首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Given a real valued function f(X,Y), a box region B0R2 and ε>0, we want to compute an ε-isotopic polygonal approximation to the restriction of the curve S=f−1(0)={pR2:f(p)=0} to B0. We focus on subdivision algorithms because of their adaptive complexity and ease of implementation. Plantinga & Vegter gave a numerical subdivision algorithm that is exact when the curve S is bounded and non-singular. They used a computational model that relied only on function evaluation and interval arithmetic. We generalize their algorithm to any bounded (but possibly non-simply connected) region that does not contain singularities of S. With this generalization as a subroutine, we provide a method to detect isolated algebraic singularities and their branching degree. This appears to be the first complete purely numerical method to compute isotopic approximations of algebraic curves with isolated singularities.  相似文献   

2.
A semi-copula S:[0,1]2→[0,1] is called supermigrative if it is commutative and satisfies S(αx,y)?S(x,αy) for all α∈[0,1] and for all x,y∈[0,1] such that y?x. In this paper, the class of supermigrative semi-copulas is investigated, by focusing, in particular, on the subclass of continuous triangular norms. Some interesting connections with the theory of copulas are also underlined.  相似文献   

3.
Yan Yang 《Information Sciences》2007,177(22):4922-4933
This paper deals with a general α-decomposition problem of fuzzy relations, which can be stated as follows: given a fuzzy relation RF(X×Y), determine two fuzzy relations QF(X×Z) and TF(Z×Y) such that , where X (resp. Y) is a finite set. Firstly we point out that every fuzzy relation R is always generally α-decomposable, and give an algorithm to construct Q and T with for a given R. Secondly, we show that the general content ρ(R) with is equal to the chromatic number of the simple graph FR generated by R. Therefore, finding an exact algorithm for calculating ρ(R) is an NP-complete problem.  相似文献   

4.
In this paper, we study the expressive power of the extension of first-order logic by the unary second-order majority quantifier Most1. In 1 it was shown that the extension of FO by second-order majority quantifiers of all arities describes exactly the problems in the counting hierarchy. We consider first certain sublogics of FO(Most1) over unary vocabularies. We show that over unary vocabularies the logic MSO(R), where MSO is monadic second-order logic and R is the first-order Rescher quantifier, can be characterized by Presburger arithmetic, whereas the logic MSO(Rn)nZ+, where Rn is the nth vectorization of R, corresponds to the Δ0-fragment of arithmetic. Then we show that FO(Most1)?MSO(Rn)nZ+ and that, on unary vocabularies, FO(Most1) collapses to uniform-TC0. Using this collapse, we show that first-order logic with the binary second-order majority quantifier is strictly more expressive than FO(Most1) over the empty vocabulary. On the other hand, over strings, FO(Most1) is shown to capture the linear fragment of the counting hierarchy. Finally we show that, over non-unary vocabularies, FO(Most1) can express problems complete via first-order reductions for each level of the counting hierarchy.  相似文献   

5.
Let S be a set of elements. We say that a collection C of subsets of S has the consecutive ones property if there exist a linear order on S and a 0-1 matrix M, where Mij=1 if and only if the jth element is in the ith set in C, such that all 1's appear consecutively in each row of M. A set XC is hit by a subset SS if XS≠∅. Let Cr (red collection) and Cb (blue collection) be two collections of subsets of S respectively. The red-blue hitting set problem asks for a subset SS such that all sets in the blue collection are hit by S, while the number of sets in the red collection hit by S has to be minimum. We present a shortest-path based algorithm with time complexity O(|Cb||S|+|Cr||S|+2|S|) for this problem with CrCb having the consecutive ones property, which improves the previous time bound O(|Cr||Cb|2|S|) by Dom et al. (2008) [8].  相似文献   

6.
A binary image I is Ba, Wb-connected, where ab ∈ {4, 8}, if its foreground is a-connected and its background is b-connected. We consider a local modification of a Ba, wb-connected image I in which a black pixel can be interchanged with an adjacent white pixel provided that this preserves the connectivity of both the foreground and the background of I. We have shown that for any (ab) ∈ {(4, 8), (8, 4), (8, 8)}, any two Ba, wb-connected images I and J each with n black pixels differ by a sequence of Θ(n2) interchanges. We have also shown that any two B4, W4-connected images I and J each with n black pixels differ by a sequence of O(n4) interchanges.  相似文献   

7.
In this paper, we consider the robust Hurwitz stability analysis problems of a single parameter-dependent matrix A(θ)?A0+θA1 over θ∈[-1,1], where A0,A1Rn×n with A0 being Hurwitz stable. In particular, we are interested in the degree N of the polynomial parameter-dependent Lyapunov matrix (PPDLM) of the form that ensures the robust Hurwitz stability of A(θ) via . On the degree of PPDLMs, Barmish conjectured in early 90s that if there exists such P(θ), then there always exists a first-degree PPDLM P(θ)=P0+θP1 that meets the desired conditions, regardless of the size or rank of A0 and A1. The goal of this paper is to falsify this conjecture. More precisely, we will show a pair of the matrices A0,A1R3×3 with A0+θA1 being Hurwitz stable for all θ∈[-1,1] and prove rigorously that the desired first-degree PPDLM does not exist for this particular pair. The proof is based on the recently developed techniques to deal with parametrized LMIs in an exact fashion and related duality arguments. From this counter-example, we can conclude that the conjecture posed by Barmish is not valid when n?3 in general.  相似文献   

8.
This paper presents level forms of the triangle inequalities in fuzzy metric spaces (XdLR). To aid discussion, a fuzzy pre-metric condition is introduced. It is first pointed out that under the fuzzy pre-metric condition the first triangle inequality is always equivalent to its level form. The second triangle inequality is equivalent to one level form when R is right continuous, and to another level form also when further conditions are imposed on R. In a fuzzy metric space, the level form of the first triangle inequality and one of the level forms of the second triangle inequality are always valid. The other level form of the second triangle inequality holds for all but at most countable α ∈ [0, 1). Finally, a fixed point theorem for fuzzy metric spaces is derived as an application of the preceding results.  相似文献   

9.
Let J be a strongly stable monomial ideal in S=K[x0,…,xn] and let Mf(J) be the family of all homogeneous ideals I in S such that the set of all terms outside J is a K-vector basis of the quotient S/I. We show that an ideal I belongs to Mf(J) if and only if it is generated by a special set of polynomials, the J-marked basis of I, that in some sense generalizes the notion of reduced Gröbner basis and its constructive capabilities. Indeed, although not every J-marked basis is a Gröbner basis with respect to some term order, a sort of reduced form modulo IMf(J) can be computed for every homogeneous polynomial, so that a J-marked basis can be characterized by a Buchberger-like criterion. Using J-marked bases, we prove that the family Mf(J) can be endowed, in a very natural way, with a structure of an affine scheme that turns out to be homogeneous with respect to a non-standard grading and flat in the origin (the point corresponding to J), thanks to properties ofJ-marked bases analogous to those of Gröbner bases about syzygies.  相似文献   

10.
According to a certain misconception sometimes met in the literature: for the nearest-neighbors algorithms there is no fixed hypothesis class of limited Vapnik-Chervonenkis dimension.In the paper a simple reformulation (not a modification) of the nearest-neighbors algorithm is shown where instead of a natural number k, a percentage α ∈ (0, 1) of nearest neighbors is used. Owing to this reformulation one can construct sets of approximating functions, which we prove to have finite VC dimension. In a special (but practical) case this dimension is equal to ⌊2/α⌋. It is also then possible to form a sequence of sets of functions with increasing VC dimension, and to perform complexity selection via cross-validation or similarly to the structural risk minimization framework. Results of such experiments are also presented.  相似文献   

11.
In the paper we study new approaches to the problem of list coloring of graphs. In the problem we are given a simple graph G=(V,E) and, for every vV, a nonempty set of integers S(v); we ask if there is a coloring c of G such that c(v)∈S(v) for every vV. Modern approaches, connected with applications, change the question—we now ask if S can be changed, using only some elementary transformations, to ensure that there is such a coloring and, if the answer is yes, what is the minimal number of changes. In the paper for studying the adding, the trading and the exchange models of list coloring, we use the following transformations:
adding of colors (the adding model): select two vertices u, v and a color cS(u); add c to S(v), i.e. set S(v):=S(v)∪{c};
trading of colors (the trading model): select two vertices u, v and a color cS(u); move c from S(u) to S(v), i.e. set S(u):=S(u)?{c} and S(v):=S(v)∪{c};
exchange of colors (the exchange model): select two vertices u, v and two colors cS(u), dS(v); exchange c with d, i.e. set S(u):=(S(u)?{c})∪{d} and S(v):=(S(v)?{d})∪{c}.
Our study focuses on computational complexity of the above models and their edge versions. We consider these problems on complete graphs, graphs with bounded cyclicity and partial k-trees, receiving in all cases polynomial algorithms or proofs of NP-hardness.  相似文献   

12.
In this paper we study relations which are congruences with respect to ∧ and ?p, where ?p is the p-cut of the L-fuzzy hyperoperation ?. The main idea is to start from an equivalence relation R1 which is a congruence with respect to ∧ and ?1 and, for each p ∈ X, construct an equivalence relation Rp which is a congruence with respect to ∧ and ?p. Furthermore, for each x ∈ Rp we construct a quotient hyperoperation ?p and we show that the hyperalgebra (X/Rp, ?p) is a join space and the hyperalgebra (X/Rp, ?p, ∧p) is a hyperlattice.  相似文献   

13.
In computer aided verification, the reachability problem is particularly relevant for safety analyses. Given a regular tree language L, a term t and a relation R, the reachability problem consists in deciding whether there exist a positive integer n and terms t0,t1,…,tn such that t0L, tn=t and for every 0?i<n, (ti,ti+1)∈R. In this case, the term t is said to be reachable, otherwise it is said unreachable. This problem is decidable for particular kinds of relations, but it is known to be undecidable in general, even if L is finite. Several approaches to tackle the unreachability problem are based on the computation of an R-closed regular language containing L. In this paper we show a theoretical limit to this kind of approaches for this problem.  相似文献   

14.
15.
We study the following combinatorial property of point sets in the plane: For a set S of n points in general position and a point pS consider the points of Sp in their angular order around p. This gives a star-shaped polygon (or a polygonal path) with p in its kernel. Define c(p) as the number of convex angles in this star-shaped polygon around p, and c(S) as the sum of all c(p), for pS. We show that for every point set S, c(S) is always at least . This bound is shown to be almost tight. Consequently, every set of n points admits a star-shaped polygonization with at least convex angles.  相似文献   

16.
On the structure of generalized rough sets   总被引:3,自引:0,他引:3  
In this paper we consider some fundamental properties of generalized rough sets induced by binary relations on algebras and show that
1.
Any reflexive binary relation determines a topology.
2.
If θ is a reflexive and symmetric relation on a set X, then O={AX|θ-(A)=A} is a topology such that A is open if and only if it is closed.
3.
Conversely, for every topological space (X,O) satisfying the condition that A is open if and only if it is closed, there exists a reflexive and symmetric relation R such that O={AX|R-(A)=A}.
4.
Let θ be an equivalence relation on X. For any pseudo ω-closed subset A of Xθ(A) is an ω-closed set if and only if ω(xx, … , x) ∈ θ(A) for any x ∈ X.
Moreover we consider properties of generalized rough sets.  相似文献   

17.
In this paper we present the sequence of linear Bernstein-type operators defined for fC[0,1] by Bn(f°τ−1τ, Bn being the classical Bernstein operators and τ being any function that is continuously differentiable times on [0,1], such that τ(0)=0, τ(1)=1 and τ(x)>0 for x∈[0,1]. We investigate its shape preserving and convergence properties, as well as its asymptotic behavior and saturation. Moreover, these operators and others of King type are compared with each other and with Bn. We present as an interesting byproduct sequences of positive linear operators of polynomial type with nice geometric shape preserving properties, which converge to the identity, which in a certain sense improve Bn in approximating a number of increasing functions, and which, apart from the constant functions, fix suitable polynomials of a prescribed degree. The notion of convexity with respect to τ plays an important role.  相似文献   

18.
In this paper we consider the following problem. Given (r 1,r 2, ...,r n) R n, for anyI= (I 1,I 2,...,I n) Z n, letE 1=(e ij), wheree ij=(r i–rj)–(I i–Ij), findI Z n such that |E I| is minimized, where |·| is a matrix norm. This problem arises from optimal curve rasterization in computer graphics, where minimum distortion of curve dynamic context is sought. Until now, there has been no polynomial-time solution to this computer graphics problem. We present a very simpleO(n lgn)-time algorithm to solve this problem under various matrix norms.This research was supported by the Natural Sciences and Engineering Research Council of Canada under Grant OGP0046373.  相似文献   

19.
In this paper, we present an efficient and general algorithm for decomposing multivariate polynomials of the same arbitrary degree. This problem, also known as the Functional Decomposition Problem (FDP), is classical in computer algebra. It is the first general method addressing the decomposition of multivariate polynomials (any degree, any number of polynomials). As a byproduct, our approach can be also used to recover an ideal I from its kth power Ik. The complexity of the algorithm depends on the ratio between the number of variables (n) and the number of polynomials (u). For example, polynomials of degree four can be decomposed in , when this ratio is smaller than . This work was initially motivated by a cryptographic application, namely the cryptanalysis of 2R schemes. From a cryptographic point of view, the new algorithm is so efficient that the principle of two-round schemes, including 2R schemes, becomes useless. Besides, we believe that our algorithm is of independent interest.  相似文献   

20.
How many questions are necessary and sufficient to guess an unknown number x in the set S={1,2,…,n}, by using only comparison questions, that is questions of the type “Is x?a?”, aS, when answers to questions are received with a delay of d time units and up to c of the answers can be lost, i.e., can not be received at all? We exactly solve this problem for all integers d?0 and c=1.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号