Article Outline
- 1. Introduction
- 2. Material
- 3. Methods: the paradigm of chaos
- 3.1. Limitations on the use of the non-linear time analysis
- 4. Results: dynamical analysis
- 5. Discussion and conclusions
- Acknowledgements
- References
|
|||||||
共查询到20条相似文献,搜索用时 140 毫秒
1.
In this paper, some properties of Ramsey numbers are studied, and the following results are presented.
2.
Time-series of statokinesigram (SKG) of healthy subjects and parkinsonians are investigated and compared. This is done by employing the chaos paradigm in order to obtain the main characteristics of the SKG. The interpretation of our findings is twofold:
Article Outline
1. IntroductionThis work is born in the framework of the project “Celestina” coordinated by Prof. Paolo Pascolo (first author of this paper), who developed the methodological approach and theoretical basis and started the experimental acquisition which results are presented here. This paper continues and further develops the preliminary results presented in a previous paper [14].The statokinesigram (SKG) is the projection onto a 2-dimensional space of the trajectory of the centre of pressure (COP) of a person during erect stance (see Fig. 1). This sort of trajectories are the result of the (multi-dimensional) dynamical system underlying the human body, which is made up of a high number of links, is subject to the gravity and is also affected by perturbations such as breathing, blood circulation and muscular activity. Finally, on this system the central control acts to stabilize and limit the body oscillations. 相似文献3.
Christos Levcopoulos Drago Krznaric 《Journal of Algorithms in Cognition, Informatics and Logic》1998,27(2):303-338
This article settles the following two longstanding open problems:
4.
Julio Becerra Guerrero Fernando Rambla-Barreno 《Journal of Mathematical Analysis and Applications》2009,360(1):254-264
We prove that for every member X in the class of real or complex JB*-triples or preduals of JBW*-triples, the following assertions are equivalent:
Keywords: JB*-triple; Fixed point; Normal structure 相似文献
5.
For repairable items sold with free replacement warranty, the actions available to the manufacturer to rectify failures under warranty are to
6.
We show how to compute the modified moments of a refinable weight function directly from its mask in O(N2n) rational operations, where N is the desired number of moments and n the length of the mask. Three immediate applications of such moments are:
Keywords: Refinable function; Orthogonal polynomials; Gaussian quadrature; Modified moments; Legendre series 相似文献
7.
Baumgarten N. Jung H. Mehlhorn K. 《Journal of Algorithms in Cognition, Informatics and Logic》1994,17(3)
The dynamic planar point location problem is the task of maintaining a dynamic set S of n nonintersecting (except possibly at endpoints) line segments in the plane under the following operations:
8.
A graph H is called a supersubdivison of a graph G if H is obtained from G by replacing every edge uv of G by a complete bipartite graph K2,m (m may vary for each edge) by identifying u and v with the two vertices in K2,m that form one of the two partite sets. We denote the set of all such supersubdivision graphs by SS(G). Then, we prove the following results.
9.
We introduce a generalization of D-spaces, which we call linearly D-spaces. The following results are obtained for a T1-space X.
Keywords: D-space; SubmetaLindelöf; Linearly Lindelöf; Countably compact 相似文献
10.
11.
12.
In a series of papers Mauduit and Sárközy (partly with further coauthors) studied finite pseudorandom binary sequences. In particular, one of the most important applications of pseudorandomness is cryptography. If, e.g., we want to use a binary sequence EN{-1,+1}N (after transforming it into a bit sequence) as a key stream in the standard Vernam cipher [A. Menezes, P. van Oorschot, R. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997], then EN must possess certain pseudorandom properties. Does EN need to possess both small well-distribution measure and, for any fixed small k, small correlation measure of order k? In other words, if W(EN) is large, resp. Ck(EN) is large for some fixed small k, then can the enemy utilize this fact to break the code? The most natural line of attack is the exhaustive search: the attacker may try all the binary sequences EN{-1,+1}N with large W(EN), resp. large Ck(EN), as a potential key stream. Clearly, this attack is really threatening only if the number of sequences EN{-1,+1}N with
13.
We study here robust stability of linear systems with several uncertain incommensurate delays, more precisely the property usually called delay-dependent stability. The main result of this paper consists in establishing that the latter is equivalent to the feasibility of some Linear Matrix Inequality (LMI), a convex optimization problem whose numerical solution is well documented.The method is based on two main techniques:
Keywords: Linear systems; Delay systems; Asymptotic stability; Robust stability; Delay-dependent stability; Semi-definite programming; Linear matrix inequalities 相似文献
14.
Hung T. Nguyen Olga Kosheleva Vladik Kreinovich Scott Ferson 《International Journal of Approximate Reasoning》2009,50(8):1164
In many practical situations, we are not satisfied with the accuracy of the existing measurements. There are two possible ways to improve the measurement accuracy:
15.
A scalar time-harmonic wave (governed by Helmholtz's equation) impinges on N semi-infinite half-planes. The scattered field is sought when first, second, and third-kind boundary conditions or even general linear transmission conditions on the plates ∑m and their complementary parts ∑ are prescribed. Making use of the Fourier transform a representation formula for H1 (Ω) solutions is presented. The boundary/transmission problem is shown to be equivalent to a (2N × 2N)-Wiener–Hopf (WH) system for jumps of the Dirichlet–and Neumann–Cauchy data across the semi-infinite screens ∑m. The (2N × 2N)-Fourier symbol matrix ???? contains N block matrices on the diagonal corresponding to Sommerfeld boundary/transmission problems for a single plate. These (2 × 2)-symbol matrices are factorizable and thus the full WH system is invertible by a perturbation argument for not too small spacings of neighbouring screens ∑m. 相似文献
16.
Stochastic portfolio specific mortality and the quantification of mortality basis risk 总被引:1,自引:0,他引:1
In the last decade a vast literature on stochastic mortality models has been developed. However, these models are often not directly applicable to insurance portfolios because:
17.
Character sets of strings 总被引:2,自引:1,他引:1
Gilles Didier Thomas Schmidt Jens Stoye Dekel Tsur 《Journal of Discrete Algorithms》2007,5(2):330-340
Given a string S over a finite alphabet Σ, the character set (also called the fingerprint) of a substring S′ of S is the subset CΣ of the symbols occurring in S′. The study of the character sets of all the substrings of a given string (or a given collection of strings) appears in several domains such as rule induction for natural language processing or comparative genomics. Several computational problems concerning the character sets of a string arise from these applications, especially:
18.
Let
be the family of all compact sets in
which have connected complement. For K ε M we denote by A(K) the set of all functions which are continuous on K and holomorphic in its interior.Suppose that {zn} is any unbounded sequence of complex numbers and let Q be a given sub-sequence of
0.If Q has density Δ(Q) = 1 then there exists a universal entire function with lacunary power series
19.
This paper is concerned with funding systems, i.e. systems which accumulate funds for the future payment of financial obligations. Commonly, such funding requires a balance between (1) the desire to minimise the contributions that need to be diverted from other use to the support of the Fund, and (2) the need to maintain reasonable solvency in the Fund.Such funding is discussed here in a general framework. Applications are numerous. The specific applications mentioned in the paper are:
20.
There are basic equivalent assertions known for operator monotone functions and operator convex functions in two papers by Hansen and Pedersen. In this note we consider their results as correlation problem between two sequences of matrix n-monotone functions and matrix n-convex functions, and we focus the following three assertions at each label n among them:
|
设为首页 | 免责声明 | 关于勤云 | 加入收藏 |
Copyright©北京勤云科技发展有限公司 京ICP备09084417号 |