Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Substructures of a semigroup of tree languages

    The set of all terms of type τ is denoted by Wτ(X). Each element of P(Wτ(X)) is called a tree language. A binary operation ij is an operation on P(Wτ(X)) defined from the superposition Ŝng on the set of all n-ary terms of type τ. Since Ŝng satisfies the superposition law, (P(Wτ(X));ij) is a semigroup. In this paper, we study subsemigroups of the semigroup (P(Wτ(X));ij) including constant, left-zero, right-zero subsemigroups, rectangular bands, subgroups, and inverse subsemigroups. We also study factorization and locally factorization of the semigroup (P(Wτ(X));ij) and we obtain that this semigroup is neither factorizable nor locally factorizable. However, we achieve a necessary and sufficient condition for factorization of local subsemigroup AijP(Wτ(X))ijA, where A is idempotent in P(Wτ(X)). Finally, we study ijiteration and show that with special conditions, an ijiteration of idempotent is idempotent.

  • articleNo Access

    ITERATION OF INVERTIBLE TRANSDUCTIONS

    We study iterated transductions defined by a class of invertible Mealy automata over the binary alphabet. It is shown that in some cases the resulting orbit relation is rational and we determine the complexity of several natural computational problems associated with the iterated transductions. In particular, we show how to compute timestamps and coordinates.

  • articleNo Access

    On endomorphisms of projective varieties with numerically trivial canonical divisors

    Let X be a klt projective variety with numerically trivial canonical divisor. A surjective endomorphism f:XX is amplified (respectively, quasi-amplified) if fDD is ample (respectively, big) for some Cartier divisor D. We show that after iteration and equivariant birational contractions, a quasi-amplified endomorphism will descend to an amplified endomorphism. As an application, when X is Hyperkähler, f is quasi-amplified if and only if it is of positive entropy. In both cases, f has Zariski dense periodic points. When X is an abelian variety, we give and compare several cohomological and geometric criteria of amplified endomorphisms and endomorphisms with countable and Zariski dense periodic points (after an uncountable field extension).

  • articleNo Access

    Linearizable Wait-Free Iteration Operations in Shared Double-Ended Queues

    Shared data object implementations that allow non-blocking concurrent operations are useful for in-memory data-processing, especially when they support consistent bulk operations like iterations. We propose an algorithmic implementation for concurrent iterators on shared double-ended queues (deques), building on and complementing a known lock-free deque implementation by M. Michael. The proposed construction is linearizable and wait-free. Moreover, it is read-only, so it does not execute expensive synchronization primitives and it does not interfere with update operations.

  • articleNo Access

    Nonbinary Low-Density Parity Check Decoding Algorithm Research-Based Majority Logic Decoding

    In the nonbinary low-density parity check (NB-LDPC) codes decoding algorithms, the iterative hard reliability based on majority logic decoding (IHRB-MLGD) algorithm has poor error correction performance. The essential reason is that the hard information is used in the initialization and iterative processes. For the problem of partial loss of information, when the reliability is assigned during initialization, the error correction performance is improved by modifying the assignment of reliability at initialization. The initialization process is determined by the probability of occurrence of the number of erroneous bits in the symbol and the Hamming distance. In addition, the IHRB-MLGD decoding algorithm uses the hard decision in the iterative decoding process. The improved algorithm adds soft decision information in the iterative process, which improves the error correction performance while only slightly increasing the decoding complexity, and improves the reliability accumulation process which makes the algorithm more stable. The simulation results indicate that the proposed algorithm has a better decoding performance than IHRB algorithm.

  • articleNo Access

    RECOGNIZING HANDWRITTEN CHINESE CHARACTERS BY STROKE-SEGMENT MATCHING USING AN ITERATION SCHEME

    The problem of handwritten Chinese character recognition is solved by matching character stroke segments using an iteration scheme. Length and orientation similarity properties, and coordinate overlapping ratios are used to define a measure of similarity between any two stroke segments. The initial measures of similarity between the stroke segments of the input and template characters are used to set up a match network which includes all the match relationships between the input and template stroke segments. Based on the concept of at-most-one to one mapping an iteration scheme is employed to adjust the match relationships, using the contextual information implicitly contained in the match network, so that the match relationships can get into a stable state. From the final match relationships, matched stroke-segment pairs are determined by a mutually-best match strategy and the degree of similarity between the input and each template character is evaluated accordingly. Certain structure information of Chinese characters is also used in the evaluation process. The experimental results show that the proposed approach is effective. For recognition of Chinese characters written by a specific person, the recognition rate is about 96%. If the characters of the first three ranks are checked in counting the recognition rate, the rate rises to 99.6%.

  • articleNo Access

    ANALYTICAL COMPARISON OF THINNING ALGORITHMS

    This paper deals with analyzing and comparing several key thinning algorithms in terms of various different methodologies. From these analyses and comparisons, a new sequential model thinning algorithm using heuristic, hybrid methods is presented. It intends to produce, based on past experience, thinned skeletons of thickness one from input patterns, keep connectivity, and eliminate unnecessary pixels. Several illustrative examples on various patterns were tested and the results compared. The parallel model thinning algorithm is still open.

  • articleNo Access

    AN ITERATION METHOD FOR CHAOTIFYING AND CONTROLLING DYNAMICAL SYSTEMS

    This paper proposes a new iteration method for chaotifying and controlling dynamical systems. By applying this iteration method, the dimension of the given dynamical system can be reduced from to n to n-1. Moreover, the chaotified system is not necessarily Hurwitz stable originally. The iteration method is applied to three-dimensional systems for demonstration, for which a sufficient condition is obtained for chaotification. In addition, the iteration method can be used to control a class of chaotic systems. These results are illustrated via simulations on the Duffing oscillator and the Chen system.

  • articleNo Access

    Capture Zones of the Family of Functions λzmexp(z)

    We consider the family of entire transcendental maps given by Fλ,m(z)=λzmexp(z) where m≥2. All functions Fλ,m have a superattracting fixed point at z=0, and a critical point at z = -m. In the dynamical plane we study the topology of the basin of attraction of z=0. In the parameter plane we focus on the capture behavior, i.e. λ values such that the critical point belongs to the basin of attraction of z=0. In particular, we find a capture zone for which this basin has a unique connected component, whose boundary is then nonlocally connected. However, there are parameter values for which the boundary of the immediate basin of z=0 is a quasicircle.

  • articleNo Access

    Global Invariant Manifolds of Dynamical Systems with the Compatible Cell Mapping Method

    An iterative compatible cell mapping (CCM) method with the digraph theory is presented in this paper to compute the global invariant manifolds of dynamical systems with high precision and high efficiency. The accurate attractors and saddles can be simultaneously obtained. The simple cell mapping (SCM) method is first used to obtain the periodic solutions. The results obtained by the generalized cell mapping (GCM) method are treated as a database. The SCM and GCM are compatible in the sense that the SCM is a subset of the GCM. The depth-first search algorithm is utilized to find the coarse coverings of global stable and unstable manifolds based on this database. The digraph GCM method is used if the saddle-like periodic solutions cannot be obtained with the SCM method. By taking this coarse covering as a new cell state space, an efficient iterative procedure of the CCM method is proposed by combining sort, search and digraph algorithms. To demonstrate the effectiveness of the proposed method, the classical Hénon map with periodic or chaotic saddles is studied in far more depth than reported in the literature. Not only the global invariant manifolds, but also the attractors and saddles are computed. The computational efficiency can be improved by up to 200 times compared to the traditional GCM method.

  • articleNo Access

    The Boundedness Locus and Baby Mandelbrot Sets for Some Generalized McMullen Maps

    In this paper, we study rational functions of the form Rn,a,c(z)=zn+azn+c, with n fixed and at least 3, and hold either a or c fixed while the other varies. We locate some homeomorphic copies of the Mandelbrot set in the c-parameter plane for certain ranges of a, as well as in the a-plane for some c-ranges.

    We use techniques first introduced by Douady and Hubbard [1985] that were applied for the subfamily Rn,a,0 by Devaney [2006]. These techniques involve polynomial-like maps of degree two.

  • articleNo Access

    SUBWORD COMPLEXITY OF PROFINITE WORDS AND SUBGROUPS OF FREE PROFINITE SEMIGROUPS

    We study free profinite subgroups of free profinite semigroups of the same rank using, as main tools, iterated continuous endomorphisms, subword complexity, and the associated entropy. Main results include a general scheme to produce such subgroups and a proof that the complement of the minimal ideal in a free profinite semigroup on more than one generator is closed under all implicit operations that do not lie in the minimal ideal and even under their infinite iteration.

  • articleNo Access

    SUPER COALESCENCE HIDDEN-VARIABLE FRACTAL INTERPOLATION FUNCTIONS

    Fractals25 Mar 2021

    In this paper, a new notion of super coalescence hidden-variable fractal interpolation function (SCHFIF) is introduced. The construction of SCHFIF involves choosing an IFS from a pool of several non-diagonal IFS at each level of iteration. Further, the integral of a SCHFIF is studied and shown to be a SCHFIF passing through a different set of interpolation data.

  • articleNo Access

    Elasto-Plastic Analysis of Steel Framed Structures Based on Rigid Body Rule and Plastic-Hinge Concept

    Aimed at its elegance, the rigid-body-based procedure for geometric nonlinear analysis is extended to including the plastic-hinge concept for elasto-plastic analysis of framed structures. To this end, the rigid body test for initially stressed elements is first briefed, followed by derivation of the tangent stiffness of the 2D elasto-plastic beam element using the initial and full yield surfaces to consider gradual yielding of the cross-section. Of theoretical importance, the tangent and geometric stiffnesses are jointly tested by the rigid body rule for initially stressed elements. The above concepts are contained in the global and localstrategies, respectively, for tracing the load–deflection curves and for performing the trial-and-error iterations. The former can deal with the formation of multi plastic hinges, in addition to multi-critical points, whereas the latter is strongly rooted in the rigid body rule and thus is free of fictitious forces (source of slow convergence). The accuracy and efficiency of the solutions obtained are confirmed by comparison with the existing ones. In conclusion, the procedure proposed in its entity makes the elasto-plastic analysis simpler and faster. The more complicated the problem is, the greater the saving in computation time using the proposed procedure. Since only minimal mathematical operations are required, this procedure has the potential of being widely accepted by structural engineers in routine analysis.

  • articleNo Access

    A Data-driven Method for Identifying Intricate Trend Component Hidden in Measured Signal

    Identification of the latent trend component is a vital procedure for further evaluating the measured signal. Many methods have been presented to extract the trend component. However, some essential parameters used in these methods need to be selected depending on much prior knowledge or experience. To avoid the inherent flaws in current methods, we introduce a novel signal decomposition method called variational mode decomposition (VMD) to cope with this issue. Firstly, the parameters involved in VMD method are discussed according to the universal characteristics of trend component. Then, a novel data-driven method based on the iterative VMD is proposed to identify the intricate trend component. Moreover, a criterion called normalized euclidean distance (NED) is presented to evaluate the converging property of the proposed method. Finally, the simulated time series and the collected extensive experimental cases are employed to illustrate the effectiveness of the proposed method. The analysis results show that the proposed method delivers a good performance for the trend component extraction and outperforms the benchmark method, i.e., empirical mode decomposition (EMD)-based method, for which more than one intrinsic mode function (IMF) is regarded as the underlying trend component.

  • articleNo Access

    ELASTODYNAMIC STRESS INTENSITY FACTOR FOR A FINITE CRACK IN ELASTIC SOLID UNDER 3D TRANSIENT LOADING OF MODE I

    In this paper, the three-dimensional dynamic problem for an infinite elastic medium weakened by a crack of infinite length and finite width is analyzed, while the crack surfaces are subjected to mode I transient linear tractions. The integral transform approach is applied to reduce the governing differential equations to a pair of coupled singular integral equations, whose solutions can be obtained with the typical iteration method. The analytical solution of the stress intensity factor when the first wave and the first scattered wave reach the investigated crack tip is obtained. Numerical results are presented for different values of the width-to-longitudinal distance ratio z/l. It is found that the stress intensity factor decreases with the arrival of the first scattered longitudinal wave and increases with the arrival of the first scattered Rayleigh wave and tends to be stable. The static value considering both the first scattered wave and the first wave is about 50% greater than that considering only the first wave, and then the effect of the reflected wave is remarkable and deserves further study.

  • chapterNo Access

    ANALYTICAL COMPARISON OF THINNING ALGORITHMS

    This paper deals with analyzing and comparing several key thinning algorithms in terms of various different methodologies. From these analyses and comparisons, a new sequential model thinning algorithm using heuristic, hybrid methods is presented. It intends to produce, based on past experience, thinned skeletons of thickness one from input patterns, keep connectivity, and eliminate unnecessary pixels. Several illustrative examples on various patterns were tested and the results compared. The parallel model thinning algorithm is still open.

  • chapterNo Access

    Iteration of Total and Partial Unary Operations

    Iterating a unary operation f defined on an n-element set A one obtains the descending chain

    of images. The least integer λ(f) with Imfλ(f) = Imfλ(f)+1 is called the pre-period of f. The pre-period of f is an integer between 0 and n - 1. If λ(f) = n - 1 for n ≥ 1, then f is called a long-tailed (LT)-operation and if λ(f) = n - 2 for n ≥ 2, f is said to be an LT1-operation. LT- and LT1-operations and their invariant equivalence relations are characterized in [3]. In [4] these results are extended to partial operations and in [5] to n-ary operations. In this paper we characterize unary total and partial operations for arbitrary λ(f) = n - t, 0 < t < n.

  • chapterNo Access

    Invariant hypersurfaces of endomorphisms of the projective 3-space

    We consider surjective endomorphisms f of degree > 1 on the projective n-space n with n = 3, and f−1-stable hypersurfaces V. We show that V is a hyperplane (i.e., deg(V) = 1) but with four possible exceptions; it is conjectured that deg(V) = 1 for any n ≥ 2; cf. [7], [3].

  • chapterNo Access

    RECOGNIZING HANDWRITTEN CHINESE CHARACTERS BY STROKE-SEGMENT MATCHING USING AN ITERATION SCHEME

    The problem of handwritten Chinese character recognition is solved by matching character stroke segments using an iteration scheme. Length and orientation similarity properties, and coordinate overlapping ratios are used to define a measure of similarity between any two stroke segments. The initial measures of similarity between the stroke segments of the input and template characters are used to set up a match network which includes all the match relationships between the input and template stroke segments. Based on the concept of at-most-one to one mapping, an iteration scheme is employed to adjust the match relationships, using the contextual information implicitly contained in the match network, so that the match relationships can get into a stable state. From the final match relationships, matched stroke-segment pairs are determined by a mutually-best match strategy and the degree of similarity between the input and each template character is evaluated accordingly. Certain structure information of Chinese characters is also used in the evaluation process. The experimental results show that the proposed approach is effective. For recognition of Chinese characters written by a specific person, the recognition rate is about 96%. If the characters of the first three ranks are checked in counting the recognition rate, the rate rises to 99.6%.