91 resultados para Mathematical operators

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

70.00% 70.00%

Publicador:

Resumo:

A study was developed in order to build a function M invariant in time, by means of Hamiltonian's formulation, taking into account the equation associated to the problem, showing that starting from this function the equation of motion of the system with the contour conditions for non-conservative considered problems can be obtained. The Hamiltonian method is extended for these kind of systems in order to validate for non-potential operators through variational approach.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A variational inequality problem (VIP) satisfying a constraint qualification can be reduced to a mixed complementarity problem (MCP). Monotonicity of the VIP implies that the MCP is also monotone. Introducing regularizing perturbations, a sequence of strictly monotone mixed complementarity problems is generated. It is shown that, if the original problem is solvable, the sequence of computable inexact solutions of the strictly monotone MCP's is bounded and every accumulation point is a solution. Under an additional condition on the precision used for solving each subproblem, the sequence converges to the minimum norm solution of the MCP. Copyright © 2000 by Marcel Dekker, Inc.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The energy states of the confined harmonic oscillator and the Hulthén potentials are evaluated using the Variational Method associated to Supersymmetric Quantum Mechanics.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Reliability is a key aspect in power system design and planning. Maintaining a reliable power system is a very important issue for their design and operation. Under the new competitive framework of the electricity sector, power systems find ever more and more strained to operate near their limits. Under this new scenario, it is crucial for the system operator to use tools that facilitate an energy dispatch that minimizes possible power cuts. This paper presents a mathematical model to calculate an energy dispatch that considers security constraints (single contingencies in transmission lines and transformers). The model involves pool markets and fixed bilateral contracts. Traditional methodologies that include security constraints are usually based in multistage dispatch processes. In this case, we propose a single-stage model that avoids the economic inefficiencies which result when conventional multi-stage dispatch approaches are applied. The proposed model includes an AC representation of the transport system and allows calculating the cost overruns incurred in due to reliability restrictions. We found that complying with fixed bilateral contracts, when they go above certain levels, might lead to congestion problems in transmission lines.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The outdating of cartographic products affects planning. It is important to propose methods to help detect changes in surface. Thus, the combined use of remote sensing image and techniques of digital image processing has contributed significantly to minimize such outdating. Mathematical morphology is an image processing technique which describes quantitatively geometric structures presented in the image and provides tools such as edge detectors and morphological filters. Previous studies have shown that the technique has potential on the detection of significant features. Thus, this paper proposes a routine of morphological operators to detect a road network. The test area corresponds to an excerpt Quickbird image and has as a feature of interest an avenue of the city of Presidente Prudente, SP. In the processing, the main morphological operators used were threshad, areaopen, binary and erosion. To estimate the accuracy with which the linear features were detected, it was done the analysis of linear correlation between vectors of the features detected and the corresponding topographical map of the region. The results showed that the mathematical morphology can be used in cartography, aiming to use them in conventional cartographic updating processes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ret instructions to achieve equivalent behavior. Since definition of context-sensitivity and algorithms for context-sensitive analysis have thus far been based on the specific semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in 'calling'-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control flow graph (ICFG), the same is not true of changes in 'stack'-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the context-sensitive version of the algorithm generates more precise results and is also computationally more efficient than its context-insensitive counterpart. Copyright © 2010 ACM.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A novel method to probe the diverse phases for the extended Hubbard model (EHM), including the correlated hopping term, is presented. We extend an effective medium approach [1] to a bipartite lattice, allowing for charge- and/or spin-ordered phases. We calculate the necessary correlation functions to build the EHM phase diagram.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The play operator has a fundamental importance in the theory of hysteresis. It was studied in various settings as shown by P. Krejci and Ph. Laurencot in 2002. In that work it was considered the Young integral in the frame of Hilbert spaces. Here we study the play in the frame of the regulated functions (that is: the ones having only discontinuities of the first kind) on a general time scale T (that is: with T being a nonempty closed set of real numbers) with values in a Banach space. We will be showing that the dual space in this case will be defined as the space of operators of bounded semivariation if we consider as the bilinearity pairing the Cauchy-Stieltjes integral on time scales.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The symmetry structure of the non-Abelian affine Toda model based on the coset SL(3)/SL(2) circle times U(1) is studied. It is shown that the model possess non-Abelian Noether symmetry closing into a q-deformed SL(2) circle times U(1) algebra. Specific two-vertex soliton solutions are constructed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ladder operators can be constructed for all potentials that present the integrability condition known as shape invariance, satisfied by most of the exactly solvable potentials. Using the superalgebra of supersymmetric quantum mechanics, we construct the ladder operators for two exactly solvable potentials that present a subtle hidden shape invariance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper seeks to apply a routine for highways detection through the mathematical morphology tools in high resolution image. The Mathematical Morphology theory consists of describing structures geometric presents quantitatively in the image (targets or features). This explains the use of the Mathematical Morphology in this work. As high resolution images will be used, the largest difficulty in the highways detection process is the presence of trees and automobiles in the borders tracks. Like this, for the obtaining of good results through the use of morphologic tools was necessary to choose the structuring element appropriately to be used in the functions. Through the appropriate choice of the morphologic operators and structuring elements it was possible to detect the highways tracks. The linear feature detection using mathematical morphology techniques, can contribute in cartographic applications, as cartographic products updating.