-
A Review of Scalable and Privacy-Preserving Multi-Agent Frameworks for Distributed Energy Resources
Authors:
Xiang Huo,
Hao Huang,
Katherine R. Davis,
H. Vincent Poor,
Mingxi Liu
Abstract:
Distributed energy resources (DERs) are gaining prominence due to their advantages in improving energy efficiency, reducing carbon emissions, and enhancing grid resilience. Despite the increasing deployment, the potential of DERs has yet to be fully explored and exploited. A fundamental question restrains the management of numerous DERs in large-scale power systems, "How should DER data be securel…
▽ More
Distributed energy resources (DERs) are gaining prominence due to their advantages in improving energy efficiency, reducing carbon emissions, and enhancing grid resilience. Despite the increasing deployment, the potential of DERs has yet to be fully explored and exploited. A fundamental question restrains the management of numerous DERs in large-scale power systems, "How should DER data be securely processed and DER operations be efficiently optimized?" To address this question, this paper considers two critical issues, namely privacy for processing DER data and scalability in optimizing DER operations, then surveys existing and emerging solutions from a multi-agent framework perspective. In the context of scalability, this paper reviews state-of-the-art research that relies on parallel control, optimization, and learning within distributed and/or decentralized information exchange structures, while in the context of privacy, it identifies privacy preservation measures that can be synthesized into the aforementioned scalable structures. Despite research advances in these areas, challenges remain because these highly interdisciplinary studies blend a wide variety of scalable computing architectures and privacy preservation techniques from different fields, making them difficult to adapt in practice. To mitigate this issue, this paper provides a holistic review of trending strategies that orchestrate privacy and scalability for large-scale power system operations from a multi-agent perspective, particularly for DER control problems. Furthermore, this review extrapolates new approaches for future scalable, privacy-aware, and cybersecure pathways to unlock the full potential of DERs through controlling, optimizing, and learning generic multi-agent-based cyber-physical systems.
△ Less
Submitted 11 November, 2024; v1 submitted 22 September, 2024;
originally announced September 2024.
-
Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice
Authors:
Tian-Yi Zhou,
Matthew Lau,
Jizhou Chen,
Wenke Lee,
Xiaoming Huo
Abstract:
Anomaly detection is an important problem in many application areas, such as network security. Many deep learning methods for unsupervised anomaly detection produce good empirical performance but lack theoretical guarantees. By casting anomaly detection into a binary classification problem, we establish non-asymptotic upper bounds and a convergence rate on the excess risk on rectified linear unit…
▽ More
Anomaly detection is an important problem in many application areas, such as network security. Many deep learning methods for unsupervised anomaly detection produce good empirical performance but lack theoretical guarantees. By casting anomaly detection into a binary classification problem, we establish non-asymptotic upper bounds and a convergence rate on the excess risk on rectified linear unit (ReLU) neural networks trained on synthetic anomalies. Our convergence rate on the excess risk matches the minimax optimal rate in the literature. Furthermore, we provide lower and upper bounds on the number of synthetic anomalies that can attain this optimality. For practical implementation, we relax some conditions to improve the search for the empirical risk minimizer, which leads to competitive performance to other classification-based methods for anomaly detection. Overall, our work provides the first theoretical guarantees of unsupervised neural network-based anomaly detectors and empirical insights on how to design them well.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
A Vectorized Positive Semidefinite Penalty Method for Unconstrained Binary Quadratic Programming
Authors:
Xinyue Huo,
Ran Gu
Abstract:
The unconstrained binary quadratic programming (UBQP) problem is a class of problems of significant importance in many practical applications, such as in combinatorial optimization, circuit design, and other fields. The positive semidefinite penalty (PSDP) method originated from research on semidefinite relaxation, where the introduction of an exact penalty function improves the efficiency and acc…
▽ More
The unconstrained binary quadratic programming (UBQP) problem is a class of problems of significant importance in many practical applications, such as in combinatorial optimization, circuit design, and other fields. The positive semidefinite penalty (PSDP) method originated from research on semidefinite relaxation, where the introduction of an exact penalty function improves the efficiency and accuracy of problem solving. In this paper, we propose a vectorized PSDP method for solving the UBQP problem, which optimizes computational efficiency by vectorizing matrix variables within a PSDP framework. Algorithmic enhancements in penalty updating and initialization are implemented, along with the introduction of two algorithms that integrate the proximal point algorithm and the projection alternating BB method for subproblem resolution. Properties of the penalty function and algorithm convergence are analyzed. Numerical experiments show the superior performance of the method in providing high-quality solutions and satisfactory solution times compared to the semidefinite relaxation method and other established methods.
△ Less
Submitted 9 August, 2024;
originally announced August 2024.
-
A Uniform Concentration Inequality for Kernel-Based Two-Sample Statistics
Authors:
Yijin Ni,
Xiaoming Huo
Abstract:
In many contemporary statistical and machine learning methods, one needs to optimize an objective function that depends on the discrepancy between two probability distributions. The discrepancy can be referred to as a metric for distributions. Widely adopted examples of such a metric include Energy Distance (ED), distance Covariance (dCov), Maximum Mean Discrepancy (MMD), and the Hilbert-Schmidt I…
▽ More
In many contemporary statistical and machine learning methods, one needs to optimize an objective function that depends on the discrepancy between two probability distributions. The discrepancy can be referred to as a metric for distributions. Widely adopted examples of such a metric include Energy Distance (ED), distance Covariance (dCov), Maximum Mean Discrepancy (MMD), and the Hilbert-Schmidt Independence Criterion (HSIC). We show that these metrics can be unified under a general framework of kernel-based two-sample statistics.
This paper establishes a novel uniform concentration inequality for the aforementioned kernel-based statistics. Our results provide upper bounds for estimation errors in the associated optimization problems, thereby offering both finite-sample and asymptotic performance guarantees. As illustrative applications, we demonstrate how these bounds facilitate the derivation of error bounds for procedures such as distance covariance-based dimension reduction, distance covariance-based independent component analysis, MMD-based fairness-constrained inference, MMD-based generative model search, and MMD-based generative adversarial networks.
△ Less
Submitted 9 February, 2025; v1 submitted 22 May, 2024;
originally announced May 2024.
-
High-dimensional (Group) Adversarial Training in Linear Regression
Authors:
Yiling Xie,
Xiaoming Huo
Abstract:
Adversarial training can achieve robustness against adversarial perturbations and has been widely used in machine learning models. This paper delivers a non-asymptotic consistency analysis of the adversarial training procedure under $\ell_\infty$-perturbation in high-dimensional linear regression. It will be shown that the associated convergence rate of prediction error can achieve the minimax rat…
▽ More
Adversarial training can achieve robustness against adversarial perturbations and has been widely used in machine learning models. This paper delivers a non-asymptotic consistency analysis of the adversarial training procedure under $\ell_\infty$-perturbation in high-dimensional linear regression. It will be shown that the associated convergence rate of prediction error can achieve the minimax rate up to a logarithmic factor in the high-dimensional linear regression on the class of sparse parameters. Additionally, the group adversarial training procedure is analyzed. Compared with classic adversarial training, it will be proved that the group adversarial training procedure enjoys a better prediction error upper bound under certain group-sparsity patterns.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Approximation of RKHS Functionals by Neural Networks
Authors:
Tian-Yi Zhou,
Namjoon Suh,
Guang Cheng,
Xiaoming Huo
Abstract:
Motivated by the abundance of functional data such as time series and images, there has been a growing interest in integrating such data into neural networks and learning maps from function spaces to R (i.e., functionals). In this paper, we study the approximation of functionals on reproducing kernel Hilbert spaces (RKHS's) using neural networks. We establish the universality of the approximation…
▽ More
Motivated by the abundance of functional data such as time series and images, there has been a growing interest in integrating such data into neural networks and learning maps from function spaces to R (i.e., functionals). In this paper, we study the approximation of functionals on reproducing kernel Hilbert spaces (RKHS's) using neural networks. We establish the universality of the approximation of functionals on the RKHS's. Specifically, we derive explicit error bounds for those induced by inverse multiquadric, Gaussian, and Sobolev kernels. Moreover, we apply our findings to functional regression, proving that neural networks can accurately approximate the regression maps in generalized functional linear models. Existing works on functional learning require integration-type basis function expansions with a set of pre-specified basis functions. By leveraging the interpolating orthogonal projections in RKHS's, our proposed network is much simpler in that we use point evaluations to replace basis function expansions.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Inf-Sup neural networks for high-dimensional elliptic PDE problems
Authors:
Xiaokai Huo,
Hailiang Liu
Abstract:
Solving high dimensional partial differential equations (PDEs) has historically posed a considerable challenge when utilizing conventional numerical methods, such as those involving domain meshes. Recent advancements in the field have seen the emergence of neural PDE solvers, leveraging deep networks to effectively tackle high dimensional PDE problems. This study introduces Inf-SupNet, a model-bas…
▽ More
Solving high dimensional partial differential equations (PDEs) has historically posed a considerable challenge when utilizing conventional numerical methods, such as those involving domain meshes. Recent advancements in the field have seen the emergence of neural PDE solvers, leveraging deep networks to effectively tackle high dimensional PDE problems. This study introduces Inf-SupNet, a model-based unsupervised learning approach designed to acquire solutions for a specific category of elliptic PDEs. The fundamental concept behind Inf-SupNet involves incorporating the inf-sup formulation of the underlying PDE into the loss function. The analysis reveals that the global solution error can be bounded by the sum of three distinct errors: the numerical integration error, the duality gap of the loss function (training error), and the neural network approximation error for functions within Sobolev spaces. To validate the efficacy of the proposed method, numerical experiments conducted in high dimensions demonstrate its stability and accuracy across various boundary conditions, as well as for both semi-linear and nonlinear PDEs.
△ Less
Submitted 2 February, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation
Authors:
Yiling Xie,
Xiaoming Huo
Abstract:
Adversarial training has been proposed to protect machine learning models against adversarial attacks. This paper focuses on adversarial training under $\ell_\infty$-perturbation, which has recently attracted much research attention. The asymptotic behavior of the adversarial training estimator is investigated in the generalized linear model. The results imply that the asymptotic distribution of t…
▽ More
Adversarial training has been proposed to protect machine learning models against adversarial attacks. This paper focuses on adversarial training under $\ell_\infty$-perturbation, which has recently attracted much research attention. The asymptotic behavior of the adversarial training estimator is investigated in the generalized linear model. The results imply that the asymptotic distribution of the adversarial training estimator under $\ell_\infty$-perturbation could put a positive probability mass at $0$ when the true parameter is $0$, providing a theoretical guarantee of the associated sparsity-recovery ability. Alternatively, a two-step procedure is proposed -- adaptive adversarial training, which could further improve the performance of adversarial training under $\ell_\infty$-perturbation. Specifically, the proposed procedure could achieve asymptotic variable-selection consistency and unbiasedness. Numerical experiments are conducted to show the sparsity-recovery ability of adversarial training under $\ell_\infty$-perturbation and to compare the empirical performance between classic adversarial training and adaptive adversarial training.
△ Less
Submitted 2 March, 2025; v1 submitted 26 January, 2024;
originally announced January 2024.
-
Quantitative convergence in relative entropy for a moderately interacting particle system on $\mathbb{R}^d$
Authors:
Li Chen,
Alexandra Holzinger,
Xiaokai Huo
Abstract:
This article shows how to combine the relative entropy method by D. Bresch, P.-E. Jabin, and Z. Wang in arXiv:1706.09564, arXiv:1906.04093 and the regularized $L^2(\mathbb{R}^d)$-estimate by Oelschläger (Probability theory and related fields, 1987) to prove a strong propagation of chaos result for the viscous porous medium equation from a moderately interacting particle system in…
▽ More
This article shows how to combine the relative entropy method by D. Bresch, P.-E. Jabin, and Z. Wang in arXiv:1706.09564, arXiv:1906.04093 and the regularized $L^2(\mathbb{R}^d)$-estimate by Oelschläger (Probability theory and related fields, 1987) to prove a strong propagation of chaos result for the viscous porous medium equation from a moderately interacting particle system in $L^\infty(0,T; L^1(\mathbb{R}^d))$-norm. In the moderate interacting setting, the interacting potential is a smoothed Dirac Delta distribution, however, current results regarding the relative entropy methods for singular potentials do not apply. The result holds on $\mathbb{R}^d$ for any dimension $d\geq 1$ and provides a quantitative result where the rate of convergence depends on the moderate scaling parameter and the dimension $d\geq 1$. Additionally, the presented method can be adapted for moderately interacting systems for which a certain convergence probability holds -- thus a propagation of chaos result in relative entropy can be obtained for kernels approximating Coulomb potentials.
△ Less
Submitted 17 May, 2024; v1 submitted 3 November, 2023;
originally announced November 2023.
-
On Excess Risk Convergence Rates of Neural Network Classifiers
Authors:
Hyunouk Ko,
Namjoon Suh,
Xiaoming Huo
Abstract:
The recent success of neural networks in pattern recognition and classification problems suggests that neural networks possess qualities distinct from other more classical classifiers such as SVMs or boosting classifiers. This paper studies the performance of plug-in classifiers based on neural networks in a binary classification setting as measured by their excess risks. Compared to the typical s…
▽ More
The recent success of neural networks in pattern recognition and classification problems suggests that neural networks possess qualities distinct from other more classical classifiers such as SVMs or boosting classifiers. This paper studies the performance of plug-in classifiers based on neural networks in a binary classification setting as measured by their excess risks. Compared to the typical settings imposed in the literature, we consider a more general scenario that resembles actual practice in two respects: first, the function class to be approximated includes the Barron functions as a proper subset, and second, the neural network classifier constructed is the minimizer of a surrogate loss instead of the $0$-$1$ loss so that gradient descent-based numerical optimizations can be easily applied. While the class of functions we consider is quite large that optimal rates cannot be faster than $n^{-\frac{1}{3}}$, it is a regime in which dimension-free rates are possible and approximation power of neural networks can be taken advantage of. In particular, we analyze the estimation and approximation properties of neural networks to obtain a dimension-free, uniform rate of convergence for the excess risk. Finally, we show that the rate obtained is in fact minimax optimal up to a logarithmic factor, and the minimax lower bound shows the effect of the margin assumption in this regime.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
On Privacy Preservation of Electric Vehicle Charging Control via State Obfuscation
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
The electric vehicle (EV) industry is rapidly evolving owing to advancements in smart grid technologies and charging control strategies. While EVs are promising in decarbonizing the transportation system and providing grid services, their widespread adoption has led to notable and erratic load injections that can disrupt the normal operation of power grid. Additionally, the unprotected collection…
▽ More
The electric vehicle (EV) industry is rapidly evolving owing to advancements in smart grid technologies and charging control strategies. While EVs are promising in decarbonizing the transportation system and providing grid services, their widespread adoption has led to notable and erratic load injections that can disrupt the normal operation of power grid. Additionally, the unprotected collection and utilization of personal information during the EV charging process cause prevalent privacy issues. To address the scalability and data confidentiality in large-scale EV charging control, we propose a novel decentralized privacy-preserving EV charging control algorithm via state obfuscation that 1) is scalable w.r.t. the number of EVs and ensures optimal EV charging solutions; 2) achieves privacy preservation in the presence of honest-but-curious adversaries and eavesdroppers; and 3) is applicable to eliminate privacy concerns for general multi-agent optimization problems in large-scale cyber-physical systems. The EV charging control is structured as a constrained optimization problem with coupled objectives and constraints, then solved in a decentralized fashion. Privacy analyses and simulations demonstrate the efficiency and efficacy of the proposed approach.
△ Less
Submitted 31 August, 2023;
originally announced September 2023.
-
Classification of Data Generated by Gaussian Mixture Models Using Deep ReLU Networks
Authors:
Tian-Yi Zhou,
Xiaoming Huo
Abstract:
This paper studies the binary classification of unbounded data from ${\mathbb R}^d$ generated under Gaussian Mixture Models (GMMs) using deep ReLU neural networks. We obtain $\unicode{x2013}$ for the first time $\unicode{x2013}$ non-asymptotic upper bounds and convergence rates of the excess risk (excess misclassification error) for the classification without restrictions on model parameters. The…
▽ More
This paper studies the binary classification of unbounded data from ${\mathbb R}^d$ generated under Gaussian Mixture Models (GMMs) using deep ReLU neural networks. We obtain $\unicode{x2013}$ for the first time $\unicode{x2013}$ non-asymptotic upper bounds and convergence rates of the excess risk (excess misclassification error) for the classification without restrictions on model parameters. The convergence rates we derive do not depend on dimension $d$, demonstrating that deep ReLU networks can overcome the curse of dimensionality in classification. While the majority of existing generalization analysis of classification algorithms relies on a bounded domain, we consider an unbounded domain by leveraging the analyticity and fast decay of Gaussian distributions. To facilitate our analysis, we give a novel approximation error bound for general analytic functions using ReLU networks, which may be of independent interest. Gaussian distributions can be adopted nicely to model data arising in applications, e.g., speeches, images, and texts; our results provide a theoretical verification of the observed efficiency of deep neural networks in practical classification problems.
△ Less
Submitted 15 August, 2023;
originally announced August 2023.
-
Global existence and weak-strong uniqueness for chemotaxis compressible Navier-Stokes equations modeling vascular network formation
Authors:
Xiaokai Huo,
Ansgar Jüngel
Abstract:
A model of vascular network formation is analyzed in a bounded domain, consisting of the compressible Navier-Stokes equations for the density of the endothelial cells and their velocity, coupled to a reaction-diffusion equation for the concentration of the chemoattractant, which triggers the migration of the endothelial cells and the blood vessel formation. The coupling of the equations is realize…
▽ More
A model of vascular network formation is analyzed in a bounded domain, consisting of the compressible Navier-Stokes equations for the density of the endothelial cells and their velocity, coupled to a reaction-diffusion equation for the concentration of the chemoattractant, which triggers the migration of the endothelial cells and the blood vessel formation. The coupling of the equations is realized by the chemotaxis force in the momentum balance equation. The global existence of finite energy weak solutions is shown for adiabatic pressure coefficients $γ>8/5$. The solutions satisfy a relative energy inequality, which allows for the proof of the weak--strong uniqueness property.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Diffusive limits of the steady state radiative heat transfer system: Curvature effects
Authors:
Mohamed Ghattassi,
Xiaokai Huo,
Nader Masmoudi
Abstract:
This paper is devoted to the diffusive limit of the nonlinear radiative heat transfer system with curved boundary domain (\textit{two dimensional disk}). The solution constructed in \cite{ghattassi2022convergence} by the leading order interior solution and the boundary layer corrections fails here to approximate the solutions in $L^\infty$ sense for the diffusive limit. The present paper aims to c…
▽ More
This paper is devoted to the diffusive limit of the nonlinear radiative heat transfer system with curved boundary domain (\textit{two dimensional disk}). The solution constructed in \cite{ghattassi2022convergence} by the leading order interior solution and the boundary layer corrections fails here to approximate the solutions in $L^\infty$ sense for the diffusive limit. The present paper aims to construct a geometric correction to the boundary layer problem and obtain a valid approximate solution in $L^\infty$ sense. The main tools to overcome the convergence problem, are to use matched asymptotic expansion techniques, fixed-point theorems, linear and nonlinear stability analysis of the boundary layer problem. In particular, the spectral assumption on the leading order interior solution, which was proposed for the flat case in \cite{Bounadrylayer2019GHM2}, is shown to be still valid which guarantee the stability of the boundary layer expansion with geometric corrections. Moreover, the convergence result established in \cite[Lemma 10]{ghattassi2022convergence} remain applicable for the approximate solution with geometric corrections.
△ Less
Submitted 28 May, 2023;
originally announced May 2023.
-
Sharp estimates for imaginary powers of Bessel operators
Authors:
The Anh Bui,
Xuejing Huo,
Ji Li
Abstract:
Let $L f(x):=-\frac{d^2}{dx^2}f(x)-\frac{ r}{x}\frac{d}{dx}f(x),\quad x>0, r>0$ be the Bessel operator on $((0,\infty), |\cdot|, x^rdx)$. In this paper, we prove the sharp weak type $(1,1)$ estimate for the imaginary power $L^{iα}, α\in \mathbb R$, of the Bessel operator.
Let $L f(x):=-\frac{d^2}{dx^2}f(x)-\frac{ r}{x}\frac{d}{dx}f(x),\quad x>0, r>0$ be the Bessel operator on $((0,\infty), |\cdot|, x^rdx)$. In this paper, we prove the sharp weak type $(1,1)$ estimate for the imaginary power $L^{iα}, α\in \mathbb R$, of the Bessel operator.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Improved Rate of First Order Algorithms for Entropic Optimal Transport
Authors:
Yiling Luo,
Yiling Xie,
Xiaoming Huo
Abstract:
This paper improves the state-of-the-art rate of a first-order algorithm for solving entropy regularized optimal transport. The resulting rate for approximating the optimal transport (OT) has been improved from $\widetilde{O}({n^{2.5}}/ε)$ to $\widetilde{O}({n^2}/ε)$, where $n$ is the problem size and $ε$ is the accuracy level. In particular, we propose an accelerated primal-dual stochastic mirror…
▽ More
This paper improves the state-of-the-art rate of a first-order algorithm for solving entropy regularized optimal transport. The resulting rate for approximating the optimal transport (OT) has been improved from $\widetilde{O}({n^{2.5}}/ε)$ to $\widetilde{O}({n^2}/ε)$, where $n$ is the problem size and $ε$ is the accuracy level. In particular, we propose an accelerated primal-dual stochastic mirror descent algorithm with variance reduction. Such special design helps us improve the rate compared to other accelerated primal-dual algorithms. We further propose a batch version of our stochastic algorithm, which improves the computational performance through parallel computing. To compare, we prove that the computational complexity of the Stochastic Sinkhorn algorithm is $\widetilde{O}({n^2}/{ε^2})$, which is slower than our accelerated primal-dual stochastic mirror algorithm. Experiments are done using synthetic and real data, and the results match our theoretical rates. Our algorithm may inspire more research to develop accelerated primal-dual algorithms that have rate $\widetilde{O}({n^2}/ε)$ for solving OT.
△ Less
Submitted 23 January, 2023;
originally announced January 2023.
-
Privacy-Preserving Distributed Energy Resource Control with Decentralized Cloud Computing
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
The rapidly growing penetration of renewable energy resources brings unprecedented challenges to power distribution networks - management of a large population of grid-tied controllable devices encounters control scalability crises and potential end-user privacy breaches. Despite the importance, research on privacy preservation of distributed energy resource (DER) control in a fully scalable manne…
▽ More
The rapidly growing penetration of renewable energy resources brings unprecedented challenges to power distribution networks - management of a large population of grid-tied controllable devices encounters control scalability crises and potential end-user privacy breaches. Despite the importance, research on privacy preservation of distributed energy resource (DER) control in a fully scalable manner is lacked. To fill the gap, this paper designs a novel decentralized privacy-preserving DER control framework that 1) achieves control scalability over DER population and heterogeneity; 2) eliminates peer-to-peer communications and secures the privacy of all participating DERs against various types of adversaries; and 3) enjoys higher computation efficiency and accuracy compared to state-of-the-art privacy-preserving methods. A strongly coupled optimization problem is formulated to control the power consumption and output of DERs, including solar photovoltaics and energy storage systems, then solved using the projected gradient method. Cloud computing and secret sharing are seamlessly integrated into the proposed decentralized computing to achieve privacy preservation. Simulation results prove the capabilities of the proposed approach in DER control applications.
△ Less
Submitted 5 January, 2023;
originally announced January 2023.
-
Two-Level Decentralized-Centralized Control of Distributed Energy Resources in Grid-Interactive Efficient Buildings
Authors:
Xiang Huo,
Jin Dong,
Borui Cui,
Boming Liu,
Jianming Lian,
Mingxi Liu
Abstract:
The flexible, efficient, and reliable operation of grid-interactive efficient buildings (GEBs) is increasingly impacted by the growing penetration of distributed energy resources (DERs). Besides, the optimization and control of DERs, buildings, and distribution networks are further complicated by their interconnections. In this paper, we exploit load-side flexibility and clean energy resources to…
▽ More
The flexible, efficient, and reliable operation of grid-interactive efficient buildings (GEBs) is increasingly impacted by the growing penetration of distributed energy resources (DERs). Besides, the optimization and control of DERs, buildings, and distribution networks are further complicated by their interconnections. In this paper, we exploit load-side flexibility and clean energy resources to develop a novel two-level hybrid decentralized-centralized (HDC) algorithm to control DER-connected GEBs. The proposed HDC 1) achieves scalability w.r.t. to a large number of grid-connected buildings and devices, 2) incorporates a two-level design where aggregators control buildings centrally and the system operator coordinates the distribution network in a decentralized fashion, and 3) improves the computing efficiency and enhances communicating compatibility with heterogeneous temporal scales. Simulations are conducted based on the prototype of a campus building at the Oak Ridge National Laboratory to show the efficiency and efficacy of the proposed approach.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Diffusive limits of the steady state radiative heat transfer system: Boundary layers
Authors:
Mohamed Ghattassi,
Xiaokai Huo,
Nader Masmoudi
Abstract:
In this paper, we study the diffusive limit of the steady state radiative heat transfer system for non-homogeneous Dirichlet boundary conditions in a bounded domain with flat boundaries. A composite approximate solution is constructed using asymptotic analysis taking into account of the boundary layers. The convergence to the approximate solution in the diffusive limit is proved using a Banach fix…
▽ More
In this paper, we study the diffusive limit of the steady state radiative heat transfer system for non-homogeneous Dirichlet boundary conditions in a bounded domain with flat boundaries. A composite approximate solution is constructed using asymptotic analysis taking into account of the boundary layers. The convergence to the approximate solution in the diffusive limit is proved using a Banach fixed point theorem. The major difficulty lies on the nonlinear coupling between elliptic and kinetic transport equations. To overcome this problem, a spectral assumption ensuring the linear stability of the boundary layers is proposed. Moreover, a combined $L^2$-$L^\infty$ estimate and the Banach fixed point theorem are used to obtain the convergence proof. This results extend our previous work \cite{ghattassi2020diffusive} for the well-prepared boundary data case to the ill-prepared case when boundary layer exists.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Solving a Special Type of Optimal Transport Problem by a Modified Hungarian Algorithm
Authors:
Yiling Xie,
Yiling Luo,
Xiaoming Huo
Abstract:
Computing the empirical Wasserstein distance in the Wasserstein-distance-based independence test is an optimal transport (OT) problem with a special structure. This observation inspires us to study a special type of OT problem and propose a modified Hungarian algorithm to solve it exactly. For the OT problem involving two marginals with $m$ and $n$ atoms ($m\geq n$), respectively, the computationa…
▽ More
Computing the empirical Wasserstein distance in the Wasserstein-distance-based independence test is an optimal transport (OT) problem with a special structure. This observation inspires us to study a special type of OT problem and propose a modified Hungarian algorithm to solve it exactly. For the OT problem involving two marginals with $m$ and $n$ atoms ($m\geq n$), respectively, the computational complexity of the proposed algorithm is $O(m^2n)$. Computing the empirical Wasserstein distance in the independence test requires solving this special type of OT problem, where $m=n^2$. The associated computational complexity of the proposed algorithm is $O(n^5)$, while the order of applying the classic Hungarian algorithm is $O(n^6)$. In addition to the aforementioned special type of OT problem, it is shown that the modified Hungarian algorithm could be adopted to solve a wider range of OT problems. Broader applications of the proposed algorithm are discussed -- solving the one-to-many assignment problem and the many-to-many assignment problem. We conduct numerical experiments to validate our theoretical results. The experiment results demonstrate that the proposed modified Hungarian algorithm compares favorably with the Hungarian algorithm, the well-known Sinkhorn algorithm, and the network simplex algorithm.
△ Less
Submitted 28 February, 2023; v1 submitted 29 October, 2022;
originally announced October 2022.
-
Stability of the nonlinear Milne Problem for radiative heat transfer system
Authors:
Mohamed Ghattassi,
Xiaokai Huo,
Nader Masmoudi
Abstract:
This paper focuses on the nonlinear Milne problem of the radiative heat transfer system on the half-space. The nonlinear model is described by a second order ODE for temperature coupled to transport equation for radiative intensity. The nonlinearity of the fourth power Stefan-Boltzmann law of black body radiation, bring additional difficulty in mathematical analysis, compared to the well-developed…
▽ More
This paper focuses on the nonlinear Milne problem of the radiative heat transfer system on the half-space. The nonlinear model is described by a second order ODE for temperature coupled to transport equation for radiative intensity. The nonlinearity of the fourth power Stefan-Boltzmann law of black body radiation, bring additional difficulty in mathematical analysis, compared to the well-developed theory for Milne problem of linear transport equation. With the help of the monotonicity property of the second order ODE, we prove the existence of the nonlinear Milne problem on a finite interval using monotonic convergence theorems. Then the solution is extended to the half-space using a uniform weighted estimate and the compactness method. Moreover, the solutions are proved to converge to constants as $x\to \infty$. Therefore, the linear stability analysis is used to study the uniqueness of the nonlinear Milne problem. The existence and uniqueness for the linearized system is established under a spectral assumption on the solution of the nonlinear problem. The spectral assumption is shown to be satisfied when the boundary data is close to the well-prepared case by using a generalized Hardy's inequality. The uniqueness of the solution to the half-line nonlinear Milne problem is established in a neighborhood of solutions satisfying a spectral assumption and the energy estimate.The current work extends the study of Milne problem for linear transport equations and provides a comprehensive study on the nonlinear Milne problem of radiative heat transfer systems.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Existence and weak-strong uniqueness for Maxwell-Stefan-Cahn-Hilliard systems
Authors:
Xiaokai Huo,
Ansgar Jüngel,
Athanasios E. Tzavaras
Abstract:
A Maxwell-Stefan system for fluid mixtures with driving forces depending on Cahn-Hilliard-type chemical potentials is analyzed. The corresponding parabolic cross-diffusion equations contain fourth-order derivatives and are considered in a bounded domain with no-flux boundary conditions. The main difficulty of the analysis is the degeneracy of the diffusion matrix, which is overcome by proving the…
▽ More
A Maxwell-Stefan system for fluid mixtures with driving forces depending on Cahn-Hilliard-type chemical potentials is analyzed. The corresponding parabolic cross-diffusion equations contain fourth-order derivatives and are considered in a bounded domain with no-flux boundary conditions. The main difficulty of the analysis is the degeneracy of the diffusion matrix, which is overcome by proving the positive definiteness of the matrix on a subspace and using the Bott--Duffin matrix inverse. The global existence of weak solutions and a weak-strong uniqueness property are shown by a careful combination of (relative) energy and entropy estimates, yielding $H^2(Ω)$ bounds for the densities, which cannot be obtained from the energy or entropy inequalities alone.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
An Accelerated Stochastic Algorithm for Solving the Optimal Transport Problem
Authors:
Yiling Xie,
Yiling Luo,
Xiaoming Huo
Abstract:
A primal-dual accelerated stochastic gradient descent with variance reduction algorithm (PDASGD) is proposed to solve linear-constrained optimization problems. PDASGD could be applied to solve the discrete optimal transport (OT) problem and enjoys the best-known computational complexity -- $\widetilde{\mathcal{O}}(n^2/ε)$, where $n$ is the number of atoms, and $ε>0$ is the accuracy. In the literat…
▽ More
A primal-dual accelerated stochastic gradient descent with variance reduction algorithm (PDASGD) is proposed to solve linear-constrained optimization problems. PDASGD could be applied to solve the discrete optimal transport (OT) problem and enjoys the best-known computational complexity -- $\widetilde{\mathcal{O}}(n^2/ε)$, where $n$ is the number of atoms, and $ε>0$ is the accuracy. In the literature, some primal-dual accelerated first-order algorithms, e.g., APDAGD, have been proposed and have the order of $\widetilde{\mathcal{O}}(n^{2.5}/ε)$ for solving the OT problem. To understand why our proposed algorithm could improve the rate by a factor of $\widetilde{\mathcal{O}}(\sqrt{n})$, the conditions under which our stochastic algorithm has a lower order of computational complexity for solving linear-constrained optimization problems are discussed. It is demonstrated that the OT problem could satisfy the aforementioned conditions. Numerical experiments demonstrate superior practical performances of the proposed PDASGD algorithm for solving the OT problem.
△ Less
Submitted 29 May, 2023; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Weak-strong uniqueness for Maxwell-Stefan systems
Authors:
Xiaokai Huo,
Ansgar Jüngel,
Athanasios E. Tzavaras
Abstract:
The weak-strong uniqueness for Maxwell--Stefan systems and some generalized systems is proved. The corresponding parabolic cross-diffusion equations are considered in a bounded domain with no-flux boundary conditions. The key points of the proofs are various inequalities for the relative entropy associated to the systems and the analysis of the spectrum of a quadratic form capturing the frictional…
▽ More
The weak-strong uniqueness for Maxwell--Stefan systems and some generalized systems is proved. The corresponding parabolic cross-diffusion equations are considered in a bounded domain with no-flux boundary conditions. The key points of the proofs are various inequalities for the relative entropy associated to the systems and the analysis of the spectrum of a quadratic form capturing the frictional dissipation. The latter task is complicated by the singular nature of the diffusion matrix. This difficulty is addressed by proving its positive definiteness on a subspace and using the Bott--Duffin matrix inverse. The generalized Maxwell--Stefan systems are shown to cover several known cross-diffusion systems for the description of tumor growth and physical vapor deposition processes.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Asymptotic Theory of $\ell_1$-Regularized PDE Identification from a Single Noisy Trajectory
Authors:
Yuchen He,
Namjoon Suh,
Xiaoming Huo,
Sungha Kang,
Yajun Mei
Abstract:
We prove the support recovery for a general class of linear and nonlinear evolutionary partial differential equation (PDE) identification from a single noisy trajectory using $\ell_1$ regularized Pseudo-Least Squares model~($\ell_1$-PsLS). In any associative $\mathbb{R}$-algebra generated by finitely many differentiation operators that contain the unknown PDE operator, applying $\ell_1$-PsLS to a…
▽ More
We prove the support recovery for a general class of linear and nonlinear evolutionary partial differential equation (PDE) identification from a single noisy trajectory using $\ell_1$ regularized Pseudo-Least Squares model~($\ell_1$-PsLS). In any associative $\mathbb{R}$-algebra generated by finitely many differentiation operators that contain the unknown PDE operator, applying $\ell_1$-PsLS to a given data set yields a family of candidate models with coefficients $\mathbf{c}(λ)$ parameterized by the regularization weight $λ\geq 0$. The trace of $\{\mathbf{c}(λ)\}_{λ\geq 0}$ suffers from high variance due to data noises and finite difference approximation errors. We provide a set of sufficient conditions which guarantee that, from a single trajectory data denoised by a Local-Polynomial filter, the support of $\mathbf{c}(λ)$ asymptotically converges to the true signed-support associated with the underlying PDE for sufficiently many data and a certain range of $λ$. We also show various numerical experiments to validate our theory.
△ Less
Submitted 11 March, 2021;
originally announced March 2021.
-
Privacy-Preserving Decentralized Multi-Agent Cooperative Optimization -- Paradigm Design and Privacy Analysis
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
Large-scale multi-agent cooperative control problems have materially enjoyed the scalability, adaptivity, and flexibility of decentralized optimization. However, due to the mandatory iterative communications between the agents and the system operator, the decentralized architecture is vulnerable to malicious attacks and privacy breach. Current research on addressing privacy preservation of both ag…
▽ More
Large-scale multi-agent cooperative control problems have materially enjoyed the scalability, adaptivity, and flexibility of decentralized optimization. However, due to the mandatory iterative communications between the agents and the system operator, the decentralized architecture is vulnerable to malicious attacks and privacy breach. Current research on addressing privacy preservation of both agents and the system operator in cooperative decentralized optimization with strongly coupled objective functions and constraints is still primitive. To fill in the gaps, this paper proposes a novel privacy-preserving decentralized optimization paradigm based on Paillier cryptosystem. The proposed paradigm achieves ideal correctness and security, as well as resists attacks from a range of adversaries. The efficacy and efficiency of the proposed approach are verified via numerical simulations and a real-world physical platform.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
A Novel Cryptography-Based Privacy-Preserving Decentralized Optimization Paradigm
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
Existing large-scale optimization schemes are challenged by both scalability and cyber-security. With the favorable scalability, adaptability, and flexibility, decentralized and distributed optimization paradigms are widely adopted in cyber-physical system applications. However, most existing approaches heavily rely on explicit information exchange between agents or between agents and the system o…
▽ More
Existing large-scale optimization schemes are challenged by both scalability and cyber-security. With the favorable scalability, adaptability, and flexibility, decentralized and distributed optimization paradigms are widely adopted in cyber-physical system applications. However, most existing approaches heavily rely on explicit information exchange between agents or between agents and the system operator, leading the entire framework prone to privacy risks. To tackle this issue, this paper synthesizes cryptography and decentralized optimization techniques to develop a novel privacy-preserving decentralized optimization paradigm. The proposed paradigm is generically applicable to strongly coupled convex optimization problems with nonseparable objective functions and linearly coupled constraints. The security and accuracy of the proposed paradigm are verified via numerical examples.
△ Less
Submitted 21 December, 2020; v1 submitted 16 December, 2020;
originally announced December 2020.
-
Two-Facet Scalable Cooperative Optimization of Multi-Agent Systems in The Networked Environment
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
Cooperatively optimizing a vast number of agents that are connected over a large-scale network brings unprecedented scalability challenges. This paper revolves around problems optimizing coupled objective functions under coupled network-induced constraints and local constraints. The scalability of existing optimization paradigms is limited by either the agent population size or the network dimensi…
▽ More
Cooperatively optimizing a vast number of agents that are connected over a large-scale network brings unprecedented scalability challenges. This paper revolves around problems optimizing coupled objective functions under coupled network-induced constraints and local constraints. The scalability of existing optimization paradigms is limited by either the agent population size or the network dimension. As a radical improvement, this paper for the first time constructs a two-facet scalable decentralized optimization framework. To this end, we first develop a systemic network dimension reduction technique to virtually cluster the agents and lower the dimension of network-induced constraints, then constitute a novel shrunken-primal-multi-dual subgradient (SPMDS) algorithm based on the reduced-dimension network. Rigorous optimality and convergence analyses of the proposed decentralized optimization framework are provided. The SPMDS-based optimization framework is free of agent-to-agent communication and no additional aggregators are required for agent clusters. The efficiency and efficacy of the proposed approaches are demonstrated, in comparison with benchmark methods, through simulations of electric vehicle charging control problems and traffic congestion control problems.
△ Less
Submitted 10 October, 2020;
originally announced October 2020.
-
Fast and Asymptotically Powerful Detection for Filamentary Objects in Digital Images
Authors:
Kai Ni,
Shanshan Cao,
Xiaoming Huo
Abstract:
Given an inhomogeneous chain embedded in a noisy image, we consider the conditions under which such an embedded chain is detectable. Many applications, such as detecting moving objects, detecting ship wakes, can be abstracted as the detection on the existence of chains. In this work, we provide the detection algorithm with low order of computation complexity to detect the chain and the optimal the…
▽ More
Given an inhomogeneous chain embedded in a noisy image, we consider the conditions under which such an embedded chain is detectable. Many applications, such as detecting moving objects, detecting ship wakes, can be abstracted as the detection on the existence of chains. In this work, we provide the detection algorithm with low order of computation complexity to detect the chain and the optimal theoretical detectability regarding SNR (signal to noise ratio) under the normal distribution model. Specifically, we derive an analytical threshold that specifies what is detectable. We design a longest significant chain detection algorithm, with computation complexity in the order of $O(n\log n)$. We also prove that our proposed algorithm is asymptotically powerful, which means, as the dimension $n \rightarrow \infty$, the probability of false detection vanishes. We further provide some simulated examples and a real data example, which validate our theory.
△ Less
Submitted 19 September, 2020;
originally announced September 2020.
-
On the diffusive limits of radiative heat transfer system I: well prepared initial and boundary conditions
Authors:
Mohamed Ghattassi,
Xiaokai Huo,
Nader Masmoudi
Abstract:
We study the diffusive limit approximation for a nonlinear radiative heat transfer system that arises in the modeling of glass cooling, greenhouse effects and in astrophysics. The model is considered with the reflective radiative boundary conditions for the radiative intensity, and periodic, Dirichlet and Robin boundary conditions for the temperature. The global existence of weak solutions for thi…
▽ More
We study the diffusive limit approximation for a nonlinear radiative heat transfer system that arises in the modeling of glass cooling, greenhouse effects and in astrophysics. The model is considered with the reflective radiative boundary conditions for the radiative intensity, and periodic, Dirichlet and Robin boundary conditions for the temperature. The global existence of weak solutions for this system is given by using a Galerkin method with a careful treatment of the boundary conditions. Using the compactness method, averaging lemma and Young measure theory, we prove our main result that the weak solution converges to a nonlinear diffusion model in the diffusive limit. Moreover, under more regularity conditions on the limit system, the diffusive limit is also analyzed by using a relative entropy method. In particular, we get a rate of convergence. The initial and boundary conditions are assumed to be well-prepared in the sense that no initial and boundary layer exist.
△ Less
Submitted 11 October, 2021; v1 submitted 26 July, 2020;
originally announced July 2020.
-
An energy stable and positivity-preserving scheme for the Maxwell-Stefan diffusion system
Authors:
Xiaokai Huo,
Hailiang Liu,
Athanasios E. Tzavaras,
Shuaikun Wang
Abstract:
We develop a new finite difference scheme for the Maxwell-Stefan diffusion system. The scheme is conservative, energy stable and positivity-preserving. These nice properties stem from a variational structure and are proved by reformulating the finite difference scheme into an equivalent optimization problem. The solution to the scheme emerges as the minimizer of the optimization problem, and as a…
▽ More
We develop a new finite difference scheme for the Maxwell-Stefan diffusion system. The scheme is conservative, energy stable and positivity-preserving. These nice properties stem from a variational structure and are proved by reformulating the finite difference scheme into an equivalent optimization problem. The solution to the scheme emerges as the minimizer of the optimization problem, and as a consequence energy stability and positivity-preserving properties are obtained.
△ Less
Submitted 16 May, 2020;
originally announced May 2020.
-
Decentralized Electric Vehicle Charging Control via a Novel Shrunken Primal Multi-Dual Subgradient (SPMDS) Algorithm
Authors:
Xiang Huo,
Mingxi Liu
Abstract:
The charging processes of a large number of electric vehicles (EVs) require coordination and control for the alleviation of their impacts on the distribution network and for the provision of various grid services. However, the scalability of existing EV charging control paradigms are limited by either the number of EVs or the distribution network dimension, largely impairing EVs' aggregate service…
▽ More
The charging processes of a large number of electric vehicles (EVs) require coordination and control for the alleviation of their impacts on the distribution network and for the provision of various grid services. However, the scalability of existing EV charging control paradigms are limited by either the number of EVs or the distribution network dimension, largely impairing EVs' aggregate service capability and applicability. To overcome the scalability barrier, this paper, motivated by the optimal scheduling problem for the valley-filling service, (1) proposes a novel dimension reduction methodology by grouping EVs (primal decision variables) and establishing voltage (global coupled constraints) updating subsets for each EV group in the distribution network and (2) develops a novel decentralized shrunken primal multi-dual subgradient (SPMDS) optimization algorithm to solve this reduced-dimension problem. The proposed SPMDS-based control framework requires no communication between EVs, reduces over 43% of the computational cost in the primal subgradient update, and reduces up to 68% of the computational cost in the dual subgradient update. The efficiency and efficacy of the proposed algorithm are demonstrated through simulations over a modified IEEE 13-bus test feeder and a modified IEEE 123-bus test feeder.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
A positivity-preserving and energy stable scheme for a quantum diffusion equation
Authors:
Xiaokai Huo,
Hailiang Liu
Abstract:
We propose a new fully-discretized finite difference scheme for a quantum diffusion equation, in both one and two dimensions. This is the first fully-discretized scheme with proven positivity-preserving and energy stable properties using only standard finite difference discretization. The difficulty in proving the positivity-preserving property lies in the lack of a maximum principle for fourth or…
▽ More
We propose a new fully-discretized finite difference scheme for a quantum diffusion equation, in both one and two dimensions. This is the first fully-discretized scheme with proven positivity-preserving and energy stable properties using only standard finite difference discretization. The difficulty in proving the positivity-preserving property lies in the lack of a maximum principle for fourth order PDEs. To overcome this difficulty, we reformulate the scheme as an optimization problem based on variational structure and use the singular nature of the energy functional near the boundary values to exclude the possibility of non-positive solutions. The scheme is also shown to be mass conservative and consistent.
△ Less
Submitted 8 April, 2020; v1 submitted 2 December, 2019;
originally announced December 2019.
-
A Unifying Framework of High-Dimensional Sparse Estimation with Difference-of-Convex (DC) Regularizations
Authors:
Shanshan Cao,
Xiaoming Huo,
Jong-Shi Pang
Abstract:
Under the linear regression framework, we study the variable selection problem when the underlying model is assumed to have a small number of nonzero coefficients (i.e., the underlying linear model is sparse). Non-convex penalties in specific forms are well-studied in the literature for sparse estimation. A recent work \cite{ahn2016difference} has pointed out that nearly all existing non-convex pe…
▽ More
Under the linear regression framework, we study the variable selection problem when the underlying model is assumed to have a small number of nonzero coefficients (i.e., the underlying linear model is sparse). Non-convex penalties in specific forms are well-studied in the literature for sparse estimation. A recent work \cite{ahn2016difference} has pointed out that nearly all existing non-convex penalties can be represented as difference-of-convex (DC) functions, which can be expressed as the difference of two convex functions, while itself may not be convex. There is a large existing literature on the optimization problems when their objectives and/or constraints involve DC functions. Efficient numerical solutions have been proposed. Under the DC framework, directional-stationary (d-stationary) solutions are considered, and they are usually not unique. In this paper, we show that under some mild conditions, a certain subset of d-stationary solutions in an optimization problem (with a DC objective) has some ideal statistical properties: namely, asymptotic estimation consistency, asymptotic model selection consistency, asymptotic efficiency. The aforementioned properties are the ones that have been proven by many researchers for a range of proposed non-convex penalties in the sparse estimation. Our assumptions are either weaker than or comparable with those conditions that have been adopted in other existing works. This work shows that DC is a nice framework to offer a unified approach to these existing work where non-convex penalty is involved. Our work bridges the communities of optimization and statistics.
△ Less
Submitted 17 December, 2018;
originally announced December 2018.
-
High-friction limits of Euler flows for multicomponent systems
Authors:
Xiaokai Huo,
Ansgar Jüngel,
Athanasios E. Tzavaras
Abstract:
The high-friction limit in Euler-Korteweg equations for fluid mixtures is analyzed. The convergence of the solutions towards the zeroth-order limiting system and the first-order correction is shown, assuming suitable uniform bounds. Three results are proved: The first-order correction system is shown to be of Maxwell-Stefan type and its diffusive part is parabolic in the sense of Petrovskii. The h…
▽ More
The high-friction limit in Euler-Korteweg equations for fluid mixtures is analyzed. The convergence of the solutions towards the zeroth-order limiting system and the first-order correction is shown, assuming suitable uniform bounds. Three results are proved: The first-order correction system is shown to be of Maxwell-Stefan type and its diffusive part is parabolic in the sense of Petrovskii. The high-friction limit towards the first-order Chapman-Enskog approximate system is proved in the weak-strong solution context for general Euler-Korteweg systems. Finally, the limit towards the zeroth-order system is shown for smooth solutions in the isentropic case and for weak-strong solutions in the Euler-Korteweg case. These results include the case of constant capillarities and multicomponent quantum hydrodynamic models.
△ Less
Submitted 18 October, 2018;
originally announced October 2018.
-
Modeling of Contact Tracing in Epidemic Populations Structured by Disease Age
Authors:
Xi Huo
Abstract:
We consider an age-structured epidemic model with two basic public health interventions: (i) identifying and isolating symptomatic cases, and (ii) tracing and quarantine of the contacts of identified infectives. The dynamics of the infected population are modeled by a nonlinear infection-age-dependent partial differential equation, which is coupled with an ordinary differential equation that descr…
▽ More
We consider an age-structured epidemic model with two basic public health interventions: (i) identifying and isolating symptomatic cases, and (ii) tracing and quarantine of the contacts of identified infectives. The dynamics of the infected population are modeled by a nonlinear infection-age-dependent partial differential equation, which is coupled with an ordinary differential equation that describes the dynamics of the susceptible population. Theoretical results about global existence and uniqueness of positive solutions are proved. We also present two practical applications of our model: (1) we assess public health guidelines about emergency preparedness and response in the event of a smallpox bioterrorist attack; (2) we simulate the 2003 SARS outbreak in Taiwan and estimate the number of cases avoided by contact tracing. Our model can be applied as a rational basis for decision makers to guide interventions and deploy public health resources in future epidemics.
△ Less
Submitted 11 March, 2014; v1 submitted 7 December, 2013;
originally announced December 2013.
-
When do stepwise algorithms meet subset selection criteria?
Authors:
Xiaoming Huo,
Xuelei,
Ni
Abstract:
Recent results in homotopy and solution paths demonstrate that certain well-designed greedy algorithms, with a range of values of the algorithmic parameter, can provide solution paths to a sequence of convex optimization problems. On the other hand, in regression many existing criteria in subset selection (including $C_p$, AIC, BIC, MDL, RIC, etc.) involve optimizing an objective function that c…
▽ More
Recent results in homotopy and solution paths demonstrate that certain well-designed greedy algorithms, with a range of values of the algorithmic parameter, can provide solution paths to a sequence of convex optimization problems. On the other hand, in regression many existing criteria in subset selection (including $C_p$, AIC, BIC, MDL, RIC, etc.) involve optimizing an objective function that contains a counting measure. The two optimization problems are formulated as (P1) and (P0) in the present paper. The latter is generally combinatoric and has been proven to be NP-hard. We study the conditions under which the two optimization problems have common solutions. Hence, in these situations a stepwise algorithm can be used to solve the seemingly unsolvable problem. Our main result is motivated by recent work in sparse representation, while two others emerge from different angles: a direct analysis of sufficiency and necessity and a condition on the mostly correlated covariates. An extreme example connected with least angle regression is of independent interest.
△ Less
Submitted 16 August, 2007;
originally announced August 2007.
-
Adaptive multiscale detection of filamentary structures in a background of uniform random points
Authors:
Ery Arias-Castro,
David L. Donoho,
Xiaoming Huo
Abstract:
We are given a set of $n$ points that might be uniformly distributed in the unit square $[0,1]^2$. We wish to test whether the set, although mostly consisting of uniformly scattered points, also contains a small fraction of points sampled from some (a priori unknown) curve with $C^α$-norm bounded by $β$. An asymptotic detection threshold exists in this problem; for a constant $T_-(α,β)>0$, if th…
▽ More
We are given a set of $n$ points that might be uniformly distributed in the unit square $[0,1]^2$. We wish to test whether the set, although mostly consisting of uniformly scattered points, also contains a small fraction of points sampled from some (a priori unknown) curve with $C^α$-norm bounded by $β$. An asymptotic detection threshold exists in this problem; for a constant $T_-(α,β)>0$, if the number of points sampled from the curve is smaller than $T_-(α,β)n^{1/(1+α)}$, reliable detection is not possible for large $n$. We describe a multiscale significant-runs algorithm that can reliably detect concentration of data near a smooth curve, without knowing the smoothness information $α$ or $β$ in advance, provided that the number of points on the curve exceeds $T_*(α,β)n^{1/(1+α)}$. This algorithm therefore has an optimal detection threshold, up to a factor $T_*/T_-$. At the heart of our approach is an analysis of the data by counting membership in multiscale multianisotropic strips. The strips will have area $2/n$ and exhibit a variety of lengths, orientations and anisotropies. The strips are partitioned into anisotropy classes; each class is organized as a directed graph whose vertices all are strips of the same anisotropy and whose edges link such strips to their ``good continuations.'' The point-cloud data are reduced to counts that measure membership in strips. Each anisotropy graph is reduced to a subgraph that consist of strips with significant counts. The algorithm rejects $\mathbf{H}_0$ whenever some such subgraph contains a path that connects many consecutive significant counts.
△ Less
Submitted 18 May, 2006;
originally announced May 2006.
-
Correction. Connect The Dots: How Many Random Points Can A Regular Curve Pass Through?
Authors:
E. Arias-Castro,
D. L. Donoho,
X. Huo,
C. A. Tovey
Abstract:
Correction for Adv. in Appl. Probab. 37, no. 3 (2005), 571-603
Correction for Adv. in Appl. Probab. 37, no. 3 (2005), 571-603
△ Less
Submitted 28 March, 2006;
originally announced March 2006.