-
Data-Driven Probabilistic Methodology for Aircraft Conflict Detection Under Wind Uncertainty
Authors:
Jaime de la Mota,
María Cerezo-Magaña,
Alberto Olivares,
Ernesto Staffetti
Abstract:
Assuming the availability of a reliable aircraft trajectory planner, this paper presents a probabilistic methodology to detect conflicts between aircraft, in the cruise phase of the flight, in the presence of wind prediction uncertainties quantified by ensemble weather forecasts, which are regarded as realizations of correlated random processes and employed to derive the eastward and northward com…
▽ More
Assuming the availability of a reliable aircraft trajectory planner, this paper presents a probabilistic methodology to detect conflicts between aircraft, in the cruise phase of the flight, in the presence of wind prediction uncertainties quantified by ensemble weather forecasts, which are regarded as realizations of correlated random processes and employed to derive the eastward and northward components of the wind velocity. First, the Karhunen-Lo`eve expansion is used to obtain a series expansion of the wind components in terms of a set of uncorrelated random variables and deterministic coefficients. Then, the uncertainty induced by these uncorrelated random variables in the outputs of the aircraft trajectory planner is quantified by means of the arbitrary polynomial chaos technique. Finally, the probability density function of the great circle distance between each pair of aircraft is derived from the polynomial expansions using a Gaussian kernel density estimator and employed to estimate the probability of conflict. The arbitrary polynomial chaos technique allows the effects of uncertainties in complex nonlinear dynamical system, such as those underlying aircraft trajectory planners, to be quantified with high computational efficiency, only requiring the existence of a finite number of statistical moments of the random variables of the Karhunen-Lo`eve expansion, while avoiding any assumption on their probability distributions. In order to demonstrate the effectiveness of the proposed conflict detection method, numerical experiments are conducted through an optimal control based aircraft trajectory planner for a given wind forecast represented by an ensemble prediction system.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
The volume of an isocanted cube is a determinant
Authors:
M. J de la Puente,
P. L. Clavería
Abstract:
In any dimension d>=2, we give exact volume formulas of two mutually polar dual convex d--polytopes. The primal body is called isocanted cube of dimension d, depending on two real parameters 0<a<l. The limit case a=0 yields a d--cube of edge--length l. We prove that the volume of such a body is the determinant of the matrix of order d having diagonal entries equal to l and a elsewhere.
We also c…
▽ More
In any dimension d>=2, we give exact volume formulas of two mutually polar dual convex d--polytopes. The primal body is called isocanted cube of dimension d, depending on two real parameters 0<a<l. The limit case a=0 yields a d--cube of edge--length l. We prove that the volume of such a body is the determinant of the matrix of order d having diagonal entries equal to l and a elsewhere.
We also compute the volume of the polar dual body, getting a rational expression in l and a, homogeneous of degree -d with rational coefficients.
Isocanted cubes are origin--symmetric zonotopes. Zonoids (defined as the limits of families of zonotopes) satisfy the Mahler conjecture; in particular, zonotopes do. Nonetheless, we confirm (by elementary methods) that the Mahler conjecture holds for isocanted cubes.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Pseudocentralizers and the Chermak Delgado Measure of the Mod $p^{n}$ Heisenberg Group
Authors:
David Allen,
José J. La Luz,
Stephen Majewicz,
Marcos Zyman
Abstract:
In this paper we compute the Chermak-Delgado measure of the mod $p^{n}$ Heisenberg Group for any prime $p$. To achieve this we introduce the notion of the pseudocentralizer and prove various results about it.
In this paper we compute the Chermak-Delgado measure of the mod $p^{n}$ Heisenberg Group for any prime $p$. To achieve this we introduce the notion of the pseudocentralizer and prove various results about it.
△ Less
Submitted 11 May, 2024;
originally announced May 2024.
-
Non-detectable patterns hidden within sequences of bits
Authors:
David Allen,
Jose J La Luz,
Guarionex Salivia,
Jonathan Hardwick
Abstract:
In this paper we construct families of bit sequences using combinatorial methods. Each sequence is derived by con- verting a collection of numbers encoding certain combinatorial nu- merics from objects exhibiting symmetry in various dimensions. Using the algorithms first described in [1] we show that the NIST testing suite described in publication 800-22 does not detect these symmetries hidden wit…
▽ More
In this paper we construct families of bit sequences using combinatorial methods. Each sequence is derived by con- verting a collection of numbers encoding certain combinatorial nu- merics from objects exhibiting symmetry in various dimensions. Using the algorithms first described in [1] we show that the NIST testing suite described in publication 800-22 does not detect these symmetries hidden within these sequences.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Incentive Designs for Learning Agents to Stabilize Coupled Exogenous Systems
Authors:
Jair Certório,
Nuno C. Martins,
Richard J. La,
Murat Arcak
Abstract:
We consider a large population of learning agents noncooperatively selecting strategies from a common set, influencing the dynamics of an exogenous system (ES) we seek to stabilize at a desired equilibrium. Our approach is to design a dynamic payoff mechanism capable of sha** the population's strategy profile, thus affecting the ES's state, by offering incentives for specific strategies within b…
▽ More
We consider a large population of learning agents noncooperatively selecting strategies from a common set, influencing the dynamics of an exogenous system (ES) we seek to stabilize at a desired equilibrium. Our approach is to design a dynamic payoff mechanism capable of sha** the population's strategy profile, thus affecting the ES's state, by offering incentives for specific strategies within budget limits. Employing system-theoretic passivity concepts, we establish conditions under which a payoff mechanism can be systematically constructed to ensure the global asymptotic stabilization of the ES's equilibrium. In comparison to previous approaches originally studied in the context of the so-called epidemic population games, the method proposed here allows for more realistic epidemic models and other types of ES, such as predator-prey dynamics. Stabilization is established with the support of a Lyapunov function, which provides useful bounds on the transients.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Epidemic Population Games And Perturbed Best Response Dynamics
Authors:
Shinkyu Park,
Jair Certorio,
Nuno C. Martins,
Richard J. La
Abstract:
This paper proposes an approach to mitigate epidemic spread in a population of strategic agents by encouraging safer behaviors through carefully designed rewards. These rewards, which vary according to the state of the epidemic, are ascribed by a dynamic payoff mechanism we seek to design. We use a modified SIRS model to track how the epidemic progresses in response to the population's agents stra…
▽ More
This paper proposes an approach to mitigate epidemic spread in a population of strategic agents by encouraging safer behaviors through carefully designed rewards. These rewards, which vary according to the state of the epidemic, are ascribed by a dynamic payoff mechanism we seek to design. We use a modified SIRS model to track how the epidemic progresses in response to the population's agents strategic choices. By employing perturbed best response evolutionary dynamics to model the population's strategic behavior, we extend previous related work so as to allow for noise in the agents' perceptions of the rewards and intrinsic costs of the available strategies. Central to our approach is the use of system-theoretic methods and passivity concepts to obtain a Lyapunov function, ensuring the global asymptotic stability of an endemic equilibrium with minimized infection prevalence, under budget constraints. We use the Lyapunov function to construct anytime upper bounds for the size of the population's infectious fraction. For a class of one-parameter perturbed best response models, we propose a method to learn the model's parameter from data.
△ Less
Submitted 22 February, 2024; v1 submitted 27 January, 2024;
originally announced January 2024.
-
Local Well-posedness for the Kinetic MMT Model
Authors:
Pierre Germain,
Joonhyun La,
Katherine Zhiyuan Zhang
Abstract:
The MMT equation was proposed by Majda, McLaughlin and Tabak as a model to study wave turbulence. We focus on the kinetic equation associated to this Hamiltonian system, which is believed to give a way to predict turbulent spectra. We clarify the formulation of the problem, and we develop the local well-posedness theory for this equation. Our analysis uncovers a surprising nonlinear smoothing phen…
▽ More
The MMT equation was proposed by Majda, McLaughlin and Tabak as a model to study wave turbulence. We focus on the kinetic equation associated to this Hamiltonian system, which is believed to give a way to predict turbulent spectra. We clarify the formulation of the problem, and we develop the local well-posedness theory for this equation. Our analysis uncovers a surprising nonlinear smoothing phenomenon.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
On LCP codes over a mixed ring alphabet
Authors:
Maryam Bajalan,
Javier de la Cruz,
Alexandre Fotue-Tabue,
Edgar Martínez-Moro
Abstract:
In this paper, we introduce a standard generator matrix for mixed-alphabet linear codes over finite chain rings. Furthermore, we show that, when one has a linear complementary pair (LCP) of mixed-alphabet linear codes, both codes are weakly-free. Additionally, we establish that any mixed-alphabet product group code is separable. Thus, if one has a pair $\{C, D\}$ of mixed-alphabet product group co…
▽ More
In this paper, we introduce a standard generator matrix for mixed-alphabet linear codes over finite chain rings. Furthermore, we show that, when one has a linear complementary pair (LCP) of mixed-alphabet linear codes, both codes are weakly-free. Additionally, we establish that any mixed-alphabet product group code is separable. Thus, if one has a pair $\{C, D\}$ of mixed-alphabet product group codes over a finite chain ring that forms a LCP, it follows that $C$ and the Euclidean dual of $D$ are permutation equivalent.
△ Less
Submitted 25 September, 2023;
originally announced September 2023.
-
Symmetric tensor powers of graphs
Authors:
Weymar Astaiza,
Alexander J. Barrios,
Henry Chimal-Dzul,
Stephan Ramon Garcia,
Jaaziel de la Luz,
Victor H. Moll,
Yunied Puig,
Diego Villamizar
Abstract:
The symmetric tensor power of graphs is introduced and its fundamental properties are explored. A wide range of intriguing phenomena occur when one considers symmetric tensor powers of familiar graphs. A host of open questions are presented, ho** to spur future research.
The symmetric tensor power of graphs is introduced and its fundamental properties are explored. A wide range of intriguing phenomena occur when one considers symmetric tensor powers of familiar graphs. A host of open questions are presented, ho** to spur future research.
△ Less
Submitted 24 September, 2023;
originally announced September 2023.
-
The Arc-Floer conjecture for plane curves
Authors:
Javier de la Bodega,
Eduardo de Lorenzo Poza
Abstract:
In arXiv:1911.08213 it was conjectured that the compactly supported cohomology of the $m$-th restricted contact locus of an isolated hypersurface singularity coincides, up to a shift, with the Floer cohomology of the $m$-th iterate of the monodromy of the Milnor fiber. In this paper we give an affirmative answer to this conjecture in the case of plane curves.
In arXiv:1911.08213 it was conjectured that the compactly supported cohomology of the $m$-th restricted contact locus of an isolated hypersurface singularity coincides, up to a shift, with the Floer cohomology of the $m$-th iterate of the monodromy of the Milnor fiber. In this paper we give an affirmative answer to this conjecture in the case of plane curves.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
Learning-based State Estimation in Distribution Systems with Limited Real-Time Measurements
Authors:
J. G. De la Varga,
S. Pineda,
J. M. Morales,
Á. Porras
Abstract:
The task of state estimation in active distribution systems faces a major challenge due to the integration of different measurements with multiple reporting rates. As a result, distribution systems are essentially unobservable in real time, indicating the existence of multiple states that result in identical values for the available measurements. Certain existing approaches utilize historical data…
▽ More
The task of state estimation in active distribution systems faces a major challenge due to the integration of different measurements with multiple reporting rates. As a result, distribution systems are essentially unobservable in real time, indicating the existence of multiple states that result in identical values for the available measurements. Certain existing approaches utilize historical data to infer the relationship between real-time available measurements and the state. Other learning-based methods aim to estimate the measurements acquired with a delay, generating pseudo-measurements. Our paper presents a methodology that utilizes the outcome of an unobservable state estimator to exploit information on the joint probability distribution between real-time available measurements and delayed ones. Through numerical simulations conducted on a realistic distribution grid with insufficient real-time measurements, the proposed procedure showcases superior performance compared to existing state forecasting approaches and those relying on inferred pseudo-measurements.
△ Less
Submitted 10 May, 2024; v1 submitted 31 July, 2023;
originally announced July 2023.
-
A uniform bound for solutions to a thermo-diffusive system
Authors:
Joonhyun La,
Jean-Michel Roquejoffre,
Lenya Ryzhik
Abstract:
We obtain uniform in time $L^\infty$-bounds for the solutions to a class of thermo-diffusive systems. The nonlinearity is assumed to be at most sub-exponentially growing at infinity and have a linear behavior near zero.
We obtain uniform in time $L^\infty$-bounds for the solutions to a class of thermo-diffusive systems. The nonlinearity is assumed to be at most sub-exponentially growing at infinity and have a linear behavior near zero.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
On LCP and checkable group codes over finite non-commutative Frobenius rings
Authors:
Sanjit Bhowmick,
Javier de la Cruz,
Edgar Martínez-Moro,
Anuradha Sharma
Abstract:
We provide a simple proof for a complementary pair of group codes over a finite non-commutative Frobenius ring of the fact that one of them is equivalent to the other one. We also explore this fact for checkeable codes over the same type of alphabet.
We provide a simple proof for a complementary pair of group codes over a finite non-commutative Frobenius ring of the fact that one of them is equivalent to the other one. We also explore this fact for checkeable codes over the same type of alphabet.
△ Less
Submitted 13 April, 2023; v1 submitted 31 March, 2023;
originally announced March 2023.
-
Variations of star selection principles on Hyperspaces
Authors:
Javier Casas-de la Rosa
Abstract:
In this paper we define some combinatorial principles to characterize spaces $X$ whose hyperspace satisfies some variation of some classical star selection principle. Specifically, the variations characterized are the selective and absolute versions of the star selection principles for the Menger and Rothberger cases; also, the hyperspaces considered in these characterizations are $CL(X)$,…
▽ More
In this paper we define some combinatorial principles to characterize spaces $X$ whose hyperspace satisfies some variation of some classical star selection principle. Specifically, the variations characterized are the selective and absolute versions of the star selection principles for the Menger and Rothberger cases; also, the hyperspaces considered in these characterizations are $CL(X)$, $\mathbb{K}(X)$, $\mathbb{F}(X)$ and $\mathbb{CS}(X)$ in both cases, endowed with either the Fell topology or the Vietoris topology.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
On spaces with star kernel Menger
Authors:
Javier Casas-de la Rosa,
Ángel Tamariz-Mascarúa
Abstract:
Given a topological property $\mathcal{P}$, a space $X$ is called star-$\mathcal{P}$ if for any open cover $\mathcal{U}$ of the space $X$, there exists a set $Y\subseteq X$ with property $\mathcal{P}$ such that $St(Y,\mathcal{U})=X$; the set $Y$ is called a star kernel of the cover $\mathcal{U}$. In this paper, we introduce and study spaces with star kernel Menger, that is, star Menger spaces. Som…
▽ More
Given a topological property $\mathcal{P}$, a space $X$ is called star-$\mathcal{P}$ if for any open cover $\mathcal{U}$ of the space $X$, there exists a set $Y\subseteq X$ with property $\mathcal{P}$ such that $St(Y,\mathcal{U})=X$; the set $Y$ is called a star kernel of the cover $\mathcal{U}$. In this paper, we introduce and study spaces with star kernel Menger, that is, star Menger spaces. Some examples are given to show the relationship with some other related properties studied previously, and the behaviour of the star Menger property with respect to subspaces, products, continuous images and preimages are investigated. Additionally, some comments on the star selection theory are given. Particularly, some questions posed by Song within this theory are addressed. Finally, several new properties are introduced as well as some general questions on them are posed.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
Twisted skew $G$-codes
Authors:
Angelot Behajaina,
Martino Borello,
Javier de la Cruz,
Wolfgang Willems
Abstract:
In this paper we investigate left ideals as codes in twisted skew group rings. The considered rings, which are often algebras over a finite field, allows us to detect many of the well-known codes. The presentation, given here, unifies the concept of group codes, twisted group codes and skew group codes.
In this paper we investigate left ideals as codes in twisted skew group rings. The considered rings, which are often algebras over a finite field, allows us to detect many of the well-known codes. The presentation, given here, unifies the concept of group codes, twisted group codes and skew group codes.
△ Less
Submitted 26 December, 2022;
originally announced December 2022.
-
Iterations and unions of star selection properties on topological spaces
Authors:
Javier Casas-de la Rosa,
William Chen-Mertens,
Sergio Garcia-Balan
Abstract:
In this paper, we investigate what selection principles properties are possessed by small (with respect to the bounding and dominating numbers) unions of spaces with certain (star) selection principles.. Furthermore, we give several results about iterations of these properties and weaker properties than paracompactness. In addition, we study the behaviour of these iterated properties on $Ψ$-spaces…
▽ More
In this paper, we investigate what selection principles properties are possessed by small (with respect to the bounding and dominating numbers) unions of spaces with certain (star) selection principles.. Furthermore, we give several results about iterations of these properties and weaker properties than paracompactness. In addition, we study the behaviour of these iterated properties on $Ψ$-spaces. Finally, we show that, consistently, there is a normal star-Menger space that is not strongly star-Menger.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Federated Learning with Server Learning: Enhancing Performance for Non-IID Data
Authors:
Van Sy Mai,
Richard J. La,
Tao Zhang
Abstract:
Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing…
▽ More
Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing the server to perform auxiliary learning from a small dataset. Our analysis and experiments show that this new approach can achieve significant improvements in both model accuracy and convergence time even when the server dataset is small and its distribution differs from that of the aggregated data from all clients.
△ Less
Submitted 15 August, 2023; v1 submitted 5 October, 2022;
originally announced October 2022.
-
On the embedded Nash problem
Authors:
Nero Budur,
Javier de la Bodega,
Eduardo de Lorenzo Poza,
Javier Fernández de Bobadilla,
Tomasz Pełka
Abstract:
The embedded Nash problem for a hypersurface in a smooth algebraic variety, is to characterize geometrically the maximal irreducible families of arcs with fixed order of contact along the hypersurface. We show that divisors on minimal models of the pair contribute with such families. We solve the problem for unibranch plane curve germs, in terms of the resolution graph. These are embedded analogs…
▽ More
The embedded Nash problem for a hypersurface in a smooth algebraic variety, is to characterize geometrically the maximal irreducible families of arcs with fixed order of contact along the hypersurface. We show that divisors on minimal models of the pair contribute with such families. We solve the problem for unibranch plane curve germs, in terms of the resolution graph. These are embedded analogs of known results for the classical Nash problem on singular varieties.
△ Less
Submitted 25 June, 2024; v1 submitted 17 August, 2022;
originally announced August 2022.
-
Regularity and drift by Osgood vector fields
Authors:
Joonhyun La
Abstract:
We consider the problem of loss and propagation of regularity of transport equation with Osgood vector field. As an application, we obtain a quantitative stability estimate for 2D incompressible Euler equation with generalized Yudovich initial data.
We consider the problem of loss and propagation of regularity of transport equation with Osgood vector field. As an application, we obtain a quantitative stability estimate for 2D incompressible Euler equation with generalized Yudovich initial data.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
Vorticity convergence from Boltzmann to 2D incompressible Euler equations below Yudovich class
Authors:
Chanwoo Kim,
Joonhyun La
Abstract:
It is challenging to perform a multiscale analysis of mesoscopic systems exhibiting singularities at the macroscopic scale. In this paper, we study the hydrodynamic limit of the Boltzmann equations $$\mathrm{St} \partial_t F + v\cdot \nabla_x F = \frac{1}{\mathrm{Kn}} Q(F ,F ) $$ toward the singular solutions of 2D incompressible Euler equations whose vorticity is unbounded…
▽ More
It is challenging to perform a multiscale analysis of mesoscopic systems exhibiting singularities at the macroscopic scale. In this paper, we study the hydrodynamic limit of the Boltzmann equations $$\mathrm{St} \partial_t F + v\cdot \nabla_x F = \frac{1}{\mathrm{Kn}} Q(F ,F ) $$ toward the singular solutions of 2D incompressible Euler equations whose vorticity is unbounded $$\partial_t u + u \cdot \nabla_x u + \nabla_x p = 0,\text{div }u =0.$$ We obtain a microscopic description of the singularity through the so-called kinetic vorticity and understand its behavior in the vicinity of the macroscopic singularity. As a consequence of our new analysis, we settle affirmatively an open problem of the hydrodynamic limit toward Lagrangian solutions of the 2D incompressible Euler equation whose vorticity is unbounded ($ω\in L^\mathfrak{p}$ for any fixed $1 \leq \mathfrak{p} < \infty$). Moreover, we prove the convergence of kinetic vorticities toward the vorticity of the Lagrangian solution of the Euler equation. In particular, we obtain the rate of convergence when the vorticity blows up moderately in $L^\mathfrak{p}$ as $\mathfrak{p} \rightarrow \infty$ (localized Yudovich class).
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
Public key cryptography based on skew dihedral group rings
Authors:
Javier de la Cruz,
Edgar Martínez-Moro,
Ricardo Villanueva-Polanco
Abstract:
In this paper, we propose to use a skew dihedral group ring given by the group $D_{2n}$ and the finite field $\mathbb{F}_{q^2}$ for public-key cryptography. Using the ambient space $\mathbb{F}_{q^{2}}^θ D_{2n}$ and a group homomorphism $θ: D_{2n} \rightarrow \mathrm{Aut}(\mathbb{F}_{q^2})$, we introduce a key exchange protocol and present an analysis of its security. Moreover, we explore the prope…
▽ More
In this paper, we propose to use a skew dihedral group ring given by the group $D_{2n}$ and the finite field $\mathbb{F}_{q^2}$ for public-key cryptography. Using the ambient space $\mathbb{F}_{q^{2}}^θ D_{2n}$ and a group homomorphism $θ: D_{2n} \rightarrow \mathrm{Aut}(\mathbb{F}_{q^2})$, we introduce a key exchange protocol and present an analysis of its security. Moreover, we explore the properties of the resulting skew group ring $\mathbb{F}_{q^{2}}^θ D_{2n}$, exploiting them to enhance our key exchange protocol. We also introduce a probabilistic public-key scheme derived from our key exchange protocol and obtain a key encapsulation mechanism (KEM) by applying a well-known generic transformation to our public-key scheme. Finally, we present a proof-of-concept implementation of our cryptographic constructions. To the best of our knowledge, this is the first paper that proposes a skew dihedral group ring for public-key cryptography.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
A uniform bound for solutions to a thermo-diffusive system
Authors:
Joonhyun La,
Lenya Ryzhik
Abstract:
We obtain uniform in time bounds for the solutions to a class of thermo-diffusive systems with classical and fractional diffusions. In the classical diffusion case, the nonlinearities are assumed to be at most exponentially growing, while for the fractional diffusions they should grow slightly sub-exponentially. The proofs are based on the strategy of Herrero, Lacey, and Velazquez.
We obtain uniform in time bounds for the solutions to a class of thermo-diffusive systems with classical and fractional diffusions. In the classical diffusion case, the nonlinearities are assumed to be at most exponentially growing, while for the fractional diffusions they should grow slightly sub-exponentially. The proofs are based on the strategy of Herrero, Lacey, and Velazquez.
△ Less
Submitted 1 February, 2023; v1 submitted 21 April, 2022;
originally announced April 2022.
-
Epidemic Population Games With Nonnegligible Disease Death Rate
Authors:
Jair Certorio,
Nuno C. Martins,
Richard J. La
Abstract:
A recent article that combines normalized epidemic compartmental models and population games put forth a system theoretic approach to capture the coupling between a population's strategic behavior and the course of an epidemic. It introduced a payoff mechanism that governs the population's strategic choices via incentives, leading to the lowest endemic proportion of infectious individuals subject…
▽ More
A recent article that combines normalized epidemic compartmental models and population games put forth a system theoretic approach to capture the coupling between a population's strategic behavior and the course of an epidemic. It introduced a payoff mechanism that governs the population's strategic choices via incentives, leading to the lowest endemic proportion of infectious individuals subject to cost constraints. Under the assumption that the disease death rate is approximately zero, it uses a Lyapunov function to prove convergence and formulate a quasi-convex program to compute an upper bound for the peak size of the population's infectious fraction. In this article, we generalize these results to the case in which the disease death rate is nonnegligible. This generalization brings on additional coupling terms in the normalized compartmental model, leading to a more intricate Lyapunov function and payoff mechanism. Moreover, the associated upper bound can no longer be determined exactly, but it can be computed with arbitrary accuracy by solving a set of convex programs.
△ Less
Submitted 2 April, 2022;
originally announced April 2022.
-
Propagation of singularities by Osgood vector fields and for 2D inviscid incompressible fluids
Authors:
Theodore D. Drivas,
Tarek M. Elgindi,
Joonhyun La
Abstract:
We show that certain singular structures (Hölderian cusps and mild divergences) are transported by the flow of homeomorphisms generated by an Osgood velocity field. The structure of these singularities is related to the modulus of continuity of the velocity and the results are shown to be sharp in the sense that slightly more singular structures cannot generally be propagated. For the 2D Euler equ…
▽ More
We show that certain singular structures (Hölderian cusps and mild divergences) are transported by the flow of homeomorphisms generated by an Osgood velocity field. The structure of these singularities is related to the modulus of continuity of the velocity and the results are shown to be sharp in the sense that slightly more singular structures cannot generally be propagated. For the 2D Euler equation, we prove that certain singular structures are preserved by the motion, e.g. a system of $\log\log_+(1/|x|)$ vortices (and those that are slightly less singular) travel with the fluid in a nonlinear fashion, up to bounded perturbations. We also give stability results for weak Euler solutions away from their singular set.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Invariant measures for stochastic conservation laws on the line
Authors:
Theodore D. Drivas,
Alexander Dunlap,
Cole Graham,
Joonhyun La,
Lenya Ryzhik
Abstract:
We consider a stochastic conservation law on the line with solution-dependent diffusivity, a super-linear, sub-quadratic Hamiltonian, and smooth, spatially-homogeneous kick-type random forcing. We show that this Markov process admits a unique ergodic spatially-homogeneous invariant measure for each mean in a non-explicit unbounded set. This generalizes previous work on the stochastic Burgers equat…
▽ More
We consider a stochastic conservation law on the line with solution-dependent diffusivity, a super-linear, sub-quadratic Hamiltonian, and smooth, spatially-homogeneous kick-type random forcing. We show that this Markov process admits a unique ergodic spatially-homogeneous invariant measure for each mean in a non-explicit unbounded set. This generalizes previous work on the stochastic Burgers equation.
△ Less
Submitted 11 April, 2023; v1 submitted 29 January, 2022;
originally announced January 2022.
-
Epidemic Population Games And Evolutionary Dynamics
Authors:
Nuno C. Martins,
Jair Certorio,
Richard J. La
Abstract:
We propose a system theoretic approach to select and stabilize the endemic equilibrium of an SIRS epidemic model in which the decisions of a population of strategically interacting agents determine the transmission rate. Specifically, the population's agents recurrently revise their choices out of a set of strategies that impact to varying levels the transmission rate. A payoff vector quantifying…
▽ More
We propose a system theoretic approach to select and stabilize the endemic equilibrium of an SIRS epidemic model in which the decisions of a population of strategically interacting agents determine the transmission rate. Specifically, the population's agents recurrently revise their choices out of a set of strategies that impact to varying levels the transmission rate. A payoff vector quantifying the incentives provided by a planner for each strategy, after deducting the strategies' intrinsic costs, influences the revision process. An evolutionary dynamics model captures the population's preferences in the revision process by specifying as a function of the payoff vector the rates at which the agents' choices flow toward strategies with higher payoffs. Our main result is a dynamic payoff mechanism that is guaranteed to steer the epidemic variables (via incentives to the population) to the endemic equilibrium with the smallest infectious fraction, subject to cost constraints. We use a Lyapunov function not only to establish convergence but also to obtain an (anytime) upper bound for the peak size of the population's infectious portion.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Public key cryptography based on twisted dihedral group algebras
Authors:
Javier de la Cruz,
Ricardo Villanueva-Polanco
Abstract:
In this paper, we propose to use a twisted dihedral group algebra for public-key cryptography. For this, we introduce a new $2$-cocycle $α_λ$ to twist the dihedral group algebra. Using the ambient space $\mathbb{F}^{α_λ} D_{2n}$, we then introduce a key exchange protocol and present an analysis of its security. Moreover, we explore the properties of the resulting twisted algebra…
▽ More
In this paper, we propose to use a twisted dihedral group algebra for public-key cryptography. For this, we introduce a new $2$-cocycle $α_λ$ to twist the dihedral group algebra. Using the ambient space $\mathbb{F}^{α_λ} D_{2n}$, we then introduce a key exchange protocol and present an analysis of its security. Moreover, we explore the properties of the resulting twisted algebra $\mathbb{F}^{α_λ}D_{2n}$, exploiting them to enhance our key exchange protocol. We also introduce a probabilistic public-key scheme derived from our key-exchange protocol and obtain a key encapsulation mechanism (KEM) by applying a well-known generic transformation to our public-key scheme. Finally, we present a proof-of-concept implementation of the resulting key encapsulation mechanism.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
Relationships between some selection principles and star selection principles
Authors:
Javier Casas de la Rosa
Abstract:
Motivated by the definition of classical star selection principles, Cruz-Castillo, Ramírez-Páramo and Tenorio defined some selection principles and posed several questions about relationships between these notions and some of the classical star selection principles. The main goal of this paper is to answer the questions posed by these authors. In addition, we show that some of these defined select…
▽ More
Motivated by the definition of classical star selection principles, Cruz-Castillo, Ramírez-Páramo and Tenorio defined some selection principles and posed several questions about relationships between these notions and some of the classical star selection principles. The main goal of this paper is to answer the questions posed by these authors. In addition, we show that some of these defined selection principles are equivalent by taking collections of complements; also, some other results are provided involving collections of refinements.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Independent, Incidence Independent and Weakly Reversible Decompositions of Chemical Reaction Networks
Authors:
Bryan S. Hernandez,
Deza A. Amistas,
Ralph John L. De la Cruz,
Lauro L. Fontanil,
Aurelio A. de los Reyes V,
Eduardo R. Mendoza
Abstract:
Chemical reaction networks (CRNs) are directed graphs with reactant or product complexes as vertices, and reactions as arcs. A CRN is weakly reversible if each of its connected components is strongly connected. Weakly reversible networks can be considered as the most important class of reaction networks. Now, the stoichiometric subspace of a network is the linear span of the reaction vectors (i.e.…
▽ More
Chemical reaction networks (CRNs) are directed graphs with reactant or product complexes as vertices, and reactions as arcs. A CRN is weakly reversible if each of its connected components is strongly connected. Weakly reversible networks can be considered as the most important class of reaction networks. Now, the stoichiometric subspace of a network is the linear span of the reaction vectors (i.e., difference between the product and the reactant complexes). A decomposition of a CRN is independent (incidence independent) if the direct sum of the stoichiometric subspaces (incidence maps) of the subnetworks equals the stoichiometric subspace (incidence map) of the whole network. Decompositions can be used to study relationships between steady states of the whole system (induced from partitioning the reaction set of the underlying network) and those of its subsystems. In this work, we revisit our novel method of finding independent decomposition, and use it to expand applicability on (vector) components of steady states. We also explore CRNs with embedded deficiency zero independent subnetworks. In addition, we establish a method for finding incidence independent decomposition of a CRN. We determine all the forms of independent and incidence independent decompositions of a network, and provide the number of such decompositions. Lastly, for weakly reversible networks, we determine that incidence independence is a sufficient condition for weak reversibility of a decomposition, and we identify subclasses of weakly reversible networks where any independent decomposition is weakly reversible.
△ Less
Submitted 23 August, 2021; v1 submitted 12 August, 2021;
originally announced August 2021.
-
Distributed Optimization with Global Constraints Using Noisy Measurements
Authors:
Van Sy Mai,
Richard J. La,
Tao Zhang,
Abdella Battou
Abstract:
We propose a new distributed optimization algorithm for solving a class of constrained optimization problems in which (a) the objective function is separable (i.e., the sum of local objective functions of agents), (b) the optimization variables of distributed agents, which are subject to nontrivial local constraints, are coupled by global constraints, and (c) only noisy observations are available…
▽ More
We propose a new distributed optimization algorithm for solving a class of constrained optimization problems in which (a) the objective function is separable (i.e., the sum of local objective functions of agents), (b) the optimization variables of distributed agents, which are subject to nontrivial local constraints, are coupled by global constraints, and (c) only noisy observations are available to estimate (the gradients of) local objective functions. In many practical scenarios, agents may not be willing to share their optimization variables with others. For this reason, we propose a distributed algorithm that does not require the agents to share their optimization variables with each other; instead, each agent maintains a local estimate of the global constraint functions and share the estimate only with its neighbors. These local estimates of constraint functions are updated using a consensus-type algorithm, while the local optimization variables of each agent are updated using a first-order method based on noisy estimates of gradient. We prove that, when the agents adopt the proposed algorithm, their optimization variables converge with probability 1 to an optimal point of an approximated problem based on the penalty method.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Variations of star selection principles on small spaces
Authors:
Javier Casas-de la Rosa,
Sergio A. Garcia-Balan
Abstract:
In this paper, we introduce the notions of Star-$σ\mathcal{K}$ and absolutely Star-$σ\mathcal{K}$ spaces which allow us to unify results among several properties in the theory of star selection principles on small spaces. In particular, results on star selective versions of the Menger, Hurewicz and Rothberger properties and selective versions of property $(a)$ regarding the size of the space. Conn…
▽ More
In this paper, we introduce the notions of Star-$σ\mathcal{K}$ and absolutely Star-$σ\mathcal{K}$ spaces which allow us to unify results among several properties in the theory of star selection principles on small spaces. In particular, results on star selective versions of the Menger, Hurewicz and Rothberger properties and selective versions of property $(a)$ regarding the size of the space. Connections to other well-known star properties are mentioned. Furthermore, the absolute and selective version of the neighbourhood star selection principle are introduced. As an application, it is obtained that the extent of a separable absolutely strongly star-Menger (absolutely strongly star-Hurewicz) space is at most the dominating number $\mathfrak{d}$ (the bounding number $\mathfrak{b}$).
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Independent Decompositions of Chemical Reaction Networks
Authors:
Bryan S. Hernandez,
Ralph John L. De la Cruz
Abstract:
A chemical reaction network (CRN) is composed of reactions that can be seen as interactions among entities called species, which exist within the system. Endowed with kinetics, CRN has a corresponding set of ordinary differential equations (ODEs). In Chemical Reaction Network Theory, we are interested with connections between the structure of the CRN and qualitative properties of the corresponding…
▽ More
A chemical reaction network (CRN) is composed of reactions that can be seen as interactions among entities called species, which exist within the system. Endowed with kinetics, CRN has a corresponding set of ordinary differential equations (ODEs). In Chemical Reaction Network Theory, we are interested with connections between the structure of the CRN and qualitative properties of the corresponding ODEs. One of the results in Decomposition Theory of CRNs is that the intersection of the sets of positive steady states of the subsystems is equal to the set of positive steady states of the whole system, if the decomposition is independent. Hence, computational approach using independent decompositions can be used as an efficient tool in studying large systems. In this work, we provide a necessary and sufficient condition for the existence of a nontrivial independent decomposition of a CRN, which leads to a novel step-by-step method to obtain such decomposition, if it exists. We also illustrate these results using real-life examples. In particular, we show that a CRN of a popular model of anaerobic yeast fermentation pathway has a nontrivial independent decomposition, while a particular biological system, which is a metabolic network with one positive feedforward and a negative feedback has none. Finally, we analyze properties of steady states of reaction networks of specific influenza virus models.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Quasi--Euclidean classification of Alcoved Convex Polyhedra
Authors:
M. J. de la Puente
Abstract:
We give the quasi--Euclidean classification of the maximal (with respect to the $f$--vector) alcoved polyhedra. The $f$--vector of these maximal convex bodies is $(20,30,12)$, so they are simple dodecahedra. We find eight quasi--Euclidean classes. This classification, which preserves angles, is finer than the known combinatorial classification (found in 2012 by Jiménez and de la Puente), which has…
▽ More
We give the quasi--Euclidean classification of the maximal (with respect to the $f$--vector) alcoved polyhedra. The $f$--vector of these maximal convex bodies is $(20,30,12)$, so they are simple dodecahedra. We find eight quasi--Euclidean classes. This classification, which preserves angles, is finer than the known combinatorial classification (found in 2012 by Jiménez and de la Puente), which has only six classes. Each alcoved polyhedron $\mathcal{P}$ is represented by a unique visualized idempotent matrix $A$. Some 2--minors of $A$ are invariants of $\mathcal{P}$: they are the tropical edge--lengths of $\mathcal{P}$.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Isocanted alcoved polytopes
Authors:
María Jesús de la Puente,
Pedro Luis Clavería
Abstract:
Through tropical normal idempotent matrices, we introduce isocanted alcoved polytopes, computing their $f$--vectors and checking the validity of the following five conjectures: Bárány, unimodality, $3^d$, flag and cubical lower bound (CLBC). Isocanted alcoved polytopes are centrally symmetric, almost simple cubical polytopes. They are zonotopes. We show that, for each dimension, there is a unique…
▽ More
Through tropical normal idempotent matrices, we introduce isocanted alcoved polytopes, computing their $f$--vectors and checking the validity of the following five conjectures: Bárány, unimodality, $3^d$, flag and cubical lower bound (CLBC). Isocanted alcoved polytopes are centrally symmetric, almost simple cubical polytopes. They are zonotopes. We show that, for each dimension, there is a unique combinatorial type. In dimension $d$, an isocanted alcoved polytope has $2^{d+1}-2$ vertices, its face lattice is the lattice of proper subsets of $[d+1]$ and its diameter is $d+1$. They are realizations of $d$--elementary cubical polytopes. The $f$--vector of a $d$--dimensional isocanted alcoved polytope attains its maximum at the integer $\lfloor d/3\rfloor$.
△ Less
Submitted 29 September, 2020;
originally announced September 2020.
-
Orthogonality for $(0,-1)$ tropical normal matrices
Authors:
Bakhad Bakhadly,
Alexander Guterman,
María Jesús de la Puente
Abstract:
We study pairs of mutually orthogonal normal matrices with respect to tropical multiplication. Minimal orthogonal pairs are characterized. The diameter and girth of three graphs arising from the orthogonality equivalence relation are computed.
We study pairs of mutually orthogonal normal matrices with respect to tropical multiplication. Minimal orthogonal pairs are characterized. The diameter and girth of three graphs arising from the orthogonality equivalence relation are computed.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Density of diagonalizable matrices in sets of structured matrices defined from indefinite scalar products
Authors:
Ralph John de la Cruz,
Philip Saltenberger
Abstract:
For an (indefinite) scalar product $[x,y]_B = x^HBy$ for $B= \pm B^H \in Gl_n(\mathbb{C})$ on $\mathbb{C}^n \times \mathbb{C}^n$ we show that the set of diagonalizable matrices is dense in the set of all $B$-selfadjoint, $B$-skewadjoint, $B$-unitary and $B$-normal matrices.
For an (indefinite) scalar product $[x,y]_B = x^HBy$ for $B= \pm B^H \in Gl_n(\mathbb{C})$ on $\mathbb{C}^n \times \mathbb{C}^n$ we show that the set of diagonalizable matrices is dense in the set of all $B$-selfadjoint, $B$-skewadjoint, $B$-unitary and $B$-normal matrices.
△ Less
Submitted 1 July, 2020;
originally announced July 2020.
-
Generic canonical forms for perplectic and symplectic normal matrices
Authors:
Ralph John de la Cruz,
Philip Saltenberger
Abstract:
Let $B$ be some invertible Hermitian or skew-Hermitian matrix. A matrix $A$ is called $B$-normal if $AA^\star = A^\star A$ holds for $A$ and its adjoint matrix $A^\star := B^{-1}A^HB$. In addition, a matrix $Q$ is called $B$-unitary, if $Q^HBQ = B$. We develop sparse canonical forms for nondefective (i.e. diagonalizable) $J_{2n}$-normal matrices and $R_n$-normal matrices under $J_{2n}$-unitary (…
▽ More
Let $B$ be some invertible Hermitian or skew-Hermitian matrix. A matrix $A$ is called $B$-normal if $AA^\star = A^\star A$ holds for $A$ and its adjoint matrix $A^\star := B^{-1}A^HB$. In addition, a matrix $Q$ is called $B$-unitary, if $Q^HBQ = B$. We develop sparse canonical forms for nondefective (i.e. diagonalizable) $J_{2n}$-normal matrices and $R_n$-normal matrices under $J_{2n}$-unitary ($R_n$-unitary, respectively) similarity transformations where $$J_{2n} = \begin{bmatrix} & I_n \\ - I_n & \end{bmatrix} \in M_{2n}(\mathbb{C})$$ and $R_n$ is the $n \times n$ sip matrix with ones on its anti-diagonal and zeros elsewhere. For both cases we show that these forms exist for an open and dense subset of $J_{2n}/R_n$-normal matrices. This implies that these forms can be seen as topologically 'generic' for $J_{2n}/R_n$-normal matrices since they exist for all such matrices except a nowhere dense subset.
△ Less
Submitted 11 July, 2020; v1 submitted 27 June, 2020;
originally announced June 2020.
-
Optimal Cybersecurity Investments in Large Networks Using SIS Model: Algorithm Design
Authors:
Van Sy Mai,
Richard J. La,
Abdella Battou
Abstract:
We study the problem of minimizing the (time) average security costs in large networks/systems comprising many interdependent subsystems, where the state evolution is captured by a susceptible-infected-susceptible (SIS) model. The security costs reflect security investments, economic losses and recovery costs from infections and failures following successful attacks. We show that the resulting opt…
▽ More
We study the problem of minimizing the (time) average security costs in large networks/systems comprising many interdependent subsystems, where the state evolution is captured by a susceptible-infected-susceptible (SIS) model. The security costs reflect security investments, economic losses and recovery costs from infections and failures following successful attacks. We show that the resulting optimization problem is nonconvex and propose a suite of algorithms - two based on a convex relaxation, and the other two for finding a local minimizer, based on a reduced gradient method and sequential convex programming. Also, we provide a sufficient condition under which the convex relaxations are exact and, hence, their solution coincides with that of the original problem. Numerical results are provided to validate our analytical results and to demonstrate the effectiveness of the proposed algorithms.
△ Less
Submitted 7 May, 2021; v1 submitted 14 May, 2020;
originally announced May 2020.
-
Miniature Robot Path Planning for Bridge Inspection: Min-Max Cycle Cover-Based Approach
Authors:
Michael Lin,
Richard J. La
Abstract:
We study the problem of planning the deployments of a group of mobile robots. While the problem and formulation can be used for many different problems, here we use a bridge inspection as the motivating application for the purpose of exposition. The robots are initially stationed at a set of depots placed throughout the bridge. Each robot is then assigned a set of sites on the bridge to inspect an…
▽ More
We study the problem of planning the deployments of a group of mobile robots. While the problem and formulation can be used for many different problems, here we use a bridge inspection as the motivating application for the purpose of exposition. The robots are initially stationed at a set of depots placed throughout the bridge. Each robot is then assigned a set of sites on the bridge to inspect and, upon completion, must return to the same depot where it is stored.
The problem of robot planning is formulated as a rooted min-max cycle cover problem, in which the vertex set consists of the sites to be inspected and robot depots, and the weight of an edge captures either (i) the amount of time needed to travel from one end vertex to the other vertex or (ii) the necessary energy expenditure for the travel. In the first case, the objective function is the total inspection time, whereas in the latter case, it is the maximum energy expenditure among all deployed robots. We propose a novel algorithm with approximation ratio of $5 + ε$, where $0<ε<1$. In addition, the computational complexity of the proposed algorithm is shown to be $O\big( n^2+2^{m-1} n \log(n+k) \big)$, where $n$ is the number of vertices, and $m$ is the number of depots.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Queueing Subject To Action-Dependent Server Performance: Utilization Rate Reduction
Authors:
Michael Lin,
Nuno C. Martins,
Richard J. La
Abstract:
We consider a discrete-time system comprising a first-come-first-served queue, a non-preemptive server, and a stationary non-work-conserving scheduler. New tasks enter the queue according to a Bernoulli process with a pre-specified arrival rate. At each instant, the server is either busy working on a task or is available. When the server is available, the scheduler either assigns a new task to the…
▽ More
We consider a discrete-time system comprising a first-come-first-served queue, a non-preemptive server, and a stationary non-work-conserving scheduler. New tasks enter the queue according to a Bernoulli process with a pre-specified arrival rate. At each instant, the server is either busy working on a task or is available. When the server is available, the scheduler either assigns a new task to the server or allows it to remain available (to rest). In addition to the aforementioned availability state, we assume that the server has an integer-valued activity state. The activity state is non-decreasing during work periods, and is non-increasing otherwise. In a typical application of our framework, the server performance (understood as task completion probability) worsens as the activity state increases. In this article, we build on and transcend recent stabilizability results obtained for the same framework. Specifically, we establish methods to design scheduling policies that not only stabilize the queue but also reduce the utilization rate - understood as the infinite-horizon time-averaged portion of time the server is working. This article has a main theorem leading to two key results: (i) We put forth a tractable method to determine, using a finite-dimensional linear program (LP), the infimum of all utilization rates that can be achieved by scheduling policies that are stabilizing, for a given arrival rate. (ii) We propose a design method, also based on finite-dimensional LPs, to obtain stabilizing scheduling policies that can attain a utilization rate arbitrarily close to the aforementioned infimum. We also establish structural and distributional convergence properties, which are used throughout the article, and are significant in their own right.
△ Less
Submitted 3 August, 2020; v1 submitted 19 February, 2020;
originally announced February 2020.
-
A Note on Linear Complementary Pairs of Group Codes
Authors:
Martino Borello,
Javier de la Cruz,
Wolfgang Willems
Abstract:
We give a short and elementary proof of the fact that for a linear complementary pair $(C,D)$, where $C$ and $D$ are $2$-sided ideals in a group algebra, $D$ is uniquely determined by $C$ and the dual code $D^\perp$ is permutation equivalent to $C$. This includes earlier results of Carlet et al. and Güneri et al. on nD cyclic codes which have been proved by subtle and lengthy calculations in the s…
▽ More
We give a short and elementary proof of the fact that for a linear complementary pair $(C,D)$, where $C$ and $D$ are $2$-sided ideals in a group algebra, $D$ is uniquely determined by $C$ and the dual code $D^\perp$ is permutation equivalent to $C$. This includes earlier results of Carlet et al. and Güneri et al. on nD cyclic codes which have been proved by subtle and lengthy calculations in the space of polynomials.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Channels, Remote Estimation and Queueing Systems With A Utilization-Dependent Component: A Unifying Survey Of Recent Results
Authors:
Varun Jog,
Richard J. La,
Michael Lin,
Nuno C. Martins
Abstract:
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design wit…
▽ More
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design with performance guarantees of remote estimation and queueing systems. Causes for the dependency of a UDC on past utilization include the use of replenishable energy sources to power the transmission of information among the sub-components of a networked system, and the assistance of a human operator for servicing a queue. Our analysis unveils the similarity of the UDC models typically adopted in each of the research themes, and it reveals the differences in the objectives and technical approaches employed. We also identify new challenges and future research directions inspired by the cross-pollination among the central concepts, techniques, and problem formulations of the research themes discussed.
△ Less
Submitted 11 January, 2021; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Boundary conditions and polymeric drag reduction for the Navier-Stokes equations
Authors:
Theodore D. Drivas,
Joonhyun La
Abstract:
Reducing wall drag in turbulent pipe and channel flows is an issue of great practical importance. In engineering applications, end-functionalized polymer chains are often employed as agents to reduce drag. These are polymers which are floating in the solvent and attach (either by adsorption or through irreversible chemical binding) at one of their chain ends to the substrate (wall). We propose a P…
▽ More
Reducing wall drag in turbulent pipe and channel flows is an issue of great practical importance. In engineering applications, end-functionalized polymer chains are often employed as agents to reduce drag. These are polymers which are floating in the solvent and attach (either by adsorption or through irreversible chemical binding) at one of their chain ends to the substrate (wall). We propose a PDE model to study this setup in the simple setting where the solvent is a viscous incompressible Navier-Stokes fluid occupying the bulk of a smooth domain $Ω\subset \mathbb{R}^d$, and the wall-grafted polymer is in the so-called mushroom regime (inter-polymer spacing on the order of the typical polymer length). The microscopic description of the polymer enters into the macroscopic description of the fluid motion through a dynamical boundary condition on the wall-tangential stress of the fluid, something akin to (but distinct from) a history-dependent slip-length. We establish global well-posedness of strong solutions in two-spatial dimensions and prove that the inviscid limit to the strong Euler solution holds with a rate. Moreover, the wall-friction factor $\langle f\rangle$ and the global energy dissipation $\langle \varepsilon\rangle$ vanish inversely proportional to the Reynolds number $Re$. This scaling corresponds to Poiseuille's law for the friction factor $\langle f\rangle \sim1/ Re$ for laminar flow and thereby quantifies drag reduction in our setting. These results are in stark contrast to those available for physical boundaries without polymer additives modeled by, e.g., no-slip conditions, where no such results are generally known even in two-dimensions.
△ Less
Submitted 4 June, 2021; v1 submitted 17 April, 2019;
originally announced April 2019.
-
Remarks on a paper by Gavrilov: Grad-Shafranov equations, steady solutions of the three dimensional incompressible Euler equations with compactly supported velocities, and applications
Authors:
Peter Constantin,
Joonhyun La,
Vlad Vicol
Abstract:
We describe a method to construct smooth and compactly supported solutions of 3D incompressible Euler equations and related models. The method is based on localizable Grad-Shafranov equations and is inspired by the recent result \cite{gav}.
We describe a method to construct smooth and compactly supported solutions of 3D incompressible Euler equations and related models. The method is based on localizable Grad-Shafranov equations and is inspired by the recent result \cite{gav}.
△ Less
Submitted 27 March, 2019;
originally announced March 2019.
-
On checkable codes in group algebras
Authors:
Martino Borello,
Javier de la Cruz,
Wolfgang Willems
Abstract:
We classify, in terms of the structure of the finite group G, all group algebras KG for which all right ideals are right annihilators of principal left ideals. This means in the language of coding theory that we classify code-checkable group algebras KG which have been considered so far only for abelian groups G. Optimality of checkable codes and asymptotic results are discussed.
We classify, in terms of the structure of the finite group G, all group algebras KG for which all right ideals are right annihilators of principal left ideals. This means in the language of coding theory that we classify code-checkable group algebras KG which have been considered so far only for abelian groups G. Optimality of checkable codes and asymptotic results are discussed.
△ Less
Submitted 8 February, 2021; v1 submitted 30 January, 2019;
originally announced January 2019.
-
Note on Lagrangian-Eulerian Methods for Uniqueness in Hydrodynamic Systems
Authors:
Peter Constantin,
Joonhyun La
Abstract:
We discuss the Lagrangian-Eulerian framework for hydrodynamic models and provide a proof of Lipschitz dependence of solutions on initial data in path space. The paper presents a corrected version of the result in \cite{c1}.
We discuss the Lagrangian-Eulerian framework for hydrodynamic models and provide a proof of Lipschitz dependence of solutions on initial data in path space. The paper presents a corrected version of the result in \cite{c1}.
△ Less
Submitted 30 November, 2018;
originally announced December 2018.
-
Global well-posedness of strong solutions of Doi model with large viscous stress
Authors:
Joonhyun La
Abstract:
We study models of dilute rigid rod-like polymer solutions. We establish the global well-posedness the Doi model for large data, and for arbitrarily large viscous stress parameter. The main ingredient in the proof is the fact that the viscous stress adds dissipation to high derivatives of velocity.
We study models of dilute rigid rod-like polymer solutions. We establish the global well-posedness the Doi model for large data, and for arbitrarily large viscous stress parameter. The main ingredient in the proof is the fact that the viscous stress adds dissipation to high derivatives of velocity.
△ Less
Submitted 20 November, 2018;
originally announced November 2018.
-
Derivation of vector-valued complex interpolation scales
Authors:
Jesús M. F. Castillo,
Daniel Morales,
Jesús Suárez de la Fuente
Abstract:
We study complex interpolation scales obtained by vector valued amalgamation and the derivations they generate. We study their trivial and singular character and obtain examples showing that the hypotheses in the main theorems of [J.M.F. Castillo, V. Ferenczi and M. González, \emph{Singular exact sequences generated by complex interpolation}, Trans. Amer. Math. Soc. 369 (2017) 4671--4708] are not…
▽ More
We study complex interpolation scales obtained by vector valued amalgamation and the derivations they generate. We study their trivial and singular character and obtain examples showing that the hypotheses in the main theorems of [J.M.F. Castillo, V. Ferenczi and M. González, \emph{Singular exact sequences generated by complex interpolation}, Trans. Amer. Math. Soc. 369 (2017) 4671--4708] are not necessary.
△ Less
Submitted 9 August, 2018;
originally announced August 2018.
-
PETGEM: A parallel code for 3D CSEM forward modeling using edge finite elements
Authors:
Octavio Castillo-Reyes,
Josep de la Puente,
José María Cela
Abstract:
We present the capabilities and results of the Parallel Edge-based Tool for Geophysical Electromagnetic modeling (PETGEM), as well as the physical and numerical foundations upon which it has been developed. PETGEM is an open-source and distributed parallel Python code for fast and highly accurate modeling of 3D marine controlled-source electromagnetic (3D CSEM) problems. We employ the Nédélec Edge…
▽ More
We present the capabilities and results of the Parallel Edge-based Tool for Geophysical Electromagnetic modeling (PETGEM), as well as the physical and numerical foundations upon which it has been developed. PETGEM is an open-source and distributed parallel Python code for fast and highly accurate modeling of 3D marine controlled-source electromagnetic (3D CSEM) problems. We employ the Nédélec Edge Finite Element Method (EFEM) which offers a good trade-off between accuracy and number of degrees of freedom, while naturally supporting unstructured tetrahedral meshes. We have particularised this new modeling tool to the 3D CSEM problem for infinitesimal point dipoles asumming arbitrarily isotropic media for low-frequencies approximations. In order to avoid source-singularities, PETGEM solves the frequency-domain Maxwell's equations of the secondary electric field, and the primary electric field is calculated analytically for homogeneous background media. We assess the PETGEM accuracy using classical tests with known analytical solutions as well as recent published data of real life geological scenarios. This assessment proves that this new modeling tool reproduces expected accurate solutions in the former tests, and its flexibility on realistic 3D electromagnetic problems. Furthermore, an automatic mesh adaptation strategy for a given frequency and specific source position is presented. We also include a scalability study based on fundamental metrics for high-performance computing (HPC) architectures.
△ Less
Submitted 1 August, 2018;
originally announced August 2018.