首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
C.-S.  S.  C.S.  Z.-C. 《Automatica》2006,42(12):2201-2207
In this paper we propose a semi-meshless discretization method for the approximation of viscosity solutions to a first order Hamilton–Jacobi–Bellman (HJB) equation governing a class of nonlinear optimal feedback control problems. In this method, the spatial discretization is based on a collocation scheme using the global radial basis functions (RBFs) and the time variable is discretized by a standard two-level time-stepping scheme with a splitting parameter θ. A stability analysis is performed, showing that even for the explicit scheme that θ=0, the method is stable in time. Since the time discretization is consistent, the method is also convergent in time. Numerical results, performed to verify the usefulness of the method, demonstrate that the method gives accurate approximations to both of the control and state variables.  相似文献   

2.
Valiant [L. Valiant, Completeness classes in algebra, in: Proc. 11th Annual ACM Symposium on the Theory of Computing, Atlanta, GA, 1979, pp. 249–261] proved that every polynomial of formula size e is a projection of the (e+2)×(e+2) determinant polynomial. We improve “e+2” to “e+1”, also for a definition of formula size that does not count multiplications by constants as gates. Our proof imitates the “2e+2” proof of von zur Gathen [J. von zur Gathen, Feasible arithmetic computations: Valiant's hypothesis, Journal of Symbolic Computation 4 (1987) 137–172], but uses different invariants and a tighter set of base cases.  相似文献   

3.
In this paper, we study the existence of three positive solutions for the second-order two-point boundary value problem on a measure chain,
where f:[t1,σ(t2)]×[0,R→[0,) is continuous and p:[t1,σ(t2)]→[0,) a nonnegative function that is allowed to vanish on some subintervals of [t1,σ(t2)] of the measure chain. The method involves applications of a new fixed-point theorem due to Bai and Ge [Z.B. Bai, W.G. Ge, Existence of three positive solutions for some second order boundary-value problems, Comput. Math. Appl. 48 (2004) 699–707]. The emphasis is put on the nonlinear term f involved with the first order delta derivative xΔ(t).  相似文献   

4.
We introduce a new method of solving C1 Hermite interpolation problems, which makes it possible to use a wider range of PH curves with potentially better shapes. By characterizing PH curves by roots of their hodographs in the complex representation, we introduce PH curves of type K(tc)2n+1+d. Next, we introduce a speed reparametrization. Finally, we show that, for C1 Hermite data, we can use PH curves of type K(tc)2n+1+d or strongly regular PH quintics satisfying the G1 reduction of C1 data, and use these curves to solve the original C1 Hermite interpolation problem.  相似文献   

5.
Thermodynamic properties of the mixed aqueous electrolyte systems of the lithium and cesium chlorides and sodium and cesium chlorides have been studied by the hygrometric method at 298.15 K. The water activities of these systems were measured at total molalities from 0.3 mol kg−1 to saturation for different ionic strength fractions y of CsCl for the systems CsCl–LiCl(aq) and CsCl–NaCl(aq) with y=0.33, 0.50 and 0.67. The results allow the deduction of osmotic coefficients. The experimental results are compared with calculations made using the Zdanovskii–Stokes–Robinson (ZSR), Kusik and Meissner (KM), Robinson and Stokes (RS), Lietzke and Stoughton (LSII), Reilly, Wood and Robinson (RWR) rules, and the Pitzer model. From these measurements, the Pitzer mixing ionic parameters are determined and used to obtain the solute activity coefficients of the mixture for different ionic strength fractions y.  相似文献   

6.
Xiaohai  Dominik  Bernhard   《Neurocomputing》2008,71(7-9):1248-1256
We propose a method to quantify the complexity of conditional probability measures by a Hilbert space seminorm of the logarithm of its density. The concept of reproducing kernel Hilbert spaces (RKHSs) is a flexible tool to define such a seminorm by choosing an appropriate kernel. We present several examples with artificial data sets where our kernel-based complexity measure is consistent with our intuitive understanding of complexity of densities.

The intention behind the complexity measure is to provide a new approach to inferring causal directions. The idea is that the factorization of the joint probability measure P(effect,cause) into P(effect|cause)P(cause) leads typically to “simpler” and “smoother” terms than the factorization into P(cause|effect)P(effect). Since the conventional constraint-based approach of causal discovery is not able to determine the causal direction between only two variables, our inference principle can in particular be useful when combined with other existing methods.

We provide several simple examples with real-world data where the true causal directions indeed lead to simpler (conditional) densities.  相似文献   


7.
Embedding of paths have attracted much attention in the parallel processing. Many-to-many communication is one of the most central issues in various interconnection networks. A graph G is globally two-equal-disjoint path coverable if for any two distinct pairs of vertices (u,v) and (w,x) of G, there exist two disjoint paths P and Q satisfied that (1) P (Q, respectively) joins u and v (w and x, respectively), (2) |P|=|Q|, and (3) V(PQ)=V(G). The Matching Composition Network (MCN) is a family of networks which two components are connected by a perfect matching. In this paper, we consider the globally two-equal-disjoint path cover property of MCN. Applying our result, the Crossed cube CQn, the Twisted cube TQn, and the Möbius cube MQn can all be proven to be globally two-equal-disjoint path coverable for n5.  相似文献   

8.
In this paper a general theorem on |A,δ|k-summability methods has been proved. This theorem includes, as a special case, a known result in [E. Savas, Factors for |A|k Summability of infinite series, Comput. Math. Appl. 53 (2007) 1045–1049].  相似文献   

9.
For a simple graph G, let . In this paper, we prove that if NCD(G)≥|V(G)|, then either G is Hamiltonian-connected, or G belongs to a well-characterized class of graphs. The former results by Dirac, Ore and Faudree et al. are extended.  相似文献   

10.
We show strong convergence for Mann and Ishikawa iterates of multivalued nonexpansive mapping T under some appropriate conditions, which revises a gap in Panyanak [B. Panyanak, Mann and Ishikawa iterative processes for multivalued mappings in Banach spaces, Comput. Math. Appl. 54 (2007) 872–877]. Furthermore, we also give an affirmative answer to Panyanak’s open question.  相似文献   

11.
In this paper we show that there is a mapping D:MDM on means such that if M is a Fibonacci mean so is DM, that if M is the harmonic mean, then DM is the arithmetic mean, and if M is a Fibonacci mean, then limnDnM is the golden section mean.  相似文献   

12.
Shang-Kuan  Ja-Chen   《Pattern recognition》2005,38(12):2466-2471
A fault-tolerant progressive image transmission method is proposed. The advantages include the following: (1) Unlike most progressive methods, the image is divided into n parts with equal importance to avoid worrying about which part is lost or transmitted first. (2) If the image is a secret image, then the transmission can use n distinct channels (one shared result per channel), and intercepting up to r1-1 channels by the enemy (r1rkn are all pre-set constants) will not reveal any secret. Meanwhile, the disconnection up to n-rk channels will not affect the lossless recovery of the secret image.  相似文献   

13.
We continue the work in Zhu et al. [Normal conditions for inference relations and injective models, Theoret. Comput. Sci. 309 (2003) 287–311]. A class Ω of strict partial order structures (posets, for short) is said to be axiomatizable if the class of all injective preferential models from Ω may be characterized in terms of general rules. This paper aims to obtain some characteristics of axiomatizable classes. To do this, a monadic second-order frame language is presented. The relationship between 0-axiomatizability and second-order definability is explored. Then a notion of an admissible set is introduced. Based on this notion, we show that any preferential model, which does not contain any four-node substructure, must be a reduct of some injective model. Furthermore, we furnish a necessary and sufficient condition for the axiomatizability of classes of injective preferential models using general rules. Finally, we show that, in some sense, the class of all posets without any four-node substructure is the largest among axiomatizable classes.  相似文献   

14.
Wudhichai  Sing Kiong  Peng   《Automatica》2004,40(12):2147-2152
This paper examines the problem of designing a robust H output feedback controller for a class of singularly perturbed systems described by a Takagi–Sugeno fuzzy model. Based on a linear matrix inequality (LMI) approach, LMI-based sufficient conditions for the uncertain singularly perturbed nonlinear systems to have an H performance are derived. To eliminate the ill-conditioning caused by the interaction of slow and fast dynamic modes, solutions to the problem are presented in terms of LMIs which are independent of the singular perturbation . The proposed approach does not involve the separation of states into slow and fast ones and it can be applied not only to standard, but also to nonstandard singularly perturbed nonlinear systems. A numerical example is provided to illustrate the design developed in this paper.  相似文献   

15.
Given a wireless network G=(V,E), we consider a maximum critical energy problem [J. Park, S. Sahni, Maximum lifetime broadcasting in wireless networks, IEEE Transactions on Computers 54 (9) (2005) 1081–1090] that has an objective of increasing the chances of doing a sequence of broadcasts. We present an optimal generalized solution algorithm running in improved optimal O(|V|+|E|) time, where V stands for a set of nodes and E stands for a set of links in the network. Our approach is applicable in an omnidirectional antenna model and can be used to solve the problem of multicasting traffic so as to maximize the lifetime of the network [A. Orda, B.-A. Yassour, Maximum-lifetime routing algorithms for networks with omnidirectional and directional antennas, in: Proc. ACM MOBIHOC, 2005] and a data gathering problem [K. Kalpakis, K. Dasgupta, P. Namjoshi, Maximum lifetime data gathering and aggregation in wireless sensor networks, Computer Networks 42 (2003) 697–716; Y. Xue, Y. Cui, K. Nahrstedt, Maximizing lifetime for data aggregation in wireless sensor networks, ACM Moble Networks and Applications 10 (6) (2005) 853–864] with an improved running time.  相似文献   

16.
Mario  Michele   《Automatica》2005,41(12):2019-2032
Robustness had become in past years a central issue in system and control theory, focusing the attention of researchers from the study of a single model to the investigation of a set of models, described by a set of perturbations of a “nominal” model. Such a set, often indicated as an uncertainty model set or model set for short, has to be suitably constructed to describe the inherent uncertainty about the system under consideration and to be used for analysis and design purposes. H identification methods deliver uncertainty model sets in a suitable form to be used by well-established robust design techniques, based on H or μ optimization methods. The literature on H identification is now very extensive. In this paper, some of the most relevant contributions related to assumption validation, evaluation of bounds on unmodeled dynamics, convergence analysis and optimality properties of linear, two-stage and interpolatory algorithms are surveyed from a deterministic point of view.  相似文献   

17.
Computing lower order moments is important in image processing. Suppose the input grey image with size N×N has been compressed into the block representation where the number of blocks is K, commonly K<N2 due to the compression effect. This correspondence presents an efficient algorithm for computing lower order moments on the block representation directly. Our proposed algorithm takes O(K) time which is proportional to the number of blocks. Experimental results reveal the computational advantage of our proposed algorithm. In addition, the results of this paper can be viewed as a generalization of the previous result by Spiliotis and Mertzios for computing lower order moments from the binary image domain to the grey image domain.  相似文献   

18.
This paper deals with the existence of positive solutions for the fourth-order nonlinear ordinary differential equation
subject to the boundary conditions:
where ,β,γ,δ≥0 are constants such that ρ=δ+γ+βδ>0, and . By means of a fixed-point theorem due to Krasnaselskii, some new existence results of positive solutions for the above multi-point boundary value problem are obtained, which improve the main results of Graef et al. [J.R. Graef, C. Qian, B. Yang, A three-point boundary value problem for nonlinear fourth-order differential equations, J. Math. Anal. Appl. 287 (2003) 217–233]. An example is given to demonstrate the main results of this paper.  相似文献   

19.
20.
Lizheng  Guozhao 《Computer aided design》2006,38(12):1215-1223
Given a triangular Bézier surface of degree n, the problem of multi-degree reduction by a triangular Bézier surface of degree m with boundary constraints is investigated. This paper considers the continuity of triangular Bézier surfaces at the three corners, so that the boundary curves preserve endpoints continuity of any order . The l2- and L2-norm combined with the constrained least-squares method are used to get the matrix representations for the control points of the degree reduced surfaces. Both methods can be applied to piecewise continuous triangular patches or to only a triangular patch with the combination of surface subdivision. And the resulting piecewise approximating patches are globally C0 continuous. Finally, error estimation is given and numerical examples demonstrate the effectiveness of our methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号