Numerical Analysis and Computational Mathematics
22,400 Followers
Recent papers in Numerical Analysis and Computational Mathematics
We study the relationship between finite volume and mixed finite element methods for the the hyperbolic conservation laws, and the closely related convection-diffusion equations. A general framework is proposed for the derivation and a... more
A common observation is that large groups of oscillatory biological units often have the ability to synchronize. A paradigmatic model of such behavior is provided by the Kuramoto model, which achieves synchronization through coupling of... more
Unto Others (UO) is an important book for all with a genuine interest in evolutionary biology, and right on target for everyone interested in human behavior. It is also of great relevance for those interested in the effects of the global... more
In this note we generalize an upper bound given in Guggenheimer et al. (College Math. J. 26(1) (1995) 2) for the condition number of a matrix as a function of the determinant, the Frobenius norm and of k singular values. If no singular... more
In this paper, we review decision support models for the design of global supply chains, and assess the fit between the research literature in this area and the practical issues of global supply chain design. The classification scheme for... more
This article addresses the question of validating the homogeneous Lanchestrian square law of attrition by the use of historical data (and by extension, other attrition models). Validating an attrition model means testing that model... more
Let ϕ denote Euler's phi function. For a fixed odd prime q we investigate the first and second order terms of the asymptotic series expansion for the number of n x such that q ∤ ϕ(n). Part of the analysis involves a careful study of the... more
This paper considers the strategic routing of a fleet of unmanned combat aerial vehicles (UCAVs) to service a set of predetermined targets from a prior surveillance mission. Targets are characterized by their priority or importance level,... more
Any dynamic decision model needs to deal with conditional events and conditional uncertainty measures. Moreover, to avoid the introduction of not available information in decision processes, we should refer to domains containing only the... more
We study how changes to the composition and employment of the US Navy combat logistic force (CLF) influence our ability to supply our navy worldwide. The CLF consists of about 30 special transport ships that carry ship and aircraft fuel,... more
We investigate the 3-edge coloring problem, based on the idea to give an algorithm, that attempts to minimize the use of color 4 (in a 4-edge coloring), and to study the factors that force it to fail. More specific, we introduce the... more
In this paper, we consider the problem of computing the region visible to a query point located in a given polygonal domain. The polygonal domain is specified by a simple polygon with m holes and a total of n vertices. We provide two... more
We develop a geometric approach to complexity based on the principle that complexity requires interactions at different scales of description. Complex systems are more than the sum of their parts of any size, and not just more than the... more
In the COVID-19 pandemic situation, the need to adopt cloud computing (CC) applications by education institutions, in general, and higher education (HE) institutions, in particular, has especially increased to engage students in an online... more
The nonlinear Poisson-Boltzmann equation is solved in the region between a sphere and a plane, which models the electrolyte solution interface between the tip and the substrate in a scanning tunneling microscope. A finite difference... more
We studied convolution properties of spirallike, starlike and convex functions, and some special cases of the main results are also pointed out. Further, we also obtained inclusion and convolution properties for some new subclasses on... more
The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification... more
We study possible interrelations between the 300-year record of the yearly sunspot numbers and the solar inertial motion (SIM) using the recently developed technique of synchronization analysis. Phase synchronization of the sunspot cycle... more
Stable and efficient updates to the basis matrix factors are vital to the simplex method. The "best" updating method depends on the machine in use and how the update is implemented. For example, the classical product-form update can take... more
CITATIONS 2 READS 15 2 authors, including: Some of the authors of this publication are also working on these related projects: 1) Raiffa arbitration scheme. 2) Discrete protocols for fair division. View project
We propose a cost-sharing scheme for the k-level facility location game that is cross-monotonic, competitive, and 6-approximate cost recovery. This extends the recent result for the 1-level facility location game of Pál and Tardos.
Boundary value methods for the solution of differential-algebraic equations are described. We consider both initial and boundary value problems and derive an algorithm that does not require additional information from the user, but only... more
The virtual warehouse (VW) is a state of real-time global visibility for logistics assets such as inventory and vehicles. The eciency of the VW is comparable to that achieved in a local warehouse facility. We assess the enabling... more
The implementation of global optimization algorithms, using the arithmetic of infinity, is considered. A relatively simple version of implementation is proposed for the algorithms that possess the introduced property of strong... more
We prove the existence of mild solutions for a partial neutral functional integrodifferential equation with unbounded delay using the Leray–Schauder alternative.
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without... more
We consider the distance from a (square or rectangular) matrix pencil to the nearest matrix pencil in 2-norm that has a set of specified eigenvalues. We derive a singular value optimization characterization for this problem and illustrate... more
In Part I of this series of articles, we introduced a general framework of exploiting the aggregate sparsity pattern over all data matrices of large scale and sparse semidefinite programs (SDPs) when solving them by primal-dual... more
Clustering method is one of the most important tools in statistics.
The concept of a Morse decomposition consisting of nonautonomous sets is reviewed for linear cocycle mappings w.r.t. to past, future and all-time convergences. In each case, the set of accumulation points of the finite-time Lyapunov... more
We study the multivariate approximation by certain partial sums (hyperbolic wavelet sums) of wavelet bases formed by tensor products of univariate wavelets. We characterize spaces of functions which have a prescribed approximation error... more
A multicompartment mathematical model is presented with the goal of studying the role of dose-dense protocols in the context of combination cancer chemotherapy. Dose-dense protocols aim at reducing the period between courses of... more
In this paper, we study a multi-period portfolio selection model in which a generic class of probability distributions is assumed for the returns of the risky asset. An investor with a power utility function rebalances a portfolio... more
In the area of broad-band antenna array signal processing, the global minimum of a quadratic equality constrained quadratic cost minimization problem is often required. The problem posed is usually characterized by a large optimization... more
A new nonlinear integral-equation model is derived in terms of hodograph variables for free-surface flow past an arbitrary bottom obstruction. A numerical method, carefully chosen to solve the resulting nonlinear algebraic equations and a... more
Recently simple limiting functions establishing upper and lower bounds on the Mittag-Leffler function were found. This paper follows those expressions to design an efficient algorithm for the approximate calculation of expressions usual... more
Surface reconstruction from large unorganized data sets is very challenging, especially if the data present undesired holes. This is usually the case when the data come from laser scanner 3D acquisitions or if they represent damaged... more