首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We develop general methods to obtain fast (polynomial time) estimates of the cardinality of a combinatorially defined set via solving some randomly generated optimization problems on the set. Examples include enumeration of perfect matchings in a graph, linearly independent subsets of a set of vectors and colored spanning subgraphs of a graph. Geometrically, we estimate the cardinality of a subset of the Boolean cube via the average distance from a point in the cube to the subset with respect to some distance function. We derive asymptotically sharp cardinality bounds in the case of the Hamming distance and show that for small subsets a suitably defined “randomized” Hamming distance allows one to get tighter estimates of the cardinality. Submitted: June 2000, Revised version: January 2001.  相似文献   

2.
We introduce the notion of large scale dimensiongrad as a large scale invariant of asymptotic resemblance spaces. Consequently it can be considered as a large scale invariant of metric spaces. The large scale dimensiongrad is a way of counting dimension in large scale but it is different from asymptotic dimension in general, as we show in the paper, too.  相似文献   

3.
The security in information-flow has become a major concern for cyber–physical systems (CPSs). In this work, we focus on the analysis of an information-flow security property, called opacity. Opacity characterizes the plausible deniability of a system’s secret in the presence of a malicious outside intruder. We propose a methodology of checking a notion of opacity, called approximate opacity, for networks of discrete-time switched systems. Our framework relies on compositional constructions of finite abstractions for networks of switched systems and their approximate opacity-preserving simulation functions. Those functions characterize how close concrete networks and their finite abstractions are in terms of the satisfaction of approximate opacity. We show that such simulation functions can be obtained compositionally by assuming some small-gain type conditions and composing local simulation functions constructed for each switched subsystem separately. Additionally, assuming certain stability property of switched systems, we also provide a technique on constructing their finite abstractions together with the corresponding local simulation functions. Finally, we illustrate the effectiveness of our results through an example.  相似文献   

4.
《Fuzzy Sets and Systems》2004,145(2):213-228
In this paper, a rather expressive fuzzy temporal logic for linear time is introduced. First, this logic is a multivalued generalization (Lukasiewicz style) of a two-valued linear-time temporal logic based on, e.g., the “until” operator. Second, it is obtained by introducing a generalized time quantifier (a generalization of the partition operator investigated by Shen) applied to fuzzy time sets.In this fuzzy temporal logic, generalized compositional rules of inference, suitable for approximate reasoning in a temporal setting, are presented as valid formulas.Some medical examples illustrate our approach.  相似文献   

5.
In this paper, we address the dynamic and multi-criteria decision-making problems under uncertainty, generally represented by multi-criteria decision trees. Decision-making consists of choosing, at each period, a decision that maximizes the decision-maker outcomes. These outcomes should often be measured against a set of heterogeneous and conflicting criteria. Generating the set of non-dominated solutions is a common approach considered in the literature to solve the multi-criteria decision trees, but it becomes very challenging for large problems. We propose a new approach to solve multi-criteria decision trees without generating the set of all non-dominated solutions, which should reduce the computation time and the cardinality of the solution set. In particular, the proposed approach combines the advantages of decomposition with the application of multi-criteria decision aid (MCDA) methods at each decision node. A generalization of the Bellman’s principle of decomposition to the multi-criteria context is put forward. A decomposition theorem is therefore proposed. Under the sufficient conditions stated by the theorem, the principle of decomposition will generate the set of best compromise strategies. Seven MCDA methods are then characterized (lexicographic, weighted sum, multi-attribute value theory, TOPSIS, ELECTRE III, and PROMETHEE II) against the conditions of the theorem of decomposition and against other properties (neutrality, anonymous, fidelity, dominance, independency), in order to confirm or infirm their applicability with the proposed decomposition principle. Moreover, the relationship between independency and temporal consistence is discussed as well as the effects of incomparableness, rank reversals, and use of thresholds. Two conjectures resulted from this characterization.  相似文献   

6.
7.
The present article is concerned with the numerical implementation of the Hilbert uniqueness method for solving exact and approximate boundary controllability problems for the heat equation. Using convex duality, we reduce the solution of the boundary control problems to the solution of identification problems for the initial data of an adjoint heat equation. To solve these identification problems, we use a combination of finite difference methods for the time discretization, finite element methods for the space discretization, and of conjugate gradient and operator splitting methods for the iterative solution of the discrete control problems. We apply then the above methodology to the solution of exact and approximate boundary controllability test problems in two space dimensions. The numerical results validate the methods discussed in this article and clearly show the computational advantage of using second-order accurate time discretization methods to approximate the control problems.  相似文献   

8.
This paper achieves a general law of precise asymptotics for the counting process of record times of i.i.d. absolutely continuous random variables. It can describe the relations among the boundary function, weighted function, convergence rate and limit value in studies of complete convergence. This extends and generalizes the corresponding results in Stochastic Process. Appl. 101 (2002) 233-239.  相似文献   

9.
In this paper, we first consider the framework of Sobolev spaces and derive analytically a reconstruction algorithm by means of the residue theorem of complex analysis, the approximate inverse, Gaussian mollifier and integral equations. And we successfully extend Natterer’s results to the generalized Radon transform with non-uniform attenuation. Finally, we investigate the smoothing properties of the generalized Radon transform.  相似文献   

10.
11.
In this paper a general method for developing necessary conditions for all degrees of stochastic dominance is derived. The method, a minimization of the expected value of certain functions of the random variable, is used to rederive known necessary conditions for dominance and is then used to derive new necessary conditions. Some of the old and new conditions are then compared empirically using a data set of security returns.  相似文献   

12.
A general duality framework in convex multiobjective optimization is established using the scalarization with K-strongly increasing functions and the conjugate duality for composed convex cone-constrained optimization problems. Other scalarizations used in the literature arise as particular cases and the general duality is specialized for some of them, namely linear scalarization, maximum (-linear) scalarization, set scalarization, (semi)norm scalarization and quadratic scalarization.   相似文献   

13.
In this paper, a decomposition method for evaluating the performance of continuous flow lines with machines characterized by general Markovian fluid models and finite capacity buffers is proposed. This study uses the exact solution of general two-stage Markovian fluid models as a building block. Decomposition equations are provided to propagate the effect of partial and complete blocking and starvation phenomena throughout the system. A decomposition algorithm that solves the new decomposition equations is proposed. Numerical results prove the good accuracy of the developed method. In particular, a comparison with existing techniques shows that our method is generally more accurate, especially in the estimation of the average buffer levels. Moreover, additional information can be collected by the application of our approach which enables a deeper analysis of the system behavior. Finally, the generality of the approach allows for modeling and studying many different system configurations within a unique framework, also including several previously uninvestigated layouts.  相似文献   

14.
We introduce a problem called maximum common characters in blocks (MCCB), which arises in applications of approximate string comparison, particularly in the unification of possibly erroneous textual data coming from different sources. We show that this problem is NP-complete, but can nevertheless be solved satisfactorily using integer linear programming for instances of practical interest. Two integer linear formulations are proposed and compared in terms of their linear relaxations. We also compare the results of the approximate matching with other known measures such as the Levenshtein (edit) distance.  相似文献   

15.
16.
17.
Let M be a smooth complex manifold, and S(⊂ M) be a compact irreducible subvariety with dim C S > 0. Let be given either a holomorphic map f : MM with f |S  = id S , fid M , or a holomorphic foliation on M: we describe an approach that can be applied to both map and foliation in order to obtain index theorems. Partially supported by GNSAGA, Centro de Giorgi, M.U.R.S.T.  相似文献   

18.
In this paper the method for computing a priori estimates of the approximate optimal control is considered. These estimates provide us with information about the quality of the approximate optimal solution obtained by applying the improvement control procedure. The method is implemented in the form of a parallel algorithm. This algorithm is an essential part of the developed software package intended for optimization of controllable dynamical systems. We also consider the scalability of the parallel algorithm in the OpenTS parallel programming system for chemical and biochemical engineering problems.  相似文献   

19.
The paper proposes a flexible way to build concepts within fuzzy logic and set theory. The framework is general enough to capture some important particular cases, with their own independent interpretations, like “antitone” or “isotone” concepts constructed from fuzzy binary relations, but also to allow the two universes (of objects and attributes) to be equipped each with its own truth structure. Perhaps the most important feature of our approach is that we do not commit ourselves to any kind of logical connector, covering thus the case of a possibly non‐commutative conjunction too. (© 2004 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   

20.
In this paper we present a general theory for holomorphic functions which is based on continuous convergence instead of topologies. The theory can be applied to locally convex spaces and bornological spaces.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号