共查询到20条相似文献,搜索用时 0 毫秒
1.
Verification problems for finite- and infinite-state processes, like model checking and equivalence checking, can effectively be encoded in Parameterised Boolean Equation Systems (PBESs). Solving the PBES then solves the encoded problem. The decidability of solving a PBES depends on the data sorts that occur in the PBES. We describe a pragmatic methodology for solving PBESs, viz., by attempting to instantiate them to the sub-fragment of Boolean Equation Systems (BESs). Unlike solving PBESs, solving BESs is a decidable problem. Based on instantiation, verification using PBESs can effectively be done fully automatically in most practical cases. We demonstrate this by solving several complex verification problems using a prototype implementation of our instantiation technique. In addition, practical issues concerning this implementation are addressed. Furthermore, we illustrate the effectiveness of instantiation as a transformation on PBESs when solving verification problems involving systems of infinite size. 相似文献
2.
We show an O?(n(?+1))-time algorithm for the channel assignment problem, where ? is the maximum edge weight. This improves on the previous O?(n(?+2))-time algorithm by Král (2005) [1], as well as algorithms for important special cases, like L(2,1)-labeling. For the latter problem, our algorithm works in O?(n3) time. The progress is achieved by applying the fast zeta transform in combination with the inclusion-exclusion principle. 相似文献
3.
Philipp Woelfel 《Journal of Computer and System Sciences》2005,71(4):520-534
Bryant [On the complexity of VLSI implementations and graph representations of boolean functions with applications to integer multiplication, IEEE Trans. Comput. 40 (1991) 205-213] has shown that any OBDD for the function MULn-1,n, i.e. the middle bit of the n-bit multiplication, requires at least 2n/8 nodes. In this paper a stronger lower bound of essentially 2n/2/61 is proven by a new technique, using a universal family of hash functions. As a consequence, one cannot hope anymore to verify e.g. 128-bit multiplication circuits using OBDD-techniques because the representation of the middle bit of such a multiplier requires more than 3·1017OBDD-nodes. Further, a first non-trivial upper bound of 7/3·24n/3 for the OBDD-size of MULn-1,n is provided. 相似文献
4.
Tae-Hyoung Kim Author Vitae Ichiro Maruta Author Vitae Author Vitae 《Automatica》2008,44(4):1104-1110
This paper proposes a novel tuning strategy for robust proportional-integral-derivative (PID) controllers based on the augmented Lagrangian particle swarm optimization (ALPSO). First, the problem of PID controller tuning satisfying multiple H∞ performance criteria is considered, which is known to suffer from computational intractability and conservatism when any existing method is adopted. In order to give some remedy to such a design problem without using any complicated manipulations, the ALPSO based robust gain tuning scheme for PID controllers is introduced. It does not need any conservative assumption unlike the conventional methods, and often enables us to find the desired PID gains just by solving the constrained optimization problem in a straightforward way. However, it is difficult to guarantee its effectiveness in a theoretical way, because PSO is essentially a stochastic approach. Therefore, it is evaluated by several simulation examples, which demonstrate that the proposed approach works well to obtain PID controller parameters satisfying the multiple H∞ performance criteria. 相似文献
5.
State feedback control of continuous-time T-S fuzzy systems via switched fuzzy controllers 总被引:1,自引:0,他引:1
This paper studies the problem of state feedback control of continuous-time T-S fuzzy systems. Switched fuzzy controllers are exploited in the control design, which are switched based on the values of membership functions, and the control scheme is an extension of the parallel distributed compensation (PDC) scheme. Sufficient conditions for designing switched state feedback controllers are obtained with meeting an H∞ norm bound requirement and quadratic D stability constraints. It is shown that the new control design method provides less conservative results than the corresponding ones via the parallel distributed compensation (PDC) scheme. A numerical example is given to illustrate the effectiveness of the proposed method. 相似文献
6.
In this paper, the partially varying coefficient single index proportional hazards regression models are discussed. All unknown functions are fitted by polynomial B splines. The index parameters and B-spline coefficients are estimated by the partial likelihood method and a two-step Newton-Raphson algorithm. Consistency and asymptotic normality of the estimators of all the parameters are derived. Through a simulation study and the VA data example, we illustrate that the proposed estimation procedure is accurate, rapid and stable. 相似文献
7.
Tatiana F.P.A.T. PazelliMarco H. Terra Adriano A.G. Siqueira 《Control Engineering Practice》2011,19(4):395-408
This paper aims to formulate and investigate the application of various nonlinear H∞ control methods to a free-floating space manipulator subject to parametric uncertainties and external disturbances. From a tutorial perspective, a model-based approach and adaptive procedures based on linear parametrization, neural networks and fuzzy systems are covered by this work. A comparative study is conducted based on experimental implementations performed with an actual underactuated fixed-base planar manipulator which is, following the DEM concept, dynamically equivalent to a free-floating space manipulator. 相似文献
8.
Negative selection algorithms on strings with efficient training and linear-time classification 总被引:1,自引:0,他引:1
Michael Elberfeld Johannes Textor 《Theoretical computer science》2011,412(6):534-542
A string-based negative selection algorithm is an immune-inspired classifier that infers a partitioning of a string space Σ? into “normal” and “anomalous” partitions from a training set S containing only samples from the “normal” partition. The algorithm generates a set of patterns, called “detectors”, to cover regions of the string space containing none of the training samples. Strings that match at least one of these detectors are then classified as “anomalous”. A major problem with existing implementations of this approach is that the detector generating step needs exponential time in the worst case. Here we show that for the two most widely used kinds of detectors, the r-chunk and r-contiguous detectors based on partial matching to substrings of length r, negative selection can be implemented more efficiently by avoiding generating detectors altogether: for each detector type, training set S⊆Σ? and parameter r≤? one can construct an automaton whose acceptance behaviour is equivalent to the algorithm’s classification outcome. The resulting runtime is O(|S|?r|Σ|) for constructing the automaton in the training phase and O(?) for classifying a string. 相似文献
9.
The Voronoi diagram of a point set has been extensively used in various disciplines ever since it was first proposed. Its application realms have been even further extended to estimate the shape of point clouds when Edelsbrunner and Mücke introduced the concept of α-shape based on the Delaunay triangulation of a point set.In this paper, we present the theory of β-shape for a set of three-dimensional spheres as the generalization of the well-known α-shape for a set of points. The proposed β-shape fully accounts for the size differences among spheres and therefore it is more appropriate for the efficient and correct solution for applications in biological systems such as proteins.Once the Voronoi diagram of spheres is given, the corresponding β-shape can be efficiently constructed and various geometric computations on the sphere complex can be efficiently and correctly performed. It turns out that many important problems in biological systems such as proteins can be easily solved via the Voronoi diagram of atoms in proteins and β-shapes transformed from the Voronoi diagram. 相似文献
10.
Rie?an gave in Rie?an (2004) [9] an axiomatic characterization of a probability on IFS-events and proved in Rie?an (2006) [10] a representation theorem for it. In Ren?ová [9], Ren?ová introduced the notions of additive φ-probability and strongly additive φ-probability and gave a representation theorem for strongly additive φ-probabilities.In this paper we give a generalization of the axiomatic characterization given by Rie?an in Rie?an (2006) [10]; from this, the representation theorem for strongly additive φ-probabilities will follow. 相似文献
11.
Sauro Liberatore Author Vitae Jason L. Speyer Author Vitae Andy Chunliang Hsu 《Automatica》2006,42(7):1199-1209
A model-based fault detection filter is developed for structural health monitoring of a simply supported beam. The structural damage represented in the plant model is shown to decompose into a known fault direction vector maintaining a fixed direction, dependent on the damage location, and an arbitrary fault magnitude representing the extent of the damage. According to detection filter theory, if damage occurs, under certain circumstances the fault will be uniquely detected and identified through an associated invariance in the direction imposed on the fault detection filter residuals. The spectral algorithm used to design the detection filter is based on a left eigenstructure assignment approach which accommodates system sensitivities that are revealed as ill-conditioned matrices formed from the eigenvectors in the construction of the detection filter gains. The detection filter is applied to data from an aluminum simply supported beam with four piezoelectric sensors and one piezoelectric actuator. By exciting the structure at the first natural frequency, damage in the form of a 5 mm saw cut made to one side of the beam is detected and localized. 相似文献
12.
13.
José R. Quevedo 《Computational statistics & data analysis》2007,52(1):578-595
The selection of a subset of input variables is often based on the previous construction of a ranking to order the variables according to a given criterion of relevancy. The objective is then to linearize the search, estimating the quality of subsets containing the topmost ranked variables. An algorithm devised to rank input variables according to their usefulness in the context of a learning task is presented. This algorithm is the result of a combination of simple and classical techniques, like correlation and orthogonalization, which allow the construction of a fast algorithm that also deals explicitly with redundancy. Additionally, the proposed ranker is endowed with a simple polynomial expansion of the input variables to cope with nonlinear problems. The comparison with some state-of-the-art rankers showed that this combination of simple components is able to yield high-quality rankings of input variables. The experimental validation is made on a wide range of artificial data sets and the quality of the rankings is assessed using a ROC-inspired setting, to avoid biased estimations due to any particular learning algorithm. 相似文献
14.
Minvydas Ragulskis Zenonas NavickasLiepa Bikulciene 《Computers & Mathematics with Applications》2011,62(1):376-382
In this paper we argue that the solitary solution of the Liouville equation produced by the Exp-function method does not satisfy the original differential equation for all initial conditions. Moreover, the region where the solution is correct is located entirely on a curve in the parameter plane of initial conditions. We derive the explicit equation for this curve and argue that classical Exp-function type methods cannot identify such constraints related to initial conditions. 相似文献
15.
Multiband frequency domain synthesis consists in the minimization of a finite family of closed-loop transfer functions on prescribed frequency intervals. This is an algorithmically difficult problem due to its inherent nonsmoothness and nonconvexity. We extend our previous work on nonsmooth H∞ synthesis to develop a nonsmooth optimization technique to compute local solutions to multiband synthesis problems. The proposed method is shown to perform well on illustrative examples. 相似文献
16.
In this paper, the optimal strategies for discrete-time linear system quadratic zero-sum games related to the H-infinity optimal control problem are solved in forward time without knowing the system dynamical matrices. The idea is to solve for an action dependent value function Q(x,u,w) of the zero-sum game instead of solving for the state dependent value function V(x) which satisfies a corresponding game algebraic Riccati equation (GARE). Since the state and actions spaces are continuous, two action networks and one critic network are used that are adaptively tuned in forward time using adaptive critic methods. The result is a Q-learning approximate dynamic programming (ADP) model-free approach that solves the zero-sum game forward in time. It is shown that the critic converges to the game value function and the action networks converge to the Nash equilibrium of the game. Proofs of convergence of the algorithm are shown. It is proven that the algorithm ends up to be a model-free iterative algorithm to solve the GARE of the linear quadratic discrete-time zero-sum game. The effectiveness of this method is shown by performing an H-infinity control autopilot design for an F-16 aircraft. 相似文献
17.
Trajectory generation for nonlinear control systems is an important and difficult problem. In this paper, we provide a constructive method for hierarchical trajectory refinement. The approach is based on the recent notion of φ-related control systems. Given a control affine system satisfying certain assumptions, we construct a φ-related control system of smaller dimension. Trajectories designed for the smaller, abstracted system are guaranteed, by construction, to be feasible for the original system. Constructive procedures are provided for refining trajectories from the coarser to the more detailed system. 相似文献
18.
Violeta Leoreanu-Fotea 《Information Sciences》2009,179(15):2710-3173
The aim of this paper is to consider and study a new kind of fuzzy n-ary hyperstructures, such as fuzzy n-ary hypergroups and fuzzy (m,n)-ary hyperrings. 相似文献
19.
Chunling Du Author Vitae Lihua Xie Author Vitae Author Vitae Youyi Wang Author Vitae 《Automatica》2009,45(10):2244-2249
This paper is concerned with the rejection of multiple narrowband disturbances in hard disk drives (HDDs). Inspired by a control blending idea, the multi-frequency disturbance rejection is formulated as a blending control problem. Each disturbance rejection is accomplished by using the H2 optimal control method. Based on all H2 optimal controllers, the blending technique is applied to yield a single controller which is capable of achieving rejection of all disturbances. Rejections of two and three disturbances for a 1.8-inch HDD VCM actuator are taken as application examples in the paper. Simulation and experimental results show that the ultimate controller results in a simultaneous attenuation of disturbances with frequencies higher or lower than the closed-loop system bandwidth. Moreover, the method turns out to be able to lift phase and thus prevent phase margin loss when it is used to deal with disturbances near bandwidth. 相似文献