Information-Theoretic Bounds for Mobile Ad-hoc Networks Routing Protocols
Better bound on the exponent of the radius of the multipartite separable ball
,
(1)
in Frobenius norm, centered at the identity matrix, of separable (unentangled) positive semidefinite matrices (actually we do slightly better, but with the same asymptotic exponent). For qubits (d0 = 2) this radius is is (2/3)m/2−1 , to be compared to (1/2)m/2−1 from
ln 3 − 1) ≈ .29248125, compared [6]. If we express it as as κ2−γm , the exponent is γ = 0.5( ln 2
2
to [6]’s exponent of γ = 1/2. The non-qubit exponent is better, too, but approaches our earlier one as d0 → ∞. From this, we easily obtain a lower bound on the radius of the largest Frobenius-norm ball of separable normalized density matrices: for example, for m qubits it is (3/2) × 2−(1+γ )m ≡ (3/2) × 6−m/2 (versus our earlier 2 × 2−3m/2 ). A slightly better, but more complicated, version of our new bound lets us improve the factor 3/2 to √ 3m+1 /(3m + 3), which rapidly approaches 3. This gives a number of qubits below which NMR with standard pseudopure-state preparation techniques can access only unentangled states; with parameters realistic for current experiments, this is 36 qubits (compared to 23 qubits via our earlier results). We also address several points not strictly necessary for obtaining these results, but which relate to the power and nature of our methods, and the possibilities for strengthening the results. Szarek [7] found the first upper bound below unity on ball size, and recently Aubrun and Szarek [8] found an upper bound on ball size which matches (up to a logarithmic factor) the lower bound we obtain here for qubits, though for qudits with d > 2 there is still an exponential gap. One of the most natural mathematical methods for tackling this problem is to use a general result of F. John [9] relating the inner and outer ellipsoids of a convex set. We show that straightforward application of this natural method gives results weaker than we obtain here; weaker, in fact, than our earlier ones [6]. Our methods may appear technical; nevertheless, many of the intermediate results are mathematically interesting in their own right and have applications to quantum information problems other than the one at hand. Along the way we explain some of these, notably a variant proof of the result that the eigenvalues of a separable bipartite quantum state are majorized by those of its marginal density operators [10], and an example of the use of John’s theorem to bound the radii of other inner balls of quantum information-theoretic interest, in this case the inner ball of the convex hull of all maximally entangled states (related to an application-oriented entanglement measure, the fully entangled fraction of [11]). Many of our results use bounds on induced norms of various classes of maps on matrices, which we expect to be useful in other contexts. An appendix includes an additional bound, closely related to one used in the main argument, on the 2-to-∞ induced norm of stochastic linear maps that are positive on a radius-a ball of matrices around the identity.
Mutual information and minimum mean-square error in Gaussian channels
Almost Sure Convergence Theorems of Rate of Coin Tosses for Random Number Generation by Int
X
where N denote the set of all positive integers. 2
(b) Sup
-complexiity
rate
Let be a general process. We introduce the sup -complexity rate of an element of A1 or a sample path of the process. De nition 1 [2]: A function h : A1 ! [0; 1) de ned by 1 1 h(x) = lim sup log n 8x 2 A1 (x ) n!1 n is called the sup -complexity rate function . We call h (x) the sup -complexity rate of x. Next, we de ne the inf -complexity rate in a similar manner. De nition 2 [2]: A function h : A1 ! [0; 1) de ned by 1 1 h (x) = lim inf log n 8x 2 A1 n!1 n (x ) is called the inf -complexity rate function . We call h (x) the inf -complexity rate of x.
Interval algorithm for general sources 1) Set l = m = 1; s = t = (null string), s = t = 0; s = t = 1, I (s) = [ s ; s ) and J (t) = [ t; t ). 2) Partition the interval J (t) = [ t ; t) into M disjoint subintervals J (t1); J (t2); 1 1 1 ; J (tM ) such that J (tj ) = [ tj ; tj ) (j = 1; 2; 1 1 1 ; M ) where tj = t + (t 0 t )Qj 01 tj = t + (t 0 t )Qj
The International Journal of Advanced Manufacturing Technology
Ping LouÆZu-de ZhouÆYou-Ping ChenÆWu AiStudy on multi-agent-based agile supply chain management Received:23December2002/Accepted:23December2002/Published online:5December2003ÓSpringer-Verlag London Limited2003Abstract In a worldwide network of suppliers,factories, warehouses,distribution centres and retailers,the supply chain plays a very important role in the acquisition, transformation,and delivery of raw materials and products.One of the most important characteristics of agile supply chain is the ability to reconfigure dynami-cally and quickly according to demand changes in the market.In this paper,concepts and characteristics of an agile supply chain are discussed and the agile supply chain is regarded as one of the pivotal technologies of agile manufacture based on dynamic alliance.Also,the importance of coordination in supply chain is emphas-ised and a general architecture of agile supply chain management is presented based on a multi-agent theory, in which the supply chain is managed by a set of intelli-gent agents for one or more activities.The supply chain management system functions are to coordinate its agents.Agent functionalities and responsibilities are de-fined respectively,and a contract net protocol joint with case-based reasoning for coordination and an algorithm for task allocation is presented.Keywords Agile supply chainÆMulti-agent systemÆCoordinationÆCBRÆContract net protocol1IntroductionAdvanced technology and management are constantly being adopted to improve an enterpriseÕs strength and competitive ability in order to achieve predominance among hot global competition.In a report on21st century manufacturing strategy development,the author suggests that various production resources,including people,funds,technology and facilities should be inte-grated and managed as a whole;thus optimising the utilisation of resources and taking full advantage of advanced manufacturing technology,information tech-nology,network technology and computer[1].Agile manufacture based on dynamic alliance is coming into being so that enterprises can remain competitive in a constantly changing business environment and is becoming a main competitive paradigm in the interna-tional market.Agility,which has basically two mean-ings:flexibility and reconfigurability,has become a very important characteristic of a modern manufacturing enterprise.Flexibility is an enterpriseÕs ability to make adjustments according to customersÕneeds.Reconfigu-rability is the ability to meet changing demands[2,3].The ability to quickly respond to marketÕs changes, called agility,has been recognised as a key element in the success and survival of enterprises in todayÕs market.In order to keep up with rapid change,enterprises need to change traditional management in this hot competition. Through dynamic alliance,enterprises exert predomi-nance themselves,cooperate faithfully with each other, and compete jointly so as to meet the needs of the fluctuating market,andfinally achieve the goal of win-win[2,3].So how to improve agility in the supply chain, namelyflexibility and reconfigurability,is one of the important factors to win against the competition.Supply chain management(SCM)is an approach to satisfy the demands of customers for products and ser-vices via integrated management in the whole business process from raw material procurement to the product or service delivery to customers.In[4],M.S.Fox et al. describe the goals and architecture of integrated supply chain management system(ISCM).In this system,each agent performs one or more supply chain management functions,and coordinates its decisions with other rele-vant agents.ISCM provides an approach to the real timeInt J Adv Manuf Technol(2004)23:197–203 DOI10.1007/s00170-003-1626-xP.Lou(&)ÆZ.ZhouRoom107,D8Engineering Research Center of Numerical Control System,School of Mechanical Science&Engineering, Huazhong University of Science&Technology, 430074Wuhan,Hubei,P.R.ChinaE-mail:louping_98@Y.-P.ChenÆW.AiSchool of Mechanical Science and Engineering, Huazhong University of Science and Technology, 430074Wuhan,Hubei,P.R.Chinaperformance of supply chain function.The integration of multi-agent technology and constraint network for solving the supply chain management problem is pro-posed[6].In[7],Yan et al.develop a multi-agent-based negotiation support system for distributed electric power transmission cost allocation based on the networkflow model and knowledge query&manipulation language (KQML).A KQML based multi-agent coordination language was proposed in[8,9]for distributed and dy-namic supply chain management.However,the coordi-nation mechanisms have not been formally addressed in a multi-agent-based supply chain.In most industries, marketing is becoming more globalised,and the whole business process is being implemented into a complex network of supply chains.Each enterprise or business unit in the SCM represents an independent entity with conflicting and competing product requirements and may possess localised information relevant to their interests.Being aware of this independence,enterprises are regarded as autonomous agents that can decide how to deploy resources under their control to serve their interests.This paperfirst introduces concepts and characteris-tics of agile supply chains and emphasises the impor-tance of coordination in supply chain.Then,it presents an architecture of agile supply chain based on a multi-agent theory and states the agentsÕfunctions and responsibilities.Finally,it presents a CBR contract net protocol for coordination and the correlative algorithm for task allocation in multi-agent-based agile supply chains.2Agile supply chainA supply chain is a network from the topologic structure which is composed of autonomous or semi-autonomous enterprises.The enterprises all work together for pro-curement,production,delivery,and so on[10].There is a main enterprise in the supply chain that is responsible for configuring the supply chain according to the de-mand information and for achieving supply chain value using fundflow,materialflow and informationflow as mediums.There are three discontinuous buffers to make the materialflowfluently and satisfy the change in the demand.On the one hand,as every enterprise manages inventory independently,plenty of funds are wasted.As the demand information moves up-stream,the forecast is inaccurate and the respond to the change in demand is slow[11].Accordingly,the key method for competi-tiveness is improving and optimising supply chain management to achieve integrated,automated,and agile supply chain management and to cut costs in the supply chain.To optimise supply chain management and coordi-nate the processes for materialflow,fundflow and informationflow,it is necessary to make materialflow fluent,quickly fund turnover and keep information integrated.Prompt reconfiguration and coordination is an important characteristic of agile supply chain according to dynamic alliance compositing and de-compositing(enterprise reconfiguration).Agile supply chain management can improve enterprise reconfiguring agility.The agile supply chain breaks through the tra-ditional line-style organizational structure.With net-work technology an enterprise group is formed by a cooperative relationship which includes an enterprise business centre,a production design centre,a supplier,a distribution centre,a bank,a decision-making centre, etc.It reduces the lead time to the market to satisfy customer demand.Agile supply chain without temporal and spatial limits promptly expands the enterprise scale,marketing share and resource by allied enterprise.So,a key factor of the agile supply chain is to integrate heterogeneous information systems adopted in various enterprises.The integration information system can provide marketing information and supplier details.Feasible inventory, quantity and cycle of replenished stock,delivery,etc.is designed using the shared information.It is evident that agile supply chain is a typical distributed system.A multi-agent system(MAS)which is characterised byflexibility and adaptability is suit-able for an open and dynamic environment.Thus MAS is a good method for agile supply chain man-agement.3The concept of agents and MASSome people define an agent as any piece of software or object which can perform a specific given task.Presently the prevailing opinion is that an agent must exhibit three important general characteristics:autonomy,adapta-tion,and cooperation[8,12,13].Autonomy means that agents have their own agenda of goals and exhibit goal-directed behaviour.Agents are not simply reactive,but can be pro-active and take initiatives as they deem appropriate.Adaptation implies that agents are capable of adapting to the environment,which includes other agents and human users,and can learn from the expe-rience in order to improve themselves in a changing environment.Cooperation and coordination between agents are probably the most important feature of MAS. Unlike those stand-alone agents,agents in a MAS col-laborate with each other to achieve common goals.In other words,these agents share information,knowledge, and tasks among themselves.The intelligence of MAS is not only reflected by the expertise of individual agents but also exhibited by the emerged collective behaviour beyond individual agents.Of course various agents have different functions,but some functions are needed for each agent.A generic structure of agents that includes two parts is presented:agent kernel and function mod-ule.Figure1exhibits the generic structure of agents which is a plug-in model.In Fig.1,the generic agent includes the following components:198The mailbox handles communication between one agent and the other agents.The message handler processes incoming message from the mailbox,orders them according to priority level,and dispatches them to the relevant components of the agent.The coordination engine makes decisions concerning the agent Õs goals,e.g.how they should be pursued,when to abandon them,etc.,and sends the accepted tasks to the planner/scheduler.It is also responsible for coordi-nating the agents Õinteractions with other agents using coordination protocols and strategies.The planner and scheduler plans the agent Õs tasks on the basis of decisions made by the coordination engine and on resources and task specifications available to the agent.If not,a message is sent to the coordination en-gine for finding extra resources.The blackboard provides a shared work area for exchanging information,data,and knowledge among function modules.Every function module is an inde-pendent entity.These function modules execute con-currently by the control of planner/scheduler and collaborate through the blackboard.The acquaintance database describes one agent Õs relationships with other agents in the society,and its beliefs about the capabilities of those agents.The coor-dination engine uses information contained in this database when making collaborative arrangements with other agents.The resource database reserves a list of resources (referred to in this paper as facts)that are owned by and available to the agent.The resource database also sup-ports a direct interface to external systems,which allows the interface to dynamically link and utilise a proprie-tary database.The ontology database stores the logical definition of each fact type—its legal attributes,the range of legal values for each attribute,any constraints betweenattribute values,and any relationship between the attributes of that fact and other facts.The task/plan database provides logical descriptions of planning operators (or tasks)known to the agent.4Multi-agent-based agile supply chain management Multi-agent-based agile supply chain management per-forms many functions in a tightly coordinated manner.Agents organise supply chain networks dynamically by coordination according to a changing environment,e.g.exchange rates go up and down unpredictably,customers change or cancel orders,materials do not arrive on time,production facilities fail,etc.[2,14].Each agent performs one or more supply chain functions independently,and each coordinates his action with other agents.Figure 2provides the architecture of multi-agent-based agile supply chains.There are two types of agents:functional agents and mediator agents.Functional agents plan and/or control activities in the supply chain.Mediator agents play a system coordinator role s by promoting coopera-tion among agents and providing message services.Mediator agents dispatch the tasks to the functional agents or other mediator agents,and then those func-tional or mediator agents complete the tasks by coordi-nation.All functional agents coordinate with each other to achieve the goals assigned by mediator agents.The mediator-mediator and mediator-agent communication is asynchronous,and the communication mode can be point-to-point (between two agents),broadcast (one to all agents),or multicast (to a selected group of agents).Messages are formatted in an extended KQML format.The architecture is characterised by organizational hier-archy and team spirit,simplifying the organisational architecture and reducing the time needed to fulfil the task.The rest of this section briefly describes each of the mediator agents underdevelopment.Fig.1Generic structures of agents199–Customer mediator agent:This agent is responsible for acquiring orders from customers,negotiating with customers about prices,due dates,technical advisory,etc.,and handling customer requests for modifying or cancelling respective orders,then sending the order information to a scheduling mediator agent.If a customer request needs to be re-designed,the infor-mation is sent to a design mediator agent,then to a scheduling mediator agent.–Scheduling mediator agent:This agent is responsible for scheduling and re-scheduling activities in the fac-tory,exploring hypothetical ‘‘what-if’’scenarios for potential new orders,and generating schedules that are sent to the production mediator agent and logis-tics mediator agent.The scheduling agent also acts as a coordinator when infeasible situations arise.It has the capability to explore tradeoffs among the various constraints and goals that exit in the plant.–Logistics mediator agent:This agent is responsible for coordinating multi-plans,multiple-supplier,and the multiple-distribution centre domain of the enterprise to achieve the best possible results in terms of supply chain goals,which include on-time delivery,cost minimisation,etc.It manages the movement of products or materials across the supply chain from the supplier of raw materials to the finished product customer.–Production mediator agent:This agent performs the order release and real-time floor control functions as directed by the scheduling mediator agent.It monitors production operation and facilities.If the production operation is abnormal or a machine breaks down,this agent re-arranges the task or re-schedules with the scheduling mediator agent.–Transportation mediator agent:This agent is responsible for the assignment and scheduling of transportation resources in order to satisfy inter-plant movement specified by the logistics mediator agent.It is able to take into account a variety oftransportation assets and transportation routes in the construction of its schedules.The goal is to send the right materials on time to the right location as assigned by the logistics mediator agent.–Inventory mediator agent:There are three invento-ries at the manufacturing site:raw product inven-tory,work-in-process inventory,and finished product inventory.This agent is responsible for managing these inventories to satisfy production requirements.–Supplier mediator agent:This agent is responsible for managing supplier information and choosing suppli-ers based on requests in the production process.–Design mediator agent:This agent is responsible for developing new goods and for sending the relevant information to the scheduling mediator agent for scheduling,as well as to the customer mediator agent for providing technological advice.5Coordination in a multi-agent-based agile supply chainCoordination has been defined as the process of man-aging dependencies between activities [15].One impor-tant characteristic of an agile supply chain is the ability to reconfigure quickly according to change in the envi-ronment.In order to operate efficiently,functional entities in the supply chain must work in a tightly coordinated manner.The supply chain works as a net-work of cooperating agents,in which each performs one or more supply chain functions,and each coordinates its action with that of other agents [5].Correspondingly,a SCMS transforms to a MAS.In this MAS,agents may join the system and leave it according to coordinating processes.With coordination among agents,this MAS achieves the goal of ‘‘the right products in the right quantities (at the right location)at the right moment at minimalcost’’.Fig.2An architecture of multi-agent based agile supply chain management2005.1Contract net protocol combined withcase-based reasoningThe contract net is a negotiation protocol(CNP)pro-posed by Smith[15].In the CNP,every agent is regarded as a node,such as a manager or a contractor.The manager agent(MA)is responsible for decomposing, announcing,and allocating the task and contractor agent(CA)is responsible for performing the task.This protocol has been widely used for multi-agent negotia-tion,but it is inefficient.For this reason,contract net protocol is combined with case-based reasoning(CBR).In case-based reasoning(CBR),the target case is defined as problem or instance which is currently being faced,and the base case is problem or instance in the database.CBR searches the base case in the database under the direction of the target case,and then the base case instructs the target case to solve the problem.This method is efficient.But at the very beginning,it is very difficult to set up a database which includes all problems solving cases.The cases may be depicted as follows:C¼\task;MA;taskÀconstraint;agentÀset> Here,MA is task manager.Task-constraint repre-sents various constraint conditions for performing the task,depicted as a vector{c1,c2,c3,...,c m}.Agent-set is a set of performing the task as defined below:Agent set¼\sub task i;agent id;cost;time;resource>f gtask¼[ni¼1sub task iIn the supply chain,the same process in which a certain product moves from the manufacturer to the customer is performed iteratively.So,case-based rea-soning is very efficient.Consequently,combining con-tract net protocol with CBR could avoid high communicating on load,thus promoting efficiency.The process can be depicted as follows(Fig.3).5.2The algorithm for task allocation baseon CBR contract net protocolThere are two types of agents in the supply chain, cooperative and self-interested agents.Cooperative agents attempt to maximise social welfare,which is the sum of the agents utilities.They are willing to take individual losses in service of the good of the society of agents.For example,function agents come from the same enterprise.In truth,the task allocation among cooperative agents is combinational optimisation prob-lem.Self-interested agents seek to maximise their own profit without caring about the others.In such a case,an agent is willing to do other agentsÕtasks only for com-pensation[16].Function agents,for example,come from different enterprises.In the following section the algorithm for task allo-cation among self-interested agents based on CBR contract net protocol will be addressed.Before describ-ing the algorithm,there are some definitions that must be clarified:Task—A task which is performed by one agent or several agents together:T=<task,reward,con-straints>,where task is the set of tasks(task={t1,t2,..., t m}),reward is the payoffto the agents that perform the task(reward={r1,r2,...,r m}),and constraints refer to the bounded condition for performing the task(con-straints={c1,c2,...,c n}).Agent coalition(AC)—A group of agents that per-form task T,described as a set AC={agent i,i=1,2,...,n}.Efficiency of agent—Efficiency of an agent i is de-scribed as follows:E i¼rewardÀcostðÞ=costð1Þwhere reward is the payoffto the agent performing task T,and cost refers to that spend on performing the task. If agent i is not awarded the task,then E i=0.Efficiency of agent coalition—E coalition¼rewardÀX micost iÀh!,X micost iþh!ð2Þwhere reward is the payoffof the agent coalition per-forming task T;cost i refers to that spend on performing task t i;and h is the expense on forming coalition,which is shared by the members of the coalition.If the coalition is not awarded task T,then E coalition<=0.6Algorithm:1.After MA accepts the task T=<task,reward,constraint>(task is decomposable),then it searches the database.2.If itfinds a corresponding case,it assigns the task orsubtask to the related agents according to the case, and the process is over3.If no case is found,then the task T is announced toall relevant agents(agent i,i=1,2,...n).4.The relevant agents make bids for the task accord-ing to their own states and capabilities.Thebid Fig.3CBR contract net process201from agent i can be described as follows:Bid i =<agentid i ,T i ,price i ,condition i >,where i ex-presses the bidding agent (i =1,2,...,h );agentid i is the exclusive agent identifier;T i is the task set of agent i Õs fulfilment;price i is the recompense of agent i fulfilling the task T i ;and condition i is the constraint conditions for agent i to fulfil the task T i .5.If [1 i h&T i then the task T can not be performed.Otherwise MA makes a complete combination of the agents,namely to form a number of agent coalitions (or agent sets,amounting to N =2h )1).6.First MA deletes those agent coalitions where no agents are able to satisfy the constraint condition.Next the rest of the coalitions are grouped by the number of agents in coalitions and put into set P (P ={P 1,P 2,...,P h })in order of the minimum re-compense increase of the coalitions,where P i is the set of agent coalitions,including i agents.7.MA puts the first coalition from each group P i(i =1,2,...,h )into set L ,and if L is null then it returns to (10),otherwise it calculates the minimum re-compense of each coalition as follows:Min Pm iprice i ÃT is :t :P h i ¼1T i TP m icondition i constraitThen it searches for the minimal agent coalition AC min from the set L .8.MA sends the AC min to the relevant agents,namely MA requests that these agent fulfil the task to-gether.The relevant agents calculate the E coalition and E i according to Eqs.1and 2.IfE coalition !max miE i ,then all agents in the AC minaccept the proposal to form a coalition to perform the task T together.MA assigns the task to the AC min ,and the process is over.Otherwise it deletes the AC min from P i and returns to (7).9.If the relevant agents accept the task or subtask,then MA assigns the task to them.The process is over.If some agents cannot accept the subtask and the stated time is not attained,then it returns to (3),otherwise it returns to (10).10.The process is terminated (namely the task cannotbe performed).After all processes have been completed,case-based maintenance is required to improve the CBR.Thus efficiency is continuously promoted.6.1An example–A simple instantiation of a supply chain simulation is presented here and the negotiating process among agents is shown.In this supply chain instantiation,thetransportation mediator agent (TMA)has a transporttask T ,in which it has to deliver the finished product to the customer within 15units of time and must pay 1500monetary units for it,that is T =<t ,1500,15>.Four transport companies can perform task T .Each company is an autonomous agent,that is four agents,agent A,agent B,agent C and agent D.So the TMA announces the task T to the four agents.Then the four agents make a bid for the task T as shown in Table 1.–So the four agents can form 24)1coalitions (see Fig.4),which are put into set P .Cooperation between agents in the coalition requires expense and the ex-pense for forming the coalition increases with the growth of in coalition size.This means that expanding the coalition may be non-beneficial.The expense of each agent in forming a coalition h is 100.First,the coalitions in which no agents can satisfy the constraint conditions are deleted from the set P .The rest of the coalitions are grouped by the number of agents in the coalition and ordered according to the recompense of each group that was increased due to the coalition,namely P 1={B},P 2={{A,B},{A,C},{B,C},{A,D},{B,D}},P 3={{A,B,C},{A,B,D},{B,C,D}},P 4={{A,B,C,D}}.Then the cost and efficiency of coalition {B},{A,C}and {A,B,C}are calculated as follows:Price f A ;B g ¼Min ð800x 1þ1200x 2Þs :t :20x 1þ12x 2 15x 1þx 2!1x 1!0:x 2!0Price f A ;B ;C g ¼Min ð800y 1þ1200y 2þ2000y 3Þs :t :20y 1þ12y 2þ5y 3 15y 1þy 2þy 3!1y 1!0:y 2!0;y 3!Fig.4Agent coalition graphTable 1The bids of four agents Agent Id Price Conditions Agent A 80020Agent B 120012Agent C 20005AgentD25003202the following result can be obtained:Price{B}=1200; x1=0.3750,x2=0.6250,Price{A,B}=1050;and y1= 0.3750,y2=0.6250,y3=0.The above result shows that agent B does not attend the coalition{A,B,C},that is both agent B and coalition{A,B}can fulfill the task and satisfy the constraint conditions.According to Eqs.1 and2,E A,E B,E{A,B}:E A=0(because TMA does not assign the task to A.),E B=(1500)1200)/1200=0.25, E{A,B}=(1500)1050)2*100)/(1050+2*100)=0.2can be obtained.Because of E{A,B}<max{E A,E B},agent B does not agree to form a coalition.Therefore,the TMA se-lects agent B to fulfil the task.7ConclusionsIn this paper,the concept and characteristics of agile supply chain management are introduced.Dynamic and quick reconfiguration is one of important characteristics of an agile supply chain and agile supply chain man-agement is one of the key technologies of agile manu-facturing based on dynamic alliances.As agile supply chain is a typical distributed system,and MAS is effi-cient for this task.In the architecture of agile supply chain management, the supply chain is managed by a set of intelligent agents that are responsible for one or more activities.In order to realise the agility of supply chains,coordination amongst agents is very important.Therefore,it can be suggested that contract net protocol should be combined with case-based reasoning to coordinate among agents. Acknowledgement The authors would like to acknowledge the funding support from the National Science Fund Committee (NSFC)of China(Grant No.5991076861).References1.Goldman S,Nagel R,Preiss K(1995)Agile competitors andvirtual organization.Van Nostrsand Reinhold,New York, pp23–32,pp158–1662.Yusuf YY,Sarhadi M,Gunasekaran A(1999)Agile manu-facturing:the drivers,concepts and attributes.Int J Prod Eng 62:33–433.Gunasekaran A(1999)Agile manufacturing:A framework forresearch and development.Int J Prod Eng62:87–1054.Fox MS,Chionglo JF,Barbuceanu M(1992)Integrated chainmanagement system.Technical report,Enterprise Integration Laboratory,University of Toronto5.Shen W,Ulieru M,Norrie DH,Kremer R(1999)Implementingthe internet enabled supply chain through a collaborative agent system.In:Proceedings of agentsÔ99workshop on agent-based decision support for managing the internet-enabled supply-chain,Seattle,pp55–626.Sandholm TW,Lesser VR(1995)On automated contracting inmulti-enterprise manufacturing.Advanced Systems and Tools, Edinburgh,Scotland,pp33–427.Beck JC,Fox MS(1994)Supply chain coordination via medi-ated constraint relaxation.In:Proceedings of thefirst Canadian workshop on distributed artificial intelligence,Banff,Alberta, 15May19948.Chen Y,Peng Y,Finin T,Labrou Y,Cost R,Chu B,Sun R,Willhelm R(1999)A negotiation-based multi-agent system for supply chain management.In:Working notes of the ACM autonomous agents workshop on agent-based decision-support for managing the internet-enabled supply-chain,4:1–79.Wooldridge M,Jennings NR(1995)Intelligent agents:theoryand practice.Knowl Eng Rev10(2):115–15210.Barbuceanu M,Fox MS(1997)The design of a coordinationlanguage for multi-agent systems.In:Muller JP,Wooldridge MJ,Jennings NR(eds)Intelligent agent III:agents theories, architecture and languanges(Lecture notes in artificial intelligence),Springer,Berlin Heidelberg New York,pp341–35711.Hal L,Padmanabhan V,Whang S(1997)The Bullwhip effect insupply chains.Sloan Manag Rev38(4):93–10212.Yung S,Yang C(1999)A new approach to solve supply chainmanagement problem by integrating multi-agent technology and constraint network.HICASS-3213.Yan Y,Yen J,Bui T(2000)A multi-agent based negotiationsupport system for distributed transmission cost allocation.HICASS-3314.Nwana H(1996)Software agents:an overview.Knowl Eng Rev11(3):1–4015.Smith RG(1980)Contract net protocol:high-level communi-cation and control in a distributed problem solver.IEEE Trans Comput29(12):1104–111316.Barbuceanu M,Fox MS(1996)Coordinating multiple agentsin the supply chain.In:Proceedings of thefifth workshop on enabling technology for collaborative enterprises(WET ICEÕ96).IEEE Computer Society Press,pp134–14117.Jennings NR,Faratin P,Norman TJ,OÕBrien P,Odgers B(2000)Autonomous agents for business process management.Int J Appl Artif Intell14(2):145–1818.Malone TW,Crowston K(1991)Toward an interdisciplinarytheory of coordination.Center for coordination science tech-nical report120,MIT Sloan School203。
information gap theory 英语考试
information gap theory 英语考试Information Gap TheoryInformation Gap Theory is a theory that focuses on the gap between the amount of information available to individuals and their actual information needs. It was developed by scholars in the field of communication studies to address the challenges of information overload and the difficulty of obtaining relevant information in today's digital age.In an information-rich environment, individuals may have access to a vast amount of information, but this information may not be tailored to their specific needs or preferences. As a result, they may struggle to find the information that is most useful or relevant to their situation. This is where Information Gap Theory comes into play.The theory suggests that individuals are unable to keep up with the constant flow of information available to them, and that they struggle to filter out irrelevant information and find relevant, timely, and accurate information that meets their needs. To address this gap, Information Gap Theory suggests that individuals need torely on professional communication experts or skilled intermediaries to help them identify and access the most relevant information for their specific situation.In an English exam context, Information Gap Theory can be applied to writing tasks that require students to synthesize and evaluate information from multiple sources. Students may be given a question that requires them to find and analyze specific information, or to use their own research skills to find answers to complex problems. By relying on Information Gap Theory, students can approach such tasks with a focus on their own information needs and how best to meet them.Therefore, Information Gap Theory provides a valuable framework for understanding how individuals access and manage information in today's digital age. It can assist students in improving their research skills and writing abilities, as well as provide them with a better understanding of how to access and use information effectively in a range of contexts.。
Lane-Changing Model
The Lane-change Model MOBILLane changes takes place, if∙the potential new target lane is more attractive, i.e., the "incentive criterion" is satisfied,∙and the change can be performed safely, i.e., the "safety criterion" is satisfied.In our lane change model MOBIL, We base both criteria on the accelerations on the old and the prospective new lanes, as calculated with the longitudinal model, i.e., the IDM in our case.Model equations:∙The safety criterion is satisfied, if the IDM brakingdeceleration acc'=acc'IDM imposed on the back vehicle B' of the target lane after a possible change does not exceed a certain limit b save, thismeans, the safety criterionacc' (B') > - b save∙is satisfied. In this formula, the dash of the accelerationacc'=acc'IDM stands for "after a possible change", while the dash of the back vehicle label B' stands for "on the target lane".∙To asses the incentive criterion, we weight the own advantage on the target lane, measured by the increased acceleration (or reducedbraking deceleration), against the disadvantage imposed to otherdrivers, again measured by the decrease acceleration or increasedbraking deceleration for these drivers. Since we tend to be egoistic,we weight the disadvantage imposed on other drivers witha politeness factor p whose values are typically less than 1, resultingin following incentive criterion:acc' (M') - acc (M) > p [ acc (B) + acc (B') - acc' (B) - acc' (B') ] + a thro As above, acc mean the actual IDM accelerationswhile acc' mean the accelerations after a possible change. Thecar labels M and M' mean "Me" before and after a possiblechange, respectively, while B and B' mean the back vehiclebefore and after a possible change, respectively.o The own advantage is measured by "my" accelerationdifference acc' (M') - acc (M) after the change, compared to theactual situation.o The combined disadvatage to the new and old back vehicles is given by the sum [acc (B) + acc (B')] of the accelerations ofboth vehicles before the change, minus the accelerationsum[acc' (B) + acc' (B')] of these vehicles after the change.o Note on implementation: In the actual version, we did not consider the disadvantage acc(B) - acc'(B), that the driver ofthe "old" back vehicle may suffer due to a lane change, so weused the incentive criterionacc' (M') - acc (M) > p [ acc (B') - acc' (B') ] + a throIn fact, acc(B) - acc'(B) nearly always is negative sincechanging to another lane generally gives an advantage to thedriver of B. This means, we ignored "pushy" people urging usto change lanes for their own benefit. This definitely is acorrect strategy for drivers on the right-hand lane while the"full" MOBIL should be considered for drivers on the left-handlane.o To avoid lane-change maneoeuvres triggered by marginal advantages which can lead to frantic lane hopping, anadditional lane-changing threshold a thr has been added to thebalance of the above equation.Model Parameters and Typical ValuesThe lane-change model MOBIL has the following main features:While other lane-change models typically assume purely egoistic behaviour, i.e., p=0, we can model different behaviours by varyingthis factor:o p > 1 => a very altruistic behaviour.o p in ]0, 0.5] => a realistic behaviour: Advantages of otherdrivers have a lower priority, but are not neglected: Notice thatthis feature means that yielding to "pushy" is included intoMOBIL.o p=0 => a purely selfish behaviour. Notice that also selfish drivers do not ignore the safety criterion!o p<0 => a malicious personality who takes pleasure inthwarting other drivers even at the cost of own disadvantages.This may have some interesting game-theoretic consequences.Of course, even those mischief makers do obey the safetycriterion.∙ A special case is given by p=1 and a thr=0. In this case, lane changing takes place whenever the sum of the accelerations of all affecteddrivers increases after the change, or, equivalently, the overalldecelerations are minimized. This effect gave birth to the acronym for this model:MOBIL = M inimizing O verall B raking decelerations I nduced by L ane changes Variants of MOBIL for asymmetric traffic rules or situationsThe model defined by the two equations above describes more or less symmetric lane usage where overtaking on the right is not explicitely forbidden. If traffic rules or situations are asymmetric, one needs modifications. In the following, there are some typical situations:∙In many European countries, the lane usage rules are explicitely asymmetric, particularly,o one should keep to the right,o overtaking to the right is forbidden unless traffic is congested.For some countries such as Thailand, Britain or Australia, swap "left"and "right". To incorporate the keep-right directive, we added to the incentive criterion an additional bias a bias in favour of the right lane.∙If there are forced lane changes such aso entering a freeway via an onramp,o exiting a freeway,o lane changes as a reaction of a closing of the actual lane ahead,the lane-usage bias introduced above can be used to treat this situation: Of course, the bias is in favour of the target lane(s):o For on-ramp traffic, a bias is negative (modelling a bias to the left)o For the lane closing szenario 3, a bias is positive for vehicles on the left lane that is about to be closed.∙Implementing the overtaking rule is more difficult and requires a so-called "longitudinal-transversal coupling", see this reference (inGerman) for details.References∙The original publication (in German):M. Treiber and D. Helbing, Realistische Mikrosimulation vonStraßenverkehr mit einem einfachen Modell, 16. Symposium"Simulationstechnik ASIM 2002" Rostock, 10.09 -13.09.2002, edited by Djamshid Tavangarian and Rolf Gr\"utzner pp. 514--520.。
The Informational Energy for Cellular Automata
The Informational Energy for Cellular AutomataIoan Hălălae“EFTIMIE MURGU” University, Faculty of Engineering, Traian Vuia Square 1-4, 320085 Resita, RomaniaPhone: +40 255 210227, Fax: +40 255 210230, e-mail: i.halalae@uem.ro Abstract: Cellular automata (CA) represent lately a widely used model for modelling the dynamic phenomena. Generally, they are used in a rather empirical manner. This paper proposes the adaptation of the informational energy concept for CA and its use as a predictor for the evolution of CA.Keywords: cellular automata, randomness, prediction, informational energy, experimental mathematics1 IntroductionIn a larger context [1] I have studied the possibility of using CA as noise generators. The starting point was the project 'Looking for the lost noise' [2].Our proposal is to use, as a generator of pseudo-random sequences, an uniform CA with 256 cells that can have two states, over which a global loop is closed. We add several new things to the classical use of a CA, in order to improve the ‘random’ evolution.The random evolution is manifesting itself into a chaotic process, very sensitive to the initial state of a simple device working according to a strange rule.The first problem is that CA are ‘implicitly’ considered as having a random evolution. Randomness is not rigorously defined for CA. More generally, the notion of evolution of CA either is not clearly defined (that is, formally, or, at least, functionally).In order to make the monitoring, we have devised a new methodology. We have functionally devised the notions of evolution, randomness and cyclic character in CA. As regards randomness, we have adapted G. Chaitin’s definition for binary strings.2 Theoretical Concepts2.1 Cellular AutomataAn ‘elementary’ cellular automaton consists of a sequence of sites carrying values 0 or 1 arranged on a line. The configurations of the system are thus sequences of 0 and 1. In general, the sites of a cellular automaton may be arranged on any regular lattice, and each site may take on any discrete set of values.They evolve in a series of time steps. At each step, the value of each site is updated according to a specific rule. The rule depends on the value of a site, and the values of, say, its two nearest neighbours. The value at each site evolves deterministically with time according to a set of definite rules involving the values of its nearest r neighbours. Different rules (lookup tables) generate different types of dynamics of CA, when the rules are iterated in time ([3], [4], [5], [6]).2.2 Randomness and PredictionG. Chaitin established in a large set of papers ([7]–[11]) a complete theory about randomness, connected with the capacity of programs for computing finite binary sequences. In short, he defines a string as being random if his shorter representation is the string itself. In other words, a string of bits is random as long as it does not repeat itself. When it starts repeating itself, it can be represented by an algorithm, and becomes predictable.We adopt here the same functional point of view for CA: when it starts repeating itself it becomes predictable. Automaton’s evolution is random until it starts cycling.We decide to stop the automaton in the moment it starts cycling, and to consider its evolution as complete.2.3 Experimental MathematicsExperimental Mathematic is a paradigm appearing in association "with the exploratory use of a computer" [12], especially "when one attempts to analyze experimentally algorithms" [13].In our case, we have used the computer for simulating CA. The space of the solutions is of the 2256 dimension.2.4 The Main ChallengeThe main challenge is the one S. Wolfram formulated in [14]: ‘But what should be done is to find a characterization of those properties whose behaviour can be found by efficient methods, and those for which computational irreducibility makes explicit simulation the only possible approach, and precludes a simple description.’2.5 The ProjectThe project presented here aims to explore the possibility of using the CA as random number generators. Simulation was made with linear CA, with 256 cells. We did not use genetic algorithms for obtaining better chromosomes from the older ones.3 The Project PresentationThe starting point was the project 'Looking for the lost noise'by Gh. Stefan [2]. Let us see an abstract of this paper, which can be considered the starting point of our paper.The proposal is to use a CA as pseudo-noise generator, to which a global loop was added (fig. 1).Figure 1One of the simplest programmable CA, with a global loop closed through summation function Our hope is that the ‘feed forward’ of the attached loop improves the random behaviour of the system.The transition function over a loop being very simple, the random behaviour depends only on the initial state of the CA. In the design process the main step is to find a ‘noisy’ initial state.Conclusions: the only way to present the machine behaviour is to make it work as a simulator. The formal method of using is the experimental mathematics.S. Wolfram [15] was the first to use CA as noise pseudo-generators. He used thelinear and uniform CA, with two states cells.4 The Development of the Project4.1 ChromosomesWe use a definition of randomness inspired by G. Chaitin: an automaton is random as long as its evolution cannot be predicted. From the moment when its evolution can be predicted, it is no longer random. An automaton is random until it starts cycling. So the problem is rephrased as follows: no matter the value, we stop an automaton when it becomes cyclic.Practically, one way or another, we must:•have an evidence of the states of the automaton, in the order of their appearance, and•test a new state of the automaton (the current status, the last one resulted from the calculus process) if it appears from the first time or not.If we find it in the ‘history’ of the automaton, it represents the end of the first cycle of the automaton and the generation of new states stops. If not, the new status is to be archived and the iterations continue.We keep the whole automaton ‘history’ in a matrix, whose successive rows memorize the automaton’s states in the order of their apparition. We will name this matrix ‘the evolution matrix’.In order to synthesize the results, we have to monitor the chromosomes in two different ways:•the first one, we monitor for each chromosome the evolution as an internal mechanism of the cellular automaton•the second one, we archive the results of each chromosome, individually, together with its initial configuration and the performanceAnd, of course, not to repeat the tests for the same chromosome.As regards chromosomes, there are two problems:•the generation of the initial states•the concrete work with a CA.We have systematically generated distinct chromosomes.For actually working with a cellular automaton (monitoring the evolution of the automaton), we arrived at the following diagram:1.An initial state is generated2.The initial state is memorized in the evolution matrix, in line 1 of the matrix;a counter number_cycles_of_life is initialized with 1.3. A calculating function is applied to a new state of the automaton; we name thenew state of the automaton chromosome_current; the counter number_cycles_of_life is increased with 1.4.The sequential chromosome_current is compared with the values from theevolution matrix, from position 1 to position number_cycles_of_life-1 the sequential chromosome_current is compared to the values in the evolution matrix, from position 1 to position number_cycles_of_life-15.If an equality does not appear, the chromosome_current is memorized in theevolution matrix; and we came back to step 36.If an equality appears (the value already exists; that means that thechromosome_current represents the closure of the first cycle), the experiment stops, but (number_cycles_of_life -1) represents the performance of the chromosome; we archive the chromosomeThe archiving of the results is made in a database.4.2 The Connection between the Automaton’s Initial Structureand PerformanceIn all the discussions about the CA the local structure is mentioned. By local structure we understand the spatial distribution of values ‘0’/’1’ (the CA configuration). Associated to the notion of local structure there appears that of density: the number of values ‘1’ in the initial configuration of CA. Nevertheless, there was no systematic exploration of the combination of these two factors.We generated 500.000 CA with similar densities, between 124 and 133. The results are those in table 1. By performance we understand the number of tacts until the automaton becomes cyclic. We have generated the data and counted the results by groups.Performance Number of cases8283-54 454.55-106 0107-158 10159-210 0211-262 42.325825263-314 2.315-366 0367-418 0419-470 0471-518 12Table 1Statistics for the automata evolutionsThe great variation of the performances of the chromosomes that have similar initial densities leads us to the necessity of a differentiating criterion between algorithms with the same initial density. A possibility of global characterizing of the automaton would implicitly represent a prediction instrument too.5 Comportamental FactorizationWe try to solve this problem: how can we realize a differentiation between the cellular automata with the same density.We arrive at the specificity of cellular automata: the modification of the cell value by reaction to the neighbourhood. Thus, it appeared the idea of the classification of automata by factorization according to the initial value of the cells. In this way we have a possibility of differentiation of cellular automata with the same initial density.Now, these results led us to the idea mentioned above: classification of automata by the factorization according to the value of the cells. Let us remember the calculation of the new value of a cell:C(i,n) = C(i-1,n-1) + C(i,n-1)* 2 + C(i+1,n-1)*22where we have noted C(j,k) the value of the j cell at a moment k. The value C(i,n) is the value of the cell from the calculus table, on a line corresponding to the density of the automaton.Practically, we obtain the notations:0 0 0 ⇒0 noted v01 0 0 ⇒1 noted v10 1 0 ⇒2 noted v21 1 0 ⇒3 noted v30 0 1 ⇒4 noted v41 0 1 ⇒ 5 noted v50 1 1 ⇒6 noted v61 1 1 ⇒7 noted v7which we shall use below.6 The Informational Energy in Cellular Automata We studied the problem of the structure according to the point of view of informational …disorder”: we calculated the global informational energy of a cellular automaton, making an adaptation of the classical Onicescu formula. First, let us remember the definition of the informational energy ([Onicescu ‘79]). The global information of the system S with the states s 1, s 2, …, s n having the following weigths p 1, p 2, …, p n can be expressed by its informational energy calculated with the formula:21j n j s p E =∑= (1) (where 11=∑=j nj p ) Let’s go back, now, to the discussion from the preceding paragraph. In the classical formula (1) s 1, s 2, …, s n , represent the states of the system. In the case of the cellular automaton, the state of the system is its interior configuration at a certain moment. We are in the situation to make an adaptation of the concept. The form in which we use the concept of informational energy is the following: E = ( v 02 + v 12 + v 22 + v 32 + v 42 + v 52 + v 62 + v 72 )/ 2562 (2) where the notations v 0, v 1, …,v 7 represent the factorization of cells according to the local states.6.1 Correlations between Performance and EnergyWe arrive at the connection between the automaton’s performance and the informational energy (calculated with formula 2).We browsed again the database which contains the chromosomes. For each of them we calculated for each cell the classification v0 … v7. We counted the result in a file. Then, we calculated the corellation between the chromosome’s performance and the initial structure: using the v0 … v7 counter, ve calculated the informational energy using formula 2. The results are in table 2.Density m/e Corelation124 0.0261134125 0.0754734126 0.0474427127 0.3759557128 0.5101165129 0.4001813130 0.8669366131 0.1601014132 0.8857184133 0.0557577Table 2The conection between performance (m) and informational energy (e). Conclusions and directions for further researchLet us first see which are the totally new results brought about by this paper. On a conceptual level:• A functional definition of evolution, randomness and cyclicity were given for CA. Until now, the notions of evolution and cyclicity were not clearly defined.•There are no mathematical concepts for the calculations connected to the parallel phenomena. The informational energy introduced here is the first classic mathematical concept adapted to parrallel phenomena.•Until now, discussions were moreover ‘intuitive’, based on a small number of experiments and on a graphical interpretation (visualization) of the results.We have refocused the discussions, from the domain of ‘intuition’, to that of figures.On a practical level, we have, too, some immediate directions for further research:•Regarding the global energy itself it remains to be studied the measure in which it can become a fine predictor for the characterisation of the evolution of automata, by doing again the calculations with partial regressions.•The numerical results are dispersed. But this aspect is typical for phenomena with nonlinear dynamics.Remember that on some portions we have a remarkable correlation. This leads us tpo the idea of modeling the behaviour of cellular automata using neuronal nets.References[1] Halalae, I.: ”Studiul automatelor celulare ca generatoare de zgomot,folosind algoritmi genetici” (The study of CA as noise genrators, using gentical algorithms), PhD thesis, available by direct contact[2] Stefan, Gh.: ”Looking for the lost noise”, CAS '98 Proceedings, Oct. 6 - 10,1998, Sinaia, Romania. p. 579 - 582[3] Wolfram S.: ”Cellular Automata as Simple Self-Organizing Systems”,Caltech preprint CALT-68-938 (1982)[4] Wolfram S.: “Cellular Automata”, Los Alamos Science, 9 (Fall 1983) 2-21[5] Davis L.: Handbook of genetic algorithms, Van Nostrand Reinhold, NewYork, 1991[6] Mitchell M.: An Introduction to Genetic Algorithms, A Bradford Book,The MIT Press, 1999[7] G. Chaitin, “On the length of programs for computing finite binarysequences”, Journal of ACM 13 (1966), p. 547-569[8] Chaitin G.: “On the length of programs for computing finite binarysequences: statistical considerations”, Journal of ACM 16 (1969), p. 145-159[9] Chaitin G.: “A theory of program size formally identical to informationtheory”, Journal of the ACM 22 (1975), pp. 329-340[10] Chaitin G.: Algorithmic Information Theory, 3rd printing, CambridgeUniversity Press, 1990[11] Chaitin G.: “Paradoxes of Randomness”, in Complexity, Vol. 7, No. 5,May/June 2002, pp. 14-21[12] Johnson D.: “A Theoretician's Guide to the Experimental Analysis ofAlgorithms”, AT&T Labs Research, 1996. Available from /¸dsj/papers/exper.ps[13] Borwein J., Borwein P., Girgensohn R, S. Parnes S., “Experimentalmathematics: A discussion”. Mathematical Intelligencer 18, 4 (May 1996),12--18[14] Wolfram S.: “Twenty Problems in the Theory of Cellular Automata”, inPhysica Scripta, T9 (1985) 170-183[15] Wolfram S.: “Random Sequence Generation by Cellular Automata”, inAdvances in Applied Mathematics, 7 (June 1986) 123-169[16] Onicescu, O. ”Estension of the Theory of Probabilities”, in “Logic,Methodology and Philosophy of Science IV, Proceedings of the IVCongres, Bucharest 1971”,[17] Onicescu, O.: Principiile teoriei probabilităţilor, Editura Academiei,Bucureşti, 1969[18] Sahleanu V.: Eseu de biologie informationala, Edit. Stiintifica, Bucuresti,1973。
SCI写作句型汇总
S C I论文写作中一些常用的句型总结(一)很多文献已经讨论过了一、在Introduction里面经常会使用到的一个句子:很多文献已经讨论过了。
它的可能的说法有很多很多,这里列举几种我很久以前搜集的:A.??Solar energy conversion by photoelectrochemical cells?has been intensively investigated.?(Nature 1991, 353, 737 - 740?)B.?This was demonstrated in a number of studies that?showed that composite plasmonic-metal/semiconductor photocatalysts achieved significantly higher rates in various photocatalytic reactions compared with their pure semiconductor counterparts.C.?Several excellent reviews describing?these applications are available, and we do not discuss these topicsD.?Much work so far has focused on?wide band gap semiconductors for water splitting for the sake of chemical stability.(DOI:10.1038/NMAT3151)E.?Recent developments of?Lewis acids and water-soluble organometalliccatalysts?have attracted much attention.(Chem. Rev. 2002, 102, 3641?3666)F.?An interesting approach?in the use of zeolite as a water-tolerant solid acid?was described by?Ogawa et al(Chem.Rev. 2002, 102, 3641?3666)G.?Considerable research efforts have been devoted to?the direct transition metal-catalyzed conversion of aryl halides toaryl nitriles. (J. Org. Chem. 2000, 65, 7984-7989) H.?There are many excellent reviews in the literature dealing with the basic concepts of?the photocatalytic processand the reader is referred in particular to those by Hoffmann and coworkers,Mills and coworkers, and Kamat.(Metal oxide catalysis,19,P755)I. Nishimiya and Tsutsumi?have reported on(proposed)the influence of the Si/Al ratio of various zeolites on the acid strength, which were estimated by calorimetry using ammonia. (Chem.Rev. 2002, 102, 3641?3666)二、在results and discussion中经常会用到的:如图所示A. GIXRD patterns in?Figure 1A show?the bulk structural information on as-deposited films.?B.?As shown in Figure 7B,?the steady-state current density decreases after cycling between 0.35 and 0.7 V, which is probably due to the dissolution of FeOx.?C.?As can be seen from?parts a and b of Figure 7, the reaction cycles start with the thermodynamically most favorable VOx structures(J. Phys. Chem. C 2014, 118, 24950?24958)这与XX能够相互印证:A.?This is supported by?the appearance in the Ni-doped compounds of an ultraviolet–visible absorption band at 420–520nm (see Fig. 3 inset), corresponding to an energy range of about 2.9 to 2.3 eV.B. ?This?is consistent with the observation from?SEM–EDS. (Z.Zou et al. / Chemical Physics Letters 332 (2000) 271–277)C.?This indicates a good agreement between?the observed and calculated intensities in monoclinic with space groupP2/c when the O atoms are included in the model.D. The results?are in good consistent with?the observed photocatalytic activity...E. Identical conclusions were obtained in studies?where the SPR intensity and wavelength were modulated by manipulating the composition, shape,or size of plasmonic nanostructures.?F.??It was also found that areas of persistent divergent surfaceflow?coincide?with?regions where convection appears to be consistently suppressed even when SSTs are above 27.5°C.(二)1. 值得注意的是...A.?It must also be mentioned that?the recycling of aqueous organic solvent is less desirable than that of pure organic liquid.B.?Another interesting finding is that?zeolites with 10-membered ring pores showed high selectivities (>99%) to cyclohexanol, whereas those with 12-membered ring pores, such as mordenite, produced large amounts of dicyclohexyl ether. (Chem. Rev. 2002, 102,3641?3666)C.?It should be pointed out that?the nanometer-scale distribution of electrocatalyst centers on the electrode surface is also a predominant factor for high ORR electrocatalytic activity.D.?Notably,?the Ru II and Rh I complexes possessing the same BINAP chirality form antipodal amino acids as the predominant products.?(Angew. Chem. Int. Ed., 2002, 41: 2008–2022)E. Given the multitude of various transformations published,?it is noteworthy that?only very few distinct?activation?methods have been identified.?(Chem. Soc. Rev., 2009,?38, 2178-2189)F.?It is important to highlight that?these two directing effects will lead to different enantiomers of the products even if both the “H-bond-catalyst” and the?catalyst?acting by steric shielding have the same absolute stereochemistry. (Chem. Soc. Rev.,?2009,?38, 2178-2189)G.?It is worthwhile mentioning that?these PPNDs can be very stable for several months without the observations of any floating or precipitated dots, which is attributed to the electrostatic repulsions between the positively charge PPNDs resulting in electrosteric stabilization.(Adv. Mater., 2012, 24: 2037–2041)2.?...仍然是个挑战A.?There is thereby an urgent need but it is still a significant challenge to?rationally design and delicately tail or the electroactive MTMOs for advanced LIBs, ECs, MOBs, and FCs.?(Angew. Chem. Int. Ed.2 014, 53, 1488 – 1504)B.?However, systems that are?sufficiently stable and efficient for practical use?have not yet been realized.C.??It?remains?challenging?to?develop highly active HER catalysts based on materials that are more abundant at lower costs. (J. Am. Chem.Soc.,?2011,?133, ?7296–7299)D.?One of the?great?challenges?in the twenty-first century?is?unquestionably energy storage. (Nature Materials?2005, 4, 366 - 377?)众所周知A.?It is well established (accepted) / It is known to all / It is commonlyknown?that?many characteristics of functional materials, such as composition, crystalline phase, structural and morphological features, and the sur-/interface properties between the electrode and electrolyte, would greatly influence the performance of these unique MTMOs in electrochemical energy storage/conversion applications.(Angew. Chem. Int. Ed.2014,53, 1488 – 1504)B.?It is generally accepted (believed) that?for a-Fe2O3-based sensors the change in resistance is mainly caused by the adsorption and desorption of gases on the surface of the sensor structure. (Adv. Mater. 2005, 17, 582)C.?As we all know,?soybean abounds with carbon,?nitrogen?and oxygen elements owing to the existence of sugar,?proteins?and?lipids. (Chem. Commun., 2012,?48, 9367-9369)D.?There is no denying that?their presence may mediate spin moments to align parallel without acting alone to show d0-FM. (Nanoscale, 2013,?5, 3918-3930)(三)1. 正如下文将提到的...A.?As will be described below(也可以是As we shall see below),?as the Si/Al ratio increases, the surface of the zeolite becomes more hydrophobic and possesses stronger affinity for ethyl acetate and the number of acid sites decreases.(Chem. Rev. 2002, 102, 3641?3666)B. This behavior is to be expected and?will?be?further?discussed?below. (J. Am. Chem. Soc.,?1955,?77, 3701–3707)C.?There are also some small deviations with respect to the flow direction,?whichwe?will?discuss?below.(Science, 2001, 291, 630-633)D.?Below,?we?will?see?what this implies.E.?Complete details of this case?will?be provided at a?later?time.E.?很多论文中,也经常直接用see below来表示,比如:The observation of nanocluster spheres at the ends of the nanowires is suggestive of a VLS growth process (see?below). (Science, 1998, ?279, 208-211)2. 这与XX能够相互印证...A.?This is supported by?the appearance in the Ni-doped compounds of an ultraviolet–visible absorption band at 420–520 nm (see Fig. 3 inset), corresponding to an energy range of about 2.9 to 2.3 eVB.This is consistent with the observation from?SEM–EDS. (Chem. Phys. Lett. 2000, 332, 271–277)C.?Identical conclusions were obtained?in studies where the SPR intensity and wavelength were modulated by manipulating the composition, shape, or size of plasmonic nanostructures.?(Nat. Mater. 2011, DOI: 10.1038/NMAT3151)D. In addition, the shape of the titration curve versus the PPi/1 ratio,?coinciding withthat?obtained by fluorescent titration studies, suggested that both 2:1 and 1:1 host-to-guest complexes are formed. (J. Am. Chem. Soc. 1999, 121, 9463-9464)E.?This unusual luminescence behavior is?in accord with?a recent theoretical prediction; MoS2, an indirect bandgap material in its bulk form, becomes a direct bandgapsemiconductor when thinned to a monolayer.?(Nano Lett.,?2010,?10, 1271–1275)3.?我们的研究可能在哪些方面得到应用A.?Our ?ndings suggest that?the use of solar energy for photocatalytic watersplitting?might provide a viable source for?‘clean’ hydrogen fuel, once the catalyticef?ciency of the semiconductor system has been improved by increasing its surface area and suitable modi?cations of the surface sites.B. Along with this green and cost-effective protocol of synthesis,?we expect that?these novel carbon nanodots?have potential applications in?bioimaging andelectrocatalysis.(Chem. Commun., 2012,?48, 9367-9369)C.?This system could potentially be applied as?the gain medium of solid-state organic-based lasers or as a component of high value photovoltaic (PV) materials, where destructive high energy UV radiation would be converted to useful low energy NIR radiation. (Chem. Soc. Rev., 2013,?42, 29-43)D.?Since the use of?graphene?may enhance the photocatalytic properties of TiO2?under UV and visible-light irradiation,?graphene–TiO2?composites?may potentially be usedto?enhance the bactericidal activity.?(Chem. Soc. Rev., 2012,?41, 782-796)E.??It is the first report that CQDs are both amino-functionalized and highly fluorescent,?which suggests their promising applications in?chemical sensing.(Carbon, 2012,?50,?2810–2815)(四)1. 什么东西还尚未发现/系统研究A. However,systems that are sufficiently stable and efficient for practical use?have not yet been realized.B. Nevertheless,for conventional nanostructured MTMOs as mentioned above,?some problematic disadvantages cannot be overlooked.(Angew. Chem. Int. Ed.2014,53, 1488 – 1504)C.?There are relatively few studies devoted to?determination of cmc values for block copolymer micelles. (Macromolecules 1991, 24, 1033-1040)D. This might be the reason why, despite of the great influence of the preparation on the catalytic activity of gold catalysts,?no systematic study concerning?the synthesis conditions?has been published yet.?(Applied Catalysis A: General2002, 226, ?1–13)E.?These possibilities remain to be?explored.F.??Further effort is required to?understand and better control the parameters dominating the particle surface passivation and resulting properties for carbon dots of brighter photoluminescence. (J. Am. Chem. Soc.,?2006,?128?, 7756–7757)2.?由于/因为...A.?Liquid ammonia?is particularly attractive as?an alternative to water?due to?its stability in the presence of strong reducing agents such as alkali metals that are used to access lower oxidation states.B.?The unique nature of?the cyanide ligand?results from?its ability to act both as a σdonor and a π acceptor combined with its negativecharge and ambidentate nature.C.?Qdots are also excellent probes for two-photon confocalmicroscopy?because?they are characterized by a very large absorption cross section?(Science ?2005,?307, 538-544).D.?As a result of?the reductive strategy we used and of the strong bonding between the surface and the aryl groups, low residual currents (similar to those observed at a bare electrode) were obtained over a large window of potentials, the same as for the unmodified parent GC electrode. (J. Am. Chem. Soc. 1992, 114, 5883-5884)E.?The small Tafel slope of the defect-rich MoS2 ultrathin nanosheets is advantageous for practical?applications,?since?it will lead to a faster increment of HER rate with increasing overpotential.(Adv. Mater., 2013, 25: 5807–5813)F. Fluorescent carbon-based materials have drawn increasing attention in recent years?owing to?exceptional advantages such as high optical absorptivity, chemical stability, biocompatibility, and low toxicity.(Angew. Chem. Int. Ed., 2013, 52: 3953–3957)G.??On the basis of?measurements of the heat of immersion of water on zeolites, Tsutsumi etal. claimed that the surface consists of siloxane bondings and is hydrophobicin the region of low Al content. (Chem. Rev. 2002, 102, 3641?3666)H.?Nanoparticle spatial distributions might have a large significance for catalyst stability,?given that?metal particle growth is a relevant deactivation mechanism for commercial catalysts.?3. ...很重要A.?The inhibition of additional nucleation during growth, in other words, the complete separation?of nucleation and growth,?is?critical(essential, important)?for?the successful synthesis of monodisperse nanocrystals. (Nature Materials?3, 891 - 895 (2004))B.??In the current study,?Cys,?homocysteine?(Hcy) and?glutathione?(GSH) were chosen as model?thiol?compounds since they?play important (significant, vital, critical) roles?in many biological processes and monitoring of these?thiol?compounds?is of great importance for?diagnosis of diseases.(Chem. Commun., 2012,?48, 1147-1149)C.?This is because according to nucleation theory,?what really matters?in addition to the change in temperature ΔT?(or supersaturation) is the cooling rate.(Chem. Soc. Rev., 2014,?43, 2013-2026)(五)1. 相反/不同于A.?On the contrary,?mononuclear complexes, called single-ion magnets (SIM), have shown hysteresis loops of butterfly/phonon bottleneck type, with negligiblecoercivity, and therefore with much shorter relaxation times of magnetization. (Angew. Chem. Int. Ed., 2014, 53: 4413–4417)B.?In contrast,?the Dy compound has significantly larger value of the transversal magnetic moment already in the ground state (ca. 10?1?μB), therefore allowing a fast QTM. (Angew. Chem. Int. Ed., 2014, 53: 4413–4417)C.?In contrast to?the structural similarity of these complexes, their magnetic behavior exhibits strong divergence.?(Angew. Chem. Int. Ed., 2014, 53: 4413–4417)D.?Contrary to?other conducting polymer semiconductors, carbon nitride ischemically and thermally stable and does not rely on complicated device manufacturing. (Nature materials, 2009, 8(1): 76-80.)E.?Unlike?the spherical particles they are derived from that Rayleigh light-scatter in the blue, these nanoprisms exhibit scattering in the red, which could be useful in developing multicolor diagnostic labels on the basis not only of nanoparticle composition and size but also of shape. (Science 2001,? 294, 1901-1903)2. 发现,阐明,报道,证实可供选择的词包括:verify, confirm, elucidate, identify, define, characterize, clarify, establish, ascertain, explain, observe, illuminate, illustrate,demonstrate, show, indicate, exhibit, presented, reveal, display, manifest,suggest, propose, estimate, prove, imply, disclose,report, describe,facilitate the identification of?举例:A. These stacks appear as nanorods in the two-dimensional TEM images, but tilting experiments?confirm that they are nanoprisms.?(Science 2001,? 294, 1901-1903)B. Note that TEM?shows?that about 20% of the nanoprisms are truncated.?(Science 2001,? 294, 1901-1903)C. Therefore, these calculations not only allow us to?identify?the important features in the spectrum of the nanoprisms but also the subtle relation between particle shape and the frequency of the bands that make up their spectra.?(Science 2001,? 294, 1901-1903)D. We?observed?a decrease in intensity of the characteristic surface plasmon band in the ultraviolet-visible (UV-Vis) spectroscopy for the spherical particles at λmax?= 400 nm with a concomitant growth of three new bands of λmax?= 335 (weak), 470 (medium), and 670 nm (strong), respectively. (Science 2001,? 294, 1901-1903)E. In this article, we present data?demonstrating?that opiate and nonopiate analgesia systems can be selectively activated by different environmental manipulationsand?describe?the neural circuitry involved. (Science 1982, 216, 1185-1192)F. This?suggests?that the cobalt in CoP has a partial positive charge (δ+), while the phosphorus has a partial negative charge (δ?),?implying?a transfer of electron density from Co to P.?(Angew. Chem., 2014, 126: 6828–6832)3. 如何指出当前研究的不足A. Although these inorganic substructures can exhibit a high density of functional groups, such as bridging OH groups, and the substructures contribute significantly to the adsorption properties of the material,surprisingly little attention has been devoted to?the post-synthetic functionalization of the inorganic units within MOFs. (Chem. Eur. J., 2013, 19: 5533–5536.)B.?Little is known,?however, about the microstructure of this material. (Nature Materials 2013,12, 554–561)C.?So far, very little information is available, and only in?the absorber film, not in the whole operational devices. (Nano Lett.,?2014,?14?(2), pp 888–893)D.?In fact it should be noted that very little optimisation work has been carried out on?these devices. (Chem. Commun., 2013,?49, 7893-7895)E. By far the most architectures have been prepared using a solution processed perovskite material,?yet a few examples have been reported that?have used an evaporated perovskite layer. (Adv. Mater., 2014, 27: 1837–1841.)F. Water balance issues have been effectively addressed in PEMFC technology through a large body of work encompassing imaging, detailed water content and water balance measurements, materials optimization and modeling,?but very few of these activities have been undertaken for?anion exchange membrane fuel cells,? primarily due to limited materials availability and device lifetime. (J. Polym. Sci. Part B: Polym. Phys., 2013, 51: 1727–1735)G. However,?none of these studies?tested for Th17 memory, a recently identified T cell that specializes in controlling extracellular bacterial infections at mucosal surfaces. (PNAS, 2013,?111, 787–792)H. However,?uncertainty still remains as to?the mechanism by which Li salt addition results in an extension of the cathodic reduction limit. (Energy Environ. Sci., 2014,?7, 232-250)I.?There have been a number of high profile cases where failure to?identify the most stable crystal form of a drug has led to severe formulation problems in manufacture. (Chem. Soc. Rev., 2014,?43, 2080-2088)J. However,?these measurements systematically underestimate?the amount of ordered material. ( Nature Materials 2013, 12, 1038–1044)(六)1.?取决于a.?This is an important distinction, as the overall activity of a catalyst will?depend on?the material properties, synthesis method, and other possible species that can be formed during activation.?(Nat. Mater.?2017,16,225–229)b.?This quantitative partitioning?was determined by?growing crystals of the 1:1 host–guest complex between?ExBox4+?and corannulene. (Nat. Chem.?2014,?6177–178)c.?They suggested that the Au particle size may?be the decisive factor for?achieving highly active Au catalysts.(Acc. Chem. Res.,?2014,?47, 740–749)d.?Low-valent late transition-metal catalysis has?become indispensable to?chemical synthesis, but homogeneous high-valent transition-metal catalysis is underdeveloped, mainly owing to the reactivity of high-valent transition-metal complexes and the challenges associated with synthesizing them.?(Nature2015,?517,449–454)e.?The polar effect?is a remarkable property that enables?considerably endergonic C–H abstractions?that would not be possible otherwise.?(Nature?2015, 525, 87–90)f.?Advances in heterogeneous catalysis?must rely on?the rational design of new catalysts. (Nat. Nanotechnol.?2017, 12, 100–101)g.?Likely, the origin of the chemoselectivity may?be also closely related to?the H?bonding with the N or O?atom of the nitroso moiety, a similar H-bonding effect is known in enamine-based nitroso chemistry. (Angew. Chem. Int. Ed.?2014, 53: 4149–4153)2.?有很大潜力a.?The quest for new methodologies to assemble complex organic molecules?continues to be a great impetus to?research efforts to discover or to optimize new catalytic transformations. (Nat. Chem.?2015,?7, 477–482)b.?Nanosized faujasite (FAU) crystals?have great potential as?catalysts or adsorbents to more efficiently process present and forthcoming synthetic and renewablefeedstocks in oil refining, petrochemistry and fine chemistry. (Nat. Mater.?2015, 14, 447–451)c.?For this purpose, vibrational spectroscopy?has proved promising?and very useful.?(Acc Chem Res. 2015, 48, 407–413.)d.?While a detailed mechanism remains to be elucidated and?there is room for improvement?in the yields and selectivities, it should be remarked that chirality transfer upon trifluoromethylation of enantioenriched allylsilanes was shown. (Top Catal.?2014,?57: 967.?)e.?The future looks bright for?the use of PGMs as catalysts, both on laboratory and industrial scales, because the preparation of most kinds of single-atom metal catalyst is likely to be straightforward, and because characterization of such catalysts has become easier with the advent of techniques that readily discriminate single atoms from small clusters and nanoparticles. (Nature?2015, 525, 325–326)f.?The unique mesostructure of the 3D-dendritic MSNSs with mesopore channels of short length and large diameter?is supposed to be the key role in?immobilization of active and robust heterogeneous catalysts, and?it would have more hopeful prospects in?catalytic applications. (ACS Appl. Mater. Interfaces,?2015,?7, 17450–17459)g.?Visible-light photoredox catalysis?offers exciting opportunities to?achieve challenging carbon–carbon bond formations under mild and ecologically benign conditions. (Acc. Chem. Res.,?2016, 49, 1990–1996)3. 因此同义词:Therefore, thus, consequently, hence, accordingly, so, as a result这一条比较简单,这里主要讲一下这些词的副词词性和灵活运用。
Mobile Information Literacy for libraries A case study on requirements for an effective Information
Information Literacy - Methods
Owning a Mobile Phone?
Information Needs in Online Mode
Intent of Information Services through Mobile
ibrarians need to look for ways o insert themselves into mobile pps. This doesn’t mean rea9ng an app for the library, ut instead using exis9ng apps o reach out to patrons…
Mobile InformaDon Seeking Behavior
• Users likely to have more immediate and goaldirected intentions relevant to their context • Need to consider the time factor. Users typically less interested in lengthy documents/browsing • Cost of data plans affect usage of data by users, as well as time of day of usage • Users often only access information from mobile devices as a last resort.
• • • • • • • • • Library Account (Renewals) Library Chat Help (IM, SMS) Library News (RSS) Desktop/Laptop Availability Research Workshop Schedule/Sign-‐up Floor Maps / Stacks Guide Automated Phone Renewals VPN/WIFI Configura9on Reserva9on Status Mobile Subject Guides Campus Webcams Course Reserves Videos -‐ vodcast (libcasts) Podcast Full Text Finders (Ar9cle Finder) • Send book loca9on / call number to phone • DDS Alert • • • • • •
彭赛列闭合定理
Lorenz Halbeisen and Norbert Hungerb¨uhlerMSC:Primary51M04,Secondary51A20;key words:Poncelet’s Porism,Pascal’s TheoremJanuary2014]A SIMPLE PROOF OF PONCELET’S THEOREM1used Abel’s Theorem and the representation of elliptic curves by means of the Weier-strass ℘-function to establish the equivalence of Poncelet’s Theorem and the groupstructure on elliptic curves,see [11].Poncelet’s Theorem has a surprising mechani-cal interpretation for elliptic billiards in the language of dynamical systems:see [8]or [7]for an overview of this facet.A common approach to all four classical closingtheorems (the Poncelet porism,Steiner’s Theorem,the Zigzag Theorem,and Emch’sTheorem)has recently been established by Protasov in [18].King showed in [14],thatPoncelet’s porism is isomorphic to Tarski’s plank problem (a problem about geometricset-inclusion)and to Gelfand’s question (a number theoretic problem)via the con-struction of an invariant measure.However,according to Berger [1,p.203],all knownproofs of Poncelet’s Theorem are rather long and recondite.The aim of this paper is to give a simple proof of Poncelet’s Theorem in the realprojective plane.More precisely,we will show that Poncelet’s Theorem is a purelycombinatorial consequence of Pascal’s Theorem.Before we give several forms of thelatter,let us introduce some notation.For two points a and b ,let a −b denote the linethrough a and b ,and for two lines ℓ1and ℓ2,let ℓ1∧ℓ2denote the intersection pointof these lines in the projective plane.In abuse of notation,we often write a −b −c inorder to emphasize that the points a ,b ,c are collinear.In the sequel,points are oftenlabeled with numbers,and lines with encircled numbers like ③.In this terminology,Pascal’s Theorem and its equivalent forms read as follows.Pascal’s Theorem (cf.[16])314256Any six points 1,...,6lie on a conic if and only if (1−2)∧(4−5)(2−3)∧(5−6)(3−4)∧(6−1)are collinear.Carnot’s Theorem (cf.[3,no.396])514236Any six points 1,...,6lie on a conicif and only if[(1−2)∧(3−4)]−[(4−5)∧(6−1)](2−5)(3−6)are concurrent.2c THE MATHEMATICAL ASSOCIATION OF AMERICA [Monthly 121Brianchon’s Theorem (cf.[2])①②③④⑤⑥Any six lines ①,...,⑥are tangent to a conic if and only if (①∧②)−(④∧⑤)(②∧③)−(⑤∧⑥)(③∧④)−(⑥∧①)are concurrent.Carnot’s Theorem ∗①②⑤④③⑥Any six lines ①,...,⑥are tangent to a conicif and only if[(①∧②)−(③∧④)]∧[(④∧⑤)−(⑥∧①)](②∧⑤)(③∧⑥)are collinear.As a matter of fact,we would like to mention that if the conic is not degenerate,then the collinear points in Pascal’s Theorem are always pairwise distinct (the sameapplies to the concurrent lines in Brianchon’s Theorem).Since the real projective plane is self-dual,Pascal’s Theorem and Brianchon’s The-orem are equivalent.Moreover Carnot’s Theorem and its dual Carnot’s Theorem ∗arejust reformulations of Pascal’s Theorem and Brianchon’s Theorem by exchanging thepoints 3and 5,and the lines ③and ⑤,respectively.Recall that if two adjacent points,say 1and 2,coincide,then the corresponding line 1−2becomes a tangent with 1ascontact point.Similarly,if two lines,say ①and ②,coincide,then ①∧②becomes thecontact point of the tangent ①.As a last remark,we would like to mention that a conicis in general determined by five points,by five tangents,or by a combination like threetangents and two contact points of these tangents.The paper is organized as follows.In Section 2,we prove Poncelet’s Theorem forthe special case of triangles and at the same time we develop the kind of combinato-rial arguments we shall use later.Section 3contains the crucial tool which allows toshow that Poncelet’s Theorem holds for an arbitrary number of edges.Finally,in Sec-tion 4,we use the developed combinatorial technics in order to prove some additionalsymmetry properties of Poncelet-polygons.2.PONCELET’S THEOREM FOR TRIANGLES In order to prove Poncelet’sTheorem for triangles,we will show that if the six vertices of two triangles lie ona conic K ,then the six sides of the triangles are tangents to some conic C .The crucial point in the proof of the following theorem (as well as in the proofsof the other theorems of this paper)is to find the suitable numbering of points andedges,and to apply some form of Pascal’s Theorem in order to find collinear points orconcurrent lines.Theorem 2.1.If two triangles are inscribed in a conic and the two triangles do nothave a common vertex,then the six sides of the triangles are tangent to a conic.January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 3a 1a 2a 3b 3b 2b 1Proof.Let K be a conic in which two triangles △a 1a 2a 3and △b 1b 2b 3are inscribedwhere the two triangles do not have a common vertex.First,we introduce the following three intersection points:I :=(a 1−a 2)∧(b 1−b 2),X :=(a 2−b 3)∧(b 2−a 3),I ′:=(a 3−a 1)∧(b 3−b 1).In order to visualize the intersection points I ,X ,and I ′,we break up the conic K anddraw it as two straight lines,one for each triangle as follows.I X I ′Ib 1a 1b 2a 2b 3a 3b 1a 1b 2a 2Now,we number the six points a 1,a 2,a 3,b 1,b 2,b 3on the conic K as shown by thefollowing figure.I X I ′Ib 14a 11b 25a 22b 33a 36b 14a 11b 25a 224c THE MATHEMATICAL ASSOCIATION OF AMERICA [Monthly 121By Pascal’s Theorem we get that the three intersection points(1−2)∧(4−5),(2−3)∧(5−6),and (3−4)∧(6−1)are collinear,which is the same as saying that the points I −X −I ′are collinear.In the next step,we label the sides of the triangles as shown in the following figure.I X I ′Ib 1a 1b 2a 2b 3a 3b 1a 1b 2a 2②①⑥②⑤④③⑤By Carnot’s Theorem ∗we get that the six sides ①,...,⑥of the two triangles aretangents to a conic if and only if[(①∧②)−(③∧④)]∧[(④∧⑤)−(⑥∧①)],(②∧⑤),and(③∧⑥)are collinear.Now,this is the same as saying that the points X −I −I ′are collinear,which,as we have seen above,is equivalent to a 1,a 2,a 3,b 1,b 2,b 3lying on a conic.a 1a 2a 3b 3b 2b 1q.e.d.As an immediate consequence we get Poncelet’s Theorem for triangles.Corollary 2.2(Poncelet’s Theorem for triangles).Let K and C be nondegenerateconics.Suppose there is a triangle△a 1a 2a 3inscribed in K and circumscribed aboutC .Then for any point b 1of K for which two tangents to C exist,there is a triangle△b 1b 2b 3which is also inscribed in K and circumscribed about C .January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 5Proof.Let K and C be two conics with a triangle△a1a2a3inscribed in K and circumscribed about C.Let b1be an arbitrary point on K which is distinct froma1,a2,a3,and let b2and b3be distinct points on K such that b1−b2and b1−b3are two tangents to C.By construction,we get thatfive sides of the triangles△a1a2a3and△b1b2b3are tangents to C.On the other hand,by Theorem2.1,we know that allsix sides of these triangles are tangents to some conic C′.Now,since a conic is deter-mined byfive tangents,C′and C coincide,which implies that the triangle△b1b2b3is circumscribed about C.q.e.d.As a special case of Brianchon’s Theorem we get the following.Fact2.3.Let C be a conic and let the triangle△a1a2a3be circumscribed about C. Furthermore,let t1,t2,t3be the contact points of the three tangents a2−a3,a3−a1,a1−a2.Then the three lines a1−t1,a2−t2,and a3−t3meet in a point.bel the three sides of the triangles as follows:①=a2−a3=②,③=a3−a1=④,⑤=a1−a2=⑥.Then①∧②=t1,③∧④=t2,⑤∧⑥=t3,and by Brianchon’s Theorem we getthat a1−t1,a2−t2,a3−t3meet in a point.q.e.d.In general,for arbitrary n-gons tangent to C the analogous statement will be false. However,if n is even and if the n-gon is at the same time inscribed in a conic K,a similar phenomenon occurs(see Theorem4.2).3.THE GENERAL CASE Let K and C be nondegenerate conics in general posi-tion.We assume that there is an n-sided polygon a1,...,a n which is inscribed in K such that all its n sides a1−a2,a2−a3,...,a n−a1are tangent to C and none of its vertices belongs to C.Let us assume that n is minimal with this property(thus,in par-ticular,the points a1,...,a n are pairwise distinct).Further,let b1,...,b n be an(n−1)-sided polygonal chain on K where all n−1sides b1−b2,b2−b3,...,b n−1−b nare tangent to C and none of its vertices is one of a1,...,a n or belongs to C.We donot yet know that b n−b1is tangent to C too.If we break up the conic K and draw itas two straight lines,one for the polygon and one for the polygonal chain,we get the following situation.a n−1a n a1a2a n−1a n a1a2b n−1b n b1b2b n−1b n b1b2In order to prove Poncelet’s Theorem,we have to show that b n−b1is also tangent toC.This will follow easily from the following result.Lemma3.1.For n≥4,the three intersection pointsI:=(a1−a2)∧(b1−b2),X:=(a2−b n−1)∧(b2−a n−1),andI′:=(a n−1−a n)∧(b n−1−b n),6c THE MATHEMATICAL ASSOCIATION OF AMERICA[Monthly121I X I ′b 1b 2b n −1b na 1a 2a n −1a nare pairwise distinct and collinear,which is visualized above by the dashed line.Proof.Depending on the parity of n ,we have one of the following anchorings,fromwhich we will work step by step outwards.n even,with k =n2:I X I ′b k −1a k −1b k a kb k +1a k +1123456By Pascal’s Theorem we have thatI −X −I ′are collinear.For n ≥5,the lemma will follow from the following two claims.Claim 1.Let p and q be integers with 2≤p <q ≤n −1.Further,letI p −1:=(a p −1−a p )∧(b p −1−b p ),I p :=(a p −a p +1)∧(b p −b p +1),I q :=(a q −1−a q )∧(b q −1−b q ),I q +1:=(a q −a q +1)∧(b q −b q +1),and letX :=(a p −b q )∧(b p −a q ).If I p −X −I q are pairwise distinct and collinear,then Ip −1−X −Iq +1are alsopairwise distinct and collinear.This implication is visualized by the following figure.I p X I qb p −1b p b p +1b q −1b q b q +1a p −1a p a p +1a q −1a q a q +1⇓January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 7I p −1X I q +1b p −1b p b p +1b q −1b q b q +1a p −1a p a p +1a q −1a q a q +1Proof of Claim 1.εI p I qγαb p b qa p a q ④③②⑤⑥①(a)By Brianchon’s Theorem,the lines α,γ,εare pairwise distinct and concurrent.I p X I qβγαb p b qa p a q(b)The lines α,β,γmeet,by assumption,in X ,and they are pairwise distinct.By (a),we have that αand γare distinct,and by symmetry also βand γare distinct.Since a straight line meets a nondegenerate conic in at most two points,αand βarealso distinct.εI p −1I q +1βδb p −1b p b q −1b q b q +1a p −1a p a p +1a q a q +1⑥①②⑤④③(c)By Brianchon’s Theorem,the lines β,ε,δare pairwise distinct and concurrent.By (a)&(b)we get that α,β,and εmeet in X ,and by (c)we get that also α,β,andδmeet in X ,which implies that Ip −1−X −I q +1are collinear and pairwise distinct.If I p −1=I q +1,then the four lines a p −1−a p ,b p −1−b p ,a q −a q +1,b q −b q +1,whichare all tangent to C ,would be concurrent.But then these four lines are not pairwisedistinct,and since the eight points ap −1,ap ,aq ,a q +1,b p −1,b p ,bq ,bq +1are pairwisedistinct (recall that 1≤p −1<q +1≤n ),this contradicts our assumption that the8c THE MATHEMATICAL ASSOCIATION OF AMERICA [Monthly 121conic K is nondegenerate.By similar arguments it follows that both I p −1and I q +1aredistinct from X .q.e.d.Claim 2.Let I p −1,I q +1,and X be as above,and letX ′:=(a p −1−b q +1)∧(b p −1−a q +1).If I p −1−X −I q +1are pairwise distinct and collinear,then Ip −1−X ′−Iq +1arepairwisedistinct and collinear too.This implication is visualized by the following figure.I p −1X I q +1b p −1b p b p +1b q −1b q b q +1a p −1a p a p +1a q −1a q a q +1⇓I p −1X ′I q +1b p −1b p b p +1b q −1b q b q +1a p −1a p a p +1a q −1a q a q +1Proof of Claim 2.I p −1X I q +1b p b qa p a q(a)By assumption,the points I p −1−X −I q +1are pairwise distinct and collinear.JI p −1X b p b qa p a q123456(b)By Pascal’s Theorem,the points I p −1−X −J are pairwise distinct andcollinear.January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 9J X ′I q +1b p b qa p a q126453(c)By Pascal’s Theorem,the points X ′−J −I q +1are pairwise distinct andcollinear.By (a)&(b)we get that I p −1−J −I q +1are collinear,and by (c)we get that X ′lies on J −Iq +1.Hence,Ip −1−X ′−Iq +1are collinear.By (a),(c)and a symmetricversion of (c),the three points I p −1,X ′,I q +1are pairwise distinct.q.e.d.By an iterative application of Claim 1&2,we finally get the situationI X I ′b 1b 2b n −1b na 1a 2a n −1a nin which I −X −I ′are pairwise distinct and collinear.q.e.d.With similar arguments as in the proof of Poncelet’s Theorem for triangles (Corol-lary 2.2),we can now prove the general case of Poncelet’s Theorem (Theorem 1.1):Proof of Poncelet’s Theorem.Let K and C be nondegenerate conics in general posi-tion.We assume that there is an n -sided polygon a 1,...,an which is inscribed in Ksuch that all its n sides a 1−a 2,a 2−a 3,...,a n −a 1are tangent to C and none of itsvertices belongs to C .Let us assume that n is minimal with this property.Further weassume that there is an (n −1)-sided polygonal chain b 1,...,bn whose n −1sidesare tangent to C and none of its vertices is one of a 1,...,an or belongs to C .We haveto show that b n −b 1is tangent to C .!!b n −1b n b 1b 2b n −1b n b 1b 2a n −1a n a 1a 2a n −1a n a 1a 2By Lemma 3.1we know that I −X −I ′are pairwise distinct and collinear,where I =(a 1−a 2)∧(b 1−b 2),I ′=(a n −1−a n )∧(b n −1−b n ),and X =(a 2−b n −1)∧(b 2−a n −1).In order to show that b n −b 1is tangent to C ,we have tointroduce two more intersection points:J :=(a n −1−a 1)∧(b n −1−b 1),X ′:=(a n −b 1)∧(b n −a 1).10c THE MATHEMATICAL ASSOCIATION OF AMERICA [Monthly 121J I X I ′X ′Ib 1b 2b 1b 2b n −1b n a 1a 2a 1a 2a n −1a n We now apply Pascal’s Theorem twice as illustrated below.J I X Ib 1b 2b 1b 2b n −1b n a 1a 2a 1a 2a n −1a n 1122344556(a)By Pascal’s Theorem,the points I −X −J are pairwise distinct and collinear.J I ′X ′b 1b 2b 1b 2b n −1b n a 1a 2a 1a 2a n −1a n 126345(b)By Pascal’s Theorem,the points I ′−J −X ′are pairwise distinct and collinear.Since,by Lemma 3.1,I −X −I ′are pairwise distinct and collinear,by (a)we getthat I −X −J −I ′are collinear,and by (b)we finally get that I −X ′−I ′arecollinear.For the last step,we apply Carnot’s Theorem ∗.I ′X ′Ib 1b 2b n −1b n a 1a 2a n −1a n ②①⑥⑤④③Since I −X ′−I ′are collinear,by Carnot’s Theorem ∗we get that the six lines ①,...,⑥are tangent to some conic C ′.Now,since a conic is determined by five tangents,andthe five lines ①,②,③,⑤,⑥are tangent to C ,C ′and C coincide.This implies that ④istangent to C ,which is what we had to show.q.e.d.January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 114.SYMMETRIES IN PONCELET-POLYGONS In this section we present somesymmetries in 2n -sided polygons which are inscribed in some conic K and circum-scribed about another conic C .To keep the terminology short,we shall call such apolygon a 2n -Poncelet-polygon with respect to K &C .Theorem 4.1.Let K and C be nondegenerate conics in general position which neithermeet nor intersect and let a 1,...,a 2n be the vertices of a 2n -Poncelet-polygon withrespect to K &C .Further let t 1,...,t 2n be the contact points of the tangents a 1−a 2,...,a 2n −a 1.(a)All the n diagonals a 1−a n +1,a 2−a n +2,...,a n −a 2n meet in a point H 0.(b)All the n lines t 1−t n +1,t 2−t n +2,...,t n −t 2n meet in the same point H 0.Proof.(a)By the proof of Lemma 3.1,we get that the three points a 1,an +1,and(a 2−a n +2)∧(a n −a 2n )are collinear.a 1a n +1a 1a 2n a n +2a n +1a 1a 2a na n +1This is the same as saying that the three diagonals a 1−an +1,a 2−an +2,and an −a 2n meet in a point,say H 0.Now,by cyclic permutationwe get that all n diagonals meet in H 0.(b)By the proof of Lemma 3.1,we get that the three points t 1−H 0−t n +1arecollinear.t 1H 0t n +1a 2a 1a 2n a n +3a n +2a n +1a 1a 2a 3a n a n +1a n +2Thus,by cyclic permutation we get that all n lines t 1−tn +1,t 2−t n +2,...,tn −t 2npass through H 0,which implies that all n lines meet in H 0.q.e.d.In the last result,we show that the point H 0is independent of the particular 2n -Poncelet-polygon (compare with Poncelet’s results no.570&571in [17]).Theorem 4.2.Let K and C be nondegenerate conics in general position which nei-ther meet nor intersect and let a 1,...,a 2n and b 1,...,b 2n be the vertices of two2n -Poncelet-polygons with respect to K &C .Further let t 1,...,t 2n and t ′1,...,t′2nbe the contact points of the Poncelet-polygons.Then all 4n lines a 1−an +1,...,t 1−t n +1,...,b 1−b n +1,...,t ′1−t′n +1,...meet in a point H 0.Moreover,oppositesides of the Poncelet-polygons meet on a fixed line h ,where h is the polar of H 0,bothwith respect to C and K .Proof.By Theorem 4.1we know that the 2n lines a 1−a n +1,...,t 1−tn +1,...meetin a point H 0.First,we show that the polar h of the pole H 0with respect to C is thesame as the polar h ′of H 0with respect to K ,and then we show that the point H 0isindependent of the choice of the 2n -Poncelet-polygon.12c THE MATHEMATICAL ASSOCIATION OF AMERICA [Monthly 121a i +1a k +1a i +na k +n a i a k +n +1a k a i +n +1t kt k +n ti t i +nH 0PQFirst notice that in the figure above,H 0is on the polar p of P with respect to theconic C and that H 0is also on the polar p ′of P with respect to the conic K (see forexample Coxeter and Greitzer [6,Theorem 6.51]).Thus,P lies on the polar h of H 0with respect to C ,as well as on the polar h ′of H 0with respect ot K .Since the sameapplies to the point Q ,the polars h and h ′coincide,which shows that the pole H 0hasthe same polar with respect to both conics.The fact that H 0is independent of the choice of the 2n -Poncelet-polygon is just aconsequence of the following.Claim.Let H 0be as above and let h be the polar of H 0(with respect to K or C ).Choose an arbitrary point P on h .Let s 1&s 2be the two tangents from P to C andlet A &A ′and B &B ′be the intersection points of s 1and s 2with K .H 0PBA B ′A ′s 1s 2Then H 0=(A −B ′)∧(B −A ′).Proof of Claim.By a projective transformation,we may assume that h is the line atinfinity.Then,the pole H 0becomes the common center of both conics and the claimfollows by symmetry.q.e.d.January 2014]A SIMPLE PROOF OF PONCELET’S THEOREM 13Now,let a1,...,a2n and b1,...,b2n be the vertices of two2n-Poncelet-polygons with respect to K&C.Furthermore,let H0=(a1−a n+1)∧(a2−a n+2)and H′0= (b1−b n+1)∧(b2−b n+2),and let h and h′be their respective polars.Choose anypoint P which lies on both h and h′,and draw the two tangents from P to C which intersect K in the points A,A′,B,B′.If the conics K and C do not meet(what we assume),then these points are pairwise distinct and by the Claim we get H0= (A−B′)∧(B−A′)=H′.q.e.d.Notice,that for n=3,H0is the Brianchon point with respect to C of the Poncelet-hexagon,and h its Pascal line with respect to K.So,for n>3,the point H0is the generalized Brianchon point with respect to C of the2n-Poncelet-polygon,and h its generalized Pascal line with respect to K.,Bicentennial of the great Poncelet theorem(1813–2013):current advances,Bull.Amer.Math.Soc.(N.S.)51(3)(2014)373–445.9.L.Euler,Solutio facilis problematum quorundam geometricorum difficillimorum,Novi Commentariiacademiae scientiarum imperialis Petropolitanae(1767)103–123.10.N.Fuss,De polygonis symmetrice irregularibus circulo simul inscriptis et circumscriptis,Nova ActaPetropol(1798)166–189.11.P.Griffiths and J.Harris,On Cayley’s explicit solution to Poncelet’s porism,L’EnseignementMath´e matique.Revue Internationale.IIe S´e rie24(1978)31–40.12. A.S.Hart,On the porism of the in-and-circumscribed triangle,The Quarterly journal of pure and appliedmathematics2(1858)143.13. C.G.J.Jacobi,Ueber die Anwendung der elliptischen Transcendenten auf ein bekanntes Problem derElementargeometrie:“Die Relation zwischen der Distanz der Mittelpuncte und den Radien zweier Kreise zufinden,von denen der eine einem unregelm¨aßigen Polygon eingeschrieben,der andere demselben umgeschrieben ist”,J.Reine Angew.Math.3(1828)376–389.14.J.L.King,Three problems in search of a measure,The American Mathematical Monthly101(1994)609–628.15.H.Lebesgue,Les coniques,Gauthier-Villars,Paris,1942.16. B.Pascal,Essay pour les Coniques,(1640).17.J.-V.Poncelet,Trait´e des propri´e t´e s projectives desfigures,Bachelier,Paris,1822.18.V.Y.Protasov,Generalized closing theorems,Elemente der Mathematik66(2011)98–117.LORENZ HALBEISEN(lorenz.halbeisen@math.ethz.ch)received his PhD from the ETH Z¨u rich in1994. After research positions in France,Spain,and California,he became lecturer at Queen’s University Belfast and is now senior scientist at the ETH Z¨u rich.His interests range across set theory,finite and infinite combinatorics, geometry,and number theory.Department of Mathematics,ETH Zentrum,R¨a mistrasse101,8092Z¨u rich,SwitzerlandNORBERT HUNGERB¨UHLER(norbert.hungerbuehler@math.ethz.ch)received his PhD at ETH Z¨u rich in 1994.After research positions in Germany and the US he became assistant professor at the University of Alabama at Birmingham and later professor at the University of Fribourg.Currently he is professor at ETH. His interests range across analysis,geometry,discrete mathematics and number theory.Department of Mathematics,ETH Zentrum,R¨a mistrasse101,8092Z¨u rich,Switzerland14c THE MATHEMATICAL ASSOCIATION OF AMERICA[Monthly121。
秒针产品说明书
distributed coordination of multi-agent systems with quantizaed-observer based encoding-decoding
Distributed Coordination of Multi-Agent Systems With Quantized-Observer Based Encoding-DecodingTao Li,Member,IEEE,and Lihua Xie,Fellow,IEEEAbstract—Integrative design of communication mechanism and coordinated control law is an interesting and important problem for multi-agent networks.In this paper,we consider distributed coordination of discrete-time second-order multi-agent systems with partially measurable state and a limited communication data rate.A quantized-observer based encoding-decoding scheme is designed,which integrates the state observation with encoding/de-coding.A distributed coordinated control law is proposed for each agent which is given in terms of the states of its encoder and decoders.It is shown that for a connected network,2-bit quantizers suffice for the exponential asymptotic synchronization of the states of the agents.The selection of controller parameters and the performance limit are discussed.It is shown that the alge-braic connectivity and the spectral radius of the Laplacian matrix of the communication graph play key roles in the closed-loop performance.The spectral radius of the Laplacian matrix is related to the selection of control gains,while the algebraic con-nectivity is related to the spectral radius of the closed-loop state matrix.Furthermore,it is shown that as the number of agents increases,the asymptotic convergence rate can be approximated as a function of the number of agents,the number of quantization levels(communication data rate)and the ratio of the algebraic connectivity to the spectral radius of the Laplacian matrix of the communication graph.Index Terms—Data rate,digital communication,distributed co-ordination,encoding and decoding,multi-agent systems,quantized observer.I.I NTRODUCTIONI N recent years,distributed cooperative control of multi-agent systems has attracted unprecedented attention of the control community([1]–[14])in view of its wide applications in many emergingfields such as smart grids,intelligent trans-portation,formationflight,etc.In particular,the problem of multi-agent consensus has been the focus of many researches; see,e.g.,[5]and the reference therein.Manuscript received March01,2011;revised September03,2011;accepted April05,2012.Date of publication May14,2012;date of current version November21,2012.Recommended by Associate Editor L.Schenato.This work was supported by the National Natural Science Foundation of China (NSFC)under grants61004029,60934006and61120106011.This paper was presented in part at the30th Chinese Control Conference,July22-24,2011, Yantai,China.Recommended by Associate Editor L.Schenato.T.Li is with the Key Laboratory of Systems and Control,Institute of Systems Science,Academy of Mathematics and Systems Science,Chinese Academy of Sciences,Beijing100190,China(e-mail:litao@).L.Xie is with EXQUISITUS,Centre for E-City,School of Electrical and Electronic Engineering,Nanyang Technological University,Singapore639798 (e-mail:elhxie@.sg).Color versions of one or more of thefigures in this paper are available online at .Digital Object Identifier10.1109/TAC.2012.2199152Quantized consensus is an important problem due to that digital communications are widely adopted and has attracted recurring interest([15]–[24]).Kashyap et al.([15])developed an average-consensus algorithm with integer-valued states, which can ensure the asymptotic convergence of agents’states to an integer approximation of the average of the initial states. They gave an upper bound for the expected convergence time for fully connected networks and linear networks.Frasca et al. ([19]),Carli et al.([20]),and Li et al.([24])considered the av-erage-consensus problem with real-valued states and quantized communications.In[19]and[20],static uniform quantizers and dynamic logarithmic quantizers with an infinite number of quantization levels were considered,respectively.In[20]and [24],average-consensus algorithms with dynamicfinite-level uniform quantizers were proposed.Especially,in[24],it is shown that if the network is connected,then the control param-eters can be properly chosen such that the average-consensus can be achieved with an exponential convergence rate by using a single-bit quantizer.The work of[24]was extended to the cases with link failures in[25]and time-delay in[26], respectively.The aforementioned works are concerned with thefirst-order integrator systems with measurable states.In many applications, however,we encounter higher order systems with partially mea-surable states.Dynamic output feedback control of multi-agent systems of general higher order dynamics wasfirst studied by Fax and Murray([3]).Tuna proposed a controller design algo-rithm for synchronization of discrete-time linear systems based on static relative output feedback([27]).Qu et al.([28])dealt with static output feedback of multi-agent systems via feedback linearization,where the control input of an agent is given in terms of its own output and the relative output errors with re-spect to its neighbors.Li et al.([29])and You and Xie([30]) considered distributed coordination based on dynamic relative output feedback.Hong et al.([31])developed a distributed ob-server for leader-following systems where the leader and the followers are described by second-order integrators and each follower constructs a state observer based on the leader’s posi-tion,neighbors’positions and leader’s control input to estimate the leader’s velocity.More literature on distributed observers can be found in[32]and[33].In this paper,we consider distributed coordination of multi-agent networks based on digital communications.The communications among agents are described by an undirected graph.Each agent is described by a discrete-time second-order integrator,with measurable position but unmeasurable velocity, unlike[20]and[24].Since the states of the agents are only partially measurable,the encoding-decoding scheme in[24]0018-9286/$31.00©2012IEEEcan not be easily extended to this case.Further,unlike[20] where infinite-level logarithmic quantizers are considered,we aim to design an efficient encoding-decoding scheme under a limited data rate for information exchange between agents. Ourfirst challenge is to jointly design state-observation and encoding-decoding for communication and computation effi-ciency while achieving consensus.Note that one natural idea is to design a state-observer for each agent and then encode and transmit the state-estimate to neighbors,which,however, requires a distributed control with complex encoding-decoding scheme in order to eliminate the effect of quantization and estimation errors on thefinal closed-loop system.Further,even such a control scheme can be developed to guarantee conver-gence,the computation and communication loads are generally higher and the performance(i.e.,the convergence rate under the same bit rate)is not definitely better.From the perspective of minimizing communication bit rate and reducing computation load,we propose an integrative ap-proach for observer and encoder-decoder design in this paper. At each time instant,the quantized innovation of each agent’s position is sent to its neighbors,while,at each receiver,an ob-server-based decoder is activated to obtain an estimate of the sender’s position and velocity.Our design can result in a much lower communication requirement due to:1)the encoder inputs,i.e.,agents’positions,contains less variables than the full states;2)the encoder outputs are in fact a kind of quantized innova-tions of agents’positions and it is known that innovations gen-erally can be quantized with much lower numbers of bits than the positions themselves.It is worth pointing out that even if the quantization is ignored,our encoders and decoders are different from the dynamic feedback control law in[3].Here,we do not design a state observer for each agent separately,but send the quantized innovation of each agent’s output directly and inte-grate the state observation and communication process together. Our observer-based encoding-decoding scheme is also different from the distributed observer given in[31],especially,we do not require the knowledge of the other agents’control inputs.We develop a distributed coordinated control law by using the states of the decoders and encoders,provide sufficient con-ditions on the control gains and network topology for the ex-istence offinite-level quantizers to ensure the closed-loop con-vergence,and show that these conditions are also necessary in some sense.We prove that,by selecting the number of quantiza-tion levels(data rate)properly,the asymptotic synchronization of the positions and velocities can be achieved.Furthermore,for a connected network,we can always select the control gains, such that2-bit quantizers can guarantee the exponential conver-gence of the closed-loop system and the convergence rate can be predesigned.It should be noted that compared with classical non-quan-tized and centralized state observers,due to the nonlinearity of the quantization and the coupling of all agents’states,the con-vergence of a given observer-based encoding-decoding scheme depends on the control inputs of all agents and the closed-loop dynamics of the whole network.Different from[24],the rela-tionship between the estimation error and the quantization error does not have a simple form if observer type is not properly se-lected,and it is very difficult to get an explicit expression for the relationship between the spectral radius of the closed-loop state matrix and the eigenvalues of the graph Laplacian.All these significantly complicate the closed-loop analysis and the con-trol parameter selection.Also,different from[24],there is no explicit relationship between the stability margin and the con-trol gain,which makes the performance limit analysis difficult. By using differential calculus and limit analysis,we give a linear approximation of the spectral radius of the closed-loop state ma-trix with respect to the control gain ratio and algebraic connec-tivity of the communication graph,based on which,a relation-ship between the performance limit and the parameters of the network and system is revealed.We show that as the number of agents increases to infinity,the asymptotic highest convergence rate is when using a-level quantizer,where is the ratio of the algebraic connectivity to the spectral radius of the Laplacian matrix of the communica-tion graph.The remainder of this paper is organized as follows.In Section II,we present the model of the network and agents,give the structures of observer-based encoders,observer-based de-coders and distributed coordinated control laws.In Section III, we analyze the closed-loop system and give conditions on the network topology,the control gains and the number of quantization levels to ensure convergence.In Section IV,we discuss the selection of the control gain ratio and show that2-bit quantizers can guarantee the convergence of the closed-loop system by selecting the control gains properly.We also give an explicit form of the asymptotic convergence rate.In Section V, we draw some concluding remarks and propose future research topics.The following notation will be used throughout this paper: denotes a column vector with all ones.denotes the identity matrix with an appropriate size.For a given set,the number of its elements is denoted by.For a given vector or matrix ,we denote its transpose by,its-norm by,its Euclidean norm by,its spectral radius by,and its trace by.For a given positive number,the natural logarithm, the logarithm of with base2,the maximum integer less than or equal to,and the minimum integer greater than or equal to are respectively denoted by,,and.II.P ROBLEM F ORMULATIONA.Agent and Network ModelsWe consider distributed coordination of a network of agents with the second-order dynamics:(1) where,,and are the position, velocity control of the th agent,respectively.Here, is the output of agent,that is,for agent,only its po-sition is measurable.The agents communicate with each other through a network whose topology is modeled as an undirected graph,where the agents and the communication channels between agents are represented by the node set and the edge set,respectively.The weighted adjacency matrix ofLI AND XIE:DISTRIBUTED COORDINATION OF MULTI-AGENT SYSTEMS WITH QUANTIZED-OBSERVER BASED ENCODING-DECODING3025is denoted by.Note that is a sym-metric matrix.An edge by the pair represents a communication channel from to and if and only if.The neighborhood of the th agent is denoted by.For any,,and if and only if.Also,is called the degree of,and is called the degree of.The Laplacian matrix of is defined as,where.The Laplacian matrix is a sym-metric positive semi-definite matrix and its eigenvalues in an ascending order are denoted by,where is the spectral radius of and is called the algebraic connectivity of([34],[35]).A sequence of edges is called a path from node to node.The graph is called a connected graph if for any ,there is a path from to.B.Observer-Based Encoding-DecodingWe consider digital communication channels with limited channel capacity.At each time step,what each agent can send to its neighbors is only a coded version of its current and past measurements.Generally speaking,the encoder of the th agent may take the following form:(2) where and are the output and input of the encoder, respectively,is a Borel measurable function and is a quan-tizer.Note that both the structure and parameters of and may be time-varying and the encoder may have infinite memory. In this paper,we propose afinite memory encoder of agent as(3) where is an exponentially decaying scaling function to be defined later.In the above,and are the internal states of the encoder and is afiquantizer given by(4) where is the number of quantization levels of.After is received by one of the th agent’s neighbors,say agent,a decoder will be activated:(5) where and are the outputs of the decoder.Remark1:In the above,is a quantized innovation with scaling.From the dynamic(1)of the th agent,we know that to get estimates for and,following the standard observer design,the decoder can be in the form(6) where and are the observer gains.It can be easily verified that if and the quantizer is the identity function,then(6)degenerates to the classical deadbeat posterior state observer based on output.However,since is not available for the neighbors of the th agent,we adopt decoder(5)instead.Remark2:From(3)and(5),we have(7) We will show that and can be viewed as the estimates for and,respectively.Denoteas the quantization error in encoder,as the estimation error for andas the estimation error for.By(3)and some direct calculation,we get(8) and(9) It can be seen that if the quantization error is bounded, then due to the vanishing of,the estimation errorsand will both to zero asymptotically as.Note that here,for the velocity estimation,there is one step delay.Remark3:The relationship among the estimation errors ,and the quantization error is not asin thefirst-order case It will be seen later that(8)and(9)will play an important role in the closed-loop analysis.Observe that the estimation errors for velocities depend on two steps of quantization errors,which, as we can see later,leads to an additional bit required for the quantizers as compared to thefirst-order case([24]). Remark4:From the above,we can see that both the en-coder(3)and the decoder(5)can be viewed as the state ob-servers based on the output and the quantized innovation. We call the encoder(3)an observer-based encoder and the de-coder(5)an observer-based decoder.Though the velocityis not measurable,the th agent and its neighbors can make an estimate for the overall state by using an ob-server-based encoder and an observer-based decoder.At each time step,each agent only needs to send the quantized innova-tion of its output to its neighbors,then the neighbors can use observer-based decoders to get estimates for the state of the3026IEEE TRANSACTIONS ON AUTOMATIC CONTROL,VOL.57,NO.12,DECEMBER2012agent.However,generally speaking,there is no separation prin-ciple for the encoder-decoder design and the control design. Compared with classical non-quantized and centralized state observers,due to the nonlinearity of the quantization and the coupling of all agents’states,the convergence of a given ob-server-based encoding-decoding scheme depends on the control inputs of all agents and the closed-loop dynamics of the whole network,which significantly complicates the analysis as seen below.C.Distributed Control LawIn this paper,we aim at designing a distributed coordinated control law based on quantized communications such that(10) We propose a distributed coordinated control law of the form(11) where and are the control gains.From(3),(5)and(11),we can see that the control input of each agent only depends on the state of its own encoder and the states of the decoders associated with the channels from its neighbors.Remark5:Since the states of agents are only partially mea-surable,the encoding-decoding scheme in[24]where agents of single integrator dynamics are considered cannot be easily extended to this case.The challenge is to design state observers and encoders-decoders jointly so that they can achieve con-sensus with efficient communications and computation.One natural idea is to design a state-observer for each agent and then encode and transmit the state estimate to neighbors.For example,we may adopt the following state-observer for the th agent:(12)is then encoded and transmitted to the neigh-bors of the th agent.However,since the control inputand estimation error are not available for its neighbors,to eliminate the effect of quantization and estima-tion errors on thefinal closed-loop system,we may need a more complex encoding-decoding scheme and a control law than(3), (5)and(11).Further,even if we canfind such a scheme to guar-antee convergence,the computation and communication loads are higher and the performance(i.e.,the convergence rate under the same bit rate)is not definitely better.From the perspective of bit rate constraint and reducing computation load,we propose an integrative approach for the state-observer and encoder-de-coder design.III.C ONVERGENCE A NALYSISThis section is devoted to the convergence analysis of the proposed distributed control law in the last section.To this end, we introduce the following notation:where.We also define the unitary matrix(13) where is the unit eigenvector of associated with,that is,,,.Under the protocol(3),(5)and(11),due to the quantization, the closed-loop system is a nonlinear discontinuous system. Generally speaking,the convergence analysis is difficult, however,by using the estimation error expressions(8)and (9),the closed-loop equation can be converted into a linear equation with time-varying disturbances,whose homogeneous part is just the closed-loop equation without quantization.Then by properly selecting the number of quantization levels,the quantizers can be kept unsaturated and the convergence of the closed-loop system can be achieved.We make the following assumptions.A1)There are known positive constants,,,, such that,,,.A2)The communication graph is connected.A3).A4).The following lemma,whose proof can be found in Ap-pendix,will be used in the analysis of the homogeneous part of the closed-loop system.Lemma3.1:Let(14) Then,i),if and only if As-sumptions(A2)–(A4)hold.ii)Let(15)LI AND XIE:DISTRIBUTED COORDINATION OF MULTI-AGENT SYSTEMS WITH QUANTIZED-OBSERVER BASED ENCODING-DECODING3027If Assumptions(A3)–(A4)hold,then the eigenvalues of are0,,and ,where(16) In the above,the arguments,of and were omitted,and,where.From Lemma 3.1,we know that if Assumptions (A2)–(A4)hold,then is diagonalizable.Let ,,be nonsingular matrices,such that whereDenote,. In the following,the dependence of,and on and will be omitted when there is no confusion.The following theorem gives sufficient conditions on the con-trol gains and network topology for the existence offinite-level quantizers to ensure the closed-loop convergence.Theorem3.1:Suppose Assumptions(A1)–(A4)hold.Let the scaling function,where(17) and.If the numbers of quantization levels of the quantizer,satisfy(18) and(19)where, then under the protocol(3),(5)and(11),the closed-loop system satisfies(20) Furthermore,the convergence rate is given by(21)Proof:The proof can be divided into three steps.First, we convert the closed-loop system into non-coupled linear equations with nonlinear disturbances.The disturbances are combinations of the estimation errors which are related to the quantization errors as observed from by(8)and(9).Second, we estimate the bound of the synchronization errors in terms of the quantization errors and system and control parameters. Finally,we prove the boundness of the quantization error by properly choosing the control parameters and the number of quantization levels,which will lead to the convergence of the closed-loop system.Step1)From(7)and(11),it follows that(22) Substitute the control law above into the system(1),we haveLet,,where is defined in(13).Denote the th components of and by and,respectively.Then we have, and(23) Denote,then the(23)can be rewritten as(24) where with.It is clear that to get(20),we only need to prove,.3028IEEE TRANSACTIONS ON AUTOMATIC CONTROL,VOL.57,NO.12,DECEMBER2012Step2)By(24),we have(25) Further,by(8)and(9),noting that,we haveThen it follows from(25)that(26) By the definition of,and,we get(27) Step3)By Lemma A.2,we get.This together with(26)gives,, which further implies(20).Then from, (26)and(27),we get(21).Observe that the distributed control law in Theorem3.1re-lies on,which requires each agent to know the graph and may not be practical.This restriction is relaxed by the following corollary.Corollary3.1:Suppose Assumptions(A1)–(A4)hold.Let the scaling function,where(28) and.If the numbers of quantization levels of the quantizer,satisfy(29) and(30) where then under the protocol(3),(5)and(11),the closed-loop system satisfies(31) and the convergence rate is given by(32)Proof:Noting that and,by Theorem3.1,we get the conclusion of this corollary.Remark6:From Theorem3.1and Corollary3.1,we can see that the convergence factor can be properly chosen to tune the convergence rate of the closed-loop system.By Corollary3.1, we may select the control parameters by the following steps.i)Choosing,such that Assumptions(A3)–(A4)hold.ii) Choosing and then according to(28).iii)Choosing the number of quantization levels according to(29)and(30). Remark7:Corollary3.1tells us that to select proper and the number of quantization levels,we do not need to know, that is,the exact Laplacian matrix.Furthermore,Assumption A4)holds if,so the selection of the con-trol gains may not need the knowledge of.However,from the definition of,we can see that the selection of needs the knowledge of the eigenvalues of the Laplacian ma-trix.Hence,we still need some global knowledge of the net-work topology to select the control parameters.In the case when the network topology can be predesigned,this is not a problem. However,in some applications,the network topology may notLI AND XIE:DISTRIBUTED COORDINATION OF MULTI-AGENT SYSTEMS WITH QUANTIZED-OBSERVER BASED ENCODING-DECODING3029be known to each agent,for example,under switching topolo-gies due to changing environment.In this situation,the problem of estimating the eigenvalues of the Laplacian matrix in a dis-tributed manner becomes relevant.Franceschelli et al.([36]) gave an algorithm to estimate the eigenvalues of a Laplacian matrix by each agent using the fast Fourier transform.The com-bination of the eigenvalue estimation algorithm with our pro-posed distributed coordinate control algorithm is an interesting future research topic.Remark8:From Lemma3.1and the proof of Theorem3.1, we can see that A2-A4)are necessary and sufficient for the sta-bility of the homogeneous part of the closed-loop systems(24). Since,we can see that a smaller degree, which implies lower local connectivity,will instead give more flexibility for selecting the control gains.In the main theorem of[15](Theorem1of[15]),the authors proved that under their algorithm,as time goes on the states of agents converge to a ball centered at the average of the initial states with radius less than or equal to the quantization interval, with probability1.They also proved that there always exists a finite time such that the states of the agents enter and stay in the ball with a positive probability when.An upper bound for the mathematical expectation of the convergence time for fully connected networks and linear networks was also pro-vided.In this paper,we focus on the case with real-valued states and the asymptotic convergence to exact synchronization.The algorithm given here can guarantee convergence to synchro-nization with an arbitrary precision as time goes on.In the fol-lowing,we will give an analysis on the convergence time for a given precision for connected networks.For any given, denote and,which are respectively the time for the positions and veloci-ties of all the agents with precision.Theorem3.2:Suppose the conditions of Theorem3.1hold,and.Then under the protocol(3),(5)and(11),for sufficiently small, the convergence time for the position and velocity respectively satisfies(33) whereProof:The proof can be found in the Appendix. Remark9:Similar to Corollary 3.1,the constantin Theorem 3.2can be replacedby Fig.1.Curves of of Example1.,which gives us a relationship between the upper bound of the convergence time and the number of agents.IV.P ARAMETER D ESIGN AND P ERFORMANCE L IMIT A NALYSIS In this section,we shall investigate controller parameter se-lection and analyze the asymptotic consensus convergence rate.A.Selecting the Control Gain RatioSelecting the control gains and is equivalent to selecting a control gain ratio and the position control gain. It is easily seen that Assumptions A3)-A4)hold if and only if and.Further will max-imize,which implies the largest stability margin of the homogeneous part of the closed-loop system(24).1)Example1:We consider a10-node network withand.The curves of with respect to with different control gain ratios are shown in Fig.1.It can be seen that will go to1as or,andfirst decreases and then increases with respect to.The of the inflection point of reaches its maximum when.Further,it can be proved theoretically that when is sufficiently small, is almost a linear,monotone decreasing function of .We have the following result.Lemma4.1:If Assumptions A2)-A4)hold,then for any given ,we have(34)Proof:The proof can be found in Appendix.For Example1,the curves of andwith different are shown in Fig.2.B.Selecting the Control Parameters Under a Given Communication Data RateIn Theorem3.1,we give a criterion for selecting the number of quantization levels(communication data rate)under given control gains and a convergence rate.In the following theorem,3030IEEE TRANSACTIONS ON AUTOMATIC CONTROL,VOL.57,NO.12,DECEMBER2012Fig.2.Curves of and of Example1with different,where dot are for and the solid lines are for.we will consider how to select the control parameters under a given communication data rate.Theorem4.1:Suppose Assumptions A1)and A2)hold.For any given,,denote(35) Then,i)is nonempty.ii)If,,and the numbers of the quantization levels of satisfy(36)then under the protocol given by(3),(5)and(11)with,the closed-loop system satisfieswhere is a constant satisfying(37)Proof:From Lemma4.1,we have(38) which impliesFrom the aforementioned,noting that the ex-ists,and(35),we have(i).For any given integer and constant,if ,,(36)and(37)hold,then it is easily verified that,Assumptions A3)-A4)and(18)hold. Then noting that and,we know that(17)and(19)also hold.By Theorem3.1,we get ii).Remark10:In[24],it is shown that for a connected network withfirst-order agents,average-consensus can be achieved with an exponential convergence rate based on merely1-bit informa-tion exchange between agents.Here,we prove that for the case with second-order agents,2-bit quantizers suffice for the expo-nential asymptotic synchronization of agents’pared with[24],from(A.2),we can see that the additional bit is used to overcome the uncertainty in estimating the velocity of the agent.Remark11:Compared with[24],the performance limit analysis for the second order agents with partial measur-able states is much more challenging.In[24],the spec-tral radius of the closed-loop matrix has the simple form:,where is the control gain.In this paper,it is very difficult to get an explicit expression for the relationship between the closed-loop spectral radiusand the eigenvalues of the Laplacian matrix.By differential mean theorem and limit analysis,we develop Lemma4.1to give a linear approximation of with respect to the control gains and the algebraic connectivity.From(38),we can see that Lemma4.1plays a vital role in establishing Theorem 4.1.Different from[24],there is also no explicit relationship between the stability margin and the control gain ,which also poses a significant challenge in the asymptotic convergence rate analysis as seen later in Section IV-C.1)Example2:We consider a network with10nodes andweights,which means that,if,other-wise,.The edges of the graph are randomly generated according to,for any unordered pair. Here,,.The initial states are chosen as and,.The con-trol gain and,which give.The scaling factor is taken as 0.9998.According to Theorem3.1,the2-bit quantizer can be used.The evolution of the states is shown in Fig.3.It can be seen that both the positions and the velocities of the agents are asymptotically synchronized.Next,we set.In this。
SCM05
LMS SCADAS Mobile LMS/SCM/SCM05/010110Five Slot Mainframe[SCM05]FrameThe SCM05 is a laptop size modular front-end, accommodating two tachoinputs, two signal generator outputs and five slots for up to 40 inputchannels. Its compact size, low weight and battery operation makes it theideal portable multi-channel sound and vibration analyzer. With athroughput rate up to 14MSamples/sec, the SCADAS Mobile offers fullbandwidth throughput to the host for all channels.Measure anywhereBecause of its robustness, exceptional environmental specifications,flexible power requirements and wide operating temperature range, theSCADAS Mobile can be employed in virtually any mobile test campaign.Ultra quiet, no fan coolingHaving no cooling fan, the SCADAS Mobile is the ideal system for criticalacoustic measurements. The combination of three advanced techniqueseliminates fans:•The input modules are based on low power components, reducingpower consumption to less than 0.5W per channel.•Heat is dissipated via an integrated cooling block on the rear of the frame.The heat from the printed circuit boards is transferred via the backplane connectors and via cold walls and heat pipes.•An intelligent power management system, monitoring system activity,sets SCADAS Mobile in power-down mode when no measurementsare done.Battery operationSCADAS Mobile includes a built-in battery for a guaranteed mainsindependent operation of 60 minutes (40-channel configuration). The batteryis charged automatically when external power is connected.Features and benefitsUltra compact laptop sizeRugged housing for rough environmentsWide operational temperature range from -20ºC to+55ºCBuilt-in battery for 60 minutes mains independentoperation14MSamples/sec throughput via Ethernet interfaceUltra quiet, no fan coolingModular system for up to 40 input channelsWide range DC power supplyOn board dual tacho inputOn board dual signal generator outputSCM05 Mainframe LMS/SCM/SCM05/010110 Specifications SCM05Number of slots:SCM05 has six slots, five slots are available for input modules; one slot is reserved for the system controllerPower input:Auto ranging DC input from 9.6VDC to 36VDC; AC operation uses an external mains adapterPower management:ON/OFF switch, automatic sleep modePower consumption:40W maximumInternal battery:Rechargeable Li-ion battery; rating 21.6V-1.6Ah; charge time is five hours @ 0.5A when the SCM05 is switched on, and two hours @ 1A when it is switched off; the battery is charged automatically when external power is applied; autonomous operation time depends on the number of channels with a minimum of 60 minutes for 40 channelsCooling:Heat conduction via printed circuit board connectors; sides of the printed circuit boards are cooled via cold walls connected with heat pipes to cooling block at the rear Tacho input:•Dual tacho input to supportsignature or order trackingapplications•Input pulse rates supported from5Hz up to 40kHz,•Controlled data acquisition down tozero speed (0Hz pulse rate)•Input range from 200mV to 40VSignal generator:•Two short circuit protected singleended outputs via grounded LEMOsocket•24-bit bit-stream DAC•Dynamic range is 110dB referred tomaximum output signal for 20kHzbandwidth•Interpolation filters are acombination of analogreconstruction filters and digitalinterpolation filters with noiseshaping•Signal generation up to 40kHzRandom outputUncorrelated base-band noise withcrest factor of 3.5 in continuous orburst modeSine outputSine with amplitude and phase control;swept sine with amplitude and sweepspeed controlOutput levelMaximum output voltage of ±10V canbe attenuated in software down to±300mVEthernet interface:The 1Gbit connection provides athroughput rate up to 14MSamples of24 bit per secondDimensions:Width: 340 mmHeight: 78 mmDepth: 295 mmWeight:6.2 kg in full configuration5.1 kg in 8-channel configurationTemperature:Operating: -20ºC to +55ºCStorage: -20°C to +70°CRelative humidity:Up to 95% non-condensingVibration MIL-STD-810F:20-2000Hz (random): 7.7g rmsShock MIL-STD-810F:60g pk applying an 11ms sawtoothshock pulse; 3 shocks per directionOrdering information:SCM05: SCADAS Mobile mainframe with five free slots, includingbattery, AC/DC power adapter, DC power cable, EthernetCardbus host interface and a 2m. UTP cableSCM06S: SCADAS Mobile slave frame with six free slots, includingmaster/slave interface, battery, AC/DC power adapter and DCpower cableSCM-MS: SCADAS Mobile master/slave interface option for SCM05 SCM-GPSCN: SCADAS Mobile GPS and single CAN-bus packageSCM-IE: SCADAS Mobile incremental encoder interface optionLMS SCADAS Mobile is a product of LMS Instruments。
Oral or Poster Presentation
Four Top Reasons Mutual Information Does Not Quantify Neural Information ProcessingDon H.JohnsonRice UniversityHouston,TexasOral or Poster Presentation1IntroductionThe mutual information between the stimulus and the response,whether the response be that of a single neuron or of a population,has the form(1) where is the probability distribution of the response for a given stimulus condition andis the probability distribution of the stimulus.It is important to note that this probability distribution is defined over the entire stimulus space.For example,if black-and-white images serve as the stimulus, is defined over all positive-valued signals having a compact two-dimensional domain.To measure mutual information,the experimenter defines a stimulus set and,from the measured response, estimates,the probability distribution of the response under each stimulus condition.The mutualinformation is estimated as[1](2)where is the probability of the th stimulus occurring.In information theory,the mutual information is seldom used save forfinding the capacity,defined to be the maximum value of the mutual information over all stimulus probability distributions.What other uses mutual information might have can be questioned.Because of the way mutual information is calculated and used,several important issues not involving empirical concerns arise.Mutual information depends on the stimulus probabilities.As can be seen from its definition(1)or its estimate(2),mutual information depends on the stimulus probabilities.Mutual information measures how different,in a statistical sense,the stimulus and response are.It equals zero when the response is statistically independent of the stimulus and equals either(2)or(1)when the response directly reflects the stimulus.1Mutual information does not depend solely the stimulus-response relationship.In computing(2),picking any particular set of stimulus probabilities is difficult(impossible)to justify. The usual choice is to make them equal or to correspond to the presentation probabilities.However,what does this arbitrary choice have to do with the capability of the system under study to represent the stimulus? As the stimulus probabilities vary,mutual information can vary between zero and the theoretical upper limit(capacity).Byfinding the capacity,we obtain a measure that does characterize the stimulus-response relationship.This approach would seem to provide a measure of information processing capability.1Note the difference here between measured and theoretical mutual information calculations.This discrepancy shows that in the simple case of the response being a unique deterministic function of the stimulus,the true and estimated values of mutual information cannot agree.Finding capacity depends on the stimulus set.Stein[4]studied the capacity of several rate-coding models.In these models,stimulus produced response rate,which controlled the count distributionaccording to a model(e.g.,Poisson).Not only did he maximize mutual information with respect to, he also found the response rates within a specified rate range that maximized mutual information.Forexample,for the average spike count constrained to lie between and,the maximal mutual information occurred when were,and.What his paper does not say is that when more than three stimuli are used to produce responses in the same average-count range,mutual information is maximized by the same set of three response rates and stimulus probabilities with the“extra”stimuli assigned zero probability.Thus,it is theoretically possible that in an attempt to maximize mutual information,the result may be that the experimenter should not have presented some of his/her stimuli.This effect makes little sense,but is a property of estimated mutual information(2)and the capacity calculation.Estimating capacity cannot yield the true capacity.The estimate of(2)cannot yield the true value expressed by(1).Some have argued that by presenting a complete set of stimuli2and measuring mutual information,the stimulus-response relation is fully characterized.Consequently,if we optimized(2)to remove stimulus probability effects,we have a capacity estimate.Unfortunately,optimizing over stimulus probabilities is not equivalent to optimizing over all stimulus probability distributions.In our example taken from Stein,as we try to add more stimuli,the optimal solution is to have only three,which will never approximate a continuous distribution.If,instead of optimizing with respect to the rates as well as to the stimulus probabilities,equally spaced rates are assumed and the maximizing probabilities,the capacity increases to maximum then decreases as the number of stimuli increases.Stein[4]argues that the capacity-achieving probability distribution is proportional to.It is impossible tofind this result from the experimental approach implied by(2).Inferring information processing capability from capacity is difficult.Even if the true capacity could be computed,what that result means is unclear.If the stimulus was somehow being used as a digital com-munication medium(i.e.,used to communicate sequences of bits)and the responses were used to determine the bit sequence,the capacity would define how many bits per stimulus presentation could be reliably communicated(Shannon’s Noisy Channel Coding Theorem).However,most stimuli represent the exter-nal environment,which is not a bit sequence.The Noisy Channel Coding Theorem also applies to analog (continuous-valued)communication,but in a much more complicated way[3].His framework is that the stimulus is encoded in a rate,this rate and the count statistics determine the response,and this quantity decoded as.3Shannon defines what is now known as a distortion measure according towhere is the distortion function that measures how similar the original and decoded signals are.For example,could be,in which case is the mean-squared distortion.is the joint distribution between the stimulus and the decoded stimulus.Finding this quantity requires a specification of the stimulus probability distribution and sending stimuli according to that probability law through the sensory system to determine the statistical characteristics of the decoded output.Shannon then defines to be the rate at which information can be reproduced to a given distortion aswith2A complete set means that all stimuli can be represented as a weighted linear combination of elements in the set.3For simplicity,I use the rate code as an example.The same result applies to more general point-process models of the response.This constrained minimization with respect to the joint probability function can be quite difficult to compute.The Noisy Channel Coding Theorem now becomes that so long as,where capacity is computed with respect to the pair,the input can be encoded in such a way that the required distortion criterion is met.The more stringent the criterion(a smaller),the larger becomes until one cannot send information through the channel and meet the distortion criterion.Said another way,finding the capacity of a stimulus-response relationship with respect to analog stimuli yields a limit on how effectively a source can be encoded according any distortion criterion.Note that in contrast to the digital version of the Noisy Channel Coding Theorem,error-free communication is not possible in this case.We could assess information processing by translating the measured capacity into a value for the distortion measure.Note that we chose the distortion measure;what distortion measures sensory systems employ are difficult to characterize and using the“right”one will almost certainly lead to analytic difficulties infinding.Thus,it would seem that exploiting capacity is difficult if not impossible.2ConclusionsBecause of these difficulties,communication engineers do not use mutual information.It is best used as a vehicle for defining capacity,but the utility of using capacity to characterize analog sensory systems is fraught with difficulties.Quantities other than mutual information should be used,one possibility being the approach described in[2].References[1]A.Borst and rmation theory and neural coding.Nature Neuroscience,2:947–957,1999.[2]D.H.Johnson,C.M.Gruner,K.Baggerly,and rmation-theoretic analysis of neuralp.Neuroscience,10:47–69,2001.[3]A.N.Kolmogorov.On the Shannon theory of information transmission in the case of continuous signals.IRE .Th.,3:102–108,1956.[4]R.B.Stein.The information capacity of nerve cells using a frequency code.Biophysical J.,7:67–82,1967.。
Look Ma, My Homepage is Mobile
Look Ma’,My Homepage is Mobile!Roger KehrT-Nova Research Labs Deutsche Telekom AG roger.kehr@telekom.deAndreas Zeidler Darmstadt University of Technology Department of Computer Science az@informatik.tu-darmstadt.deAbstractMuch of the ongoing research in ubiquitous computing has concentrated on providing context information,e.g.location information,to the level of services and applications.Typically,mobile clients obtain location information from their en-vironment which is used to provide“locally opti-mal”services.In contrast,it may be of interest to obtain information about the current context a mo-bile user or device is in,from a client somewhere the Web,i.e.to use the mobile device as an infor-mation service provider.As an instance of such services we propose the metaphor of a“location-aware”Web homepage of mobile users providing information about,e.g.the current location a mobile user is at.Requesting this homepage can be as easy as typing a URL con-taining the mobile user’s phone number such as http///+49123456789in an off-the-shelf browser.The homepage is dynamically con-structed as Web users access it and it can be con-figured in various ways controlled by the mobile user.We present the architecture and implementa-tion and discuss issues around this“inverse”ubiq-uitous computing example.Keywords:context information,location,ubiq-uitous computing,mobile computing,homepage, mobile phones1MotivationCurrently,we are experiencing the tremendous success of SMS(Short Message Service)on mobile phones.The underlying technology can be char-acterized as a“limited version of email”.Nearly the same applies to the W AP technology(Wire-less Application Protocol),as displaying content is restricted and navigating the Internet burdensome. Nevertheless both are1successful.Why? Possibly,one of the reasons for the success of SMS is the fact that the recipient of an SMS-message is reachable most of the time and can ans-wer instantly.Nearly the same factors apply to the usage of W AP.The actual display resolution is less important than being“online”while being mobile, even in the bus or a caf´e.Mobility,reachability, and ubiquitous access to data and information is important for the success of new emerging tech-nologies in thefield of mobile applications.More-over,especially young people are beginning to de-fine themselves over some representation in the vir-tual world of the Internet.Having a homepage is of great importance and presenting information about the own personality,e.g.interests or hobbies,is mandatory.In the future,a problem might be that home-pages are usually hosted somewhere by an Internet Service Provider(ISP)and referenced by an URL relative to the ISP and not relative to the person pre-senting him-or herself.This might be generating a feeling of“separation from the oneself”when pro-viding or accessing homepages and might be expe-rienced as somehow awkward and unsecure. Given this,one can identify a mismatch between the highly personalized communication pattern of mobile telephony and-messaging and the iden-tification with the own“virtual identity”on one hand,and more or less static content plus the non-personal addressing schema of homepages in the Internet on the other hand.In addition,usually a person has no information about who is accessing the homepage which might be very important for 1or said to become...various social situations.2This analysis leads to our thesis that a home-page in the Internet should be more personalized by means of representing information related to the activities a person currently is engaged in and the context of a user in the physical world.Moreover, mechanisms are desirable to personalize the access to user-related content in the Internet.We present a system using a Web serverinside a mobile phone which brings the ubiquitous features of SMS messaging to theof Internet homepages:The homepage itself is ting mobile.The current view on Web-centric formation access is focused on making Web cations mobile.Our approach inverses thisby making the Web server mobile which can be cessed by mobile or static clients,as well.This Web server is used to enhance Web dynamically with context information collected the mobile and brings the virtual presence of a near to the physical presence.Applications of approach might be a more personalized nication when calling a person on his or her bile.The caller can estimate where thecation partner currently is by accessing his or her homepage which might be beneficial due to the ad-ditional information presented there.Just to give a short example:A potential caller canfigure out that a person who is not in town cannot be met for a drink.Moreover,when calling this person,the caller does not have to ask where the other person is right now(which is part of the conversation of-ten).On the other hand the system can be config-ured to ask the user of the cellular phone if access to personal information is permitted at all.This is a major enhancement as access can be permitted to one group of users,e.g.your family,and denied to others(e.g.your boss)on an personalized level.2The Mobile HomepageThe mobile home page system is built on top of an implementation of small Web server inside a Subscriber Identity Module(SIM)[1]of the Global System for Mobile Communication[2].The SIM is a smartcard issued by mobile operators,which 2Especially when you are ually acts as security module in the GSM authen-tication protocol.This server called WebSIM[3,4] is implemented as a Java applet in the SIM munication form the Internet is achieved by a so-called proxy server that(a)acts a gateway from the Internet to the GSM world,and(b)imple-ments many of the functionality needed for the pro-vision of mobile users’homepages.HTTP requests:HE 6HUYHUof the standard WebSIM that supports an additional URL of the form GET/st/mhp/caller=name. After incoming HTTP requests are parsed,the “commands”encoded in the URL are executed and the responses are sent back by SMS to the proxy.This command executed on the server returns a document of type application/mobile-homepage that describes in a very compact man-ner the current location of the mobile phone.Due to the structure of GSM this information contains (a)the country,(b)the operator network,and(c) a location information octet depending on the net-work.In addition a set of values is returned that can be configured by the mobile user and stored in the SIM.Overall,the returned information must fit into the140octets payload of standard SMS. Round trip times are about10seconds at average. The current implementation operates in two modes controlled by the phone owner:(a)the in-formation is served without interaction,or(b)the mobile user is shown a simple menu asking the mo-bile user,whether the request should be answered or not(see Fig.2).The returned homepage is dy-Figure2.Homepage Menu on Mobile Phone namically constructed from a homepage template that a mobile user personalizes arbitrarily.This template may include variables such as$COUN-TRY,$NETWORK,$AREA,$ITEM[n](addresses the configurable set of values from the phone),etc. The information returned in the response sets these variables and the template substitution takes place. Additionally,mappings from network and location information to coordinates and textual description of the location are maintained,which are acces-sible by other variables.We have implemented a database,mapping the location information octets available in our hometown to textual descriptions an city area maps for demonstration purposes. Hence,a mobile homepage template could look as follows:<html><title>Homepage of Dad</title><body><h1>I’m Dad</h1><p>I’m currently in$COUNTRY,somewherein$AREA.Have a look at this<a href="$MAP">map</a>to see whereI am.Currently,I’m in$ITEM[3].Here$ITEM[3]could,e.g.,replaced by“a Meet-ing”.Each mobile user has the ability to upload his/her homepage to the proxy and to define a pass-wordfile containing user names and associated passwords.Web users are required to authenticate by means of HTTP basic authentication,i.e.stan-dard Web-based login procedures.3Conclusion and Future WorkWe have presented a system for providing mo-bile homepages of mobile users to Web users in the Internet.These homepages are dynamically adapted to the context a mobile user is currently in, such as location information or configurable text blocks describing the situation,such as being in a meeting.There are many obvious issues that could be improved such as response length,access control, user interaction,etc.The main reason for this is the poor functionality of current mobile telephony with respect to bandwidth and protocols of the mo-bile on one hand,computational power and mem-ory size of a SIM on the other.In the future mobile phones may allow for implementing a Web server that hosts more context data and other information and may offer a better user interface for configura-tion purposes.Despite our system is restricted in its functional-ity we consider it as a valuable“proof-of-concept”for assessing and evaluating the concept of mo-bile homepages.We hope to have given another view on ubiquitous computing,asking what ser-vices mobile users themselves can offer to potential clients,and not vice versa.References[1]European Telecommunications Standard Institute,Digital cellular telecommunications system(Phase 2+);Specification of the Subscriber Identity Mod-ule–Mobile Equipment(SIM–ME)interface (GSM11.11),1998.[2]“GSM Association.”Further information availableat .[3]S.Guthery,R.Kehr,and J.Posegga,“How to Turna GSM SIM into a Web Server,”in To appear inProceedings of CARDIS’2000,Sept.2000.[4]“EURESCOM P1005Project.”Further informationavailable at http://www.eurescom.de/∼websim/, Apr.2000.。
博士生发一篇information fusion
博士生发一篇information fusion Information Fusion: Enhancing Decision-Making through the Integration of Data and KnowledgeIntroduction:Information fusion, also known as data fusion or knowledge fusion, is a rapidly evolving field in the realm of decision-making. It involves the integration and analysis of data and knowledge from various sources to generate meaningful and accurate information. In this article, we will delve into the concept of information fusion, explore its key components, discuss its application in different domains, and highlight its significance in enhancingdecision-making processes.1. What is Information Fusion?Information fusion is the process of combining data and knowledge from multiple sources to provide a comprehensive and accurate representation of reality. The goal is to overcome the limitations inherent in individual sources and derive improved insights and predictions. By assimilating diverse information,information fusion enhances situational awareness, reduces uncertainty, and enables intelligent decision-making.2. Key Components of Information Fusion:a. Data Sources: Information fusion relies on various data sources, which can include sensors, databases, social media feeds, and expert opinions. These sources provide different types of data, such as text, images, audio, and numerical measurements.b. Data Processing: Once data is collected, it needs to be processed to extract relevant features and patterns. This step involves data cleaning, transformation, normalization, and aggregation to ensure compatibility and consistency.c. Information Extraction: Extracting relevant information is a crucial step in information fusion. This includes identifying and capturing the crucial aspects of the data, filtering out noise, and transforming data into knowledge.d. Knowledge Representation: The extracted information needs to be represented in a meaningful way for integration and analysis.Common methods include ontologies, semantic networks, and knowledge graphs.e. Fusion Algorithms: To integrate the information from various sources, fusion algorithms are employed. These algorithms can be rule-based, model-based, or data-driven, and they combine multiple pieces of information to generate a unified and coherent representation.f. Decision-Making Processes: The ultimate goal of information fusion is to enhance decision-making. This requires the fusion of information with domain knowledge and decision models to generate insights, predictions, and recommendations.3. Applications of Information Fusion:a. Defense and Security: Information fusion plays a critical role in defense and security applications, where it improves intelligence analysis, surveillance, threat detection, and situational awareness. By integrating information from multiple sources, such as radars, satellites, drones, and human intelligence, it enables effective decision-making in complex and dynamic situations.b. Health Monitoring: In healthcare, information fusion is used to monitor patient health, combine data from different medical devices, and provide real-time decision support to medical professionals. By fusing data from wearables, electronic medical records, and physiological sensors, it enables early detection of health anomalies and improves patient care.c. Smart Cities: Information fusion offers enormous potential for the development of smart cities. By integrating data from multiple urban systems, such as transportation, energy, and public safety, it enables efficient resource allocation, traffic management, and emergency response. This improves the overall quality of life for citizens.d. Financial Markets: In the financial sector, information fusion helps in the analysis of large-scale and diverse datasets. By integrating data from various sources, such as stock exchanges, news feeds, and social media mentions, it enables better prediction of market trends, risk assessment, and investmentdecision-making.4. Significance of Information Fusion:a. Enhanced Decision-Making: Information fusion enables decision-makers to obtain comprehensive and accurate information, reducing uncertainty and improving the quality of decisions.b. Improved Situational Awareness: By integrating data from multiple sources, information fusion enhances situational awareness, enabling timely and informed responses to dynamic and complex situations.c. Risk Reduction: By combining information from diverse sources, information fusion improves risk assessment capabilities, enabling proactive and preventive measures.d. Resource Optimization: Information fusion facilitates the efficient utilization of resources by providing a holistic view of the environment and enabling optimization of resource allocation.Conclusion:In conclusion, information fusion is a powerful approach to enhance decision-making by integrating data and knowledge from multiple sources. Its key components, including data sources, processing, extraction, knowledge representation, fusion algorithms, and decision-making processes, together create a comprehensive framework for generating meaningful insights. By applying information fusion in various domains, such as defense, healthcare, smart cities, and financial markets, we can maximize the potential of diverse information sources to achieve improved outcomes.。
The_Retraining_Churn_Data_Mining_Model_in_DMAIC_Ph
Journal of Communication and Computer 10 (2013) 1063-1069The Retraining Churn Data Mining Model in DMAIC PhasesAndrej TrnkaDepartment of Mass Media Communication, Faculty of Mass Media Communication, University of SS. Cyril and Methodius, Trnava 917 01, Slovak RepublicReceived: May 30, 2013 / Accepted: July 01, 2013 / Published: August 31, 2013.Abstract: Six Sigma is a rigorous, focused, and highly effective implementation of proven quality principles and techniques. A company’s performance is measured by the sigma level of their business processes. Traditionally companies accepted three or four sigma performance levels as the norm. The Six Sigma standard of 3.4 problems-per-million opportunities is a response to the increasing expectations of customers. DMAIC is an acronym for five phases of Six Sigma methodology: Define, Measure, Analyze, Improve, Control. This paper describes possibility of using Bayesian Network for retraining data mining model. Concrete application of this proposal is in the field of the churn. Churn is a derivation from change and turn. It can be defined as a discontinuation of a contract. Data mining methods and algorithms can predict behavior of customers. We can get better results using Six Sigma methodology. The goal of this paper is proposal of implementation churn (with Bayesian network) to the phases of Six Sigma methodology.Key words: Bayesian network, data mining, DMAIC, Churn, Six Sigma.1. IntroductionSix Sigma methodology and its phases (Fig. 1) have been widely adopted by industries and non-profit organizations throughout the world. Six Sigma methodology was first espoused by Motorola in the mid-1980s. The successful implementation of the Six Sigma program in Motorola led to huge benefits. Motorola recorded a reduction in defects and manufacturing time, and also began to reap financial rewards. The Six Sigma has become the most prominent trend in quality management not only for manufacturing and service industries, but also for non-profit organizations and government institutes [1-5].The main target of Six Sigma is to minimize variation because it is somehow impossible toCorresponding author: Andrej Trnka, Ph.D., research fields: data mining, Six Sigma, statistical process control. eliminate it totally. Sigma (σ) in the statistical field is a metric used to represent the distance in standard deviation units from the mean to a specific limit. Six Sigma is a representation of six standard deviations from the distribution mean. If a process is described as within Six Sigma, the term quantitatively means that the process produces fewer than 3.4 DPMO (defects per million opportunities). Table 1 shows how exponential the sigma scale is between levels 1 and 6 [6].We can talk about Lean Six Sigma, too. Lean Six Sigma for services is a business improvement methodology that maximizes shareholder value by achieving the fastest rate of improvement in customer satisfaction, cost, quality, process speed, and invested capital [7]. But for our research, we can ignore the fast, so using the Six Methodology is proper.In our previous research we implemented selected data mining methods and algorithms to the DMAICphases of Six Sigma Methodology. The main area ofThe Retraining Churn Data Mining Model in DMAIC Phases1064Fig. 1 Representation of Six Sigma methodology by BPMN.Table 1 Six Sigma scale.Sigma DPMO Efficiency (%)1 691,462 30.9 2 308,538 69.13 66,807 93.34 6,210 99.45 233 99.986 3.4 99.9999966Source: Ref. [6].the implementation was manufacturing processes. But Six Sigma methodology can be used in customer services, too.Some authors have used data mining algorithms in manufacturing processes, but without Six Sigma methodology [8-11].Data mining is the process of discovering interesting patterns and knowledge from large amounts of data. The data sources can include databases, data warehouses, the Web, other information repositories, or data that are streamed into the system dynamically [12]. One of the data mining task is to predict the customer’s churn.2. ChurnMobile phone providers fight churn by detecting patterns of behavior that could benefit from new services, and then advertise such services to retain their customer base. Incentives provided specifically to retain existing customers can be expensive, and successful data mining allows them to be precisely targeted to those customers who are likely to yield maximum benefit [13]. Churn is defined as a discontinuation of a contract. Reducing churn is important because acquiring new customers is more expensive than retaining existing customers. In order to manage customer churn to increase profitability, companies need to predict churn behavior, however, this problem not yet well understood[14, 15].Churning customers can be divided into two main groups, voluntary and non-voluntary churners. Non-voluntary churners are the easiest to identify, as these are the customers who have had their service withdrawn by the company. There are several reasons why a company could revoke a customer’s service, including abuse of service and non-payment of service.Voluntary churn is more difficult to determine,because this type of churn occurs when a customer makes a conscious decision to terminate his/her service with the provider. Voluntary churn can beThe Retraining Churn Data Mining Model in DMAIC Phases 1065sub-divided into two main categories, incidental churn and deliberate churn.Incidental churn happens when changes in circumstances prevent the customer from further requiring the provided service. Examples of incidental churn include changes in the customer’s financial circumstances, so that the customer can no longer afford the service, or a move to a different geographical location where the company’s service is unavailable. Incidental churn usually only explains a small percentage of a company’s voluntary churn. Deliberate churn is the problems that most churn management solutions try to battle. This type of churn occurs when a customer decides to move his/her custom to a competing company. Reasons that could lead to a customer’s deliberate churn include technology-based reasons, when a customer discovers that a competitor is offering the latest products, while their existing supplier can not provide them. Economic reasons include finding the product at a better price from a competing company. Examples of other reasons for deliberate churn include quality factors such as poor coverage, or possibly bad experiences with call centers [16-17].3. Data Mining ModelFor our research we used IBM SPSS Modeler 14. Telecommunications provider is concerned about the number of customers it is losing to competitors. Historic customer data can be used to predict which customers are more likely to churn in the future. These customers can be targeted with offers to discourage them from transferring to another service provider.This model focuses on using an existing churn data to predict which customers may be likely to churn in the future and then adding the following data to refine and retrain the model [18].Fig. 2 shows the built model in IBM SPSS Modeler, which contains the historical data.In analysis we used two data sets. These data sets had identical structure of variables. First data set contained 412 rows (records) and the second data set contained 451 rows.Fig. 2 Summary model for churn.The Retraining Churn Data Mining Model in DMAIC Phases 1066The first analysis with Feature Selection showed that several variables were unimportant when predicting churn. These variables were filtered from data set to increase the speed of processing when the model is built.The step in analysis is using Bayesian networks to predict the churn. A Bayesian network provides a succinct way of describing the joint probability distribution for a given set of random variables. In our analysis we used Tree Augmented Naive Bayes. This algorithm is used mainly for classification. It efficiently creates a simple Bayesian network model. The model is an improvement over the naive Bayes model as it allows for each predictor to depend on another predictor in addition to the target variable. Its main advantages are its classification accuracy and favorable performance compared with general Bayesian network models. Its disadvantage is also due to its simplicity; it imposes much restriction on the dependency structure uncovered among its nodes [19]. After learning the model from first data set we attached the second data set and we trained the existing model.4. ResultsTo compare and evaluate the generated models we had to combine the two data sets. The generated Bayesian Network model shows two columns. The first column contains a network graph of nodes that displays the relationship between the target and its most important predictors. The second column indicates the relative importance of each predictor in estimating the model, or the conditional probability value for each node value and each combination of values in its parent nodes.Fig. 3 shows relationship between the target variable. Due to confidentiality of provider data, we changed the names of variables and we used generic names of variables.Fig. 4 shows predictors (variables) importance.To display the conditional probabilities for any node, it is necessary to click on the concrete node and the conditional probability is generated. Fig. 5 shows conditional probability for most important variable—variable 2.To check how well each model predicts churn, we used an analysis node. This node shows the accuracyin terms of percentage for both correct and incorrect predictions. The analysis shows that both models havea similar degree of accuracy when predicting churn. Tables 2-5 show results for output variable churn.For the other view to data analysis we usedFig. 3 Created Bayesian network.The Retraining Churn Data Mining Model in DMAIC Phases1067Fig. 4 Predictors importance.Fig. 5 Conditional probability of variable 2.Table 2 Comparing churn_1 with churn.Total 863 Correct 654 75.78% Wrong 209 24.22%Table 3 Comparing churn_2 with churn.Total 863Correct 655 75.9% Wrong 208 24.1%Table 4 Agreement between churn_1 and churn_2.Total 863Correct 682 79.03% Wrong 181 20.97%Table 5 Comparing agreement with churn.Total 682Correct 565 82.84% Wrong 117 17.16%evaluation graph to compare the model’s predictedaccuracy by building a gains chart. Fig. 6 shows evaluating model accuracy.The graph shows that each model type produces similar results. However, the retrained model (churn_2) using both data sets is slightly better because it has a higher level of confidence in its predictions. Therefore, we used another algorithm ofBayesian network—Markov Blanket.The Markov Blanket [19] for the target variable node in a Bayesian network is the set of nodescontaining target’s parents, its children, and its children’s parents. Markov blanket identifies all theFig. 6 Evaluation graph of analysis (TAN Bayes Network).The Retraining Churn Data Mining Model in DMAIC Phases1068Fig. 7 Evaluation graph of analysis (Markov Blanket Bayes Network).Fig. 8 Churn in proposed control phase. variables in the network that are needed to predict the target variable. This can produce more complex networks, but also takes longer to produce. Using feature selection preprocessing can significantly improve performance of this algorithm.Fig. 7 shows the same analysis, but with using Markov Blanket algorithm. The evaluation graph shows that churn_2 has higher level of confidence than churn_2 with TAN Bayes Network.5. ConclusionsThe churn can be implemented to the DMAIC phases of Six Sigma methodology. We suggest implementing churn in to the control phase with message event to the step process control. Fig. 8 shows proposed place of churn in control phase.The red tasks and gateways represent our origin proposal. The green task churn is the new proposed task in Control phase of DMAIC.AcknowledgmentsThis paper supports the project VEGA 1/0214/11. Grateful acknowledgment for translating the English edition goes to Juraj Mistina. The results of this article were published in World Congress on Engineering and Computer Science 2012, WCECS 2012, San Francisco, USA, October 24-26, 2012.References[1] C.C. Yang, Six Sigma and Total Quality Management, in:Quality Management and Six Sigma, ed. A Coskun, Croatia, Sciyo, 2010.[2] J. Antony, R. Banuelas, Key ingredients for the effectiveimplementation of Six Sigma Program, Measuring Business Excellence 6 (2002) 20-27.[3] H. Wiklund, P.S. Wiklund, Widening the Six Sigmaconcept: An approach to improve organizational learning, Total Quality Management 13 (2002) 233-239.[4] L. Sandholm, L. Sorqvist, 12 requirements for Six Sigmasuccess, Six Sigma Forum Magazine 2 (2002) 17-22. [5] Ch.CH. Yang, An integrated model of TQM and GE SixSigma, International Journal of Six Sigma and Competitive Advantage 1 (2004) 97-111.[6] B. El-Haik, A. Shaout, Software Design for Six Sigma,John Wiley & Son, Hoboken, New Jersey, 2010.The Retraining Churn Data Mining Model in DMAIC Phases 1069[7]W. Bentley, P.T. Davis, Lean Six Sigma Secrets for theCIO, CRC Press, Boca Raton, Florida, 2010.[8]M. Kebisek, P. Schreiber, I. Halenar, Knowledgediscovery in databases and its application in manufacturing, in: Proceedings of the InternationalWorkshop “Innovation Information Technologies: Theory and Practice”, Dresden, Sep. 6-20, 2010, pp.204-207.[9]R. Halenar, Matlab possibilities for real time ETL method,Acta Technica Corviniensis: Bulletin of Engineering 5(2012) 51-53.[10]P. Vazan, P. Tanuska, M. Kebisek, The data miningusage in production system management, World Academy of Science, Engineering and Technology 7(2011) 1304-1308.[11]M. Kudla, M. Stremy, Alternatívne metódy ukladaniapološtruktúrovaných dát (Alternative methods for storingsemi-structured data,), in: Applied Natural Sciences 2007,International Conference on Applied Natural Sciences,Trnava, Slovak Republic, Nov. 7-9, 2007, pp. 404-409. [12]J. Han, M. Kamber, J. Pei, Data Mining Concepts andTechniques, Elsevier, Waltham, Massachusets, 2012. [13]I. Witten, E. Frank, M. Hall, Data Mining PracticalMachine Learning Tools and Techniques, Elsevier, Burlington, Massachusets, 2012.[14]J. Ahn, S. Han, Y. Lee, Customer churn analysis: Churndeterminants and mediation effects of partial defection inthe Korean mobile telecommunications service industry,Telecommunications Policy 30 (2006) 552-568.[15]K.Ch. Lee, N.Y. Jo, Bayesian network approach topredict mobile churn motivations: Emphasis on generalBayesian network, Markov blanket, and what-if simulation, in: Second International Conference, FGIT2010, Jeju Island, Korea, Dec. 13-15, 2010.[16]H. Kim, C. Yoon, Determinants of subscriber churn andcustomer loyalty in the Korean mobile telephony market,Telecommunications Policy 28 (2004) 751-765.[17]J. Hadden, A. Tiwari, R. Rajkumar, D. Ruta, Churnprediction: Does technology matter?, International Journal of Electrical and Computer Engineering 1 (2006)397-403.[18]IBM SPSS Modeler 14.2 Applications Guide, IBM,2011.[19]IBM SPSS Modeler 14.2 Algorithms Guide, IBM, 2011.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Information-Theoretic Bounds for Mobile Ad-hoc Networks Routing ProtocolsNianjun Zhou and Alhussein A.AbouzeidDept of Electrical,Computer and Systems EngineeringRensselaer Polytechnic InstituteTroy,New York12180,USA{zhoun,abouza}@Abstract.In this paper,we define the routing overhead as the amountof information needed to describe the changes in a network topology.Wederive a universal lower bound on the routing overhead in a mobile ad-hoc network.We also consider a prediction-based routing protocol thatattempts to minimize the routing overhead by predicting the changes inthe network topology from the previous mobility pattern of the nodes.We apply our approach to a mobile ad-hoc network that employs a dy-namic clustering algorithm,and derive the optimal cluster size that min-imizes the routing overhead,with and without mobility prediction.Webelieve that this work is a fundamental and essential step towards therigorous modeling,design and performance comparisons of protocols forad-hoc wireless networks by providing a universal reference performancecurve against which the overhead of different routing protocols can becompared.1IntroductionResearch on distributed multi-hop wireless networks,also known as wireless ad-hoc networks[1]has evolved from DARPA packet radio program during the early1970’s[2].Since wireless ad-hoc networks can be deployed rapidly in a non-organized(i.e.ad-hoc)fashion without requiring any existing infrastructure, they are expected tofind applications in a number of diverse settings[3,4].Much of the research in the area of ad-hoc networks has focused on developing routing protocols.Proactive routing protocols(e.g.[5,6,7])attempt to compute paths in advance and determine them continuously so that a route is readily available when a packet needs to be forwarded.Reactive routing protocols(e.g. [8,9,10])are based on a source initiated query/reply process and typically rely on theflooding of queries for route discovery.A network with a few relatively fast moving nodes favors reactive protocols while a network with many slowly moving nodes favors proactive protocols.The two strategies are combined in routing scheme.Hierarchical routing schemes based on the formation of a virtual backbone are developed in[12,13]. Correspondence Author:Alhussein A.Abouzeid,Rensselaer Polytechnic Institute, 110Eighth St,JEC-6038,Troy NY12180Tel:(518)276-6534,Fax:(518)276-4403H.-K.Kahng(Ed.):ICOIN2003,LNCS2662,pp.651–661,2003.c Springer-Verlag Berlin Heidelberg2003652Nianjun Zhou and Alhussein A.AbouzeidThe main advantage of hierarchal routing is that it overcomes scalability prob-lems by designating a node within a group of nodes to be responsible for routing, and thus only these nodes need to maintain routing information about the rest of the network.The main disadvantage is the overhead in the cluster mainte-nance operations(i.e.joining and leaving the clusters)which mainly depend on the degree of mobility of the nodes.This paper considers proactive hierarchal routing protocols.Considerable effort has been directed towards evaluating routing protocols [14,15,16,17,18,19,20,21].The procedure of evaluation relies on simulations of the protocol and comparing its performance against other existing protocols.There is a need for a universal reference performance curve that can tell us how good(or bad)the performance of a specific protocol really is.In coding the-ory,a channel coding algorithm is good if it achieves the Shannon capacity[22]. Similarly,we seek to derive a universal curve against which we can measure how good a routing protocol performs,in terms of minimizing the routing overhead, which is the amount of information needed to describe the changes in a dynamic network topology.Up to our knowledge,this paper is thefirst that attempts to derive a theoretical lower bound on the routing overhead of ad-hoc network pro-tocols.Related work in[23,24]do not consider the routing overhead in deriving the capacity of wireless networks.2Network Model2.1AssumptionsWe make the following assumptions about the network:(A1)The mobile nodes are identical;(A2)The mobile nodes are distinguishable;(A3)The number of mobile nodes in the network isfixed,denoted by N;(A4)The communica-tion region of interest isfixed and bounded.A1means that all the nodes have the same physical characteristics.A2means that each node is addressable by a node unique identifier-which we denote as NUI.Furthermore,We assume that the statistical node mobility patterns of individual nodes are independent and known.In this paper,we allow any type of mobility model as long as it allows a formulation using Markov chains.Regarding the self-organization of the network and the geographic distribu-tion of the nodes,the model can be viewed as a two-level abstraction.We assume that nodes move freely within a bounded region of space.The whole region is divided into sub-regions.For this preliminary work,we assume the number of sub-regions isfixed.There are two levels of hierarchy for nodes.Each region has its unique identifier-RUI.All the nodes of a sub-region form a cluster and a cluster head,which we call routing node.Routing node is selected at random from the nodes within the sub-region.It is possible that a sub-region becomes empty and thus will not have a cluster or a cluster head.The nodes belonging to the same sub-region communicate directly.The nodes belonging to different sub-regions communicate through the routing nodes.Thus,only two modes of direct(i.e.single-hop)communication are permissible:nodes within the same sub-region,and routing nodes of neighboring sub-regions(See Figure1).Information-Theoretic Bounds653Fig.1.A snapshot of the network topology.Blue(dark)nodes are routing nodes.There is one routing node in every sub-region.Sub-regions do not have to be rectangular or identical2.2DefinitionsFor clarity of presentation,we provide the formal definition of the terms used in the paper as follows.Routing Node:The cluster head for a sub-region, assumed to be selected randomly from the set of nodes that belong to the sub-region.There is only one routing node for a sub-region.If a routing node leaves a sub-region,a new routing node is selected from the remaining nodes in the same sub-region.Each routing node has an RUI associated with it;Regular Node: a node that is not currently a routing node.Any regular node can be selected as a routing node;Topology:is the connectivity relationship of the nodes as depicted in Figure1.Due to the dynamic behavior of the topology,it can be de-scribed as an instance of a random graph.An edge exists between two arbitrary nodes if single-hop communication between those two nodes is admissible,ac-cording to the rules presented earlier.Due to the mobility of the nodes,the edge of two nodes can be established or torn down randomly;Global Topology:The topology of the whole network.Local Topology:The topology of a sub-region; Topologies Cardinality:The total number of the topologies.The cardinality of the network topologies is used to calculate the minimum amount of infor-mation needed to describe a network snapshot without any extra knowledge; Information Overhead:The bits needed to distinguish one topology from another.3AnalysisAny algorithm for solving some problem must do some minimal amount of work. The most useful principle of this kind is that the outcome of a comparison between two items contains at most one bit of information.Hence,if there are m possible input strings,and an algorithm purports to identify which one it was given solely on the basis of comparisons between input symbols,then log2m comparisons are needed(all logarithms in this paper are base2and hence we will shortly write log instead of log2).This is because log m bits are necessary to specify one of the m possibilities[25].654Nianjun Zhou and Alhussein A.Abouzeid3.1Outline and NotationIn this section,we apply the above principle to derive a lower bound on the overhead of proactive hierarchal routing protocols withfixed number of clusters in a mobile wireless ad-hoc network.The steps followed are as follows:(a)Com-pute the number of different topologies possible for each local sub-region and for the whole network.These are termed local topologies cardinality and global topologies cardinality,and are denoted by denoted L and G,respectively;(b) Derive expressions for h,the average holding time for a node within a sub-region, and for H,the average holding time before a topology change;(c)Compute the minimum amount of information needed to keep track of the topology changes using the individual local information from the different sub-regions I L and from the global view of the network I G.(d)Finally,consider the effect of predicting the future locations of the nodes based on their mobility on the local I P L and global I P G routing overhead.3.2Cardinalities of Global and Local Network TopologiesTheorem1:Consider N mobile nodes randomly distributed over M sub-regions.Choose a routing node for each non-empty sub-region randomly from the set of nodes belonging to the sub-region.The total number of possible topologies is given by:G=min(N,M)i=1N!M!i!(M−i)!(N−i)!i N−i(1)Proof1:See Appendix.Theorem2:Consider N mobile nodes randomly distributed over M sub-regions, then the total number of local topologies for a given sub-region is:L=(2N−1)N+1(2) Proof:See Appendix.3.3Inferring Network Topology Dynamicsfrom Individual Node MobilityWe consider the following simple Markov mobility model.For a given time-stepτ,we assume that2the probability that a mobile node will stay in the same sub-region is0≤p0≤1,and leave its current sub-region is1−p0.We further assume that a node moves to any of the K neighboring nodes with equal1The result can be verified using a simple example with N=4and M=2,where it is easy to show using manual calculation that the total combination is56,which is the same as the result from(1).2This model follows from discretizing a continuous-time two-dimensional Markov pro-cess description of the individual node mobility.Information-Theoretic Bounds 655probability (random walk)1−p 0K .Thus,the probability distribution function ofthe node holding time at the same sub-region is geometric.For a given node,the mean holding time h =p 01−p 0.Since the individual nodes move independently,The probability p 1that a spe-cific topology does not change is equal to the probability that all nodes do not change their sub-regions.Assuming independent node mobility,p 1=p N 0.Hence,the average holding time for a topology is thusH =∞i =1i (1−p 1)p i 1=p 11−p 1=p N 01−p N 0(3)3.4Routing Overhead without Mobility PredictionThe information needed to identify a specific network topology from the set of all the possible topologies is the entropy of the set.Global Topology without Prediction:From (1)I G =log (G )(4)Since we do not have any knowledge of the topology probability distribution,we use the maximum entropy method [26]to infer it.From the proof of Theo-rem 1,we have shown that for a distribution r =(r 1,r 2,...,r M )of nodes for each sub-region,the total number of possible topologies isn (r,N )=N !r 1!r 2!...r M !M i =1g (r i )with M i =1r i =N (5)We have also shown that M i =1g (r i )reaches its maximum value when r =(r 1,r 2,...,r M )has a uniform distribution.In this casen (r,N )≤N !r 1!r 2!...r M ! N MM (6)It is easy to show after some algebraic manipulations thatM N ≤G ≤ N MM M N (7)and equivalently N log M ≤I G ≤N log M +M log N M(8)The result (8)can be interpreted as follows.The lower bound in (8)is the minimum information needed to describe the network without identifying which nodes are the routing nodes.The introduction of routing nodes increases the complexity of the network by M log N M .656Nianjun Zhou and Alhussein A.AbouzeidLocal Topology without Prediction:The entropy of a specific sub-region is log L.From(2),the sum of the information overhead required to maintain each of the local topologies,I L,is,I L=M log(2N−1N+1)(9) where the“M”coefficient comes from the fact that there are M local topologies.For large N,lim N→∞log(2N−1N+1)N=1(10)and henceI L≈MN;N 1(11)From(8)and(11),I L I G ≈Mlog M;N 1(12)A comment on the above result(12)is in order.It states that,in the limit N→∞,I L>I G(i.e.the sum of the entropies of the local topologies is larger than the entropy computed directly from the global network topology).The reason is that I G assumes the knowledge of N and M when computing the different possible topologies,while I L computes the local topology information locally(independent of the node distribution over the rest of the sub-regions) even though the local topologies of different sub-regions are not independent(a node may not exist in two different sub-regions).3.5Routing Overhead with Mobility PredictionGlobal topology with Prediction:The information needed to update the new location of a node(i.e.which sub-region it belongs to)given the knowledgeof the current location isI=−1p0log p0+(1−p0)log(1−p0K)(13)and henceNI≤I P G≤NI+M log NM(14)When p0=1/(K+1),I reaches its maximum value.From(8)and(14),I P G I G ≤log(K+1)log M;N>>1(15)For many practical scenarios,even the largest number of neighboring sub-regions is usually less than the total number of sub-regions.In this case,for large N,the above result states that using prediction to update the topology information will result in large savings in the routing overhead.Information-Theoretic Bounds657Fig.2.Minimum information over-head with and without prediction.M =5,p 0=0.9,k =3Fig.3.Minimum information over-head,with prediction.N =100,q =0.5,p 0=0.9and k =3.Op-timal number of sub-regions is 4Local Topology with Prediction:Assuming each node is equally likely tobelong to any of the sub-regions with probability 1M ,I P L ≤−MN 1M log 1M +(1−1M )log(1−1M) +M log N (16)Note that M log N bits are needed to specify the routing node for the cluster.For large M ,it is easy to show after some mathematical manipulations that,I P L ≤N log M +M log N ;M 1(17)From (11)and (17),I P L I L ≤N log M +M log N NM ;M 1;N 1(18)4Numerical Results and ApplicationsIn this section,we show some numerical results from the bounds derived in the previous section as well as an application of these bounds in finding the optimal number of sub-regions that minimizes the information overhead.Figure 2shows a numerical example for the lower bound on the routing over-head with and without prediction.Clearly,large amount of savings is achieved with prediction.Let q denote the probability that two arbitrary communicating nodes be-long to the same cluster.Let O (O P )denote the minimum routing overhead without(with)prediction.Then,O =q I L M +(1−q )I G (19)658Nianjun Zhou and Alhussein A.Abouzeid without prediction andO P=q I P LM+(1−q)I P G(20)Figure3depicts the results for an arbitrary network.Thefigure shows the op-timal number of sub-regions which is the one that requires the least amount of information exchange.Decreasing the number of sub-regions M increases the information overhead in maintaining the local cluster topology(more nodes per cluster)while increasing the number of sub-regions increases the overhead in maintaining the inter-cluster(global)topology,and the optimal point represents the balance between those two opposing factors.5ConclusionThis paper presented an information-theoretic approach to the analysis of rout-ing protocols.We applied the framework to derive lower bounds on the routing overhead in a mobile ad-hoc network,with and without mobility prediction.We quantified the amount of overhead needed for clustering,and also the amount of savings.By combining both,wefind the optimum number of clusters that min-imize the routing overhead.A number of future avenues of work remain.Due to the distributed nature of the network,the local topology information will be exchanged and used to infer the global network topology.Therefore,the mecha-nism in which the local topology information will be exchanged is an important topic that has not been addressed in this paper.Including this aspect may result in a tighter lower bound(i.e.a curve that is“above”the one derived in this paper).References[1]Z.J.Haas et al.eds.Wireless ad hoc networks.IEEE Journal on Selected Areasin Communications,17(8),August1999.[2]J.Jubin and J.D.Tornow.The DARPA packet radio network protocols.Pro-ceedings of the IEEE,75(1),1987.[3] D.L.Estrin et al.Embedded Everywhere:A research agenda for networked systemsof embedded computers.National Research Council,2001..[4]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E.Cayirci.Wireless sensornetworks:A puter Networks(Elsevier),38(4):393–422,March2002.[5] C.E.Perkins and P.Bhagwat.Highly dynamic Destination-Sequenced Distance-Vector routing(DSDV)for mobile computers.In Proceedings of ACM SIG-COMM’94,pages234–44,London,United Kingdom,October1994.[6]P.Jacquet,P.Muhlethaler,and A.Qayyum.Optimized link state routing proto-col.IETF MANET,Internet Draft,November1998.[7]S.Murthy and J.J.Garcia-Luna-Aceves.A routing protocol for packet radionetworks.In Proceedings of ACM International Conference on Mobile Computing and Networking(MOBICOM’95),pages86–94,Berkeley,CA,USA,December 1995.Information-Theoretic Bounds659 [8]V.D.Park and M.S.Corson.A highly adaptive distributed routing algorithm formobile wireless networks.In Proceedings of IEEE INFOCOM’97,volume3,pages 1405–13,Kobe,Japan,April1997.[9] D.B.Johnson and D.A.Maltz.Dynamic source routing in ad hoc wireless net-working.In T.Imielinski and H.Korth,editors,Mobile Computing.Kluwer,1996.[10] C.E.Perkins and E.M.Royer.Ad hoc on-demand distance vector routing.InProceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99),pages90–100,New Orleans,LA,USA,February1999.[11]M.R.Pearlman and Z.J.Haas.Determining the optimal configuration for thezone routing protocol.IEEE Journal on Selected Areas in Communications, 17(8):1395–414,August1999.[12] B.Das,R.Sivakumar,,and V.Bharghavan.Routing in ad hoc networks usinga spine.In Proceedings of International Conference on Computer Communicationsand Networks,pages34–9,Las Vegas,NV,USA,September1997.[13] B.Das,R.Sivakumar,,and V.Bharghavan.Routing in ad-hoc networks usingminimum connected dominating sets.In Proceedings of International Confer-ence on Communications(ICC’97),volume2,pages765–9,Montreal,Canada, September1997.[14]S.Ramanathan and M.Steenstrup.A survey of routing techniques for mobilecommunications networks.Journal of Special Topics in Mobile Networks and Applications(MONET),1(2):89–104,October1996.[15] E.Royer and C.-K.Toh.A review of current routing protocols for ad-hoc mobilewireless networks.IEEE Personal Communications Magazine,pages46–55,April 1999.[16]J.-C.Cano and P.Manzoni.A performance comparison of energy consumptionfor mobile ad hoc network routing protocols.In Proceedings of8th International Symposium on Modeling,Analysis and Simulation of Computer and Telecommu-nication Systems(MASCOTS),pages57–64,San Francisco,CA,USA,August 2000.[17]S.R.Das,R.Castaneda,and Yan Jiangtao.Simulation-based performance eval-uation of routing protocols for mobile ad hoc networks.Mobile Networks and Applications,5(3):179–89,2000.[18] C.E.Perkins,E.M.Royer,S.R.Das,and M.K.Marina.Performance compar-ison of two on-demand routing protocols for ad hoc networks.IEEE Personal Communications,8(1):16–28,February2001.[19] A.Boukerche.A simulation based study of on-demand routing protocols for ad hocwireless networks.In Proceedings of IEEE34th Annual Simulation Symposium, pages85–92,Seattle,WA,USA,April2001.[20] C.-K.Toh,H.Cobb,and D.A.Scott.Performance evaluation of battery-life-aware routing schemes for wireless ad hoc networks.In Proceedings of IEEE International Conference on Communications(ICC),volume9,pages2824–9, Helsinki,Finland,June2001.[21] A.Nasipuri,R.Burleson,B.Hughes,and J.Roberts.Performance of a hybridrouting protocol for mobile ad hoc networks.In Proceedings Tenth International Conference on Computer Communications and Networks,pages296–302,Scotts-dale,AZ,USA,October2001.[22] C.E.Shannon.A mathematical theory of communication(2parts).Bell SystemTechnical Journal,27:379–423,623–56,July and October1948./cm/ms/what/shannonday/shannon1948.pdf.[23]P.Gupta and P.R.Kumar.The capacity of wireless networks.IEEE Transactionson Information Theory,46(2):388–404,March2000.660Nianjun Zhou and Alhussein A.Abouzeid[24]M.Grossglauser and J.Bolot.On the relevance of long range dependence innetwork traffic.IEEE/ACM Transactions on Networking ,7(5):629–40,October 1999.[25] B.Weide.A survey of analysis techniques for discrete algorithms.ACM Comput-ing Surveys ,9(4):291–313,December 1977.[26] A.Papoulis and S.U.Pillai.Probability,Random Variables and Stochastic Pro-cesses .Cambrige studies in advanced mathematics.McGraw-Hill,4th.edition,2002.Appendix:Proof of TheoremsProof of Theorem1First,consider the case N ≥M .Let r =(r 1,r 2,...,r M )denote a specific organization of the nodes over the sub-regions.Then the pos-sible topologies for this case isn (r,N )=N !r 1!r 2!...r M !M i =1g (r i )where g (r )=r ∀r >0and g (0)=1.The function g (r )follows from the fact that we have r different ways of selecting a routing node for each subregion.Let R denote the set of all possible organizations of the nodes.Letf (x 1,x 2,...,x M )=(x 1+x 2+···+x M )N = r ∈R N !r 1!r 2!...r M !x r 11x r 22...x r M M (21)The total number of topologies in which there are no empty sub-regions can be calculated by taking the partial derivative of (21)w.r.t x i and then setting x i =1,which yields N !(N −M )!M N −M (22)Consider now that there is a single empty sub-region s .Then the total number of topologies can be calculated by taking the partial derivative of (21)w.r.t x i and then set x i =1∀i =s and x s =0,which yields N !(N −M +1)! M N −M +1(23)And since there are M 1ways of having a single empty sub-region,the total number of topologies with a single sub-region is thus M !1!(M −1)! N !(N −M +1)!M N −M +1(24)By induction,the number of topologies with exactly i empty sub-regions is M !i !(M −i )! N !(N −M +i )! M N −M +i ;0≤i ≤M −1(25)Information-Theoretic Bounds661 Summing over all i yields the result.Similar derivation applies for the case N<M(but notice in this case that the number of empty sub-regions will range from M−N to M−1).Proof of Theorem2Let r be the number of nodes in the sub-region.The total number of possible topologies is thusL=Nr=0N!r!(N−r)!g(r)(26)where g(r)has been defined in the proof of Theorem1(above).Letf(x1,x2)=(x1+x2)N=Nr=0N!r!(N−r)!x r1x N−r2Taking the partial derivative of both sides w.r.t x1,then setting x1=x2=1 yieldsN2N−1=Nr=1N!r!(N−r)!g(r)For the trivial case r=0(no nodes in the sub-region,there is only one possible topology.。