首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This article presents three new methods (M5, M6, M7) for the estimation of an unknown map projection and its parameters. Such an analysis is beneficial and interesting for historic, old, or current maps without information about the map projection; it could improve their georeference. The location similarity approach takes into account the residuals on the corresponding features; the minimum is found using the non-linear least squares. For the shape similarity approach, the minimized objective function ? takes into account the spatial distribution of the features, together with the shapes of the meridians, parallels and other 0D-2D elements. Due to the non-convexity and discontinuity, its global minimum is determined using the global optimization, represented by the differential evolution. The constant values of projection φ k , λ k , φ 1, λ 0, and map constants RXY, α (in relation to which the methods are invariant) are estimated. All methods are compared and the results are presented for the synthetic data as well as for 8 early maps from the Map Collection of the Charles University and the David Rumsay Map Collection. The proposed algorithms have been implemented in the new version of the detectproj software.  相似文献   

2.
J. T. Marti 《Computing》1989,42(2-3):239-243
We derive new inequalities for the eigenvaluesλ k of the Sturm-Liouville problem?u″+qu=λu, u(0)=u(π)=0 under the usual hypothesis thatq has mean value zero. The estimates give upper and lower bounds of the form |λ k ?k 2|≤p 1,m k ?m +P 2,m k 2m ,k 2≥3‖q m ,m=1, 2 where ‖q m is the norm ofq in a Sobolev spaceH m (0, π) and theP's are homogeneous polynomials of degree at most 3 in ‖q m . Such bounds are used in the analysis of the inverse Sturm-Liouville problem.  相似文献   

3.
Let λ denote any of the classical spaces ?,c,c0, and ?p of bounded, convergent, null, and absolutely p-summable sequences, respectively, and let λ(B) also be the domain of the triple band matrix B(r,s,t) in the sequence space λ, where 1<p<. The present paper is devoted to studying the sequence space λ(B). Furthermore, the β- and γ-duals of the space λ(B) are determined, the Schauder bases for the spaces c(B), c0(B), and ?p(B) are given, and some topological properties of the spaces c0(B), ?1(B), and ?p(B) are examined. Finally, the classes (λ1(B):λ2) and (λ1(B):λ2(B)) of infinite matrices are characterized, where λ1∈{?,c,c0,?p,?1} and λ2∈{?,c,c0,?1}.  相似文献   

4.
Let A be a matrix of order n × n with real spectrum λ1λ2 ≥ ⋯ ≥ λn. Let 1 ≤ kn − 2. If λn or λ1 is known, then we find an upper bound (respectively, lower bound) for the sum of the k-largest (respectively, k-smallest) remaining eigenvalues of A. Then, we obtain a majorization vector for (λ1, λ2,…, λn−1) when λn is known and a majorization vector for (λ2, λ3,…, λn) when λ1 is known. We apply these results to the eigenvalues of the Laplacian matrix of a graph and, in particular, a sufficient condition for a graph to be connected is given. Also, we derive an upper bound for the coefficient of ergodicity of a nonnegative matrix with real spectrum.  相似文献   

5.
The Ziegler–Nichols process dynamics characterization is based on the estimation of the ultimate gain ku and ultimate frequency ωu. The angle φ of the tangent to the Nyquist curve at the frequency ωu is introduced, as an additional parameter in the frequency domain. The essential dynamic characteristics of the process can be captured by using the tangent rule, proposed here as an extension of the Ziegler–Nichols approach. The validity of the tangent rule is confirmed by using the PID controller optimization on a test batch consisting of stable, integrating and unstable processes, including dead-time. Parameters ku, ωu and φ can be determined from the sustained oscillations, using the phase-locked loop identifier module.  相似文献   

6.
A relatively simple mathematical procedure for the reconstruction of the 3-dimensional (3D) image of the left ventricle (LV) of the heart is presented. The method is based on the assumption that every ray whoch emanates from the midpoint of the long axis of the 3D body crosses the surface boundary of the ventricle at one and only one point. The coordinates ri, φi, θi of the data points on, say, the outer boundary, (i.e., the epicardium) are calculated in a spherical coordinate system having its origin in the midpoint of the long axis. The problem of defining the coordinates of a prescribed grid point on the boundary is treated as an interpolation problem for the function r = r(φ, θ), defined in the rectangle 0 ≤ φ ≤ 2π; 0 ≤ θπ with ri given in the points (φi, θi).  相似文献   

7.
In this paper, we investigate an inexact hybrid projection-proximal method for solving a class of generalized mixed variational inequalities in Hilbert spaces. We construct a general inexact hybrid projection-proximal point algorithm, in which an inexact relaxed proximal point step is followed by a suitable orthogonal projection onto a hyperplane. Under some suitable conditions concerned with the pseudomonotone set-valued mapping T, the nonsmooth convex function f and the step size λk, we prove the convergence of the inexact hybrid projection-proximal point algorithm for solving generalized mixed variational inequalities in Hilbert spaces.  相似文献   

8.
We prove tight upper and lower bounds on the area of semelective, when-oblivious VLSI circuits for the problem ofl-selection. The area required to select thelth smallest ofn k-bit integers is found to be heavily dependent on the relative sizes ofl,k, andn. Whenl<2 k , the minimal area isA = Θ(minn,l(k-logl)). Whenl≥2 k ,A = Θ(2 k (logl-k + 1)).  相似文献   

9.
This work describes a novel routing algorithm for constructing a container of width n − 1 between a pair of vertices in an (n, k)-star graph with connectivity n − 1. Since Lin et al. [T.C. Lin, D.R. Duh, H.C. Cheng, Wide diameter of (n, k)-star networks, in: Proceedings of the International Conference on Computing, Communications and Control Technologies, vol. 5, 2004, pp. 160-165] already calculated the wide diameters in (n, n − 1)-star and (n, 1)-star graphs, this study only considers an (n, k)-star with 2 ? k ? n − 2. The length of the longest container among all constructed containers serves as the upper bound of the wide diameter of an (n, k)-star graph. The lower bound of the wide diameter of an (n, k)-star graph with 2 ? k ? ⌊n/2⌋ and the lower bound of the wide diameter of a regular graph with a connectivity of 2 or above are also computed. Measurement results indicate that the wide diameter of an (n, k)-star graph is its diameter plus 2 for 2 ? k ? ⌊n/2⌋, or its diameter plus a value between 1 and 2 for ⌊n/2⌋ + 1 ? k ? n − 2.  相似文献   

10.
11.
We say a propositional formula F in conjunctive normal form is represented by a formula H and a homomorphism φ, if φ(H)=F. A homomorphism is a mapping consisting of a renaming and an identification of literals. The deficiency of a formula is the difference between the number of clauses and the number of variables. We show that for fixed k?1 and t?1 each minimal unsatisfiable formula with deficiency k can be represented by a formula H with deficiency t and a homomorphism and such a representation can be computed in polynomial time.  相似文献   

12.
Dr. P. Pottinger 《Computing》1976,17(2):163-167
Some estimations for the relative projection constantP( n+k k ,Csik[a,b]) are given. By constructing an associated polynomial operatorL n :C 0[a,b]→ n 0 to a given polynomial operatorH n+k :C k [a,b]→ n+k k we get a lower bound for the projection constant. An upper bound forP( n+k k ,C k [a,b]) is obtained by the determination of the norms of appropriate polynomial operatorsP n+k :C k [a,b]→ n+k k . Further we give a convergence property for the sequence (P n+k ) n∈?.  相似文献   

13.
In this paper, dilated embedding and precise embedding of K-ary complete trees into hypercubes are studied. For dilated embedding, a nearly optimal algorithm is proposed which embeds a K-ary complete tree of height h, TK(h), into an (h − 1)[log K] + [log (K + 2)]-dimensional hypercube with dilation Max{2, φ(K), φ(K + 2)}. φ(x) = min{λ: Σλi=0Cidx and d = [log x]}. It is clear that [([log x] + 1)/2] ≤ φ(x) ≤ [log x], for x ≥ 3.) For precise embedding, we show a (K − 1)h + 1-dimensional hypercube is large enough to contain TK(h) as its subgraph, K ≥ 3.  相似文献   

14.
For solving the nonlinear systemF(x)=0 by using a continuation method a functionz implicitly defined byH(z, t)=0 has to be determined. In order to obtain approximationsz k toz(t k ) the algorithmz k+1:=z k k p(z k ,t k , τ k ),t k+1:=t k k , is used. The order of such a functionp is defined in this paper, and for certain classes of algorithms the corresponding orders are determined.  相似文献   

15.
The aim of this paper is to generalize a result given by Curry and Feys, who have shown that the only regular combinators possessing inverse in the λ-β-η-calculus are the permutators, whose definition is p=λzλx1λxn(zxi1xin) for n?0 where i1,…, ir is a permutation of 1,…, n. Here we extend this characterization to the set of normal forms, showing that the only normal forms possessing inverse in the λ-βη-calculus are the “hereditarily finite permutators” (h.f.p.), whose recursive definition is: if n?0, Pj (1?j?n) are h.f.p. and i1,…,in is a permutation of 1,…, n, then the normal form of P = λzλx1λxn(z(P1xi1))… (Pnin) is an h.f.p.  相似文献   

16.
For compact Euclidean bodiesP, Q, we define λ(P, Q) to be the smallest ratior/s wherer > 0,s > 0 satisfy \(sQ' \subseteq P \subseteq rQ''\) . HeresQ denotes a scaling ofQ by the factors, andQ′,Q″ are some translates ofQ. This function λ gives us a new distance function between bodies which, unlike previously studied measures, is invariant under affine transformations. If homothetic bodies are identified, the logarithm of this function is a metric. (Two bodies arehomothetic if one can be obtained from the other by scaling and translation.) For integerk ≥ 3, define λ(k) to be the minimum value such that for each convex polygonP there exists a convexk-gonQ with λ(P, Q) ≤ λ(k). Among other results, we prove that 2.118 ... <-λ(3) ≤ 2.25 and λ(k) = 1 + Θ(k ?2). We give anO(n 2 log2 n)-time algorithm which, for any input convexn-gonP, finds a triangleT that minimizes λ(T, P) among triangles. However, in linear time we can find a trianglet with λ(t, P)<-2.25. Our study is motivated by the attempt to reduce the complexity of the polygon containment problem, and also the motion-planning problem. In each case we describe algorithms which run faster when certain implicitslackness parameters of the input are bounded away from 1. These algorithms illustrate a new algorithmic paradigm in computational geometry for coping with complexity.  相似文献   

17.
Peled and Wilke proved that every stutter-invariant propositional linear temporal property is expressible in Propositional Linear Temporal Logic (PLTL) without  ?  (next) operators. To eliminate next operators, a translation τ which converts a stutter-invariant PLTL formula ? to an equivalent formula τ(?) not containing  ?  operators has been given. By τ, for any formula , where φ contains no  ?  operators, a formula with the length of O(n4|φ|) is always produced, where n is the number of distinct propositions in ?, and |φ| is the number of symbols appearing in φ. Etessami presented an improved translation τ. By τ, for , a formula with the length of O(n×n2|φ|) is always produced. We further improve Etessami's result in the worst case to O(n×n2|φ|) by providing a new translation τ, and we show that the worst case will never occur.  相似文献   

18.
《Computers & chemistry》1996,20(1):41-48
Simple Sequence Repeats (SSRs) are common and frequently polymorphic in eukaryote DNA. Many are subject to high rates of length mutation in which a gain or loss of one repeat unit is most often observed. Can the observed abundances and their length distributions be explained as the result of an unbiased random walk, starting from some initial repeat length? In order to address this question, we have considered two models for an unbiased random walk on the integers, n (n0n). The first is a continuous time process (Birth and Death Model or BDM) in which the probability of a transition to n + 1 or n − 1 is λk, with k = nn0 + 1 per unit time. The second is a discrete time model (Random Walk Model or RWM), in which a transition is made at each time step, either to n − 1 or to n + 1. In each case the walks start at length n0, with new walks being generated at a steady rate, S, the source rate, determined by a base substitution rate of mutation from neighboring sequences. Each walk terminates whenever n reaches n0 − 1 or at some time, T, which reflects the contamination of pure repeat sequences by other mutations that remove them from consideration, either because they fail to satisfy the criteria for repeat selection from some database or because they can no longer undergo efficient length mutations. For infinite T, the results are particularly simple for N(k), the expected number of repeats of length n = k + n0 − 1, being, for BDM, N(k) = S/, and for RWM, N(k) = 2S. In each case, there is a cut-off value of k for finite T, namely k = ln2 for BDM and k = 0.57√T for RWM; for larger values of k, N(k) becomes rapidly smaller than the infinite time limit. We argue that these results may be compared with SSR length distributions averaged over many loci, but not for a particular locus, for which founder effects are important. For the data of Beckmann & Weber [(1992), Genomics 12, 627] on GT·AC repeats in the human, each model gives a reasonable fit to the data, with the source at two repeat units (n0 = 2). Both the absolute number of loci and their length distribution are well represented.  相似文献   

19.
The frequency moments of a sequence containingmielements of typei, 1⩽in, are the numbersFk=∑ni=1 mki. We consider the space complexity of randomized algorithms that approximate the numbersFk, when the elements of the sequence are given one by one and cannot be stored. Surprisingly, it turns out that the numbersF0,F1, andF2can be approximated in logarithmic space, whereas the approximation ofFkfork⩾6 requiresnΩ(1)space. Applications to data bases are mentioned as well.  相似文献   

20.
Double-loop [J. Bermond, F. Comellas, D. Hsu, Distributed Loop Computer Networks: A Survey, J. Parallel and Distributed Computing, Academic Press, 24 (1995) 2-10] and 2-circulant networks (2-CN) [J. Park, Cycle Embedding of Faulty Recursive Circulants, J. of Korea Info. Sci. Soc. 31 (2) (2004) 86-94] are widely used in the design and implementation of local area networks and parallel processing architectures. In this paper, we investigate the routing of a message on circulant networks, that is a key to the performance of this network. We would like to transmit 2k packets from a source node to a destination node simultaneously along paths on G(n; ±s1, ±s2, … , ±sk), where the ith packet traverses along the ith path (1 ? i ? 2k). In order for all packets to arrive at the destination node quickly and securely, the ith path must be node-disjoint from all other paths. For construction of these paths, employing the Hamiltonian circuit latin square (HCLS), a special class of (n × n) matrices, we present O(n2) parallel routing algorithm on circulant networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号