首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In many real-life situations, we want to reconstruct the dependencyy=f(x 1,…, xn) from the known experimental resultsx i (k) , y(k). In other words, we want tointerpolate the functionf from its known valuesy (k)=f(x 1 (k) ,…, x n (k) ) in finitely many points $\bar x^{(k)} = (x_1^{(k)} , \ldots ,x_n^{(k)} )$ , 1≤kN There are many functions that go through given points. How to choose one of them? The main goal of findingf is to be able to predicty based onx i. If we getx i from measurements, then usually, we only getintervals that containx i. As a result of applyingf, we get an interval y of possible values ofy. It is reasonable to choosef for which the resulting interval is the narrowest possible. In this paper, we formulate this choice problem in mathematical terms, solve the corresponding problem for several simple cases, and describe the application of these solutions to intelligent control.  相似文献   

2.
We consider several questions inspired by the direct-sum problem in (two-party) communication complexity. In all questions, there are k fixed Boolean functions f 1,…,f k and each of Alice and Bob has k inputs, x 1,…,x k and y 1,…,y k , respectively. In the eliminate problem, Alice and Bob should output a vector σ1,…,σ k such that f i (x i , y i ) ≠ σ i for at least one i (i.e., their goal is to eliminate one of the 2 k output vectors); in the choose problem, Alice and Bob should return (i, f i (x i , y i )), for some i (i.e., they choose one instance to solve), and in the agree problem they should return f i (x i , y i ), for some i (i.e., if all the k Boolean values agree then this must be the output). The question, in each of the three cases, is whether one can do better than solving one (say, the first) instance. We study these three problems and prove various positive and negative results. In particular, we prove that the randomized communication complexity of eliminate, of k instances of the same function f, is characterized by the randomized communication complexity of solving one instance of f.  相似文献   

3.
《国际计算机数学杂志》2012,89(6):1228-1232
In 2003, Balibrea et al. stated the problem of finding a skew-product map G on 𝕀3 holding ω G ={0}×𝕀2 G (x, y, z) for any (x, y, z)∈𝕀3, x≠0. We present a method for constructing skew-product maps F on 𝕀 n+1 holding ω F ={0}×𝕀 n F (x 1, x 2, …, x n+1), (x 1, x 2, …, x n+1)∈𝕀 n+1, x 1≠0.  相似文献   

4.
In many problems, modular exponentiation |xb|m is a basic computation, often responsible for the overall time performance, as in some cryptosystems, since its implementation requires a large number of multiplications.It is known that |xb|m=|x|b|(m)|m for any x in [1,m−1] if m is prime; in this case the number of multiplications depends on (m) instead of depending on b. It was also stated that previous relation holds in the case m=pq, with p and q prime; this case occurs in the RSA method.In this paper it is proved that such a relation holds in general for any x in [1,m−1] when m is a product of any number n of distinct primes and that it does not hold in the other cases for the whole range [1,m−1].Moreover, a general method is given to compute |xb|m without any hypothesis on m, for any x in [1,m−1], with a number of modular multiplications not exceeding those required when m is a product of primes.Next, it is shown that representing x in a residue number system (RNS) with proper moduli mi allows to compute |xb|m by n modular exponentiations |xib|mi in parallel and, in turn, to replace b by |b|(mi) in the worst case, thus executing a very low number of multiplications, namely log2mi for each residue digit.A general architecture is also proposed and evaluated, as a possible implementation of the proposed method for the modular exponentiation.  相似文献   

5.
《国际计算机数学杂志》2012,89(7):1533-1545
We consider a second-order damped-vibrational system described by the equation M ?+C(v) [xdot]+K x=0, where M, C(v), K are real, symmetric matrices of order n. We assume that the undamped eigenfrequencies (eigenvalues of (λ2 M+K) x=0) ω1, ω2, …, ω n , are multiple in the sense that ω12, ω34, …, ω n?1 n , or are given in close pairs ω1 ≈ ω2, ω3 ≈ ω4, …, ω n?1 ≈ ω n . We present a formula which gives the solution of the corresponding phase space Lyapunov equation, which then allows us to calculate the first and second derivatives of the trace of the solution, with no extra cost. It can serve for the efficient trace minimization.  相似文献   

6.
Let Γi ? Rm denote pattern classes with means γi and covariances Ri, i = 1, …, l respectively. The set {ψi} ? Rk denotes signatures for the pattern classes. A function f : RmRk is said to be a cluster function provided (i) f (γi) = ψi, i = 1, …, l and (ii) f minimizes a dispersion functional. This paper develops a complete theory for realization of polynomic cluster functions, including the linear case.  相似文献   

7.
In many problems in science and engineering ranging from astrophysics to geosciences to financial analysis, we know that a physical quantity y depends on the physical quantity x, i.e., y = f(x) for some function f(x), and we want to check whether this dependence is monotonic. Specifically, finitely many measurements of xi and y = f(x) have been made, and we want to check whether the results of these measurements are consistent with the monotonicity of f(x). An efficient parallelizable algorithm is known for solving this problem when the values xi are known precisely, while the values yi are known with interval uncertainty. In this paper, we extend this algorithm to a more general (and more realistic) situation when both xi and yi are known with interval uncertainty.  相似文献   

8.
Let f(xθ) = αθαx−(α+1)I(x>θ) be the pdf of a Pareto distribution with known shape parameter α>0, and unknown scale parameter θ. Let {(Xi, θi)} be a sequence of independent random pairs, where Xi's are independent with pdf f(xαi), and θi are iid according to an unknown distribution G in a class of distributions whose supports are included in an interval (0, m), where m is a positive finite number. Under some assumption on the class and squared error loss, at (n + 1)th stage we construct a sequence of empirical Bayes estimators of θn+1 based on the past n independent observations X1,…, Xn and the present observation Xn+1. This empirical Bayes estimator is shown to be asymptotically optimal with rate of convergence O(n−1/2). It is also exhibited that this convergence rate cannot be improved beyond n−1/2 for the priors in class .  相似文献   

9.
RELION is an abbreviation for the relay-linear control law. It as a double structure—relay and linear—and it is a modification of the constructive time-sub-optimal control law, u = sgn(pMx + sgn(pM-1 + … + sgn(p2x + sgnpix)…)). For determining the RELION it is necessary to calculate the n-vectors p1,… pm and to evaluate the factor K of the linear control law u = Kp1x. Two algorithms for calculating these parameters are presented.  相似文献   

10.
11.
The communication complexity of a function f denotes the number of bits that two processors have to exchange in order to compute f(x, y), when each processor knows one of the variables x and y, respectively. In this paper the deterministic communication complexity of sum-type functions, such as the Hamming distance and the Lee distance, is examined. Here f: X × XG, where X is a finite set and G is an Abelian group, and the sum-type function fn:Xn × XnG is defined by fn((x1, ..., xn), (y1, ..., yn)) = Σni=1f(xi, yi) Since the functions examined are also translation-invariant, their function matrices are simultaneously diagonalizable and the corresponding eigenvalues can be calculated. This allows to apply a rank lower bound for the communication complexity. The best results are obtained for G = /2 . For prime numbers |X| in this case the communication complexity of all non-trivial sum-type functions is determined exactly. Exact results are also obtained for the parity of the Hamming distance and the parity of the Lee distance. For the Hamming distance and the Lee distance exact results are only obtained for special parameters n and |X|.  相似文献   

12.
The determinantal complexity of a polynomial f(x 1,x 2,…,x n ) is the minimum m such that f=det  m (L(x 1,x 2,…,x n )), where L(x 1,x 2,…,x n ) is a matrix whose entries are affine forms in the x i s over some field $\mbox {$\mbox {.  相似文献   

13.
Function approximation is a very important practical problem: in many practical applications, we know the exact form of the functional dependence y=f(x1,…,xn) between physical quantities, but this exact dependence is complicated, so we need a lot of computer space to store it, and a lot of time to process it, i.e., to predict y from the given xi. It is therefore necessary to find a simpler approximate expression g(x1,…,xn)≈f(x1,…,xn) for this same dependence. This problem has been analyzed in numerical mathematics for several centuries, and it is, therefore, one of the most thoroughly analyzed problems of applied mathematics. There are many results related to approximation by polynomials, trigonometric polynomials, splines of different type, etc. Since this problem has been analyzed for so long, no wonder that for many reasonable formulations of the optimality criteria, the corresponding problems of finding the optimal approximations have already been solved. Lately, however, new clustering‐related techniques have been applied to solve this problem (by Yager, Filev, Chu, and others). At first glance, since for most traditional optimality criteria, optimal approximations are already known, the clustering approach can only lead to non‐optimal approximations, i.e., approximations of inferior quality. We show, however, that there exist new reasonable criteria with respect to which clustering‐based function approximation is indeed the optimal method of function approximation. © 2000 John Wiley & Sons, Inc.  相似文献   

14.
A finite function f is a mapping of {0, 1}n into {0, 1}m{#}, where “#” is a symbol to be thought of as “undefined.” A family of finite functions is said to be one-way (in a circuit complexity sense) if it can be computed with polynomial-size circuits, but every family of inverses of these functions cannot. In this paper we show that, provided functions that are not one-to-one are allowed, one-way functions exist if and only if the satisfiability problem SAT does not have polynomial-size circuits. A family of functions fi(x) can be checked if some family of polynomial-size circuits with inputs x and y can determine if fi(x) = y. A family of functions fi(x) can be evaluated if some family of polynomial-size circuits with input x can compute fi(x). Can all families of total functions that can be checked also be evaluated? We show that this is true if and only if the nonuniform versions of the complexity classes P and UP co-UP are equal. A family of functions fi is one-way for constant depth circuits if fi can be computed with unbounded famin circuits of polynomial size and constant depth, but every family of inverses fi−1 cannot. We give two provably one-way functions (in fact permutaions) for constant-depth circuits. The second example has the stronger property that no bit of its inverse can be computed in polynomial size and constant depth.  相似文献   

15.
The methods for discrete-integer-continuous variable nonlinear optimization are reviewed. They are classified into the following six categories: branch and bound, simulated annealing, sequential linearization, penalty functions, Lagrangian relaxation, and other methods. Basic ideas of each method are described and details of some of the algorithms are given. They are transcribed into a step-by-step format for easy implementation into a computer. Under other methods, rounding-off, heuristic, cutting-plane, pure discrete, and genetic algorithms are described. For nonlinear problems, none of the methods are guaranteed to produce the global minimizer; however, good practical solutions can be obtained.Notation BBM branch and bound method - D set of discrete values for all the discrete variables - D i set of discrete values for thei-th variable - d ij j-th discrete value for thei-th variable - f cost function to be minimized - f * upper bound for the cost function - g i i-th constraint function - IP integer programming - ILP integer linear programming - L Lagrangian - LP linear programming - m total number of constraints - MDLP mixed-discrete linear programming - MDNLP mixed-discrete nonlinear programming - n d number of discrete variables - NLP nonlinear programming - p number of equality constraints; acceptance probability used in simulated annealing - q i number of discrete values for thei-th variable - SLP sequential linear programming - SQP sequential quadratic programming - x design variable vector of dimension n - x iL smallest allowed value for thei-th variable - x iU largest allowed value for thei-th variable - the gradient operator  相似文献   

16.
17.
A. Ghizzetti 《Calcolo》1983,20(1):53-65
Summary A partition of the interval [x 0,x n+1] inton+1 subintervals [x i ,x i+1] (i=0,1,...,n) is considered. A spline functionf(x)∈C m , which coincides with a polynomialp i (x)[p i (x i )=y i ,p i (x i+1)=y i+1] of degreem+1 in [x i ,x i+1 ], is introduced. Such a spline depends onm arbitrary constants. These constants are determined minimizing the integral .   相似文献   

18.
19.
HereR andN denote respectively the real numbers and the nonnegative integers. Also 0 <n εN, ands(x) =x 1+...+x n when x = (x 1,...,x n) εR n. Adiagonal function of dimensionn is a mapf onN n (or any larger set) that takesN n bijectively ontoN and, for all x, y inN n, hasf(x) <f(y) whenevers(x) <s(y). We show that diagonalpolynomials f of dimensionn all have total degreen and have the same terms of that degree, so that the lower-degree terms characterize any suchf. We call two polynomialsequivalent if relabeling variables makes them identical. Then, up to equivalence, dimension two admits just one diagonal polynomial, and dimension three admits just two.  相似文献   

20.
HereN = {0, 1, 2, ...}, while a functionf onN m or a larger domain is apacking function if its restrictionf|N m is a bijection ontoN. (Packing functions generalize Cantor's [1]pairing polynomials, and yield multidimensional-array storage schemes.) We call two functionsequivalent if permuting arguments makes them equal. Alsos(x) =x 1 + ... +x m when x = (x 1,...,x m); and such anf is adiagonal mapping iff(x) <f(y) whenever x, y εN m ands(x) <s(y). Lew [7] composed Skolem's [14], [15] diagonal packing polynomials (essentially one for eachm) to constructc(m) inequivalent nondiagonal packing polynomials on eachN m. For eachm > 1 we now construct 2m−2 inequivalent diagonal packing polynomials. Then, extending the tree arguments of the prior work, we obtaind(m) inequivalent nondiagonal packing polynomials, whered(m)/c(m) → ∞ asm → ∞. Among these we count the polynomials of extremal degree.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号