Academy of Science (IM / CAS), Czech Academy of Sciences [Prague] (CAS), Dipartimento di Matematica e Informatica [Firenze] (DiMal), Università degli Studi di Firenze = University of Florence (UniFI), Institut Élie Cartan de Lorraine (IECL), Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Systems with physical heterogeneities : inverse problems, numerical simulation, control and stabilization (SPHINX), Inria Nancy - Grand Est, and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Control and Optimization ,Applied Mathematics ,Shape optimisation ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Fluid-structure system ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,Management Science and Operations Research ,Stokes and elasticity equations ,Shape sensitivity - Abstract
We study the shape differentiability of a general functional depending on the solution of a bidimensional stationary Stokes–elasticity system with small loads, with respect to the reference domain of the elastic structure immersed in a viscous fluid. The differentiability with respect to reference elastic domain variations is considered under shape perturbations with diffeomorphisms. The shape derivative is then calculated with the use of the velocity method. This derivative involves the material derivatives of the solution of this fluid–structure interaction problem. The adjoint method is then used to obtain a simplified expression for the shape derivative.
- Published
- 2023
- Full Text
- View/download PDF
195. Diagonal and circulant or skew-circulant splitting preconditioners for spatial fractional diffusion equations
- Author
-
Lu, Kang-Ya [Academy of Mathematics and Systems Science, Chinese Academy of Sciences, State Key Laboratory of Scientific/Engineering Computing, Institute of Computational Mathematics and Scientific/Engineering Computing (China)]
- Published
- 2018
- Full Text
- View/download PDF
196. Integral Problem for a Partial Differential Equation of High Order in an Infinite Strip
- Author
-
Symotyuk, M. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2018
- Full Text
- View/download PDF
197. Development of the Theory of Branched Continued Fractions in 1996–2016
- Author
-
Kuchmins’ka, Kh. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2018
- Full Text
- View/download PDF
198. On the Classical Fundamental Solutions of the Cauchy Problem for Ultraparabolic Kolmogorov-Type Equations with Two Groups of Spatial Variables
- Author
-
Medyns’kyi, I. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2018
- Full Text
- View/download PDF
199. On Convergence of a Two-Dimensional Generalization of a Continued g-Fraction
- Author
-
Kuchmins’ka, Kh. [Ukrainian National Academy of Sciences, Pidstryhach Institute for Applied Problems in Mechanics and Mathematics (Ukraine)]
- Published
- 2018
- Full Text
- View/download PDF
200. Group Classification of a Class of Kolmogorov Equations with Time-Dependent Coefficients
- Author
-
Davydovych, V. [Ukrainian National Academy of Sciences, Institute of Mathematics (Ukraine)]
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.