首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We give a systematic treatment of distributivity for a monad and a comonad as arises in giving category theoretic accounts of operational and denotational semantics, and in giving an intensional denotational semantics. We do this axiomatically, in terms of a monad and a comonad in a 2-category, giving accounts of the Eilenberg–Moore and Kleisli constructions. We analyse the eight possible relationships, deducing that two pairs are isomorphic, but that the other pairs are all distinct. We develop those 2-categorical definitions necessary to support this analysis.  相似文献   

2.
This paper presents a new method of partition, named-splitting, of a point set ind-dimensional space. Given a pointG in ad-dimensional simplexT, T(G;i) is the subsimplex spanned by G and the ith facet ofT. LetS be a set ofn points inT, and let be a sequence of nonnegative integers 1, ..., nd+1 satisfying i=1 d+1 1=n The-splitter of (T, S) is a pointG inT such thatT(G;i) contains at least i points ofS in its closure for everyi=1, 2, ...,d + 1. The associated dissection is the re-splitting.The existence of a-splitting is shown for any (T, S) and, and two efficient algorithms for finding such a splitting are given. One runs inO(d2n logn + d3n) time, and the other runs inO(n) time if the dimensiond can be considered as a constant. Applications of re-splitting to mesh generation, polygonal-tour generation, and a combinatorial assignment problem are given.  相似文献   

3.
4.
The problem of evasion of a group of moving points from a nonlinear controlled object, whose goal is consecutively approach these points in a prescribed order, is analyzed. The movement of each point is defined uniquely by a scalar parameter chosen at the initial time instant. The controlled object minimizes a certain cost function, and the group of the points, acting cooperatively, maximize this cost function by choosing the parameters. Necessary optimality conditions for parameters are obtained. A model problem of an evasion of moving points from a vehicle is solved.  相似文献   

5.
Journal of Computer and Systems Sciences International - We model movements of a person swinging on a swing. We consider a flat three-link hinged mechanism as the main mechanical model of the...  相似文献   

6.
Deckard  Rick 《ITNOW》2008,50(1):27
A portable keyboard that's no larger than my phone, that's theiGo Stowaway.  相似文献   

7.
Murray Dow 《Parallel Computing》1995,21(12):1997-2005
There are many published algorithms for transposing a rectangular matrix in place, however none of these are suited to a vector processor. In this work we describe four methods and compare their speed and memory requirements to copying the matrix into workspace then back again in transposed order.  相似文献   

8.
9.
Phylogenetic trees and networks are leaf-labelled graphs that are used to describe evolutionary histories of species. The Tree Containment problem asks whether a given phylogenetic tree is embedded in a given phylogenetic network. Given a phylogenetic network and a cluster of species, the Cluster Containment problem asks whether the given cluster is a cluster of some phylogenetic tree embedded in the network. Both problems are known to be NP-complete in general. In this article, we consider the restriction of these problems to several well-studied classes of phylogenetic networks. We show that Tree Containment is polynomial-time solvable for normal networks, for binary tree-child networks, and for level-k networks. On the other hand, we show that, even for tree-sibling, time-consistent, regular networks, both Tree Containment and Cluster Containment remain NP-complete.  相似文献   

10.
In mid-1973, the Division of Computing Research, CSIKO, took delivery of a Control Data CVBER76 computer, which acts as the primary processing power of the CSIRO computer network (CSIRONET), replacing the Control Data 3600. The 3600, running under the DAD operating system, has been retained as a ‘front-end’ to the CYBER76 and continues to support the following functions:
  • 1 An interactive system allowing both editing and CYBER76 job submission
  • 2 Input of job files centrally from 3600 input devices, remotely from CSIRONET devices, or from interactive console users, and output of results similarly
  • 3 A permanent file (document) system, with tape archiving
This paper describes the linking of the CYBER76 to the 3600. Software for a CYBER76 PPU has been written and some changes to the 3600 and CYBER76 operating systems have been required.  相似文献   

11.
image-based control or visual servoing approach. It consists of positioning a camera according to the information perceived in the image. This is thus a very intuitive approach of animation. To be able to react automatically to modifications of the environment, we also considered the introduction of constraints into the control. This approach is thus adapted to highly reactive contexts (virtual reality, video games). Numerous examples dealing with classic problems in animation are considered within this framework and presented in this paper. Published online: 19 July 2001  相似文献   

12.
仿真机与微机PCI接口的设计   总被引:2,自引:1,他引:1       下载免费PDF全文
本文介绍了仿真机与微机通讯的PCI接口的设计,该接口可实现6.6MB/s的数据传输,满足仿真用户实时数据通讯的要求。本文还简介了双端口存储器DPM、DPM/DR11适配器、PCI控制器S5933与DR11适配器之间的接口。  相似文献   

13.
Personal computers are becoming almost as common as pocket calculators. In particular, their use in laboratories for measurement and control is growing. The next step after computer-controlled instruments is the development of a personal computer with an instrument as a component part. An automatic pH titrator has been designed. The system presented is based on an Apple Ile. Two plug-in cards are used. One card integrates analogue measurement and analogue-to-digital conversion. The other card controls a syringe driven by a stepper motor. The software control system for the personal pH meter is also described.  相似文献   

14.
This paper specifies the functional design of a robot or machine tool controller suitable for inclusion in robotic manufacturing systems. The principle interest is the unmanned manufacturing cells which are being developed as major components of new manufacturing facilities. The functional specifications are motivated by recent experiences with the creation of a prototype cell for an open die forging process. There are two key technical design requirements. The first relates to the robot or machine tool being controlled. The controller must direct the machine actions, and, for unmanned operation, the controller must receive and process sensor information for process modification and for fault tolerance. The second relates to communication with the central cell computer (the host). The operation of an unmanned system requires a robot communication channel between the host and the controller; the controller must also respond to a variety of instructions transmitted from the host. Additional controller design requirements are imposed by economics. The proposed controller can be used today, and can develop in an evolutionary manner to meet the needs of future manufacturing systems. The evolutionary development is made possible by modular design, organized in a hierarchical manner.  相似文献   

15.
A formulation and solution procedure of optimal control problems for perturbed relative uniform motion of a body with a cavity filled with a viscous incompressible fluid are proposed. In this paper, the case with a cylinder is considered; however, this approach is basically true for the a cavity of an arbitrary form. The formula for the angular velocity of perturbed motion depending on an external perturbing element is devised. After that, we have a possibility to set different optimal control problems and apply the formalism elaborated in the optimal control theory. Two illustrated problems are given.  相似文献   

16.
The physical properties of acoustic sensors are exploited to obtain information about the environment for sonar map building. A theoretical formulation for interpreting the sensor databases on the physical principles of acoustic propagation and reflection is presented. A characterization of the sonar scan that allows the differentiation of planes, corners, and edges in a specular environment is described. A single sensor mounted on an autonomous vehicle in a laboratory verifies the technique. The implications for sonar map building and the limitations of differentiating elements with one sensor are discussed  相似文献   

17.
18.
In this paper, a tracking controller is formulated for a quadrotor to track a moving ground target. The quadrotor exhibits distinct hierarchical dynamics that allows its position to be controlled by its attitude. This motivates the use of backstepping control on the underactuated quadrotor. Most backstepping architecture controls the quadrotor position and attitude independently, and couples them with inverse kinematics. Inverse kinematics computes the attitude angles required to achieve a desired acceleration. However unmodeled effects are shown to cause inexact inversion resulting in tracking error. The approach proposed in this paper uses a re-formulated full state cascaded dynamics to eliminate the need for inverse kinematics in a full state backstepping control architecture. It is shown that zero steady state error is achieved in the presence of unmodeled aerodynamics effect and wind disturbance despite no integral action. In addition, a backstepping formulation is derived using contraction theory that guarantees the boundedness of state response under bounded disturbances such as wind. This improves the system performance. Numerical simulations are performed using the proposed controller to track a target moving along predefined paths and the results are compared with a benchmark controller derived using inverse kinematics. The results show that the proposed controller is able to achieve better tracking performance under unmodeled aerodynamic effects and wind disturbance as compared with the benchmark controller.  相似文献   

19.
We give a systematic treatment of distributivity for a monad and a comonad as arises in incorporating category theoretic accounts of operational and denotational semantics, and in giving an intensional denotational semantics. We do this axiomatically, in terms of a monad and a comonad in a 2-category, giving accounts of the Eilenberg-Moore and Kleisli constructions. We analyse the eight possible relationships, deducing that two pairs are isomorphic, but that the other pairs are all distinct. We develop those 2-categorical definitions necessary to support this analysis.  相似文献   

20.
《Computer Networks (1976)》1984,8(5-6):451-461
This paper presents a new algorithm based on Quicksort for sorting in place a distributed file in a message switching network. It discusses in detail the algorithmic aspects of the method and compares it to other possible approaches. The sort is analyzed and is shown to require, on the average, O(M·log(M)) messages and a total data traffic of O(N·log(M)) records for a file of size N fragmented over M stations. Arguments for the performance one may expect in practice, where N is much larger than M, are given. They are supported by results from a sequential simulation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号