首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 620 毫秒
1.
Cycles embedding in exchanged hypercubes   总被引:2,自引:0,他引:2  
The exchanged hypercube EH(s,t), proposed by Loh et al., is obtained by systematically removing links from a binary hypercube. This paper investigates important properties related to embedding cycles into the exchanged hypercube EH(s,t). The authors show that EH(1,t) and EH(2,2) are not bipancyclic, but EH(s,t) (2?s?t) except EH(2,2) is bipancyclic and EH(s,t) (3?s?t) is vertex-bipancyclic. Moreover, every edge of EH(s,t) (2?s?t) lies on an even l-cycle where 8?l?2s+t+1.  相似文献   

2.
A graph G(VE) (|V|⩾2k) satisfies property Ak if, given k pairs of distinct nodes (s1t1), …, (sktk) of V(G), there are k mutually node-disjoint paths, one connecting si and ti for each i, 1⩽ik. A necessary condition for any graph to satisfy Ak is that it is (2k−1)-connected. Hypercubes are important interconnection topologies for parallel computation and communication networks. It has been known that hypercubes of dimension n (which are n-connected) satisfy An/2⌉. In this paper we give an algorithm which, given k=⌈n/2⌉ pairs of distinct nodes (s1t1), …, (sktk) in the n-dimensional hypercube, finds the k disjoint paths of length at most n+⌈log n⌉+1 in O(n2 log* n) time.  相似文献   

3.
Let A be the generator of a strongly continuous semigroup T on the Hilbert space X, and let C be a linear operator from D(A) to another Hilbert space Y (possibly unbounded with respect to X, not necessarily admissible). We consider the problem of estimating the initial state z0D(A) (with respect to the norm of X) from the output function y(t)=CTtz0, given for all t in a bounded interval [0,τ]. We introduce the concepts of estimatability and backward estimatability for (A,C) (in a more general way than currently available in the literature), we introduce forward and backward observers, and we provide an iterative algorithm for estimating z0 from y. This algorithm generalizes various algorithms proposed recently for specific classes of systems and it is an attractive alternative to methods based on inverting the Gramian. Our results lead also to a very general formulation of Russell’s principle, i.e., estimatability and backward estimatability imply exact observability. This general formulation of the principle does not require T to be invertible. We illustrate our estimation algorithms on systems described by wave and Schrödinger equations, and we provide results from numerical simulations.  相似文献   

4.
By applying the canonical correlation decomposition of matrix pairs, the general fixed rank least square solutions of matrix equation Xβ=Y are derived. As statistical applications, an algorithm for computing the least square estimator of the multivariate reduced rank regression model Y=Xβ+?, r(β)=t is given.  相似文献   

5.
In this paper, an iterative algorithm is presented to solve the Sylvester and Lyapunov matrix equations. By this iterative algorithm, for any initial matrix X1, a solution X* can be obtained within finite iteration steps in the absence of roundoff errors. Some examples illustrate that this algorithm is very efficient and better than that of [ 1 ] and [2].  相似文献   

6.
Nonnegative solutions are established for singular integral equations of the form y(t) = h(t) + ∫T0 k(t, s)f(s, y(s)) ds for t ∈ [0, T]. Here f may be singular at y = 0.  相似文献   

7.
Any stationary time-series can be decomposed by means of an optimization operator, called the ζ-optimator, into several components (the time-series){Y t i}, i =1,2,…, p, such that the first component {V t i} t = 1,2,…,v is a smooth process having a larger autocorrelation in comparison with the original process {Y t}, i.e. ρvi > ρy. Usually only a few such components are sufficient for approximating the time-series with good accuracy. The ζ-optimator involves a shape parameter a, so the decomposition is unique provided that a. is fixed. Since the component {V t 1} involves much of the useful information it can be used for computing predictors for control purposes. Thus, given the observations Yv, Yv-1, Yv-2,…, a predictor of Yv+1 is ρvi V v 1 (q) where, Vv 1(q) = qYv + q(1-q)2 Yv-2, …, the weights q(1-q)r, r=0,1,2,…, decreasing rapidly as q = q(α) ε (0,1) Further, one may choose q rather than choosing α, since q(α) is a one-one mapping. Once q is fixed, the predictor ρv1 V v 1(q) is obtained in a straightforward way by using the formula above. It is shown that ρv1 V v 1(q) converges to the best predictor as α → 0. Some examples are worked out, illustrating both the decomposition and the forecasting procedures.  相似文献   

8.
特殊权限下权重不同参与者的广义门限方案   总被引:1,自引:0,他引:1       下载免费PDF全文
在秘密共享案中,一般集中于(n,t)门限秘密共享方案的研究。文中给出的是具有特殊权限的参与者权重不同的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案,它们是(m+n,t+1)门限秘密共享方案的推广形式。基于中国剩余定理分别给出具有特殊权限的且参与者具有不同权重的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案。  相似文献   

9.
Lempel, Even and Cederbaum proved the following result: Given any edge {st} in a biconnected graph G with n vertices, the vertices of G can be numbered from 1 to n so that vertex s receives number 1, vertex t receives number n, and any vertex except s and t is adjacent both to a lower-numbered and to a higher-numbered vertex (we call such a numbering an st-numbering for G). They used this result in an efficient algorithm for planarity-testing. Here we provide a linear-time algorithm for computing an st-numbering for any biconnected graph. This algorithm can be combined with some new results by Booth and Lueker to provide a linear-time implementation of the Lempel-Even-Cederbaum planarity-testing algorithm.  相似文献   

10.
Let X and Y be two strings of lengths n and m, respectively, and k and l, respectively, be the numbers of runs in their corresponding run-length encoded forms. We propose a simple algorithm for computing the longest common subsequence of two given strings X and Y in O(kl+min{p1,p2}) time, where p1 and p2 denote the numbers of elements in the bottom and right boundaries of the matched blocks, respectively. It improves the previously known time bound O(min{nl,km}) and outperforms the time bounds O(kllogkl) or O((k+l+q)log(k+l+q)) for some cases, where q denotes the number of matched blocks.  相似文献   

11.
The paper considers fault diagnosis in a large system comprising a collection of small subsystems or units which can test one another for the existence of a faulty condition. If subsystem α is not faulty and tests subsystem β, a correct indication of the status of β is obtained; if α is faulty, the test outcome contains meaningless information. A particular form of interconnection is examined. For a system with n units uo,u1,…,un ? 1, for each i unit ui tests ui + 1,ui + 2,…,ui + A (modulo n arithmetic being understood), where A is a preselected integer. If t is the maximum number of faulty units, we show that when t ? A, all faults are immediately diagnosable if n ? 2t + 1; we also show that when t ? A, at least A faults can be diagnosed if and only if n ? s(t ? As) + t + A + 1, where s is the integer which maximizes the quadratic function f(x) = x(t ? Ax) of the integer variable x.  相似文献   

12.
A matrix is said to be a symmetric orthogonal matrix if . A matrix is said to be generalized centro-symmetric (generalized central anti-symmetric) with respect to P, if A=PAP (A=−PAP). The generalized centro-symmetric matrices have wide applications in information theory, linear estimate theory and numerical analysis. In this paper, we propose a new iterative algorithm to compute a generalized centro-symmetric solution of the linear matrix equations . We show, when the matrix equations are consistent over generalized centro-symmetric matrix Y, for any initial generalized centro-symmetric matrix Y1, the sequence {Yk} generated by the introduced algorithm converges to a generalized centro-symmetric solution of matrix equations . The least Frobenius norm generalized centro-symmetric solution can be derived when a special initial generalized centro-symmetric matrix is chosen. Furthermore, the optimal approximation generalized centro-symmetric solution to a given generalized centro-symmetric matrix can be derived. Several numerical examples are given to show the efficiency of the presented method.  相似文献   

13.
Detection of two of the most dominant errors in an inertial navigation system, the schulering and the earth-rate error components, are studied using the Kalman filtering technique. Dynamics of the inertial system are modelled by a combination of two coupled oscillators subjected to additive noise, by using the state variables method, contrary to the technique used in the literature using equations of classical mechanics.

In this paper the utilization of the method of incremental coefficients (MIC) algorithm is presented. The variance equation (appearing in the filter) is given by the differential equation in P 12(t, t 0). (The matrices P ij (t, t 0) belong to the MIC algorithm) ; and it was solved by the semi-group property of this algorithm.

Both schemes, non-adaptive and adaptive, from an accuracy standpoint are simulated. It is shown that using an adaptive filter approach, the Kalman filter is able to filter out the schulering and the earth-rate oscillations to an acceptable level.

The controllability matrix in the linear regulator problem (or the observability matrix in the filter problem) is given by P 21(t 0, t) matrix, and also P 11(t, t 0) gives the impulse response of the optimal filter. The duality of the MIC algorithm has been stated.  相似文献   

14.
15.
Given two linearly independent matrices in so(3), Z1 and Z2, every rotation matrix, XfSO(3), can be written as the product of alternate elements from the one-dimensional subgroups corresponding to Z1 and Z2, namely Xf=eZ1t1eZ2t2eZ1t3?eZ1ts. The parameters ti, i=1,…,s are called Generalized Euler Angles. In this paper, the minimum number of factors required for the factorization of XfSO(3), as a function of Xf, is evaluated. An algorithm is given to determine the generalized Euler angles, in the optimal factorization. The results can be applied to the bang-bang control, with minimum number of switches, of some classical and quantum systems.  相似文献   

16.
This paper deals with scheduling on single and parallel machines where the service rate of a machine remains constant while a job is being processed and is changed upon its completion. Associated with machine Ml there is a vector of service factors αl = (α1l, α2l,…,); it is described as cyclic of order k iff α1(k) = (α1l,…, αkl, α1l,…,). Processing job Ji in the jth position on Ml consumes αjlti time units. We present an 0(n log n) algorithm for l/vsr/Cmax and an 0(nm log n) algorithm for Pm/vsr/∑ Ci, m ⩾ 1. It is proved that l/vsr/Lmax is NP-hard even for a monotone non-decreasing or a cyclic series of service factors, thus l/vsr/δ, δϵ {∑ Ui, ∑ Ti} are NP-hard as well. Finally, efficiently solvable special cases of l/vsr/δ, δϵ{Lmax, ∑ Ui, ∑ Ti} are studied.  相似文献   

17.
This paper presents a new feature extraction method for classifying a texture image into one of the l possible classes Ci, i=1,…,l. It is assumed that the given M × M image characterized by a set of intensity levels, {y(s1,S2), 0≤ss,s2M?1}, is a realization of an underlying random field model, known as the Simultaneous Autoregressive Model (SAR). This model is characterized by a set of parameters φ whose probability density function pi(φ), depends on the class to which the image belongs. First it is shown that the maximum likelihood estimate (M.L.E.) φ1, of φ is an appropriate feature vector for classification purposes. The optimum Bayes classifier which minimizes the average probability of classification error, is then designed using φ1. Finally the efficiency of the feature vector is demonstrated through experimental results obtained with some natural texture data and a simpler quadratic mean classifier.  相似文献   

18.
This paper deals with the problem of estimating a transmitted string Xs from the corresponding received string Y, which is a noisy version of Xs. We assume that Y contains any number of substitution, insertion, and deletion errors, and that no two consecutive symbols of Xs were deleted in transmission. We have shown that for channels which cause independent errors, and whose error probabilities exceed those of noisy strings studied in the literature [12], at least 99.5% of the erroneous strings will not contain two consecutive deletion errors. The best estimate X+ of Xs is defined as that element of H which minimizes the generalized Levenshtein distance D(XY) between X and Y. Using dynamic programming principles, an algorithm is presented which yields X+ without computing individually the distances between every word of H and Y. Though this algorithm requires more memory, it can be shown that it is, in general, computationally less complex than all other existing algorithms which perform the same task.  相似文献   

19.
On the structure of binary feedforward inverses with delay 2   总被引:3,自引:2,他引:1       下载免费PDF全文
Let M‘=S(Mα,f)be a semi-input-memory finite automaton with input alphabet Y and output alphabet X.If X=Y={0,1},then M‘ is a feedforware inverse with delay 2 if and only if there exists a cycle c of state diagram of Mαsuch that f(y0,…,yc,λα(t)0 can be expressed in the form of f ^(1)(y0,…,yc-1,λα(t)) yc for any state t in C and y0,y1,…,yc in Y;or of f^(2)(y0,…,yc-2,λα(t)) yc-c for any state t in Cand y0,y1,…,yc in Y;or for any state t in Cand y0,y1,…yc,in Y,y0,y1…yc satisfies the D[t] condition.The socalled y0,y1…yc satisfying the D[t] condition is that:for some i,j,(i,j)∈{(1,2),(1,3),(2,1),(2,2),(3,1),(3,2)},there exists a (c 2-k)-ary function f^(k),k=1,2,3,such that the Equation(1)and Equation (2)hokl simultaneously for all y‘c-2,…,y‘c 1∈Y. Equation (1);f(y0,…,yc-i,y‘c-i 1,…y‘c,λα(t))=f^(j)(y0,…yc-i,λα(t)) y‘c-i 1 Equation (2):f(y1,…,yc-j 1,y‘c-j 2,…,y‘c 1,λα(t))=f^(j)(y1,…,yc-j 1,λα(t)) y‘c-j s where t=δα(t)and if (i,j)=(1,2)then one and only one of the following conditions C1 and C2 holds for all y‘c-1,y‘c,y‘c 1∈Y.Condition C1:there exists a c-ary function g^(1),such that f(y0,…,yc-2,y‘c-1,y‘c,λα(t))=g^(1),(y0,…,yc-2,λα(t)) y‘c-1( )y‘c;Condition C2:there exists a (c-1)-ary functiong g^(2)such that f(y1,…,yc-2,y‘c-1,y‘c,y‘c 1,λα(t))=g^(2)(y1,…,yc-2,λα(t)) y‘c-1 y‘c,where t=δα(t).  相似文献   

20.
Bang Ye Wu 《Algorithmica》2013,65(2):467-479
Given an undirected graph G=(V,E) with positive edge lengths and two vertices s and t, the next-to-shortest path problem is to find an st-path which length is minimum amongst all st-paths strictly longer than the shortest path length. In this paper we show that the problem can be solved in linear time if the distances from s and t to all other vertices are given. Particularly our new algorithm runs in O(|V|log|V|+|E|) time for general graphs, which improves the previous result of O(|V|2) time and takes only linear time for unweighted graphs, planar graphs, and graphs with positive integer edge lengths.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号