首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Each permutation (a1, a2,…, an) of 1, 2,…, n determines a sequence of “<” and “>” relations determined by the relat holding between adjacent values (ai, ai + 1). A new and elementary algorithm is given, which, for every such pattern of “<”, “>” relations, computes the number of permutations with that pattern. The algorithm enables one to calculate (in bits) the amount of information gained by comparing all adjacent pairs of elements in a list. It also has a simple extension to circular patterns of relations.  相似文献   

2.
We discuss the problem of scheduling af set of independent tasks T, each ti ϵ T of lenght ℓi ϵ Z+, on m identical processors. We allow preemption but assume a communication delay of time k ϵ N. Whenever a task is preempted from one processor to another, there must be a delay of at least k time units. We show that if k = 1, an optimal schedule can be found in polynomial time but if k ⩾ 2, the corresponding decision problem is NP-complete.  相似文献   

3.
The process of semi-Markov wandering with delaying screens “b” and “a” (a > b > 0) is constructed by the given sequence of independent and identically distributed random vectors (ξ i , η i ), i ≥ 1. The integral equation for the Laplace transform by time and the Laplace-Stieltjes transform by the phase of its conditional distribution is derived. If the wandering occurs by a complicated Laplace distribution, the ergodic distribution of the process and its moments are found. Then, the integral equation for the generating function of the conditional distribution of the number of process steps at which it firstly reaches the level a is derived. When the wandering occurs by the simple Laplace distribution, its generating functions and moments are found.  相似文献   

4.
Now we introduce the existential quantifier Σ (read “there is some …”) and the universal quantifier II (read “all,” or “everybody” or “everything”). Application of a quantifier to a triada gives a lower structure (a structure with a lower number of blanks). For example, Hjk = iGijk reads “there is some who gives __ to __,” (S29) that is, a diadic structure.  相似文献   

5.
Let T = (V,E) be a rooted tree with n edges. We associate a non‐negative weight w(v) with each vertex v in V. A q‐partition of T into q connected components T1,...,Tq is obtained by deleting k = q‐1 edges of T, 1<=q<=n. Let w(Ti) denote the sum of the weights of the vertices in Ti. The height of 7] is denoted by h(Ti).

The following problem is considered: Given W, H>0, find a q‐partition satisfying w(Ti) <=W, height (Ti) <=,H (1<=i<=q) for which q is a minimum.

A bottom‐up polynomial time algorithm is given for this problem which has complexity 0(Hn), or independently of H, 0(height(T)n).  相似文献   

6.
An upperbound to the probability of error per class in a multivariate pattern classification is derived. The bound, given by
P(E|class wi)≤NR2i
is derived with minimal assumptions; specifically the mean vectors exist and are distinct and the covariance matrices exist and are non-singular. No other assumptions are made about the nature of the distributions of the classes. In equation (i) N is the number of features in the feature (vector) space and Ri is a measure of the “radial neighbourhood” of a class. An expression for Ri is developed. A comparison to the multivariate Gaussian hypothesis is presented.  相似文献   

7.
The finite element method has been used to find an approximate lumped parameter model of a non-linear distributed parameter system. A one dimensional non-linear dispersion system is considered. The space domain is divided into a finite set of k elements. Each element, has n nodes. Within each element the concentration is represented by C(x,t)(e) = [N][C] T where [N] = [n1(x),n2(x), [tdot] nn(x)] and [C] = [C1(t),C2(t), [tdot] Cn(t)]. By using Galerkin's criterion a set of (k × n ? n+ 1) first order differential equations are obtained for Ci(t). These equations are solved by an iterative method. The concepts are illustrated by an example taking five three-node elements in the space domain. The results are compared with those obtained by a finite difference method. It is shown that the finite element method can be used effectively in modelling of a distributed system by a lumped system.  相似文献   

8.
Local iteration methods for the solution of nonlinear operator equationsT(x)=0 can be “globalized” by the method of embedding. This means that the initial valuex 0 need not be in the neighbourhood of a solution \(\bar x\) . We restrict ourselves to a stepwise calculation — see [17] — where one solves the chain of problems:T(x, s i )=0, 0=s 0<s 1<...<s N =1 by a local iteration method with the solutionx i?1 ofT(x, s i?1)=0 used as initial vector forT(x, s i )=0. In this paper we examine methods of minimal-residue-type. Results on the minimization of the whole effort by selection of an “optimal” step width can be obtained. Furthermore, a global convergence acceleration can be reached by suitable adaption of (linear) interpolation on the step width. The reslts obtained can be transferred without difficulties to any other local iteration method which is based on the principle contraction.  相似文献   

9.
We consider a single-server queueing system with a finite buffer, K input Poisson flows of intensities i , and distribution functions B i (x) of service times for calls of the ith type, . If the buffer is overflowed, an arriving call is sent to the orbit and becomes a repeat call. In a random time, which has exponential distribution, the call makes an attempt to reenter the buffer or server, if the latter is free. The maximum number of calls in the orbit is limited; if the orbit is overflowed, an arriving call is lost. We find the relation between steady-state distributions of this system and a system with one Poisson flow of intensity where type i of a call is chosen with probability i / at the beginning of its service. A numerical example is given.  相似文献   

10.
We model a server that allocates varying amounts of bandwidth to “customers” during service. Customers could be computer jobs with demands for storage bandwidth or they could be calls with demands for transmission bandwidth on a network link. Service times are constants, each normalized to 1 time unit, and the system operates in discrete time, with packing (scheduling) decisions made only at integer times. Demands for bandwidths are for fractions of the total available and are limited to the discrete set {1/k, 2/k, …, 1} wherek is a given parameter. More than one customer can be served at a time, but the total bandwidth allocated to the customers in service must be at most the total available. Customers arrive ink flows and join a queue. Thejth flow has rate λ j and contains just those customers with bandwidth demandsj/k. We study the performance of the two packing algorithms First Fit and Best Fit, both allocating bandwidth by a greedy rule, the first scanning the queue in arrival order and the second scanning the queue in decreasing order of bandwidth demand. We determine necessary and sufficient conditions for stability of the system under the two packing rules. The average total bandwidth demand of the arrivals in a time slot must be less than 1 for stability under any packing rule, i.e., the condition $$\rho {\text{ : = }}\sum\limits_i {\lambda i\left( {i/k} \right)} {\text{< 1}}$$ must hold. We prove that if the arrival rates λ1, …, λ k?1 are symmetric, i.e., λ i k?i for alli, 1 ≤ik ? 1, theρ<1 is also sufficient for stability under both rules. Our Best Fit result strengthens an earlier result confined to Poisson flows and equal rates λ1=…=λ k ? 1, and does so using a far simper proof. Our First Fit result is completely new. The work here extends earlier results on bandwidth packing in multimedia communication systems, on storage allocation in computer systems, and on message transmission along slotted communication channels. It is not surprising thatρ<1 is sufficient under Best Fit, since in a congested system, Best Fit tends to serve two complementary (matched) customers in each time slot, with bandwidth demands beingi/k and (k ? i)/k for somei, 1 ≤ik ? 1. It is not so obvious, however, thatρ<1 is also sufficient under First Fit. Interestingly, when the system becomes congested, First Fit exhibits a “self-organizing” property whereby an ordering of the queue by time of arrival becomes approximately the same as an ordering by decreasing bandwidth demand.  相似文献   

11.
Let r be a relation for the relation scheme R(A1,A2,…,An); then we define Dom(r) to be Domr(A1)×Domr(A2)×…×Domr(An), where Domr(Ai) for each i is the set of all ith coordinates of tuples of r. A relation s is said to be a substructure of the relation r if and only if Dom(s)∩r = s.The following theorems analogous to Tarski-Fraisse-Vaught's characterizations of universal classes are proved: (i) An implicational dependency family (ID-family) F over the relation scheme R is finitely specifiable if and only if there exists a finite number of relations r1,r2,…,rm for R such that r ∈ F if and only if no ri is isomorphic to a substructure of r. (ii) F is finitely specifiable if and only if there exists a natural number k such that r ∈ F whenever F contains all substructures of r with at most k elements.We shall use these characterizations to obtain a new proof for Hull's (1984) characterization of finitely specifiable ID-families.  相似文献   

12.
Consider the time-invariant system E[xdot] = Ax + Bu, y = Cx where E is a square matrix that may be singular. The problem is to find constant matrices K and L, such that the feedback law u = Ky+L[ydot] yields x = exp (λt)vi (where vi is some constant vector) for some preassigned λi (i=l, 2, [tdot], r). This problem is equivalent to that of finding K and L which makes a preassigned λ i an eigenvalue corresponding to the general eigenvalue problem {λ(E ? BLC) ? (A + BKC)}v=0. Using matrix generalized inverses, a method is developed for the construction of a linear system of equations from which the elements of K and L may be computed.  相似文献   

13.
We introduce the following elementary scheduling problem. We are given a collection of n jobs, where each job J i has an integer length ? i as well as a set T i of time intervals in which it can be feasibly scheduled. Given a parameter B, the processor can schedule up to B jobs at a timeslot t so long as it is “active” at t. The goal is to schedule all the jobs in the fewest number of active timeslots. The machine consumes a fixed amount of energy per active timeslot, regardless of the number of jobs scheduled in that slot (as long as the number of jobs is non-zero). In other words, subject to ? i units of each job i being scheduled in its feasible region and at each slot at most B jobs being scheduled, we are interested in minimizing the total time during which the machine is active. We present a linear time algorithm for the case where jobs are unit length and each T i is a single interval, assuming that jobs are given in sorted order. For general T i , we show that the problem is NP-complete even for B=3. However when B=2, we show that it can be efficiently solved. In addition, we consider a version of the problem where jobs have arbitrary lengths and can be preempted at any point in time. For general B, the problem can be solved by linear programming. For B=2, the problem amounts to finding a triangle-free 2-matching on a special graph. We extend the algorithm of Babenko et al. (Proceedings of the 16th Annual International Conference on Computing and Combinatorics, pp. 120–129, 2010) to handle our variant, and also to handle non-unit length jobs. This yields an \(O(\sqrt{L} m)\) time algorithm to solve the preemptive scheduling problem for B=2, where L=∑ i ? i . We also show that for B=2 and unit length jobs, the optimal non-preemptive schedule has active time at most 4/3 times that of the optimal preemptive schedule; this bound extends to several versions of the problem when jobs have arbitrary length.  相似文献   

14.
We consider the parallel time complexity of logic programs without function symbols, called logical query programs, or Datalog programs. We give a PRAM algorithm for computing the minimum model of a logical query program, and show that for programs with the “polynomial fringe property,” this algorithm runs in time that is logarithmic in the input size, assuming that concurrent writes are allowed if they are consistent. As a result, the “linear” and “piecewise linear” classes of logic programs are inN C. Then we examine several nonlinear classes in which the program has a single recursive rule that is an “elementary chain.” We show that certain nonlinear programs are related to GSM mappings of a balanced parentheses language, and that this relationship implies the “polynomial fringe property;” hence such programs are inN C Finally, we describe an approach for demonstrating that certain logical query programs are log space complete forP, and apply it to both elementary single rule programs and nonelementary programs.  相似文献   

15.
We consider a system of N points x 1 < ... < x N on a segment of the real line. An ideal system (crystal) is a system where all distances between neighbors are the same. Deviation from idealness is characterized by a system of finite differences ? i 1 = x x+1 ? x i , ? i k+1 = ? i+1 k ? ? i k , for all possible i and k. We find asymptotic estimates as N ?? ??, k????, for a system of points minimizing the potential energy of a Coulomb system in an external field.  相似文献   

16.
The influence of in-plane boundary conditions on the critical loads of axially compressed simply supported stiffened cylindrical shells, stiffened by stringers and by combinations of rings and stringers is studied. It is observed that the axial restraint, u = 0, at the edges and the dimensions of either the stringers or the rings characterize the type of influence experienced. In shells stiffened by “medium” and “heavy” stringers the axial restraint is a predominant factor and the “weak in shear”, N = 0, B.Cs. have only a slight secondary effect. For such shells a “stiffening” effect is observed for SS2 and SS4 B.Cs. As the stringers become “weaker” the influence of the axial restraint diminishes and the isotropic or ring-stiffened like type of behavior, “sensitivity” to the vanishing of the circumferential restraint, overcomes the “stiffening” effect due to u = 0.In shells stiffened by combinations of rings and stringers the influence of the in-plane boundary conditions is governed by the relative magnitudes of the rings and stringers under consideration. Combinations of “heavy” stringers and “weak” rings behave like stringer-stiffened shells, exhibiting the “stiffening” effect due to u = 0 whereas shells stiffened by “heavy” rings and “light” stringers tend to behave like ring-stiffened shells, revealing their “sensitivity” to the “weak in shear” boundary conditions, N = 0.  相似文献   

17.
This paper presents preliminary efficacy data in a controlled study of the use of a virtual reality (VR) system for treating stress-related disorders (Post-Traumatic Stress Disorder, or PTSD; Pathological Grief, or PG; and Adjustment Disorders, or AD). “EMMA's World” is a VR application in which patients can explore negative experiences to the degree required for their specific therapeutic needs. To accomplish therapeutic goals, a series of virtual elements is customized to be meaningful to the user; the elements contain the fundamental emotional components that the person must confront. Thirty-nine participants diagnosed with PTSD (N=10), PG (N=16), and AD (N=13) were randomly assigned to a standard cognitive-behavioral program (CBT) (N=20) or a CBT program driven by EMMA's World (N=19). Participants were assessed before and after treatment. Measurements related to anxiety, depression and other emotions, maladjustment and interference were applied. Results indicate that CBT with EMMA's World was as effective as the standard CBT program for the treatment of these disorders, and the statistically significant differences (depression, relaxation intensity and social area interference) were in favor of EMMA's World. We expect VR to provide a positive alternative that will draw in clients who do not seek traditional forms of treatment.  相似文献   

18.
A merging of two ordered lists x1,…,xp and y1,…:,yq is said to be constrained if it must satisfy prescribed conditions form “xi precedes yj” and “yr precedes xs”. An algorithm is given for calculating the number of mergings which satisfy any given set of constraints. The algorithm has time complexity O(pq) but in many cases runs significantly faster. It is illustrated with examples which involve the Catalan and Fibonacci numbers.  相似文献   

19.
Lundberg  Lars 《Real-Time Systems》2002,23(3):273-295
Some real-time systems consist of a number of processes that operate under age constraints. In such systems, the maximum time from the start of process L i in cycle k to the end in cycle k+1 must not exceed the age constraint A i for that process. The age constraint can be met by using fixed priority scheduling and periods equal to A i/2. However, this approach restricts the number of process sets which are schedulable. In this paper, we define a method for obtaining process periods other than A i/2. The periods are calculated in such a way that the age constraints are met. Our approach is better in the sense that a larger number of process sets can be scheduled compared to using periods equal to A i/2. The main results in this paper are a number of performance bounds on age constraint processes. These bounds show that there is a significant gain in worst case as well as in best case behavior by using periods other than A i/2, particularly when there are a large number of processes in the system.  相似文献   

20.
On August 11, 2021, the US Federal Emergency Management Agency and Federal Communications Commission (FCC) conducted the second national test of the wireless emergency alerts (WEA) system. The first test was conducted in 2018. This study offers an analysis of a nationwide survey (N = 1056) administered in the days immediately following the 2021 national test. The analysis indicates that a substantial number of respondents do not well understand the uses of the WEA system, especially the “National Alert” message class. However, more respondents believe that the “National Alert” message class label would signal more trustworthy information than the “Presidential Alert” message class label, a finding that bolsters the FCC's 2021 decision to abandon the “Presidential Alert” message class label. Despite a lack of accurate understanding of message classes and opt-out options, a substantial number of respondents trust the WEA system to work properly. A clear majority of respondents would appreciate device-based public education materials about the WEA system. The implications of the survey findings for WEA system management and public education are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号