Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

On Variants Of Sliding And Frank-Wolfe Type Methods And Their Applications In Video Co-Localization, Seyed Hamid Nazari Dec 2022

On Variants Of Sliding And Frank-Wolfe Type Methods And Their Applications In Video Co-Localization, Seyed Hamid Nazari

All Dissertations

In this dissertation, our main focus is to design and analyze first-order methods for computing approximate solutions to convex, smooth optimization problems over certain feasible sets. Specifically, our goal in this dissertation is to explore some variants of sliding and Frank-Wolfe (FW) type algorithms, analyze their convergence complexity, and examine their performance in numerical experiments. We achieve three accomplishments in our research results throughout this dissertation. First, we incorporate a linesearch technique to a well-known projection-free sliding algorithm, namely the conditional gradient sliding (CGS) method. Our proposed algorithm, called the conditional gradient sliding with linesearch (CGSls), does not require the …


An Algorithm For Biobjective Mixed Integer Quadratic Programs, Pubudu Jayasekara Merenchige Dec 2021

An Algorithm For Biobjective Mixed Integer Quadratic Programs, Pubudu Jayasekara Merenchige

All Dissertations

Multiobjective quadratic programs (MOQPs) are appealing since convex quadratic programs have elegant mathematical properties and model important applications. Adding mixed-integer variables extends their applicability while the resulting programs become global optimization problems. Thus, in this work, we develop a branch and bound (BB) algorithm for solving biobjective mixed-integer quadratic programs (BOMIQPs). An algorithm of this type does not exist in the literature.

The algorithm relies on five fundamental components of the BB scheme: calculating an initial set of efficient solutions with associated Pareto points, solving node problems, fathoming, branching, and set dominance. Considering the properties of the Pareto set of …


A Comprehensive Assessment Methodology Based On Life Cycle Analysis For On-Board Photovoltaic Solar Modules In Vehicles, Mahmoud Abdelhamid Dec 2014

A Comprehensive Assessment Methodology Based On Life Cycle Analysis For On-Board Photovoltaic Solar Modules In Vehicles, Mahmoud Abdelhamid

All Dissertations

This dissertation presents a novel comprehensive assessment methodology for using on-board photovoltaic (PV) solar technologies in vehicle applications. A well-to-wheels life cycle analysis based on a unique energy, greenhouse gas (GHG) emission, and economic perspective is carried out in the context of meeting corporate average fuel economy (CAFE) standards through 2025 along with providing an alternative energy path for the purpose of sustainable transportation. The study includes 14 different vehicles, 3 different travel patterns, in 12 U.S. states and 16 nations using 19 different cost analysis scenarios for determining the challenges and benefits of using on-board photovoltaic (PV) solar technologies …


Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang Aug 2014

Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang

All Dissertations

The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …


Design Of A Custom Software Application To Monitor And Communicate Cnc Machining Process Information To Aid In Chatter Identification, Valerie Pezzullo May 2014

Design Of A Custom Software Application To Monitor And Communicate Cnc Machining Process Information To Aid In Chatter Identification, Valerie Pezzullo

All Theses

In any manufacturing environment, it is important to be able to monitor the Computer Numerical Control (CNC) machining process so that high quality parts can be produced in the least amount of time in order to be profitable. This involves acquiring the proper parameters needed from the machine's controller, which can prove to be difficult with proprietary machine tools that tend to limit access to the internal data collected by the controller. This closed approach to controller design also means that many technological advances that have recently become prevalent in society are not being adopted in the manufacturing industry, preventing …


Improved Mixed-Integer Models Of A Two-Dimensional Cutting Stock Problem, William Lassiter May 2014

Improved Mixed-Integer Models Of A Two-Dimensional Cutting Stock Problem, William Lassiter

All Theses

This paper is concerned with a family of two-dimensional cutting stock problems that seeks to cut rectangular regions from a finite collection of sheets in such a manner that the minimum number of sheets is used. A fixed number of rectangles are to be cut, with each rectangle having a known length and width. All sheets are rectangular, and have the same dimension. We review two known mixed-integer mathematical formulations, and then provide new representations that both economize on the number of discrete variables and tighten the continuous relaxations. A key consideration that arises repeatedly in all models is the …