首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We study the closure properties of the function classes GapP and GapP+. We characterize the property of GapP+ being closed under decrement and of GapP being closed under maximum, minimum, median, or division by seemingly implausible collapses among complexity classes, thereby giving evidence that these function classes don't have the stated closure properties.We show a similar result concerning operations we callbit cancellation andbit insertion: Given a functionf GapP and a polynomialtime computable function , we ask whether the functionsf * (x) andf + (x) are in GapP or not, wheref * (x) is obtained fromf(x) by cancelling the (x)-th bit in the binary representation off(x), andf + (x) is obtained fromf(x) by inserting a bit at position (x) in the binary representation off(x). We give necessary and sufficient conditions for GapP being closed under bit cancellation and bit insertion, respectively.  相似文献   

2.
Consider the nonlinear system $$\dot x(t) = f(x(t)) + \sum\limits_{i = 1}^m {u_i (t)g_i (x(t)), x(0) = x_0 \in M}$$ whereM is aC realn-dimensional manifold,f, g 1,?.,g m areC vector fields onM, andu 1 ,..,u m are real-valued controls. Ifm=n?1 andf, g 1 ,?,g m are linearly independent, then the system is called a hypersurface system, and necessary and sufficient conditions for controllability are known. For a generalm, 1 ≤mn?1, and arbitraryC vector fields,f, g 1 ,?,g m , assume that the Lie algebra generated byf, g 1 ,?,g m and by taking successive Lie brackets of these vector fields is a vector bundle with constant fiber (vector space) dimensionp onM. By Chow's Theorem there exists a maximalC realp-dimensional submanifoldS ofM containingx 0 with the generated bundle as its tangent bundle. It is known that the reachable set fromx 0 must contain an open set inS. The largest open subsetU ofS which is reachable fromx 0 is called the region of reachability fromx 0. IfO is an open subset ofS which is reachable fromx 0,S we find necessary conditions and sufficient conditions on the boundary ofO inS so thatO = U. Best results are obtained when it is assumed that the Lie algebra generated byg 1,?,g m and their Lie brackets is a vector bundle onM.  相似文献   

3.
Here we investigate the problem of transforming a nonlinear system on the torusT n by using global feedback and global changes of coordinates into an invariant system (i.e., a control system of whichf andg i are (left and right) invariant vector fields whenT 2 is considered as a Lie group). We provide a complete answer whenn=2 and give a sufficient condition and necessary conditions in the more general case.  相似文献   

4.
Exponential decay is proven for a class of initial boundary value problems for the equationw tt-c 0 2 wxx=f(wt). The boundary condition isc 0wx+rwt=0 atx=1 andw(0,t)=0. Iff satisfies a global Lipschitz condition, no restrictions are placed on the initial conditions, but if this is relaxed to a local Lipschitz condition, the initial data are assumed to be sufficiently small. These theorems are motivated in part by an application to modeling of galloping transmission lines. A theorem about boundedness of solutions without boundary damping is proven also. A global Lipschitz condition is assumed here, but the theorem is believed to be more generally true.  相似文献   

5.
The author considers Volterra Integral Equations of either of the two forms $$u(x) = f(x) + \int\limits_a^x {k(x - t)g(u(t))dt, a \leqslant } x \leqslant b,$$ wheref, k, andg are continuous andg satisfies a local Lipschitz condition, or $$u(x) = f(x) + \int\limits_a^x {\sum\limits_{j = 1}^m {c_j (x)g_j (t,u(t))dt} ,} $$ wheref,c j , andg j ,j=1,2,...,m, are continuous and eachg j satisfies a local Lipschitz condition in its second variable. It is shown that in each case the respective integral equation can be solved by conversion to a system of ordinary differential equations which can be solved by referring to a described FORTRAN subroutine. Subroutine VE1. In the case of the convolution equation, it is shown how VE1 converts the equation via a Chebyshev expansion, and a theorem is proved, and implemented in VE1, wherein the solution error due to truncation of the expansion can be simultaneously computed at the discretion of the user. Some performance data are supplied and a comparison with other standard schemes is made. Detailed performance data and a program listing are available from the author.  相似文献   

6.
A review of the methods for global optimization reveals that most methods have been developed for unconstrained problems. They need to be extended to general constrained problems because most of the engineering applications have constraints. Some of the methods can be easily extended while others need further work. It is also possible to transform a constrained problem to an unconstrained one by using penalty or augmented Lagrangian methods and solve the problem that way. Some of the global optimization methods find all the local minimum points while others find only a few of them. In any case, all the methods require a very large number of calculations. Therefore, the computational effort to obtain a global solution is generally substantial. The methods for global optimization can be divided into two broad categories: deterministic and stochastic. Some deterministic methods are based on certain assumptions on the cost function that are not easy to check. These methods are not very useful since they are not applicable to general problems. Other deterministic methods are based on certain heuristics which may not lead to the true global solution. Several stochastic methods have been developed as some variation of the pure random search. Some methods are useful for only discrete optimization problems while others can be used for both discrete and continuous problems. Main characteristics of each method are identified and discussed. The selection of a method for a particular application depends on several attributes, such as types of design variables, whether or not all local minima are desired, and availability of gradients of all the functions.Notation Number of equality constraints - () T A transpose of a vector - A A hypercubic cell in clustering methods - Distance between two adjacent mesh points - Probability that a uniform sample of sizeN contains at least one point in a subsetA ofS - A(v, x) Aspiration level function - A The set of points with cost function values less thanf(x G * ) +. Same asA f () - A f () A set of points at which the cost function value is within off(x G * ) - A () A set of points x with[f(x)] smaller than - A N The set ofN random points - A q The set of sample points with the cost function value f q - Q The contraction coefficient; –1 Q 0 - R The expansion coefficient; E > 1 - R The reflection coefficient; 0 < R 1 - A x () A set of points that are within the distance from x G * - D Diagonal form of the Hessian matrix - det() Determinant of a matrix - d j A monotonic function of the number of failed local minimizations - d t Infinitesimal change in time - d x Infinitesimal change in design - A small positive constant - (t) A real function called the noise coefficient - 0 Initial value for(t) - exp() The exponential function - f (c) The record; smallest cost function value over X(C) - [f(x)] Functional for calculating the volume fraction of a subset - Second-order approximation tof(x) - f(x) The cost function - An estimate of the upper bound of global minimum - f E The cost function value at xE - f L The cost function value at xL - f opt The current best minimum function value - f P The cost function value at x P - f Q The cost function value at x Q - f q A function value used to reduce the random sample - f R The cost function value at x R - f S The cost function value at xS - f T F min A common minimum cost function value for several trajectories - f TF opt The best current minimum value found so far forf TF min - f W The cost function value at x W - G Minimum number of points in a cell (A) to be considered full - The gamma function - A factor used to scale the global optimum cost in the zooming method - Minimum distance assumed to exist between two local minimum points - gi(x) Constraints of the optimization problem - H The size of the tabu list - H(x*) The Hessian matrix of the cost function at x* - h j Half side length of a hypercube - h m Minimum half side lengths of hypercubes in one row - I The unity matrix - ILIM A limit on the number of trials before the temperature is reduced - J The set of active constraints - K Estimate of total number of local minima - k Iteration counter - The number of times a clustering algorithm is executed - L Lipschitz constant, defined in Section 2 - L The number of local searches performed - i The corresponding pole strengths - log () The natural logarithm - LS Local search procedure - M Number of local minimum points found inL searches - m Total number of constraints - m(t) Mass of a particle as a function of time - m() TheLebesgue measure of thea set - Average cost value for a number of random sample of points inS - N The number of sample points taken from a uniform random distribution - n Number of design variables - n(t) Nonconservative resistance forces - n c Number of cells;S is divided inton c cells - NT Number of trajectories - Pi (3.1415926) - P i (j) Hypersphere approximating thej-th cluster at stagei - p(x (i)) Boltzmann-Gibbs distribution; the probability of finding the system in a particular configuration - pg A parameter corresponding to each reduced sample point, defined in (36) - Q An orthogonal matrix used to diagonalize the Hessian matrix - i (i = 1, K) The relative size of thei-th region of attraction - r i (j) Radius of thej-th hypersp here at stagei - R x * Region of attraction of a local minimum x* - r j Radius of a hypersphere - r A critical distance; determines whether a point is linked to a cluster - R n A set ofn tuples of real numbers - A hyper rectangle set used to approximateS - S The constraint set - A user supplied parameter used to determiner - s The number of failed local minimizations - T The tabu list - t Time - T(x) The tunneling function - T c (x) The constrained tunneling function - T i The temperature of a system at a configurationi - TLIMIT A lower limit for the temperature - TR A factor between 0 and 1 used to reduce the temperature - u(x) A unimodal function - V(x) The set of all feasible moves at the current design - v(x) An oscillating small perturbation. - V(y(i)) Voronoi cell of the code point y(i) - v–1 An inverse move - v k A move; the change from previous to current designs - w(t) Ann-dimensional standard. Wiener process - x Design variable vector of dimensionn - x# A movable pole used in the tunneling method - x(0) A starting point for a local search procedure - X(c) A sequence of feasible points {x(1), x(2),,x(c)} - x(t) Design vector as a function of time - X* The set of all local minimum points - x* A local minimum point forf(x) - x*(i) Poles used in the tunneling method - x G * A global minimum point forf(x) - Transformed design space - The velocity vector of the particle as a function of time - Acceleration vector of the particle as a function of time - x C Centroid of the simplex excluding x L - x c A pole point used in the tunneling method - x E An expansion point of x R along the direction x C x R - x L The best point of a simplex - x P A new trial point - x Q A contraction point - x R A reflection point; reflection of x W on x C - x S The second worst point of a simplex - x W The worst point of a simplex - The reduced sample point with the smallest function value of a full cell - Y The set of code points - y (i) A code point; a point that represents all the points of thei-th cell - z A random number uniformly distributed in (0,1) - Z (c) The set of points x where [f (c) ] is smaller thanf(x) - []+ Max (0,) - | | Absolute value - The Euclidean norm - f[x(t)] The gradient of the cost function  相似文献   

7.
Summary A framework is proposed for the structured specification and verification of database dynamics. In this framework, the conceptual model of a database is a many sorted first order linear tense theory whose proper axioms specify the update and the triggering behaviour of the database. The use of conceptual modelling approaches for structuring such a theory is analysed. Semantic primitives based on the notions of event and process are adopted for modelling the dynamic aspects. Events are used to model both atomic database operations and communication actions (input/output). Nonatomic operations to be performed on the database (transactions) are modelled by processes in terms of trigger/reaction patterns of behaviour. The correctness of the specification is verified by proving that the desired requirements on the evolution of the database are theorems of the conceptual model. Besides the traditional data integrity constraints, requirements of the form Under condition W, it is guaranteed that the database operation Z will be successfully performed are also considered. Such liveness requirements have been ignored in the database literature, although they are essential to a complete definition of the database dynamics.

Notation

Classical Logic Symbols (Appendix 1) for all (universal quantifier) - exists at least once (existential quantifier) - ¬ no (negation) - implies (implication) - is equivalent to (equivalence) - and (conjunction) - or (disjunction) Tense Logic Symbols (Appendix 1) G always in the future - G 0 always in the future and now - F sometime in the future - F 0 sometime in the future or now - H always in the past - H 0 always in the past and now - P sometime in the past - P 0 sometime in the past or now - X in the next moment - Y in the previous moment - L always - M sometime Event Specification Symbols (Sects. 3 and 4.1) (x) means immediately after the occurrence of x - (x) means immediately before the occurrence of x - (x) means x is enabled, i.e., x may occur next - { } ({w 1} x{w 2}) states that if w 1 holds before the occurrence of x, then w 2 will hold after the occurrence of x (change rule) - [ ] ([oa1, ..., oan]x) states that only the object attributes oa1, ..., oa n are modifiable by x (scope rule) - {{ }} ({{w}}x) states that if x may occur next, then w holds (enabling rule) Process Specification Symbols (Sects. 5.3 and 5.4) :: for causal rules - for behavioural rules Transition-Pattern Composition Symbols (Sects. 5.2 and 5.3) ; sequential composition - ¦ choice composition - parallel composition - :| guarded alternative composition Location Predicates (Sect. 5.2) (z) means immediately after the occurrence of the last event of z (after) - (z) means immediately before the occurrence of the first event of z (before) - (z) means after the beginning of z and before the end of z (during) - ( z) means before the occurrence of an event of z (at)  相似文献   

8.
LetB be a Banach space ofR n valued continuous functions on [0, ) withfB. Consider the nonlinear Volterra integral equation (*)x(t)+ o t K(t,s,x(s))ds. We use the implicit function theorem to give sufficient conditions onB andK (t,s,x) for the existence of a unique solutionxB to (*) for eachf B with f B sufficiently small. Moreover, there is a constantM>0 independent off with MfB.Part of this work was done while the author was visiting at Wright State University.  相似文献   

9.
Various criteria are known for assuring uniqueness of the solution of a system ofn ordinary differential equations,x = f(t, x), with initial conditionx(t 0) = x0. Most of these involve some sort of relaxed Lipschitz condition onf(t, x), with respect tox, valid on an open setD R 1+n which contains the point (t 0, x0). The present paper generalizes (and unifies) a number of known uniqueness criteria to cover cases when (t 0, x0) lies on the boundary ofD. Research partially supported by NSF Grant GP-37838.  相似文献   

10.
Consider a binary string x 0 of Kolmogorov complexity K(x 0) n. The question is whether there exist two strings x 1 and x 2 such that the approximate equalities K(x i x j ) n and K(x i x j , x k ) n hold for all 0 i, j, k 2, i j k, i k. We prove that the answer is positive if we require the equalities to hold up to an additive term O(log K(x 0)). It becomes negative in the case of better accuracy, namely, O(log n).  相似文献   

11.
To answer an increasing need for glass product manufacturing in both small and medium series, the first glass-blower robot was recently developed. In the face of this new technology, which particularly interests crystal glass-makers, expertise remains the main decision-making element which intervenes in the choices of the design and implementation of these new processes. Finite element models of this new blowing process were developed. After the analysis of the process and of these stages, an initial sensibility study allowed us to find the essential parameters for the success of the operation. With the results of these sensitivity analyses, an optimizer was developed to adjust virtually the forming process of a linear cylindrical vase by determining the optimal forming parameters. A second optimization allowed us to determine the initial shape of the parison, an essential parameter in the successful forming of a convex cylindrical vase. Finally, the numerical tools were validated during trial campaigns carried out in crystal glass-makers.Symbols A s i normalized functions n s i - C 1 constraint equation - E ( p i ) error function - ep s * vase thickness obtained by finite element models - prescribed designers vase thickness - glass distribution calculated in a point m after disturbing - glass distribution obtained in a point m - G first derivative of the penalization function j ( p) - H second derivative of the penalization function j ( p) - I identity matrix - J Jacobian matrix of the error function E ( p i ) - M number of comparison points - m point of the vase - N s number of parameters - n s i standardized functions of N s variations - P s 1 pressure of free blowing - p s i ith parameter p s - T init initial temperature after reheating - t f 2 time of vertical creep - t m time of first shaping - t s 1 time of free blowing - 1 angle of tilted creep - Levenberg–Marquardt parameter - 1 positive scalar - j ( p) penalization function  相似文献   

12.
In this paper the distributions associated with a non-linear system of the form $$\frac{{dx}}{{dt}} = f(x) + \sum\limits_{\alpha = 1}^m {u_\alpha (t)g_\alpha (x)} ,f(0) = 0andx \in U_0 \subset R^n$$ are studied in relation to nonlinear state feedback $$u(x,v) = \hat a(x) + \hat S(x)v$$ withâ, u, v ∈ R m and ? a nonsingularm×m matrix withâ, ? functions ofx. Bothf andg are vector fields onU 0, generally assumed to be real analytic. Two nested families of distributions {G j } and {M j } associated with the system are examined with emphasis on generic points ofU 0, where it is shown that the usual conditions for feedback linearizability contain some redundancy. A characterization of state linearizability in terms of invariant factors of the equivalent linear form are given, and a criterion in terms of the distributions for a type of partial linearization is found.  相似文献   

13.
Let a semialgebraic set be given by a quantifier-free formula of the first-order theory of real closed fields withk atomic subformulae of the typef i0 for 1ik, where the polynomialsf i[X 1,...,X n] have degrees deg(f i)<d and the absolute value of each (integer) coefficient off i is at most 2M. An algorithm is exhibited which counts the number of connected components of the semialgebraic set in time (M (kd)n 20)O (1). Moreover, the algorithm allows us to determine whether any pair of points from the set are situated in the same connected component.  相似文献   

14.
Given a nonempty set of functions
where a = x 0 < ... < x n = b are known nodes and w i , i = 0,...,n, d i , i = 1,..., n, known compact intervals, the main aim of the present paper is to show that the functions and
exist, are in F, and are easily computable. This is achieved essentially by giving simple formulas for computing two vectors with the properties
] is the interval hull of (the tolerance polyhedron) T; iff T 0 iff F 0. , can serve for solving the following problem: Assume that is a monotonically increasing functional on the set of Lipschitz-continuous functions f : [a,b] R (e.g. (f) = a b f(x) dx or (f) = min f([a,b]) or (f) = max f([a,b])), and that the available information about a function g : [a,b] R is "g F," then the problem is to find the best possible interval inclusion of (g). Obviously, this inclusion is given by the interval [( ,( )]. Complete formulas for computing this interval are given for the case (f) = a b f(x) dx.  相似文献   

15.
In the framework of stochastic mechanics, the following problem is considered: in a set of admissible feedback controls v, with range inE n , find one minimizing the expectationE sx { s T L(t, (t), (t, (t)))dt + W T ((T))} for all (s, x) [0,T) E n , whereL(t, x, ) = (/12)m 2 – U(t, x) is the classical action integrand and is an-dimensional diffusion process in the weak sense, (see Bensoussan, 1982) with drift and diffusion coefficientD constant > 0.W T andU are given real functions. Sufficiency conditions for the existence of such an optimal feedback control are given. Dedicated to George Leitmann Recommended by G.J. Olsder Presented at the Third Workshop on Control Mechanics in honor of George Leitmann, January 22–24, 1990, University of Southern California, Los Angeles, California (USA).  相似文献   

16.
The aim of this paper is to study the behavior of the operators T λ defined by
. Here we estimate the rate of convergence at a point x, which has a discontinuity of the first kind as λλ 0. This study is an extension of the papers [9] and [13], which includes Bernstein operators. Beta operators, Picard operators, Philips operators, Durrmeyer operators, etc. as special cases.   相似文献   

17.
In the first part of this work, we derive compact numerical quadrature formulas for finite-range integrals $I[f]=\int^{b}_{a}f(x)\,dx$ , where f(x)=g(x)|x?t| ?? , ?? being real. Depending on the value of ??, these integrals are defined either in the regular sense or in the sense of Hadamard finite part. Assuming that g??C ??[a,b], or g??C ??(a,b) but can have arbitrary algebraic singularities at x=a and/or x=b, and letting h=(b?a)/n, n an integer, we derive asymptotic expansions for ${T}^{*}_{n}[f]=h\sum_{1\leq j\leq n-1,\ x_{j}\neq t}f(x_{j})$ , where x j =a+jh and t??{x 1,??,x n?1}. These asymptotic expansions are based on some recent generalizations of the Euler?CMaclaurin expansion due to the author (A.?Sidi, Euler?CMaclaurin expansions for integrals with arbitrary algebraic endpoint singularities, in Math. Comput., 2012), and are used to construct our quadrature formulas, whose accuracies are then increased at will by applying to them the Richardson extrapolation process. We pay particular attention to the case in which ??=?2 and f(x) is T-periodic with T=b?a and $f\in C^{\infty}(-\infty,\infty)\setminus\{t+kT\}^{\infty}_{k=-\infty}$ , which arises in the context of periodic hypersingular integral equations. For this case, we propose the remarkably simple and compact quadrature formula $\widehat{Q}_{n}[f]=h\sum^{n}_{j=1}f(t+jh-h/2)-\pi^{2} g(t)h^{-1}$ , and show that $\widehat{Q}_{n}[f]-I[f]=O(h^{\mu})$ as h??0 ???>0, and that it is exact for a class of singular integrals involving trigonometric polynomials of degree at most n. We show how $\widehat{Q}_{n}[f]$ can be used for solving hypersingular integral equations in an efficient manner. In the second part of this work, we derive the Euler?CMaclaurin expansion for integrals $I[f]=\int^{b}_{a} f(x)dx$ , where f(x)=g(x)(x?t) ?? , with g(x) as before and ??=?1,?3,?5,??, from which suitable quadrature formulas can be obtained. We revisit the case of ??=?1, for which the known quadrature formula $\widetilde{Q}_{n}[f]=h\sum^{n}_{j=1}f(t+jh-h/2)$ satisfies $\widetilde{Q}_{n}[f]-I[f]=O(h^{\mu})$ as h??0 ???>0, when f(x) is T-periodic with T=b?a and $f\in C^{\infty}(-\infty,\infty)\setminus\{t+kT\}^{\infty}_{k=-\infty}$ . We show that this formula too is exact for a class of singular integrals involving trigonometric polynomials of degree at most n?1. We provide numerical examples involving periodic integrands that confirm the theoretical results.  相似文献   

18.
Many recent papers have dealt with the application of feedforward neural networks in financial data processing. This powerful neural model can implement very complex nonlinear mappings, but when outputs are not available or clustering of patterns is required, the use of unsupervised models such as self-organizing maps is more suitable. The present work shows the capabilities of self-organizing feature maps for the analysis and representation of financial data and for aid in financial decision-making. For this purpose, we analyse the Spanish banking crisis of 1977–1985 and the Spanish economic situation in 1990 and 1991, making use of this unsupervised model. Emphasis is placed on the analysis of the synaptic weights, fundamental for delimiting regions on the map, such as bankrupt or solvent regions, where similar companies are clustered. The time evolution of the companies and other important conclusions can be drawn from the resulting maps.Characters and symbols used and their meaning nx x dimension of the neuron grid, in number of neurons - ny y dimension of the neuron grid, in number of neurons - n dimension of the input vector, number of input variables - (i, j) indices of a neuron on the map - k index of the input variables - w ijk synaptic weight that connects thek input with the (i, j) neuron on the map - W ij weight vector of the (i, j) neuron - x k input vector - X input vector - (t) learning rate - o starting learning rate - f final learning rate - R(t) neighbourhood radius - R0 starting neighbourhood radius - R f final neighbourhood radius - t iteration counter - t rf number of iterations until reachingR f - t f number of iterations until reaching f - h(·) lateral interaction function - standard deviation - for every - d (x, y) distance between the vectors x and y  相似文献   

19.
For the equation x(t) = x(t) (1-(1/) t-- t- x(u)du), > 0, > 0, > 0, conditions for the stability of a nonzero stationary solution under small perturbations are determined.  相似文献   

20.
Letf: {0,1} n {0,1} m be anm-output Boolean function inn variables.f is called ak-slice iff(x) equals the all-zero vector for allx with Hamming weight less thank andf(x) equals the all-one vector for allx with Hamming weight more thank. Wegener showed that PI k -set circuits (set circuits over prime implicants of lengthk) are at the heart of any optimum Boolean circuit for ak-slicef. We prove that, in PI k -set circuits, savings are possible for the mass production of anyFX, i.e., any collectionF ofm output-sets given any collectionX ofn input-sets, if their PI k -set complexity satisfiesSC m (FX)3n+2m. This PI k mass production, which can be used in monotone circuits for slice functions, is then exploited in different ways to obtain a monotone circuit of complexity 3n+o(n) for the Neiporuk slice, thus disproving a conjecture by Wegener that this slice has monotone complexity (n 3/2). Finally, the new circuit for the Neiporuk slice is proven to be asymptotically optimal, not only with respect to monotone complexity, but also with respect to combinational complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号