首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Given any [c],[a],[d]∈R/M such that [d]≤[a]≤[c], [a] is locally noncuppable between [c] and [d] if [d]<[a]≤[c]and [a] ∨ [b] < [c] for any [b]∈R/M such that [d]≤ [ b ] < [ c ]. It will be shown that given any nonzero [ c ] ∈ R/M, there are [ a ], [ d ] ∈R/M such that [d]<[a]≤[c] and[a] is locally noncuppable between [c] and[d].  相似文献   

2.
In this paper we separate many-one reducibility from truth-table reducibility for distributional problems in DistNP under the hypothesis that P NP . As a first example we consider the 3-Satisfiability problem (3SAT) with two different distributions on 3CNF formulas. We show that 3SAT with a version of the standard distribution is truth-table reducible but not many-one reducible to 3SAT with a less redundant distribution unless P = NP . We extend this separation result and define a distributional complexity class C with the following properties: (1) C is a subclass of DistNP, this relation is proper unless P = NP. (2) C contains DistP, but it is not contained in AveP unless DistNP \subseteq AveZPP. (3) C has a p m -complete set. (4) C has a p tt -complete set that is not p m -complete unless P = NP. This shows that under the assumption that PNP, the two completeness notions differ on some nontrivial subclass of DistNP.  相似文献   

3.
Applicability of clipping of quadratic functional E = −0.5x + Tx + Bx in the minimization problem is considered (here x is the configurational vector and BR N is real valued vector). The probability that the gradient of this functional and the gradient of clipped functional ɛ = −0.5x + τx + bx are collinear is shown to be very high (the matrix τ is obtained by clipping of original matrix T: τij = sgnT ij ). It allows the conclusion that minimization of functional ɛ implies minimization of functional E. We can therefore replace the laborious process of minimizing functional E by the minimization of its clipped prototype ɛ. Use of the clipped functional allows sixteen-times reduction of the computation time and computer memory usage.  相似文献   

4.
In a max-min LP, the objective is to maximise ω subject to A x1, C xω 1, and x0. In a min-max LP, the objective is to minimise ρ subject to A xρ 1, C x1, and x0. The matrices A and C are nonnegative and sparse: each row a i of A has at most Δ I positive elements, and each row c k of C has at most Δ K positive elements.  相似文献   

5.
《国际计算机数学杂志》2012,89(10):2325-2331
In this study, some algebraic characterizations of the coefficient matrix A of the planar three-index transportation problem are derived and the equivalent formulation of this problem is obtained using the Kronecker product. It is shown that eigenvectors of the matrix G + G are characterized in terms of eigenvectors of the matrix A + A , where G + is the Moore–Penrose inverse of the coefficient matrix G of the equivalent problem.  相似文献   

6.
Given a parametric polynomial family p(s; Q) := {n k=0 ak (q)sk : q ] Q}, Q R m , the robust root locus of p(s; Q) is defined as the two-dimensional zero set p,Q := {s ] C:p(s; q) = 0 for some q ] Q}. In this paper we are concerned with the problem of generating robust root loci for the parametric polynomial family p(s; E) whose polynomial coefficients depend polynomially on elements of the parameter vector q ] E which lies in an m-dimensional ellipsoid E. More precisely, we present a computational technique for testing the zero inclusion/exclusion of the value set p(z; E) for a fixed point z in C, and then apply an integer-labelled pivoting procedure to generate the boundary of each subregion of the robust root locus p,E . The proposed zero inclusion/exclusion test algorithm is based on using some simple sufficient conditions for the zero inclusion and exclusion of the value set p(z,E) and subdividing the domain E iteratively. Furthermore, an interval method is incorporated in the algorithm to speed up the process of zero inclusion/exclusion test by reducing the number of zero inclusion test operations. To illustrate the effectiveness of the proposed algorithm for the generation of robust root locus, an example is provided.  相似文献   

7.
8.
Abstract. We show that the counting classes AWPP and APP [FFKL], [L] are more robust than previously thought. Our results identify a sufficient condition for a language to be low for PP, and we show that this condition is at least as weak as other previously studied criteria. We extend a result of K?bler et al. by proving that all sparse co-C = P languages are in APP, and are thus PP-low. Our results also imply that AWPP ⊂eq APP, and thus APP contains many other established subclasses of PP-low, thereby reducing several different lowness results to membership in APP. We also show that AWPP and APP are Σ 0 2 -definable classes. Some of our results are reminiscent of amplifying certainty in probabilistic computation.  相似文献   

9.
Abstract

Suppose LC 1 and LC 2 are two machine learning classes each based on a criterion of success. Suppose, for every machine which learns a class of functions according to the LC 2 criterion of success, there is a machine which learns this class according to the LC 2 criterion. In the case where the converse does not hold LC, is said to be separated from LC 2. It is shown that for many such separated learning classes from the literature a much stronger separation holds: (?𝒞∈LC 1) (?𝒞' ∈LC 2 - LC 1(( [' ?𝒞] It is also shown that there is a pair of separated learning classes from the literature for which the stronger separation above does not hold. A philosophical heuristic toward the design of artificially intelligent learning programs is presented with each strong separation result.  相似文献   

10.
In the study of cappable and noncappable properties of the recursively enumerable(r.e.)degrees.Lempp suggested a conjecture which asserts that for all r.e.degrees and b,if a ≮b then there exists an r.e.degree c such that c≤a and c≮b and c is cappable.We shall prove in this paper that this conjecture holds under the condition that a is high.Working below a high r.e.degree h,we show that for any r.e.degree b with h≮b,there exist r.e.degrees a0 and a1 and such that a0,a1≮b,a0,a1≤h,and a0 and a1 from a minimal pair.  相似文献   

11.
In machine-learning technologies, the support vector machine (SV machine, SVM) is a brilliant invention with many merits, such as freedom from local minima, the widest possible margins separating different clusters, and a solid theoretical foundation. In this paper, we first explore the linear separability relationships between the high-dimensional feature space H and the empirical kernel map U as well as between H and the space of kernel outputs K. Second, we investigate the relations of the distances between separating hyperplanes and SVs in H and U, and derive an upper bound for the margin width in K. Third, as an application, we show experimentally that the separating hyperplane in H can be slightly adjusted through U. The experiments reveal that existing SVM training can linearly separate the data in H with considerable success. The results in this paper allow us to visualize the geometry of H by studying U and K.  相似文献   

12.
Alternating-time temporal logic (atl) is a logic for reasoning about open computational systems and multi-agent systems. It is well known that atl model checking is linear in the size of the model. We point out, however, that the size of an atl model is usually exponential in the number of agents. When the size of models is defined in terms of states and agents rather than transitions, it turns out that the problem is (1) Δ 3 P -complete for concurrent game structures, and (2) Δ 2 P -complete for alternating transition systems. Moreover, for “Positive atl” that allows for negation only on the level of propositions, model checking is (1) Σ 2 P -complete for concurrent game structures, and (2) NP-complete for alternating transition systems. We show a nondeterministic polynomial reduction from checking arbitrary alternating transition systems to checking turn-based transition systems, We also discuss the determinism assumption in alternating transition systems, and show that it can be easily removed. In the second part of the paper, we study the model checking complexity for formulae of atl with imperfect information (atl ir ). We show that the problem is Δ 2 P -complete in the number of transitions and the length of the formula (thereby closing a gap in previous work of Schobbens in Electron. Notes Theor. Comput. Sci. 85(2), 2004). Then, we take a closer look and use the same fine structure complexity measure as we did for atl with perfect information. We get the surprising result that checking formulae of atl ir is also Δ 3 P -complete in the general case, and Σ 2 P -complete for “Positive atl ir ”. Thus, model checking agents’ abilities for both perfect and imperfect information systems belongs to the same complexity class when a finer-grained analysis is used.  相似文献   

13.
T. Boros  A. H. Sayed  H. Lev-Ari  T. Kailath 《Calcolo》1996,33(1-2):131-145
A Schur-type algorithm is presented for the simultaneous triangular factorization of a given (non-degenerate) structured matrix and its inverse. The algorithm takes the displacement generator of a Hermitian, strongly regular matrixR as an input, and computes the displacement generator of the inverse matrixR −1 as an output. From these generators we can directly deduce theLD −1 L * (lower-diagonal-upper) decomposition ofR, and theUD −1 U * (upper-diagonallower) decomposition ofR −1. The computational complexity of the algorithm isO(rn 2) operations, wheren andr denote the size and the displacement rank ofR, respectively. Moreover, this method is especially suited for parallel (systolic array) implementations: usingn processors the algorithm can be carried out inO(n) steps.  相似文献   

14.
In this paper we study three popular on-line disk scheduling algorithms, FCFS, SSTF, and LOOK, using competitive analysis. Our results show that, in a competitive sense, the performance of LOOK is better than those of SSTF and FCFS. As a by-product, our analysis also reveals quantitatively the role played by the size of the window, which in our model is a waiting buffer that holds a fixed number of requests waiting to be serviced next. The window, in some sense, offers the lookahead ability which is mentioned in several on-line problems. Received February 1997, and in revised form November 1997, and in final form February 1998.  相似文献   

15.
Jiang  Mengjuan  Li  Fanzhang 《Applied Intelligence》2022,52(10):10965-10978

Humans can use acquired experience to learn new skills quickly and without forgetting the knowledge they already have. However, the neural network cannot do continual learning like humans, because it is easy to fall into the stability-plasticity dilemma and lead to catastrophic forgetting. Since meta-learning with the already acquired knowledge as a priori can directly optimize the final goal, this paper proposes LGCMLA (Lie Group Continual Meta Learning Algorithm) based on meta-learning, this algorithm is an improvement of CMLA (Continual Meta Learning Algorithm) proposed by Jiang et al. On the one hand, LGCMLA enhances the continuity between tasks by changing the inner-loop update rule (from using random initialization parameters for each task to using the updated parameters of the previous task for the subsequent task). On the other hand, it uses orthogonal groups to limit the parameter space and adopts the natural Riemannian gradient descent to accelerate the convergence speed. It not only corrects the shortcomings of poor convergence and stability of CMLA, but also further improves the generalization performance of the model and solves the stability-plasticity dilemma more effectively. Experiments on miniImageNet, tieredImageNet and Fewshot-CIFAR100 (Canadian Institute For Advanced Research) datasets prove the effectiveness of LGCMLA. Especially compared to MAML (Model-Agnostic Meta-Learning) with standard four-layer convolution, the accuracy of 1 shot and 5 shot is improved by 16.4% and 17.99% respectively under the setting of 5-way on miniImageNet.

  相似文献   

16.
An efficient method for computing a given number of leading eigenvalues (i.e., having largest real parts) and the corresponding eigenvectors of a large asymmetric matrixM is presented. The method consists of three main steps. The first is a filtering process in which the equationx = Mx is solved for an arbitrary initial conditionx(0) yielding:x(t)=e Mt x(0). The second step is the construction of (n+1) linearly independent vectorsv m =M m x, 0mn orv m =e mMt x ( being a short time interval). By construction, the vectorsv m are combinations of only a small number of leading eigenvectors ofM. The third step consists of an analysis of the vectors {v m } that yields the eigenvalues and eigenvectors. The proposed method has been successfully tested on several systems. Here we present results pertaining to the Orr-Sommerfeld equation. The method should be useful for many computations in which present methods are too slow or necessitate excessive memory. In particular, we believe it is well suited for hydrodynamic and mechanical stability investigations.  相似文献   

17.
目的 场景文本识别(scene text recognition,STR)是计算机视觉中的一个热门研究领域。最近,基于多头自注意力机制的视觉Transformer (vision Transformer,ViT)模型被提出用于STR,以实现精度、速度和计算负载的平衡。然而,没有机制可以保证不同的自注意力头确实捕捉到多样性的特征,这将导致使用多头自注意力机制的ViT模型在多样性极强的场景文本识别任务中表现不佳。针对这个问题,提出了一种新颖的正交约束来显式增强多个自注意力头之间的多样性,提高多头自注意力对不同子空间信息的捕获能力,在保证速度和计算效率的同时进一步提高网络的精度。方法 首先提出了针对不同自注意力头上Q (query)、K (key)和V (value)特征的正交约束,这可以使不同的自注意力头能够关注到不同的查询子空间、键子空间、值子空间的特征,关注不同子空间的特征可以显式地使不同的自注意力头捕捉到更具差异的特征。还提出了针对不同自注意力头上QKV 特征线性变换权重的正交约束,这将为Q、K和V特征的学习提供正交权重空间的解决方案,并在网络训练中带来隐式正则化的效果。结果 实验在7个数据集上与基准方法进行比较,在规则数据集Street View Text (SVT)上精度提高了0.5%;在不规则数据集CUTE80 (CT)上精度提高了1.1%;在7个公共数据集上的整体精度提升了0.5%。结论 提出的即插即用的正交约束能够提高多头自注意力机制在STR任务中的特征捕获能力,使ViT模型在STR任务上的识别精度得到提高。本文代码已公开: https://github.com/lexiaoyuan/XViTSTR。  相似文献   

18.
Suspended particulate matter (SPM) is a dominant water constituent of case-II waters, and SPM concentration (CSPM) is a key parameter describing water quality. This study, using Landsat 8 Operational Land Imager (OLI) images, aimed to develop the CSPM retrieval models and further to estimate the CSPM values of Dongting Lake. One Landsat 8 OLI image and 53 CSPM measurements were employed to calibrate Landsat 8-based CSPM retrieval models. The CSPM values derived from coincident Landsat 8 OLI and Moderate Resolution Imaging Spectroradiometer (MODIS) images were compared to validate calibrated Landsat 8-based CSPM models. After the best stable Landsat 8-based CSPM retrieval model was further validated using an independent Landsat 8 OLI image and its coincident CSPM measurements, it was applied to four Landsat 8 OLI images to retrieve the CSPM values in the South and East Dongting Lake. Model calibration results showed that two exponential models of the red band explained 61% (estimated standard error (SE) = 7.96 mg l–1) and 67% (SE = 6.79 mg l–1) of the variation of CSPM; two exponential models of the red:panchromatic band ratio obtained 81% (SE = 5.48 mg l–1) and 77% (SE = 4.96 mg l–1) fitting accuracy; and four exponential and quadratic models of the infrared band explained 72–83% of the variation of CSPM (SE = 5.18–5.52 mg l–1). By comparing the MODIS- and Landsat 8-based CSPM values, an exponential model of the Landsat 8 OLI red band (CSPM = 1.1034 × exp(23.61 × R)) obtained the best consistent CSPM estimations with the MODIS-based model (r = 0.98, p < 0.01), and its further validation result using an independent Landsat 8 OLI image showed a significantly strong correlation between the measured and estimated CSPM values at a significance level of 0.05 (r = 0.91, p < 0.05). The CSPM spatiotemporal distribution derived from four Landsat 8 images revealed a clear spatial distribution pattern of CSPM in the South and East Dongting Lake, which was caused by natural and anthropogenic factors together. This study confirmed the potential of Landsat 8 OLI images in retrieving CSPM and provided a foundation for retrieving the spatial distribution of CSPM accurately from this new data source in Dongting Lake.  相似文献   

19.
We present the R 2 D 2 redundancy detector. R 2 D 2 identifies redundant code fragments in large software systems written in Lisp. For each pair of code fragments, R 2 D 2 uses a combination of techniques ranging from syntax-based analysis to semantics-based analysis, that detects positive and negative evidences regarding the redundancy of the analyzed code fragments. These evidences are combined according to a well-defined model and sufficiently redundant fragments are reported to the user. R 2 D 2 explores several techniques and heuristics to operate within reasonable time and space bounds and is designed to be extensible.  相似文献   

20.
This study shows that a controllable system [xdot] = Ax + Bu, where x is an n-vector, can be driven from an arbitrary initial condition x(0) = x0 to an arbitrary final condition x(tf = xf by a polynomial control function of degree M = 2r + 1, where r = n ? rank (B), through a polynomial trajectory of degree M. A simple algorithm for finding u by solving a set of linear equations, the solution of which yields the polynomial coefficients, is given.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号