共查询到20条相似文献,搜索用时 125 毫秒
1.
Toeplitz矩阵,Hankel矩阵求逆的固有复杂度 总被引:4,自引:0,他引:4
对于一类问题P,如果能找到一个算法(对串行计算而言)其计算复杂性为f_1(u),则称f_1(n)为问题P固有复杂度的上界,若问题P的所有算法(对串行计算而言)其计算复杂性不小于f_2(n),则称f_2(u)为问题P固有复杂度下界.问题P的固有复杂度介于上 相似文献
2.
本文基于新的Kronecker型替换,给出两个由黑盒表示的稀疏多项式的新确定性插值算法.令f∈R[x1,……,xn]是一个稀疏黑盒多项式,其次数上界为D.当R是C或者是有限域时,相对于已有算法,新算法具有更好的计算复杂度或者关于D的复杂度更低.特别地,对于一般黑盒模型,D是复杂度中的主要因素,而在所有的确定性算法中,本文的第二个算法的复杂度关于D是最低的. 相似文献
3.
4.
完全二叉树模型中元素的CB秩 总被引:4,自引:2,他引:2
本文以完全二叉树理论的可量词消去为基础,介绍了该理论的可数原子模型 及饱和模型,并计算了一元、二元完全型的CB秩,从而给出了CB秩在该理论中的 几何解释. 相似文献
5.
本文以完全二叉树理论的可量词消去为基础,介绍了该理论的可数原子模型 及饱和模型,并计算了一元、二元完全型的CB秩,从而给出了CB秩在该理论中的 几何解释. 相似文献
6.
《中国科学:数学》2020,(9)
优化算法的收敛性分析是优化中很重要的一个领域,然而收敛性并不足以作为比较不同算法效率的标准,因此需要另外一套衡量优化问题难易程度以及优化算法效率高低的理论,这套理论被称为优化算法的复杂度分析理论.本文共分为5个部分.第1节介绍复杂度分析的背景和理论框架,给出复杂度分析的定义、方法和例子,并总结本文中的复杂度结论.第2节介绍光滑优化问题的复杂度分析,给出不同优化问题的复杂度上界和下界,并给出加速梯度法收敛性分析的框架.第3节介绍非光滑优化问题的复杂度上界,介绍次梯度法、重心法、椭球法和近似点梯度法的复杂度分析.第4节介绍条件梯度法的复杂度分析,介绍条件梯度法的复杂度上界和下界,以及加速条件梯度法的框架.第5节介绍随机优化算法的复杂度分析,比较随机优化算法在凸和非凸问题下收敛的置信水平和复杂度. 相似文献
7.
8.
9.
《数学的实践与认识》2013,(13)
首先证明了关于一般图的多色Ramsey数的一个下界,该下界是一类星图对完全图的多色Ramsey数的精确下界;其次证明了关于星图对完全图的多色Ramsey数的上界,该上界是一类星图对完全图的多色RamSey数的精确上界;最后证明关于树图对完全图的多色Ramsey数的上界. 相似文献
10.
针对采用数值分析方法进行数据拟合求解复杂度高、运算最大而精度较低的缺陷 ,本文给出一种基于二叉树编码的遗传算法来进行数据拟合 ,取得了较好的效果 相似文献
11.
Klaus Weihrauch 《Journal of Complexity》1991,7(4)
A reasonable computational complexity theory for real functions is obtained by using the modified infinite binary representation with digits 0, l, and −1 for the real numbers and Turing machines which transform with one-way output modified binary input sequences into modified binary output sequences. As the main result of this paper it is shown that there is a trade-off between the input lookahead, i.e., the deviation of online computation and the computational complexity for machines computing certain real functions. 相似文献
12.
The cubical dimension of a graph G is the smallest dimension of a hypercube into which G is embeddable as a subgraph. The conjecture of Havel (1984) claims that the cubical dimension of every balanced binary tree with 2 n vertices, n ? 1, is n. The 2-rooted complete binary tree of depth n is obtained from two copies of the complete binary tree of depth n by adding an edge linking their respective roots. In this paper, we determine the cubical dimension of trees obtained by subdividing twice a 2-rooted complete binary tree and prove that every such balanced tree satisfies the conjecture of Havel. 相似文献
13.
G. Grätzer 《Algebra Universalis》2016,75(2):127-154
In this paper, we exhibit a relation algebra reduct of any diagonal-free cylindric algebra of dimension 3 having sufficiently strong projection and equality parameters. We also offer a complete (and corrected) proof that full first-order logic can be formalized in the calculus of binary relations (a result due to Maddux and Tarski). Finally, we use these constructions to recursively define a translation function from the sentences of first-order logic to the equational theory of Df3, which preserves validity. 相似文献
14.
Arnaud Carayol Christof Löding Damian Niwinski Igor Walukiewicz 《Central European Journal of Mathematics》2010,8(4):662-682
We give a new proof showing that it is not possible to define in monadic second-order logic (MSO) a choice function on the
infinite binary tree. This result was first obtained by Gurevich and Shelah using set theoretical arguments. Our proof is
much simpler and only uses basic tools from automata theory. We show how the result can be used to prove the inherent ambiguity
of languages of infinite trees. In a second part we strengthen the result of the non-existence of an MSO-definable well-founded
order on the infinite binary tree by showing that every infinite binary tree with a well-founded order has an undecidable
MSO-theory. 相似文献
15.
Paul Manuel 《Discrete Applied Mathematics》2011,159(5):360-366
We study the embedding problem of enhanced and augmented hypercubes into complete binary trees. Using tree traversal techniques, we compute the minimum average edge congestion of enhanced and augmented hypercubes into complete binary trees. 相似文献
16.
Claude Laflamme Maurice Pouzet Norbert Sauer 《Abhandlungen aus dem Mathematischen Seminar der Universit?t Hamburg》2017,87(2):369-408
A tree is scattered if it does not contain a subdivision of the complete binary tree as a subtree. We show that every scattered tree contains a vertex, an edge, or a set of at most two ends preserved by every embedding of T. This extends results of Halin, Polat and Sabidussi. Calling two trees equimorphic if each embeds in the other, we then prove that either every tree that is equimorphic to a scattered tree T is isomorphic to T, or there are infinitely many pairwise non-isomorphic trees which are equimorphic to T. This proves the tree alternative conjecture of Bonato and Tardif for scattered trees, and a conjecture of Tyomkyn for locally finite scattered trees. 相似文献
17.
18.
In this paper, we develop a theoretical framework about spatial patterns in a three-species predator–prey–mutualist system with cross-diffusion. We concentrate on three aspects of Turing pattern formation: (1) what conditions enable the occurrence of Turing patterns? (2) what are the underlying mechanisms? (3) what are the corresponding configurations? For the first two questions, by use of the stability analysis for the positive uniform solution and the Leray–Schauder degree theory, we prove that under some conditions, the system admits at least a nonhomogeneous stationary solution. For the third question, we carry out numerical simulations for a Turing pattern, and we show that the configurations of Turing pattern are stable spotted patterns, which resemble a real ecosystem. 相似文献
19.
Sambath Muniyagounder Balachandran Krishnan 《Journal of Applied Analysis & Computation》2013,3(1):71-80
In this paper, we investigate the spatiotemporal dynamics of a ratio-dependent predator-prey model with cross diffusion incorporating proportion of prey refuge. First we get the critical lines of Hopf and Turing bifurcations in a spatial domain by using mathematical theory. More specifically, the exact Turing region is given in a two parameter space. Also we perform a series of numerical simulations. The obtained results reveal that this system has rich dynamics, such as spotted, stripe and labyrinth patterns which show that it is useful to use the predator-prey model to reveal the spatial dynamics in the real world. 相似文献
20.
Masatomo Takahashi 《Journal of Mathematical Sciences》2007,144(1):3854-3869
We consider an implicit first-order ordinary differential equation with complete integral. In [3], the authors give a generic
classifications of first-order ordinary differential equations with complete integral with respect to the equivalence relation
which is given by the group of point transformations. The classification problem is reduced to the classification of a certain
class of divergent diagrams of mapping germs. In this paper, we give a generic classifications of bifurcations of such differential
equations as an application of the Legendrian singularity theory.
__________
Translated from Sovremennaya Matematika i Ee Prilozheniya (Contemporary Mathematics and Its Applications), Vol. 33, Suzdal
Conference-2004, Part 1, 2005. 相似文献