首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A circular connected-(r, s)-out-of-(m, n):F lattice system consists of m×n components arranged in a cylindrical grid. Each of m circles has n components, and this system fails if and only if there exists a grid of size r ×s which all components are failed. A circular connected-(r, s)-out-of-(m, n):F lattice system might be used in reliability models for ‘Feelers for measuring temperature on reaction chamber’ and ‘TFT Liquid Crystal Display system with 360° wide area’.In this study, we proposed a new recursive algorithm for obtaining the reliability of a circular connected-(r, s)-out-of-(m, n):F lattice system. We evaluated our proposed algorithms in terms of computing time and memory capacity. Furthermore, a numerical experiment comparing our proposed algorithm with Yamamoto and Miyakawa's algorithm [Yamamoto, H., & Miyakawa, M. (1996). Reliability of circular connected-(r, s)-out-of-(m, n):F lattice system. Journal of the Operations Research Society of Japan, 39(3), 389–406] showed that our proposed algorithm is more effective for systems with a large n.  相似文献   

2.
Two new coherent system reliability models, which generalise k-out-of-n:F and consecutive k-out-of-n:G systems, are proposed and explicit formulae for the reliabilities of these systems are derived when the components are independent and identical and when they are Markov dependent. Our method of deriving reliability functions is based on the use of classical combinatorial arguments. These extensions consider an additional constraint on the number of working components between successive failures. More explicitly, in addition to the working conditions of k-out-of-n:F and consecutive k-out-of-n:G systems there must be at least d consecutive working components between any of two successive failures. This type of consideration might be useful in some situations including the analysis of constrained binary sequences arising in communications systems, and particular infrared detecting systems.  相似文献   

3.
A consecutive-k-out-of-n system is a system with n components arranged either linearly or circularly, which fails if and only if at least k consecutive components fail. An (n,?f,?k) system further requires that the total number of failed components is less than f for the system to be working. Here we consider a more general system consisting of N modules with the ith module-composed of n i components in parallel; the system fails if and only if there exist at least f failed components or at least k consecutive failed modules. In this paper, some formulae for the reliability of such a generalized k-out-of-n system are derived for both the linear and the circular cases. The recursive formulae established here can be easily computed. Many existing results are also shown to be special cases of the results obtained in this paper. Furthermore, we investigate some component importance properties.  相似文献   

4.
A bithreshold graph is the edge intersection of two threshold graphs such that every independent set is independent in at least one of the threshold components. Recognizing a bithreshold graph is polynomially equivalent to recognizing its complement, i.e., a cobithreshold graph. In this paper we introduce a coloring of the vertices and of the edges of a cobithreshold graph that leads to a recognition and decomposition algorithm. This algorithm works inO(n 3) time improving the previously knownO(n 4) result [HM].  相似文献   

5.
An (n, r)-arc is a set of n points of a projective plane such that some r but no r+1 of them are collinear. The maximum size of an (n, r)-arc in PG(2, q) is denoted by m r (2, q). In this paper a new (95, 7)-arc, (183, 12)-arc, and (205, 13)-arc in PG(2, 17) are constructed, as well as a (243, 14)-arc and (264, 15)-arc in PG(2, 19). Likewise, good large (n, r)-arcs in PG(2, 23) are constructed and a table with bounds on m r (2, 23) is presented. In this way many new 3-dimensional Griesmer codes are obtained. The results are obtained by nonexhaustive local computer search.  相似文献   

6.
A binary code is called a (w, r) cover-free code if it is the incidence matrix of a family of sets where the intersection of any w of the sets is not covered by the union of any other r sets. Such a family is called a (w, r) cover-free family. We obtain a new recurrent inequality for the rate of (w, r) cover-free codes, which improves previously known upper bounds on the rate.  相似文献   

7.
G. Xue  D.-Z. Du 《Algorithmica》1999,23(4):354-362
In 1992 F. K. Hwang and J. F. Weng published an O(n 2 ) time algorithm for computing the shortest network under a given full Steiner topology interconnecting n fixed points in the Euclidean plane. The Hwang—Weng algorithm can be used to improve substantially existing algorithms for the Steiner minimum tree problem because it reduces the number of different Steiner topologies to be considered dramatically. In this paper we present an improved Hwang—Weng algorithm. While the worst-case time complexity of our algorithm is still O(n 2 ) , its average time complexity over all the full Steiner topologies interconnecting n fixed points is O (n log n ). Received August 24, 1996; revised February 10, 1997.  相似文献   

8.
This paper studies maintenance policies for multi-component systems in which failure interactions and opportunistic maintenance (OM) involve. This maintenance problem can be formulated as a Markov decision process (MDP). However, since an action set and state space in MDP exponentially expand as the number of components increase, traditional approaches are computationally intractable. To deal with curse of dimensionality, we decompose such a multi-component system into mutually influential single-component systems. Each single-component system is formulated as an MDP with the objective of minimising its long-run average maintenance cost. Under some reasonable assumptions, we prove the existence of the optimal (n, N) type policy for a single-component system. An algorithm to obtain the optimal (n, N) type policy is also proposed. Based on the proposed algorithm, we develop an iterative approximation algorithm to obtain an acceptable maintenance policy for a multi-component system. Numerical examples find that failure interactions and OM pose significant effects on a maintenance policy.  相似文献   

9.
《国际计算机数学杂志》2012,89(9):2043-2052
In this paper, variational iteration method and Adomian decomposition are implemented to construct solitary solutions for variants of K(n, n) equation. In these schemes the solution takes the form of a convergent series with easily computable components. The chosen initial solution or trial function plays a major role in changing the physical structure of the solution. Comparison between the two methods is made and many models are approached. The obtained results reveal that the two methods are very effective and convenient for constructing solitary solutions.  相似文献   

10.
Let r be a relation for the relation scheme R(A1,A2,…,An); then we define Dom(r) to be Domr(A1)×Domr(A2)×…×Domr(An), where Domr(Ai) for each i is the set of all ith coordinates of tuples of r. A relation s is said to be a substructure of the relation r if and only if Dom(s)∩r = s.The following theorems analogous to Tarski-Fraisse-Vaught's characterizations of universal classes are proved: (i) An implicational dependency family (ID-family) F over the relation scheme R is finitely specifiable if and only if there exists a finite number of relations r1,r2,…,rm for R such that r ∈ F if and only if no ri is isomorphic to a substructure of r. (ii) F is finitely specifiable if and only if there exists a natural number k such that r ∈ F whenever F contains all substructures of r with at most k elements.We shall use these characterizations to obtain a new proof for Hull's (1984) characterization of finitely specifiable ID-families.  相似文献   

11.
A (w, r)-cover-free code is the incidence matrix of a family of sets where no intersection of w members of the family is covered by the union of r others. We obtain a new condition in view of which (w, r)-cover-free codes with a simple structure are optimal. We also introduce (w, r)-cover-free codes with a constraint set.  相似文献   

12.
This article presents a very efficient SLAM algorithm that works by hierarchically dividing a map into local regions and subregions. At each level of the hierarchy each region stores a matrix representing some of the landmarks contained in this region. To keep those matrices small, only those landmarks are represented that are observable from outside the region. A measurement is integrated into a local subregion using O(k2) computation time for k landmarks in a subregion. When the robot moves to a different subregion a full least-square estimate for that region is computed in only O(k3 log n) computation time for n landmarks. A global least square estimate needs O(kn) computation time with a very small constant (12.37 ms for n = 11300). The algorithm is evaluated for map quality, storage space and computation time using simulated and real experiments in an office environment. This article is based on the authors studies at the German Aerospace Center. Udo Frese was born in Minden, Germany in 1972. He received the Diploma degree in computer science from the University of Paderborn in 1997. From 1998 to 2003 he was a Ph.D. student at the German Aerospace Center in Oberpfaffenhofen. In 2004 he received his Ph.D. degree from University of Erlangen-Nürnberg and joined SFB/TR 8 Spatial Cognition at University of Bremen. He works on mobile robotics, SLAM and computer vision.  相似文献   

13.
An L(2, 1)-labelling of a graph G is a vertex labelling such that the difference of the labels of any two adjacent vertices is at least 2 and that of any two vertices of distance 2 is at least 1. The minimum span of all L(2, 1)-labellings of G is the λ-number of G and denoted by λ(G). Lin and Lam computed λ(G) for a direct product G=K m ×P n of a complete graph K m and a path P n . This is a natural lower bound of λ(K m ×C n ) for a cycle C n . They also proved that when n≡ 0±od 5m, this bound is the exact value of λ(K m ×C n ) and computed the value when n=3, 5, 6. In this article, we compute the λ-number of G, where G is the direct product K 3×C n of the triangle and a cycle C n for all the other n. In fact, we show that among these n, λ(K 3×C n )=7 for all n≠7, 11 and λ(K 3×C n )=8 when n=7, 11.  相似文献   

14.
Abstract— In this paper, we report on the utilization of zirconium (IV) tetras (8‐hydroxyquinoline), Zrq4, and hafnium (IV) tetras (8‐hydroxyquinoline), Hfq4, as an electroluminescent material in fluorescent organic light‐emitting diodes (OLED) and as electron transport layer (ETL) for high‐efficiency electrophosphorescent organic light‐emitting diodes (PHOLEDs). Structural studies show that the metal tetraquinolates (Mq4) have a very low dipole moment (<0.1 D), in contrast to Alq3 which has an estimated dipole moment of 4.7 D. Mobility measurements show that Mq4 complexes give mobilities of (3.5 ± 0.5) × 10?6 cm2/V‐sec, which are close to the values reported for Alq3, i.e., (2.3–4.3) × 10?6 cm2/V‐sec. OLEDs were prepared with the structure ITO/NPD (400 Å)/Mqn (500 Å)/LiF/Al (NPD = 4‐4′‐bis[N‐(1‐naphthyl)‐N‐phenyl‐amino]bi phenyl, Mqn = Alq3, Zrq4, Hfq4. The Mq4‐based OLEDs gave external efficiencies of 1.1%, while the Alq3‐based devices of the same structure gave efficiencies of 0.7%. PHOLEDs have been fabricated with the structure ITO/NPD (500 Å)/CBP‐8% Ir(ppy)3 (250 Å)/BCP (150 Å)/Mqn (250 Å)/LiF/Al (CBP = N,N′‐dicarbazolyl‐4‐4′‐biphenyl, Ir(ppy)3 = fac‐tris(2‐phenylpyrridine)iridium, BCP = bathocruprione). PHOLEDs with Mq4 ETLs showed a greatly improved efficiency, when compared to Alq3‐based PHOLEDs. The Zrq4‐based PHOLEDs gave a peak external quantum efficiency of 14% at 0.3 mA/cm2 (150 cd/m2), while the Hfq4 based PHOLED gave a peak external quantum efficiency of 15% at 0.6 mA/cm2 (300 cd/m2). Comparable PHOLEDs with an Alq3 ETL give peak external quantum efficiencies of 8.0% at 0.5 mA/cm2. The devices gave an electroluminescence (EL) spectrum consisting only of fac‐tris(2‐phenylpyrridine)iridium (Ir(ppy)3) dopant emission (CIE coordinates of 0.26, 0.66), with no Mq4 emission observed at any bias level.  相似文献   

15.
《国际计算机数学杂志》2012,89(9):1325-1331
A (g, f)-factor F of a graph G is called a Hamiltonian (g, f)-factor if F contains a Hamiltonian cycle. For a subset X of V(G), let N G (X)= gcup xX N G (x). The binding number of G is defined by bind(G)=min{| N G (X) |/| X|| ?≠X?V(G), N G (X)≠V(G)}. Let G be a connected graph of order n, 3≤ab be integers, and b≥4. Let g, f be positive integer-valued functions defined on V(G), such that ag(x)≤f(x)≤b for every xV(G). Suppose n≥(a+b?4)2/(a?2) and f(V(G)) is even, we shall prove that if bind(G)>((a+b?4)(n?1))/((a?2)n?(5/2)(a+b?4)) and for any independent set X?V(G), N G (X)≥((b?3)n+(2a+2b?9)| X|)/(a+b?5), then G has a Hamiltonian (g, f)-factor.  相似文献   

16.
This work concerns the trade-offs between the dimension and the time and space complexity of computations on nondeterministic cellular automata. We assume that the space complexity is the diameter of area in space involved in computation. It is proved that (1) every nondeterministic cellular automata (NCA) of dimensionr, computing a predicatePwith time complexityT(n) and space complexityS(n) can be simulated byr-dimensional NCA with time and space complexityO(T1/(r+1)Sr/(r+1)) and byr+1 dimensional NCA with time and space complexityO(T1/2+S), whereTandSare functions constructible in time, (2) for any predicatePand integerr>1 if is a fastestr-dimensional NCA computingPwith time complexityT(n) and space complexityS(n), thenT=O(S), and (3) ifTr, Pis the time complexity of a fastestr-dimensional NCA computing predicatePthenTr+1,P=O((Tr, P)1−r/(r+1)2),Tr+1,P=O((Tr, P)1+2/r).Similar problems for deterministic cellular automata (CA) are discussed.  相似文献   

17.
Abstract— Solution‐processed double‐layered ionic p‐i‐n organic light‐emitting diodes (OLEDs), comprised of an emitting material layer doped with an organometallic green phosphor and a photo‐cross‐linked hole‐transporting layer doped with photo‐initiator is reported. The fabricated OLEDs were annealed using simultaneous thermal and electrical treatments to form a double‐layered ionic p‐i‐n structure. As a result, an annealed double‐layered OLED with a peak brightness over 20,000 cd/m2 (20 V, 390 mA/cm2) and a peak efficiency of 15 cd/A (6 V, 210 cd/m2) was achieved.  相似文献   

18.
Summary Polynomial multiplication of degree N can be accomplished in time O (N · log N) provided the scalar field contains suitable roots of unity. Otherwise at least O (N · log N · log log N) is obtained by a modified version of the Schönhage-Strassen multiplication which employs computations modulo 1 + xn (where N = 2n), if the field contains 2–1, or modulo 1 + xn + x2N, if 3–1 exists. The latter method covering all fields of characteristic 2 is presented here in detail.  相似文献   

19.
We provide the first sparse covers and probabilistic partitions for graphs excluding a fixed minor that have strong diameter bounds; i.e. each set of the cover/partition has a small diameter as an induced sub-graph. Using these results we provide improved distributed name-independent routing schemes. Specifically, given a graph excluding a minor on r vertices and a parameter ρ>0 we obtain the following results: (1) a polynomial algorithm that constructs a set of clusters such that each cluster has a strong-diameter of O(r 2 ρ) and each vertex belongs to 2 O(r) r! clusters; (2) a name-independent routing scheme with a stretch of O(r 2), headers of O(log n+rlog r) bits, and tables of size 2 O(r) r! log 4 n/log log n bits; (3) a randomized algorithm that partitions the graph such that each cluster has strong-diameter O(r6 r ρ) and the probability an edge (u,v) is cut is O(rd(u,v)/ρ).  相似文献   

20.
Constructing normal bases of GF(qn) over GF (q) can be done by probabilistic methods as well as deterministic ones. In the following paper we consider only deterministic constructions. As far as we know, the best complexity for probabilistic algorithms is O(n2 log4n log2 (log n) + n log n log (log n) log q ) (see von zur Gathen and Shoup, 1992). For deterministic constructions, some prior ones, e.g. Lueneburg (1986), do not use the factorization of Xn - 1 over GF(q). As analysed by Bach, Driscoll and Shallit (1993), the best complexity (from Lueneburg, 1986) is O(n3 log n log(log n) + n2 log n log(log n) log q). For other deterministic constructions, which need such a factorization, the best complexities are O(n3,376 + n2 log n log(log n) log q) (von zur Gathen and Giesbrecht, 1990), or O(n3 log q); see Augot and Camion (1993). Here we propose a new deterministic construction that does not require the factorization of Xn - 1. Its complexity is reduced to O (n3 + n log n log(log n) log q ).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号