首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
A very important class of inverse problems are those modelled by integral equations of the first kind. These equations are usually ill-conditioned, such that any discretization technique will produce an ill-conditioned system, in classical or least-squares formulation. For such kind of symmetric problems, we propose in this paper a stable iterative solver based on an approximate orthogonalization algorithm introduced by Z. Kovarik. We prove convergence of our algorithm for general symmetric least-squares problems and present some numerical experiments ilustrating its good behaviour on problems concerned with the determination of charge distribution generating a given electric field and gravity surveying, both modelled by first kind integral equations.  相似文献   

3.
This paper discusses the mechanisms of torus formation and torus destruction in a dc/dc converter with relay control and hysteresis. We establish a chart of the dynamical modes in the input voltage versus load resistance parameter plane. This chart displays several different torus bifurcations along with their associated resonance tongues where periodic dynamics is observed. We show how a quintruple-turn torus is transformed into a single-turn torus in a homoclinic bifurcation and examine different mechanisms of torus destruction (via horseshoe formation and through period doubling). Particular emphasis is paid to following the changes of the stable and unstable manifolds in detail.  相似文献   

4.
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one of the major threats of today. In this paper, we present a bilevel formulation of the r-interdiction median problem with fortification (RIMF). RIMF identifies the most cost-effective way of allocating protective resources among the facilities of an existing but vulnerable system so that the impact of the most disruptive attack to r unprotected facilities is minimized. The model is based upon the classical p-median location model and assumes that the efficiency of the system is measured in terms of accessibility or service provision costs. In the bilevel formulation, the top level problem involves the decisions about which facilities to fortify in order to minimize the worst-case efficiency reduction due to the loss of unprotected facilities. Worst-case scenario losses are modeled in the lower-level interdiction problem. We solve the bilevel problem through an implicit enumeration (IE) algorithm, which relies on the efficient solution of the lower-level interdiction problem. Extensive computational results are reported, including comparisons with earlier results obtained by a single-level approach to the problem.  相似文献   

5.
This paper is devoted to the solution of the time-dependent Vlasov–Maxwell equations in singular geometries, i.e. when the boundary includes reentrant corners or edges. Indeed, computing the electromagnetic fields in this case is a challenge per se, as these geometrical singularities generate very strong solutions in their neighborhood. Moreover, they have also an influence over the solution of the Vlasov equation, through the coupling. We propose here a method to solve this problem, illustrated by numerical examples.  相似文献   

6.
It is now a well-established fact that search algorithms can exhibit heavy-tailed behavior. However, the reasons behind this fact are not well understood. We provide a generative search tree model whose distribution of the number of nodes visited during search is formally heavy-tailed. Our model allows us to generate search trees with any degree of heavy-tailedness. We also show how the different regimes observed for the runtime distributions of backtrack search methods across different constrainedness regions of random CSP models can be captured by a mixture of the so-called stable distributions.  相似文献   

7.
We propose exact hybrid methods based on integer linear programming (ILP) and constraint programming (CP) for an integrated employee timetabling and job-shop scheduling problem. Each method we investigate uses a CP formulation associated with an LP relaxation. Under a CP framework, the LP relaxation is integrated into a global constraint using in addition reduced cost-based filtering techniques. We propose two CP formulations of the problem yielding two different LP relaxations. The first formulation is based on a direct representation of the problem. The second formulation is based on a decomposition in intervals of the possible operation starting times. We show the theoretical interest of the decomposition-based representation compared to the direct representation through the analysis of dominant schedules. Computational experiments on a set of randomly generated instances confirm the superiority of the decomposition-based representation. In both cases, the hybrid methods outperform pure CP for employee cost minimization while it is not the case for makespan minimization. The experiments also investigate the interest of the proposed integrated method compared to a sequential approach and show its potential for multiobjective optimization.  相似文献   

8.
Given a graph GG, an integer kk, and a demand set D={(s1,t1),…,(sl,tl)}D={(s1,t1),,(sl,tl)}, the kk-Steiner Forest problem finds a forest in graph GG to connect at least kk demands in DD such that the cost of the forest is minimized. This problem was proposed by Hajiaghayi and Jain in SODA’06. Thereafter, using a Lagrangian relaxation technique, Segev et al. gave the first approximation algorithm to this problem in ESA’06, with performance ratio O(n2/3logl)O(n2/3logl). We give a simpler and faster approximation algorithm to this problem with performance ratio O(n2/3logk)O(n2/3logk) via greedy approach, improving the previously best known ratio in the literature.  相似文献   

9.
Simulations with long-range dependent or self-similar input processes are hindered both by the slowness of convergence displayed by the output data and by the high computational complexity of the on-line methods for generating the input process. In this paper, we present optimized algorithms for simulating efficiently the occupancy process of a M/G/∞ system, which can be used as a sequential pseudo-random number generator of a broad class of self-similar and correlated sample-paths. We advocate the use of this approach in the simulation toolbox, as a simple method to overcome the drawbacks of other synthetic generators of Gaussian self-similar time series. Our approach to fast simulation of the M/G/∞ model is the decomposition of the service time distribution as a linear combination of deterministic and memoryless random variables, plus a residual term. Then, the original M/G/∞ system is replaced by a number of parallel, independent, virtual and easier to simulate M/G/∞ subsystems, the dynamics of which can be replicated sequentially or in parallel too. We report the results of several experiments demonstrating the substantial improvements attainable with this decomposition.  相似文献   

10.
We describe three computer searches (in PARI/GP, Maple, and Mathematica, respectively) which led to the discovery of a number of identities of Rogers–Ramanujan type and identities of false theta functions.  相似文献   

11.
In this paper, we investigate the fault-tolerant capabilities of the k-ary n-cubes for even integer k with respect to the hamiltonian and hamiltonian-connected properties. The k-ary n-cube is a bipartite graph if and only if k is an even integer. Let F   be a faulty set with nodes and/or links, and let k?3k?3 be an odd integer. When |F|?2n-2|F|?2n-2, we show that there exists a hamiltonian cycle in a wounded k-ary n  -cube. In addition, when |F|?2n-3|F|?2n-3, we prove that, for two arbitrary nodes, there exists a hamiltonian path connecting these two nodes in a wounded k-ary n-cube. Since the k-ary n  -cube is regular of degree 2n2n, the degrees of fault-tolerance 2n-32n-3 and 2n-22n-2 respectively, are optimal in the worst case.  相似文献   

12.
Recently, Universum data that does not belong to any class of the training data, has been applied for training better classifiers. In this paper, we address a novel boosting algorithm called UUAdaBoost that can improve the classification performance of AdaBoost with Universum data. UUAdaBoost chooses a function by minimizing the loss for labeled data and Universum data. The cost function is minimized by a greedy, stagewise, functional gradient procedure. Each training stage of UUAdaBoost is fast and efficient. The standard AdaBoost weights labeled samples during training iterations while UUAdaBoost gives an explicit weighting scheme for Universum samples as well. In addition, this paper describes the practical conditions for the effectiveness of Universum learning. These conditions are based on the analysis of the distribution of ensemble predictions over training samples. Experiments on handwritten digits classification and gender classification problems are presented. As exhibited by our experimental results, the proposed method can obtain superior performances over the standard AdaBoost by selecting proper Universum data.  相似文献   

13.
We consider lattices of regular sets of non negative integers, i.e. of sets definable in Presburger arithmetic. We prove that if such a lattice is closed under decrement then it is also closed under many other functions: quotients by an integer, roots, etc. We characterize the family of such functions.  相似文献   

14.
The local bb-function bf,p(s)bf,p(s) of an nn-variate polynomial f∈C[x]fC[x] (x=(x1,…,xn)x=(x1,,xn)) at a point p∈CnpCn is constant on each stratum of a stratification of CnCn. We propose a new method for computing such a stratification and bf,p(s)bf,p(s) on each stratum. In the existing method proposed in Oaku (1997b), a primary ideal decomposition of an ideal in C[x,s]C[x,s] is needed and our experiment shows that the primary decomposition can be a bottleneck for computing the stratification. In our new method, the computation can be done by just computing ideal quotients and examining inclusions of algebraic sets. The precise form of a stratum can be obtained by computing the decomposition of the radicals of the ideals in C[x]C[x] defining the stratum. We also introduce various techniques for improving the practical efficiency of the implementation and we show results of computations for some examples.  相似文献   

15.
We give simple, self-contained proofs of the basic hardness results for the classes W[t]W[t] of the weft hierarchy. We extend these proofs to higher levels of the hierarchy and illuminate the distinctions among its classes. The anti-monotone collapse at W[1,s]W[1,s] and the normalization of weft-tt formulas arise as by-products of the proofs.  相似文献   

16.
In the context of the ππ-calculus, open bisimulation is prominent and popular due to its congruence properties and its easy implementability. Motivated by the attempt to generalise it to the spi-calculus, we offer a new, more refined definition and show how far it coincides with the original one.  相似文献   

17.
A two-stage model is described where firms take decisions on where to locate their facility and on how much to supply to which market. In such models in literature, typically the market price reacts linearly on supply. Often two competing suppliers are assumed or several that are homogeneous, i.e., their cost structure is assumed to be identical. The focus of this paper is on developing methods to compute equilibria of the model where more than two suppliers are competing that each have their own cost structure, i.e., they are heterogeneous. Analytical results are presented with respect to optimality conditions for the Nash equilibria in the two stages. Based on these analytical results, an enumeration algorithm and a local search algorithm are developed to find equilibria. Numerical cases are used to illustrate the results and the viability of the algorithms. The methods find an improvement of a result reported in literature.  相似文献   

18.
19.
The goal of the present paper is to propose an enhanced ordinary differential equation solver by exploitation of the powerful equivalence method of Élie Cartan. This solver returns a target equation equivalent to the equation to be solved and the transformation realizing the equivalence. The target ODE is a member of a dictionary of ODEs, that are regarded as well-known, or at least well-studied. The dictionary considered in this article comprises the ODEs in a book of Kamke. The major advantage of our solver is that the equivalence transformation is obtained without integrating differential equations. We provide also a theoretical contribution revealing the relationship between the change of coordinates that maps two differential equations and their symmetry pseudo-groups.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号