Ideal decompositions and computation of tensor normal forms

合集下载

ABSTRACT Progressive Simplicial Complexes

ABSTRACT Progressive Simplicial Complexes

Progressive Simplicial Complexes Jovan Popovi´c Hugues HoppeCarnegie Mellon University Microsoft ResearchABSTRACTIn this paper,we introduce the progressive simplicial complex(PSC) representation,a new format for storing and transmitting triangu-lated geometric models.Like the earlier progressive mesh(PM) representation,it captures a given model as a coarse base model together with a sequence of refinement transformations that pro-gressively recover detail.The PSC representation makes use of a more general refinement transformation,allowing the given model to be an arbitrary triangulation(e.g.any dimension,non-orientable, non-manifold,non-regular),and the base model to always consist of a single vertex.Indeed,the sequence of refinement transforma-tions encodes both the geometry and the topology of the model in a unified multiresolution framework.The PSC representation retains the advantages of PM’s.It defines a continuous sequence of approx-imating models for runtime level-of-detail control,allows smooth transitions between any pair of models in the sequence,supports progressive transmission,and offers a space-efficient representa-tion.Moreover,by allowing changes to topology,the PSC sequence of approximations achieves betterfidelity than the corresponding PM sequence.We develop an optimization algorithm for constructing PSC representations for graphics surface models,and demonstrate the framework on models that are both geometrically and topologically complex.CR Categories:I.3.5[Computer Graphics]:Computational Geometry and Object Modeling-surfaces and object representations.Additional Keywords:model simplification,level-of-detail representa-tions,multiresolution,progressive transmission,geometry compression.1INTRODUCTIONModeling and3D scanning systems commonly give rise to triangle meshes of high complexity.Such meshes are notoriously difficult to render,store,and transmit.One approach to speed up rendering is to replace a complex mesh by a set of level-of-detail(LOD) approximations;a detailed mesh is used when the object is close to the viewer,and coarser approximations are substituted as the object recedes[6,8].These LOD approximations can be precomputed Work performed while at Microsoft Research.Email:jovan@,hhoppe@Web:/jovan/Web:/hoppe/automatically using mesh simplification methods(e.g.[2,10,14,20,21,22,24,27]).For efficient storage and transmission,meshcompression schemes[7,26]have also been developed.The recently introduced progressive mesh(PM)representa-tion[13]provides a unified solution to these problems.In PM form,an arbitrary mesh M is stored as a coarse base mesh M0together witha sequence of n detail records that indicate how to incrementally re-fine M0into M n=M(see Figure7).Each detail record encodes theinformation associated with a vertex split,an elementary transfor-mation that adds one vertex to the mesh.In addition to defininga continuous sequence of approximations M0M n,the PM rep-resentation supports smooth visual transitions(geomorphs),allowsprogressive transmission,and makes an effective mesh compressionscheme.The PM representation has two restrictions,however.First,it canonly represent meshes:triangulations that correspond to orientable12-dimensional manifolds.Triangulated2models that cannot be rep-resented include1-d manifolds(open and closed curves),higherdimensional polyhedra(e.g.triangulated volumes),non-orientablesurfaces(e.g.M¨o bius strips),non-manifolds(e.g.two cubes joinedalong an edge),and non-regular models(i.e.models of mixed di-mensionality).Second,the expressiveness of the PM vertex splittransformations constrains all meshes M0M n to have the same topological type.Therefore,when M is topologically complex,the simplified base mesh M0may still have numerous triangles(Fig-ure7).In contrast,a number of existing simplification methods allowtopological changes as the model is simplified(Section6).Ourwork is inspired by vertex unification schemes[21,22],whichmerge vertices of the model based on geometric proximity,therebyallowing genus modification and component merging.In this paper,we introduce the progressive simplicial complex(PSC)representation,a generalization of the PM representation thatpermits topological changes.The key element of our approach isthe introduction of a more general refinement transformation,thegeneralized vertex split,that encodes changes to both the geometryand topology of the model.The PSC representation expresses anarbitrary triangulated model M(e.g.any dimension,non-orientable,non-manifold,non-regular)as the result of successive refinementsapplied to a base model M1that always consists of a single vertex (Figure8).Thus both geometric and topological complexity are recovered progressively.Moreover,the PSC representation retains the advantages of PM’s,including continuous LOD,geomorphs, progressive transmission,and model compression.In addition,we develop an optimization algorithm for construct-ing a PSC representation from a given model,as described in Sec-tion4.1The particular parametrization of vertex splits in[13]assumes that mesh triangles are consistently oriented.2Throughout this paper,we use the words“triangulated”and“triangula-tion”in the general dimension-independent sense.Figure 1:Illustration of a simplicial complex K and some of its subsets.2BACKGROUND2.1Concepts from algebraic topologyTo precisely define both triangulated models and their PSC repre-sentations,we find it useful to introduce some elegant abstractions from algebraic topology (e.g.[15,25]).The geometry of a triangulated model is denoted as a tuple (K V )where the abstract simplicial complex K is a combinatorial structure specifying the adjacency of vertices,edges,triangles,etc.,and V is a set of vertex positions specifying the shape of the model in 3.More precisely,an abstract simplicial complex K consists of a set of vertices 1m together with a set of non-empty subsets of the vertices,called the simplices of K ,such that any set consisting of exactly one vertex is a simplex in K ,and every non-empty subset of a simplex in K is also a simplex in K .A simplex containing exactly d +1vertices has dimension d and is called a d -simplex.As illustrated pictorially in Figure 1,the faces of a simplex s ,denoted s ,is the set of non-empty subsets of s .The star of s ,denoted star(s ),is the set of simplices of which s is a face.The children of a d -simplex s are the (d 1)-simplices of s ,and its parents are the (d +1)-simplices of star(s ).A simplex with exactly one parent is said to be a boundary simplex ,and one with no parents a principal simplex .The dimension of K is the maximum dimension of its simplices;K is said to be regular if all its principal simplices have the same dimension.To form a triangulation from K ,identify its vertices 1m with the standard basis vectors 1m ofm.For each simplex s ,let the open simplex smdenote the interior of the convex hull of its vertices:s =m:jmj =1j=1jjsThe topological realization K is defined as K =K =s K s .The geometric realization of K is the image V (K )where V :m 3is the linear map that sends the j -th standard basis vector jm to j 3.Only a restricted set of vertex positions V =1m lead to an embedding of V (K )3,that is,prevent self-intersections.The geometric realization V (K )is often called a simplicial complex or polyhedron ;it is formed by an arbitrary union of points,segments,triangles,tetrahedra,etc.Note that there generally exist many triangulations (K V )for a given polyhedron.(Some of the vertices V may lie in the polyhedron’s interior.)Two sets are said to be homeomorphic (denoted =)if there ex-ists a continuous one-to-one mapping between them.Equivalently,they are said to have the same topological type .The topological realization K is a d-dimensional manifold without boundary if for each vertex j ,star(j )=d .It is a d-dimensional manifold if each star(v )is homeomorphic to either d or d +,where d +=d:10.Two simplices s 1and s 2are d-adjacent if they have a common d -dimensional face.Two d -adjacent (d +1)-simplices s 1and s 2are manifold-adjacent if star(s 1s 2)=d +1.Figure 2:Illustration of the edge collapse transformation and its inverse,the vertex split.Transitive closure of 0-adjacency partitions K into connected com-ponents .Similarly,transitive closure of manifold-adjacency parti-tions K into manifold components .2.2Review of progressive meshesIn the PM representation [13],a mesh with appearance attributes is represented as a tuple M =(K V D S ),where the abstract simpli-cial complex K is restricted to define an orientable 2-dimensional manifold,the vertex positions V =1m determine its ge-ometric realization V (K )in3,D is the set of discrete material attributes d f associated with 2-simplices f K ,and S is the set of scalar attributes s (v f )(e.g.normals,texture coordinates)associated with corners (vertex-face tuples)of K .An initial mesh M =M n is simplified into a coarser base mesh M 0by applying a sequence of n successive edge collapse transforma-tions:(M =M n )ecol n 1ecol 1M 1ecol 0M 0As shown in Figure 2,each ecol unifies the two vertices of an edgea b ,thereby removing one or two triangles.The position of the resulting unified vertex can be arbitrary.Because the edge collapse transformation has an inverse,called the vertex split transformation (Figure 2),the process can be reversed,so that an arbitrary mesh M may be represented as a simple mesh M 0together with a sequence of n vsplit records:M 0vsplit 0M 1vsplit 1vsplit n 1(M n =M )The tuple (M 0vsplit 0vsplit n 1)forms a progressive mesh (PM)representation of M .The PM representation thus captures a continuous sequence of approximations M 0M n that can be quickly traversed for interac-tive level-of-detail control.Moreover,there exists a correspondence between the vertices of any two meshes M c and M f (0c f n )within this sequence,allowing for the construction of smooth vi-sual transitions (geomorphs)between them.A sequence of such geomorphs can be precomputed for smooth runtime LOD.In addi-tion,PM’s support progressive transmission,since the base mesh M 0can be quickly transmitted first,followed the vsplit sequence.Finally,the vsplit records can be encoded concisely,making the PM representation an effective scheme for mesh compression.Topological constraints Because the definitions of ecol and vsplit are such that they preserve the topological type of the mesh (i.e.all K i are homeomorphic),there is a constraint on the min-imum complexity that K 0may achieve.For instance,it is known that the minimal number of vertices for a closed genus g mesh (ori-entable 2-manifold)is (7+(48g +1)12)2if g =2(10if g =2)[16].Also,the presence of boundary components may further constrain the complexity of K 0.Most importantly,K may consist of a number of components,and each is required to appear in the base mesh.For example,the meshes in Figure 7each have 117components.As evident from the figure,the geometry of PM meshes may deteriorate severely as they approach topological lower bound.M 1;100;(1)M 10;511;(7)M 50;4656;(12)M 200;1552277;(28)M 500;3968690;(58)M 2000;14253219;(108)M 5000;029010;(176)M n =34794;0068776;(207)Figure 3:Example of a PSC representation.The image captions indicate the number of principal 012-simplices respectively and the number of connected components (in parenthesis).3PSC REPRESENTATION 3.1Triangulated modelsThe first step towards generalizing PM’s is to let the PSC repre-sentation encode more general triangulated models,instead of just meshes.We denote a triangulated model as a tuple M =(K V D A ).The abstract simplicial complex K is not restricted to 2-manifolds,but may in fact be arbitrary.To represent K in memory,we encode the incidence graph of the simplices using the following linked structures (in C++notation):struct Simplex int dim;//0=vertex,1=edge,2=triangle,...int id;Simplex*children[MAXDIM+1];//[0..dim]List<Simplex*>parents;;To render the model,we draw only the principal simplices ofK ,denoted (K )(i.e.vertices not adjacent to edges,edges not adjacent to triangles,etc.).The discrete attributes D associate amaterial identifier d s with each simplex s(K ).For the sake of simplicity,we avoid explicitly storing surface normals at “corners”(using a set S )as done in [13].Instead we let the material identifier d s contain a smoothing group field [28],and let a normal discontinuity (crease )form between any pair of adjacent triangles with different smoothing groups.Previous vertex unification schemes [21,22]render principal simplices of dimension 0and 1(denoted 01(K ))as points and lines respectively with fixed,device-dependent screen widths.To better approximate the model,we instead define a set A that associates an area a s A with each simplex s 01(K ).We think of a 0-simplex s 00(K )as approximating a sphere with area a s 0,and a 1-simplex s 1=j k 1(K )as approximating a cylinder (with axis (j k ))of area a s 1.To render a simplex s 01(K ),we determine the radius r model of the corresponding sphere or cylinder in modeling space,and project the length r model to obtain the radius r screen in screen pixels.Depending on r screen ,we render the simplex as a polygonal sphere or cylinder with radius r model ,a 2D point or line with thickness 2r screen ,or do not render it at all.This choice based on r screen can be adjusted to mitigate the overhead of introducing polygonal representations of spheres and cylinders.As an example,Figure 3shows an initial model M of 68,776triangles.One of its approximations M 500is a triangulated model with 3968690principal 012-simplices respectively.3.2Level-of-detail sequenceAs in progressive meshes,from a given triangulated model M =M n ,we define a sequence of approximations M i :M 1op 1M 2op 2M n1op n 1M nHere each model M i has exactly i vertices.The simplification op-erator M ivunify iM i +1is the vertex unification transformation,whichmerges two vertices (Section 3.3),and its inverse M igvspl iM i +1is the generalized vertex split transformation (Section 3.4).Thetuple (M 1gvspl 1gvspl n 1)forms a progressive simplicial complex (PSC)representation of M .To construct a PSC representation,we first determine a sequence of vunify transformations simplifying M down to a single vertex,as described in Section 4.After reversing these transformations,we renumber the simplices in the order that they are created,so thateach gvspl i (a i)splits the vertex a i K i into two vertices a i i +1K i +1.As vertices may have different positions in the different models,we denote the position of j in M i as i j .To better approximate a surface model M at lower complexity levels,we initially associate with each (principal)2-simplex s an area a s equal to its triangle area in M .Then,as the model is simplified,wekeep constant the sum of areas a s associated with principal simplices within each manifold component.When2-simplices are eventually reduced to principal1-simplices and0-simplices,their associated areas will provide good estimates of the original component areas.3.3Vertex unification transformationThe transformation vunify(a i b i midp i):M i M i+1takes an arbitrary pair of vertices a i b i K i+1(simplex a i b i need not be present in K i+1)and merges them into a single vertex a i K i. Model M i is created from M i+1by updating each member of the tuple(K V D A)as follows:K:References to b i in all simplices of K are replaced by refer-ences to a i.More precisely,each simplex s in star(b i)K i+1is replaced by simplex(s b i)a i,which we call the ancestor simplex of s.If this ancestor simplex already exists,s is deleted.V:Vertex b is deleted.For simplicity,the position of the re-maining(unified)vertex is set to either the midpoint or is left unchanged.That is,i a=(i+1a+i+1b)2if the boolean parameter midp i is true,or i a=i+1a otherwise.D:Materials are carried through as expected.So,if after the vertex unification an ancestor simplex(s b i)a i K i is a new principal simplex,it receives its material from s K i+1if s is a principal simplex,or else from the single parent s a i K i+1 of s.A:To maintain the initial areas of manifold components,the areasa s of deleted principal simplices are redistributed to manifold-adjacent neighbors.More concretely,the area of each princi-pal d-simplex s deleted during the K update is distributed toa manifold-adjacent d-simplex not in star(a ib i).If no suchneighbor exists and the ancestor of s is a principal simplex,the area a s is distributed to that ancestor simplex.Otherwise,the manifold component(star(a i b i))of s is being squashed be-tween two other manifold components,and a s is discarded. 3.4Generalized vertex split transformation Constructing the PSC representation involves recording the infor-mation necessary to perform the inverse of each vunify i.This inverse is the generalized vertex split gvspl i,which splits a0-simplex a i to introduce an additional0-simplex b i.(As mentioned previously, renumbering of simplices implies b i i+1,so index b i need not be stored explicitly.)Each gvspl i record has the formgvspl i(a i C K i midp i()i C D i C A i)and constructs model M i+1from M i by updating the tuple (K V D A)as follows:K:As illustrated in Figure4,any simplex adjacent to a i in K i can be the vunify result of one of four configurations in K i+1.To construct K i+1,we therefore replace each ancestor simplex s star(a i)in K i by either(1)s,(2)(s a i)i+1,(3)s and(s a i)i+1,or(4)s,(s a i)i+1and s i+1.The choice is determined by a split code associated with s.Thesesplit codes are stored as a code string C Ki ,in which the simplicesstar(a i)are sortedfirst in order of increasing dimension,and then in order of increasing simplex id,as shown in Figure5. V:The new vertex is assigned position i+1i+1=i ai+()i.Theother vertex is given position i+1ai =i ai()i if the boolean pa-rameter midp i is true;otherwise its position remains unchanged.D:The string C Di is used to assign materials d s for each newprincipal simplex.Simplices in C Di ,as well as in C Aibelow,are sorted by simplex dimension and simplex id as in C Ki. A:During reconstruction,we are only interested in the areas a s fors01(K).The string C Ai tracks changes in these areas.Figure4:Effects of split codes on simplices of various dimensions.code string:41422312{}Figure5:Example of split code encoding.3.5PropertiesLevels of detail A graphics application can efficiently transitionbetween models M1M n at runtime by performing a sequence ofvunify or gvspl transformations.Our current research prototype wasnot designed for efficiency;it attains simplification rates of about6000vunify/sec and refinement rates of about5000gvspl/sec.Weexpect that a careful redesign using more efficient data structureswould significantly improve these rates.Geomorphs As in the PM representation,there exists a corre-spondence between the vertices of the models M1M n.Given acoarser model M c and afiner model M f,1c f n,each vertexj K f corresponds to a unique ancestor vertex f c(j)K cfound by recursively traversing the ancestor simplex relations:f c(j)=j j cf c(a j1)j cThis correspondence allows the creation of a smooth visual transi-tion(geomorph)M G()such that M G(1)equals M f and M G(0)looksidentical to M c.The geomorph is defined as the modelM G()=(K f V G()D f A G())in which each vertex position is interpolated between its originalposition in V f and the position of its ancestor in V c:Gj()=()fj+(1)c f c(j)However,we must account for the special rendering of principalsimplices of dimension0and1(Section3.1).For each simplexs01(K f),we interpolate its area usinga G s()=()a f s+(1)a c swhere a c s=0if s01(K c).In addition,we render each simplexs01(K c)01(K f)using area a G s()=(1)a c s.The resultinggeomorph is visually smooth even as principal simplices are intro-duced,removed,or change dimension.The accompanying video demonstrates a sequence of such geomorphs.Progressive transmission As with PM’s,the PSC representa-tion can be progressively transmitted by first sending M 1,followed by the gvspl records.Unlike the base mesh of the PM,M 1always consists of a single vertex,and can therefore be sent in a fixed-size record.The rendering of lower-dimensional simplices as spheres and cylinders helps to quickly convey the overall shape of the model in the early stages of transmission.Model compression Although PSC gvspl are more general than PM vsplit transformations,they offer a surprisingly concise representation of M .Table 1lists the average number of bits re-quired to encode each field of the gvspl records.Using arithmetic coding [30],the vertex id field a i requires log 2i bits,and the boolean parameter midp i requires 0.6–0.9bits for our models.The ()i delta vector is quantized to 16bitsper coordinate (48bits per),and stored as a variable-length field [7,13],requiring about 31bits on average.At first glance,each split code in the code string C K i seems to have 4possible outcomes (except for the split code for 0-simplex a i which has only 2possible outcomes).However,there exist constraints between these split codes.For example,in Figure 5,the code 1for 1-simplex id 1implies that 2-simplex id 1also has code 1.This in turn implies that 1-simplex id 2cannot have code 2.Similarly,code 2for 1-simplex id 3implies a code 2for 2-simplex id 2,which in turn implies that 1-simplex id 4cannot have code 1.These constraints,illustrated in the “scoreboard”of Figure 6,can be summarized using the following two rules:(1)If a simplex has split code c12,all of its parents havesplit code c .(2)If a simplex has split code 3,none of its parents have splitcode 4.As we encode split codes in C K i left to right,we apply these two rules (and their contrapositives)transitively to constrain the possible outcomes for split codes yet to be ing arithmetic coding with uniform outcome probabilities,these constraints reduce the code string length in Figure 6from 15bits to 102bits.In our models,the constraints reduce the code string from 30bits to 14bits on average.The code string is further reduced using a non-uniform probability model.We create an array T [0dim ][015]of encoding tables,indexed by simplex dimension (0..dim)and by the set of possible (constrained)split codes (a 4-bit mask).For each simplex s ,we encode its split code c using the probability distribution found in T [s dim ][s codes mask ].For 2-dimensional models,only 10of the 48tables are non-trivial,and each table contains at most 4probabilities,so the total size of the probability model is small.These encoding tables reduce the code strings to approximately 8bits as shown in Table 1.By comparison,the PM representation requires approximately 5bits for the same information,but of course it disallows topological changes.To provide more intuition for the efficiency of the PSC repre-sentation,we note that capturing the connectivity of an average 2-manifold simplicial complex (n vertices,3n edges,and 2n trian-gles)requires ni =1(log 2i +8)n (log 2n +7)bits with PSC encoding,versus n (12log 2n +95)bits with a traditional one-way incidence graph representation.For improved compression,it would be best to use a hybrid PM +PSC representation,in which the more concise PM vertex split encoding is used when the local neighborhood is an orientableFigure 6:Constraints on the split codes for the simplices in the example of Figure 5.Table 1:Compression results and construction times.Object#verts Space required (bits/n )Trad.Con.n K V D Arepr.time a i C K i midp i (v )i C D i C Ai bits/n hrs.drumset 34,79412.28.20.928.1 4.10.453.9146.1 4.3destroyer 83,79913.38.30.723.1 2.10.347.8154.114.1chandelier 36,62712.47.60.828.6 3.40.853.6143.6 3.6schooner 119,73413.48.60.727.2 2.5 1.353.7148.722.2sandal 4,6289.28.00.733.4 1.50.052.8123.20.4castle 15,08211.0 1.20.630.70.0-43.5-0.5cessna 6,7959.67.60.632.2 2.50.152.6132.10.5harley 28,84711.97.90.930.5 1.40.453.0135.7 3.52-dimensional manifold (this occurs on average 93%of the time in our examples).To compress C D i ,we predict the material for each new principalsimplex sstar(a i )star(b i )K i +1by constructing an ordered set D s of materials found in star(a i )K i .To improve the coding model,the first materials in D s are those of principal simplices in star(s )K i where s is the ancestor of s ;the remainingmaterials in star(a i )K i are appended to D s .The entry in C D i associated with s is the index of its material in D s ,encoded arithmetically.If the material of s is not present in D s ,it is specified explicitly as a global index in D .We encode C A i by specifying the area a s for each new principalsimplex s 01(star(a i )star(b i ))K i +1.To account for this redistribution of area,we identify the principal simplex from which s receives its area by specifying its index in 01(star(a i ))K i .The column labeled in Table 1sums the bits of each field of the gvspl records.Multiplying by the number n of vertices in M gives the total number of bits for the PSC representation of the model (e.g.500KB for the destroyer).By way of compari-son,the next column shows the number of bits per vertex required in a traditional “IndexedFaceSet”representation,with quantization of 16bits per coordinate and arithmetic coding of face materials (3n 16+2n 3log 2n +materials).4PSC CONSTRUCTIONIn this section,we describe a scheme for iteratively choosing pairs of vertices to unify,in order to construct a PSC representation.Our algorithm,a generalization of [13],is time-intensive,seeking high quality approximations.It should be emphasized that many quality metrics are possible.For instance,the quadric error metric recently introduced by Garland and Heckbert [9]provides a different trade-off of execution speed and visual quality.As in [13,20],we first compute a cost E for each candidate vunify transformation,and enter the candidates into a priority queueordered by ascending cost.Then,in each iteration i =n 11,we perform the vunify at the front of the queue and update the costs of affected candidates.4.1Forming set of candidate vertex pairs In principle,we could enter all possible pairs of vertices from M into the priority queue,but this would be prohibitively expensive since simplification would then require at least O(n2log n)time.Instead, we would like to consider only a smaller set of candidate vertex pairs.Naturally,should include the1-simplices of K.Additional pairs should also be included in to allow distinct connected com-ponents of M to merge and to facilitate topological changes.We considered several schemes for forming these additional pairs,in-cluding binning,octrees,and k-closest neighbor graphs,but opted for the Delaunay triangulation because of its adaptability on models containing components at different scales.We compute the Delaunay triangulation of the vertices of M, represented as a3-dimensional simplicial complex K DT.We define the initial set to contain both the1-simplices of K and the subset of1-simplices of K DT that connect vertices in different connected components of K.During the simplification process,we apply each vertex unification performed on M to as well in order to keep consistent the set of candidate pairs.For models in3,star(a i)has constant size in the average case,and the overall simplification algorithm requires O(n log n) time.(In the worst case,it could require O(n2log n)time.)4.2Selecting vertex unifications fromFor each candidate vertex pair(a b),the associated vunify(a b):M i M i+1is assigned the costE=E dist+E disc+E area+E foldAs in[13],thefirst term is E dist=E dist(M i)E dist(M i+1),where E dist(M)measures the geometric accuracy of the approximate model M.Conceptually,E dist(M)approximates the continuous integralMd2(M)where d(M)is the Euclidean distance of the point to the closest point on M.We discretize this integral by defining E dist(M)as the sum of squared distances to M from a dense set of points X sampled from the original model M.We sample X from the set of principal simplices in K—a strategy that generalizes to arbitrary triangulated models.In[13],E disc(M)measures the geometric accuracy of disconti-nuity curves formed by a set of sharp edges in the mesh.For the PSC representation,we generalize the concept of sharp edges to that of sharp simplices in K—a simplex is sharp either if it is a boundary simplex or if two of its parents are principal simplices with different material identifiers.The energy E disc is defined as the sum of squared distances from a set X disc of points sampled from sharp simplices to the discontinuity components from which they were sampled.Minimization of E disc therefore preserves the geom-etry of material boundaries,normal discontinuities(creases),and triangulation boundaries(including boundary curves of a surface and endpoints of a curve).We have found it useful to introduce a term E area that penalizes surface stretching(a more sophisticated version of the regularizing E spring term of[13]).Let A i+1N be the sum of triangle areas in the neighborhood star(a i)star(b i)K i+1,and A i N the sum of triangle areas in star(a i)K i.The mean squared displacement over the neighborhood N due to the change in area can be approx-imated as disp2=12(A i+1NA iN)2.We let E area=X N disp2,where X N is the number of points X projecting in the neighborhood. To prevent model self-intersections,the last term E fold penalizes surface folding.We compute the rotation of each oriented triangle in the neighborhood due to the vertex unification(as in[10,20]).If any rotation exceeds a threshold angle value,we set E fold to a large constant.Unlike[13],we do not optimize over the vertex position i a, but simply evaluate E for i a i+1a i+1b(i+1a+i+1b)2and choose the best one.This speeds up the optimization,improves model compression,and allows us to introduce non-quadratic energy terms like E area.5RESULTSTable1gives quantitative results for the examples in thefigures and in the video.Simplification times for our prototype are measured on an SGI Indigo2Extreme(150MHz R4400).Although these times may appear prohibitive,PSC construction is an off-line task that only needs to be performed once per model.Figure9highlights some of the benefits of the PSC representa-tion.The pearls in the chandelier model are initially disconnected tetrahedra;these tetrahedra merge and collapse into1-d curves in lower-complexity approximations.Similarly,the numerous polyg-onal ropes in the schooner model are simplified into curves which can be rendered as line segments.The straps of the sandal model initially have some thickness;the top and bottom sides of these straps merge in the simplification.Also note the disappearance of the holes on the sandal straps.The castle example demonstrates that the original model need not be a mesh;here M is a1-dimensional non-manifold obtained by extracting edges from an image.6RELATED WORKThere are numerous schemes for representing and simplifying tri-angulations in computer graphics.A common special case is that of subdivided2-manifolds(meshes).Garland and Heckbert[12] provide a recent survey of mesh simplification techniques.Several methods simplify a given model through a sequence of edge col-lapse transformations[10,13,14,20].With the exception of[20], these methods constrain edge collapses to preserve the topological type of the model(e.g.disallow the collapse of a tetrahedron into a triangle).Our work is closely related to several schemes that generalize the notion of edge collapse to that of vertex unification,whereby separate connected components of the model are allowed to merge and triangles may be collapsed into lower dimensional simplices. Rossignac and Borrel[21]overlay a uniform cubical lattice on the object,and merge together vertices that lie in the same cubes. Schaufler and St¨u rzlinger[22]develop a similar scheme in which vertices are merged using a hierarchical clustering algorithm.Lue-bke[18]introduces a scheme for locally adapting the complexity of a scene at runtime using a clustering octree.In these schemes, the approximating models correspond to simplicial complexes that would result from a set of vunify transformations(Section3.3).Our approach differs in that we order the vunify in a carefully optimized sequence.More importantly,we define not only a simplification process,but also a new representation for the model using an en-coding of gvspl=vunify1transformations.Recent,independent work by Schmalstieg and Schaufler[23]de-velops a similar strategy of encoding a model using a sequence of vertex split transformations.Their scheme differs in that it tracks only triangles,and therefore requires regular,2-dimensional trian-gulations.Hence,it does not allow lower-dimensional simplices in the model approximations,and does not generalize to higher dimensions.Some simplification schemes make use of an intermediate vol-umetric representation to allow topological changes to the model. He et al.[11]convert a mesh into a binary inside/outside function discretized on a three-dimensional grid,low-passfilter this function,。

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布CCF(China Computer Federation中国计算机学会)于2010年8月发布了第一版推荐的国际学术会议和期刊目录,一年来,经过业内专家的反馈和修订,于日前推出了修订版,现将修订版予以发布。

本次修订对上一版内容进行了充实,一些会议和期刊的分类排行进行了调整,目录包括:计算机科学理论、计算机体系结构与高性能计算、计算机图形学与多媒体、计算机网络、交叉学科、人工智能与模式识别、软件工程/系统软件/程序设计语言、数据库/数据挖掘/内容检索、网络与信息安全、综合刊物等方向的国际学术会议及期刊目录,供国内高校和科研单位作为学术评价的参考依据。

目录中,刊物和会议分为A、B、C三档。

A类表示国际上极少数的顶级刊物和会议,鼓励我国学者去突破;B类是指国际上著名和非常重要的会议、刊物,代表该领域的较高水平,鼓励国内同行投稿;C类指国际上重要、为国际学术界所认可的会议和刊物。

这些分类目录每年将学术界的反馈和意见,进行修订,并逐步增加研究方向。

中国计算机学会推荐国际学术刊物(网络/信息安全)一、 A类序号刊物简称刊物全称出版社网址1. TIFS IEEE Transactions on Information Forensics andSecurity IEEE /organizations/society/sp/tifs.html2. TDSC IEEE Transactions on Dependable and Secure ComputingIEEE /tdsc/3. TISSEC ACM Transactions on Information and SystemSecurity ACM /二、 B类序号刊物简称刊物全称出版社网址1. Journal of Cryptology Springer /jofc/jofc.html2. Journal of Computer SecurityIOS Press /jcs/3. IEEE Security & Privacy IEEE/security/4. Computers &Security Elsevier http://www.elsevier.nl/inca/publications/store/4/0/5/8/7/7/5. JISecJournal of Internet Security NahumGoldmann. /JiSec/index.asp6. Designs, Codes andCryptography Springer /east/home/math/numbers?SGWID=5 -10048-70-35730330-07. IET Information Security IET /IET-IFS8. EURASIP Journal on InformationSecurity Hindawi /journals/is三、C类序号刊物简称刊物全称出版社网址1. CISDA Computational Intelligence for Security and DefenseApplications IEEE /2. CLSR Computer Law and SecurityReports Elsevier /science/journal/026736493. Information Management & Computer Security MCB UniversityPress /info/journals/imcs/imcs.jsp4. Information Security TechnicalReport Elsevier /locate/istr中国计算机学会推荐国际学术会议(网络/信息安全方向)一、A类序号会议简称会议全称出版社网址1. S&PIEEE Symposium on Security and Privacy IEEE /TC/SP-Index.html2. CCSACM Conference on Computer and Communications Security ACM /sigs/sigsac/ccs/3. CRYPTO International Cryptology Conference Springer-Verlag /conferences/二、B类序号会议简称会议全称出版社网址1. SecurityUSENIX Security Symposium USENIX /events/2. NDSSISOC Network and Distributed System Security Symposium Internet Society /isoc/conferences/ndss/3. EurocryptAnnual International Conference on the Theory and Applications of Cryptographic Techniques Springer /conferences/eurocrypt2009/4. IH Workshop on Information Hiding Springer-Verlag /~rja14/ihws.html5. ESORICSEuropean Symposium on Research in Computer Security Springer-Verlag as.fr/%7Eesorics/6. RAIDInternational Symposium on Recent Advances in Intrusion Detection Springer-Verlag /7. ACSACAnnual Computer Security Applications ConferenceIEEE /8. DSNThe International Conference on Dependable Systems and Networks IEEE/IFIP /9. CSFWIEEE Computer Security Foundations Workshop /CSFWweb/10. TCC Theory of Cryptography Conference Springer-Verlag /~tcc08/11. ASIACRYPT Annual International Conference on the Theory and Application of Cryptology and Information Security Springer-Verlag /conferences/ 12. PKC International Workshop on Practice and Theory in Public Key Cryptography Springer-Verlag /workshops/pkc2008/三、 C类序号会议简称会议全称出版社网址1. SecureCommInternational Conference on Security and Privacy in Communication Networks ACM /2. ASIACCSACM Symposium on Information, Computer and Communications Security ACM .tw/asiaccs/3. ACNSApplied Cryptography and Network Security Springer-Verlag /acns_home/4. NSPWNew Security Paradigms Workshop ACM /current/5. FC Financial Cryptography Springer-Verlag http://fc08.ifca.ai/6. SACACM Symposium on Applied Computing ACM /conferences/sac/ 7. ICICS International Conference on Information and Communications Security Springer /ICICS06/8. ISC Information Security Conference Springer /9. ICISCInternational Conference on Information Security and Cryptology Springer /10. FSE Fast Software Encryption Springer http://fse2008.epfl.ch/11. WiSe ACM Workshop on Wireless Security ACM /~adrian/wise2004/12. SASN ACM Workshop on Security of Ad-Hoc and Sensor Networks ACM /~szhu/SASN2006/13. WORM ACM Workshop on Rapid Malcode ACM /~farnam/worm2006.html14. DRM ACM Workshop on Digital Rights Management ACM /~drm2007/15. SEC IFIP International Information Security Conference Springer http://sec2008.dti.unimi.it/16. IWIAIEEE International Information Assurance Workshop IEEE /17. IAWIEEE SMC Information Assurance Workshop IEEE /workshop18. SACMATACM Symposium on Access Control Models and Technologies ACM /19. CHESWorkshop on Cryptographic Hardware and Embedded Systems Springer /20. CT-RSA RSA Conference, Cryptographers' Track Springer /21. DIMVA SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment IEEE /dimva200622. SRUTI Steps to Reducing Unwanted Traffic on the Internet USENIX /events/23. HotSecUSENIX Workshop on Hot Topics in Security USENIX /events/ 24. HotBots USENIX Workshop on Hot Topics in Understanding Botnets USENIX /event/hotbots07/tech/25. ACM MM&SEC ACM Multimedia and Security Workshop ACM。

科技英语写作作业

科技英语写作作业

1.理想的调制方法(modulation scheme)与现有方法相比具有带宽(bandwidth)小,实现简单,成本低和误码率(error rate)低的优点。

Ideal modulation schemes have the advantage over now existed methods of narrow bandwidth, simple realization, low costs and2.晶体管transistor确实能放大信号,但它究竟能放大信号多少倍取决于该晶体管类型。

Transistor can magnify signals indeed, but how many times it can do depends on its type.3.在基极(base)接地的情况下,Q5的阻抗(impedance)很高。

With the base grounded, the impedance of Q5 is large. 4.为了让读者更好地理解通讯系统,就必须对信息论information theory有深入的了解。

In order for the readers to know telecommunication system better, we must have a deep understanding of information theory.5.各种集成电路IC的产量较1998年增加了4倍。

The yield of various IC is four times as much as it was in 1988.6.该芯片(dice)是直径diameter为零点零几厘米的一个小方块square。

This dice is a small square with the diameter of several hundredths centimeters.7.传输线transmission line屏蔽(shielding)越好,传输效果越好,传输距离就越远,这是通信常识。

海军航空大学学员勇夺2019年全国大学生物联网设计竞赛桂冠

海军航空大学学员勇夺2019年全国大学生物联网设计竞赛桂冠

•342.海军航空工程学院学报第34卷Chinese)[12] 崔伟成,李伟,孟凡磊,等.局部特征尺度分解与局部均值分解的对比研究[J].机械传动,2017,4(10):10-15.CUI WEICHENG, LI WEI , MENG FANLEI, et al. Study on the contrast between local characteristic-scale decom­position and local mean decomposition[J]. Journal of Me­chanical Transmission,2017,4(10):10-15. (in Chinese) [13] WU Z, HUANG N E. A study of the characteristics ofwhite noise using the empirical mode decomposition method[J]. Proceedings of the Royal Society of London A:Mathematical, Physical and Engineering Sciences,2004,460:1597-1611.[14] 周德忠.互相关系数的分解研究m.武汉钢铁学院学报,1995,18(4) :442-443.ZHOU DEZHONG. On decomposition of cross-correla­tion coefficientsfJ]. Journal of Wuhan Iron and Steel Insti­tute ,1995,18(4): 442-443. (in Chinese)[15] HUANG N E. Computing instantaneous frequency bynormalizing Hilbert transform: U.S., Patent 6901353[P].2005-5-31.[16] DEERING R, KAISER J F. The use of a masking signalto improve empirical mode decomposition[C]//Intema- tional Conference on Acoustics, Speech, and Signal Pro­cessing. Philadelphia : IEEE, 2005 : 485-488.[17] DELECHELLE E, LEMOINE J, NIANG O. Empiricalmode decomposition:an analytical approach for sifting process[J]. IEEE Signal Processing Letters, 2005, 12(10 : 764-767.Improved Algorithm of Local Characteristic-Scale DecompositionSHENG Pei1, CUI Weicheng1, YANG Yongbin2, XU Aiqiang1(1. Naval Aviation University, Yantai Shandong 264001, China;2. The 91291s1 Unit of PLA, Sanya Hainan 572000, China)Abstract: An improved algorithm was proposed focusing on the problem of envelope curves estimated without considering convexity when local characteristic-scale decomposition was used. Firstly, the cubic spline interpolation method was used to estimate the mean points. Secondly, the implementation steps of the improved algorithm were given by referring to the standard algorithm. Finally, the effectiveness was illustrated by simulation examples.Key words :local characteristic-scale decomposition; empirical mode decomposition; local mean decomposition简讯:海军航空大学学员勇夺2019年全国大学生物联网设计竞赛桂冠8月23日,2019年全国大学生物联网设计竞赛(华为杯)全国总决赛在四川大学落下帷幕,海军航空大学岸 防兵学院信息安全俱乐部研究生和本科生组成的2支参赛队伍摘得桂冠,双双荣获全国一等奖。

对称矩阵特征值分解的FPGA实现

对称矩阵特征值分解的FPGA实现

对称矩阵特征值分解的FPGA实现刘永勤【摘要】针对应用于MUSIC DOA估计的数据协方差矩阵特征值分解的需要,给出一个特征值分解的硬件实现方案,并阐述了基本思想.设计采用基于CORDIC的Jacobi算法实现实对称矩阵特征值分解,并在FPGA上对5×5矩阵进行了硬件仿真,经过理论分析和实验验证,该设计可以计算出全部特征值和特征向量,为MUSIC算法的FPGA实现奠定了基础.%Aiming at the needs of the data covariance matrix eigenvalue decomposition used in DOA estimation such as MUSIC,a hardware implementation scheme of the eigenvalue decomposition is provided and the basic idea is described in this paper. The Jacobi algorithm based on CORDIC is adopted in the design to achieve real symmetric matrix eigenvalue decomposi-tion,and conduct the hardware emulation for 5×5 matrix in FPGA. The results of theoretical analysis and experimental verifica-tion show that the design can calculate all eigenvalues and eigenvectors,and has laid the foundation for FPGA implementation of MUSIC algorithm.【期刊名称】《现代电子技术》【年(卷),期】2017(040)012【总页数】4页(P15-18)【关键词】MUSIC算法;特征值分解;Jacobi算法;CORDIC算法;FPGA【作者】刘永勤【作者单位】西安理工大学自动化与信息工程学院,陕西西安 710048;渭南师范学院数学与物理学院,陕西渭南 714099【正文语种】中文【中图分类】TN911-34;TN929.1多信号分类(MUSIC)[1]算法是波达方向(DOA)估计技术中最具代表性的高分辨力算法之一,因其突破了传统方法的瑞利极限而广受人们青睐。

On quasicrystal Lie algebras

On quasicrystal Lie algebras

On quasicrystal Lie algebrasVolodymyr Mazorchuk2000Mathematics Subject Classification:17B68,17B10,17B81Key words:aperiodic Virasoro algebra,highest weight module,Shapovalov form,Kac determinantAbstractWe realize the aperiodic Witt and Virasoro algebras as well as other quasicrystal Lie algebras as factoralgebras of some subalgebras of the higher rank Virasoro alge-bras.This realization allows us to generalize the notion of quasicrystal Lie algebras.In the case when the constructed algebra admits a conjugation,we compute the Kacdeterminant for the Shapovalov form on the corresponding Verma modules.In thecase of the aperiodic Virasoro algebra this proves the conjecture of R.Twarock.1IntroductionThis paper has grown up from my attempt to understand the recently introduced notion of quasicrystal Lie algebras and the aperiodic Witt and Virasoro algebras,[PPT,T1]. These algebras form a new family of infinite-dimensional Lie algebras,whose generators are indexed by points of an aperiodic set(which is in fact a one-dimensional cut-and-project quasicrystal,an object,intensively studied by many authors,see e.g.[Ka,K,R] and references therein).Quasicrystal Lie algebras and their representations were studied in[PT,PPT,T1]and in[T2,T3]some applications of these algebras to construction of some integrable models in quantum mechanics were given.However,there are many important questions about the quasicrystal Lie algebras,which are still open.For example,in[T1]the author constructs a triangular decomposition for the aperiodic Virasoro algebra,hence constructing Verma modules,and conjectures a formula for the Kac determinant of the Shapovalov form on these modules.This formula in important both for description of simple highest weight modules and for picking up those of them which can be unitarizable,which is the question of primary interest in physical applications.It was clear from the veryfirst definition of quasicrystal Lie algebras,that this notion should be closely connected with the notion of the higher rank Virasoro algebras,defined in [PZ].The major difference between these algebras is that the indexing set for quasicrystal Lie algebras is a discreet subset of R while for the higher rank Virasoro algebras the corresponding set is everywhere dense.In the present paper we establish this connection1by realizing quasicrystal Lie algebras as factoralgebras of some subalgebras of the higher rank Virasoro algebras.This realization allows us to generalize quasicrystal algebras in several directions,preserving the property to have a discreet indexing set.Moreover,the notion and construction of triangular decomposition for these algebras appears naturally in this framework.Further,we discuss the existence of conjugation on constructed algebras, which pairs the components of the positive and negative part.In the case,when such pairing exists,the definition of the Shapovalov form on Verma modules(see[S,MP])is straightforward and we compute the Kac determinant(see[S,KK,MP,KR])of this form. In the case of the aperiodic Virasoro algebras this proves[T1,Conjecture V.7].The paper is organized as follows:in Section2and Section3we remind the definitions of quasicrystal Lie algebras and higher rank Virasoro algebras.We give a realization of quasicrystal Lie algebras as factoralgebras of certain subalgebras of the higher rank Virasoro algebras in Section4and use it to construct parabolic and triangular decompositions of our algebras in Section5.In Section6we study the Verma modules and,in particular, calculate the determinant of the Shapovalov form on them.Wefinish with discussing several generalizations of our construction in Section7and Section8.2Quasicrystal Lie algebras√Denote by(·)#the unique non-trivial automorphism of thefield Q(5.LetΩbe a non-empty,connected and bounded real set, whose set of inner points does not contain0.Setτ=15).Then the quasicrystal Σ(Ω),associated withΩ,is the set of all x∈Z[τ],such that x#∈Ω.The quasicrystal Lie algebra L(Ω),associated withΩ,is defined as follows(see[PPT]):it is generated over F by L x,x∈Σ(Ω),with the Lie bracket defined via[L x,L y]= (y−x)L x+y,x+y∈Σ(Ω)0,otherwise.To define the aperiodic Witt and Virasoro algebras as it is done in[T1],we introduce the mapϕ:Z[τ]→Z,which sends x=a+bτtoϕ(x)=b.Then the aperiodic Witt algebra AW([0,1],F)is generated over F by L x,x∈Σ([0,1]),with the Lie bracket defined via[L x,L y]= (ϕ(y)−ϕ(x))L x+y,x+y∈Σ([0,1])0,otherwise.By[T1,Theorem III.4],the algebra AW([0,1],F)admits the unique central extension AV([0,1],F),called the aperiodic Virasoro algebra,which is generated over F by L x,x∈Σ([0,1]),and c,with the Lie bracket defined via[L x,L y]= (ϕ(y)−ϕ(x))L x+y+δϕ(x),−ϕ(y)ϕ(x)3−ϕ(x)33The higher rank Virasoro algebrasLet P denote the free abelian group Z k offinite rank k andψ:P→(F,+)be a group monomorphism.The rank k Virasoro algebra V(ψ,F),associated withψ,is generated over F by elements e x,x∈P,and central c,with the Lie bracket defined viaψ(x)3−ψ(x)3[e x,e y]=(ψ(y)−ψ(x))e x+y+δx,−yadmissible order on P.Indeed,<is obviously antisymmetric,antireflexiv and transitive.So,it is a partial order.But from the definition it also follows immediately,that<is linear. Further,for any a<b in P and c∈P we have(ψ(a+c)−ψ(b+c))#=(ψ(a+c−b−c))#=(ψ(a−b))#=(ψ(a)−ψ(b))#<0and hence a+c<b+c,thus<is compatible withthe addition in P.Finally,if0<a<b then0<(ψ(a))#and hence there always exists k∈N such that(ψ(b)−ψ(ka))#=(ψ(b))#−k(ψ(a))#<0,which shows that the order is admissible.Consider the rank2Witt algebra G=W(ψ,F).Without loss of generality we can assume thatΩ⊂R0,as in other case we can work with the order,opposite to<.AsΩis a connected bounded subset of R,it has one of the following four forms:[a,b],(a,b],[a,b), (a,b)for some non-negative real a,b.We define I and J as follows:I is generated by all e x such thatψ(x)#>a(resp.ψ(x)# a)if a∈Ω(resp.a∈Ω);and J is generated by all e x such thatψ(x)#>b(resp.ψ(x)# b)if b∈Ω(resp.b∈Ω).From the definition it follows immediately that both I and J are non-negative ideals of P with respect to <.Hence,the algebras L(G,<,I)and L(G,<,J)are well-defined subalgebras of G and L(G,<,J)⊂L(G,<,I)by definition.Now we show that L(G,<,J)is actually a ideal of L(G,<,I).Indeed,if x∈I andy∈J we get that x+y∈J as J is an ideal of P and x∈P0+.Hence[e x,e y]∈L(G,<,J) for any e x∈L(G,<,I)and e y∈L(G,<,J).Finally,we consider the map f:L(G,<,I)→L(Ω)defined byf(e x)= L x,x ∈Ω0,otherwise.From the definition of the Lie brackets in L(Ω)(Section2)and in G(Section3)weimmediately get that f is a Lie algebra homomorphisms.Moreover,it is also clear that its kernel coincides with L(G,<,J).This completes the proof.Theorem1motivates the following definition:let G=W(P,ψ)be a higher rank Witt algebra(it is important here that k>1,i.e.that G is not the classical Witt algebra), <be an admissible order on P,and I⊃J be two non-negative ideals of P with respect to the order<.Then we define the Lie algebra A(P,ψ,<,I,J)of quasicrystal type as the quotient algebra L(G,<,I)/L(G,<,J).In particular,all quasicrystal Lie algebras are Lie algebra of quasicrystal type.Now we can formulate some basic properties of Lie algebras of quasicrystal type and we see that these algebras share a lot of properties of classical quasicrystal Lie algebras.We start with the following easy observation.Lemma 1.Let<be an admissible order on Z k.Then there exists a homomorphism,σ:P→R,such thatσ(P±)⊂R±.Proof.Identify P with Z k⊂R ing the description of admissible orders on an abelian group from[Z],wefind a hyperplane,H,of R k,such that P+coincides with the set of points from Z k,which are settled on the same side with respect to H.Thenσcan be taken,e.g.the projection on H⊥with respect to H(here R k is considered as an Euclidean space in a natural way).4For given G=W(P,ψ)and<wefix someσ,existing by Lemma1.We define a= inf x∈I(σ(x))and b=inf x∈J(σ(x))and will use this notation in the following statement. Proposition1.Let A(P,ψ,<,I,J)be a Lie algebra of quasicrystal type.1.A(P,ψ,<,I,J)is abelian if and only if2a b.2.A(P,ψ,<,I,J)has non-trivial center if and only if a=0.3.A(P,ψ,<,I,J)is nilpotent if and only if a>0and J=∅.4.The algebra A(P,ψ,<,I,J)is perfect if an only if a=0and0∈I.5.If J=∅then anyfinite set of elements in A(P,ψ,<,I,J)generates afinite-dimensional Lie subalgebra of A(P,ψ,<,I,J).In particular,A(P,ψ,<,I,J)has finite-dimensional subalgebras of arbitrary non-negative dimension.Proof.All statements are easy corollaries from the additivity of indices of generating ele-ments under the Lie bracket.Indeed,with this remark thefirst statement reduces to the fact that x a and y a implies x+y 2a b;the second one reduces to the fact that for any x a and y>b−a holds x+y>b;and the third one reduces to the fact that for ka>b we have kx>b for any x a.If a=0,the algebra A(P,ψ,<,I,J)is nilpotent by statement three and hence not perfect.It is also clear that it is impossible to get0as a result of the Lie operation.But if a=0and0∈I,then L(G,<,I)=G+,σ(P+)is dense in R+and hence for any x>0there are y,z∈P+such that y+z=x.This implies that A(P,ψ,<,I,J)is perfect in this case and hence the property four.Thefirst part of the last statement is equivalent to the trivial statement that afinite subset of R+generates an additive semigroup,whose intersection with any bounded set is finite.To prove the second part it is sufficient to consider the span of e ix,i=1,...,n, such that nx<b and(n+1)x>b.This completes the proof.For example,to realize the aperiodic Witt algebra AW([0,1]),defined in[T1],as a Lie algebra of quasicrystal type,one should take P=Z2,ψbeing the projection on the second coordinate;<defined by x<y if and only if the inner product of y−x with(1,15)) is greater than zero;I=P0+;J={x∈P:(1,0)<x}.5Standard and non-standard triangular decomposi-tionsThe realization of Lie algebras of quasicrystal type,obtained in the previous section al-lows us to adopt the technique from[M]to construct various triangular and parabolic decompositions of these algebras.The general procedure will look as follows.Let A=A(P,ψ,<,I,J)be a Lie algebra of quasicrystal type.Abusing notation we will denote by e x,x∈I\J,the generators of A.Choose any linear pre-order, ,on the abelian5group P ,which is different from <and its opposite.Define A ±as the Lie subalgebras of A ,generated by all e x ,0≺±x ,and set A 0to be the Lie subalgebra of A ,generated by all e x ,0 x and x 0.We get the following obvious fact.Lemma 2.A =A −⊕A 0⊕A +.Proof.Clearly,A =A −+A 0+A +.The fact that this is actually a direct sum decomposition follows easily from the the property x y implies x +z y +z .It is natural to call the decomposition A =A −⊕A 0⊕A +parabolic decomposition of A ,associated with .Given a parabolic decomposition and a simple A 0-module,V ,one can extend V to an A 0⊕A +-module with the trivial action of A +and construct the associated generalized Verma module M (V )as follows:M (V )=U (A )⊗U (0⊕+)V .If A 0happens to be rather special,it is natural to rename the corresponding parabolic decomposition into triangular decomposition .However this is a subtle question and the hierarchy I give here represent only my point of view and is inspired by the corresponding notions for the higher rank Virasoro algebra ([M]).We will say that the decomposition A =A −⊕A 0⊕A +is a standard triangular de-composition provided A 0=F e x for some x ∈P ,which is not maximal in I \J .We call A =A −⊕A 0⊕A +the non-standard triangular decomposition provided A 0is a commutative Lie algebra and the parabolic decomposition fails to be a standard triangular.In the case of triangular decomposition generalized Verma modules become classical Verma modules as in this case dim(V )=1.The first case is natural and corresponds to triangular decompositions of the higher rank Virasoro algebras,[M].Actually,here one has to be careful because,depending on whether ≺satisfies the Archimed law or not,one can further distinguish two cases of standard triangular decomposition.We will not do this,as we will not study the difference between the corresponding situations.But the second case has a striking difference from the first one and comes from the definition of triangular decomposition for the aperiodic Virasoro algebra in [T1].This means that the triangular decomposition for the aperiodic Virasoro algebra,constructed in [T1]is an example of a non-standard triangular decomposition.We now will study analogous situations in more detail.We retain the notation for σ,a,b from the previous section and further assume that a =0and that that there is an element,e u ∈A ,such that σ(u )=b and ψ(u )=0.Since <is an admissible order,such element is unique and we retain the notation e u for it.Lemma 3.Under the above assumptions we consider the vectorspace A =A ⊕F c .Then the formula [e x +a c ,e y +b c ]=[e x ,e y ]+ψ(x )3−ψ(x )The algebra A,constructed in Lemma3is a natural generalization of the aperiodic Virasoro algebra from[T1].In particular,the aperiodic Virasoro algebra coincides with A for A constructed in the end of the previous section.However,if e.g.the rank of P is bigger than two,we get an example of A ,which differs from the aperiodic Virasoro algebra.We will call algebras A the Virasoro-like algebras of quasicrystal type.Assigning the element c index u we easily transfer the notions of parabolic and both standard and non-standard triangular decompositions on algebra A .If P has rank two, then,up to taking the opposite order,the non-standard triangular decomposition of A, such that A 0contains e u,is unique,and in the case of the aperiodic Virasoro algebra this coincides with the triangular decomposition,constructed in[T1,Section V].For the rank two case once can easily construct example of A such that with respect to the unique natural non-standard triangular decomposition,mentioned above,dim(A 0)is an arbitrary positive integer.Hence even in rank two case one gets a lot of examples of A ,different from the aperiodic Virasoro algebras.All these algebras will have discrete aperiodic root systems,and,if considered as graded by the action of e0,all roots will be multiple with multiplicity dim(A 0)−2.In the case of the aperiodic Virasoro algebra we have dim(A 0)=3 and hence all roots(with non-zero action of e0)are multiplicity free.We will discuss this situation in more details in the next section,when we will define the Shapovalov Form on the Verma modules and compute its determinant.6Shapovalov form and Kac determinantIn this section we present several results on the structure of Verma modules over Lie and Virasoro-like algebras of quasicrystal type.As in the case of the Witt and the Virasoro algebras,the representation theory the last one is more complicated,which,in particular, gives a bigger variety of simple highest weight modules.Our main tool in the case of the Virasoro-like algebras of quasicrystal type and the corresponding Lie algebras of quasicrys-tal type will be the Shapovalov form on Verma modules,first defined in[S]for simple finite-dimensional Lie algebras.However,we start with more elementary general case of Lie algebras of quasicrystal type,which happens to be really trivial.Before starting we just note that in this section we always assume that F is an algebraically closedfield of characteristic zero.We recall that,given a triangular decomposition,A=A−⊕A0⊕A+,an A-module,M, is called a highest weight module,if there exists a generator,v∈M,such that A+v=0. Proposition2.All simple highest weight modules over a Lie algebras of quasicrystal type, which correspond to a standard triangular decompositions with A0=F e x⊂[A,A]are one-dimensional.In particular,corresponding Verma modules are always reducible. Proof.This is a direct corollary of A0=F e x and e x∈[A,A].Proposition3.All Verma modules over a Lie algebras of quasicrystal type,which corre-spond to a standard triangular decompositions with A0=F e x⊂[A,A],are reducible.The7corresponding unique simple quotients are one-dimensional if and only if the eigenvalue ofe x on the primitive generator of the module is zero.Otherwise they are infinite-dimensional. Proof.Let v be the canonical generator of the Verma module in question.The reducibilityfollows from the fact that x is not maximal in I\J,and hence there are infinitely manyelements y∈P−satisfying e x∈[e y,A],which implies that U(A)e y v is a proper submodule of the Verma module.The second statement follows considering the set of elements e y,y∈P−,satisfying e x∈[e y,A],which is obviously infinite.So,we can now move on to the case of non-standard triangular decomposition.Firstwe reduce our consideration to the natural case of weight modules withfinite-dimensionalweight spaces,which corresponds to the situation,when the root system of A is discrete. This is only possible in the case when P Z2.Here our main tool will be the Shapovalov form and to be able to work with it we will also need the following assumptions from the previous section:e0∈A;and there is e u∈A,such thatσ(u)=b andψ(u)=0.As it was mentioned above,this situation covers,for example,the case of the aperiodic Witt algebra.Since in the case of the algebra A the arguments will be absolutely the same,we consider both cases simultaneously with all the notation for the algebra A .The case of A is then easily obtained by factoring c=0out.We define the conjugation on P viaω(x)=u−x and it follows immediately from our assumptions that e x∈A implies eω(x)∈A .However,is easily to see thatωdoes not extend to an(anti)involution on A .We note thatσ(ω(x))=b−σ(x).We recall that the algebra A is graded by the adjoint action of e0(or,more general,A 0)and for C α=0the dimension of A αis either0or dim(A 0)−2(dim(A0)−1inthe case of algebra A).We denote by∆the set of all(non-zero)roots of A with respectto this action and by∆±the sets of all positive and negative roots corresponding to our triangular decomposition.Obviously,ωextends to a linear bijection A α→A −αfor any α∈∆∪{0}.As A 0is commutative,simple A 0-modules are one-dimensional and have the form Vλ,λ∈(A 0)∗,where the action is defined via g(v)=λ(g)v for v∈Vλand g∈A 0.Let vλdenote a canonical generator of M(Vλ).Let∆ (resp.∆ ±)denote the semigroup,generated by∆(resp.∆±).Then the module M(Vλ)is a weight module with respect to A 0with the supportλ∪λ−∆ +.All weight spaces of M(Vλ)arefinite dimensional.Moreover,M(Vλ)is isomorphic to U(A −)vλas a vectorspace.The∆±-gradation of A ±extends to the∆ ±-gradation of U(A ±)and,in the aniinvolutive way,ωextends to a linear componentwise isomorphism from U(A +)to U(A −)and back, which matches U(A +)αwith U(A −)−α.Forµ∈Supp(M(Vλ)),µ=λ−ν,ν∈∆ +,we define the Shapovalov form Fλ,νon M(Vλ)µby setting that Fλ,ν(fvλ,gvλ),f,g∈U(A −)−ν,equals the coefficient ofω(f)gvλ∈M(Vλ)λ,written in the basis{vλ}.The following properties of Fλ=⊕ν∈∆Fλ,νare standard and the reader can consult[KK,MP]for the arguments.8Lemma4. 1.M(Vλ)is simple if and only if Fλis non-degenerate.2.The kernel of Fλcoincides with the unique maximal submodule of M(Vλ).Hence in order to study the reducibility of M(Vλ)it is sufficient to compute the determinant of Fλ,νfor allλandν.To be able to do this we consider the followingmonomial generators of U(A −)−ν:G=G(ν)={g(x1,...,x k)=e x1...e xk:x i∈∆−;i x i=−ν;σ(x i) σ(x i+1)}.We define the linear order on this set of generators as the lexicographical order with respect to the values ofσ(x i).The key property of this construction is the following.Lemma 5.If g(x1,...,x k)∈G and g(y1,...,y m)∈G are such that g(x1,...,x k) g(y1,...,y m).Then Fλ,ν(g(x1,...,x k)vλ,g(y1,...,y m)vλ)=0.Proof.Let i be minimal such thatσ(x i)<σ(y i).Thenσ(ω(x i))>b−σ(y i)and henceeω(xi)commutes with e yiand thus with all e yj,j i,since for such j we haveσ(y j) σ(y i)form the definition of G.For j<i we have x j=u j and thus[eω(xj),e yj]∈A 0.We canwriteeω(xi)(ω(e x1...e xi−1)e y1...e yi−1)e yi...e ymvλ==ε(ω(e x1...e xi−1)e y1...e yi−1)eω(xi)e yi...e ymvλ+other termsfor someε∈F,where in other terms some eω(xj),j<i,occurs already after the corre-sponding e yj .As eω(xi)commutes with all e yj,j i,we get that thefirst summand equalszero.Now consider one of the other terms and let eω(xj)be the factor occurring most to theright in the monomial.This means,in particular,that for s<j this monomial contains[eω(xs),e ys],which are the elements of A 0and thus,up to a scalar factor,can be movedto the left.In particular,σ(ω(x s))is the biggest value among all others occurring in thismonomial.If the element e y,standing next to eω(xj)satisfies y=x j,this means that eω(xj)commutes with e y and hence the monomial contributes0to the global sum.Otherwise thenumber of factors,standing to the right from eω(xj),which equal x j,is less than the samenumber before the last commutation.Hence induction in this number reduces the problem to the case y=x j thus proving that all monomials occurring in other terms contribute0 to the global sum.From this it follows directly that Fλ,ν(g(x1,...,x k)vλ,g(y1,...,y m)vλ)=0,which com-pletes the proof.From Lemma5we immediately get the following statement,which,in particular,proves [T1,Conjecture V.7].Corollary 1.The determinant of Fλ,νcoincides with the product of diagonal elements Fλ,ν(g(x1,...,x k)vλ,g(x1,...,x k)vλ).9Now we can formulate the computation results for the determinant of the Shapovalov form and the corresponding corollaries for the structure of M(Vλ).Denote by P the set of all non-zero x∈P such that e x∈A is non-zero.Then the decomposition∆=∆−∪∆+ induces a decomposition P =P −∪P +.Forν∈∆ +and x∈P −we denote by pν(x)thenumber of occurrences of e x as factors in the canonical decomposition of all monomials in G(ν).Theorem2.Up to a non-zero constant the determinant of Fλ,νequalsx∈P − λ(e u)−ψ(x)2−112c,asψ(u)=0.Moreover,[e u−x,e u]is in fact central in A .Hence,we can movethe non-zero factor2ψ(x)out and get that,up to a non-zero constant factor,we haveFλ,µ(g(x1,...,x k)vλ,g(x1,...,x k)vλ)=ki=1 λ(e u)−ψ(x i)2−1Proof.Under these conditions all factors of the diagonal elements of the matrix of the Shapovalov form are non-negative and hence all leading minors are non-negative as well. This implies the statement.Using these results we also get some information about highest weight modules,asso-ciated with standard triangular decompositions.Corollary4.The dimensions of the weight spaces of infinite-dimensional highest weight modules over Lie algebras of quasicrystal type,associated with standard triangular decom-positions,are not uniformly bounded.Proof.Let A0=F e x be the zero component of the given standard triangular decomposition. Then we can factor our an ideal of A such that the factoralgebra is still of quasicrystal type,but the element x became maximal in the corresponding I\J,and hence the induced triangular decomposition became non-standard.Now we haveλ(e x)=0and hence the corresponding Verma module over this algebra is simple and the dimensions of its weight spaces are obviously unbounded.Buy this module naturally embeds(as a vector subspace) into the simple highest weight module,which we started with.7Further generalizations of quasicrystal Lie algebras Geometrical realization of the algebra A,obtained in Section4,motivates the following generalization of the class of Lie algebras of quasicrystal type.We consider arbitrary rank n Witt algebra G=G(P,ψ)with P Z n being realized in R n in a natural way.LetΩbe a convex subset of R n,containing at least one non-zero point of P,and satisfying the following0-star condition:v∈Ωimpliesλv∈Ωfor all λ>1.In this case we will callΩa0-star sets.Denote by L(Ω)the vectorsubspace in G, spanned by e x,x∈Ω.Lemma6.L(Ω)is a Lie subalgebra of G.Proof.If x,y∈P∩Ωthen x+y=2(12y).12y belongs toΩbecause of theconvexity and thus x+y∈Ωby the0-star condition.Lemma7.LetΩbe a0-star set,v∈Ωandλ>0.Then,if the setΩλ,v=λv+Ωcontains at least one non-zero point of P,it is a0-star set.Moreover,Ωλ,v⊂Ω.Proof.Clearly,Ωλ,v is convex.Further,if w∈Ωandγ>1,thenγ(w+λv)=γ(λ+1)(1λ+1v)belongs toΩby the same arguments as in Lemma6.This completes theproof.Lemma8.LetΩbe a0-star set,v∈Ωandλ>0.Then L(Ωλ,v)is an ideal of L(Ω). Proof.If w∈Ωand w =w +v∈Ωλ,v for some w ∈Ω,then w+w =w+w +v∈Ωλ,v. This implies the statement.11Hence,for arbitrary G,Ωand v as above we can form the algebra A(P,ψ,Ω,λ,v)= L(Ω)/L(Ωλ,v),which we will call a Lie algebra of convex quasicrystal type.To obtain the usual Lie algebra of quasicrystal type,one should takeΩto be a half-space(open or closed), which does not contain0as an inner point.The basic properties of Lie algebras of convex quasicrystal type are similar to those of Lie algebra of quasicrystal type,however,their formulation is much more complicated because it usually depends on the structure ofΩ. Here we list only some most straightforward ones.Proposition4.Let A=A(P,ψ,Ω,λ,v)be a Lie algebra of convex quasicrystal type and a denote the infinum of distances from points inΩ∩P to0.Assume that dim(A)>1and that for any x∈Ωsome neighborhood(in R n)of2x belongs toΩ.Then1.if a>0then any element of A is nilpotent.2.Anyfinite set of elements from A generates afinite-dimensional Lie subalgebra of A. Proof.If x∈S=Ω\Ωλ,v then there alway exists y,such that|x−y| |v|and such that y∈Ω.Let w∈Ω.If some ball of radius r over2w belongs toΩ,then,forλ>1the point 2λw belongs toΩtogether with the ball of radiusλr around it.Makingλr>|v|we get that2λw∈Ωλ,v.This implies thefirst statement.If the set{w1,...,w k}⊂Ωisfinite,then wefind some r such that2w i belongs toΩtogether with its neighbor ball of radius r.Then the same is true for all linear combinations of these elements with non-negative integer coefficients.By the same arguments as in the previous paragraph,there is N∈N such that any linear combination of{Nw1,...,Nw k} with non-negative integer coefficients belongs toΩλ,v.This implies the second statement.Let us study an example of such algebra,which,as we will show,has some interesting properties.Take P=Z2,ψthe projection on the second component,Ω={w∈R2: (w,(1,1)) 0and(w,(1,−1)) 0},v=(n+ ,0),n∈N, ∈(0,1).The corresponding algebra A=A(P,ψ,Ω,λ,v)is graded with respect to the e0action with graded components corresponding to all integers and having dimension n.In particular,one can define and study triangular(parabolic)decompositions of this algebra and corresponding(generalized) Verma modules.The set P =P∩(Ω\Ωλ,v)coincides with{(a,b):0 a−|b| n}. Define the conjugationωon this set viaω(a,b)=(2|b|+n−a,−b).Then we have the natural notions of Verma modules and the Shapovalov form on them.In our situation we have∆+=N.Lemma9.The Verma module M(Vλ)is always reducible.However,the unique sim-ple quotient of M(Vλ)is infinite dimensional if and only if at least one of the numbers λ(e(2,0)),...,λ(e(n,0))is non-zero.Otherwise it is one-dimensional.Proof.We note that the intersection of[A,A]with A0coincides with the linear span˜A0 of elements{e(2,0),...,e(n,0)}.Hence,if the restriction ofλon˜A0is zero,the Shapovalov form in identically zero on all M(Vλ)λ−k,k∈N.Otherwise,assume thatλ(e(i,o))=0and take e x∈A1and e y∈A−1such that[e x,e y]= e(i,0).We get Fλ,k(e k,e k x)=0and the statement is proved.ω(y)12。

Modeling the ODP Computational Viewpoint with UML 2.0 The Templeman Library Example

Modeling the ODP Computational Viewpoint with UML 2.0 The Templeman Library Example

Modeling the ODP Computational Viewpoint with UML2.0: The Templeman Library ExampleJos´e Ra´u l Romero and Antonio VallecilloDpto.de Lenguajes y Ciencias de la Computaci´o nUniversidad de M´a laga,Spain{jrromero,av}@lcc.uma.esAbstractThe advent of UML2.0has provided a new set of con-cepts more apt for modeling the structure and behavior of distributed systems.These concepts and mechanisms can be effectively used for representing the ODP concepts,in particular those from the Computational Viewpoint.In this paper we present an example that uses the UML2.0profile for the ODP computational viewpoint to illustrate its bene-fits and limitations.1IntroductionThe computational viewpoint describes the functionality of an ODP system and its environment through the decom-position of the system,in distribution transparent terms,into objects which interact at interfaces.In the computational viewpoint,applications and ODP functions consist of con-figurations of interacting computational objects.Although the ODP reference model provides abstract languages for the relevant concepts,it does not prescribe particular notations to be used in the individual viewpoints. The viewpoint languages defined in the reference model are abstract languages in the sense that they define what con-cepts should be used,not how they should be represented. Several notations have been proposed for the different view-points by different authors,which seem to agree on the need to represent the semantics of the ODP viewpoints con-cepts in a precise manner[2,4,8,12,10,11].For exam-ple,formal description techniques such as Z and Object-Z have been proposed for the information and enterprise viewpoints[21],and LOTOS,SDL or Z for the computa-tional viewpoint[8,20].Lately,rewriting logic and Maude have also shown their adequacy for modeling the ODP lan-guages[6,5,19].However,the formality and intrinsic difficulty of most formal description techniques have encouraged the quest for more user-friendly notations.In this respect,the general-purpose modeling notation UML(Unified Modeling Lan-guage)is clearly the most promising candidate,since it is familiar to developers,easy to learn and to use by non-technical people,offers a close mapping to implementa-tions,and has commercial tool support.Until the advent of UML version2.0,both the lack of precision in the UML definition and the semantic gap be-tween the ODP concepts and the UML constructs hindered its application in this context.The UML(1.4)Profile for EDOC[13]tried to bridge this gap.But from our perspec-tive,the gap was so big that the Profile ended up being too large and difficult to understand and use by both ODP and UML users.With the advent of UML2.0the situation may have changed,since not only its semantics have been more precisely defined,but it also incorporates a whole new set of concepts more apt for modeling the structure and behavior of distributed systems.In addition,the wide adoption of UML by industry,the number of available UML tools,and the increasing interest for model-driven development and the MDA initiative,mo-tivated ISO/IEC and ITU-T to launch a joint project in2004, which aims to define the use of UML for ODP system speci-fications(ITU-T Rec.X.906—ISO/IEC19793[9]).Thus, ODP modellers could use the UML notation for express-ing their ODP specifications in a standard graphical way, and UML modellers could use the RM-ODP concepts and mechanisms to structure their UML system specifications.In this paper we explore the use of the UML2.0profile for modeling the ODP computational viewpoint concepts presented in[17]and detailed in[18].More specifically,we show how this profile can be used to model operational ODP systems by representing,as an example,the Templeman’s library management system.The structure of this document is as follows.First,sec-tions2and3serve as a brief introduction to the compu-tational viewpoint and UML2.0,respectively.Section4 presents a summary of the UML2.0Profile for the ODP Computational Viewpoint,describing how to model compu-tational specifications in UML.This profile is used in Sec-tion5for specifying the Templeman’s library system.Fi-nally,Section6draws some conclusions and outlines some future research activities.2Computational Viewpoint in RM-ODP The computational viewpoint is directly concerned with the distribution of processing but not with the interaction mechanisms that enable distribution to occur.The computa-tional specification decomposes the system into objects per-forming individual functions and interacting at well-defined interfaces.The heart of the computational language is the object model which defines the form of interface that an object can have;the way that interfaces can be bound and the forms of interaction which can take place at them;the actions an ob-ject can perform,in particular the creation of new objects and interfaces;and the establishment of bindings.The computational object model provides the basis for ensuring consistency between engineering and technology specifications(including programming languages and com-munication mechanisms)thus allowing open interworking and portability of components in the resulting implementa-tion.2.1Computational language conceptsIn the ODP Reference Model,the computational lan-guage uses a basic set of concepts and structuring rules, including those from ITU-T Recommendation X.902, ISO/IEC10746-2,and several concepts specific to the com-putational viewpoint.Objects and interfaces.ODP systems are modeled in terms of objects.An object contains information and of-fers services.A system is composed as a configuration of interacting objects.In the computational viewpoint we talk about computational objects,which model the entities de-fined in a computational specifiputational ob-jects are abstractions of entities that occur in the real world, in the ODP system,or in other viewpoints[8].Computational objects have state and can interact with their environment at interfaces.An interface is an abstrac-tion of the behavior of an object that consists of a subset of the interactions of that object together with a set of con-straints on when they may occur.ODP objects may have multiple interfaces.Computational putational objects and interfaces can be specified by templates.In ODP,an<X> template is“the specification of the common features of a collection of<X>s in sufficient detail that an<X>can be instantiated using it”.<X>can be anything that has a type.Thus,an interface of a computational object is usually specified by a computational interface template,which is an interface template for either a signal interface,a stream in-terface or an operation interface.A computational interface template comprises a signal,stream or operation interface signature as appropriate;a behavior specification;and an environment contract specification.An interface signature consists of a name,a causality role(producer,consumer,etc.),and set of signal signa-tures,operation signatures,orflow signatures as appropri-ate.Each of these signatures specify the name of the inter-action and its parameters(names and types). Interactions.RM-ODP prescribes three particular types of interactions:signals,operations,andflows.A signal may be regarded as a single,atomic action between com-putational objects.Signals constitute the most basic unit of interaction in the computational viewpoint.Operations are used to model object interactions as represented by most message passing object models,and come in twoflavors: interrogations and announcements.An interrogation is a two-way interaction between two objects:the client object invokes the operation(invocation)on one of the server ob-ject interfaces;after processing the request,the server ob-ject returns some result to the client object,in the form of a termination.An announcement is a one-way interaction between a client object and a server object.In contrast to an interrogation,after invocation of an announcement op-eration on one of its interfaces,the server object does not return a termination.Terminations model every possible outcome of an operation.Flows model streams of infor-mation,i.e.,aflow represents an abstraction of a sequence of interactions from a producer to a consumer,whose ex-act semantics depends on the specific application domain. In the ODP computational viewpoint,operations andflows can be expressed in terms of signals[8].Environment putational object templates may have environment contracts associated with them. These environment contracts may be regarded as agree-ments on behaviors between the object and its environ-ment,including Quality of Service(QoS)constraints,us-age and management constraints,etc.These QoS con-straints involve temporal,volume and dependability con-straints,amongst others,and they can imply other usage and management constraints,such as location and distribution transparency constraints.An environment constraint can thus describe both re-quirements placed on an object’s environment for the cor-rect behavior,and constraints on the object behavior in the correct environment.2.2Structure of ODP computational specifica-tionsA computational specification describes the functional decomposition of an ODP system,in distribution transpar-ent terms,as:(a)a configuration of computational objects;(b)the internal actions of those objects;(c)the interactions that occur among those objects;(d)environment contracts for those objects and their interfaces.A computational specification also defines an initial set of computational objects and their behavior.The configu-ration will change as the computational objects instantiate further computational objects or computational interfaces; perform binding actions;effect control functions upon bind-ing objects;delete computational interfaces;or delete com-putational objects.3Unified Modeling Language2.0UML is a visual modeling language that provides a wide number of graphical elements for modeling systems,which are combined in diagrams according to a set of given rules. The purpose of such diagrams is to show different views of the same system or subsystem and indicate what the system is supposed to do.There are mainly two types of diagrams:structural and behavioral.The former ones focus on the organization of the system.Structural diagrams include package diagrams, object diagrams,deployment diagrams,class diagrams and composite structure diagrams.Behavioral diagrams reflect the system response to inner and outer requests and its evo-lution in time,and include activity diagrams,use cases,stat-echarts and interaction diagramsOne of the major improvements of UML2.0[15,16]is the addition of new diagrams and the enhancements made to existing ones:UML2.0structure,composite,commu-nication,timing and interaction overview diagrams allow solving many of the UML1.x limitations.Most of these im-provements have been influenced by the integration of the mature SDL language within UML.In addition,UML2.0 now provides better constructs for modeling the software ar-chitecture of large distributed systems,with concepts such as components and connectors,and has promoted the use of OCL(Object Constraint Language),now fully aligned with UML2.0[14].Finally,the language extension mech-anisms have been greatly enhanced too,with the more pre-cise definition of UML Profiles to allow the customization of UML constructs and semantics for given application do-mains.These new concepts and mechanisms of UML2.0 constitute the basis of our proposal.4Modeling Computational Viewpoint Con-cepts in UML2.0The UML2.0Profile for the ODP Computational View-point(which is fully described in[18])consists of three main parts.First,it defines the ODP computational view-point metamodel,which is an evolution of the metamodel presented in[19],and defines the semantics,properties and related elements of each metaclass.Second,ODP concepts are mapped to UML elements.This mapping contains infor-mation about every ODP computational concept,the UML base element that represents each concept,and the stereo-type that extends the metaclass so that the specific domain terminology can be used.This section summarizes how the main concepts of the ODP computational language are mapped to UML2.0con-cepts.4.1Computational objects and interfaces Computational object templates and objects.A key concept of the ODP computational viewpoint is the compu-tational object.Each computational object is instantiated from its corresponding computational object template.A computational object template will be mapped to a UML component,which represents autonomous system units,that encapsulate state and behavior and interacts with their environment in terms of provided and required inter-faces.In UML,components are classifiers.A UML classi-fier can have a set of features,that characterize its instances.ODP computational objects will then be mapped to UML component instances.Computational putational objects inter-act with their environment at interfaces.These are instan-tiated from computational interface templates,which com-prise the interface signature(signal,operation or stream as appropriate),a behavior specification and an environment contract specification.There are no exact terms in UML2.0to provide one-to-one mappings for these ODP concepts.However,the se-mantics provided by other modeling elements can be used with slight customizations.If we consider computational interfaces as interaction points at which computational objects interact,wefind that this concept corresponds to the UML concept of interaction point,i.e.,a port at the instance level.In ODP,a computational interface template comprises an interface signature,which is defined as the set of action templates associated with the interactions of an interface. Each of these action templates comprises the name for the interaction,the number,names and types of the parametersand an indication of causality with respect to the object that instantiates the template.Then,an ODP computational interface signature will be mapped to a set of UML interfaces,each of which is de-fined as a kind of classifier that represents a declaration of a set of coherent public features and obligations.This means that each interface can be considered as the specification of a contract that must be fulfilled by any instance of a clas-sifier that realizes the interface(e.g.,the UML component instance that represents the computational object,through its corresponding interaction point).Different stereotypes will be used to distinguish the in-terfaces that represent the different kinds of computational interface signatures.4.2InteractionsIn ODP,the basic one-way communication mechanism from an initiating object to a responding object is the signal, which represents a single basic interaction between them. Operations andflows are also interactions,although they can be handled in terms of signals,as previously mentioned in Section2.1.An ODP signal will be mapped to a UML message, which is the specification of the conveyance of information from one instance to another.In UML,a message can spec-ify either the raising of a UML signal or the call of an UML operation.In ODP,in order to specify a signal we need to provide its signature and its behavior.An interaction signature will be represented by an UML reception,which consists of a declaration stating that the interface classifier is prepared to react to the receipt of a sig-nal.In ODP,each interface signature comprises a set of in-teraction signatures that conform to the interface type.This means that we need to define the proper set of ODP inter-actions as public features of the appropriate UML interface classifier.The behavior of interactions refers to the communication process between computational objects,which will be ex-pressed in UML with behavioral diagrams[3]:(a)Interac-tion models describe how messages are passed between ob-jects and cause invocations of other behaviors;(b)Activity models focus on the sequence,input/outputs and conditions for invoking other behaviors;and(c)Finally,state machine models show how events(e.g.,signal events)cause changes to the object state and invoke other behaviors.Which of them to choose is a matter of the system per-spective that the modeler needs to specify,since each of these models is focused on a different aspect of the sys-tem dynamics.For instance,timing diagrams could be also useful to represent the interactions among computational objects when some timed simple constraints need to be ob-served or applied.4.3Environment contractsEnvironment contracts place constraints on the behavior of computational objects,and usually include QoS,usage, and management aspects.The ODP Reference Model does not prescribe how an environment contract must be speci-fied;it just defines this concept and its basic contents.Each system modeler might like to specify their own constraints in the way that best suits their particular appli-cation,and therefore the UML elements(and their seman-tics)required to model different environment contracts can change from one application to another.Thus,instead of in-corporating these kind of concepts into our UML Profile,we have decided to use separate profiles for representing QoS and other extra-functional aspects of environment contracts. The possibility offered by UML2.0to apply multiple pro-files to a package—as long as they do not have conflicting constraints—will allow the specifier use the QoS profile(s) of his preference.4.4Computational specificationsAs described in2.2,a computational specification de-scribes the functional decomposition of an ODP system,in distribution transparent terms.In UML,the computational specification will be represented by a set of diagrams that model both structural and behavioral aspects of the system. These diagrams will use the elements provided by the ap-plied profiles(using their specified semantics).A configuration of computational objects and their inter-acting interfaces will be modeled by component diagrams (at the instance level).The internal actions of those objects will be represented by behavioral diagrams associated to the UML components that represent those objects.4.5Summary of the mappingsThe fact that most ODP concepts can be represented by UML2.0concepts without changing their original seman-tics(maybe imposing some additional constraints on them, at most)enables the use of a UML Profile as the right kind of mechanism for our purposes[7].Note that the profile mech-anism does not allow for modifying existing metamodels. Rather,a profile is intended to provide a straightforward mechanism for adapting an existing metamodel with con-structs that are specific to a particular domain.As a summary,Table1shows the most important stereo-types defined in the UML Profile for the ODP Computa-tional Viewpoint[18].Table1.Summary of the Computational Viewpoint ProfileODP Concept UML Base Element StereotypeComputational object template Component CV CompObjectTemplate Computational interface template Port CV CompInterfaceT emplate Signal interface signature Interface(s) CV SignalInterfaceSignature Operation interface signature Interface(s) CV OperationInterfaceSignature Stream interface signature Interface(s) CV StreamInterfaceSignature Announcement signature Reception CV AnnouncementSignature Interrogation signature Reception CV InterrogationSignature Termination signature Reception CV TerminationSignature Signal signature Reception CV SignalSignatureFlow signature Reception CV FlowSignature Computational object InstanceSpecification CV ObjectSignal interface Port(interaction point) CV SignalInterfaceOperation interface Port(interaction point) CV OperationInterfaceStream interface Port(interaction point) CV StreamInterfaceSignal Message CV SignalFlow Interaction/Message CV FlowAnnouncement Message CV AnnouncementInvocation Message CV InvocationTermination Message CV Termination5A Case StudyWe will illustrate the use of the UML Profile for the ODP Computational Viewpoint by modeling the comput-erized system that supports the operations of a Templeman Library at the University of Kent at Canterbury,in particu-lar those operations related to the borrowing process of the Library items.The system should keep track of the items of the Uni-versity Library,its borrowers,and their outstanding loans. The library system will be used by the library staff(librarian and assistants)to help them record loans,returns,etc.The borrowers will not interact directly with the library system.The basic rules that govern the borrowing process of that Library are as follows:1.Borrowing rights are given to all academic staff,andto postgraduate and undergraduate students of the Uni-versity.2.Library books and periodicals can be borrowed.3.The librarian may temporarily withhold the circulationof Library items,or dispose them when they are no longer apt for loan.4.There are prescribed periods of loan and limits on thenumber of items allowed on loan to a borrower at any one time.5.Items borrowed must be returned by the due day andtime which is specified when the item is borrowed.6.Borrowers who fail to return an item when it is duewill become liable to a charge at the rates prescribed until the book or periodical is returned to the Library, and may have borrowing rights suspended.7.Borrowers returning items must hand them in to an as-sistant at the Main Loan Desk.Any charges due on overdue items must be paid at this time.8.Failure to pay charges may result in suspension by theLibrarian of borrowing facilities.Despite they leave many details of the system unspeci-fied,these textual regulations will be the starting point for the ODP specifications below.5.1Computational objects and interfacesIn order to represent the computational specification for the Templeman Library,we need to identify the computa-tional elements that participate in the borrowing process. Each of these elements(i.e.,computational objects and in-terfaces)are instantiated from their corresponding compu-tational templates.In UML,we represent the system struc-ture using a component diagram,that describes the compu-tational object templates and the computational interfaces at which these objects interact.As shown in Figure1,there are four different kinds of computational objects:(a)a manager(UserMgr)for each user(i.e.,borrower);(b)the system that managesponent Diagram representing ODP Computational Templatesthefines applied to users who exceed the borrowing pe-riod(FineSystem);(c)the system that manages the library items(ItemMgr);and(d)the borrowing process coordina-tor(BorrowingSystem).These objects interact with each other and with their en-vironment at computational interfaces,which are instanti-ated from their corresponding interface templates.In this case,we usefive computational interfaces,all of them op-erational interfaces.As shown in Figure1,each interface is modeled by a UML port feature and its provided and re-quired UML interfaces,whose receptions represent the in-dividual interaction signatures.For readability reasons,we have shown interface signatures as balls and sockets in Fig-ure1.An extended notation for the signature of the IUser-Mgnt interface is shown in Figure2,where UML receptions are explicitly depicted.In this example,only operation computational interfaces have been defined.Therefore,just two causalities are pos-sible:client or server.This implies that the tag object-Role can be omitted because the causality is implicitly rep-resented by the kind of dependency existing between the UML port and the UML interface—e.g.,an usage depen-dency(required interface)represents that the computational interface will interact as a client.There are also cases in which the system designer might prefer to adopt an oper-ational object-oriented approach,which represents the ex-change of information between objects in terms of oper-ation interactions between computational objects.In this case,modeling these interactions as UML operations might probably be simpler,as shown in Figure3.Figure2.Interface signature forIUserMgnt ponent diagram following anoperational OO approach5.2Behavioral specificationWe need to specify different behavior aspects of the com-putational elements.In fact,activity,communication,inter-action and sequence diagrams might be useful to representFigure4.Activity diagram for the Borrowing Processboth the internal actions of the computational objects,and the interactions that occur between them.In case we want to specify how object interactions are performed,activities can be useful because they are an abstraction of the many ways that messages are exchanged between objects[3].This makes activities useful at the stage of development where the primary concern is dependency between tasks,rather than interaction protocols.The activity diagram for the bor-rowing process is shown in Figure4.Alternatively,when messages and interaction protocols are the focus of development,UML interaction diagrams are more appropriate,as shown in Figure5.6ConclusionsIn this paper we have shown with an example how the ODP computational specifications can be expressed in UML2.0,using the Profile for the Computational viewpoint described in[17].Wefind results to be encouraging,since the profile has proved to be expressive enough to describe the system functionality and processes,in a natural way.It is still to be proved whether ODP and UML modelersfind it natural,too,but we hope this example can help these two kinds of audiences understand better the proposal.There are some lines of work that we plan to address shortly.In particular,once we count with a graphical no-tation to model the ODP computational viewpoint,we per-ceive that its connection to formal notations and tools might bring along many real advantages.For instance,formal analysis of the system can be achieved from the UML en-vironment(such as model checking or theorem proving), freeing the system analyst from most formal technicalities. In this sense,we are working in the provision of bridges be-tween the UML2.0specification and the Maude language, so that the Maude formal toolkit can be used with the UML models produced for the ODP system.In addition,the computational viewpoint is just one of thefive ODP viewpoints.Defining and analyzing the corre-spondences between the different viewpoint specifications is also required.The aforementioned ITU-T Rec.X.906—ISO/IEC19793standard is defining UML profiles for all viewpoints[9].The example presented here tries to serve as input to this work,both to illustrate the use of the Compu-tational Profile and to provide with examples that help tack-ling how to define and analyze viewpoint correspondences. Acknowledgements This work has been supported by Spanish Research Project TIC2002-04309-C02-02.References[1] D.H.Akehurst,J.Derrick,and A.G.Waters.Addressingcomputational viewpoint design.In Proc.of EDOC2003, pages147–159,Brisbane,Australia,Sept.2003.[2] C.Bernardeschi,J.Dustzadeh,A.Fantechi,E.Najm,A.Ni-mour,and F.Olsen.Transformations and consistent seman-tics for ODP viewpoints.In Proc.of FMOODS’97,pages 371–386,Canterbury,1997.Chapman&Hall.[3] C.Bock.UML2activity and action models part2:Actions.Journal of Object Technology,2(5):41–56,2003.[4]H.Bowman,J.Derrick,P.Linington,and M.W.Steen.FDTs for puter Standards&Interfaces,17:457–479,Sept.1995.[5] F.Dur´a n,M.Rold´a n,and ing maude towrite and execute ODP Information Viewpoint specifiputer Standards&Interfaces,2005.[6] F.Dur´a n and A.Vallecillo.Formalizing ODP Enterprisespecifications in puter Standards&Interfaces, 25(2):83–102,June2003.[7]L.Fuentes and A.Vallecillo.An introduction to UML pro-files.UPGRADE,The European Journal for the Informatics Professional,5(2):5–13,Apr.2004.[8]ISO/IEC.RM-ODP.Reference Model for Open DistributedProcessing.Geneva,Switzerland,1997.International Stan-dard ISO/IEC10746-1to10746-4,ITU-T Recommenda-tions X.901to X.904.[9]ISO/e of UML for ODP System Specification.Geneva,Switzerland,(to appear in2006).International Standard ISO/IEC19793,ITU-T Recommendation X.906.[10] D.R.Johnson and H.Kilov.Can aflat notation be used tospecify an OO system:using Z to describe RM-ODP con-structs.In Proc.of FMOODS’96,pages407–418,Paris, Mar.1996.Chapman&Hall.[11] D.R.Johnson and H.Kilov.An approach to a Z toolkit forthe Reference Model of Open Distributed -puter Standards&Interfaces,21(5):393–402,Dec.1999.[12]P.Linington.RM-ODP:The architecture.In osevicand L.Armstrong,editors,Open Distributed Processing II, pages15–33.Chapman&Hall,Feb.1995.[13]OMG.A UML Profile for Enterprise Distributed ObjectComputing V1.0.Object Management Group,Aug.2001.OMG document ad/2001-08-19.[14]OMG.OCL2.0,Oct.2003.Final Adopted Specificationptc/03-10-04.[15]OMG.Unified Modeling Language Specification(version2.0):Infrastructure,2003.ptc/03-12-01.[16]OMG.Unified Modeling Language Specification(version2.0):Superstructure,2003.Draft Adopted Specificationptc/03-08-02.[17]J.R.Romero and A.Vallecillo.Modeling the ODP Compu-tational Viewpoint with UML2.0.In Proc.of EDOC2005, Enschede,Netherlands,Sept.2005.IEEE CS Press. [18]J.R.Romero and A.Vallecillo.UML2.0Profile forthe ODP Computational Viewpoint.Technical Report TR-05-03,Universidad de M´a laga,Mar.2005.Available from http://www.lcc.uma.es/˜jrromero[19]J.R.Romero and A.Vallecillo.Formalizing ODP computa-tional specifications in Maude.In Proc.EDOC2004,pages 212–233,Monterey,California,Sept.2004.IEEE CS Press.[20]R.Sinnot and K.J.Turner.Specifying ODP computationalobjects in Z.In Proc.of FMOODS’96,pages375–390,Can-terbury,1997.Chapman&Hall.[21]M.W.Steen and J.Derrick.ODP Enterprise View-point Specifiputer Standards&Interfaces, 22(2):165–189,Sept.2000.。

Overlap

Overlap

¯ and ψ are Dirac fermions and the mass matrix M is infinite. It has a single zero ψ mode but its adjoint has no zero modes. As long as MM† > 0 this setup is stable under small deformations of the mass matrix implying that radiative corrections will not wash the zero mode away. Kaplan’s domain wall suggests the following realization: M = −∂s − f (s), (2)
where s ∈ (−∞, ∞) and f is fixed at −Λ′ for negative s and at Λ for positive s (Λ′ , Λ > 0. There is no mathematical difficulty associated with the discontinuity at s = 0. The infinite path integral over the fermions is easily “done”: on the positive and negative segments of the real line respectively one has propagation with an s-independent “Hamiltonian”. The infinite extent means that at s = 0 the path integrals produce the overlap (inner product) between the two ground states of the many fermion systems corresponding to each side of the origin in s. The infinite extent also means infinite exponents linearly proportional to the respective energies - these factors are subtracted. One is left 2

离散数学中英文名词对照表

离散数学中英文名词对照表

离散数学中英文名词对照表外文中文AAbel category Abel 范畴Abel group (commutative group) Abel 群(交换群)Abel semigroup Abel 半群accessibility relation 可达关系action 作用addition principle 加法原理adequate set of connectives 联结词的功能完备(全)集adjacent 相邻(邻接)adjacent matrix 邻接矩阵adjugate 伴随adjunction 接合affine plane 仿射平面algebraic closed field 代数闭域algebraic element 代数元素algebraic extension 代数扩域(代数扩张)almost equivalent 几乎相等的alternating group 三次交代群annihilator 零化子antecedent 前件anti symmetry 反对称性anti-isomorphism 反同构arboricity 荫度arc set 弧集arity 元数arrangement problem 布置问题associate 相伴元associative algebra 结合代数associator 结合子asymmetric 不对称的(非对称的)atom 原子atomic formula 原子公式augmenting digeon hole principle 加强的鸽子笼原理augmenting path 可增路automorphism 自同构automorphism group of graph 图的自同构群auxiliary symbol 辅助符号axiom of choice 选择公理axiom of equality 相等公理axiom of extensionality 外延公式axiom of infinity 无穷公理axiom of pairs 配对公理axiom of regularity 正则公理axiom of replacement for the formula Ф关于公式Ф的替换公式axiom of the empty set 空集存在公理axiom of union 并集公理Bbalanced imcomplete block design 平衡不完全区组设计barber paradox 理发师悖论base 基Bell number Bell 数Bernoulli number Bernoulli 数Berry paradox Berry 悖论bijective 双射bi-mdule 双模binary relation 二元关系binary symmetric channel 二进制对称信道binomial coefficient 二项式系数binomial theorem 二项式定理binomial transform 二项式变换bipartite graph 二分图block 块block 块图(区组)block code 分组码block design 区组设计Bondy theorem Bondy 定理Boole algebra Boole 代数Boole function Boole 函数Boole homomorophism Boole 同态Boole lattice Boole 格bound occurrence 约束出现bound variable 约束变量bounded lattice 有界格bridge 桥Bruijn theorem Bruijn 定理Burali-Forti paradox Burali-Forti 悖论Burnside lemma Burnside 引理Ccage 笼canonical epimorphism 标准满态射Cantor conjecture Cantor 猜想Cantor diagonal method Cantor 对角线法Cantor paradox Cantor 悖论cardinal number 基数Cartesion product of graph 图的笛卡儿积Catalan number Catalan 数category 范畴Cayley graph Cayley 图Cayley theorem Cayley 定理center 中心characteristic function 特征函数characteristic of ring 环的特征characteristic polynomial 特征多项式check digits 校验位Chinese postman problem 中国邮递员问题chromatic number 色数chromatic polynomial 色多项式circuit 回路circulant graph 循环图circumference 周长class 类classical completeness 古典完全的classical consistent 古典相容的clique 团clique number 团数closed term 闭项closure 闭包closure of graph 图的闭包code 码code element 码元code length 码长code rate 码率code word 码字coefficient 系数coimage 上象co-kernal 上核coloring 着色coloring problem 着色问题combination number 组合数combination with repetation 可重组合common factor 公因子commutative diagram 交换图commutative ring 交换环commutative seimgroup 交换半群complement 补图(子图的余) complement element 补元complemented lattice 有补格complete bipartite graph 完全二分图complete graph 完全图complete k-partite graph 完全k-分图complete lattice 完全格composite 复合composite operation 复合运算composition (molecular proposition) 复合(分子)命题composition of graph (lexicographic product)图的合成(字典积)concatenation (juxtaposition) 邻接运算concatenation graph 连通图congruence relation 同余关系conjunctive normal form 正则合取范式connected component 连通分支connective 连接的connectivity 连通度consequence 推论(后承)consistent (non-contradiction) 相容性(无矛盾性)continuum 连续统contraction of graph 图的收缩contradiction 矛盾式(永假式)contravariant functor 反变函子coproduct 上积corank 余秩correct error 纠正错误corresponding universal map 对应的通用映射countably infinite set 可列无限集(可列集)covariant functor (共变)函子covering 覆盖covering number 覆盖数Coxeter graph Coxeter 图crossing number of graph 图的叉数cuset 陪集cotree 余树cut edge 割边cut vertex 割点cycle 圈cycle basis 圈基cycle matrix 圈矩阵cycle rank 圈秩cycle space 圈空间cycle vector 圈向量cyclic group 循环群cyclic index 循环(轮转)指标cyclic monoid 循环单元半群cyclic permutation 圆圈排列cyclic semigroup 循环半群DDe Morgan law De Morgan 律decision procedure 判决过程decoding table 译码表deduction theorem 演绎定理degree 次数,次(度)degree sequence 次(度)序列derivation algebra 微分代数Descartes product Descartes 积designated truth value 特指真值detect errer 检验错误deterministic 确定的diagonal functor 对角线函子diameter 直径digraph 有向图dilemma 二难推理direct consequence 直接推论(直接后承)direct limit 正向极限direct sum 直和directed by inclution 被包含关系定向discrete Fourier transform 离散 Fourier 变换disjunctive normal form 正则析取范式disjunctive syllogism 选言三段论distance 距离distance transitive graph 距离传递图distinguished element 特异元distributive lattice 分配格divisibility 整除division subring 子除环divison ring 除环divisor (factor) 因子domain 定义域Driac condition Dirac 条件dual category 对偶范畴dual form 对偶式dual graph 对偶图dual principle 对偶原则(对偶原理) dual statement 对偶命题dummy variable 哑变量(哑变元)Eeccentricity 离心率edge chromatic number 边色数edge coloring 边着色edge connectivity 边连通度edge covering 边覆盖edge covering number 边覆盖数edge cut 边割集edge set 边集edge-independence number 边独立数eigenvalue of graph 图的特征值elementary divisor ideal 初等因子理想elementary product 初等积elementary sum 初等和empty graph 空图empty relation 空关系empty set 空集endomorphism 自同态endpoint 端点enumeration function 计数函数epimorphism 满态射equipotent 等势equivalent category 等价范畴equivalent class 等价类equivalent matrix 等价矩阵equivalent object 等价对象equivalent relation 等价关系error function 错误函数error pattern 错误模式Euclid algorithm 欧几里德算法Euclid domain 欧氏整环Euler characteristic Euler 特征Euler function Euler 函数Euler graph Euler 图Euler number Euler 数Euler polyhedron formula Euler 多面体公式Euler tour Euler 闭迹Euler trail Euler 迹existential generalization 存在推广规则existential quantifier 存在量词existential specification 存在特指规则extended Fibonacci number 广义 Fibonacci 数extended Lucas number 广义Lucas 数extension 扩充(扩张)extension field 扩域extension graph 扩图exterior algebra 外代数Fface 面factor 因子factorable 可因子化的factorization 因子分解faithful (full) functor 忠实(完满)函子Ferrers graph Ferrers 图Fibonacci number Fibonacci 数field 域filter 滤子finite extension 有限扩域finite field (Galois field ) 有限域(Galois 域)finite dimensional associative division algebra有限维结合可除代数finite set 有限(穷)集finitely generated module 有限生成模first order theory with equality 带符号的一阶系统five-color theorem 五色定理five-time-repetition 五倍重复码fixed point 不动点forest 森林forgetful functor 忘却函子four-color theorem(conjecture) 四色定理(猜想)F-reduced product F-归纳积free element 自由元free monoid 自由单元半群free occurrence 自由出现free R-module 自由R-模free variable 自由变元free-Ω-algebra 自由Ω代数function scheme 映射格式GGalileo paradox Galileo 悖论Gauss coefficient Gauss 系数GBN (Gödel-Bernays-von Neumann system)GBN系统generalized petersen graph 广义 petersen 图generating function 生成函数generating procedure 生成过程generator 生成子(生成元)generator matrix 生成矩阵genus 亏格girth (腰)围长Gödel completeness theorem Gödel 完全性定理golden section number 黄金分割数(黄金分割率)graceful graph 优美图graceful tree conjecture 优美树猜想graph 图graph of first class for edge coloring 第一类边色图graph of second class for edge coloring 第二类边色图graph rank 图秩graph sequence 图序列greatest common factor 最大公因子greatest element 最大元(素)Grelling paradox Grelling 悖论Grötzsch graph Grötzsch 图group 群group code 群码group of graph 图的群HHajós conjecture Hajós 猜想Hamilton cycle Hamilton 圈Hamilton graph Hamilton 图Hamilton path Hamilton 路Harary graph Harary 图Hasse graph Hasse 图Heawood graph Heawood 图Herschel graph Herschel 图hom functor hom 函子homemorphism 图的同胚homomorphism 同态(同态映射)homomorphism of graph 图的同态hyperoctahedron 超八面体图hypothelical syllogism 假言三段论hypothese (premise) 假设(前提)Iideal 理想identity 单位元identity natural transformation 恒等自然变换imbedding 嵌入immediate predcessor 直接先行immediate successor 直接后继incident 关联incident axiom 关联公理incident matrix 关联矩阵inclusion and exclusion principle 包含与排斥原理inclusion relation 包含关系indegree 入次(入度)independent 独立的independent number 独立数independent set 独立集independent transcendental element 独立超越元素index 指数individual variable 个体变元induced subgraph 导出子图infinite extension 无限扩域infinite group 无限群infinite set 无限(穷)集initial endpoint 始端initial object 初始对象injection 单射injection functor 单射函子injective (one to one mapping) 单射(内射)inner face 内面inner neighbour set 内(入)邻集integral domain 整环integral subdomain 子整环internal direct sum 内直和intersection 交集intersection of graph 图的交intersection operation 交运算interval 区间invariant factor 不变因子invariant factor ideal 不变因子理想inverse limit 逆向极限inverse morphism 逆态射inverse natural transformation 逆自然变换inverse operation 逆运算inverse relation 逆关系inversion 反演isomorphic category 同构范畴isomorphism 同构态射isomorphism of graph 图的同构join of graph 图的联JJordan algebra Jordan 代数Jordan product (anti-commutator) Jordan乘积(反交换子)Jordan sieve formula Jordan 筛法公式j-skew j-斜元juxtaposition 邻接乘法Kk-chromatic graph k-色图k-connected graph k-连通图k-critical graph k-色临界图k-edge chromatic graph k-边色图k-edge-connected graph k-边连通图k-edge-critical graph k-边临界图kernel 核Kirkman schoolgirl problem Kirkman 女生问题Kuratowski theorem Kuratowski 定理Llabeled graph 有标号图Lah number Lah 数Latin rectangle Latin 矩形Latin square Latin 方lattice 格lattice homomorphism 格同态law 规律leader cuset 陪集头least element 最小元least upper bound 上确界(最小上界)left (right) identity 左(右)单位元left (right) invertible element 左(右)可逆元left (right) module 左(右)模left (right) zero 左(右)零元left (right) zero divisor 左(右)零因子left adjoint functor 左伴随函子left cancellable 左可消的left coset 左陪集length 长度Lie algebra Lie 代数line- group 图的线群logically equivanlent 逻辑等价logically implies 逻辑蕴涵logically valid 逻辑有效的(普效的)loop 环Lucas number Lucas 数Mmagic 幻方many valued proposition logic 多值命题逻辑matching 匹配mathematical structure 数学结构matrix representation 矩阵表示maximal element 极大元maximal ideal 极大理想maximal outerplanar graph 极大外平面图maximal planar graph 极大平面图maximum matching 最大匹配maxterm 极大项(基本析取式)maxterm normal form(conjunctive normal form) 极大项范式(合取范式)McGee graph McGee 图meet 交Menger theorem Menger 定理Meredith graph Meredith 图message word 信息字mini term 极小项minimal κ-connected graph 极小κ-连通图minimal polynomial 极小多项式Minimanoff paradox Minimanoff 悖论minimum distance 最小距离Minkowski sum Minkowski 和minterm (fundamental conjunctive form) 极小项(基本合取式)minterm normal form(disjunctive normal form)极小项范式(析取范式)Möbius function Möbius 函数Möbius ladder Möbius 梯Möbius transform (inversion) Möbius 变换(反演)modal logic 模态逻辑model 模型module homomorphism 模同态(R-同态)modus ponens 分离规则modus tollens 否定后件式module isomorphism 模同构monic morphism 单同态monoid 单元半群monomorphism 单态射morphism (arrow) 态射(箭)Möbius function Möbius 函数Möbius ladder Möbius 梯Möbius transform (inversion) Möbius 变换(反演)multigraph 多重图multinomial coefficient 多项式系数multinomial expansion theorem 多项式展开定理multiple-error-correcting code 纠多错码multiplication principle 乘法原理mutually orthogonal Latin square 相互正交拉丁方Nn-ary operation n-元运算n-ary product n-元积natural deduction system 自然推理系统natural isomorphism 自然同构natural transformation 自然变换neighbour set 邻集next state 下一个状态next state transition function 状态转移函数non-associative algebra 非结合代数non-standard logic 非标准逻辑Norlund formula Norlund 公式normal form 正规形normal model 标准模型normal subgroup (invariant subgroup) 正规子群(不变子群)n-relation n-元关系null object 零对象nullary operation 零元运算Oobject 对象orbit 轨道order 阶order ideal 阶理想Ore condition Ore 条件orientation 定向orthogonal Latin square 正交拉丁方orthogonal layout 正交表outarc 出弧outdegree 出次(出度)outer face 外面outer neighbour 外(出)邻集outerneighbour set 出(外)邻集outerplanar graph 外平面图Ppancycle graph 泛圈图parallelism 平行parallelism class 平行类parity-check code 奇偶校验码parity-check equation 奇偶校验方程parity-check machine 奇偶校验器parity-check matrix 奇偶校验矩阵partial function 偏函数partial ordering (partial relation) 偏序关系partial order relation 偏序关系partial order set (poset) 偏序集partition 划分,分划,分拆partition number of integer 整数的分拆数partition number of set 集合的划分数Pascal formula Pascal 公式path 路perfect code 完全码perfect t-error-correcting code 完全纠-错码perfect graph 完美图permutation 排列(置换)permutation group 置换群permutation with repetation 可重排列Petersen graph Petersen 图p-graph p-图Pierce arrow Pierce 箭pigeonhole principle 鸽子笼原理planar graph (可)平面图plane graph 平面图Pólya theorem Pólya 定理polynomail 多项式polynomial code 多项式码polynomial representation 多项式表示法polynomial ring 多项式环possible world 可能世界power functor 幂函子power of graph 图的幂power set 幂集predicate 谓词prenex normal form 前束范式pre-ordered set 拟序集primary cycle module 准素循环模prime field 素域prime to each other 互素primitive connective 初始联结词primitive element 本原元primitive polynomial 本原多项式principal ideal 主理想principal ideal domain 主理想整环principal of duality 对偶原理principal of redundancy 冗余性原则product 积product category 积范畴product-sum form 积和式proof (deduction) 证明(演绎)proper coloring 正常着色proper factor 真正因子proper filter 真滤子proper subgroup 真子群properly inclusive relation 真包含关系proposition 命题propositional constant 命题常量propositional formula(well-formed formula,wff)命题形式(合式公式)propositional function 命题函数propositional variable 命题变量pullback 拉回(回拖) pushout 推出Qquantification theory 量词理论quantifier 量词quasi order relation 拟序关系quaternion 四元数quotient (difference) algebra 商(差)代数quotient algebra 商代数quotient field (field of fraction) 商域(分式域)quotient group 商群quotient module 商模quotient ring (difference ring , residue ring) 商环(差环,同余类环)quotient set 商集RRamsey graph Ramsey 图Ramsey number Ramsey 数Ramsey theorem Ramsey 定理range 值域rank 秩reconstruction conjecture 重构猜想redundant digits 冗余位reflexive 自反的regular graph 正则图regular representation 正则表示relation matrix 关系矩阵replacement theorem 替换定理representation 表示representation functor 可表示函子restricted proposition form 受限命题形式restriction 限制retraction 收缩Richard paradox Richard 悖论right adjoint functor 右伴随函子right cancellable 右可消的right factor 右因子right zero divison 右零因子ring 环ring of endomorphism 自同态环ring with unity element 有单元的环R-linear independence R-线性无关root field 根域rule of inference 推理规则Russell paradox Russell 悖论Ssatisfiable 可满足的saturated 饱和的scope 辖域section 截口self-complement graph 自补图semantical completeness 语义完全的(弱完全的)semantical consistent 语义相容semigroup 半群separable element 可分元separable extension 可分扩域sequent 矢列式sequential 序列的Sheffer stroke Sheffer 竖(谢弗竖)simple algebraic extension 单代数扩域simple extension 单扩域simple graph 简单图simple proposition (atomic proposition) 简单(原子)命题simple transcental extension 单超越扩域simplication 简化规则slope 斜率small category 小范畴smallest element 最小元(素)Socrates argument Socrates 论断(苏格拉底论断)soundness (validity) theorem 可靠性(有效性)定理spanning subgraph 生成子图spanning tree 生成树spectra of graph 图的谱spetral radius 谱半径splitting field 分裂域standard model 标准模型standard monomil 标准单项式Steiner triple Steiner 三元系大集Stirling number Stirling 数Stirling transform Stirling 变换subalgebra 子代数subcategory 子范畴subdirect product 子直积subdivison of graph 图的细分subfield 子域subformula 子公式subdivision of graph 图的细分subgraph 子图subgroup 子群sub-module 子模subrelation 子关系subring 子环sub-semigroup 子半群subset 子集substitution theorem 代入定理substraction 差集substraction operation 差运算succedent 后件surjection (surjective) 满射switching-network 开关网络Sylvester formula Sylvester公式symmetric 对称的symmetric difference 对称差symmetric graph 对称图symmetric group 对称群syndrome 校验子syntactical completeness 语法完全的(强完全的)Syntactical consistent 语法相容system Ł3 , Łn , Łא0 , Łא系统Ł3 , Łn , Łא0 , Łאsystem L 公理系统 Lsystem Ł公理系统Łsystem L1 公理系统 L1system L2 公理系统 L2system L3 公理系统 L3system L4 公理系统 L4system L5 公理系统 L5system L6 公理系统 L6system Łn 公理系统Łnsystem of modal prepositional logic 模态命题逻辑系统system Pm 系统 Pmsystem S1 公理系统 S1system T (system M) 公理系统 T(系统M)Ttautology 重言式(永真公式)technique of truth table 真值表技术term 项terminal endpoint 终端terminal object 终结对象t-error-correcing BCH code 纠 t -错BCH码theorem (provable formal) 定理(可证公式)thickess 厚度timed sequence 时间序列torsion 扭元torsion module 扭模total chromatic number 全色数total chromatic number conjecture 全色数猜想total coloring 全着色total graph 全图total matrix ring 全方阵环total order set 全序集total permutation 全排列total relation 全关系tournament 竞赛图trace (trail) 迹tranformation group 变换群transcendental element 超越元素transitive 传递的tranverse design 横截设计traveling saleman problem 旅行商问题tree 树triple system 三元系triple-repetition code 三倍重复码trivial graph 平凡图trivial subgroup 平凡子群true in an interpretation 解释真truth table 真值表truth value function 真值函数Turán graph Turán 图Turán theorem Turán 定理Tutte graph Tutte 图Tutte theorem Tutte 定理Tutte-coxeter graph Tutte-coxeter 图UUlam conjecture Ulam 猜想ultrafilter 超滤子ultrapower 超幂ultraproduct 超积unary operation 一元运算unary relation 一元关系underlying graph 基础图undesignated truth value 非特指值undirected graph 无向图union 并(并集)union of graph 图的并union operation 并运算unique factorization 唯一分解unique factorization domain (Gauss domain) 唯一分解整域unique k-colorable graph 唯一k着色unit ideal 单位理想unity element 单元universal 全集universal algebra 泛代数(Ω代数)universal closure 全称闭包universal construction 通用结构universal enveloping algebra 通用包络代数universal generalization 全称推广规则universal quantifier 全称量词universal specification 全称特指规则universal upper bound 泛上界unlabeled graph 无标号图untorsion 无扭模upper (lower) bound 上(下)界useful equivalent 常用等值式useless code 废码字Vvalence 价valuation 赋值Vandermonde formula Vandermonde 公式variery 簇Venn graph Venn 图vertex cover 点覆盖vertex set 点割集vertex transitive graph 点传递图Vizing theorem Vizing 定理Wwalk 通道weakly antisymmetric 弱反对称的weight 重(权)weighted form for Burnside lemma 带权形式的Burnside引理well-formed formula (wff) 合式公式(wff)word 字Zzero divison 零因子zero element (universal lower bound) 零元(泛下界)ZFC (Zermelo-Fraenkel-Cohen) system ZFC系统form)normal(Skolemformnormalprenex-存在正则前束范式(Skolem 正则范式)3-value proposition logic 三值命题逻辑。

2013-Decomposition of a Multiobjective Optimization Problem into a Number of Simple Multiobjective

2013-Decomposition of a Multiobjective Optimization Problem into a Number of Simple Multiobjective

I. I NTRODUCTION This letter considers the following continuous multiobjective optimization problem (MOP): minimize F (x) = (f1 (x), . . . , fm (x)) n ∏ subject to x∈ [ai , bi ] ∏n
Abstract—This letter suggests an approach for decomposing a multiobjective optimization problem (MOP) into a set of simple multiobjective optimization subproblems. Using this approach, it proposes MOEA/D-M2M, a new version of multiobjective optimization evolutionary algorithm based decomposition. This proposed algorithm solves these subproblems in a collaborative way. Each subproblem has its own population and receives computational effort at each generation. In such a way, population diversity can be maintained, which is critical for solving some MOPs. Experimental studies have been conducted to compare MOEA/D-M2M with classic MOEA/D and NSGA-II. This letter argues that population diversity is more important than convergence in multiobjective evolutionary algorithms for dealing with some MOPs. It also explains why MOEA/D-M2M performs better. Keywords-Multiobjective optimization, decomposition, hybrid algorithms

Parallel and Distributed Computing and Systems

Parallel and Distributed Computing and Systems

Proceedings of the IASTED International ConferenceParallel and Distributed Computing and SystemsNovember3-6,1999,MIT,Boston,USAParallel Refinement of Unstructured MeshesJos´e G.Casta˜n os and John E.SavageDepartment of Computer ScienceBrown UniversityE-mail:jgc,jes@AbstractIn this paper we describe a parallel-refinement al-gorithm for unstructuredfinite element meshes based on the longest-edge bisection of triangles and tetrahedrons. This algorithm is implemented in P ARED,a system that supports the parallel adaptive solution of PDEs.We dis-cuss the design of such an algorithm for distributed mem-ory machines including the problem of propagating refine-ment across processor boundaries to obtain meshes that are conforming and non-degenerate.We also demonstrate that the meshes obtained by this algorithm are equivalent to the ones obtained using the serial longest-edge refine-ment method.Wefinally report on the performance of this refinement algorithm on a network of workstations.Keywords:mesh refinement,unstructured meshes,finite element methods,adaptation.1.IntroductionThefinite element method(FEM)is a powerful and successful technique for the numerical solution of partial differential equations.When applied to problems that ex-hibit highly localized or moving physical phenomena,such as occurs on the study of turbulence influidflows,it is de-sirable to compute their solutions adaptively.In such cases, adaptive computation has the potential to significantly im-prove the quality of the numerical simulations by focusing the available computational resources on regions of high relative error.Unfortunately,the complexity of algorithms and soft-ware for mesh adaptation in a parallel or distributed en-vironment is significantly greater than that it is for non-adaptive computations.Because a portion of the given mesh and its corresponding equations and unknowns is as-signed to each processor,the refinement(coarsening)of a mesh element might cause the refinement(coarsening)of adjacent elements some of which might be in neighboring processors.To maintain approximately the same number of elements and vertices on every processor a mesh must be dynamically repartitioned after it is refined and portions of the mesh migrated between processors to balance the work.In this paper we discuss a method for the paral-lel refinement of two-and three-dimensional unstructured meshes.Our refinement method is based on Rivara’s serial bisection algorithm[1,2,3]in which a triangle or tetrahe-dron is bisected by its longest edge.Alternative efforts to parallelize this algorithm for two-dimensional meshes by Jones and Plassman[4]use randomized heuristics to refine adjacent elements located in different processors.The parallel mesh refinement algorithm discussed in this paper has been implemented as part of P ARED[5,6,7], an object oriented system for the parallel adaptive solu-tion of partial differential equations that we have devel-oped.P ARED provides a variety of solvers,handles selec-tive mesh refinement and coarsening,mesh repartitioning for load balancing,and interprocessor mesh migration.2.Adaptive Mesh RefinementIn thefinite element method a given domain is di-vided into a set of non-overlapping elements such as tri-angles or quadrilaterals in2D and tetrahedrons or hexahe-drons in3D.The set of elements and its as-sociated vertices form a mesh.With theaddition of boundary conditions,a set of linear equations is then constructed and solved.In this paper we concentrate on the refinement of conforming unstructured meshes com-posed of triangles or tetrahedrons.On unstructured meshes, a vertex can have a varying number of elements adjacent to it.Unstructured meshes are well suited to modeling do-mains that have complex geometry.A mesh is said to be conforming if the triangles and tetrahedrons intersect only at their shared vertices,edges or faces.The FEM can also be applied to non-conforming meshes,but conformality is a property that greatly simplifies the method.It is also as-sumed to be a requirement in this paper.The rate of convergence and quality of the solutions provided by the FEM depends heavily on the number,size and shape of the mesh elements.The condition number(a)(b)(c)Figure1:The refinement of the mesh in using a nested refinement algorithm creates a forest of trees as shown in and.The dotted lines identify the leaf triangles.of the matrices used in the FEM and the approximation error are related to the minimum and maximum angle of all the elements in the mesh[8].In three dimensions,the solid angle of all tetrahedrons and their ratio of the radius of the circumsphere to the inscribed sphere(which implies a bounded minimum angle)are usually used as measures of the quality of the mesh[9,10].A mesh is non-degenerate if its interior angles are never too small or too large.For a given shape,the approximation error increases with ele-ment size(),which is usually measured by the length of the longest edge of an element.The goal of adaptive computation is to optimize the computational resources used in the simulation.This goal can be achieved by refining a mesh to increase its resolution on regions of high relative error in static problems or by re-fining and coarsening the mesh to follow physical anoma-lies in transient problems[11].The adaptation of the mesh can be performed by changing the order of the polynomi-als used in the approximation(-refinement),by modifying the structure of the mesh(-refinement),or a combination of both(-refinement).Although it is possible to replace an old mesh with a new one with smaller elements,most -refinement algorithms divide each element in a selected set of elements from the current mesh into two or more nested subelements.In P ARED,when an element is refined,it does not get destroyed.Instead,the refined element inserts itself into a tree,where the root of each tree is an element in the initial mesh and the leaves of the trees are the unrefined elements as illustrated in Figure1.Therefore,the refined mesh forms a forest of refinement trees.These trees are used in many of our algorithms.Error estimates are used to determine regions where adaptation is necessary.These estimates are obtained from previously computed solutions of the system of equations. After adaptation imbalances may result in the work as-signed to processors in a parallel or distributed environ-ment.Efficient use of resources may require that elements and vertices be reassigned to processors at runtime.There-fore,any such system for the parallel adaptive solution of PDEs must integrate subsystems for solving equations,adapting a mesh,finding a good assignment of work to processors,migrating portions of a mesh according to anew assignment,and handling interprocessor communica-tion efficiently.3.P ARED:An OverviewP ARED is a system of the kind described in the lastparagraph.It provides a number of standard iterativesolvers such as Conjugate Gradient and GMRES and pre-conditioned versions thereof.It also provides both-and -refinement of meshes,algorithms for adaptation,graph repartitioning using standard techniques[12]and our ownParallel Nested Repartitioning(PNR)[7,13],and work mi-gration.P ARED runs on distributed memory parallel comput-ers such as the IBM SP-2and networks of workstations.These machines consist of coarse-grained nodes connectedthrough a high to moderate latency network.Each nodecannot directly address a memory location in another node. In P ARED nodes exchange messages using MPI(Message Passing Interface)[14,15,16].Because each message has a high startup cost,efficient message passing algorithms must minimize the number of messages delivered.Thus, it is better to send a few large messages rather than many small ones.This is a very important constraint and has a significant impact on the design of message passing algo-rithms.P ARED can be run interactively(so that the user canvisualize the changes in the mesh that results from meshadaptation,partitioning and migration)or without directintervention from the user.The user controls the systemthrough a GUI in a distinguished node called the coordina-tor,.This node collects information from all the other processors(such as its elements and vertices).This tool uses OpenGL[17]to permit the user to view3D meshes from different angles.Through the coordinator,the user can also give instructions to all processors such as specify-ing when and how to adapt the mesh or which strategy to use when repartitioning the mesh.In our computation,we assume that an initial coarse mesh is given and that it is loaded into the coordinator.The initial mesh can then be partitioned using one of a num-ber of serial graph partitioning algorithms and distributed between the processors.P ARED then starts the simulation. Based on some adaptation criterion[18],P ARED adapts the mesh using the algorithms explained in Section5.Af-ter the adaptation phase,P ARED determines if a workload imbalance exists due to increases and decreases in the num-ber of mesh elements on individual processors.If so,it invokes a procedure to decide how to repartition mesh el-ements between processors;and then moves the elements and vertices.We have found that PNR gives partitions with a quality comparable to those provided by standard meth-ods such as Recursive Spectral Bisection[19]but which(b)(a)Figure2:Mesh representation in a distributed memory ma-chine using remote references.handles much larger problems than can be handled by stan-dard methods.3.1.Object-Oriented Mesh RepresentationsIn P ARED every element of the mesh is assigned to a unique processor.V ertices are shared between two or more processors if they lie on a boundary between parti-tions.Each of these processors has a copy of the shared vertices and vertices refer to each other using remote ref-erences,a concept used in object-oriented programming. This is illustrated in Figure2on which the remote refer-ences(marked with dashed arrows)are used to maintain the consistency of multiple copies of the same vertex in differ-ent processors.Remote references are functionally similar to standard C pointers but they address objects in a different address space.A processor can use remote references to invoke meth-ods on objects located in a different processor.In this case, the method invocations and arguments destined to remote processors are marshalled into messages that contain the memory addresses of the remote objects.In the destina-tion processors these addresses are converted to pointers to objects of the corresponding type through which the meth-ods are invoked.Because the different nodes are inher-ently trusted and MPI guarantees reliable communication, P ARED does not incur the overhead traditionally associated with distributed object systems.Another idea commonly found in object oriented pro-gramming and which is used in P ARED is that of smart pointers.An object can be destroyed when there are no more references to it.In P ARED vertices are shared be-tween several elements and each vertex counts the number of elements referring to it.When an element is created, the reference count of its vertices is incremented.Simi-larly,when the element is destroyed,the reference count of its vertices is decremented.When the reference count of a vertex reaches zero,the vertex is no longer attached to any element located in the processor and can be destroyed.If a vertex is shared,then some other processor might have a re-mote reference to it.In that case,before a copy of a shared vertex is destroyed,it informs the copies in other processors to delete their references to itself.This procedure insures that the shared vertex can then be safely destroyed without leaving dangerous dangling pointers referring to it in other processors.Smart pointers and remote references provide a simple replication mechanism that is tightly integrated with our mesh data structures.In adaptive computation,the struc-ture of the mesh evolves during the computation.During the adaptation phase,elements and vertices are created and destroyed.They may also be assigned to a different pro-cessor to rebalance the work.As explained above,remote references and smart pointers greatly simplify the task of creating dynamic meshes.4.Adaptation Using the Longest Edge Bisec-tion AlgorithmMany-refinement techniques[20,21,22]have been proposed to serially refine triangular and tetrahedral meshes.One widely used method is the longest-edge bisec-tion algorithm proposed by Rivara[1,2].This is a recursive procedure(see Figure3)that in two dimensions splits each triangle from a selected set of triangles by adding an edge between the midpoint of its longest side to the opposite vertex.In the case that makes a neighboring triangle,,non-conforming,then is refined using the same algorithm.This may cause the refinement to prop-agate throughout the mesh.Nevertheless,this procedure is guaranteed to terminate because the edges it bisects in-crease in length.Building on the work of Rosenberg and Stenger[23]on bisection of triangles,Rivara[1,2]shows that this refinement procedure provably produces two di-mensional meshes in which the smallest angle of the re-fined mesh is no less than half of the smallest angle of the original mesh.The longest-edge bisection algorithm can be general-ized to three dimensions[3]where a tetrahedron is bisected into two tetrahedrons by inserting a triangle between the midpoint of its longest edge and the two vertices not in-cluded in this edge.The refinement propagates to neigh-boring tetrahedrons in a similar way.This procedure is also guaranteed to terminate,but unlike the two dimensional case,there is no known bound on the size of the small-est angle.Nevertheless,experiments conducted by Rivara [3]suggest that this method does not produce degenerate meshes.In two dimensions there are several variations on the algorithm.For example a triangle can initially be bisected by the longest edge,but then its children are bisected by the non-conforming edge,even if it is that is not their longest edge[1].In three dimensions,the bisection is always per-formed by the longest edge so that matching faces in neigh-boring tetrahedrons are always bisected by the same com-mon edge.Bisect()let,and be vertices of the trianglelet be the longest side of and let be the midpoint ofbisect by the edge,generating two new triangles andwhile is a non-conforming vertex dofind the non-conforming triangle adjacent to the edgeBisect()end whileFigure3:Longest edge(Rivara)bisection algorithm for triangular meshes.Because in P ARED refined elements are not destroyed in the refinement tree,the mesh can be coarsened by replac-ing all the children of an element by their parent.If a parent element is selected for coarsening,it is important that all the elements that are adjacent to the longest edge of are also selected for coarsening.If neighbors are located in different processors then only a simple message exchange is necessary.This algorithm generates conforming meshes: a vertex is removed only if all the elements that contain that vertex are all coarsened.It does not propagate like the re-finement algorithm and it is much simpler to implement in parallel.For this reason,in the rest of the paper we will focus on the refinement of meshes.5.Parallel Longest-Edge RefinementThe longest-edge bisection algorithm and many other mesh refinement algorithms that propagate the refinement to guarantee conformality of the mesh are not local.The refinement of one particular triangle or tetrahedron can propagate through the mesh and potentially cause changes in regions far removed from.If neighboring elements are located in different processors,it is necessary to prop-agate this refinement across processor boundaries to main-tain the conformality of the mesh.In our parallel longest edge bisection algorithm each processor iterates between a serial phase,in which there is no communication,and a parallel phase,in which each processor sends and receives messages from other proces-sors.In the serial phase,processor selects a setof its elements for refinement and refines them using the serial longest edge bisection algorithms outlined earlier. The refinement often creates shared vertices in the bound-ary between adjacent processors.To minimize the number of messages exchanged between and,delays the propagation of refinement to until has refined all the elements in.The serial phase terminates when has no more elements to refine.A processor informs an adjacent processor that some of its elements need to be refined by sending a mes-sage from to containing the non-conforming edges and the vertices to be inserted at their midpoint.Each edge is identified by its endpoints and and its remote ref-erences(see Figure4).If and are sharedvertices,(a)(c)(b)Figure4:In the parallel longest edge bisection algo-rithm some elements(shaded)are initially selected for re-finement.If the refinement creates a new(black)ver-tex on a processor boundary,the refinement propagates to neighbors.Finally the references are updated accord-ingly.then has a remote reference to copies of and lo-cated in processor.These references are included in the message,so that can identify the non-conforming edge and insert the new vertex.A similar strategy can be used when the edge is refined several times during the re-finement phase,but in this case,the vertex is not located at the midpoint of.Different processors can be in different phases during the refinement.For example,at any given time a processor can be refining some of its elements(serial phase)while neighboring processors have refined all their elements and are waiting for propagation messages(parallel phase)from adjacent processors.waits until it has no elements to refine before receiving a message from.For every non-conforming edge included in a message to,creates its shared copy of the midpoint(unless it already exists) and inserts the new non-conforming elements adjacent to into a new set of elements to be refined.The copy of in must also have a remote reference to the copy of in.For this reason,when propagates the refine-ment to it also includes in the message a reference to its copies of shared vertices.These steps are illustrated in Figure4.then enters the serial phase again,where the elements in are refined.(c)(b)(a)Figure5:Both processors select(shaded)mesh el-ements for refinement.The refinement propagates to a neighboring processor resulting in more elements be-ing refined.5.1.The Challenge of Refining in ParallelThe description of the parallel refinement algorithm is not complete because refinement propagation across pro-cessor boundaries can create two synchronization prob-lems.Thefirst problem,adaptation collision,occurs when two(or more)processors decide to refine adjacent elements (one in each processor)during the serial phase,creating two(or more)vertex copies over a shared edge,one in each processor.It is important that all copies refer to the same logical vertex because in a numerical simulation each ver-tex must include the contribution of all the elements around it(see Figure5).The second problem that arises,termination detection, is the determination that a refinement phase is complete. The serial refinement algorithm terminates when the pro-cessor has no more elements to refine.In the parallel ver-sion termination is a global decision that cannot be deter-mined by an individual processor and requires a collabora-tive effort of all the processors involved in the refinement. Although a processor may have adapted all of its mesh elements in,it cannot determine whether this condition holds for all other processors.For example,at any given time,no processor might have any more elements to re-fine.Nevertheless,the refinement cannot terminate because there might be some propagation messages in transit.The algorithm for detecting the termination of parallel refinement is based on Dijkstra’s general distributed termi-nation algorithm[24,25].A global termination condition is reached when no element is selected for refinement.Hence if is the set of all elements in the mesh currently marked for refinement,then the algorithmfinishes when.The termination detection procedure uses message ac-knowledgments.For every propagation message that receives,it maintains the identity of its source()and to which processors it propagated refinements.Each prop-agation message is acknowledged.acknowledges to after it has refined all the non-conforming elements created by’s message and has also received acknowledgments from all the processors to which it propagated refinements.A processor can be in two states:an inactive state is one in which has no elements to refine(it cannot send new propagation messages to other processors)but can re-ceive messages.If receives a propagation message from a neighboring processor,it moves from an inactive state to an active state,selects the elements for refinement as spec-ified in the message and proceeds to refine them.Let be the set of elements in needing refinement.A processor becomes inactive when:has received an acknowledgment for every propa-gation message it has sent.has acknowledged every propagation message it has received..Using this definition,a processor might have no more elements to refine()but it might still be in an active state waiting for acknowledgments from adjacent processors.When a processor becomes inactive,sends an acknowledgment to the processors whose propagation message caused to move from an inactive state to an active state.We assume that the refinement is started by the coordi-nator processor,.At this stage,is in the active state while all the processors are in the inactive state.ini-tiates the refinement by sending the appropriate messages to other processors.This message also specifies the adapta-tion criterion to use to select the elements for refinement in.When a processor receives a message from,it changes to an active state,selects some elements for refine-ment either explicitly or by using the specified adaptation criterion,and then refines them using the serial bisection algorithm,keeping track of the vertices created over shared edges as described earlier.When itfinishes refining its ele-ments,sends a message to each processor on whose shared edges created a shared vertex.then listens for messages.Only when has refined all the elements specified by and is not waiting for any acknowledgment message from other processors does it sends an acknowledgment to .Global termination is detected when the coordinator becomes inactive.When receives an acknowledgment from every processor this implies that no processor is re-fining an element and that no processor is waiting for an acknowledgment.Hence it is safe to terminate the refine-ment.then broadcasts this fact to all the other proces-sors.6.Properties of Meshes Refined in ParallelOur parallel refinement algorithm is guaranteed to ter-minate.In every serial phase the longest edge bisectionLet be a set of elements to be refinedwhile there is an element dobisect by its longest edgeinsert any non-conforming element intoend whileFigure6:General longest-edge bisection(GLB)algorithm.algorithm is used.In this algorithm the refinement prop-agates towards progressively longer edges and will even-tually reach the longest edge in each processor.Between processors the refinement also propagates towards longer edges.Global termination is detected by using the global termination detection procedure described in the previous section.The resulting mesh is conforming.Every time a new vertex is created over a shared edge,the refinement propagates to adjacent processors.Because every element is always bisected by its longest edge,for triangular meshes the results by Rosenberg and Stenger on the size of the min-imum angle of two-dimensional meshes also hold.It is not immediately obvious if the resulting meshes obtained by the serial and parallel longest edge bisection al-gorithms are the same or if different partitions of the mesh generate the same refined mesh.As we mentioned earlier, messages can arrive from different sources in different or-ders and elements may be selected for refinement in differ-ent sequences.We now show that the meshes that result from refining a set of elements from a given mesh using the serial and parallel algorithms described in Sections4and5,re-spectively,are the same.In this proof we use the general longest-edge bisection(GLB)algorithm outlined in Figure 6where the order in which elements are refined is not spec-ified.In a parallel environment,this order depends on the partition of the mesh between processors.After showing that the resulting refined mesh is independent of the order in which the elements are refined using the serial GLB al-gorithm,we show that every possible distribution of ele-ments between processors and every order of parallel re-finement yields the same mesh as would be produced by the serial algorithm.Theorem6.1The mesh that results from the refinement of a selected set of elements of a given mesh using the GLB algorithm is independent of the order in which the elements are refined.Proof:An element is refined using the GLBalgorithm if it is in the initial set or refinementpropagates to it.An element is refinedif one of its neighbors creates a non-conformingvertex at the midpoint of one of its edges.Therefinement of by its longest edge divides theelement into two nested subelements andcalled the children of.These children are inturn refined by their longest edge if one of their edges is non-conforming.The refinement proce-dure creates a forest of trees of nested elements where the root of each tree is an element in theinitial mesh and the leaves are unrefined ele-ments.For every element,let be the refinement tree of nested elements rooted atwhen the refinement procedure terminates. Using the GLB procedure elements can be se-lected for refinement in different orders,creating possible different refinement histories.To show that this cannot happen we assume the converse, namely,that two refinement histories and generate different refined meshes,and establish a contradiction.Thus,assume that there is an ele-ment such that the refinement trees and,associated with the refinement histories and of respectively,are different.Be-cause the root of and is the same in both refinement histories,there is a place where both treesfirst differ.That is,starting at the root,there is an element that is common to both trees but for some reason,its children are different.Be-cause is always bisected by the longest edge, the children of are different only when is refined in one refinement history and it is not re-fined in the other.In other words,in only one of the histories does have children.Because is refined in only one refinement his-tory,then,the initial set of elements to refine.This implies that must have been refined because one of its edges became non-conforming during one of the refinement histo-ries.Let be the set of elements that are present in both refinement histories,but are re-fined in and not in.We define in a similar way.For each refinement history,every time an ele-ment is refined,it is assigned an increasing num-ber.Select an element from either or that has the lowest number.Assume that we choose from so that is refined in but not in.In,is refined because a neigh-boring element created a non-conforming ver-tex at the midpoint of their shared edge.There-fore is refined in but not in because otherwise it would cause to be refined in both sequences.This implies that is also in and has a lower refinement number than con-。

211252065_烯丙基正离子旋转异构反应的计算化学实验设计

211252065_烯丙基正离子旋转异构反应的计算化学实验设计

Univ.Chem. 2023, 38 (2), 197–206197收稿:2022-05-08;录用:2022-06-27;网络发表:2022-07-07 *通讯作者,Email:****************.cn 基金资助:国家自然科学基金(22003036)•化学实验•doi: 10.3866/PKU.DXHX202205027烯丙基正离子旋转异构反应的计算化学实验设计王亚妮,张学鹏*陕西师范大学化学化工学院,西安 710119摘要:设计了一个面向高年级本科生或低年级研究生的计算化学探索实验,即利用密度泛函理论(DFT)计算烯丙基正离子的旋转异构反应。

该实验设计了反应物结构优化、过渡态寻找、内禀反应坐标建立等过程,可以较为全面地帮助学生了解计算化学的基本概念与操作,加深对分子微观结构的感知以及对过渡态理论中“旧键即将断裂,新键即将形成”概念的理解。

本实验通过旋转异构反应的势能面的构建,也可以帮助学生认识反应热力学和动力学的差别。

通过进一步的电荷布居分析以及前线轨道分析,可以帮助学生直观地学习并理解分子的电子结构以及反应活性位点概念。

关键词:烯丙基正离子;旋转异构;密度泛函理论;反应势能面;实验设计 中图分类号:G64;O6Investigations on Allyl Cation Rotational Isomerism: A Computational Experiment DesignYa’ni Wang, Xue-Peng Zhang *School of Chemistry and Chemical Engineering, Shaanxi Normal University, Xi’an 710119, China.Abstract: In this study, a computational chemistry exploration experiment for senior undergraduate or beginning graduate students is designed. The rotational isomerization reaction of an allyl cation is investigated using density functional theory (DFT) calculations. The theoretical experiment involves molecular geometry optimization, transition state location, and establishment of intrinsic reaction coordinates (IRCs). This design can help students understand the basic concepts and operations of computational chemistry. Furthermore, the concepts of molecular microstructures and the notion of “old bonds are about to break and new bonds are about to form” in the transition state theory are discussed. This experiment will also aid the understanding of the differences between reaction thermodynamics and kinetics through the construction of potential energy surfaces. Further investigations of charge population analysis and frontier orbital analysis will aid the understanding of electronic structures of molecules as well as the concept of reaction reactive sites.Key Words: Allyl cation; Rotational isomerism; Density functional theory; Potential energy surface;Experimental design随着计算机技术的不断突破和量子化学理论的不断完善,理论计算在材料、催化、合成、生物医药等不同领域都得到了广泛应用[1]。

人工智能(AI)中英文术语对照表

人工智能(AI)中英文术语对照表

人工智能(AI)中英文术语对照表目录人工智能(AI)中英文术语对照表 (1)Letter A (1)Letter B (2)Letter C (3)Letter D (4)Letter E (5)Letter F (6)Letter G (6)Letter H (7)Letter I (7)Letter K (8)Letter L (8)Letter M (9)Letter N (10)Letter O (10)Letter P (11)Letter Q (12)Letter R (12)Letter S (13)Letter T (14)Letter U (14)Letter V (15)Letter W (15)Letter AAccumulated error backpropagation 累积误差逆传播Activation Function 激活函数Adaptive Resonance Theory/ART 自适应谐振理论Addictive model 加性学习Adversarial Networks 对抗网络Affine Layer 仿射层Affinity matrix 亲和矩阵Agent 代理/ 智能体Algorithm 算法Alpha-beta pruning α-β剪枝Anomaly detection 异常检测Approximation 近似Area Under ROC Curve/AUC Roc 曲线下面积Artificial General Intelligence/AGI 通用人工智能Artificial Intelligence/AI 人工智能Association analysis 关联分析Attention mechanism注意力机制Attribute conditional independence assumption 属性条件独立性假设Attribute space 属性空间Attribute value 属性值Autoencoder 自编码器Automatic speech recognition 自动语音识别Automatic summarization自动摘要Average gradient 平均梯度Average-Pooling 平均池化Action 动作AI language 人工智能语言AND node 与节点AND/OR graph 与或图AND/OR tree 与或树Answer statement 回答语句Artificial intelligence,AI 人工智能Automatic theorem proving自动定理证明Letter BBreak-Event Point/BEP 平衡点Backpropagation Through Time 通过时间的反向传播Backpropagation/BP 反向传播Base learner 基学习器Base learning algorithm 基学习算法Batch Normalization/BN 批量归一化Bayes decision rule 贝叶斯判定准则Bayes Model Averaging/BMA 贝叶斯模型平均Bayes optimal classifier 贝叶斯最优分类器Bayesian decision theory 贝叶斯决策论Bayesian network 贝叶斯网络Between-class scatter matrix 类间散度矩阵Bias 偏置/ 偏差Bias-variance decomposition 偏差-方差分解Bias-Variance Dilemma 偏差–方差困境Bi-directional Long-Short Term Memory/Bi-LSTM 双向长短期记忆Binary classification 二分类Binomial test 二项检验Bi-partition 二分法Boltzmann machine 玻尔兹曼机Bootstrap sampling 自助采样法/可重复采样/有放回采样Bootstrapping 自助法Letter CCalibration 校准Cascade-Correlation 级联相关Categorical attribute 离散属性Class-conditional probability 类条件概率Classification and regression tree/CART 分类与回归树Classifier 分类器Class-imbalance 类别不平衡Closed -form 闭式Cluster 簇/类/集群Cluster analysis 聚类分析Clustering 聚类Clustering ensemble 聚类集成Co-adapting 共适应Coding matrix 编码矩阵COLT 国际学习理论会议Committee-based learning 基于委员会的学习Competitive learning 竞争型学习Component learner 组件学习器Comprehensibility 可解释性Computation Cost 计算成本Computational Linguistics 计算语言学Computer vision 计算机视觉Concept drift 概念漂移Concept Learning System /CLS概念学习系统Conditional entropy 条件熵Conditional mutual information 条件互信息Conditional Probability Table/CPT 条件概率表Conditional random field/CRF 条件随机场Conditional risk 条件风险Confidence 置信度Confusion matrix 混淆矩阵Connection weight 连接权Connectionism 连结主义Consistency 一致性/相合性Contingency table 列联表Continuous attribute 连续属性Convergence收敛Conversational agent 会话智能体Convex quadratic programming 凸二次规划Convexity 凸性Convolutional neural network/CNN 卷积神经网络Co-occurrence 同现Correlation coefficient 相关系数Cosine similarity 余弦相似度Cost curve 成本曲线Cost Function 成本函数Cost matrix 成本矩阵Cost-sensitive 成本敏感Cross entropy 交叉熵Cross validation 交叉验证Crowdsourcing 众包Curse of dimensionality 维数灾难Cut point 截断点Cutting plane algorithm 割平面法Letter DData mining 数据挖掘Data set 数据集Decision Boundary 决策边界Decision stump 决策树桩Decision tree 决策树/判定树Deduction 演绎Deep Belief Network 深度信念网络Deep Convolutional Generative Adversarial Network/DCGAN 深度卷积生成对抗网络Deep learning 深度学习Deep neural network/DNN 深度神经网络Deep Q-Learning 深度Q 学习Deep Q-Network 深度Q 网络Density estimation 密度估计Density-based clustering 密度聚类Differentiable neural computer 可微分神经计算机Dimensionality reduction algorithm 降维算法Directed edge 有向边Disagreement measure 不合度量Discriminative model 判别模型Discriminator 判别器Distance measure 距离度量Distance metric learning 距离度量学习Distribution 分布Divergence 散度Diversity measure 多样性度量/差异性度量Domain adaption 领域自适应Downsampling 下采样D-separation (Directed separation)有向分离Dual problem 对偶问题Dummy node 哑结点Dynamic Fusion 动态融合Dynamic programming 动态规划Letter EEigenvalue decomposition 特征值分解Embedding 嵌入Emotional analysis 情绪分析Empirical conditional entropy 经验条件熵Empirical entropy 经验熵Empirical error 经验误差Empirical risk 经验风险End-to-End 端到端Energy-based model 基于能量的模型Ensemble learning 集成学习Ensemble pruning 集成修剪Error Correcting Output Codes/ECOC 纠错输出码Error rate 错误率Error-ambiguity decomposition 误差-分歧分解Euclidean distance 欧氏距离Evolutionary computation 演化计算Expectation-Maximization 期望最大化Expected loss 期望损失Exploding Gradient Problem 梯度爆炸问题Exponential loss function 指数损失函数Extreme Learning Machine/ELM 超限学习机Letter FExpert system 专家系统Factorization因子分解False negative 假负类False positive 假正类False Positive Rate/FPR 假正例率Feature engineering 特征工程Feature selection特征选择Feature vector 特征向量Featured Learning 特征学习Feedforward Neural Networks/FNN 前馈神经网络Fine-tuning 微调Flipping output 翻转法Fluctuation 震荡Forward stagewise algorithm 前向分步算法Frequentist 频率主义学派Full-rank matrix 满秩矩阵Functional neuron 功能神经元Letter GGain ratio 增益率Game theory 博弈论Gaussian kernel function 高斯核函数Gaussian Mixture Model 高斯混合模型General Problem Solving 通用问题求解Generalization 泛化Generalization error 泛化误差Generalization error bound 泛化误差上界Generalized Lagrange function 广义拉格朗日函数Generalized linear model 广义线性模型Generalized Rayleigh quotient 广义瑞利商Generative Adversarial Networks/GAN 生成对抗网络Generative Model 生成模型Generator 生成器Genetic Algorithm/GA 遗传算法Gibbs sampling 吉布斯采样Gini index 基尼指数Global minimum 全局最小Global Optimization 全局优化Gradient boosting 梯度提升Gradient Descent 梯度下降Graph theory 图论Ground-truth 真相/真实Letter HHard margin 硬间隔Hard voting 硬投票Harmonic mean 调和平均Hesse matrix海塞矩阵Hidden dynamic model 隐动态模型Hidden layer 隐藏层Hidden Markov Model/HMM 隐马尔可夫模型Hierarchical clustering 层次聚类Hilbert space 希尔伯特空间Hinge loss function 合页损失函数Hold-out 留出法Homogeneous 同质Hybrid computing 混合计算Hyperparameter 超参数Hypothesis 假设Hypothesis test 假设验证Letter IICML 国际机器学习会议Improved iterative scaling/IIS 改进的迭代尺度法Incremental learning 增量学习Independent and identically distributed/i.i.d. 独立同分布Independent Component Analysis/ICA 独立成分分析Indicator function 指示函数Individual learner 个体学习器Induction 归纳Inductive bias 归纳偏好Inductive learning 归纳学习Inductive Logic Programming/ILP 归纳逻辑程序设计Information entropy 信息熵Information gain 信息增益Input layer 输入层Insensitive loss 不敏感损失Inter-cluster similarity 簇间相似度International Conference for Machine Learning/ICML 国际机器学习大会Intra-cluster similarity 簇内相似度Intrinsic value 固有值Isometric Mapping/Isomap 等度量映射Isotonic regression 等分回归Iterative Dichotomiser 迭代二分器Letter KKernel method 核方法Kernel trick 核技巧Kernelized Linear Discriminant Analysis/KLDA 核线性判别分析K-fold cross validation k 折交叉验证/k 倍交叉验证K-Means Clustering K –均值聚类K-Nearest Neighbours Algorithm/KNN K近邻算法Knowledge base 知识库Knowledge Representation 知识表征Letter LLabel space 标记空间Lagrange duality 拉格朗日对偶性Lagrange multiplier 拉格朗日乘子Laplace smoothing 拉普拉斯平滑Laplacian correction 拉普拉斯修正Latent Dirichlet Allocation 隐狄利克雷分布Latent semantic analysis 潜在语义分析Latent variable 隐变量Lazy learning 懒惰学习Learner 学习器Learning by analogy 类比学习Learning rate 学习率Learning Vector Quantization/LVQ 学习向量量化Least squares regression tree 最小二乘回归树Leave-One-Out/LOO 留一法linear chain conditional random field 线性链条件随机场Linear Discriminant Analysis/LDA 线性判别分析Linear model 线性模型Linear Regression 线性回归Link function 联系函数Local Markov property 局部马尔可夫性Local minimum 局部最小Log likelihood 对数似然Log odds/logit 对数几率Logistic Regression Logistic 回归Log-likelihood 对数似然Log-linear regression 对数线性回归Long-Short Term Memory/LSTM 长短期记忆Loss function 损失函数Letter MMachine translation/MT 机器翻译Macron-P 宏查准率Macron-R 宏查全率Majority voting 绝对多数投票法Manifold assumption 流形假设Manifold learning 流形学习Margin theory 间隔理论Marginal distribution 边际分布Marginal independence 边际独立性Marginalization 边际化Markov Chain Monte Carlo/MCMC马尔可夫链蒙特卡罗方法Markov Random Field 马尔可夫随机场Maximal clique 最大团Maximum Likelihood Estimation/MLE 极大似然估计/极大似然法Maximum margin 最大间隔Maximum weighted spanning tree 最大带权生成树Max-Pooling 最大池化Mean squared error 均方误差Meta-learner 元学习器Metric learning 度量学习Micro-P 微查准率Micro-R 微查全率Minimal Description Length/MDL 最小描述长度Minimax game 极小极大博弈Misclassification cost 误分类成本Mixture of experts 混合专家Momentum 动量Moral graph 道德图/端正图Multi-class classification 多分类Multi-document summarization 多文档摘要Multi-layer feedforward neural networks 多层前馈神经网络Multilayer Perceptron/MLP 多层感知器Multimodal learning 多模态学习Multiple Dimensional Scaling 多维缩放Multiple linear regression 多元线性回归Multi-response Linear Regression /MLR 多响应线性回归Mutual information 互信息Letter NNaive bayes 朴素贝叶斯Naive Bayes Classifier 朴素贝叶斯分类器Named entity recognition 命名实体识别Nash equilibrium 纳什均衡Natural language generation/NLG 自然语言生成Natural language processing 自然语言处理Negative class 负类Negative correlation 负相关法Negative Log Likelihood 负对数似然Neighbourhood Component Analysis/NCA 近邻成分分析Neural Machine Translation 神经机器翻译Neural Turing Machine 神经图灵机Newton method 牛顿法NIPS 国际神经信息处理系统会议No Free Lunch Theorem/NFL 没有免费的午餐定理Noise-contrastive estimation 噪音对比估计Nominal attribute 列名属性Non-convex optimization 非凸优化Nonlinear model 非线性模型Non-metric distance 非度量距离Non-negative matrix factorization 非负矩阵分解Non-ordinal attribute 无序属性Non-Saturating Game 非饱和博弈Norm 范数Normalization 归一化Nuclear norm 核范数Numerical attribute 数值属性Letter OObjective function 目标函数Oblique decision tree 斜决策树Occam’s razor 奥卡姆剃刀Odds 几率Off-Policy 离策略One shot learning 一次性学习One-Dependent Estimator/ODE 独依赖估计On-Policy 在策略Ordinal attribute 有序属性Out-of-bag estimate 包外估计Output layer 输出层Output smearing 输出调制法Overfitting 过拟合/过配Oversampling 过采样Letter PPaired t-test 成对t 检验Pairwise 成对型Pairwise Markov property成对马尔可夫性Parameter 参数Parameter estimation 参数估计Parameter tuning 调参Parse tree 解析树Particle Swarm Optimization/PSO粒子群优化算法Part-of-speech tagging 词性标注Perceptron 感知机Performance measure 性能度量Plug and Play Generative Network 即插即用生成网络Plurality voting 相对多数投票法Polarity detection 极性检测Polynomial kernel function 多项式核函数Pooling 池化Positive class 正类Positive definite matrix 正定矩阵Post-hoc test 后续检验Post-pruning 后剪枝potential function 势函数Precision 查准率/准确率Prepruning 预剪枝Principal component analysis/PCA 主成分分析Principle of multiple explanations 多释原则Prior 先验Probability Graphical Model 概率图模型Proximal Gradient Descent/PGD 近端梯度下降Pruning 剪枝Pseudo-label伪标记Letter QQuantized Neural Network 量子化神经网络Quantum computer 量子计算机Quantum Computing 量子计算Quasi Newton method 拟牛顿法Letter RRadial Basis Function/RBF 径向基函数Random Forest Algorithm 随机森林算法Random walk 随机漫步Recall 查全率/召回率Receiver Operating Characteristic/ROC 受试者工作特征Rectified Linear Unit/ReLU 线性修正单元Recurrent Neural Network 循环神经网络Recursive neural network 递归神经网络Reference model 参考模型Regression 回归Regularization 正则化Reinforcement learning/RL 强化学习Representation learning 表征学习Representer theorem 表示定理reproducing kernel Hilbert space/RKHS 再生核希尔伯特空间Re-sampling 重采样法Rescaling 再缩放Residual Mapping 残差映射Residual Network 残差网络Restricted Boltzmann Machine/RBM 受限玻尔兹曼机Restricted Isometry Property/RIP 限定等距性Re-weighting 重赋权法Robustness 稳健性/鲁棒性Root node 根结点Rule Engine 规则引擎Rule learning 规则学习Letter SSaddle point 鞍点Sample space 样本空间Sampling 采样Score function 评分函数Self-Driving 自动驾驶Self-Organizing Map/SOM 自组织映射Semi-naive Bayes classifiers 半朴素贝叶斯分类器Semi-Supervised Learning半监督学习semi-Supervised Support Vector Machine 半监督支持向量机Sentiment analysis 情感分析Separating hyperplane 分离超平面Searching algorithm 搜索算法Sigmoid function Sigmoid 函数Similarity measure 相似度度量Simulated annealing 模拟退火Simultaneous localization and mapping同步定位与地图构建Singular Value Decomposition 奇异值分解Slack variables 松弛变量Smoothing 平滑Soft margin 软间隔Soft margin maximization 软间隔最大化Soft voting 软投票Sparse representation 稀疏表征Sparsity 稀疏性Specialization 特化Spectral Clustering 谱聚类Speech Recognition 语音识别Splitting variable 切分变量Squashing function 挤压函数Stability-plasticity dilemma 可塑性-稳定性困境Statistical learning 统计学习Status feature function 状态特征函Stochastic gradient descent 随机梯度下降Stratified sampling 分层采样Structural risk 结构风险Structural risk minimization/SRM 结构风险最小化Subspace 子空间Supervised learning 监督学习/有导师学习support vector expansion 支持向量展式Support Vector Machine/SVM 支持向量机Surrogat loss 替代损失Surrogate function 替代函数Symbolic learning 符号学习Symbolism 符号主义Synset 同义词集Letter TT-Distribution Stochastic Neighbour Embedding/t-SNE T –分布随机近邻嵌入Tensor 张量Tensor Processing Units/TPU 张量处理单元The least square method 最小二乘法Threshold 阈值Threshold logic unit 阈值逻辑单元Threshold-moving 阈值移动Time Step 时间步骤Tokenization 标记化Training error 训练误差Training instance 训练示例/训练例Transductive learning 直推学习Transfer learning 迁移学习Treebank 树库Tria-by-error 试错法True negative 真负类True positive 真正类True Positive Rate/TPR 真正例率Turing Machine 图灵机Twice-learning 二次学习Letter UUnderfitting 欠拟合/欠配Undersampling 欠采样Understandability 可理解性Unequal cost 非均等代价Unit-step function 单位阶跃函数Univariate decision tree 单变量决策树Unsupervised learning 无监督学习/无导师学习Unsupervised layer-wise training 无监督逐层训练Upsampling 上采样Letter VVanishing Gradient Problem 梯度消失问题Variational inference 变分推断VC Theory VC维理论Version space 版本空间Viterbi algorithm 维特比算法Von Neumann architecture 冯·诺伊曼架构Letter WWasserstein GAN/WGAN Wasserstein生成对抗网络Weak learner 弱学习器Weight 权重Weight sharing 权共享Weighted voting 加权投票法Within-class scatter matrix 类内散度矩阵Word embedding 词嵌入Word sense disambiguation 词义消歧。

Decomposition methods in stochastic linear program

Decomposition methods in stochastic linear program
Decomposition methods in stochastic linear programming: Dual variables
Horand I. Gassmann School of Business Administration
Dalhousie University Halifax, Nova Scotia, Canada
Only discrete random variables will be considered in this paper, so that the stochastic linear programming problem can be solved by working on the deterministic equivalent problem, which is a large scale (deterministic) LP.
Dempster 7] and Rockafellar and Wets 20] describe alternative methods for solving the stochastic programming problem based on augmented Lagrangian techniques. Mulvey and Vladimirou 16,17,18] report some computational success with an experimental implementation of Rockafellar and Wets' algorithm. Dempster et al. 8] gives a comparison and preliminary relative evaluation of Lagrangian techniques versus Benders decomposition which strongly favors the latter.

ai等前沿高科技发展项目中与数字有关的知识点

ai等前沿高科技发展项目中与数字有关的知识点

ai等前沿高科技发展项目中与数字有关的知识点英文版The Digital Aspects of AI and Other Cutting-Edge Technological DevelopmentsIn the realm of cutting-edge technological advancements, Artificial Intelligence (AI) holds a pivotal position. It is not just a buzzword anymore, but a rapidly growing field that is revolutionizing various industries. However, the intricacies of AI and other high-tech projects often involve complex digital concepts. Let's delve into some of the key knowledge points related to numbers in these cutting-edge technological developments.1. Data Representation: The foundation of AI and most technological advancements is data. This data is typically represented digitally, often in the form of binary code (consisting of 0s and 1s). Understanding how data isrepresented and manipulated digitally is crucial for comprehending the underlying mechanisms of AI systems.2. Algorithms: Algorithms are the instructions that guide AI systems to perform tasks. These algorithms are often highly mathematical in nature, involving complex equations and numerical computations. Understanding the mathematical principles behind these algorithms is key to appreciating their role in AI and other technological projects.3. Machine Learning: Machine learning is a subset of AI that focuses on teaching computers to learn from data without being explicitly programmed. This learning process involves the manipulation of large datasets, statistical analysis, and numerical optimization techniques. A basic understanding of these numerical concepts is essential for grasping the principles of machine learning.4. Computational Power: The execution of AI algorithms and high-tech projects often requires immense computational power. This power is measured in terms of processing speeds,memory capacities, and numerical precision. Understanding these numerical metrics is crucial for evaluating the feasibility and scalability of technological advancements.5. Security and Privacy: As technology becomes more intertwined with our daily lives, the importance of digital security and privacy cannot be overstated. This involves concepts like encryption, data anonymization, and numerical-based security protocols. A basic grasp of these numerical security measures is essential for appreciating their role in safeguarding technological advancements.In conclusion, AI and other cutting-edge technological developments are rich in digital concepts and numerical principles. A fundamental understanding of data representation, algorithms, machine learning, computational power, and security measures is crucial for comprehending and appreciating these advancements. By delving into these numerical knowledge points, we can gain a deeper insight intothe inner workings of the technological revolution that is shaping our future.中文版AI等前沿高科技发展项目中的数字相关知识点在前沿科技发展的领域中,人工智能(AI)占据了至关重要的地位。

Algorithm for Model Validation Theory and Applications

Algorithm for Model Validation Theory and Applications
Algorithm for Model Validation: Theory and Applications
D. Sornette1,2,3 , A. B. Davis4, K. Ide1,5 , K. R. Vixie6 , V. Pisarenko7 , and J. R. Kamm8
arXiv:physics/0511219v2 [physics.data-an] 24 Dec 2006
Hale Waihona Puke 7International Institute of Earthquake Prediction Theory and Mathematical Geophysics, Russian Academy of Sciences, Warshavskoye sh., 79, kor. 2, Moscow 113556, Russia
3 4
now at D-MTEC, ETH Zurich, CH-8032 Zurich, Switzerland
Los Alamos National Laboratory, Space and Remote Sensing Group (ISR-2), Los Alamos, NM 87545, USA
5
Department of Atmospheric and Oceanic Sciences, University of California, Los Angeles, CA 90095, USA
6
Los Alamos National Laboratory, Mathematical Modeling and Analysis Group (T-7), Los Alamos, New Mexico 87545, USA

Multilayer networks

Multilayer networks

1. Introduction Network theory is an important tool for describing and analysing complex systems throughout the social, biological, physical, information and engineering sciences [1–3]. Originally, almost all studies of networks employed an abstraction in which systems are represented as ordinary graphs [4]: the ‘nodes’ (or ‘vertices’) of the graphs represent some entity or agent, and a tie between a pair of nodes is represented using a single, static, unweighted ‘edge’ (or ‘link’). Self- and multi-edges were also typically ignored. Although this approach is naive in many respects, it has been extremely successful. For example, it has been used to illustrate that many real networks possess a heavy-tailed degree distribution [5,6], exhibit the small-world property [7,8], contain nodes that play central roles [1,2] and/or have modular structures [9–11]. As research on complex systems has matured, it has become increasingly essential to move beyond simple graphs and investigate more complicated but more realistic frameworks. For example, edges often exhibit heterogeneous features: they can be directed [1,2,12], have different strengths (i.e. ‘weights’) [2,13,14], exist only between nodes that belong to different sets (e.g. bipartite networks) [1,2, 15] or be active only at certain times [16,17]. Most recently, there have been increasingly intense efforts to investigate networks with multiple types of connections (see Section 2.5) and so-called ‘network of networks’1 [19] (see Section 2.4). Such systems were examined decades ago in disciplines like sociology and engineering, but the explosive attempt to develop frameworks to study multilayer complex systems and to generalize a large body of familiar tools from network science is a recent phenomenon.2 In social networks, one can categorize edges based on the nature of the relationships (i.e. ties) or actions that they represent [2,21,22]. Reducing a social system to a network in which actors are connected in a pairwise fashion by only a single type of relationship is often an extremely crude approximation of reality. As a result, sociologists recognized decades ago that it is crucial to study social systems by constructing multiple social networks using different types of ties among the same set of individuals [2,23].3 For example, consider the sociograms4 that were drawn in the 1930s to represent social networks in a bank-wiring room [26]. These sociograms depicted relations between 14 individuals via 6 different types of social interactions (see Fig. 6(b)). In the sociology literature, networks in which each edge is categorized by its type are called ‘multiplex networks’ [27,28] or ‘multirelational networks’ [2]. (Such networks are also said to possess ‘multi-stranded’ relationships [29].) Social networks also often include several types of nodes (e.g. males and females) or hierarchical structures (e.g. individuals are part of organizations), which have been studied using ‘multilevel networks’ (see Section 2.8). The notion of a ‘network of networks’ also dates at least as far back as 1973 [30]. The tools
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

a rX iv:mat h /211156v1[mat h.CO]9N ov2002IDEAL DECOMPOSITIONS AND COMPUTATION OF TENSOR NORMAL FORMS BERND FIEDLER Abstract.Symmetry properties of r -times covariant tensors T can be de-scribed by certain linear subspaces W of the group ring K [S r ]of a symmet-ric group S r .If for a class of tensors T such a W is known,the elements of the orthogonal subspace W ⊥of W within the dual space K [S r ]∗of K [S r ]yield linear identities needed for a treatment of the term combination problem for the coordinates of the T .We give the structure of these W for every situa-tion which appears in symbolic tensor calculations by computer.Characterizing idempotents of such W can be determined by means of an ideal decomposition algorithm which works in every semisimple ring up to an isomorphism.Fur-thermore,we use tools such as the Littlewood-Richardson rule,plethysms and discrete Fourier transforms for S r to increase the efficience of calculations.All described methods were implemented in a Mathematica package called PERMS .1.The Term Combination Problem for Tensors The use of computer algebra systems for symbolic calculations with tensor ex-pressions is very important in differential geometry,tensor analysis and general relativity theory.The investigations of this paper 1are motivated by the follow-ing term combination problem or normal form problem which occurs within such calculations.Let us consider real or complex linear combinations τ=n i =1αi T (i ),αi ∈R ,C (1.1)of expressions T (i )which are formed from the coordinates of certain tensors A ,B ,C ,...by multiplication and,possibly,contractions of some pairs of indices.An example of such an expression isA iabc A a jkdB bd eC ec .(1.2)In (1.2)we use Einstein’s summation convention.Further we assume that each of the numbers of A,B,C,...is constant if we run through the set of the T (i ).Now we aim to carry out symbolic calculations with expressions of the type (1.1),(1.2)2 B.FIEDLERaccording to the rules of the Ricci calculus.We assume that there is a metric tensor g which allows us to raise or lower indices,for instanceT jkb i =g bc T jk i c,T jia k=g ac T cji k.If now the tensors A,B,C,...have symmetries and/or fulfil linear identities2, then there exist relations between the T(i)in(1.1).(We restrict us to linear rela-tions.)Thus the problem arises to detect such relations in sums(1.1),generated by symbolic calculations,and to reduce(1.1)to linear combinations of linearly independent T(i)(normal forms).It is well-known that the representation theory of symmetric groups S r yields powerful tools to treat this term combination problem.The connection between tensors and the representation theory of S r has been considered already in books of J.A.Schouten[26](1924),H.Weyl[27](1939)and H.Boerner[2](1955).In the 1940s Littlewood has developed and used tools such as the Littlewood-Richardson rule and plethysms for the investigation of tensors(see S.A.Fulling et al.[14] (references)and D.E.Littlewood[20](appendix)).Applying the same methods,Fulling,King,Wybourne and Cummins[14]have calculated large lists of normal form terms of polynomials of the Riemann curvature tensor and its covariant derivatives(by means of the program package Schur[28]). In their paper[14]they formulated the following steps to solve the above term combination problem for tensors:(a)Generate the space spanned by the set of homogeneous monomials of adefinite’order’or’degree of homogeneity’formed from the coordinates of tensors of relevance by multiplication and index-pair contraction.(b)Construct a basis of this space(normal forms).(c)Present an algorithm for expressing an arbitrary element of the space interms of the basis.Our present paper yields a method to solve(b)and(c)for arbitrary tensors.2.Tensors and the Group Ring of a Symmetric GroupWe make use of the following connection between r-times covariant tensors T∈T r V over afinite-dimensional K-vector space V and elements of the group ring K[S r]of a symmetric group S r over afield K=R or K=C.Definition2.1.Any tensor T∈T r V and any r-tuple b:=(v1,...,v r)∈V r of r vectors from V induce a function T b:S r→K according to the ruleT b(p):=T(v p(1),...,v p(r)),p∈S r.(2.1)We identify this function with the group ring element T b:= p∈S r T b(p)p∈K[S r].IDEALS AND TENSOR NORMAL FORMS3 We allow the linear dependence of the v i and repetitions of vectors in the above r-tuple b.Obviously,two tensors S,T∈T r V fulfil S=T iffS b=T b for all b∈V r. We try to describe symmetry properties of tensors with the help of the T b by the following principle:If a”class”of tensors with a certain symmetry property is given,then we search such a linear subspace W⊆K[S r]that contains all T b of the tensors from the”class”being considered.The linear identities which characterize W yield then identities for the coordinates of the T which can be used in the treatment of the term combination problem.Every a= p∈S r a(p)p∈K[S r]acts as so-called symmetry operator a:T→aT on tensors T∈T r V if we define(2.2)(aT)(v1,...,v r):= p∈S r a(p)T(v p(1),...,v p(r)),v i∈V.We denote by’∗’the mapping∗:a= p∈S r a(p)p→a∗:= p∈S r a(p)p−1. Furthermore,if p∈S r and b=(v1,...,v r)∈V r,then we denote by pb the r-tuple pb:=(v p(1),...,v p(r)).Many of our calculations are based onLemma 2.2.3If a= q∈S r a(q)q∈K[S r],T∈T r V,p,q∈S r and b= (v1,...,v r)∈V r,then we have(2.3)T b(p◦q)=(qT)b(p)=T pb(q)(2.4)q(pb)=(p◦q)b(2.5)(aT)b=T b·a∗(2.6)T b=p·T pb.The following symmetry concepts are used for tensors.(See B.Fiedler[10, Sec.III.2]and B.Fiedler[12].See also R.Merris[22,pp.151,153,157],H.Boerner [2,p.127],G.Eisenreich[7,p.601].)Definition2.3.(a)Let r⊆K[S r]be a right ideal of K[S r]for which an a∈r and a T∈T r V exist such that aT=0.Then the tensor set T r:={aT|a∈r,T∈T r V}is called the symmetry class of tensors defined by r.(b)Let a1,...,a n∈K[S r]be afinite set of group ring elements.We say thata tensor T∈T r V possesses a symmetry defined by a1,...,a n if T satisfiesthe linear equation system a i T=0,(i=1,...,n).If e is a generating idempotent of a right ideal r=e·K[S r]that defines a symmetry class T r then T r fulfils T r={eT|T∈T r V}and a tensor T∈T r V belongs to T r iffeT=T.(See H.Boerner[2,p.127]or B.Fiedler[10,Sec.III.2.1].) Now it can be shown that all T b of tensors T which have a symmetry(a)or(b) lie in a certain left ideal of K[S r].4 B.FIEDLERProposition2.4.4Let e∈K[S r]be an idempotent.Then a T∈T r V fulfils the condition eT=T iffT b∈l:=K[S r]·e∗for all b∈V r,i.e.all T b of T lie in the left ideal l generated by e∗.Proposition2.5.5Let a1,...,a m∈K[S r]be given group ring elements.A T∈T r V satisfies a system of linear identities a i T=0,(i=1,...,m),iffT b∈l:={x∈K[S r]|x·a∗i=0,i=1,...,m}for all b∈V r,i.e.all T b of T lie in the left annihilator ideal l of the set{a∗1,...,a∗m}.The proofs follow easily from(2.5).A further result isProposition 2.6.6If dim V≥r,then every left ideal l⊆K[S r]fulfils l= L K{T b|T∈T l∗,b∈V r}.(Here L K denotes the forming of the linear closure.)If dim V<r,then the T b of the tensors from T l∗will span only a linear subspace of l in general.In the case of tensors T with index contractions the role of the T b is played by certain sums b∈B b0γb T b,which we now define.Definition2.7.Let g∈T2V be a fundamental tensor with arbitrary signature on V and B={n1,...,n d}be an orthonormal basis of V with respect to g.Further let r,l be integers with2≤2l<r and b0=(v2l+1,...,v r)∈B r−2l be afixed(r−2l)-tuple of vectors from B.Then we denote by B b0the set7of r-tuples ofbasis vectorsB b:= (w1,w1,w2,w2,...,w l,w l,v2l+1,...,v r)∈B r (w1,...,w l)∈B l . Moreover,we setγb:= l i=1g(w i,w i)∈{1,−1}for every b∈B b0.Proposition2.8.8Let T∈T r V be a tensor and g∈T2V be a fundamental tensor.We determine all tensor coordinates with respect to an orthonormal basisB={n1,...,n d}of V.Let b0=(n i2l+1,...,n ir)∈B r−2l be afixed(r−2l)-tuple ofbasis vectors.Thenp∈S r(pT)j1j2...j lj1j2...j l i2l+1...i r p= b∈B b0γb T b.(2.7)Due to Prop.8the b∈B b0γb T b are objects which contain information about the tensor coordinates of T with l index-pair contractions.In the case of tensors TIDEALS AND TENSOR NORMAL FORMS5 with index contractions we search for linear subspaces W⊆K[S r]which contain all b∈B b0γb T b for afixed b0.The left ideals l from the Propositions4,5and6are the simplest examples of linear subspaces W describing tensor symmetries.Before we give such subspaces W in more complicated cases,we will explain how they can be used in the treatment of the term combination problem for tensors.93.The Treatment of the Term Combination ProblemThe term combination problem from Sec.1can be reformulated as the problem tofind all linear identities between the summands of given tensor expressionsτi 1...i r := p∈P c p T i p(1)...i p(r),c p∈K,P⊆S r or(3.1)τi2l+1...i r := p∈P c p(pT)j1j2...j lj1j2...j l i2l+1...i r,c p∈K,P⊆S r(3.2)where T∈T l∗is a tensor from a given symmetry class defined by a left ideal l (or a right ideal r=l∗).We assume that(3.1)and(3.2)are results of symbolic computer calculations.P is a subset of permutations,which is determined by the concrete form of the given expressions(3.1)or(3.2).Let W⊆l be a linear subspace which contains all T b or b∈B b0γb T b of T.If we consider the orthogonal subspace W⊥:={x∈K[S r]⋆|∀w∈W: x,w =0}of W,then every x∈W⊥yields a linear identity for the coordinates of T since 0= x,T b = p∈S r x p T b(p)= p∈S r x p T i p(1)...i p(r)or(3.3)0= x, b∈B b0γb T b = b∈B b0p∈S rγb T b(p)x p= p∈S r x p(pT)j1...j l j1...j l i2l+1...i rwhere x p:= x,p ,p∈S r.(The last steps are correct if all b occurring in(3.3) are r-tuples of basis vectors of V.)Every identity(3.3)can be used to eliminate certain summands in(3.1),(3.2).If W is spanned by all T b or b∈B b0γb T b of the tensors considered,then W⊥contains all linear identities which are possible between summands of expressions(3.1),(3.2)(compare Prop.6).If a basis{h1,...,h k}of W is known,then the coefficients x p of the x∈W⊥can be obtained from the linear equation systemx,h i = p∈S r h i(p)x p=0(i=1,...,k).(3.4)Thus an important goal is tofind such a basis{h1,...,h k}of W.(An efficient algorithm for that purpose is given in Prop.5.1.)Note that(3.4)is a very large system with a(k×r!)-coefficient matrix,k= dim W.However,since we only need identities to reduce sums(3.1),(3.2),we can6 B.FIEDLERrestrict us to solutions of(3.4)which fulfil x p=0for p∈S r\P.This reduces the number of columns to|P|.Furthermore,every of our spaces W is a linear subspace of a left ideal l=K[S r]·e.A decomposition e=e1+...+e m of the generating idempotent into pairwise orthogonal,primitive idempotents e i induces a decomposition W=W1⊕...⊕W m with W i⊆K[S r]·e i and a decomposition of the tensors T∈T l∗:T=e∗1T+...+e∗m T.Then we can transform(3.1),(3.2)into expressions formed from the e∗i T,for instance(3.2)⇒τi2l+1...i r :=mi=1 p∈P c p(p(e∗i T))j1j2...j lj1j2...j l i2l+1...i r,(3.5)and use the smaller equation systems of the smaller spaces W i to determine linear identities for the coordinates of the e∗i T.Note,however,that a reduction of expres-sions such as(3.5)by means of identities of the W i leads to a linear combination of coordinates of the e∗i T which cannot be reckoned back into a linear combination of the coordinates of T in general.4.The Algorithm for Ideal DecompositionsTwo problems became visible up to now:We need methods(a)to determine generating idempotents e for left/right ideals of K[S r]forwhich such idempotents are unknown(such as in Prop.5).(b)to decompose a given idempotent e∈K[S r]into a sum e=e1+...+e m ofpairwise orthogonal primitive idempotents e i.We developed an algorithm which solves these problems.First versions of this algorithm were designed for K[S r](see B.Fiedler[8,9]).But it turned out that this algorithm works even in an arbitrary semisimple ring R which fulfils:(A)We know explicitly a decompositionR=mi=1R·y i or R=m i=1y i·R(4.1)of the full ring R into minimal left or right ideals generated by known primitive idempotents y i.Pairwise orthogonality of the y i is not required.(B)We know in R a method to construct explicitly a solution x∈R for everyequatione·a·x·e=e or e·x·a·e=e,(4.2)where e∈R is a primitive idempotent and a∈R is a ring element with e·a=0or a·e=0,respectively.We describe now a version(L)of the algorithm for left ideals of a semisimple ring R.Obviously an analogous version(R)for right ideals can be formulated,too. (See B.Fiedler[10,Sec.I.2]and B.Fiedler[8,9].)A frequent step of the algorithm is the construction of a generating idempotent for a left ideal l=R·e·a,where e∈R is a primitive idempotent and a∈R is aIDEALS AND TENSOR NORMAL FORMS7 ring element with e·a=0.This is possible byProposition4.1.10For the above e,a∈R there exists such an x∈R thate·a·x·e=e.(4.3)Moreover,the ring element e′:=x·e·a formed with this x is an idempotent which generates the minimal left ideal R·e·a.A second construction orthogonalizes idempotents.Let l=R·e and˜l=R·˜e be two left ideals with known generating idempotents e and˜e.Assume that e is primitive and e·˜e=e,i.e.l⊆˜l.Then the sum l+˜l=l⊕˜l is direct since the minimality of l yields l∩˜l={0}.Now we search for new generating idempotents f and˜f of l and˜l which fulfil f·˜f=˜f·f=0.Theorem4.2.11The above orthogonalization problem can be solved in2steps:(i)We canfind such a ring element x∈R thate·(1−˜e)·x·e=e.(4.4)If we use this x to form f:=(1−˜e)·x·e,then f is a generating idempotent of l which satisfies˜e·f=0.(ii)For a result f of step(i)there exists an˜x∈R such thatf·(1−˜e)·˜x·f=f.(4.5)If we make use of˜x to form˜f:=˜e−(1−˜e)·˜x·f·˜e,then˜f is a generating idempotent of˜l which fulfils f·˜f=˜f·f=0.Now we can describe our Algorithm(L),which allows us to decompose every left ideal l=R·a with known generating element a=0into a direct sum l= m i=1l i of minimal left ideals l i explicitly(see B.Fiedler[10,Sec.I.2]and B.Fiedler[8,9]).A multiplication of(4.1)by a yields a suml=R·a=mi=1y i·a=0R·y i·a(4.6)of minimal left ideals for l which however is not direct in general.Now we can carry out the following steps:(1)Thefirst summand in(4.6)is a minimal left ideal.We denote it by l1andwe determine a generating idempotent e1of l1by means of Prop.10.8 B.FIEDLER(2)We search for thefirst minimal left ideal R·y i·a in(4.6)which is notcontained in l1that means for whichy i·a·e1=y i·a.(4.7)We denote it by l2and we construct a generating idempotent e2of l2by means of Prop.10.Since l2is minimal and l2⊆l1,we obtain l1∩l2={0}.Thus l1and l2form a direct sum˜l2:=l1⊕l2.Because e2is primitive and e2·e1=e2,we can determine new,orthogonal,generating idempotents ˆf1,f2of l1,l2by means of Theorem11.Then˜f2:=ˆf1+f2is a generating idempotent of˜l2.(3)Now we search for the next minimal left ideal R·y i·a in(4.6)which is notcontained in˜l2that means for whichy i·a·˜f2=y i·a.(4.8)We denote it by l3.We construct a primitive generating idempotent e3of l3 and pass over to new orthogonal idempotentsˆf2,f3instead of˜f2,e3.This leads us to the left ideal˜l3:=˜l2⊕l3which has the generating idempotent˜f 3:=ˆf2+f3.(4)We continue this procedure until we have processed all left ideals in(4.6).The result is a left ideal˜l n:=l1⊕...⊕l n and a generating idempotent˜f n of˜l n.Obviously,˜l n⊆l since every left ideal l i is a summand in(4.6).Furthermore,every summand R·y i·a from(4.6)which had been considered before we had reached the ideal˜l n is contained in˜l n−1=l1⊕...⊕l n−1⊆˜l n.All other summands R·y i·a of(4.6)lie in˜l n.This leads to l⊆˜l n and l=˜l n.According to Theorem11(ii),every generating idempotentˆf k of˜l k can be written asˆf k=(1−z k)·˜f k with a z k∈R which we have already determined to carry out the orthogonalization(e k+1,˜f k)→(f k+1,ˆf k).Thus we can write˜fn=ˆfn−1+f n=(1−z n−1)·˜fn−1+f n=(1−z n−1)·(ˆfn−2+f n−1)+f n=(1−z n−1)·(1−z n−2)·˜f n−2+(1−z n−1)·f n−1+f n ...=n−1k=1(1−z n−1)·(1−z n−2)·...·(1−z k)·f k+f n.(4.9)Formula(4.9)presents a decomposition˜f n= n k=1h k of˜f n into summands which fulfil h k:=(1−z n−1)·(1−z n−2)·...·(1−z k)·f k∈l k and h n:=f n∈l n. Thus,˜f n= n k=1h k is the decomposition of˜f n which corresponds to l= n k=1l k and the h k are pairwise orthogonal generating idempotents of the l k. Obviously,the algorithm(L)solves the above problem(b).Furthermore,the algorithm(L)can be extended to left ideals which are non-direct sums l= h i=1R·a i by applying its steps to the summands of l= h i=1 m j=1R·y j·a i.Likewise, we can construct generating idempotents and decompositions for right ideals r=IDEALS AND TENSOR NORMAL FORMS9 h i=1a i·R by the algorithm version(R).If our left/right ideals are intersectionsl= h i=1R·e i or r= h i=1e i·R of left/right ideals(e i idempotents),then their right/left annihilator ideals are A r(l)= h i=1(1−e i)·R or A l(r)= h i=1R·(1−e i), respectively.In this case we can construct a generating idempotent e of A r(l)or A l(r)by(R)or(L),respectively,and form e′:=1−e to obtain a generating idempotent e′of l or r.Thus our algorithms solve problem(a)for non-direct sums or intersections of left/right ideals.See B.Fiedler[10,Sec.I.4]or B.Fiedler[9]for further details.pletions of the Decomposition AlgorithmsThe basic assumptions(A)and(B).Actual decomposition constructions can only be carried out by the algorithms(L)or(R)if our semisimple ring R fulfils the above assumtions(A)and(B).This is the case for(1)the group ring R=K[S r]of a symmetric group,(2)a ring R= m i=1S n i×n i i,that is an outer direct product of full(n i×n i)-matrix rings over skewfields S i,(3)all semisimple rings R for which an isomorphism D:R→R′= m i=1S n i×n i ionto a ring R′of the second type is explicitly known.(See B.Fiedler[10,Sec.I.3].)According to Wedderburn’s Theorem every semisim-ple ring is isomorphic to a ring of type2.Thus statement2means that the decomposition algorithms(L)and(R)work in every semisimple ring up to an isomorphism.Let us consider R= m i=1S n i×n i i.We denote by C kl∈S n i×n i i a matrix in which exactly the element located in the k-th row and the j-th column is equal to1∈S i whereas all other elements vanish.Then a decomposition of R intominimal left/right ideals is given by the decompositions S n i×n ii= n i j=1S n i×n i i·C jjand S n i×n ii= n i j=1C jj·S n i×n i i of the matrix rings into minimal left/right ideals. Furthermore there exists a very fast procedure to solve(4.2)in R.Since a primitive idempotent e∈R has only one non-vanishing block matrix(i.e.e=(0,...,E,...,0),where E∈S n i×n ii is also a primitive idempotent),anequation such as e·a·x·e=e leads to a single matrix equation E·A·X·E=E. Moreover,E can be written as E=f t·h with row vectors f,h∈S n i i,where h is a non-vanishing row of E.If we set m=h·A and determine non-vanishing elementsm j0,f kof m,f,then X:=(m j)−1(f k)−1C j0k0is a solution of E·A·X·E=E,which yields a solution x=(0,...,X,...,0)of e·a·x·e=e(B.Fiedler[10,Sec.I.1.2,I.3.2]).Obviously,this procedure will run very fast on a computer.For K[S r]the well-known decomposition of K[S r]into minimal left/right ideals by means of Young symmetrizers guarantees(A).See B.Fiedler[8,9]for(B).If for a semisimple ring R an above isomorphism D:R→R′is known(and practicable on a computer),then every ideal decomposition problem for R can be transferred to R′and treated there by the algorithms(L)and(R).If R=C[G]is the group ring of afinite group G,then we have S i=C for all i and the isomorphism D is called a discrete Fourier transform for G.Explicit algorithms10 B.FIEDLERfor such Fourier transforms are known at least for abelian groups,solvable groups,supersolvable groups and symmetric groups(see M.Clausen und U.Baum[5]). Discrete Fourier transforms.In group rings R=C[G]of largefinite groups G(such as G=S r,r≥8),even a single product a·b,a,b∈C[G]can lead to high costs in time and computer memory(see B.Fiedler[10,Sec.I.1.3,I.5.1]).Here the use of a discrete Fourier transform D:R=C[G]→R′= k i=1C n i×n i and the transfer of ideal decomposition problems to R′is the most important tool tosurmount difficulties.Calculations in R′have the following advantages:(1)Decompositions(4.1)and solutions of(4.2)can be constructed very fast inR′.(2)Every product formed during a run of(L)or(R)contains a factor which isa primitive idempotent e∈R′.Since every such e has only1non-vanishingblock matrix E∈C n i×n i,i.e.e=(0,...,0,E,0,...,0),the costs for every step of(L)or(R)reduce to the costs of calculations in a ring C n i×n i.(3)The algorithms(L)and(R)can be carried out completely within R′.Onlyinput and output data have to be mapped between R and R′by means ofD and D−1.Thus,”less fast”Fourier transforms can be useful,too.(SeeB.Fiedler[10,Sec.I.5.1].)(4)In R′there is a fast construction of bases of linear subspaces W,which weneed to form linear equation systems(3.4).To describe this construction,we denote by C i,a∈K n×n that matrix in which thei-th row is equal to a given a∈K n whereas all other rows arefilled with0.Proposition5.1.Let l=K n×n·A be a minimal left ideal of K n×n with known generating element0=A∈K n×n and B=[b ij]n,n=0be a matrix from K n×n. Determine a row a=0of A and a parametric formΛof the solution of the linear equation systemnj=1b ijλj=0,i=1,...,n,λi∈K(unknowns).(5.1)Then B:={B·C i,a|i index for whichλi is not a parameter inΛ}is a basis of the K-vector space B·l=B·K n×n·A.See B.Fiedler[10,Sec.I.1.2]for the proof and other fast basis constructions. Spaces with a structure B·l are typical examples of spaces W(see Sec.6,7). Further,we see that l has the basis B={C i,a|i=1,...,n}if we use the identity matrix B=Id∈K n×n for B.For our tensor investigations we need R=K[S r].M.Clausen und U.Baum [5,6]developed a very fast Fourier transform for K[S r],which bases on Young’s seminormal representation of S r(see also H.Boerner[3]and A.Kerber[17,Vol.I, p.75,76]).However,since the interpreter Mathematica does not allow the full speed and the optimal storage handling of this ingenious algorithm,we use Young’s nat-ural representation of S r as discrete Fourier transform in our Mathematica packageIDEALS AND TENSOR NORMAL FORMS11PERMS[11].(See H.Boerner[2,pp.102–108], B.Fiedler[10,Sec.I.5.2].)This implementation works good at least for S r,r≤8.Multiplicities.Obviously,the efficiency of the algorithms(L)and(R)can be improved if we know before a run of(L)or(R)the multiplicities of equivalent minimal left/right ideals l i or r i within decompositions l= m i=1l i or r= m i=1r i searched for.If the algorithms have constructed such a direct sum of minimalleft/right ideals of afixed equivalence class that the number of summands equals the known multiplicity for this class,then the investigation of the remaining ideals of the class can be cancelled.This reduces the calculation time.In the case of R=K[S r]such multiplicies can be calculated by means of the irreducible characters of S r,Frobenius reciprocity,the Littlewood-Richardson rule and plethysms.The determination of the irreducible characters of S r is possible by the Murnaghan-Nakayama formula.We implemented all these tools in our Mathematica package PERMS[11](see B.Fiedler[10,Sec.II.3–II.6]for descriptions of implementations).For plethysms we use a very efficient method of F.S¨a nger [24,pp.29–33].(See B.Fiedler[10,Sec.II.6.3].)6.Characterizing Left Ideals of Tensor ProductsWe continue to list linear subspaces W⊆K[S r]describing tensor symmetries.In the case of tensor products two types of products can be considered:T(1)⊗...⊗T(m) with possibly different T(i)and T⊗...⊗T.Proposition6.1.12Let l i⊆K[S ri ](i=1,...,m)be left ideals and T(i)∈T l∗i⊆T ri V be r i-times covariant tensors from the symmetry classes characterized by thel i.Consider the productT:=T(1)⊗...⊗T(m)∈T r V,r:=r1+...+r m.(6.1)For every i we define an embeddingιi:S ri →S r,(ιi s)(k):= ∆i+s(k−∆i)if r i−1<k≤r ik else(6.2)where∆i:=r0+...+r i−1and r0:=0.Then the T b of the tensor(6.1)fulfil ∀b∈V r:T b∈l:=K[S r]·L ˜l1·...·˜l m =K[S r]· ˜l1⊗...⊗˜l m (6.3)where˜l i:=ιi(l i)are the embeddings of the l i into K[S r]induced by theιi.If dim V≥r,then the above left ideal l is generated by all T b∈K[S r]which are formed from tensor products(6.1)of arbitrary tensors T(i)∈T l∗i.12 B.FIEDLERProposition 6.2.13Let l 0⊆K [S m ]be a left ideal and T ∈T l ∗0⊆T m V be a tensor of order m from the symmetry class T l ∗0.Consider the productˆT :=T⊗...⊗T n ∈T mn V .(6.4)Then all ˆT b ,b ∈V mn ,lie in the left ideall :=K [S mn ]·L l 1·...·l n ·l ′ =K [S mn ]· l 1⊗...⊗l n ⊗l ′(6.5)where l i :=ιi (l 0)are embeddings of l 0into K [S mn ]which are formed by means of mappings (6.2)with r 1=...=r n =m and r =mn .Further l ′denotes the 1-dimensional ideal l ′:=L{q ∈Q q }of K [Q ]where Q ⊂S mn is the subgroup Q := q = k ·m −ls (k )·m −l 1≤k ≤n 0≤l ≤m −1∈S mns ∈S n∼=S n .(6.6)If dim V ≥m ·n ,then the above left ideal l is generated by all ˆT b ∈K [S mn ]which are formed from tensor products (6.4)of arbitrary tensors T ∈T l ∗0.Let ˘ωG :G →GL (K [G ])denote the regular representation of a finite group G defined by ˘ωg (f ):=g ·f ,g ∈G ,f ∈K [G ].If we use the above left ideals l i ,l 0,l to define subrepresentations αi :=˘ωS r i |l i ,α:=˘ωS m |l 0,β:=˘ωS r |l ,then the representation βis equivalent to a Littlewood-Richardson product or a plethysm 14,respectively (see B.Fiedler [10,Sec.III.3.2]):l according to (6.3)=⇒β∼α1#...#αm ↑S r(6.7)l according to (6.5)=⇒β∼α⊙[n ].(6.8)These results correspond to statements of S.A.Fulling et al.[14].(6.7)and (6.8)yield valuable information about multiplicities if one wishes to apply the algorithm (L)to l .7.Subspaces Characterizing Tensors with Index Contractions First we give a universal linear subspace which contains the group ring elements b ∈B b 0γb T b of a tensor T with l index contractions for every value of dim V .Theorem 7.1.Let V,B ,r,l,g,b 0have the meaning given in Def. 2.7and Prop.8.Consider the partition λ0:=(2l ,1r −2l )⊢r and the lexicographically smallest standard tableau t of λ0.Form the group 15G :=H t ·Q where H t is the group of all horizontal permutations of t and Q ⊂V t is the subgroup of all such verticalIDEALS AND TENSOR NORMAL FORMS 13permutations of t which only permute full rows of t with length 2.Then every tensor T ∈T l ∗⊆T r V (l =K [S r ]·e ,e idempotent)fulfils b ∈B b 0γb T b ∈1G ·K [S r ]·e ,1G := g ∈Gg.(7.1)Furthermore,if dim V ≥r −l ,then there is such a b 0∈B r −2l that 161G ·K [S r ]·e =L Kb ∈B b 0γb T b T ∈T l ∗ .(7.2)The proof can be found in Sec.III.3.4of our Habilitationsschrift [10].If dim V <r −l ,then the b ∈B b 0γb T b will span only a linear subspace of 1G ·K [S r ]·e in gen-eral.To describe this subspace,we define:Definition 7.2.If λ=(λ1,...,λk )⊢r is a partition with length |λ|=k and (v 1,...,v k )∈V k is a k -tuple of vectors,then we denote by λ;v 1,...,v k or short λ;v i that r -tuple from V r which has the structureλ;v 1,...,v k :=(v 1,...,v 1 λ1,v 2,...,v 2 λ2,...,v k ,...,v k λk)∈V r .(7.3)For every b =(v 1,...,v r )∈V r ,there exists a unique partition λ⊢r and a permutation q ∈S r such that b can be written as b =q λ;w 1,...,w |λ| where w 1,...,w |λ|are the pairwise different,suitably renumbered vectors from b .We call λ;w 1,...,w |λ| a grouping of b and λthe grouping partition of b ,which we also denote by λ=b ⊢.Definition 7.3.Let B be an orthonormal basis with respect to a fundamental tensor g ∈T 2V .We call (n i 1,...,n i r ′)∈B r ′smaller than (n j 1,...,n j r ′)∈B r ′if the first non-vanishing difference j k −i k fulfils j k −i k >0.If λ;w 1,...,w |λ| and λ;w ′1,...,w ′|λ| are two groupings of a fixed r -tuple b ∈B r of basis vectors,then wecall λ;w 1,...,w |λ| smaller than λ;w ′1,...,w ′|λ| if the |λ|-tuple (n i 1,...,n i |λ|):=(w 1,...,w |λ|)is smaller than the |λ|-tuple (n j 1,...,n j |λ|):=(w ′1,...,w ′|λ|).For every r -tuple b ∈B r there exists a permutation p b ∈S r such that b has a rep-resentation b =p b λ;w 1,...,w |λ| where λ;w 1,...,w |λ| is the smallest grouping of b and λ=b ⊢.We denote by p a single-valued mapping p :B r →S r ,b →p (b ):=p b which assigns exactly one of such permutations p b to b .Let b 0∈B r −2l be an (r −2l )-tuple of vectors from the basis B .We denote by Λb 0the set Λb 0:={λ⊢r |∃b ∈B b 0:λ=b ⊢}.Furthermore,we assign to every partition λ∈Λb 0the lexicographically smallest standard tableau t λof λand the。

相关文档
最新文档