首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper mathematically analyzes the integral generalized policy iteration (I-GPI) algorithms applied to a class of continuous-time linear quadratic regulation (LQR) problems with the unknown system matrix AA. GPI is the general idea of interacting policy evaluation and policy improvement steps of policy iteration (PI), for computing the optimal policy. We first introduce the update horizon ??, and then show that (i) all of the I-GPI methods with the same ?? can be considered equivalent and that (ii) the value function approximated in the policy evaluation step monotonically converges to the exact one as ?→∞?. This reveals the relation between the computational complexity and the update (or time) horizon of I-GPI as well as between I-PI and I-GPI in the limit ?→∞?. We also provide and discuss two modes of convergence of I-GPI; I-GPI behaves like PI in one mode, and in the other mode, it performs like value iteration for discrete-time LQR and infinitesimal GPI (?→0?0). From these results, a new classification of the integral reinforcement learning is formed with respect to ??. Two matrix inequality conditions for stability, the region of local monotone convergence, and data-driven (adaptive) implementation methods are also provided with detailed discussion. Numerical simulations are carried out for verification and further investigations.  相似文献   

2.
Consider a probabilistic graph G   in which the edges of E(G)E(G) are perfectly reliable, but the vertices of V(G)V(G) may fail with some known probabilities. Given a subset K   of V(G)V(G), the K-terminal residual reliability of G is the probability that all operational vertices in K are connected to each other. This problem can be considered to be a generalization of two well-known reliability problems – the K-terminal reliability problem and the residual connectedness reliability problem.  相似文献   

3.
Let F(x,y)F(x,y) be a polynomial over a field KK and mm a nonnegative integer. We call a polynomial gg over KK an mm-near solution of F(x,y)F(x,y) if there exists a c∈KcK such that F(x,g)=cxmF(x,g)=cxm, and the number cc is called an mm-value of F(x,y)F(x,y) corresponding to gg. In particular, cc can be 0. Hence, by viewing F(x,y)=0F(x,y)=0 as a polynomial equation over K[x]K[x] with variable yy, every solution of the equation F(x,y)=0F(x,y)=0 in K[x]K[x] is also an mm-near solution. We provide an algorithm that gives all mm-near solutions of a given polynomial F(x,y)F(x,y) over KK, and this algorithm is polynomial time reducible to solving one variable equations over KK. We introduce approximate solutions to analyze the algorithm. We also give some interesting properties of approximate solutions.  相似文献   

4.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

5.
6.
This paper is a sequel to “Computing diagonal form and Jacobson normal form of a matrix using Gröbner bases” (Levandovskyy and Schindelar, 2011). We present a new fraction-free algorithm for the computation of a diagonal form of a matrix over a certain non-commutative Euclidean domain over a computable field with the help of Gröbner bases. This algorithm is formulated in a general constructive framework of non-commutative Ore localizations of GG-algebras (OLGAs). We use the splitting of the computation of a normal form for matrices over Ore localizations into the diagonalization and the normalization processes. Both of them can be made fraction-free. For a given matrix MM over an OLGA RR, we provide a diagonalization algorithm to compute U,VU,V and DD with fraction-free entries such that UMV=DUMV=D holds and DD is diagonal. The fraction-free approach allows to obtain more information on the associated system of linear functional equations and its solutions, than the classical setup of an operator algebra with coefficients in rational functions. In particular, one can handle distributional solutions together with, say, meromorphic ones. We investigate Ore localizations of common operator algebras over K[x]K[x] and use them in the unimodularity analysis of transformation matrices U,VU,V. In turn, this allows to lift the isomorphism of modules over an OLGA Euclidean domain to a smaller polynomial subring of it. We discuss the relation of this lifting with the solutions of the original system of equations. Moreover, we prove some new results concerning normal forms of matrices over non-simple domains. Our implementation in the computer algebra system Singular:Plural follows the fraction-free strategy and shows impressive performance, compared with methods which directly use fractions. In particular, we experience a moderate swell of coefficients and obtain simple transformation matrices. Thus the method we propose is well suited for solving nontrivial practical problems.  相似文献   

7.
In this paper, we present several algorithms related with the computation of the homology of groups, from a geometric perspective (that is to say, carrying out the calculations by means of simplicial sets and using techniques of Algebraic Topology). More concretely, we have developed some algorithms which, making use of the effective homology   method, construct the homology groups of Eilenberg–MacLane spaces K(G,1)K(G,1) for different groups GG, allowing one in particular to determine the homology groups of GG.  相似文献   

8.
We investigate the group key management problem for broadcasting applications. Previous work showed that, in handling key updates, batch rekeying can be more cost effective than individual rekeying. One model for batch rekeying is to assume that every user has probability pp of being replaced by a new user during a batch period with the total number of users unchanged. Under this model, it was recently shown that an optimal key tree can be constructed in linear time when pp is a constant and in O(n4)O(n4) time when p→0p0. In this paper, we investigate more efficient algorithms for the case p→0p0, i.e., when membership changes are sparse. We design an O(n)O(n) heuristic algorithm for the sparse case and show that it produces a nearly 2-approximation to the optimal key tree. Simulation results show that its performance is even better in practice. We also design a refined heuristic algorithm and show that it achieves an approximation ratio of 1+?1+? for any fixed ?>0?>0 and nn, as p→0p0. Finally, we give another approximation algorithm for any p∈(0,0.693)p(0,0.693) which is shown to be quite good by our simulations.  相似文献   

9.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random dd-regular graphs, for any value of dd. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of dd-regular graphs. We provide bounds for 5≤d≤125d12. We also give empirical values of the size of the bisection found by the algorithm for some small values of dd and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection.  相似文献   

10.
Given a capacitated undirected graph G=(V,E)G=(V,E) with a set of terminals K⊂VKV, a mimicking network   is a smaller graph H=(VH,EH)H=(VH,EH) which contains the set of terminals K   and for every bipartition [U,K−U][U,KU] of the terminals, the cost of the minimum cut separating U   from K−UKU in G is exactly equal to the cost of the minimum cut separating U   from K−UKU in H.  相似文献   

11.
The augmented weighted Tchebycheff norm was introduced in the context of multicriteria optimization by Steuer and Choo [21] in order to avoid the generation of weakly nondominated points. It augments a weighted l-norml-norm with an l1-term, multiplied by a “small” parameter ρ>0ρ>0. However, the appropriate selection of the parameter ρρ remained an open question: A too small value of ρρ may cause numerical difficulties, while a too large value of ρρ may lead to the oversight of some nondominated points.  相似文献   

12.
This paper introduces the topological finiteness condition finite derivation type   (FDT) on the class of semigroups. This notion is naturally extended from the monoid case. With this new concept we are able to prove that if a Rees matrix semigroup M[S;I,J;P]M[S;I,J;P] has FDT then the semigroup SS also has FDT. Given a monoid SS and a finitely presented Rees matrix semigroup M[S;I,J;P]M[S;I,J;P] we prove that if the ideal of SS generated by the entries of PP has FDT, then so does M[S;I,J;P]M[S;I,J;P]. In particular, we show that, for a finitely presented completely simple semigroup MM, the Rees matrix semigroup M=M[S;I,J;P]M=M[S;I,J;P] has FDT if and only if the group SS has FDT.  相似文献   

13.
The software package Qcompiler (Chen and Wang 2013) provides a general quantum compilation framework, which maps any given unitary operation into a quantum circuit consisting of a sequential set of elementary quantum gates. In this paper, we present an extended software OptQC  , which finds permutation matrices PP and QQ for a given unitary matrix UU such that the number of gates in the quantum circuit of U=QTPTUPQU=QTPTUPQ is significantly reduced, where UU is equivalent to UU up to a permutation and the quantum circuit implementation of each matrix component is considered separately. We extend further this software package to make use of high-performance computers with a multiprocessor architecture using MPI. We demonstrate its effectiveness in reducing the total number of quantum gates required for various unitary operators.  相似文献   

14.
15.
Assume that a program pp on input aa outputs bb. We are looking for a shorter program qq having the same property (q(a)=bq(a)=b). In addition, we want qq to be simple conditional to pp (this means that the conditional Kolmogorov complexity K(q|p)K(q|p) is negligible). In the present paper, we prove that sometimes there is no such program qq, even in the case when the complexity of pp is much bigger than K(b|a)K(b|a). We give three different constructions that use the game approach, probabilistic arguments and algebraic arguments, respectively.  相似文献   

16.
This paper deals with the existence and search for properly edge-colored paths/trails between two, not necessarily distinct, vertices ss and tt in an edge-colored graph from an algorithmic perspective. First we show that several versions of the s−tst path/trail problem have polynomial solutions including the shortest path/trail case. We give polynomial algorithms for finding a longest properly edge-colored path/trail between ss and tt for a particular class of graphs and characterize edge-colored graphs without properly edge-colored closed trails. Next, we prove that deciding whether there exist kk pairwise vertex/edge disjoint properly edge-colored s−tst paths/trails in a cc-edge-colored graph GcGc is NP-complete even for k=2k=2 and c=Ω(n2)c=Ω(n2), where nn denotes the number of vertices in GcGc. Moreover, we prove that these problems remain NP-complete for cc-edge-colored graphs containing no properly edge-colored cycles and c=Ω(n)c=Ω(n). We obtain some approximation results for those maximization problems together with polynomial results for some particular classes of edge-colored graphs.  相似文献   

17.
We prove that a polynomial f∈R[x,y]fR[x,y] with tt non-zero terms, restricted to a real line y=ax+by=ax+b, either has at most 6t−46t4 zeros or vanishes over the whole line. As a consequence, we derive an alternative algorithm for deciding whether a linear polynomial y−ax−b∈K[x,y]yaxbK[x,y] divides a lacunary polynomial f∈K[x,y]fK[x,y], where KK is a real number field. The number of bit operations performed by the algorithm is polynomial in the number of non-zero terms of ff, in the logarithm of the degree of ff, in the degree of the extension K/QK/Q and in the logarithmic height of aa, bb and ff.  相似文献   

18.
19.
The claw finding problem has been studied in terms of query complexity as one of the problems closely connected to cryptography. Given two functions, ff and gg, with domain sizes NN and MM(N≤M)(NM), respectively, and the same range, the goal of the problem is to find xx and yy such that f(x)=g(y)f(x)=g(y). This problem has been considered in both quantum and classical settings in terms of query complexity. This paper describes an optimal algorithm that uses quantum walk to solve this problem. Our algorithm can be slightly modified to solve the more general problem of finding a tuple consisting of elements in the two function domains that has a prespecified property. It can also be generalized to find a claw of kk functions for any constant integer k>1k>1, where the domain sizes of the functions may be different.  相似文献   

20.
Let D=K[X]D=K[X] be a ring of Ore polynomials over a field KK and let a partition of the set of indeterminates into pp disjoint subsets be fixed. Considering DD as a filtered ring with the natural pp-dimensional filtration, we introduce a special type of reduction in a free DD-module and develop the corresponding Gröbner basis technique (in particular, we obtain a generalization of the Buchberger Algorithm). Using such a modification of the Gröbner basis method, we prove the existence of a Hilbert-type dimension polynomial in pp variables associated with a finitely generated filtered DD-module, give a method of computation and describe invariants of such a polynomial. The results obtained are applied in differential algebra where the classical theorems on differential dimension polynomials are generalized to the case of differential structures with several basic sets of derivation operators.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号