Many problems in nonlinear control theory (like, for instance, feedback linearization problem) leed to examination of integrability of a Pfaffian system. In a generic case a Pfaffian system is not integrable. Therefor...
详细信息
Many problems in nonlinear control theory (like, for instance, feedback linearization problem) leed to examination of integrability of a Pfaffian system. In a generic case a Pfaffian system is not integrable. Therefore, how to approximate non-integrable Pfafian systems by integrable ones and how this approximation can applied in practice appears to be a natural and important problem. In the present paper we establish some measures of non-integrability of Pfaffian system of arbitrary dimension and discuss their relation to approximations of non-integrable Pfaffian systems by integrable ones. Our work is motivated by expected applications to approximate feedback linearization of multi-input nonlinear systems.
We describe a method for modeling aggregation in a flowing fluid. In the model, aggregation proceeds by the accumulation of a “nutrient.” The nutrient is modeled using a lattice Boltzmann model of transport. The agg...
We describe a method for modeling aggregation in a flowing fluid. In the model, aggregation proceeds by the accumulation of a “nutrient.” The nutrient is modeled using a lattice Boltzmann model of transport. The aggregate absorbs the nutrient, and the amount absorbed determines the local growth probability. This model contains some of the essential features of growth of stony corals. We find that the morphology of the aggregates changes drastically as we increase the Péclet number from a regime where nutrient transport is diffusion controlled to a regime where hydrodynamic transport dominates. This is in qualitative agreement with the morphogenesis of stony corals.
In this paper we improve Davies’ attack [2] on DES to become capable of breaking the full 16-round DES faster than the exhaustive search. Our attack requires 250 complexity of the data collection and 250 the complexi...
详细信息
The action system framework for modelling parallel programs is used to formally specify a microprocessor. First the microprocessor is specified as a sequential program. The sequential specification is then decomposed ...
详细信息
We report on two types of results. The first is a study of the rate of decay of information carried by a signal which is being propagated over a noisy channel. The second is a series of lower bounds on the depth, size...
详细信息
We report on two types of results. The first is a study of the rate of decay of information carried by a signal which is being propagated over a noisy channel. The second is a series of lower bounds on the depth, size, and component reliability of noisy logic circuits which are required to compute some function reliably. The arguments used for the circuit results are information-theoretic, and in particular, the signal decay result is essential to the depth lower bound. Our first result can be viewed as a quantified version of the data processing lemma, for the case of Boolean random variables.
We present a fairly general method for finding deterministic constructions obeying what we call k-restrictions; this yields structures of size not much larger than the probabilistic bound. The structures constructed b...
详细信息
We present a fairly general method for finding deterministic constructions obeying what we call k-restrictions; this yields structures of size not much larger than the probabilistic bound. The structures constructed by our method include (n,k)-universal sets (a collection of binary vectors of length n such that for any subset of size k of the indices, all 2/sup k/ configurations appear) and families of perfect hash functions. The near-optimal constructions of these objects imply the very efficient derandomization of algorithms in learning, of fixed-subgraph finding algorithms, and of near optimal /spl Sigma/II/spl Sigma/ threshold formulae. In addition, they derandomize the reduction showing the hardness of approximation of set cover. They also yield deterministic constructions for a local-coloring protocol, and for exhaustive testing of circuits.
Let Dist(f,g)=Pr/sub u/ [f(u)/spl ne/g(u)] denote the relative distance between functions f,g mapping from a group G to a group H, and let Dist(f) denote the minimum, over all linear functions (homomorphisms) g, of Di...
详细信息
Let Dist(f,g)=Pr/sub u/ [f(u)/spl ne/g(u)] denote the relative distance between functions f,g mapping from a group G to a group H, and let Dist(f) denote the minimum, over all linear functions (homomorphisms) g, of Dist(f,g). Given a function f:G/spl rarr/H we let Err(f)=Pr/sub u/,v[f(u)+f(v)/spl ne/f(u+v)] denote the rejection probability of the BLR (Blum-Luby-Rubinfeld) linearity test. Linearity testing is the study of the relationship between Err(f) and Dist(f), and in particular the study of lower bounds on Err(f) in terms of Dist(f). The case we are interested in is when the underlying groups are G=GF(2)/sup n/ and H=GF(2). The corresponding test is used in the construction of efficient PCPs and thence in the derivation of hardness of approximation results, and, in this context, improved analyses translate into better non-approximability results. However, while several analyses of the relation of Err(f) to Dist(f) are known, none is tight. We present a description of the relationship between Err(f) and Dist(f) which is nearly complete in all its aspects, and entirely complete (i.e. tight) in some. In particular we present functions L,U:[0,1]/spl rarr/[0,1] such that for all x/spl isin/[0,1] we have L(x)
In almost all conventional transport protocols, ARQs (automatic repeat request) have been used to recover lost packets, in which receivers would request sources to retransmit lost packets. In these retransmission base...
详细信息
In almost all conventional transport protocols, ARQs (automatic repeat request) have been used to recover lost packets, in which receivers would request sources to retransmit lost packets. In these retransmission based error recovery schemes, the transmission delay can reach an unacceptable level for traffic with stringent delay constraints in high speed networks because their propagation delay is very large relative to packet transmission times. On the other hand, FEC (forward error correction) adds redundant packets to data ones, all of which are organized into a group called a block, and hence allows the receivers to correct some of the lost packets without retransmissions. This capability is desirable for high speed networks. The authors exactly analyze the distribution of the number of cells lost within a block in ATM networks with correlated cell arrivals, and examine the benefits due to FEC by means of the analysis.< >
We initiate the investigation of a new kind of efficiency for cryptographic transformations. The idea is that having once applied the transformation to some document M, the time to update the result upon modification ...
详细信息
A simplified Bayes rule is used to classify 5401 categories of handwritten Chinese characters. The main feature for the Bayes rule deals with the probability distribution of black pixels of a thinned character. Our id...
详细信息
A simplified Bayes rule is used to classify 5401 categories of handwritten Chinese characters. The main feature for the Bayes rule deals with the probability distribution of black pixels of a thinned character. Our idea is that each Chinese character indicated by the black pixels represents a probability distribution in a two-dimensional plane. Therefore, an unknown pattern is classified into one of 5401 different distributions by the Bayes rule. Since the handwritten character has an irregular shape variation, the whole character is normalized and then thinned. Finally, a transformation is used to spread the black pixels uniformly over the whole square plane, but it still keeps the relative positions of the original black pixels. The main feature gives an 88.65% recognition rate. In order to raise the recognition rate, 4 more subsidiary features are elaborately selected such that they are not affected much by the irregularly shaped variation. The 4 features raise the recognition rate to 93.43%. A 99.30% recognition rate is achieved if the top 10 categories of HCC are selected by our recognition method and 99.61% if the top 20 are selected.
暂无评论