首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper presents a solution to the factorization problem of high-order m-D polynomials into special m-D factors that are linear in all variables. By special it is meant that the factors have the form of a sum of one independent variable, say z 1, and a general first-order polynomial not involving z 1, i.e. z 1 + a j2 z 2 + [tdot] + a jm z m (j = 1, 2,[tdot],N 1). Two theorems providing the necessary and sufficient conditions for this factorization are given, which have an algorithmic form and are thus appropriate for direct computer use. The results are illustrated by means of three examples.  相似文献   

2.
Given a linear, time-invariant, minimal and strictly proper system  set of monic polynomials φ i (s), i = l, 2, [tdot],q, such that φ i (s) divides φ i?1 (s), i = 2, 3, [tdot],q a method for finding a proper feedback system  which makes the invariant polynomials of the closed-loop system equal to the φ i (s) is established and a sufficient condition which ensures the existence of  is determined. This method can also be used to assign the poles of the compensated system provided that certain poles are multiple. The order of the required compensator is generally loss than that of the Luenberger or the Wolovich compensation schemes.  相似文献   

3.
The finite element method has been used to find an approximate lumped parameter model of a non-linear distributed parameter system. A one dimensional non-linear dispersion system is considered. The space domain is divided into a finite set of k elements. Each element, has n nodes. Within each element the concentration is represented by C(x,t)(e) = [N][C] T where [N] = [n1(x),n2(x), [tdot] nn(x)] and [C] = [C1(t),C2(t), [tdot] Cn(t)]. By using Galerkin's criterion a set of (k × n ? n+ 1) first order differential equations are obtained for Ci(t). These equations are solved by an iterative method. The concepts are illustrated by an example taking five three-node elements in the space domain. The results are compared with those obtained by a finite difference method. It is shown that the finite element method can be used effectively in modelling of a distributed system by a lumped system.  相似文献   

4.
Systematic analysis of identities and inequalities satisfied by possibilistic information distances is conducted. The analysis is based on their representations as discrete sums and on certain inequalities for rearrangements of sequences. These identities and inequalities express several properties that are usually deemed characteristic of information distances and measures. In the companion paper those properties are used to obtain several axiomatic characterizations of possibility distances. The basic distance is g(p,q) defined for the distributions p = (Pi,[tdot],pn) and q = (qi,[tdot],qn) such that Pi≤qi. =i=1,[tdot],n They serve to define a metric G(p,q)=g<p,p ∨ q)+g(q,p [tdot] q) and a distanceH(p,q) = g(p∧q,p)+g(p ∧ q,q). All these distances are, in turn based on the U-uncertainty information function.  相似文献   

5.
Nonlinear eigenvalue problems for quasilinear systems   总被引:1,自引:0,他引:1  
The paper deals with the existence of positive solutions for the quasilinear system (Φ(u'))' + λh(t)f(u) = 0,0 < t < 1 with the boundary condition u(0) = u(1) = 0. The vector-valued function Φ is defined by Φ(u) = (q(t)(p(t)u1), …, q(t)(p(t)un)), where u = (u1, …, un), andcovers the two important cases (u) = u and (u) = up > 1, h(t) = diag[h1(t), …, hn(t)] and f(u) = (f1(u), …, fn (u)). Assume that fi and hi are nonnegative continuous. For u = (u1, …, un), let
, f0 = maxf10, …, fn0 and f = maxf1, …, fn. We prove that the boundary value problem has a positive solution, for certain finite intervals of λ, if one of f0 and f is large enough and the other one is small enough. Our methods employ fixed-point theorem in a cone.  相似文献   

6.
Consider the time-invariant system E[xdot] = Ax + Bu, y = Cx where E is a square matrix that may be singular. The problem is to find constant matrices K and L, such that the feedback law u = Ky+L[ydot] yields x = exp (λt)vi (where vi is some constant vector) for some preassigned λi (i=l, 2, [tdot], r). This problem is equivalent to that of finding K and L which makes a preassigned λ i an eigenvalue corresponding to the general eigenvalue problem {λ(E ? BLC) ? (A + BKC)}v=0. Using matrix generalized inverses, a method is developed for the construction of a linear system of equations from which the elements of K and L may be computed.  相似文献   

7.
Given a constrained plant P with input x and outputs y 1 y 2,[tdot],y n , the assigned specifications require that, at each instant, y i follows the corresponding reference value r j for one index i, while for the other indices, ji, y j should be smaller or equal to r j. A quantitative synthesis technique is presented to solve this problem, that reduces it, in quite a transparent way, to the solution of several single-input single-output problems.  相似文献   

8.
The work deals with a class of discrete‐time zero‐sum Markov games under a discounted optimality criterion with random state‐action‐dependent discount factors of the form , where xn,an,bn, and ξn+1 are the state, the actions of players, and a random disturbance at time n, respectively, taking values in Borel spaces. The one‐stage payoff is assumed to be possibly unbounded. In addition, the process {ξn} is formed by observable, independent, and identically distributed random variables with common distribution θ, which is unknown to players. By using the empirical distribution to estimate θ, we introduce a procedure to approximate the value V? of the game; such a procedure yields construction schemes of stationary optimal strategies and asymptotically optimal Markov strategies.  相似文献   

9.
M. Pellegrini 《Algorithmica》1997,17(4):380-398
We describe a method for decomposing planar sets of segments and points. Using this method we obtain new efficientdeterministic algorithms for counting pairs of intersecting segments, and for answering off-line triangle range queries. In particular we obtain the following results:
  1. Givenn segments in the plane, the number of pairs of intersecting segments is counted in timeO(n 1+?+K 1/3 n 2/3+?), whereK is the number of intersection points among the segments, and ?>0 is an arbitrarily small constant.
  2. Givenn segments in the plane which are colored with two colors, the number of pairs ofbichromatic intersecting segments is counted in timeO(n 1+?+K m 1/3 n 2/3+?), whereK m is the number ofmonochromatic intersection points, and ?>0 is an arbitrarily small constant.
  3. Givenn weighted points andn triangles on a plane, the sum of weights of points in each triangle is computed in timeO(n 1+ε+?1/3 n 2/3+ε), where ? is the number of vertices in the arrangement of the triangles, and ?>0 is an arbitrarily small constant.
The above bounds depend sublinearly on the number of intersections among input segmentsK (resp.K m , ?), which is desirable sinceK (resp.K m , ?) can range from zero toO(n 2). All of the above algorithms use optimal Θ(n) storage. The constants of proportionality in the big-Oh notation increase as ? decreases. These results are based on properties of the sparse nets introduced by Chazelle [Cha3].  相似文献   

10.
A variety of H optimal design problems reduce to interpolation of compressed multiplication operators, f(s) → πk(w(s)f(s)), where w(s) is a given rational function and the subspace K is of the form K=H2 φ(s)H2. Here we consider φ(s) = (1-eα-5)/(s - α), which stands for a distributed delay in a system's input. The interpolation scheme we develop, adapts to a broader class of distributed lags, namely, those determined by transfer functions of the form B(es)/b(s), where B(z) and b(s) are polynomials and b(s) = 0 implies B(es) = 0.  相似文献   

11.
In this paper, we first develop a parallel algorithm for computingK-terminal reliability, denoted byR(GK), in 2-trees. Based on this result, we can also computeR(GK) in partial 2-trees using a method that transforms, in parallel, a given partial 2-tree into a 2-tree. Finally, we solve the problem of finding most vital edges with respect toK-terminal reliability in partial 2-trees. Our algorithms takeO(log n) time withC(m, n) processors on a CRCW PRAM, whereC(m, n) is the number of processors required to find the connected components of a graph withmedges andnvertices in logarithmic time.  相似文献   

12.
HereR andN denote respectively the real numbers and the nonnegative integers. Also 0 <n εN, ands(x) =x 1+...+x n when x = (x 1,...,x n) εR n. Adiagonal function of dimensionn is a mapf onN n (or any larger set) that takesN n bijectively ontoN and, for all x, y inN n, hasf(x) <f(y) whenevers(x) <s(y). We show that diagonalpolynomials f of dimensionn all have total degreen and have the same terms of that degree, so that the lower-degree terms characterize any suchf. We call two polynomialsequivalent if relabeling variables makes them identical. Then, up to equivalence, dimension two admits just one diagonal polynomial, and dimension three admits just two.  相似文献   

13.
HereN = {0, 1, 2, ...}, while a functionf onN m or a larger domain is apacking function if its restrictionf|N m is a bijection ontoN. (Packing functions generalize Cantor's [1]pairing polynomials, and yield multidimensional-array storage schemes.) We call two functionsequivalent if permuting arguments makes them equal. Alsos(x) =x 1 + ... +x m when x = (x 1,...,x m); and such anf is adiagonal mapping iff(x) <f(y) whenever x, y εN m ands(x) <s(y). Lew [7] composed Skolem's [14], [15] diagonal packing polynomials (essentially one for eachm) to constructc(m) inequivalent nondiagonal packing polynomials on eachN m. For eachm > 1 we now construct 2m−2 inequivalent diagonal packing polynomials. Then, extending the tree arguments of the prior work, we obtaind(m) inequivalent nondiagonal packing polynomials, whered(m)/c(m) → ∞ asm → ∞. Among these we count the polynomials of extremal degree.  相似文献   

14.
An L(2, 1)-labelling of a graph G is a vertex labelling such that the difference of the labels of any two adjacent vertices is at least 2 and that of any two vertices of distance 2 is at least 1. The minimum span of all L(2, 1)-labellings of G is the λ-number of G and denoted by λ(G). Lin and Lam computed λ(G) for a direct product G=K m ×P n of a complete graph K m and a path P n . This is a natural lower bound of λ(K m ×C n ) for a cycle C n . They also proved that when n≡ 0±od 5m, this bound is the exact value of λ(K m ×C n ) and computed the value when n=3, 5, 6. In this article, we compute the λ-number of G, where G is the direct product K 3×C n of the triangle and a cycle C n for all the other n. In fact, we show that among these n, λ(K 3×C n )=7 for all n≠7, 11 and λ(K 3×C n )=8 when n=7, 11.  相似文献   

15.
The problem of merging two sorted arrays A = (a1, a2, ..., an1) and B = (b1, b2, ..., bn2) is considered. For input elements that are drawn from a domain of integers [1...s] we present an algorithm that runs in O(log log log s) time using n/log log log s CREW PRAM processors (optimal speed-up) and O(nsε) space, where n = n1 + n2. For input elements that are drawn from a domain of integers [1...n] we present a second algorithm that runs in O(α(n)) time (where α(n) is the inverse of Ackermann′s function) using n/α(n) CREW PRAM processors and linear space. This second algorithm is non-uniform; however, it can be made uniform at a price of a certain loss of speed, or by using a CRCW PRAM.  相似文献   

16.
A. Ossicini  F. Rosati 《Calcolo》1979,16(4):371-381
Sommaire Dans cette note on donne des théorèmes généraux qui permettent la comparaison entre les zéros des polyn?mess-orthogonaux, relatifs à fonctions poidsp x (x),p 0 (x), pour les quelles le rapportp 1 (x)/p o(x) est une fonction strictement monotone sur un certain intervalle. Ces thèorèmes, utilisés à propos, permettent d'établir des inégalités entre les zéros des polynomess-orthogonaux relatifs aux fonctions poids de type Jacobi,p(x)=(1-x)α (1+x)β), α, β>−1,x∈]−1,1[; inégalités qui sont connues seulement pour des valeurs particuliers de α,β,s, et du degrém du polynome.  相似文献   

17.
Let f(xθ) = αθαx−(α+1)I(x>θ) be the pdf of a Pareto distribution with known shape parameter α>0, and unknown scale parameter θ. Let {(Xi, θi)} be a sequence of independent random pairs, where Xi's are independent with pdf f(xαi), and θi are iid according to an unknown distribution G in a class of distributions whose supports are included in an interval (0, m), where m is a positive finite number. Under some assumption on the class and squared error loss, at (n + 1)th stage we construct a sequence of empirical Bayes estimators of θn+1 based on the past n independent observations X1,…, Xn and the present observation Xn+1. This empirical Bayes estimator is shown to be asymptotically optimal with rate of convergence O(n−1/2). It is also exhibited that this convergence rate cannot be improved beyond n−1/2 for the priors in class .  相似文献   

18.
Stochastic programming problems appear when we make decisions in situations with uncertainty and risk, when any action has an ambiguous outcome and to each solution x = (x1 …, xn) it is possible to associate certain indicators fi (x, ω), i = 1, …, m, that depend on x and on the state of nature ω, which is an element of the probabilistic space (Ω, A, P).

Since for any x the value of the objective function f 1 (x, ω) and of the constraints functions f(x, ω), i = 2,… m, will depend on the realization ω, we have great freedom in determining the feasible and the optimal solutions in stochastic programming problems; for example, deciding whether they should be deterministic or have random solutions.  相似文献   

19.
The discrete-time linear system xk+1 = Axk + uk (k = 0, 1,[tdot]), for which the input uk belongs to an arbitrary bounded and convex set Ω, is considered. The error in the sufficiency proof of the controllability result when 0 ? ri (Ω) owing to Wing and Desoer is avoided by using convexity arguments, and the result is extended to encompass the case 0 ? ri (Ω)  相似文献   

20.
Two new families of asymmetric quantum codes are constructed in this paper. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to classical Reed-Solomon (RS) codes, providing quantum codes with parameters [[Nl(q l −1), Kl(q l −2d + c + 1), d z d/d x ≥ (dc)]] q , where q is a prime power and d > c + 1, c ≥ 1, l ≥ 1 are integers. The second family is derived from the CSS construction applied to classical generalized RS codes, generating quantum codes with parameters [[N = mn, K = m(2kn + c), d z d/d x ≥ (dc)]] q , where q is a prime power, 1 < k < n < 2k + cq m , k = nd + 1, and n, d > c + 1, c ≥ 1, m ≥ 1 are integers. Although the second proposed construction generalizes the first one, the techniques developed in both constructions are slightly different. These new codes have parameters better than or comparable to the ones available in the literature. Additionally, the proposed codes can be utilized in quantum channels having great asymmetry, that is, quantum channels in which the probability of occurrence of phase-shift errors is large when compared to the probability of occurrence of qudit-flip errors.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号