首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
A symmetric coherent system (or k-out-of-n system) is a system composed of n components CO1, CO2 …, COn, each component existing in either a working or failing state. Such a system is in a working state if and only if k or more of its components are working, where 1 ? k ? n. It is assumed that the components can only be tested individually, and every test gives perfect information as to whether the tested component is working or failing. Let Pi, be the a priori probability that the component COi is working and Ci, be the cost of testing component COi. An optimal (minimum total expected cost) testing algorithm is an algorithm to determine the condition of a given symmetric coherent system by testing some of its components individually. In general, such an algorithm is a sequential process, that is, the next component to be tested is a function of the outcomes of the tests already applied. Every (optimal) testing algorithm corresponds to a (optimal) feasible testing policy which is basically a binary rooted tree with some component assigned to each node. In this paper an algorithm is presented for constructing an optimal feasible testing policy for symmetric coherent systems, where CiPiCjPj and Ci(1 ? Pi)Cj(1 ? Pj) whenever ij. This algorithm can be implemented as an optimal testing algorithm with polynomial complexity. Moreover, it is proven that any optimal testing algorithm corresponds to some feasible testing policy which can be generated by this algorithm.  相似文献   

2.
We consider the problem of updating input-output matrices, i.e., for given (m,n) matrices A ? 0, W ? 0 and vectors u ? Rm, v?Rn, find an (m,n) matrix X ? 0 with prescribed row sums Σnj=1Xij = ui (i = 1,…,m) and prescribed column sums Σmi=1Xij = vj (j = 1,…,n) which fits the relations Xij = Aij + λiWij + Wij + Wijμj for all i,j and some λ?Rm, μ?Rn. Here we consider the question of existence of a solution to this problem, i.e., we shall characterize those matrices A, W and vectors u,v which lead to a solvable problem. Furthermore we outline some computational results using an algorithm of [2].  相似文献   

3.
Let X1, …, Xn be n disjoint sets. For 1 ? i ? n and 1 ? j ? h let Aij and Bij be subsets of Xi that satisfy |Aij| ? ri and |Bij| ? si for 1 ? i ? n, 1 ? j ? h, (∪i Aij) ∩ (∪i Bij) = ? for 1 ? j ? h, (∪i Aij) ∩ (∪i Bil) ≠ ? for 1 ? j < l ? h. We prove that h?Πi=1nri+siri. This result is best possible and has some interesting consequences. Its proof uses multilinear techniques (exterior algebra).  相似文献   

4.
The idea of binary search is generalized as follows. Given ?: {0, 1,…, N} → {0,…, K} such that ?(0) = 0, ?(N) = K, and ?(i) ? ?(j) for i < j, all the “jumps” of f, i.e., all is such that ?(i) > ?(i ? 1) together with the difference ?(i) ? ?(i ? 1) are recognized within K[log2(NK)] + [(N ? 1)2?[log2(NK)]]f-evaluations. This is proved to be the exact bound in the non-trivial case when K ? N. An optimal strategy is as follows: The first query will be at i = 2m, where m = [log2(NK)]. An adversary will then respond either ?(i) = 0 or ?(i) - 1 as explained in the paper.  相似文献   

5.
In connection with an optimization problem, all functions ?: InR with continuous nonzero partial derivatives and satisfying
???x,i???xj
for all xi, xjI, i, j = 1,2,…, n (n > 2) are determined (I is an interval of positive real numbers).  相似文献   

6.
It was proved by Erdös, Ko, and Radó (Intersection theorems for systems of finite sets, Quart. J. Math. Oxford Ser.12 (1961), 313–320.) that if A = {;A1,…, Al}; consists of k-subsets of a set with n > 2k elements such that AiAj ≠ ? for all i, j then l ? (k?1n?1). Schönheim proved that if A1, …, Al are subsets of a set S with n elements such that Ai ? Aj, AiAjø and AiAjS for all ij then l ? ([n2] ? 1n ? 1). In this note we prove a common strengthening of these results.  相似文献   

7.
The cofactor expression (? 1)i+jdet(I ? B)j?i?det(I ? B) for the (i, j)-entry in the inverse of a matrix (I ? B) is proved to be equal to the corresponding entry of the series Σm≥0Bm, by using purely combinatorial methods: circuit monoid techniques and monomial rearrangements. Moreover, the identity is shown to hold in a non-commutative formal power series algebra.  相似文献   

8.
Let Lj (j = 1, …, n + 1) be real linear functions on the convex set F of probability distributions. We consider the problem of maximization of Ln+1(F) under the constraint F ? F and the equality constraints L1(F) = z1 (i = 1, …, n). Incorporating some of the equality constraints into the basic set F, the problem is equivalent to a problem with less equality constraints. We also show how the dual problems can be eliminated from the statement of the main theorems and we give a new illuminating proof of the existence of particular solutions.The linearity of the functions Lj(j = 1, …, n + 1) can be dropped in several results.  相似文献   

9.
Let X be a finite set of n-melements and suppose t ? 0 is an integer. In 1975, P. Erdös asked for the determination of the maximum number of sets in a family F = {F1,…, Fm}, Fi ? X, such that ∥FiFj∥ ≠ t for 1 ? ij ? m. This problem is solved for n ? n0(t). Let us mention that the case t = 0 is trivial, the answer being 2n ? 1. For t = 1 the problem was solved in [3]. For the proof a result of independent interest (Theorem 1.5) is used, which exhibits connections between linear algebra and extremal set theory.  相似文献   

10.
Let S be a set of n elements, and k a fixed positive integer <12n. Katona's problem is to determine the smallest integer m for which there exists a family A = {A1, …, Am} of subsets of S with the following property: |i| ? k (i = 1, …, m), and for any ordered pair xi, xiS (ij) there is A1A such that xiA1, xj ? A1. It is given in this note that m = ?2nk? if12k2 ? 2.  相似文献   

11.
Let (Δ + λ) u = 0 in DcRd, ?u?N=0 on ?D. How do the eigenvalues λj behave when D shrinks to a domain Δ ? Rd ? 1 ? The answer depends not only on Δ but on the way D shrinks to Δ. The limit of λj is found. Examples are given.  相似文献   

12.
Let kn ? kn?1 ? … ? k1 be positive integers and let (ij) denote the coefficient of xi in Πr=1j (1 + x + x2 + … + xkr). For given integers l, m, where 1 ? l ? kn + kn?1 + … + k1 and 1 ? m ? (nn), it is shown that there exist unique integers m(l), m(l ? 1),…, m(t), satisfying certain conditions, for which m = (m(l)l + (m(l?1)l?1) + … + (m(t)t). Moreover, any m l-subsets of a multiset with ki elements of type i, i = 1, 2,…, n, will contain at least (m(l)l?1) + (m(l?1)l?2) + … + (m(t)t?1 different (l ? 1)-subsets. This result has been anticipated by Greene and Kleitman, but the formulation there is not completely correct. If k1 = 1, the numbers (ji) are binomial coefficients and the result is the Kruskal-Katona theorem.  相似文献   

13.
We generalize results of Ryser on (0, 1)-matrices without triangles, 3 × 3 submatrices with row and column sums 2. The extremal case of matrices without triangles was previously studied by the author. Let the row intersection of row i and row j (ij) of some matrix, when regarded as a vector, have a 1 in a given column if both row i and row j do not 0 otherwise. For matrices satisfying some conditions on forbidden configurations and column sums ? 2, we find that the number of linearly independent row intersections is equal to the number of distinct columns. The extremal matrices with m rows and (m2) distinct columns have a unique SDR of pairs of rows with 1's. A triangle bordered with a column of 0's and its (0, 1)-complement are also considered as forbidden configurations. Similar results are obtained and the extremal matrices are closely related to the extremal matrices without triangles.  相似文献   

14.
Elliptic boundary value problems for systems of nonlinear partial differential equations of the form Fi(x, u1, u2,…, uN,?ui?xj, ?pi?2ui?xj ?xk) = ?i(x), x ? Rn, i = 1(1)N, j, k = 1(1)n, pi ? 0, ? being a small parameter, with Dirichlet boundary conditions are considered. It is supposed that a formal approximation Z is given which satisfies the boundary conditions and the differential equations upto the order χ(?) = o(1) in some norm. Then, using the theory of differential inequalities, it is shown that under certain conditions the difference between the exact solution u of the boundary value problem and the formal approximation Z, taken in the sense of a suitable norm, can be made small.  相似文献   

15.
The tetrachoric series is a technique for evaluating multivariate normal probabilities frequently cited in the statistical literature. In this paper we have examined the convergence properties of the tetrachoric series and have established the following. For orthant probabilities, the tetrachoric series converges if |;?ij|; < 1(k ? 1), 1 ≤ i < jk, where ?ij are the correlation coefficients of a k-variate normal distribution. The tetrachoric series for orthant probabilities diverges whenever k is even and ?ij > 1(k ? 1) or k is odd and ?ij > 1(k ? 2), 1 ≤ i < jk. Other specific results concerning the convergence or divergence of this series are also given. The principal point is that the assertion that the tetrachoric series converges for all k ≥ 2 and all ?ij such that the correlation matrix is positive definite is false.  相似文献   

16.
We discuss here representation and Fredholm theory for C1-algebras generated by commuting isometries. More particularly, for n commuting isometries {Vj: 1 ? j ? n} on separable Hilbert space we give a representation resembling the well-known representation for a single isometry. Our representation permits an analysis of the C1-algebras Ol=Ol(Vj:1?j?n) generated by the {Vj}. The commutator ideal in Ol is identified precisely and, under certain additional hypotheses, the Fredholm operators in Ol are also precisely determined. Finally, we obtain formulas in terms of topological data for the index of Fredholm operators in some interesting algebras of the type Ol(Vj:1?j?n).  相似文献   

17.
A p-cover of n = {1, 2,…,n} is a family of subsets Si ≠ ? such that ∪ Si = n and |SiSi| ? p for ij. We prove that for fixed p, the number of p-cover of n is O(np+1logn).  相似文献   

18.
Let {Ai} be a family of sets and let S = ∩iAi. By a positional game we shall mean a game played by two players on {Ai}. The players alternately pick elements of S and that player wins who fist has all the elements of one of the Ai. This paper deals with almost disjoint hypergraphs only, i.e., |AiAj| ? 1 if ij. Let M1(n) be the smallest integer for which there is an almost disjoint n-uniform hypergraph |T| = M1(n), so that the first player has a winning strategy. It is shown that limn [M1(n)]1n = 4, which was conjectured by Erdös. The same method is applied to prove a conjecture of Hales and Jewett on r-dimensional tick-tack-toe if r is large enough. Finally we prove that for an arbitrary almost disjoint n-uniform hypergraph the second player has such a strategy that the first player unable to win in his mth move if m < (2 ? ?)n.  相似文献   

19.
If S is a collection of circuits in a graph G, the circuits in S are said to be consistently orientable if G can be oriented so that they are all directed circuits. If S is a set of three or more consistently orientable circuits such that no edge of G belongs to more than two circuits of S, then S is called a ring if there exists a cyclic ordering C0, C1,…, Cn ? 1, C0 of the n circuits in S such that ECi ? ECj ≠ ? if and only if j = i or ji ? 1 (mod n) or ji + 1 (mod n). We characterise planar cubic graphs in terms of the non-existence of a ring with certain specified properties.  相似文献   

20.
A pair (X, B) will be a t-wise balanced design (tBD) of type t?(v, K, λ) if B = (Bi: i ? I) is a family of subsets of X, called blocks, such that: (i) |X| = v ? N, where N is the set of positive integers; (ii) 1?t?|Bi|?K?N, for every i ? I; and (iii) if T ? X, |T| = t, then there are λ ? N indices i ? I where T ? Bi. Throughout this paper we make three restrictions on our tBD's: (1) there are no repeated blocks, i.e. B will be a set of subsets of X; (2) t ? K or there are no blocks of size t; and (3) Pk(X)?B or B does not contain all k-subsets of X for any t<k?v. Note then that X ? B. Also, if we give the parameters of a specific tBD, then we will choose a minimal K.We focus on the t?((p2), K, λ) designs with the symmetric group Sp as automorphism group, i.e. X will be the set of v = (p2) labelled edges of the undirected complete graph Kp and if B ? B then all subgraphs of Kp isomorphic to B are also in B. Call such tBD's ‘graphical tBD's’. We determine all graphical tBD's with λ = 1 or 2 which will include one with parameters 4?(15,{5,7},1).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号