首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
We introduce a new method of solving C1 Hermite interpolation problems, which makes it possible to use a wider range of PH curves with potentially better shapes. By characterizing PH curves by roots of their hodographs in the complex representation, we introduce PH curves of type K(tc)2n+1+d. Next, we introduce a speed reparametrization. Finally, we show that, for C1 Hermite data, we can use PH curves of type K(tc)2n+1+d or strongly regular PH quintics satisfying the G1 reduction of C1 data, and use these curves to solve the original C1 Hermite interpolation problem.  相似文献   

2.
The paper describes a method to join two circles with a C-shaped and an S-shaped transition curve, composed of a Pythagorean hodograph quintic segment, preserving G2 continuity. It is considered desirable to have such a curve in satellite path planning, highway or railway route designing, or non-holonomic robot path planning. As an extension of our previous work, we show that a single quintic curve can be used for blending or for a transition curve between two circles, including the previously unsolved cases of concentric and tangential circles.  相似文献   

3.
A constructive geometric approach to rational ovals and rosettes of constant width formed by piecewise rational PH curves is presented. We propose two main constructions. The first construction, models with rational PH curves of algebraic class 3 (T-quartics) and is based on the fact that T-quartics are exactly the involutes of T-cubic curves. The second construction, models with rational PH curves of algebraic class m>4 and is based on the dual control structure of offsets of rational PH curves.  相似文献   

4.
M.  G.   《Performance Evaluation》2007,64(9-12):1153-1168
The paper investigates the problem of minimal representation of Markov arrival processes of order n (MAP(n)). The minimal representation of MAPs is crucial for developing effective fitting methods. It seems that all existing MAP fitting methods are based on the , representation which is known to be redundant. We present the minimal number of parameters to define a MAP(n) and provide a numerical moments-matching method based on a minimal representation.

The discussion starts with a characterization of phase type (PH) distributions and then the analysis of MAPs follows a similar pattern. This characterization contains essential results on the identity of stationary behaviour of MAPs and on the number of parameters required to describe the stationary behaviour.

The proposed moments matching method is also applicable for PH distributions. In this case it is a unique method that fits a general PH distribution of order n based on 2n−1 parameters.  相似文献   


5.
We present a new semi-topological quantity, called the absolute hodograph winding number, that measures how close the quintic PH spline interpolating a given sequence of points is to the cubic spline interpolating the same sequence. This quantity then naturally leads into a new criterion of determining the best quintic PH spline interpolant. This seems to work favorably compared with the elastic bending energy criterion developed by Farouki [Farouki, R.T., 1996. The elastic bending energy of Pythagorean-hodograph curves. Comput. Aided Geom. Design 13 (3), 227–241]. We also present a fast method that is a modification of the method of Albrecht, Farouki, Kuspa, Manni, and Sestini [Albrecht, G., Farouki, R.T., 1996. Construction of C2 Pythagorean-hodograph interpolating splines by the homotopy method. Adv. Comput. Math. 5 (4), 417–442; Farouki, R.T., Kuspa, B.K., Manni, C., Sestini, A., 2001. Efficient solution of the complex quadratic tridiagonal system for C2 PH quintic splines. Numer. Algorithms 27 (1), 35–60]. While the basic scheme of our approach is essentially the same as theirs, ours differs in that the underlying space in which the Newton–Raphson method is applied is the double covering space of the hodograph space, whereas theirs is the hodograph space itself. This difference, however, seems to produce more favorable results, when viewed from the above mentioned semi-topological criterion.  相似文献   

6.
We introduce a new simultaneously diagonalizable real algebra of symmetrical centrosymmetrical matrices having a Toeplitz-plus-Hankel structure. We give the corresponding orthonormal basis of eigenvectors which are alternately symmetrical and skewsymmetrical vectors. An application is the construction of a symmetrical Toeplitz-plus-centrosymmetrical Hankel matrix of equal row sums having a prescribed real spectrum. This matrix can be used as the starting matrix for symmetrical centrosymmetrical isospectral flows. In particular, for the isospectral flow corresponding to the construction of a regular Toeplitz matrix having prescribed eigenvalues. Moreover, if A is a noise representation of an unknown matrix in of rank k then we give a procedure to approximate A by a matrix in of rank k.  相似文献   

7.
Lizheng  Guozhao 《Computer aided design》2006,38(12):1215-1223
Given a triangular Bézier surface of degree n, the problem of multi-degree reduction by a triangular Bézier surface of degree m with boundary constraints is investigated. This paper considers the continuity of triangular Bézier surfaces at the three corners, so that the boundary curves preserve endpoints continuity of any order . The l2- and L2-norm combined with the constrained least-squares method are used to get the matrix representations for the control points of the degree reduced surfaces. Both methods can be applied to piecewise continuous triangular patches or to only a triangular patch with the combination of surface subdivision. And the resulting piecewise approximating patches are globally C0 continuous. Finally, error estimation is given and numerical examples demonstrate the effectiveness of our methods.  相似文献   

8.
In this paper we show that there is a mapping D:MDM on means such that if M is a Fibonacci mean so is DM, that if M is the harmonic mean, then DM is the arithmetic mean, and if M is a Fibonacci mean, then limnDnM is the golden section mean.  相似文献   

9.
For a simple graph G, let . In this paper, we prove that if NCD(G)≥|V(G)|, then either G is Hamiltonian-connected, or G belongs to a well-characterized class of graphs. The former results by Dirac, Ore and Faudree et al. are extended.  相似文献   

10.
Embedding of paths have attracted much attention in the parallel processing. Many-to-many communication is one of the most central issues in various interconnection networks. A graph G is globally two-equal-disjoint path coverable if for any two distinct pairs of vertices (u,v) and (w,x) of G, there exist two disjoint paths P and Q satisfied that (1) P (Q, respectively) joins u and v (w and x, respectively), (2) |P|=|Q|, and (3) V(PQ)=V(G). The Matching Composition Network (MCN) is a family of networks which two components are connected by a perfect matching. In this paper, we consider the globally two-equal-disjoint path cover property of MCN. Applying our result, the Crossed cube CQn, the Twisted cube TQn, and the Möbius cube MQn can all be proven to be globally two-equal-disjoint path coverable for n5.  相似文献   

11.
Periodicity constraints are used in many logical formalisms, in fragments of Presburger LTL, in calendar logics, and in logics for access control, to quote a few examples. In the paper, we introduce the logic PLTLmod, an extension of Linear-Time Temporal Logic LTL with past-time operators whose atomic formulae are defined from a first-order constraint language dealing with periodicity. Although the underlying constraint language is a fragment of Presburger arithmetic shown to admit a PSPACE-complete satisfiability problem, we establish that PLTLmod model-checking and satisfiability problems remain in PSPACE as plain LTL (full Presburger LTL is known to be highly undecidable). This is particularly interesting for dealing with periodicity constraints since the language of PLTLmod has a language more concise than existing languages and the temporalization of our first-order language of periodicity constraints has the same worst case complexity as the underlying constraint language. Finally, we show examples of introduction the quantification in the logical language that provide to PLTLmod, EXPSPACE-complete problems. As another application, we establish that the equivalence problem for extended single-string automata, known to express the equality of time granularities, is PSPACE-complete by designing a reduction from QBF and by using our results for PLTLmod.  相似文献   

12.
We derive fast algorithms for the following problem: given a set of n points on the real line and two parameters s and p, find s disjoint intervals of maximum total length that contain at most p of the given points. Our main contribution consists of algorithms whose time bounds improve upon a straightforward dynamic programming algorithm, in the relevant case that input size n is much bigger than parameters s and p. These results are achieved by selecting a few candidate intervals that are provably sufficient for building an optimal solution via dynamic programming. As a byproduct of this idea we improve an algorithm for a similar subsequence problem of Chen et al. [Disjoint segments with maximum density, in: International Workshop on Bioinformatics Research and Applications IWBRA 2005, (within ICCS 2005), Lecture Notes in Computer Science, vol. 3515, Springer, Berlin, pp. 845–850]. The problems are motivated by the search for significant patterns in biological data. Finally, we propose several heuristics that further reduce the time complexity in typical instances. One of them leads to an apparently open subsequence sum problem of independent interest.  相似文献   

13.
This paper introduces a novel lossless binary data compression scheme that is based on the error correcting Hamming codes, namely the HCDC scheme. In this scheme, the binary sequence to be compressed is divided into blocks of n bits length. To utilize the Hamming codes, the block is considered as a Hamming codeword that consists of p parity bits and d data bits (n=d+p). Then each block is tested to find if it is a valid or a non-valid Hamming codeword. For a valid block, only the d data bits preceded by 1 are written to the compressed file, while for a non-valid block all n bits preceded by 0 are written to the compressed file. These additional 1 and 0 bits are used to distinguish the valid and the non-valid blocks during the decompression process. An analytical formula is derived for computing the compression ratio as a function of block size, and fraction of valid data blocks in the sequence. The performance of the HCDC scheme is analyzed, and the results obtained are presented in tables and graphs. Finally, conclusions and recommendations for future works are pointed out.  相似文献   

14.
Recently, there have been improvements on reconstruction of smooth B-spline surfaces of arbitrary topological type, but the most important problem of smoothly stitching B-spline surface patches (the continuity problem of B-spline surface patches) in surface reconstruction has not been solved in an effective way. Therefore, the motivation of this paper is to study how to better improve and control the continuity between adjacent B-spline surfaces.

In this paper, we present a local scheme of constructing convergent G1 smooth bicubic B-spline surface patches with single interior knots over a given arbitrary quad partition of a polygonal model. Unlike previous work which only produces (non-controllable) toleranced G1 smooth B-spline surfaces, our algorithm generates convergent G1 smooth B-spline surfaces, which means the continuity of the B-spline surfaces tends to G1 smoothness as the number of control points increases. The most important feature of our algorithm is, in the meaning of convergent approximation order, the ability to control the continuity of B-spline surfaces within the given tolerance and capture the geometric details presented by the given data points.  相似文献   


15.
In this paper we present a master–worker type parallel method for finding several eigenvalues and eigenvectors of a generalized eigenvalue problem , where A and B are large sparse matrices. A moment-based method that finds all of the eigenvalues that lie inside a given domain is used. In this method, a small matrix pencil that has only the desired eigenvalues is derived by solving large sparse systems of linear equations constructed from A and B. Since these equations can be solved independently, we solve them on remote servers in parallel. This approach is suitable for master–worker programming models. We have implemented and tested the proposed method in a grid environment using a grid RPC (remote procedure call) system called OmniRPC. The performance of the method on PC clusters that were used over a wide-area network was evaluated.  相似文献   

16.
Valiant [L. Valiant, Completeness classes in algebra, in: Proc. 11th Annual ACM Symposium on the Theory of Computing, Atlanta, GA, 1979, pp. 249–261] proved that every polynomial of formula size e is a projection of the (e+2)×(e+2) determinant polynomial. We improve “e+2” to “e+1”, also for a definition of formula size that does not count multiplications by constants as gates. Our proof imitates the “2e+2” proof of von zur Gathen [J. von zur Gathen, Feasible arithmetic computations: Valiant's hypothesis, Journal of Symbolic Computation 4 (1987) 137–172], but uses different invariants and a tighter set of base cases.  相似文献   

17.
Elias Jarlebring  Tobias Damm   《Automatica》2007,43(12):2124-2128
In this note we find an explicit expression for the eigenvalues of a retarded time-delay system with one delay, for the special case that the system matrices are simultaneously triangularizable, which includes the case where they commute. Using matrix function definitions we define a matrix version of the Lambert W function, from which we form the expression. We prove by counter-example that some expressions in other publications on Lambert W for time-delay systems do not always hold.  相似文献   

18.
Mario  Michele   《Automatica》2005,41(12):2019-2032
Robustness had become in past years a central issue in system and control theory, focusing the attention of researchers from the study of a single model to the investigation of a set of models, described by a set of perturbations of a “nominal” model. Such a set, often indicated as an uncertainty model set or model set for short, has to be suitably constructed to describe the inherent uncertainty about the system under consideration and to be used for analysis and design purposes. H identification methods deliver uncertainty model sets in a suitable form to be used by well-established robust design techniques, based on H or μ optimization methods. The literature on H identification is now very extensive. In this paper, some of the most relevant contributions related to assumption validation, evaluation of bounds on unmodeled dynamics, convergence analysis and optimality properties of linear, two-stage and interpolatory algorithms are surveyed from a deterministic point of view.  相似文献   

19.
We give a framework for developing the least model semantics, fixpoint semantics, and SLD-resolution calculi for logic programs in multimodal logics whose frame restrictions consist of the conditions of seriality (i.e. ) and some classical first-order Horn clauses. Our approach is direct and no special restriction on occurrences of i and i is required. We apply our framework for a large class of basic serial multimodal logics, which are parameterized by an arbitrary combination of generalized versions of axioms T, B, 4, 5 (in the form, e.g. 4:□i→□jk) and I:□i→□j. Another part of the work is devoted to programming in multimodal logics intended for reasoning about multidegree belief, for use in distributed systems of belief, or for reasoning about epistemic states of agents in multiagent systems. For that we also use the framework, and although these latter logics belong to the mentioned class of basic serial multimodal logics, the special SLD-resolution calculi proposed for them are more efficient.  相似文献   

20.
Shang-Kuan  Ja-Chen   《Pattern recognition》2005,38(12):2466-2471
A fault-tolerant progressive image transmission method is proposed. The advantages include the following: (1) Unlike most progressive methods, the image is divided into n parts with equal importance to avoid worrying about which part is lost or transmitted first. (2) If the image is a secret image, then the transmission can use n distinct channels (one shared result per channel), and intercepting up to r1-1 channels by the enemy (r1rkn are all pre-set constants) will not reveal any secret. Meanwhile, the disconnection up to n-rk channels will not affect the lossless recovery of the secret image.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号