首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
It is well-known that the H2-norm and H-norm of a transfer function can differ arbitrarily since both norms reflect fundamentally different properties. However, if the pole structure of the transfer function is known it is possible to bound the H-norm from above by a constant multiple of the H2-norm. It is desirable to compute this constant as tightly as possible. In this article we derive a tight bound for the H-norm given knowledge of the H2-norm and the poles of a transfer function. We compute the bound in closed form for multiple input multiple output transfer functions in continuous and discrete time. Furthermore we derive a general procedure to compute the bound given a weighted L2-norm.  相似文献   

2.
Based on the method of (n,k)-universal sets, we present a deterministic parameterized algorithm for the weighted rd-matching problem with time complexity O(4(r−1)k+o(k)), improving the previous best upper bound O(4rk+o(k)). In particular, the algorithm applied to the unweighted 3d-matching problem results in a deterministic algorithm with time O(16k+o(k)), improving the previous best result O(21.26k). For the weighted r-set packing problem, we present a deterministic parameterized algorithm with time complexity O(2(2r−1)k+o(k)), improving the previous best result O(22rk+o(k)). The algorithm, when applied to the unweighted 3-set packing problem, has running time O(32k+o(k)), improving the previous best result O(43.62k+o(k)). Moreover, for the weighted r-set packing and weighted rd-matching problems, we give a kernel of size O(kr), which is the first kernelization algorithm for the problems on weighted versions.  相似文献   

3.
We show an O?(n(?+1))-time algorithm for the channel assignment problem, where ? is the maximum edge weight. This improves on the previous O?(n(?+2))-time algorithm by Král (2005) [1], as well as algorithms for important special cases, like L(2,1)-labeling. For the latter problem, our algorithm works in O?(n3) time. The progress is achieved by applying the fast zeta transform in combination with the inclusion-exclusion principle.  相似文献   

4.
5.
In this paper we prove that, under suitable conditions, Atanassov’s Kα operators, which act on intervals, provide the same numerical results as OWA operators of dimension two. On one hand, this allows us to recover OWA operators from Kα operators. On the other hand, by analyzing the properties of Atanassov’s operators, we can generalize them. In this way, we introduce a class of aggregation functions - the generalized Atanassov operators - that, in particular, include two-dimensional OWA operators. We investigate under which conditions these generalized Atanassov operators satisfy some properties usually required for aggregation functions, such as bisymmetry, strictness, monotonicity, etc. We also show that if we apply these aggregation functions to interval-valued fuzzy sets, we obtain an ordered family of fuzzy sets.  相似文献   

6.
This paper studies the problem of state feedback control of continuous-time T-S fuzzy systems. Switched fuzzy controllers are exploited in the control design, which are switched based on the values of membership functions, and the control scheme is an extension of the parallel distributed compensation (PDC) scheme. Sufficient conditions for designing switched state feedback controllers are obtained with meeting an H norm bound requirement and quadratic D stability constraints. It is shown that the new control design method provides less conservative results than the corresponding ones via the parallel distributed compensation (PDC) scheme. A numerical example is given to illustrate the effectiveness of the proposed method.  相似文献   

7.
This paper considers design problems of robust gain-scheduled H and H2 filters for linear parameter-varying (LPV) systems whose state-space matrices are represented as parametrically affine matrices, using quadratically parameter-dependent Lyapunov functions, and proposes methods of filter design via parametrically affine linear matrix inequalities (LMIs). For robust filters, our design methods theoretically encompass those that use constant Lyapunov functions. Several numerical examples are included that demonstrate the effectiveness of gain-scheduled and robust filters using our proposed methods compared with robust filters using existing methods.  相似文献   

8.
For a (molecular) graph, the first Zagreb index M1 is equal to the sum of the squares of the degrees of the vertices, and the second Zagreb index M2 is equal to the sum of the products of the degrees of pairs of adjacent vertices. If G is a connected graph with vertex set V(G), then the eccentric connectivity index of G, ξC(G), is defined as, ∑viV(G)diei, where di is the degree of a vertex vi and ei is its eccentricity. In this report we compare the eccentric connectivity index (ξC) and the Zagreb indices (M1 and M2) for chemical trees. Moreover, we compare the eccentric connectivity index (ξC) and the first Zagreb index (M1) for molecular graphs.  相似文献   

9.
This paper first introduces a piecewise linear interpolation method for fuzzy-valued functions. Based on this, we present a concrete approximation procedure to show the capability of four-layer regular fuzzy neural networks to perform approximation on the set of all dp continuous fuzzy-valued functions. This approach can also be used to approximate d continuous fuzzy-valued functions. An example is given to illustrate the approximation procedure.  相似文献   

10.
Arithmetic operators in interval-valued fuzzy set theory   总被引:1,自引:0,他引:1  
We introduce the addition, subtraction, multiplication and division on LI, where LI is the underlying lattice of both interval-valued fuzzy set theory [R. Sambuc, Fonctions Φ-floues. Application à l’aide au diagnostic en pathologie thyroidienne, Ph.D. Thesis, Université de Marseille, France, 1975] and intuitionistic fuzzy set theory [K.T. Atanassov, Intuitionistic fuzzy sets, 1983, VII ITKR’s Session, Sofia (deposed in Central Sci. Technical Library of Bulg. Acad. of Sci., 1697/84) (in Bulgarian)]. We investigate some algebraic properties of these operators. We show that using these operators the pseudo-t-representable extensions of the ?ukasiewicz t-norm and the product t-norm on the unit interval to LI and some related operators can be written in a similar way as their counterparts on ([0,1],?).  相似文献   

11.
We consider a model for online computation in which the online algorithm receives, together with each request, some information regarding the future, referred to as advice. The advice is a function, defined by the online algorithm, of the whole request sequence. The advice provided to the online algorithm may allow an improvement in its performance, compared to the classical model of complete lack of information regarding the future. We are interested in the impact of such advice on the competitive ratio, and in particular, in the relation between the size b of the advice, measured in terms of bits of information per request, and the (improved) competitive ratio. Since b=0 corresponds to the classical online model, and b=⌈log∣A∣⌉, where A is the algorithm’s action space, corresponds to the optimal (offline) one, our model spans a spectrum of settings ranging from classical online algorithms to offline ones.In this paper we propose the above model and illustrate its applicability by considering two of the most extensively studied online problems, namely, metrical task systems (MTS) and the k-server problem. For MTS we establish tight (up to constant factors) upper and lower bounds on the competitive ratio of deterministic and randomized online algorithms with advice for any choice of 1≤bΘ(logn), where n is the number of states in the system: we prove that any randomized online algorithm for MTS has competitive ratio Ω(log(n)/b) and we present a deterministic online algorithm for MTS with competitive ratio O(log(n)/b). For the k-server problem we construct a deterministic online algorithm for general metric spaces with competitive ratio kO(1/b) for any choice of Θ(1)≤b≤logk.  相似文献   

12.
Squares are strings of the form ww where w is any nonempty string. Two squares ww and ww are of different types if and only if ww. Fraenkel and Simpson [Avieri S. Fraenkel, Jamie Simpson, How many squares can a string contain? Journal of Combinatorial Theory, Series A 82 (1998) 112-120] proved that the number of square types contained in a string of length n is bounded by O(n). The set of all different square types contained in a string is called the vocabulary of the string. If a square can be obtained by a series of successive right-rotations from another square, then we say the latter covers the former. A square is called a c-square if no square with a smaller index can cover it and it is not a trivial square. The set containing all c-squares is called the covering set. Note that every string has a unique covering set. Furthermore, the vocabulary of the covering set are called c-vocabulary. In this paper, we prove that the cardinality of c-vocabulary in a string is less than , where N is the number of runs in this string.  相似文献   

13.
This paper considers input affine nonlinear systems with matched disturbances and shows how to compute an a priori upper bound of the H attenuation level achieved by the optimal L2 controller and the suboptimal H central controller. The case where the disturbance contains a constant term is also discussed. These bounds are shown to depend only on the function mapping the control input to the performance variable. This result is used to derive a robust control design for a special, but practically important, class of non-input affine nonlinear systems consisting of the series connection of a nonlinear state and input dependent map and of a nonlinear input affine dynamical system. Approximate inversion of the nonlinear static map leads to a robust control problem which fits into the framework. The effectiveness of the theoretical results is shown by its use for the robust control design of a diesel engine test bench.  相似文献   

14.
Stability of linear systems with uncertain bounded time-varying delays is studied under the assumption that the nominal delay values are not equal to zero. An input-output approach to stability of such systems is known to be based on the bound of the L2-norm of a certain integral operator. There exists a bound on this operator norm in two cases: in the case where the delay derivative is not greater than 1 and in the case without any constraints on the delay derivative. In the present note we fill the gap between the two cases by deriving a tight operator bound which is an increasing and continuous function of the delay derivative upper bound d?1. For d→∞ the new bound corresponds to the second case and improves the existing bound. As a result, for the first time, delay-derivative-dependent frequency domain and time domain stability criteria are derived for systems with the delay derivative greater than 1.  相似文献   

15.
In 2000, Li et al. introduced dual-cube networks, denoted by DCn for n?1, using the hypercube family Qn and showed the vertex symmetry and some fault-tolerant hamiltonian properties of DCn. In this article, we introduce a new family of interconnection networks called dual-cube extensive networks, denoted by DCEN(G). Given any arbitrary graph G, DCEN(G) is generated from G using the similar structure of DCn. We show that if G is a nonbipartite and hamiltonian connected graph, then DCEN(G) is hamiltonian connected. In addition, if G has the property that for any two distinct vertices u,v of G, there exist three disjoint paths between u and v such that these three paths span the graph G, then DCEN(G) preserves the same property. Furthermore, we prove that the similar results hold when G is a bipartite graph.  相似文献   

16.
The forward search provides data-driven flexible trimming of a Cp statistic for the choice of regression models that reveals the effect of outliers on model selection. An informed robust model choice follows. Even in small samples, the statistic has a null distribution indistinguishable from an F distribution. Limits on acceptable values of the Cp statistic follow. Two examples of widely differing size are discussed. A powerful graphical tool is the generalized candlestick plot, which summarizes the information on all forward searches and on the choice of models. A comparison is made with the use of M-estimation in robust model choice.  相似文献   

17.
By a d-dimensional B-spline object (denoted as Od), we mean a B-spline curve (d=1), a B-spline surface (d=2) or a B-spline volume (d=3). By regularization of a B-spline object Od we mean the process of relocating the control points of Od such that it approximates an isometric map of its definition domain in certain directions and is shape preserving. In this paper we develop an efficient regularization method for Od, d=1,2,3, based on solving weak form L2-gradient flows constructed from the minimization of certain regularizing energy functionals. These flows are integrated via the finite element method using B-spline basis functions. Our experimental results demonstrate that our new regularization methods are very effective.  相似文献   

18.
19.
Let λ denote any of the classical spaces ?,c,c0, and ?p of bounded, convergent, null, and absolutely p-summable sequences, respectively, and let λ(B) also be the domain of the triple band matrix B(r,s,t) in the sequence space λ, where 1<p<. The present paper is devoted to studying the sequence space λ(B). Furthermore, the β- and γ-duals of the space λ(B) are determined, the Schauder bases for the spaces c(B), c0(B), and ?p(B) are given, and some topological properties of the spaces c0(B), ?1(B), and ?p(B) are examined. Finally, the classes (λ1(B):λ2) and (λ1(B):λ2(B)) of infinite matrices are characterized, where λ1∈{?,c,c0,?p,?1} and λ2∈{?,c,c0,?1}.  相似文献   

20.
Given a molecule, which consists of a set of atoms, a molecular surface is defined for a spherical probe approximating a solvent molecule. Molecular surface is used for both the visualization of the molecule and the computation of various molecular properties such as the area and volume of a protein, which are important for studying problems such as protein docking and folding.In this paper, we present an O(n) time algorithm, in the worst case, for triangulating molecular surface based on the combinatorial information provided by the β-shape of the molecule with n atoms. The proposed algorithm takes advantage of the concise representation of topology among atoms stored in the β-shape.A molecular surface consists of two parts: a blending surface consisting of blending patches and a (solvent) contact surface consisting of (solvent) contact patches. For each blending patch, the algorithm uses compact masks for the construction of a triangular mesh in O(c) time in the worst case, where c is the number of point evaluations on the blending patch. For each contact patch, the algorithm uses a template, for each atom type, for the triangulation of the boundary of the atom. Then, the triangular mesh is trimmed off by hyperplanes where each hyperplane corresponds to an arc of the boundary of the contact patch. The triangulation of a contact patch takes O(c) time in the worst case, where c is the number of point evaluations on the boundary of an atom. Since there are at most O(n) patches, the worst case time complexity is O(n).The proposed algorithm also handles internal voids and guarantees the watertightness of the produced triangular mesh of a molecular surface. In addition, the level-of-detail is easily achieved as a by-product of the proposed scheme. The proposed algorithm is fully implemented and statistics from experiments are also collected.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号