首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
Let us associate to any binary planar shape X the erosion curve X defined by X: r IRXA(XrB), where A(X) stands for the surface area of X and XrB for the eroded set of X with respect to the ball rB of size r. Note the analogy to shape quantification by granulometry. This paper describes the relationship between sets X and Y verifying X = Y. Under some regularity conditions on X, X is expressed as an integral on its skeleton of the quench function q X(distance to the boundary of X). We first prove that a bending of arcs of the skeleton of X does not affect X: quantifies soft shapes. We then prove, in the generic case, that the five possible cases of behavior of the second derivative X characterize five different situations on the skeleton Sk(X) and on the quench function q X: simple points of Sk(X) where q Xis a local minimum, a local maximum, or neither, multiple points of Sk(X) where q Xis a local maximum or not. Finally, we give infinitesimal generators of the reconstruction process for the entire family of shapes Y verifying X = Y for a given X.  相似文献   

2.
Many applications of digital image processing now deal with three- and higher-dimensional images. One way to represent n-dimensional digital images is to use the specialization graphs of subspaces of the Alexandroff topological space n (where denotes the integers with the Khalimsky line topology). In this paper the dimension of any such graph is defined in three ways, and the equivalence of the three definitions is established. Two of the definitions have a geometric basis and are closely related to the topological definition of inductive dimension; the third extends the Alexandroff dimension to graphs. Diagrams are given of graphs that are dimensionally correct discrete models of Euclidean spaces, n-dimensional spheres, a projective plane and a torus. New characterizations of n-dimensional (digital) surfaces are presented. Finally, the local structure of the space n is analyzed, and it is shown that n is an n-dimensional surface for all n1.  相似文献   

3.
Let a semialgebraic set be given by a quantifier-free formula of the first-order theory of real closed fields withk atomic subformulae of the typef i0 for 1ik, where the polynomialsf i[X 1,...,X n] have degrees deg(f i)<d and the absolute value of each (integer) coefficient off i is at most 2M. An algorithm is exhibited which counts the number of connected components of the semialgebraic set in time (M (kd)n 20)O (1). Moreover, the algorithm allows us to determine whether any pair of points from the set are situated in the same connected component.  相似文献   

4.
LetF be a monoid and letA={A i iI} be a set of disjoint subsets ofF, whereI is an index set. A congruence onF is calledA-separating if each of its congruence classes has a non-empty intersection with at most one Ai A The setC A of allA-separating congruences onF is a lower semi-lattice with respect to the partial ordering of congruence inclusion. A necessary and sufficient condition forC A to be a complete lattice is derived and, in that case, the unique maximalA-separating congruence is characterized. The relation ofA-separating congruences with automata is described. An example of the case that the unique maximalA-separating congruence on a free monoid exists is worked out, and its realization by an incompletely specified finite automaton is given.  相似文献   

5.
The basic problem of interval computations is: given a function f(x 1,..., x n) and n intervals [x i, x i], find the (interval) range yof the given function on the given intervals. It is known that even for quadratic polynomials f(x 1,..., x n), this problem is NP-hard. In this paper, following the advice of A. Neumaier, we analyze the complexity of asymptotic range estimation, when the bound on the width of the input intervals tends to 0. We show that for small c > 0, if we want to compute the range with an accuracy c 2, then the problem is still NP-hard; on the other hand, for every > 0, there exists a feasible algorithm which asymptotically, estimates the range with an accuracy c 2–.  相似文献   

6.
On Bounding Solutions of Underdetermined Systems   总被引:1,自引:0,他引:1  
Sufficient conditions for the existence and uniqueness of a solution x* D (R n ) of Y(x) = 0 where : R n R m (m n) with C 2(D) where D R n is an open convex set and Y = (x)+ are given, and are compared with similar results due to Zhang, Li and Shen (Reliable Computing 5(1) (1999)). An algorithm for bounding zeros of f (·) is described, and numerical results for several examples are given.  相似文献   

7.
We consider the half-space range-reporting problem: Given a setS ofn points in d, preprocess it into a data structure, so that, given a query half-space , allk points ofS can be reported efficiently. We extend previously known static solutions to dynamic ones, supporting insertions and deletions of points ofS. For a given parameterm,n m n d/2 and an arbitrarily small positive constant , we achieveO(m 1+) space and preprocessing time, O((n/m d/2 logn+k) query time, and O(m1+n) amortized update time (d 3). We present, among others, the following applications: an O(n1+)-time algorithm for computing convex layers in 3, and an output sensitive algorithm for computing a level in an arrangements of planes in 3, whose time complexity is O((b+n) n, whereb is the size of the level.Work by the first author has been supported by National Science Foundation Grant CCR-91-06514. A preliminary version of this paper appeared in Agarwalet al. [2], which also contains the results of [20] on dynamic bichromatic closest pair and minimum spanning trees.  相似文献   

8.
A representative system defined onn voters or propositionsi = 1,,n is a functionF: {1,0, -1} n {1,0, -1} which is monotonic (D E F(D) F(E)), unanimous (F(1,, 1) = 1), dual (F(-D) = -F(D)), and satisfies a positivity property which says that the set of all non-zero vectors in {1, 0, -1} n for whichF(D) = 0 can be partitioned into two dual subsets each of which has the property that ifD andE are in the subset thenD i+E i > 0 for somei. Representative systems can be defined recursively from the coordinate projectionsS i (D) = D i using sign functions, and in this format they are interpreted as hierarchical voting systems in which outcomes of votes in lower levels act as votes in higher levels of the system. For each positive integern, (n) is defined as the smallest positive integer such that all representative systems defined on {1, 0, -1} n can be characterized by(n) or fewer hierarchical levels. The function is nondecreasing inn, unbounded above, and satisfies(n) n–1 for alln. In addition,(n) = n–1 forn {1, 2, 3, 4}, and it is conjectured that does not continue to grow linearly asn increases.  相似文献   

9.
Let (X, #) be an orthogonality space such that the lattice C(X, #) of closed subsets of (X, #) is orthomodular and let (, ) denote the free orthogonality monoid over (X, #). Let C0(, ) be the subset of C(, ), consisting of all closures of bounded orthogonal sets. We show that C0(, ) is a suborthomodular lattice of C(, ) and we provide a necessary and sufficient condition for C0(, ) to carry a full set of dispersion free states.The work of the second author on this paper was supported by National Science Foundation Grant GP-9005.  相似文献   

10.
This paper presents a new method of partition, named-splitting, of a point set ind-dimensional space. Given a pointG in ad-dimensional simplexT, T(G;i) is the subsimplex spanned by G and the ith facet ofT. LetS be a set ofn points inT, and let be a sequence of nonnegative integers 1, ..., nd+1 satisfying i=1 d+1 1=n The-splitter of (T, S) is a pointG inT such thatT(G;i) contains at least i points ofS in its closure for everyi=1, 2, ...,d + 1. The associated dissection is the re-splitting.The existence of a-splitting is shown for any (T, S) and, and two efficient algorithms for finding such a splitting are given. One runs inO(d2n logn + d3n) time, and the other runs inO(n) time if the dimensiond can be considered as a constant. Applications of re-splitting to mesh generation, polygonal-tour generation, and a combinatorial assignment problem are given.  相似文献   

11.
The cross ratio of four colinear points is of fundamental importance in model based vision, because it is the simplest numerical property of an object that is invariant under projection to an image. It provides a basis for algorithms to recognise objects from images without first estimating the position and orientation of the camera.A quantitative analysis of the effectiveness of the cross ratio in model based vision is made. A given imageI of four colinear points is classified by making comparisons between the measured cross ratio of the four image points and the cross ratios stored in the model database. The imageI is accepted as a projection of an objectO with cross ratio if |–|ntu, wheren is the standard deviation of the image noise,t is a threshold andu=. The performance of the cross ratio is described quantitatively by the probability of rejectionR, the probability of false alarmF and the probability of misclassificationp (), defined for two model cross ratios , . The trade off between these different probabilities is determined byt.It is assumed that in the absence of an object the image points have identical Gaussian distributions, and that in the presence of an object the image points have the appropriate conditional densities. The measurements of the image points are subject to small random Gaussian perturbations. Under these assumptions the trade offs betweenR,F andp () are given to a good approximation byR=2(1–(t)),F=r F t, t|–|–1, where is the relative noise level, is cumulative distribution function for the normal distribution,r F is constant, ande is a function of only. The trade off betweenR andF is obtained in Maybank (1994). In this paper the trade off betweenR andp () is obtained.It is conjectured that the general form of the above trade offs betweenR,F andp () is the same for a range of invariants useful in model based vision. The conjecture prompts the following definition: an invariant which has trade offs betweenR,F,p () of the above form is said to benon-degenerate for model based vision.The consequences of the trade off betweenR andp () are examined. In particular, it is shown that for a fixed overall probability of misclassification there is a maximum possible model cross ratio m , and there is a maximum possible numberN of models. Approximate expressions for m andN are obtained. They indicate that in practice a model database containing only cross ratio values can have a size of order at most ten, for a physically plausible level of image noise, and for a probability of misclassification of the order 0.1.  相似文献   

12.
In this paper, we introduce general techniques for extending classes of polynomially solvable SAT instances. We generalize the approach of Gallo and Scutellà, who defined the hierarchy { i }, where l corresponds to the Generalized Horn class. We propose a family of polynomial hierarchies, where a polynomial hierarchy { i } is a sequence of polynomially solvable classes that cover the whole set of CNF formulas, and such that i i+1 fori0. Following a different approach, based on a new decomposition technique, we define the class of Split-Horn formulas, which is an extension of l. We discuss and compare the basic properties of the proposed classes; polynomial time algorithms for recognition and solution are provided.  相似文献   

13.
Quantification in first-order logic always involves all elements of the universe. However, it is often more natural to just quantify over those elements of the universe which satisfy a certain condition. Constrained logics therefore provide restricted quantifiers X:R F and X:R F whereX is a set of variables, and which can be read as F holds for all elements satisfying the restrictionR and F holds if there exists an element which satisfiesR. In order to test satisfiability of a set of such formulas by means of an appropriately extended resolution principle, one needs a procedure which transforms them into a set of clauses with constraints. Such a procedure essentially differs from the classical transformation of first-oder formulas into a set of clauses, in particular since quantification over the empty set may occur and since the needed Skolemization procedure has to take the restrictions of restricted quantifiers into account. In the first part of this article we present a procedure that transforms formulas with restricted quantifiers into a set of clauses with constraints while preserving satisfiability. The thus obtained clauses are of the formC R whereC is an ordinary clause andR is a restriction, and can be read as C holds ifR holds. These clauses can now be tested on unsatisfiability via the existingconstrained resolution principle. In the second part we generalize the constrained resolution principle in such a way that it allows for further optimization, and we introduce a combination of unification and constraint solving that can be employed to instantiate this kind of optimization.  相似文献   

14.
Recently, Yamashita and Fukushima [11] established an interesting quadratic convergence result for the Levenberg-Marquardt method without the nonsingularity assumption. This paper extends the result of Yamashita and Fukushima by using k=||F(xk)||, where [1,2], instead of k=||F(xk)||2 as the Levenberg-Marquardt parameter. If ||F(x)|| provides a local error bound for the system of nonlinear equations F(x)=0, it is shown that the sequence {xk} generated by the new method converges to a solution quadratically, which is stronger than dist(xk,X*)0 given by Yamashita and Fukushima. Numerical results show that the method performs well for singular problems.  相似文献   

15.
Summary We consider binary tries formed by using the binary fractional expansions of X 1, ...,X n, a sequence of independent random variables with common density f on [0,1]. For H n, the height of the trie, we show that either E(Hn)21og2 n or E(Hn)= for all n2 according to whether f 2(x)dx is finite or infinite. Thus, the average height is asymptotically twice the average depth (which is log2 n when f 2(x)dx>). The asymptotic distribution of H n is derived as well.If f is square integrable, then the average number of bit comparisons in triesort is nlog2 n+0(n), and the average number of nodes in the trie is 0(n).Research of the author was supported in part by FCAC Grant EQ-1678  相似文献   

16.
In this paper, we discuss the minimal number of observables Q 1, ..., Q , where expectation values at some time instants t 1, ..., t r determine the trajectory of a d-level quantum system (qudit) governed by the Gaussian semigroup . We assume that the macroscopic information about the system in question is given by the mean values E j(Q i) = tr(Q i(t j)) of n selfadjoint operators Q 1, ..., Q n at some time instants t 1 < t 2 < ... < t r, where n < d 2– 1 and r deg (, ). Here (, ) stands for the minimal polynomial of the generator of the Gaussian flow (t).  相似文献   

17.
Optimal shape design problems for an elastic body made from physically nonlinear material are presented. Sensitivity analysis is done by differentiating the discrete equations of equilibrium. Numerical examples are included.Notation U ad set of admissible continuous design parameters - U h ad set of admissible discrete design parameters - function fromU h ad defining shape of body - h function fromU h ad defining approximated shape of body - vector of nodal values of h - { n} sequence of functions tending to - () domain defined by - K bulk modulus - shear modulus - penalty parameter for contact condition - V() space of virtual displacements in() - V h(h) finite element approximation ofV() - J cost functional - J h discretized cost functional - J algebraic form ofJ h - (u) stress tensor - e(u) strain tensor - K stiffness matrix - f force vector - b(q) term arising from nonlinear boundary conditions - q vector of nodal degrees of freedom - p vector of adjoint state variables - J Jacobian of isoparametric mapping - |J| determinant ofJ - N vector of shape function values on parent element - L matrix of shape function derivatives on parent element - G matrix of Cartesian derivatives of shape functions - X matrix of nodal coordinates of element - D matrix of elastic coefficients - B strain-displacement matrix - P part of boundary where tractions are prescribed - u part of boundary where displacements are prescribed - variable part of boundary - strain invariant  相似文献   

18.
As a notion dual to Knuth's nested formulas [4], we call a boolean formula in conjunctive normal formco-nested if its clauses can be linearly ordered (sayC={c i ;i=1,2, ...,n})so that the graphG cl =(XC, {xc i ;xc i or ¬xc i } {c i c i+1;i=1, 2, ...,n}) allows a noncrossing drawing in the plane so that the circlec 1,c 2, ...,c n bounds the outerface. Our main result is that maximum satisfiability of co-nested formulas can be decided in linear time.Both authors acknowledge a partial support of Ec Cooperative Action IC-1000 (project ALTEC:Algorithms for Future Technologies).  相似文献   

19.
We consider optimization of functions on combinatorial sets of permutations and n-arrangements mapped to E n (the images of these sets are denoted by A nk and B nk , respectively). Bounds are obtained on the minimum for convex and strongly convex functions on convex sets XA nk and XB nk . A theorem on the sufficient condition for a minimum of a convex function on A nk is proved.Translated from Kibernetika, No. 3, pp. 83–87, May–June, 1989.  相似文献   

20.
Yang Cai  M. C. Kong 《Algorithmica》1996,15(6):572-599
In this paper we study the problem of scheduling a set of periodic tasks nonpreemptively in hard-real-time systems, where it is critical for all requests of the tasks to be processed in time. A taskT is characterized by itsarrival time A, itsperiod P, and itsexecution time C. Starting fromA, a new request ofT arrives in everyP units of time, requestingC units of processing time, and itsdeadline coincides with the arrival of the next request ofT. All requests must be processed nonpreemptively to meet their corresponding deadlines. We show that the problem of testing the feasibility of a given task set {T 1,T 2,,T n} satisfyingP 1+1=ki pi, wherek i; is an integer 1 for 1i n–1, on a single processor is NP-hard in the strong sense, even if all tasks have the same arrival time. For task sets satisfyingP i+1=K Pi, whereK is an integer 2 for 1 i n–1 and all tasks have the same arrival time, we present linear-time (in the number of requests) optimal scheduling algorithms as well as linear-time (in the number of tasks, i.e.,n) algorithms for testing feasibility in both uniprocessor and multiprocessor systems. We also extend our results to more general task sets.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号