首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
Let k be a positive integer, and let G=(V,E) be a graph with minimum degree at least k−1. A function f:V→{−1,1} is said to be a signed k-dominating function (SkDF) if uN[v]f(u)?k for every vV. An SkDF f of a graph G is minimal if there exists no SkDF g such that gf and g(v)?f(v) for every vV. The maximum of the values of vVf(v), taken over all minimal SkDFs f, is called the upper signed k-domination numberΓkS(G). In this paper, we present a sharp upper bound on this number for a general graph.  相似文献   

2.
3.
In this paper we analyze the average-case performance of the Modified Harmonic algorithm for on-line bin packing. We first analyze the average-case performance for arbitrary distribution of item sizes over (0,1]. This analysis is based on the following result. Letf 1 andf 2 be two linear combinations of random variables {N i } i=1 k where theN i 's have a joint multinomial distribution for eachn i=1 k ,N i . LetE(f 1) ≠ O andE(f 2)≠ 0. Then limn E(max(f 1,f 2 ))/n = lim n →∞ max(E(f 1),E(f 2))/n. We then consider the special case when the item sizes are uniformly distributed over (0,1]. For specific values of the parameters, the Modified Harmonic algorithm turns out to be better than the other two linear-time on-line algorithms—Next Fit and Harmonic—in both the worst case as well as the average case. We also obtain optimal values for the parameters of the algorithm from the average-case standpoint. For these values of the parameters, the average-case performance ratio is less than 1.19. This compares well with the performance ratios 1.333. and 1.2865. of the Next Fit algorithm and the Harmonic algorithm, respectively.  相似文献   

4.
In this paper, we present a feasible interior-point method (IPM) for the Cartesian P *(κ)-linear complementarity problem over symmetric cones (SCLCP) that is based on the classical logarithmic barrier function. The method uses Nesterov–Todd search directions and full step updates of iterates. With the appropriate choice of parameters the algorithm generates a sequence of iterates in the small neighbourhood of the central path which implies global convergence of the method. Moreover, this neighbourhood permits the quadratic convergence of the iterates. The iteration complexity of the method is O((1+4κ)√rlog(r/?)) which matches the currently best known iteration bound for IPMs solving the Cartesian P *(κ)-SCLCP.  相似文献   

5.
The calculation of the degree d of an approximate greatest common divisor of two inexact polynomials f(y) and g(y) reduces to the determination of the rank loss of a resultant matrix, the entries of which are functions of the coefficients of f(y) and g(y). This paper considers this issue by describing two methods to calculate d, such that knowledge of the noise level imposed on the coefficients of f(y) and g(y) is not assumed. One method uses the residual of a linear algebraic equation whose coefficient matrix and right hand side vector are derived from the Sylvester resultant matrix S(f,g), and the other method uses the first principal angle between a line and a hyperplane, the equations of which are calculated from S(f,g). Computational results on inexact polynomials whose exact forms have multiple roots of high degree are shown and very good results are obtained. These results are compared with the rank loss of S(f,g) for the calculation of d, and it is shown that this method yields incorrect results for these examples.  相似文献   

6.
The existing approaches support Minkowski sums for the boundary, set-theoretic, and ray representations of solids. In this paper, we consider the Minkowski sum operation in the context of geometric modeling using real functions. The problem is to find a real function f3(X) for the Minkowski sum of two objects defined by the inequalities f1(X) ≥ 0 and f2(X) ≥ 0. We represent the Minkowski sum as a composition of other operations: the Cartesian product, resulting in a higher-dimensional object, and a mapping to the original space. The Cartesian product is realized as an intersection in the higher-dimensional space, using an R-function. The mapping projects the resulting object along n coordinate axes, where n is the dimension of the original space. We discuss the properties of the resulting function and the problems of analytic and numeric implementation, especially for the projection operation. Finally, we apply Minkowski sums to implement offsetting and metamorphosis between set-theoretic solids with curvilinear boundaries.  相似文献   

7.
In this paper, we introduce the generalized quasi-contractive mapping f in a cone metric space (X,d). f is called a generalized quasi-contractive if there is a real λ∈[0,1) such that for all x,yX,
d(fx,fy)≤λs  相似文献   

8.
We consider equality sets of prefix morphisms, that is, sets E(g1,g2)={w|g1(w)=g2(w)}, where g1 and g2 are prefix morphisms. Recall that a morphism g is prefix if, for all different letters a and b, g(a) is not a prefix of g(b). We prove a rather surprising equality on families of languages, namely, that the family of regular star languages coincides with the family of languages of form πA(E(g1,g2)) for some prefix morphisms g1 and g2, and a projection πA which deletes the letters not in A.  相似文献   

9.
We address the problem of finding the K best integer solutions of a linear integer network flow problem. We design an O(f(n,m,L,U)+KmS(n,m,L)) time and O(K+m) memory space algorithm to determine the K best integer solutions, in a directed network with n nodes, m arcs, maximum absolute value cost L, and an upper bound U on arc capacities and node supplies. f(n,m,L,U) is the best time needed to solve the minimum cost flow problem in a directed network and S(n,m,L) is the best time to solve the single-source shortest path problem in a network with non-negative lengths. The introduced algorithm efficiently determines a “proper minimal cycle” by taking advantage of the relationship between the best solutions. This way, we improve the theoretical as well as practical memory space bounds of the well-known method due to Hamacher. Our computational experiments confirm this result.  相似文献   

10.
In this paper, we give a relatively simple though very efficient way to color the d-dimensional grid G(n1,n2,…,nd) (with ni vertices in each dimension 1?i?d), for two different types of vertex colorings: (1) acyclic coloring of graphs, in which we color the vertices such that (i) no two neighbors are assigned the same color and (ii) for any two colors i and j, the subgraph induced by the vertices colored i or j is acyclic; and (2) k-distance coloring of graphs, in which every vertex must be colored in such a way that two vertices lying at distance less than or equal to k must be assigned different colors. The minimum number of colors needed to acyclically color (respectively k-distance color) a graph G is called acyclic chromatic number of G (respectively k-distance chromatic number), and denoted a(G) (respectively χk(G)).The method we propose for coloring the d-dimensional grid in those two variants relies on the representation of the vertices of Gd(n1,…,nd) thanks to its coordinates in each dimension; this gives us upper bounds on a(Gd(n1,…,nd)) and χk(Gd(n1,…,nd)).We also give lower bounds on a(Gd(n1,…,nd)) and χk(Gd(n1,…,nd)). In particular, we give a lower bound on a(G) for any graph G; surprisingly, as far as we know this result was never mentioned before. Applied to the d-dimensional grid Gd(n1,…,nd), the lower and upper bounds for a(Gd(n1,…,nd)) match (and thus give an optimal result) when the lengths in each dimension are “sufficiently large” (more precisely, if ). If this is not the case, then these bounds differ by an additive constant at most equal to . Concerning χk(Gd(n1,…,nd)), we give exact results on its value for (1) k=2 and any d?1, and (2) d=2 and any k?1.In the case of acyclic coloring, we also apply our results to hypercubes of dimension d, Hd, which are a particular case of Gd(n1,…,nd) in which there are only 2 vertices in each dimension. In that case, the bounds we obtain differ by a multiplicative constant equal to 2.  相似文献   

11.
Nonlinear eigenvalue problems for quasilinear systems   总被引:1,自引:0,他引:1  
The paper deals with the existence of positive solutions for the quasilinear system (Φ(u'))' + λh(t)f(u) = 0,0 < t < 1 with the boundary condition u(0) = u(1) = 0. The vector-valued function Φ is defined by Φ(u) = (q(t)(p(t)u1), …, q(t)(p(t)un)), where u = (u1, …, un), andcovers the two important cases (u) = u and (u) = up > 1, h(t) = diag[h1(t), …, hn(t)] and f(u) = (f1(u), …, fn (u)). Assume that fi and hi are nonnegative continuous. For u = (u1, …, un), let
, f0 = maxf10, …, fn0 and f = maxf1, …, fn. We prove that the boundary value problem has a positive solution, for certain finite intervals of λ, if one of f0 and f is large enough and the other one is small enough. Our methods employ fixed-point theorem in a cone.  相似文献   

12.
Recently, Yager [R. Yager, On some new classes of implication operators and their role in approximate reasoning, Information Sciences 167 (2004) 193-216] has introduced a new class of fuzzy implications, denoted Jf, called the f-generated implications and has discussed some of their desirable properties, such as neutrality, exchange principle, etc. In this work, we discuss the class of Jf implications with respect to three classical logic tautologies, viz., distributivity, law of importation and contrapositive symmetry. Necessary and sufficient conditions under which Jf implications are distributive over t-norms and t-conorms and satisfy the law of importation with respect to a t-norm have been presented. Since the natural negations of Jf implications, given by NJf(x)=Jf(x,0), in general, are not strong, we give sufficient conditions under which they become strong and possess contrapositive symmetry with respect to their natural negations. When the natural negations of Jf are not strong, we discuss the contrapositivisation of Jf. Along the lines of Jf implications, a new class of implications called h-generated implications, Jh, has been proposed and the interplay between these two types of implications has been discussed. Notably, it is shown that while the natural negations of Jf are non-filling those of Jh are non-vanishing, properties which determine the compatibility of a contrapositivisation technique.  相似文献   

13.
For a positive integer d, an L(d,1)-labeling f of a graph G is an assignment of integers to the vertices of G such that |f(u)−f(v)|?d if uvE(G), and |f(u)−f(v)|?1 if u and u are at distance two. The span of an L(d,1)-labeling f of a graph is the absolute difference between the maximum and minimum integers used by f. The L(d,1)-labeling number of G, denoted by λd,1(G), is the minimum span over all L(d,1)-labelings of G. An L(d,1)-labeling of a graph G is an L(d,1)-labeling of G which assigns different labels to different vertices. Denote by the L(d,1)-labeling number of G. Georges et al. [Discrete Math. 135 (1994) 103-111] established relationship between the L(2,1)-labeling number of a graph G and the path covering number of Gc, the complement of G. In this paper we first generalize the concept of the path covering of a graph to the t-group path covering. Then we establish the relationship between the L(d,1)-labeling number of a graph G and the (d−1)-group path covering number of Gc. Using this result, we prove that and for bipartite graphs G can be computed in polynomial time.  相似文献   

14.
Given a graph G, a vertex ranking (or simply, ranking) of G is a mapping f from V(G) to the set of all positive integers, such that for any path between two distinct vertices u and v with f(u)=f(v), there is a vertex w in the path with f(w)>f(u). If f is a ranking of G, the ranking number of G under f, denoted γf(G), is defined by , and the ranking number of G, denoted γ(G), is defined by . The vertex ranking problem is to determine the ranking number γ(G) of a given graph G. This problem is a natural model for the manufacturing scheduling problem. We study the ranking numbers of graphs in this paper. We consider the relation between the ranking numbers and the minimal cut sets, and the relation between the ranking numbers and the independent sets. From this, we obtain the ranking numbers of the powers of paths and the powers of cycles, the Cartesian product of P2 with Pn or Cn, and the caterpilars. And we also find the vertex ranking numbers of the composition of two graphs in this paper.  相似文献   

15.
A new representation is proved of the solutions of initial boundary value problems for the equation of the form u xx (x, t) + r(x)u x (x, t) ? q(x)u(x, t) = u tt (x, t) + μ(x)u t (x, t) in the section (under boundary conditions of the 1st, 2nd, or 3rd type in any combination). This representation has the form of the Riemann integral dependent on the x and t over the given section.  相似文献   

16.
Consider a probabilistic graph G   in which the edges of E(G)E(G) are perfectly reliable, but the vertices of V(G)V(G) may fail with some known probabilities. Given a subset K   of V(G)V(G), the K-terminal residual reliability of G is the probability that all operational vertices in K are connected to each other. This problem can be considered to be a generalization of two well-known reliability problems – the K-terminal reliability problem and the residual connectedness reliability problem.  相似文献   

17.
This paper proposes a novel automatic method for the moment segmentation and peak detection analysis of heart sound (HS) pattern, with special attention to the characteristics of the envelopes of HS and considering the properties of the Hilbert transform (HT). The moment segmentation and peak location are accomplished in two steps. First, by applying the Viola integral waveform method in the time domain, the envelope (ET) of the HS signal is obtained with an emphasis on the first heart sound (S1) and the second heart sound (S2). Then, based on the characteristics of the ET and the properties of the HT of the convex and concave functions, a novel method, the short-time modified Hilbert transform (STMHT), is proposed to automatically locate the moment segmentation and peak points for the HS by the zero crossing points of the STMHT. A fast algorithm for calculating the STMHT of ET can be expressed by multiplying the ET by an equivalent window (WE). According to the range of heart beats and based on the numerical experiments and the important parameters of the STMHT, a moving window width of N = 1 s is validated for locating the moment segmentation and peak points for HS. The proposed moment segmentation and peak location procedure method is validated by sounds from Michigan HS database and sounds from clinical heart diseases, such as a ventricular septal defect (VSD), an aortic septal defect (ASD), Tetralogy of Fallot (TOF), rheumatic heart disease (RHD), and so on. As a result, for the sounds where S2 can be separated from S1, the average accuracies achieved for the peak of S1 (AP1), the peak of S2 (AP2), the moment segmentation points from S1 to S2 (AT12) and the cardiac cycle (ACC) are 98.53%, 98.31% and 98.36% and 97.37%, respectively. For the sounds where S1 cannot be separated from S2, the average accuracies achieved for the peak of S1 and S2 (AP12) and the cardiac cycle ACC are 100% and 96.69%.  相似文献   

18.
This paper investigates affine control systems with jumps for which the ideal If(g1, …, gm) generated by the drift vector field f in the Lie algebra L(f, g1, …, gm) can be imbedded as a kernel of a linear first-order partial differential equation. It will lead us to uncontrollable affine control systems with jumps for which the corresponding reachable sets are included in explicitly described differentiable manifolds.  相似文献   

19.
Improving bounds on link failure tolerance of the star graph   总被引:1,自引:0,他引:1  
Determination of the minimum number of faulty links, f(n,k), that make every n-k-dimensional sub-star graph Sn-k faulty in an n-dimensional star network Sn, has been the subject of several studies. Bounds on f(n,k) have already been derived, and it is known that f(n,1)=n+2. Here, we improve the bounds on f(n,k). Specifically, it is shown that f(n,k)?(k+1)F(n,k), where F(n,k) is the minimum number of faulty nodes that make every Sn-k faulty in Sn. The complexity of f(n,k) is shown to be O(n2k) which is an improvement over the previously known upper bound of O(n3); this result in a special case leads to f(n,2)=O(n2), settling a conjecture introduced in an earlier paper. A systematic method to derive the labels of the faulty links in case of f(n,1) is also introduced.  相似文献   

20.
The fractional derivative Dqf(s) (0≤s≤1) of a given function f(s) with a positive non-integer q is defined in terms of an indefinite integral. We propose a uniform approximation scheme to Dqf(s) for algebraically singular functions f(s)=sαg(s) (α>−1) with smooth functions g(s). The present method consists of interpolating g(s) at sample points tj in [0,1] by a finite sum of the Chebyshev polynomials. We demonstrate that for the non-negative integer m such that m<q<m+1, the use of high-order derivatives g(i)(0) and g(i)(1) (0≤im) at both ends of [0,1] as well as g(tj), tj∈[0,1] in interpolating g(s), is essential to uniformly approximate Dq{sαg(s)} for 0≤s≤1 when αqm−1. Some numerical examples in the simplest case 1<q<2 are included.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号