首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The aim of this paper is to generalize a result given by Curry and Feys, who have shown that the only regular combinators possessing inverse in the λ-β-η-calculus are the permutators, whose definition is p=λzλx1λxn(zxi1xin) for n?0 where i1,…, ir is a permutation of 1,…, n. Here we extend this characterization to the set of normal forms, showing that the only normal forms possessing inverse in the λ-βη-calculus are the “hereditarily finite permutators” (h.f.p.), whose recursive definition is: if n?0, Pj (1?j?n) are h.f.p. and i1,…,in is a permutation of 1,…, n, then the normal form of P = λzλx1λxn(z(P1xi1))… (Pnin) is an h.f.p.  相似文献   

2.
For each n?1, an n-ary product ? on finite monoids is constructed. This product has the following property: Let Σ be a finite alphabet and Σ1 the free monoid generated by Σ. For i = 1, …,n, let Ai be a recognizable subset of Σ1, M(Ai) the syntactic monoid of An and M(A1?An) the syntactic monoid of the concatenation product A1?An. Then M(A1?An)< ? (M(A1),…,M(An)). The case n = 2 was studied by Schützenberger. As an application of the generalized product, I prove the theorem of Brzozowski and Knast that the dot-depth hierarchy of star-free sets is infinite.  相似文献   

3.
Let r be a relation for the relation scheme R(A1,A2,…,An); then we define Dom(r) to be Domr(A1)×Domr(A2)×…×Domr(An), where Domr(Ai) for each i is the set of all ith coordinates of tuples of r. A relation s is said to be a substructure of the relation r if and only if Dom(s)∩r = s.The following theorems analogous to Tarski-Fraisse-Vaught's characterizations of universal classes are proved: (i) An implicational dependency family (ID-family) F over the relation scheme R is finitely specifiable if and only if there exists a finite number of relations r1,r2,…,rm for R such that r ∈ F if and only if no ri is isomorphic to a substructure of r. (ii) F is finitely specifiable if and only if there exists a natural number k such that r ∈ F whenever F contains all substructures of r with at most k elements.We shall use these characterizations to obtain a new proof for Hull's (1984) characterization of finitely specifiable ID-families.  相似文献   

4.
The authors consider the mth-order neutral difference equation Dm(y(n) + p(n)y(nk) + q(n)f(y(σ(n))) = e(n), where m ≥ 1, {p(n)}, {q(n)}, {e(n)}, and {a1(n)}, {a2(n)}, …, {am−1(n)} are real sequences, ai(n) > 0 for i = 1,2,…, m−1, am(n) ≡ 1, D0z(n) = y(n)+p(n)y(nk), Diz(n) = ai(n)ΔDi−1z(n) for i = 1,2, …, m, k is a positive integer, {σ(n)} → ∞ is a sequence of positive integers, and RR is continuous with u f(u) > 0 for u ≠ 0. In the case where {q(n)} is allowed to oscillate, they obtain sufficient conditions for all bounded nonoscillatory solutions to converge to zero, and if {q(n)} is a nonnegative sequence, they establish sufficient conditions for all nonoscillatory solutions to converge to zero. Examples illustrating the results are included throughout the paper.  相似文献   

5.
A graph G(VE) (|V|⩾2k) satisfies property Ak if, given k pairs of distinct nodes (s1t1), …, (sktk) of V(G), there are k mutually node-disjoint paths, one connecting si and ti for each i, 1⩽ik. A necessary condition for any graph to satisfy Ak is that it is (2k−1)-connected. Hypercubes are important interconnection topologies for parallel computation and communication networks. It has been known that hypercubes of dimension n (which are n-connected) satisfy An/2⌉. In this paper we give an algorithm which, given k=⌈n/2⌉ pairs of distinct nodes (s1t1), …, (sktk) in the n-dimensional hypercube, finds the k disjoint paths of length at most n+⌈log n⌉+1 in O(n2 log* n) time.  相似文献   

6.
A new representation is proved of the solutions of initial boundary value problems for the equation of the form u xx (x, t) + r(x)u x (x, t) ? q(x)u(x, t) = u tt (x, t) + μ(x)u t (x, t) in the section (under boundary conditions of the 1st, 2nd, or 3rd type in any combination). This representation has the form of the Riemann integral dependent on the x and t over the given section.  相似文献   

7.
Sufficient conditions of existence and uniqueness of α-bounded and bounded solutions to the difference equation with advancedd arguments x(n + 1) = A(n)x(n) + B(n)x(σ1(n)) + f(n, x(n), x(σ2(n)), σi(n) ⩾ n + 1, i = 1,2, are given. It is proven that under certain conditions it is possible to find positive numbers R, μ, such that from every initial condition ξ satisfying ∥ξ∥ ⩽ R, a unique bounded solution, belonging to the ball ∥x∥ ⩽ μ, starts.  相似文献   

8.
《国际计算机数学杂志》2012,89(10):2212-2225
A Hamiltonian cycle C=? u 1, u 2, …, u n(G), u 1 ? with n(G)=number of vertices of G, is a cycle C(u 1; G), where u 1 is the beginning and ending vertex and u i is the ith vertex in C and u i u j for any ij, 1≤i, jn(G). A set of Hamiltonian cycles {C 1, C 2, …, C k } of G is mutually independent if any two different Hamiltonian cycles are independent. For a hamiltonian graph G, the mutually independent Hamiltonianicity number of G, denoted by h(G), is the maximum integer k such that for any vertex u of G there exist k-mutually independent Hamiltonian cycles of G starting at u. In this paper, we prove that h(B n )=n?1 if n≥4, where B n is the n-dimensional bubble-sort graph.  相似文献   

9.
Fuzzy control is a methodology that translates “if”-“then” rules, Aji (x1) &…& Ajn(xn) → Bj(u), formulated in terms of a natural language, into an actual control strategy u(x). Implication of uncertain statements is much more difficult to understand than “and,” “or,” and “not.” So, the fuzzy control methodologies usually start with translating “if”-“then” rules into statements that contain only “and,” “not,” and “or.” the first such translation was proposed by Mamdani in his pioneer article on fuzzy control. According to this article, a fuzzy control is reasonable iff one of the rules is applicable, i.e., either the first rule is applicable (A11(x1) &…& A1n(xn) & B1(u)), or the second one is applicable, etc. This approach turned out to be very successful, and it is still used in the majority of fuzzy control applications. However, as R. Yager noticed, in some cases, this approach is not ideal: Namely, if for some x, we know what u(x) should be, and add this crisp rule to our rules, then the resulting fuzzy control for this x may be different from the desired value u(x). to overcome this drawback, Yager proposed to assign priorities to the rules, so that crisp rules get the highest priority, and use these priorities while translating the rules into a control strategy u(x). In this article, we show that a natural modification of Mamdani's approach can solve this problem without adding any ad hoc priorities. © 1995 John Wiley & Sons, Inc.  相似文献   

10.
In this paper we characterize all algorithms for obtaining the coefficients of (Σn?1i=0xiui)(Σn?1i=0yiui) mod P(u), where P(u) is an irreducible po lynomial of degree n, which use 2n ? 1 multiplications. It is shown that up to equivalence, all such algorithms are obtainable by first obtaining the coefficients of the product of two polynomials, and then reducing modulo the irreducible polynomial.  相似文献   

11.
LetW itk(n) be the minimax complexity of selecting thek largest elements ofn numbersx 1,x 2,...,x n by pairwise comparisonsx i :x j . It is well known thatW 2(n) =n?2+ [lgn], andW k (n) = n + (k?1)lg n +O(1) for all fixed k ≥ 3. In this paper we studyW k (n), the minimax complexity of selecting thek largest, when tests of the form “Isx i the median of {x i ,x j ,x t }?” are also allowed. It is proved thatW2(n) =n?2+ [lgn], andW k (n) =n + (k?1)lg2 n +O(1) for all fixedk≥3.  相似文献   

12.
13.
A king in a tournament is a player who beats any other player directly or indirectly. According to the existence of a king in every tournament, Wu and Sheng [Inform. Process. Lett. 79 (2001) 297-299] recently presented an algorithm for finding a sorted sequence of kings in a tournament of size n, i.e., a sequence of players u1,u2,…,un such that uiui+1 (ui beats ui+1) and ui is a king in the sub-tournament induced by {ui,ui+1,…,un} for each i=1,2,…,n−1. With each pair u,v of players in a tournament, let b(u,v) denote the number of third players used for u to beat v indirectly. Then, a king u is called a strong king if the following condition is fulfilled: if vu then b(u,v)>b(v,u). In the sequel, we will show that the algorithm proposed by Wu and Sheng indeed generates a sorted sequence of strong kings, which is more restricted than the previous one.  相似文献   

14.
It is proved that the family of recognizable N-subsets is not closed under the operation sup, and that there exists even a DOL length sequence x0, x1, … such that, for any k,xi ? xi+1 ? … ? xi+k holds true for some i and the cardinality of the set {n ∈ N|xn > xn+1} is infinite.  相似文献   

15.
This paper deals with diffusion problems modeled by the equation a(t)uxx = ut, x > 0, t > 0, u(x, 0) = c(x) together with the boundary condition u(0, t) = b(t) or ux(0, t) = b(t). By using Fourier transforms, existence conditions and exact solutions of the above mixed problems are given.  相似文献   

16.
A.S. Morse 《Automatica》1976,12(5):529-531
This paper studies the algebraic structure of linear systems defined over R[λ], the ring of polynomials in λ with real coefficients. Natural definitions of controllability and observability are introduced and properties of R[λ]-transfer matrix realizations are discussed. It is shown that (An×n,Dn×m) is a controllable R[λ]-matrix pair if and only if for each set of polynomialsβ12,…,βn, in R[λ] there exists an R[λ] feedback matrixF such that detsI?A?BF]=∏i=1n(s+βi). By regarding λ as a suitably defined delay operator, it is explained how this result might be applied to delay-differential systems in order to control dynamic response.  相似文献   

17.
In many real-life situations, we want to reconstruct the dependencyy=f(x 1,…, xn) from the known experimental resultsx i (k) , y(k). In other words, we want tointerpolate the functionf from its known valuesy (k)=f(x 1 (k) ,…, x n (k) ) in finitely many points $\bar x^{(k)} = (x_1^{(k)} , \ldots ,x_n^{(k)} )$ , 1≤kN There are many functions that go through given points. How to choose one of them? The main goal of findingf is to be able to predicty based onx i. If we getx i from measurements, then usually, we only getintervals that containx i. As a result of applyingf, we get an interval y of possible values ofy. It is reasonable to choosef for which the resulting interval is the narrowest possible. In this paper, we formulate this choice problem in mathematical terms, solve the corresponding problem for several simple cases, and describe the application of these solutions to intelligent control.  相似文献   

18.
We study the problem of semiglobally stabilizing uncertain nonlinear system

, with (A,B) in Brunowski form. We prove that if p1(z,u,t)u and p2(z,u,t)u are of order greater than 1 and 0, respectively, with “generalized” dilation δl(z,u)=(l1−nz1,…,l−1zn−1,zn,lu) and uniformly with respect to t, where zi is the ith component of z, then we can achieve semiglobal stabilization via arbitrarily bounded linear measurement feedback.  相似文献   

19.
Loveland and Meyer have studied necessary and sufficient conditions for an infinite binary string x to be recursive in terms of the program-size complexity relative to n of its n-bit prefixes xn. Meyer has shown that x is recursive iff ?c, ?n, K(xn?n) ? c, and Loveland has shown that this is false if one merely stipulates that K(xn?n) ? c for infinitely many n. We strengthen Meyer's theorem. From the fact that there are few minimal-size programs for calculating n given result, we obtain a necessary and sufficient condition for x to be recursive in terms of the absolute program-size complexity of its prefixes: x is recursive iff ?c, ?n, K(xn) ? K(n) + c. Again Loveland's method shows that this is no longer a sufficient condition for x to be recursive if one merely stipulates that K(xn) ? K(n) + c for infinitely many n.  相似文献   

20.
《国际计算机数学杂志》2012,89(8):1692-1708
Given (i) any k vertices u 1, u 2, …, u k (1≤k<n) in the n-cube Q n , where (u 1, u 2), (u 3, u 4), …, (u 2m?1, u 2m ) (m≤? k\2 ?) are edges of the same dimension, (ii) any k positive integers a 1, a 2, …, a k such that a 1, a 2, …, a 2m are odd and a 2m+1, …, a k are even, with a 1+a 2+···+a k =2 n , and (iii) k subsets W 1, W 2, …, W k of V(Q n ) with |W i |≤n?k and if a i =1, then u i ¬∈W i , for 1≤ik, we show that there exist k vertex-disjoint paths P (1), P (2), …, P (k) in Q n where P (i) contains a i vertices, its origin is u i , and its terminus is in V(Q n )/ W i , for 1≤ik. We also prove a similar result which extends two well-known results of Havel, [I. Havel On hamilton circuits and spanning trees of hypercubes, ?asopis pro P?stování Matematiky, 109 (1984), pp. 135–152.] and Nebeský, [L. Nebeský Embedding m-quasistars into n-cubes, Czech. Math. J. 38 (1988), pp. 705–712].  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号