首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A new variance-based global sensitivity analysis technique   总被引:2,自引:0,他引:2  
A new set of variance-based sensitivity indices, called WW-indices, is proposed. Similar to the Sobol’s indices, both main and total effect indices are defined. The WW-main effect indices measure the average reduction of model output variance when the ranges of a set of inputs are reduced, and the total effect indices quantify the average residual variance when the ranges of the remaining inputs are reduced. Geometrical interpretations show that the WW-indices gather the full information of the variance ratio function, whereas, Sobol’s indices only reflect the marginal information. Then the double-loop-repeated-set Monte Carlo (MC) (denoted as DLRS MC) procedure, the double-loop-single-set MC (denoted as DLSS MC) procedure and the model emulation procedure are introduced for estimating the WW-indices. It is shown that the DLRS MC procedure is suitable for computing all the WW-indices despite its highly computational cost. The DLSS MC procedure is computationally efficient, however, it is only applicable for computing low order indices. The model emulation is able to estimate all the WW-indices with low computational cost as long as the model behavior is correctly captured by the emulator. The Ishigami function, a modified Sobol’s function and two engineering models are utilized for comparing the WW- and Sobol’s indices and verifying the efficiency and convergence of the three numerical methods. Results show that, for even an additive model, the WW-total effect index of one input may be significantly larger than its WW-main effect index. This indicates that there may exist interaction effects among the inputs of an additive model when their distribution ranges are reduced.  相似文献   

2.
Many different constructions for (t,m,s)(t,m,s)-nets and (t,s)(t,s)-sequences are known today. Propagation rules as well as connections to other mathematical objects make it difficult to determine the best net available in a given setting.  相似文献   

3.
A zero-sum k-flow for a graph G   is a vector in the null-space of the 0,10,1-incidence matrix of G   such that its entries belong to {±1,?,±(k−1)}{±1,?,±(k1)}. Akbari et al. (2009) [5] conjectured that if G is a graph with a zero-sum flow, then G   admits a zero-sum 6-flow. (2,3)(2,3)-semiregular graphs are an important family in studying zero-sum flows. Akbari et al. (2009) [5] proved that if Zero-Sum Conjecture is true for any (2,3)(2,3)-semiregular graph, then it is true for any graph. In this paper, we show that there is a polynomial time algorithm to determine whether a given (2,3)(2,3)-graph G   has a zero-sum 3-flow. In fact, we show that, there is a polynomial time algorithm to determine whether a given (2,4)(2,4)-graph G with n   vertices has a zero-sum 3-flow, where the number of vertices of degree four is O(log?n)O(log?n). Furthermore, we show that it is NP-complete to determine whether a given (3,4)(3,4)-semiregular graph has a zero-sum 3-flow.  相似文献   

4.
This paper introduces the topological finiteness condition finite derivation type   (FDT) on the class of semigroups. This notion is naturally extended from the monoid case. With this new concept we are able to prove that if a Rees matrix semigroup M[S;I,J;P]M[S;I,J;P] has FDT then the semigroup SS also has FDT. Given a monoid SS and a finitely presented Rees matrix semigroup M[S;I,J;P]M[S;I,J;P] we prove that if the ideal of SS generated by the entries of PP has FDT, then so does M[S;I,J;P]M[S;I,J;P]. In particular, we show that, for a finitely presented completely simple semigroup MM, the Rees matrix semigroup M=M[S;I,J;P]M=M[S;I,J;P] has FDT if and only if the group SS has FDT.  相似文献   

5.
We introduce a general notion of miniaturization of a problem that comprises the different miniaturizations of concrete problems considered so far. We develop parts of the basic theory of miniaturizations. Using the appropriate logical formalism, we show that the miniaturization of a definable problem in W[t]W[t] lies in W[t]W[t], too. In particular, the miniaturization of the dominating set problem is in W[2]W[2]. Furthermore, we investigate the relation between f(k)·no(k)f(k)·no(k) time and subexponential time algorithms for the dominating set problem and for the clique problem.  相似文献   

6.
A real xx is called hh-bounded computable  , for some function h:N→Nh:NN, if there is a computable sequence (xs)(xs) of rational numbers which converges to xx such that, for any n∈NnN, at most h(n)h(n) non-overlapping pairs of its members are separated by a distance larger than 2-n2-n. In this paper we discuss properties of hh-bounded computable reals for various functions hh. We will show a simple sufficient condition for a class of functions hh such that the corresponding hh-bounded computable reals form an algebraic field. A hierarchy theorem for hh-bounded computable reals is also shown. Besides we compare semi-computability and weak computability with the hh-bounded computability for special functions hh.  相似文献   

7.
8.
Consider the following problem, which we call “Chordless path through three vertices” or CP3V, for short: Given a simple undirected graph G=(V,E)G=(V,E), a positive integer k, and three distinct vertices s, t  , and v∈VvV, is there a chordless path of length at most k from s   via vv to t in G? In a chordless path, no two vertices are connected by an edge that is not in the path. Alternatively, one could say that the subgraph induced by the vertex set of the path in G is the path itself. The problem has arisen in the context of service deployment in communication networks. We resolve the parametric complexity of CP3V by proving it W[1]W[1]-complete with respect to its natural parameter k  . Our reduction extends to a number of related problems about chordless paths and cycles. In particular, deciding on the existence of a single directed chordless (s,t)(s,t)-path in a digraph is also W[1]W[1]-complete with respect to the length of the path.  相似文献   

9.
We introduce a new lambda calculus with futures, λ(fut)λ(fut), that models the operational semantics of concurrent statically typed functional programming languages with mixed eager and lazy threads such as Alice ML, a concurrent extension of Standard ML. λ(fut)λ(fut) is a minimalist extension of the call-by-value λλ-calculus that is sufficiently expressive to define and combine a variety of standard concurrency abstractions, such as channels, semaphores, and ports. Despite its minimality, the basic machinery of λ(fut)λ(fut) is sufficiently powerful to support explicit recursion and call-by-need evaluation.  相似文献   

10.
We describe O(n)O(n) time algorithms for finding the minimum weighted dominating induced matching of chordal, dually chordal, biconvex, and claw-free graphs. For the first three classes, we prove tight O(n)O(n) bounds on the maximum number of edges that a graph having a dominating induced matching may contain. By applying these bounds, and employing existing O(n+m)O(n+m) time algorithms we show that they can be reduced to O(n)O(n) time. For claw-free graphs, we describe a variation of the existing algorithm for solving the unweighted version of the problem, which decreases its complexity from O(n2)O(n2) to O(n)O(n), while additionally solving the weighted version. The same algorithm can be easily modified to count the number of DIM's of the given graph.  相似文献   

11.
We show how to calculate three low degree set-theoretic generators (i.e., algebraic surfaces) for all rational space curves of low degree (degree ≤66) as well as for all higher degree rational space curves where at least one element of their μμ-basis has degree 1 from a μμ-basis of the parametrization. In addition to having low degree, at least two of these surface generators are always ruled surfaces. Whenever possible we also show how to compute two set-theoretic complete intersection generators for these rational space curves from a μμ-basis of their parametrization.  相似文献   

12.
Consider a probabilistic graph G   in which the edges of E(G)E(G) are perfectly reliable, but the vertices of V(G)V(G) may fail with some known probabilities. Given a subset K   of V(G)V(G), the K-terminal residual reliability of G is the probability that all operational vertices in K are connected to each other. This problem can be considered to be a generalization of two well-known reliability problems – the K-terminal reliability problem and the residual connectedness reliability problem.  相似文献   

13.
This paper deals with the multicriteria 0-1 knapsack problem (KP) with kk-min objectives (MkMIN-KP) in which the first objective is of classical sum type and the remaining objectives are kk-min objective functions. The kk-min objectives are ordinal objectives, aiming at the maximization of the kk th smallest objective coefficient in any feasible knapsack solution with at least kk items in the knapsack. We develop efficient algorithms for the determination of the complete nondominated set of MkMIN-KP.  相似文献   

14.
Motivated by the famous 3n+13n+1 conjecture, we call a mapping from ZZ to ZZresidue-class-wise affine   if there is a positive integer mm such that it is affine on residue classes (mod mm). This article describes a collection of algorithms and methods for computation in permutation groups and monoids formed by residue-class-wise affine mappings.  相似文献   

15.
The local bb-function bf,p(s)bf,p(s) of an nn-variate polynomial f∈C[x]fC[x] (x=(x1,…,xn)x=(x1,,xn)) at a point p∈CnpCn is constant on each stratum of a stratification of CnCn. We propose a new method for computing such a stratification and bf,p(s)bf,p(s) on each stratum. In the existing method proposed in Oaku (1997b), a primary ideal decomposition of an ideal in C[x,s]C[x,s] is needed and our experiment shows that the primary decomposition can be a bottleneck for computing the stratification. In our new method, the computation can be done by just computing ideal quotients and examining inclusions of algebraic sets. The precise form of a stratum can be obtained by computing the decomposition of the radicals of the ideals in C[x]C[x] defining the stratum. We also introduce various techniques for improving the practical efficiency of the implementation and we show results of computations for some examples.  相似文献   

16.
We answer two questions that naturally arise while dealing with Hoffman's celebrated 50-year-old linear program to be solved by the primal simplex method, where an angle θθ and a scaling factor ωω are adjustable parameters. In particular, we determine what conditions have to be imposed on ωω for classical cycling to occur with θ=2π/5θ=2π/5, and what on θθ with ω=±tan(θ)ω=±tan(θ). The first answer reveals that the sufficient condition widely spread over the literature is false, so fixing it turns this example into a correct example of classical cycling. Some progress towards necessary and sufficient conditions for cycling to occur in this example is also reported.  相似文献   

17.
Given a graph GG, an integer kk, and a demand set D={(s1,t1),…,(sl,tl)}D={(s1,t1),,(sl,tl)}, the kk-Steiner Forest problem finds a forest in graph GG to connect at least kk demands in DD such that the cost of the forest is minimized. This problem was proposed by Hajiaghayi and Jain in SODA’06. Thereafter, using a Lagrangian relaxation technique, Segev et al. gave the first approximation algorithm to this problem in ESA’06, with performance ratio O(n2/3logl)O(n2/3logl). We give a simpler and faster approximation algorithm to this problem with performance ratio O(n2/3logk)O(n2/3logk) via greedy approach, improving the previously best known ratio in the literature.  相似文献   

18.
19.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

20.
This paper analyzes (r|p)-centroid(r|p)-centroid problems on networks with vertex and edge demand under a binary choice rule. Bilevel programming models are presented for the discrete problem class. Furthermore, NP-hardness proofs for the discrete and continuous (1|p)-centroid(1|p)-centroid problem on general networks with edge demand only are provided. Nevertheless, an efficient algorithm to determine a discrete (1|p)-centroid(1|p)-centroid of a tree network with vertex and edge demand can be derived.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号