首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper presents a recursive algorithm which is useful for computing normal forms of vector fields using smooth orbital equivalence. The case of vector fields with a singularity corresponding to a triple-zero eigenvalue with geometric multiplicity one is considered in detail. The results obtained are applied to the study of a simple electronic device, with only one nonlinearity.  相似文献   

2.
Doklady Mathematics - Processes in the dynamics of electrically conducting fluid flows in complex heat transfer systems are mathematically modeled in detail on high-performance parallel computing...  相似文献   

3.
Petr Harasim  Jan Valdman 《PAMM》2013,13(1):425-428
We verify functional a posteriori error estimates of numerical solutions of a obstacle problem proposed by S. Repin. The simplification into 1D allows for the construction of a nonlinear benchmark for which an exact solution can be derived and also an exact quadrature can be applied. Quality of a numerical solution obtained by the finite element method is compared with the exact solution to demonstrate the sharpness of the studied error estimated. (© 2013 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   

4.
We present the results of a set of numerical experiments designed to investigate the appropriateness of various integration schemes for molecular dynamics simulations. In particular, we wish to identify which numerical methods, when applied to an ergodic Hamiltonian system, sample the state-space in an unbiased manner. We do this by describing two Hamiltonian system for which we can analytically compute some of the important statistical features of its trajectories, and then applying various numerical integration schemes to them. We can then compare the results from the numerical simulation against the exact results for the system and see how closely they agree. The statistic we study is the empirical distribution of particle velocity over long trajectories of the systems. We apply four methods: one symplectic method (Störmer–Verlet) and three energy-conserving step-and-project methods. The symplectic method performs better on both test problems, accurately computing empirical distributions for all step-lengths consistent with stability. Depending on the test system and the method, the step-and-project methods are either no longer ergodic for any step length (thus giving the wrong empirical distribution) or give the correct distribution only in the limit of step-size going to zero.  相似文献   

5.
We consider a trader who wants to direct his or her portfolio towards a set of acceptable wealths given by a convex risk measure. We propose a Monte Carlo algorithm, whose inputs are the joint law of stock prices and the convex risk measure, and whose outputs are the numerical values of initial capital requirement and the functional form of a trading strategy for achieving acceptability. We also prove optimality of the capital obtained. Explicit theoretical evaluations of hedging strategies are extremely difficult, and we avoid the problem by resorting to such computational methods. The main idea is to utilize the finite Vapnik–C?ervonenkis dimension of a class of possible strategies.  相似文献   

6.
7.
We present a practical appraisal of the functional analysisideas involved in some recent equivalence theorems. We alsoderive some new results which may be of independent interest.  相似文献   

8.
The security in information-flow has become a major concern for cyber–physical systems (CPSs). In this work, we focus on the analysis of an information-flow security property, called opacity. Opacity characterizes the plausible deniability of a system’s secret in the presence of a malicious outside intruder. We propose a methodology of checking a notion of opacity, called approximate opacity, for networks of discrete-time switched systems. Our framework relies on compositional constructions of finite abstractions for networks of switched systems and their approximate opacity-preserving simulation functions. Those functions characterize how close concrete networks and their finite abstractions are in terms of the satisfaction of approximate opacity. We show that such simulation functions can be obtained compositionally by assuming some small-gain type conditions and composing local simulation functions constructed for each switched subsystem separately. Additionally, assuming certain stability property of switched systems, we also provide a technique on constructing their finite abstractions together with the corresponding local simulation functions. Finally, we illustrate the effectiveness of our results through an example.  相似文献   

9.
The aim of this survey is to provide insight into the sequential algorithms that have been proposed to compute exact “regularities” in strings; that is, covers (or quasiperiods), seeds, repetitions, runs (or maximal periodicities), and repeats. After outlining and evaluating the algorithms that have been proposed for their computation, I suggest possibly productive future directions of research.  相似文献   

10.
We present a new algorithm for computing motorcycle graphs that runs in \(O(n^{4/3+\varepsilon })\) time for any \(\varepsilon >0\) , improving on all previously known algorithms. The main application of this result is to computing the straight skeleton of a polygon. It allows us to compute the straight skeleton of a non-degenerate polygon with \(h\) holes in \(O(n \sqrt{h+1} \log ^2 n+n^{4/3+\varepsilon })\) expected time. If all input coordinates are \(O(\log n)\) -bit rational numbers, we can compute the straight skeleton of a (possibly degenerate) polygon with \(h\) holes in \(O(n \sqrt{h+1}\log ^3 n)\) expected time. In particular, it means that we can compute the straight skeleton of a simple polygon in \(O(n\log ^3n)\) expected time if all input coordinates are \(O(\log n)\) -bit rationals, while all previously known algorithms have worst-case running time \(\omega (n^{3/2})\) .  相似文献   

11.
12.
13.
We extend the recently developed Riesz–Clifford monogenic functional calculus (based on Clifford analysis) for a set of unbounded non-commuting operators. Connections with quantum mechanics are discussed. © 1997 by B. G. Teubner Stuttgart–John Wiley & Sons Ltd.  相似文献   

14.
We use an elementary method to draw analytic conclusions from divergent formal power series solutions of systems of differential equations containing a parameter and give some applications to the theory of turning points. Our main result shows that a divergent formal series transformation of one system into another in which the coefficients satisfy certain estimates is necessarily the asymptotic expansion of an actual transformation. We use it to show the following. Given a two dimensional system εPdy/dx = A(x,ε)y with A holomorphic at (x0,0), suppose that x0 is formally not a turning point in the sense that no singularities appear at x0 during the standard formal solution procedure with formal fractional power series in ε. Then the formal solution is necessarily a uniform asymptotic representation of a fundamental matrix of the system on a full neighborhood of x0. (This conclusion is known to fail under weaker hypotheses on A). We also obtain similar but less complete results for higher order systems under more specialized hypotheses.  相似文献   

15.
present a simple and implementable algorithm that computes a minimum spanning tree of an undirected weighted graph G = (V, E) of n = |V| vertices and m = |E| edges on an EREW PRAM in O(log3/2n) time using n + m processors. This represents a substantial improvement in the running time over the previous results for this problem using at the same time the weakest of the PRAM models. It also implies the existence of algorithms having the same complexity bounds for the EREW PRAM, for connectivity, ear decomposition, biconnectivity, strong orientation, st-numbering and Euler tours problems.  相似文献   

16.
孙建筑 《大学数学》2015,31(1):86-87
Laplace积分在复变函数、数学分析、Fourier分析中有重要的应用,其求解已有复变函数方法和实方法.在实方法中要用到∫∞0sinxxdx=π2,本文给出另外一种实方法,不需要利用这个积分.  相似文献   

17.
A New Method for Computing Reproducing Kernels   总被引:3,自引:0,他引:3  
§1.IntroductionAsystematicresearchtothetheoryofreproducingkernelwasfirstmadebyAronszajnandBergman[1].Theygaveasuficientandnec...  相似文献   

18.
It is observed in this paper that the complexities of the equivalence and the equation solvability problems are not determined by the clone of the algebra. In particular, we prove that for the alternating group on four elements these problems have complexity in P; if we extend the group by the commutator as an extra operation, then the equivalence problem is coNP-complete and the equation solvability problem is NP-complete.  相似文献   

19.
van Uitert  Miranda  Borst  Sem 《Queueing Systems》2002,41(1-2):123-163
We consider networks where traffic is served according to the Generalised Processor Sharing (GPS) principle. GPS-based scheduling algorithms are considered important for providing differentiated quality of service in integrated-services networks. We are interested in the workload of a particular flow i at the bottleneck node on its path. Flow i is assumed to have long-tailed traffic characteristics. We distinguish between two traffic scenarios, (i) flow i generates instantaneous traffic bursts and (ii) flow i generates traffic according to an on/off process. In addition, we consider two configurations of feed-forward networks. First we focus on the situation where other flows join the path of flow i. Then we extend the model by adding flows which can branch off at any node, with cross traffic as a special case. We prove that under certain conditions the tail behaviour of the workload distribution of flow i is equivalent to that in a two-node tandem network where flow i is served in isolation at constant rates. These rates only depend on the traffic characteristics of the other flows through their average rates. This means that the results do not rely on any specific assumptions regarding the traffic processes of the other flows. In particular, flow i is not affected by excessive activity of flows with heavier-tailed traffic characteristics. This confirms that GPS has the potential to protect individual flows against extreme behaviour of other flows, while obtaining substantial multiplexing gains.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号