• Tidak ada hasil yang ditemukan

List of Figures

N/A
N/A
Protected

Academic year: 2023

Membagikan "List of Figures"

Copied!
185
0
0

Teks penuh

Each edge of this type of graph is associated with a set of weights corresponding to the known parameters of the optimization (eg the coefficients). In the following, each of the problems studied in this work will be clarified.

graph G ~ in Figure (a). (c) The (j, (i, j)) th entry of M (¯ p d , p ˜ d ) (shown as “*”) is equal to the slope of the line connecting the point (¯p ij , p ¯ ji ) to (˜p ij , p ˜ ji )
graph G ~ in Figure (a). (c) The (j, (i, j)) th entry of M (¯ p d , p ˜ d ) (shown as “*”) is equal to the slope of the line connecting the point (¯p ij , p ¯ ji ) to (˜p ij , p ˜ ji )

Modeling of Brain Connectivity Networks

We then show that the sparsity of the inverse covariance matrix (and not the correlation matrix) matches the circuit topology. A challenge in using graphical lasso (or other sparse regression techniques) is the choice of regularization parameters.

Figure 1.1: (a) A brain image created from fMRI data (b) A graphical representation of the whole-brain functional network , borrowed from [1].
Figure 1.1: (a) A brain image created from fMRI data (b) A graphical representation of the whole-brain functional network , borrowed from [1].

Buffering Dynamics and Stability of Internet Congestion Control

Finally, we apply both the graphical lasso and the modified algorithms to the resting-state fMRI data acquired from three healthy subjects to estimate a connectivity graph for each subject. A comparison of the graphs for these subjects shows that the modified graphical lasso outperforms the graphical lasso algorithm in the sense that the graphs obtained from the modified graphical lasso are noticeably sparser than those obtained from the graphical lasso.

Network Topologies with Zero Duality Gap for Optimal Power Flow

For this purpose, a general model is derived that takes into account the temporal evolution of the size of the buffer memory. A new pricing mechanism is also proposed to ensure the global stability of dual and primal-dual algorithms.

Convexification of Generalized Network Flow Problem

The primary goal of Chapter 4 is to identify a broad class of networks that can solve any OPF problem in polynomial time. The main contribution of this chapter is to show that although GNF can be NP-hard (since the flow equations can have an exponential number of solutions), the optimal injections can be found in polynomial time.

Semidefinite Relaxation for Nonlinear Optimization over Graphs

In particular, we construct an electrical circuit for which the inverse covariance matrix reveals the topology of the circuit. It is shown that the graphical lasso may be able to find an estimated inverse covariance matrix that reveals most of the circuit topology, provided that the exact covariance matrix (not the sample covariance) is well-conditioned.

Mapping of Data into Graphs

Concentration Graph

The main motivation behind the introduction of this graph is that the entries of the inverse covariance matrix (known as concentration matrix) show the conditional (as opposed to marginal) dependencies of Gaussian random variables. The graph associated with S is an estimate of the concentration graph, which depends on the regularization parameters α.

Circuit Model

Modified Graphical Lasso

This means that the modification of the graphical lasso algorithm is based on adding a positive definite matrix βI to each of the two terms in the logarithm of the likelihood function and the positivity constraint. As verified in extensive simulations, this modification reduces the sensitivity of the solution to the regularization parameter α and allows finding a sparse solution independent of the conditioning of Σ.

FMRI data: Graphical Lasso vs. Modified Graphical Lasso

Therefore, we replace the sample covariance matrix Σs in optimizations (2.1) and (2.3) with the sample correlation matrix of each subject's resting-state fMRI data. The color map shown in Figure 2.6(b) illustrates the sparsity of the off-diagonal entries of the matrix solution obtained by optimizing (2.1) after obtaining the absolute value of the matrix elements.

Figure 2.5: 2-D picture of the 140 brain regions.
Figure 2.5: 2-D picture of the 140 brain regions.

Summary

Appendix

Many existing fluid flow models of the Internet congestion control algorithms ignore the effects of buffers on the data flows for the sake of simplicity. Congestion control protocols are based on explicit feedback (which requires explicit communication between sources and links) or on implicit feedback (which requires only end-to-end communication).

Preliminaries and Existing Models

In order for the dual and primal-dual algorithms to work, each source must know the sums of the prices of the links on its path. Motivated by this shortcoming, the objective of this work is to study the robustness of dual and primal-dual algorithms with buffer-size pricing and queuing-delay mechanisms, where buffer dynamics are explicitly taken into account.

Modeling of Buffer Occupancies

Parameter θ ls (t) for Different Service Disciplines

To simplify the formulation, assume that the buffer has always been empty up to the time that implies. Note that the left side of the above inequality shows the amount of data that entered the buffer of link l in the duration [0, t], while its right side indicates.

Dynamics of Buffer Sizes

By defining ˜y(t) as the vector of the switching rates ˜y1(t), ..,y˜l(t), it can be deduced from the above equation that. It follows immediately from the above non-linear differential equation that ifb(t) is strictly positive, then ˙b(t) can be obtained from the equation (3.24).

Figure 3.1: Network studied in Example 1.
Figure 3.1: Network studied in Example 1.

Congestion Control and Buffering Effect

Instability of Primal-Dual Algorithm

  • Constant Buffer Partitioning
  • State-Dependent Buffer Partitioning

If the above linearized system has unstable states, then the primal-dual algorithm must be unstable. Thus, the linearization of the primal-dual algorithm around its equilibrium point leads to an unstable system.

Figure 3.3: Network studied in Examples 3 and 4.
Figure 3.3: Network studied in Examples 3 and 4.

Stability of Dual Algorithm

As a result of (3.49), the S-WFQ schedule can be approximated in such a way that its local behavior remains unchanged, while its global behavior can be approximately analyzed with much lower complexity.

Discussions

Alternative Congestion Feedback

Now the recognition of the flow in the return path collects the new link prices on its route and reports them back to the source. It can be verified that the above strategy corresponds to the new price adjustment q(s) = RTΦp(t) required in the strategy proposed by Theorem 5.

Nonzero Buffer Assumption

However, it can be argued that the primal-dual algorithm is still unstable for Examples 3 and 4 even if the buffer sizes are allowed to become zero. This idea of ​​reporting some virtual values ​​for buffer sizes is also applicable to the primal-dual algorithm with the standard pricing mechanism.

Figure 3.6: This figure illustrates the stability of the primal-dual algorithm using the mod- mod-ified buffer-size pricing mechanism for Example 3.
Figure 3.6: This figure illustrates the stability of the primal-dual algorithm using the mod- mod-ified buffer-size pricing mechanism for Example 3.

Summary

Motivating Example

It can be shown that the duality gap is always zero in both Case 1 and Case 2 for all nonnegative values ​​of P23max. Note that the duality gap being zero does not imply that the OPF problem is feasible.

Contributions

Notations

Problem Formulation

To optimize these controllable parameters, the optimal power flow (OPF) problem can be solved. The second goal is to design a scalable algorithm for solving a large-scale OPF using the power grid topology.

Main Results

Various SDP Relaxations and Zero Duality Gap

Proof: This theorem is a natural extension of the results of [25], which were developed for quadratic cost functions and real-valued dual OPF (instead of complex dual OPF). Proof: Given an arbitrary matrix W, note that an entry Wlm of the matrix W does not appear in constraints (4.4a)–(4.4e) of the OPF except if sel=mor (l, m)∈ L, which means that some input of W may not be relevant.

Acyclic Networks

The duality gap is zero for OPF if ROPF 2 has a solution (Wopt,PoptG ,QoptG ) with the property that rank{Wopt(Gs)}= 1 for every Gs∈ S. The purpose of this part is to show that the duality gap is zero for acyclic networks, when load oversatisfaction is allowed.

General Networks

In contrast, adding a phase shifter to a non-bridge line of a cyclic network can improve the performance of the network. Given a spanning tree T of graph G, assume that a controllable phase shifter is added to each edge of the network that does not belong to this tree.

Examples

As a result of the results developed here, at most 41−30 + 1 of the 41 phase shifts are important and the remaining ones can simply be ignored. Note that (i) OPF and ROPF 3 have the same optimal value, and (ii) the duality gap is zero for OPF without phase shifts.

Figure 4.2: Power network used to illustrate Theorem 2.
Figure 4.2: Power network used to illustrate Theorem 2.

Summary

It is also proven that the integration of controllable phase shifters with variable phases in the cycles of the network makes the verification of the duality gap easier. More importantly, if each cycle (loop) of the network has a line with a controllable phase shifter, then the OPF with variable phase shifts is guaranteed to be solvable in polynomial time, provided load oversatisfiability is allowed.

Appendix

Application of GNF in Power Systems

These problems are highly non-convex due to the non-linearities imposed by the laws of physics [67, 101]. For example, each of the above problems has embedded the power flow equations, which are nonlinear equality constraints.

Notations

Problem Statement and Contributions

Given an edge (i, j) ∈ E, there is no explicit limit on ~pji in the formulation of the GNF problem, because limiting pji is equivalent to limitingpij. In terms of Definition 3, the box-bounded injection region is actually the projection of the feasible set of GNF onto the space of the injection vector pn.

Main Results

Illustrative Example

In this case the solution of Geometric CGNF lies on the lower bound of Pcan and is therefore also a solution of Geometric GNF. In this case, the solutions of Geometric GNF and Geometric CGNF are identical and both correspond to the bottom left corner of box B.

Geometry of Injection Region

For two arbitrary points p¯d,p˜d ∈ Bd, assume that there exists a nonzero vector x ∈ Rm such that xTM(¯pd,p˜d) ≥ 0. In the light of definition 5, the inequality ˆpd > p¯ d holds and partially linear property fij(·), there exists a positive number εmax such that.

Figure 5.4: (a) A particular graph G. (b) The matrix ~ M (¯ p d , p ˜ d ) corresponding to the graph G~ in Figure (a)
Figure 5.4: (a) A particular graph G. (b) The matrix ~ M (¯ p d , p ˜ d ) corresponding to the graph G~ in Figure (a)

Relationship between GNF and CGNF

Since the feasible set of Geometric CGNF includes that of Geometric GNF, ¯p∗n must also be a solution of Geometric GNF. This means that ¯p∗n is the unique optimal solution of Geometric CGNF and yet a feasible point of Geometric GNF.

Figure 5.5: Figures (a) and (b) show the feasible sets T c (1) and T c (2) for the example studied in Section 5.3.1, respectively
Figure 5.5: Figures (a) and (b) show the feasible sets T c (1) and T c (2) for the example studied in Section 5.3.1, respectively

Optimal Power Flow in Electrical Power Networks

In this case, Theorems 1 and 2 can be used to study the corresponding approximate OPF problem. Reactive currents can be written as linear functions of active currents (under fixed voltage magnitudes).

Figure 5.7: (a) Feasible set for (p jk , p kj ). (b) Feasible set for (p jk , p kj ) after imposing lower and upper bounds on θ jk .
Figure 5.7: (a) Feasible set for (p jk , p kj ). (b) Feasible set for (p jk , p kj ) after imposing lower and upper bounds on θ jk .

Summary

In the real-valued case, it is shown that the relaxations are all exact if each set of weights is signed and, in addition, a condition is satisfied for each cycle of the graph. The accuracy of the relaxation can then be interpreted as the existence of a low rank (e.g. rank-1) solution for the SDP relaxation.

Problem Statement and Contributions

  • Notations
  • Problem Statement
  • Related Work
  • Contributions

These conditions require that each weight set is signed, and each cycle of the graph has an even number of positive weight sets. This implies that the proposed relaxations are all exact, independent of the topology of G, as long as the set {c1ij, c2ij, .., ckij} is negative for all (i, j)∈ G.

Figure 6.1: In Figure (a), there exists a line separating x’s (elements of T ) from o’s (elements of −T ) so the set T is sign definite
Figure 6.1: In Figure (a), there exists a line separating x’s (elements of T ) from o’s (elements of −T ) so the set T is sign definite

SDP, Reduced-SDP and SOCP Relaxations

Then the relation fr-SDP∗ = fSDP∗ holds (regardless of whether fSDP∗ =f∗) if every maximal clique (complete subgraph) of the extended graph corresponds to a single edge of G or one of the cycles O1, .. ,On. Part (iii) of Theorem 1 shows that the SOCP relaxation is exact if two conditions are met for an optimal solution X∗ of this optimization: (1) every 2×2 edge submatrix X∗{(i, j) } loses rank, and (2) if the phase of Xij∗ is assigned to the edge (i, j) of the graph G for each (i, j)∈ G, then the sum of the edge phases becomes zero for each cycle in the cycle base .

Real-Valued Optimization

Low-Rank Solution for SDP Relaxation

The SDP relaxation can still be exact (depending on the coefficients of Optimization (6.1)), in which case the relaxation has a rank-1 solution X∗. If ˜X∗ denotes an optimal solution of the complex SDP relaxation, then Re{X˜∗} turns out to be an optimal solution of the real SDP relaxation.

Complex-Valued Optimization

  • Acyclic Graph with Complex Edge Weights
  • Weakly Cyclic Graph with Real Edge Weights
  • Cyclic Graph with Real and Imaginary Edge Weights
  • Weakly Cyclic Graph with Imaginary Edge Weights
  • General Graph with Complex Edge Weight Sets
  • Roles of Graph Topology and Sign Definite Weight Sets

Since X∗{(i, j)} is a 2×2 matrix corresponding to a single edge of the graph, condition (1) is strongly related to the properties of the edge set {c1ij, .., ckij} . This implies that the sign definiteness of the set {c1ij, .., ckij} guarantees the satisfaction of Condition (1) stated above.

Figure 6.2: (a) This figure shows the cones C ij and −C ij , in addition to the position of the complex point X ji∗
Figure 6.2: (a) This figure shows the cones C ij and −C ij , in addition to the position of the complex point X ji∗

Application in Power Systems

Following the argument leading to (6.36), it can be shown that Xji∗ is a negative imaginary number for any (i, j) ∈ G, which means that ~cij1, . ., ~cijk. Since the above optimization can be represented as (6.1), the previously introduced SDP, reduced SDP and SOCP relaxations can be used to eliminate the effect of quadratic terms.

Figure 6.3: (a) This figure illustrates that each transmission line has four flows. (b) Graph G corresponding to minimization of f 0 (x 1 , x 2 ) given in (6.41).
Figure 6.3: (a) This figure illustrates that each transmission line has four flows. (b) Graph G corresponding to minimization of f 0 (x 1 , x 2 ) given in (6.41).

Examples

Due to Corollary 1, since G is acyclic, the SDP relaxation is exact for all values ​​of a, b, c. Note that this does not mean that every solutionX of the SDP relaxation has rank 1.

Figure 6.4: Function f 0 (x 1 , x 2 ) given in (6.41) for a = 3, b = −2 and c = 3.
Figure 6.4: Function f 0 (x 1 , x 2 ) given in (6.41) for a = 3, b = −2 and c = 3.

Summary

It is easy to inspect that the complex-valued order-1 matrix (u1+u2i)(u1+u2i)H is another solution of the SDP relaxation. The complex case is further studied for general graphs, and it is shown that if the graph can be decomposed as a union of edge-disjoint subgraphs, each satisfying one of the four derived structural properties, then two of the relaxations are correct.

Appendix

Topcu, “Optimal Power Flow with Distributed Energy Storage Dynamics,” Proceedings of the 2011 American Control Conference, 2011. Chandy, “Optimal Power Flow over Tree Networks,” Proceedings of the Fourth Ninth Annual Allerton Conference, 2011.

The 62 edges that are in common among the graphs of Subjects 1-3 obtained

Network studied in Example 1

Network studied in Example 2

Network studied in Examples 3 and 4

This figure illustrates the instability of the primal-dual algorithm with the

This figure illustrates the stability of the primal-dual algorithm using the mod-

This figure illustrates the stability of the primal-dual algorithm using the mod-

The three-bus power network studied in Section I-A

Power network used to illustrate Theorem 2

The graph G studied in Section 5.3.1

Gambar

Figure 1.1: (a) A brain image created from fMRI data (b) A graphical representation of the whole-brain functional network , borrowed from [1].
Figure 2.1: (a) The resistive circuit studied in Example 1. (b) The concentration graph representing the inverse covariance matrix.
Figure 2.2: (a) The concentration graph obtained from the exact inverse covariance matrix.
Figure 2.3: (a) The graph for Σ −1 s in the case Σ − Σ s = 0. (b) The estimated concentration graph obtained from optimization (2.1) for α = 0.01
+7

Referensi

Dokumen terkait

In the following section we shall apply the Faddeev-Popov procedure that we discussed in section 2.1 to string field theory.. Suppose we are given a set of bosonic and fermionic fields