首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In this paper, an mKP equation with self-consistent sources (mKPESCSs) is structured in the framework of the constrained mKP equation. Based on the conjugate Lax pairs, we construct the generalized binary Darboux transformation and the N-times repeated Darboux transformation with arbitrary functions at time t for the mKPESCSs which offers a non-auto-Bäcklund transformation between two mKPESCSs with different degrees of sources. With the help of these transformations, some new solutions for the mKPESCSs such as soliton solutions, rational solutions, breather type solutions and exponential solutions are found by taking the special initial solution for auxiliary linear problems and the special functions of t-time.  相似文献   

2.
In this paper we provide an axiomatic characterization of the folk rule for minimum cost spanning tree problems with multiple sources. The properties we need are: cone-wise additivity, cost monotonicity, symmetry, isolated agents, and equal treatment of source costs.  相似文献   

3.
In this paper we model building evacuations by network flows with side constraints. Side constraints come from variable arc capacities on some arcs which are functions of flows in incident arcs. In this context we study maximum flow, minimum cost, and minimax objectives. For some special structured networks we propose ‘greedy’ algorithms for solving these problems. For more general network structures, solution procedures are recommended which take advantage of the network structures of the problems.  相似文献   

4.
We consider discrete-time single-server queues fed by independent, heterogeneous sources with geometrically distributed idle periods. While being active, each source generates some cells depending on the state of the underlying Markov chain. We first derive a general and explicit formula for the mean buffer contents in steady state when the underlying Markov chain of each source has finite states. Next we show the applicability of the general formula to queues fed by independent sources with infinite-state underlying Markov chains and discrete phase-type active periods. We then provide explicit formulas for the mean buffer contents in queues with Markovian autoregressive sources and greedy sources. Further we study two limiting cases in general settings, one is that the lengths of active periods of each source are governed by an infinite-state absorbing Markov chain, and the other is the model obtained by the limit such that the number of sources goes to infinity under an appropriate normalizing condition. As you will see, the latter limit leads to a queue with (generalized) M/G/∞ input sources. We provide sufficient conditions under which the general formula is applicable to these limiting cases.AMS subject classification: 60K25, 60K37, 60J10This revised version was published online in June 2005 with corrected coverdate  相似文献   

5.
An important aspect of participation in a new academic discourse pertains to the metadiscursive rules which govern that discourse. Researchers have documented the viability of using primary sources in undergraduate mathematics education for scaffolding students’ recognition of those rules. Our research explores the related question of whether the use of primary sources can support students’ learning of metadiscursive rules in a way that goes beyond mere recognition. We present a case study of one student’s “figuring out” of metadiscursive rules in a university Analysis course as a result of her experience with a Primary Source Project, illustrate evidence for three dimensions of “figuring out” (adoption, acceptance, awareness) that emerged from that case study, and discuss the implications of our findings for classroom instruction and future research.  相似文献   

6.
Source generation procedure is applied to construct a hybrid type of soliton equations with self-consistent sources (SESCSs). The examples include the KP equation with self-consistent sources (KPESCS) and two-dimensional TodaESCS. One typical feature for this hybrid type of SESCSs is that soliton solutions of these new systems contain arbitrary functions of a linear combination of two independent variables, which is different from the normal SESCSs where soliton solutions only contain arbitrary functions of one independent variable. What's more, the obtained two hybrid SESCSs can be reduced to two different simpler SESCSs respectively.  相似文献   

7.
Integrating history of mathematics in classes could be a hard task with young pupils. Indeed, original historical sources have a language that is far from the modern one. Such texts represent cultural artefacts that can give access to mathematical knowledge. The teacher can exploit such potential acting as a mediator between the mathematical signs of the source and those signs that are accessible to students. Through a case study, we investigate the role of the teacher in the process of semiotic mediation during a collective discussion. The analysed intervention is made of two phases: firstly, students work collaboratively and secondly, the teacher mediates a discussion aimed at institutionalizing the knowledge. During the discussion, working on a text from Tartaglia’s translation of Euclid’s Elements, a group of fifth graders constructs a definition of prime numbers. Referring to the Theory of Semiotic Mediation, we analyse the role of the teacher in building up semiotic chains linking students’ productions to an institutionalized knowledge emerging from the collective discussion. We highlight how teacher’s focalization on students’ words allows the progress of the discussion: the potential of the historical text is exploited fostering a definition that is close to culturally shared mathematics.  相似文献   

8.
This study investigated the effect of a STEAM (science, technology, engineering, arts, and mathematics) methods course on elementary preservice teachers’ (PTs’) perceptions of self-efficacy to teach engineering practices. The course positioned engineering as the primary content area from which to integrate other subjects. To enhance PT’s perception of engineering self-efficacy, the course provided instruction that leveraged the following sources of self-efficacy: cognitive content mastery, cognitive pedagogical mastery, vicarious experience, verbal persuasion, and emotional state. The study also examined to what extent the various sources of self-efficacy contributed to changes in self-efficacy. Data was collected from 14 participants that included a self-efficacy survey and focus group interview. After completing the course, elementary PTs’ self-efficacy to teach engineering practices increased significantly. Qualitative data analysis revealed cognitive pedagogical mastery, vicarious experience (specifically simulated modeling), and emotional state were the most influential sources linked to positive changes in self-efficacy, with cognitive content mastery, and other forms of vicarious experience contributing, but to a lesser degree. These results suggest that teacher preparation programs can better support elementary PTs to teach engineering practices by offering additional methods courses focused on engineering, rather than providing short-term exposure to engineering practices and pedagogy in overloaded science methods courses.  相似文献   

9.
Functional optimization problems can be solved analytically only if special assumptions are verified; otherwise, approximations are needed. The approximate method that we propose is based on two steps. First, the decision functions are constrained to take on the structure of linear combinations of basis functions containing free parameters to be optimized (hence, this step can be considered as an extension to the Ritz method, for which fixed basis functions are used). Then, the functional optimization problem can be approximated by nonlinear programming problems. Linear combinations of basis functions are called approximating networks when they benefit from suitable density properties. We term such networks nonlinear (linear) approximating networks if their basis functions contain (do not contain) free parameters. For certain classes of d-variable functions to be approximated, nonlinear approximating networks may require a number of parameters increasing moderately with d, whereas linear approximating networks may be ruled out by the curse of dimensionality. Since the cost functions of the resulting nonlinear programming problems include complex averaging operations, we minimize such functions by stochastic approximation algorithms. As important special cases, we consider stochastic optimal control and estimation problems. Numerical examples show the effectiveness of the method in solving optimization problems stated in high-dimensional settings, involving for instance several tens of state variables.  相似文献   

10.
This paper deals with optimal control problems described by higher index DAEs. We introduce a class of problems which can be transformed to index one control problems. For these problems we show in the accompanying paper that, if the solutions to the adjoint equations are well–defined, then the first-order approximations to the functionals defining the problem can be expressed in terms of the adjoint variables. In this paper we show that the solutions to the adjoint equations are essentially bounded measurable functions. Then, based on the first order approximations, we derive the necessary optimality conditions for the considered class of control problems. These conditions do not require the transformation of the DAEs to index-one system; however, higher-index DAEs and their associated adjoint equations have to be solved.  相似文献   

11.
Starting from the solutions of soliton equations and corresponding eigenfunctions obtained by Darboux transformation, we present a new method to solve soliton equations with self-consistent sources (SESCS) based on method of variation of parameters. The KdV equation with self-consistent sources (KdVSCS) is used as a model to illustrate this new method. In addition, we apply this method to construct some new solutions of the derivative nonlinear Schrödinger equation with self-consistent sources (DNLSSCS) such as phase solution, dark soliton solution, bright soliton solution and breather-type solution.  相似文献   

12.
Lower semi-continuity from above or upper semi-continuity from below has been used by many authors in recent papers. In this paper, we first study the weak semi-continuity for vector functions having particular form as that of Browder in ordered normed vector spaces; we obtain several new results on the lower semi-continuity from above or upper semi-continuity from below for these vector functions. Our results generalize some well-known results of Browder in scalar case. Secondly, we study the minimum or maximum problems for vector functions satisfying lower semi-continuous from above or upper semi-continuous from below conditions; several new results on the existence of minimal points or maximal points are obtained. We also use these results to study vector equilibrium problems and von Neumann’s minimax principle in ordered normed vector spaces.  相似文献   

13.
We describe a change of time technique for stochastic control problems with unbounded control set. We demonstrate the technique on a class of maximization problems that do not have optimal controls. Given such a problem, we introduce an extended problem which has the same value function as the original problem and for which there exist optimal controls that are expressible in simple terms. This device yields a natural sequence of suboptimal controls for the original problem. By this we mean a sequence of controls for which the payoff functions approach the value function.  相似文献   

14.
The identification of sources of advection–diffusion transport is based usually on solving complex ill-posed inverse models against the available state-variable data records. However, if there are several sources with different locations and strengths, the data records represent mixtures rather than the separate influences of the original sources. Importantly, the number of these original release sources is typically unknown, which hinders reliability of the classical inverse-model analyses. To address this challenge, we present here a novel hybrid method for identification of the unknown number of release sources. Our hybrid method, called HNMF, couples unsupervised learning based on Non-negative Matrix Factorization (NMF) and inverse-analysis Green’s functions method. HNMF synergistically performs decomposition of the recorded mixtures, finds the number of the unknown sources and uses the Green’s function of advection–diffusion equation to identify their characteristics. In the paper, we introduce the method and demonstrate that it is capable of identifying the advection velocity and dispersivity of the medium as well as the unknown number, locations, and properties of various sets of synthetic release sources with different space and time dependencies, based only on the recorded data. HNMF can be applied directly to any problem controlled by a partial-differential parabolic equation where mixtures of an unknown number of sources are measured at multiple locations.  相似文献   

15.
In this paper we articulate our philosophy and approach to the design and control of high speed data networks. The object is to put into perspective and to explain the coordination of various isolated pieces of detailed technical analyses that have been reported in several recent papers. In the process we summarize what we have learnt in our recent work and, also, we give indications of the direction of our future work. Our scheme integrates feedback and open loop control. The feedback control is exercised by sliding windows; access controllers regulate bursty sources. All our design proposals are rooted in asymptotic analyses; the justification for asymptotics comes from the largeness of the parameters, such as propagation delay, speed, window size, buffer size, and the number of virtual circuits. This analysis makes a strong case for operating in a specific moderate usage regime, and adaptive dynamic windowing algorithms are given that make this happen; moreover, when in this regime, buffers may be sized aggressively small without jeopardizing performance and the simplicity of the retransmission protocol. The topics in the paper are: model of communication, results on the steady-state behavior of the basic model, access control, small buffers and retransmission protocols, dynamic adaptive windows, bursty sources, and contrast with previous work.I. Mitrani's work was done while AT&T Bell Laboratories.  相似文献   

16.
We give existence theorems of solutions for Lagrange and Bolza problems of optimal control. These results are obtained without convexity assumptions on the cost function with respect to the control variable. We extend a Cesari's theorem to cost functions which are nonlinear with respect to the space variable and to problems which are governed by a differential inclusion. Moreover, we consider the case where the control variable belongs to a space of measurable functions and the case where this variable belongs to a Lebesgue space.  相似文献   

17.
To combine belief functions from reliable dependent sources, Denoeux proposed an operator called the cautious conjunctive rule. In this paper, the conjunctive combination of interval-valued belief structures (IBSs) from reliable dependent sources is investigated. Nonlinear optimization problems based on the cautious rule are constructed and solved to generate an unnormalized and a normalized cautious combination of two IBSs. In a similar manner, optimization problems used to combine multiple IBSs are also constructed. Furthermore, to deal with some situations in which the relative weights of IBSs must be considered, optimization problems considering relative weights are constructed to implement the unnormalized and normalized weighted cautious combination of IBSs. To verify the validity and usefulness of the conjunctive combination of IBSs, a trustworthiness evaluation problem of hospital information systems, which is employed in many hospitals of the Anhui province in China, is solved based on the normalized weighted cautious combination of IBSs.  相似文献   

18.
Some new nonlinear analytical solutions are found for axisymmetric horizontal flows dominated by strong heat sources. These flows are common in multiscale atmospheric and oceanic flows such as hurricane embryos and ocean gyres. The analytical solutions are illustrated with several examples. The proposed exact solutions provide analytical support for previous numerical observations and can be also used as benchmark problems for validating numerical models. A central weighted essentially non-oscillatory (CWENO) reconstruction is also employed for numerical simulation of the corresponding integro-differential equations. Due to the use of the same polynomial reconstruction for all derivatives and integral terms, the balance between those terms is well preserved, and the method can precisely reproduce the exact solutions, which are hard to capture by traditional upwind schemes. The developed analytical solutions were employed to evaluate the performance of the numerical method, which showed an excellent performance of the numerical model in terms of numerical diffusion and oscillation.  相似文献   

19.
This paper studies the problem of synthesizing control policies for uncertain continuous-time nonlinear systems from linear temporal logic (LTL) specifications using model-based reinforcement learning (MBRL). Rather than taking an abstraction-based approach, we view the interaction between the LTL formula’s corresponding Büchi automaton and the nonlinear system as a hybrid automaton whose discrete dynamics match exactly those of the Büchi automaton. To find satisfying control policies, we pose a sequence of optimal control problems associated with states in the accepting run of the automaton and leverage control barrier functions (CBFs) to prevent specification violation. Since solving many optimal control problems for a nonlinear system is computationally intractable, we take a learning-based approach in which the value function of each problem is learned online in real-time. Specifically, we propose a novel off-policy MBRL algorithm that allows one to simultaneously learn the uncertain dynamics of the system and the value function of each optimal control problem online while adhering to CBF-based safety constraints. Unlike related approaches, the MBRL method presented herein decouples convergence, stability, and safety, allowing each aspect to be studied independently, leading to stronger safety guarantees than those developed in related works. Numerical results are presented to validate the efficacy of the proposed method.  相似文献   

20.
多源验前信息之下Bayes可靠性估计   总被引:4,自引:0,他引:4  
本文考虑存在多源验前信息的情况,以二项分布为例,首先把各种验前信息化成不同的约束条件,并运用最大熵准则推导出各种验前信息所对应的验前分布,然后将这些分布综合成最终的验前分布,最后根据系统的寿命试验数据得出可靠性参数的验后分布并进行了Bayes推断,文中给出了仿真实例以说明方法的有效性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号