scholarly journals Optimization with Least Constraint Violation

2021 ◽  
Vol 2 (3) ◽  
pp. 551-584
Author(s):  
Yu-Hong Dai & LiweiZhang
Keyword(s):  
Author(s):  
Apiwat Reungwetwattana ◽  
Shigeki Toyama

Abstract This paper presents an efficient extension of Rosenthal’s order-n algorithm for multibody systems containing closed loops. Closed topological loops are handled by cut joint technique. Violation of the kinematic constraint equations of cut joints is corrected by Baumgarte’s constraint violation stabilization method. A reliable approach for selecting the parameters used in the constraint stabilization method is proposed. Dynamic analysis of a slider crank mechanism is carried out to demonstrate efficiency of the proposed method.


2014 ◽  
Vol 519-520 ◽  
pp. 181-184
Author(s):  
Jian Feng Lu ◽  
Xuan Yan ◽  
Yi Ding Liu

Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.


1995 ◽  
Vol 117 (3) ◽  
pp. 446-453 ◽  
Author(s):  
S. Yoon ◽  
R. M. Howe ◽  
D. T. Greenwood

When Baumgarte’s Constraint Violation Stabilization Method (CVSM) is used in the simulation of Lagrange equations of motion with holonomic constraints, it is shown that, with suitable assumptions on the integration step size h and the eigenvalues (λ’s) of the linearized system, the constraint variables are effectively integrated by the same algorithm as that used for the state variables. A numerical stability analysis of the constraint violations can be performed using this so-called pseudo-integration equation. A study is also made of truncation errors and their modeling in the continuous time domain. This model can be used to determine the effectiveness of various constraint controls and integration methods in reducing the errors in the solution due to truncation errors. Examples are presented to illustrate the use of a higher-order truncation error model which leads to an accurate quantitative steady-state analysis of the constraint violations.


Author(s):  
John J. McCarthy

The idea that constraints on well-formedness play a role in determining phonological alternations, which dates back at least to Kisseberth’s (1970) pioneering work, has by now achieved almost universal acceptance. A tacit assumption of this program, largely unquestioned even in recent research, is the notion that valid constraints must state true generalizations about surface structure or some other level of phonological representation. Anything different would seem antithetical to the very idea of a well-formedness constraint.


Author(s):  
Imad M. Khan ◽  
Kurt S. Anderson

In this paper, we characterize the orthogonal complement-based divide-and-conquer (ODCA) [1] algorithm in terms of the constraint violation error growth rate and singularity handling capabilities. In addition, we present a new constraint stabilization method for the ODCA architecture. The proposed stabilization method is applicable to general multibody systems with arbitrary number of closed kinematic loops. We compare the performance of the ODCA with augmented [2] and reduction [3] methods. The results indicate that the performance of the ODCA falls between these two traditional techniques. Furthermore, using a numerical example, we demonstrate the effectiveness of the new stabilization scheme.


Author(s):  
Hong Zhou ◽  
Nitin M. Dhembare

The design domain of a synthesized compliant mechanism is discretized into quadrilateral design cells in both hybrid and quadrilateral discretization models. However, quadrilateral discretization model allows for point connection between two diagonal design cells. Hybrid discretization model completely eliminates point connection by subdividing each quadrilateral design cell into triangular analysis cells and connecting any two contiguous quadrilateral design cells using four triangular analysis cells. When point connection is detected and suppressed in quadrilateral discretization, the local topology search space is dramatically reduced and slant structural members are serrated. In hybrid discretization, all potential local connection directions are utilized for topology optimization and any structural members can be smooth whether they are in the horizontal, vertical or diagonal direction. To compare the performance of hybrid and quadrilateral discretizations, the same design and analysis cells, genetic algorithm parameters, constraint violation penalties are employed for both discretization models. The advantages of hybrid discretization over quadrilateral discretization are obvious from the results of two classical synthesis examples of compliant mechanisms.


Sign in / Sign up

Export Citation Format

Share Document