On rendezvous for visually-guided agents in a nonconvex polygon

Size: px
Start display at page:

Download "On rendezvous for visually-guided agents in a nonconvex polygon"

Transcription

1 CDC 2005, To aear On rendezvous for visually-guided agents in a nonconvex olygon Anurag Ganguli Jorge Cortés Francesco Bullo Abstract This aer resents coordination algorithms for mobile autonomous agents euied with line-of-sight sensors in a nonconvex olygon. The objective of the roosed algorithms is to achieve rendezvous, that is, agreement over the location of the agents in the network, using only information from the line-of-sight sensors. Two key novel comonents of the algorithms are the notions of locally-cliueless visibility grah and of convex continuous constraint set. Initial osition of the agents Evolution of the network Final osition of the agents I. INTRODUCTION Consider a grou of robotic agents moving in a nonconvex environment. For simlicity, we model the environment as a simle olygon and the agents as oint masses. Assume that each member of the grou is euied with omnidirectional line-of-sight sensors. By a line-of-sight sensor, we mean any device or combination of devices that can be used to determine, in its line-of-sight, (i) the osition or state of another agent, and (ii) the distance to the boundary of environment. By omnidirectional, we mean that the fieldof-vision for the sensor is 2π radians. We assume that the algorithm regulating the agents motion is memoryless, i.e., we consider static feedback laws. Given this model, the goal is to design a rovably correct discrete-time algorithm which ensures that the agents converge to a common location within the environment. See Fig. 1 for a grahical descrition of our objective. Ideally, the algorithm would work asynchronously but here we confine ourselves to the synchronous case. This work is motivated by the recent surge of interest in the study of grous of mobile autonomous robots. The multiagent rendezvous roblem and the first circumcenter algorithm have been introduced in [1]. The algorithm roosed in [1] has been extended to various asynchronous strategies in [2], [3]. A related algorithm, in which connectivity constraints are not imosed, is roosed in [4]. One imortant difference between these works and the resent one is that we consider visually-guided robots. In fact, technical advancement in sensor technology and mobile robotics have facilitated the imlementation of these algorithms on real systems. Examles of anoramic deth sensors relevant to our work are (1) omnidirectional cameras, e.g., [5], and (2) laser scanners with accurate distance measurements at high angular density. We conclude our literature review by mentioning that the roblem of rendezvousing at a secified location for visually-guided agents was first Anurag Ganguli is with the Coordinated Science Laboratory, University of Illinois at Urbana-Chamaign, and with the Deartment of Mechanical and Environmental Engineering, University of California at Santa Barbara, Santa Barbara, CA 93106, USA, aganguli@uiuc.edu Jorge Cortés is with the Deartment of Alied Mathematics and Statistics, University of California at Santa Cruz, Santa Cruz, CA 95064, USA, jcortes@ucsc.edu Francesco Bullo is with the Deartment of Mechanical and Environmental Engineering, University of California at Santa Barbara, Santa Barbara, CA 93106, USA, bullo@engineering.ucsb.edu Fig. 1. Execution of the Circumcenter Algorithm described in Section IV-C on a network of agents distributed in a olygon shaed like a tyical floor lan. The algorithm is run over the visibility grah G vis,q (see Section III). introduced in [6]. However, the roosed solution was not distributed, in the sense that each agent reuired the knowledge of the locations of all other network agents. The contribution of this aer is threefold. First, we develo a geometric framework which makes it ossible to aly recently develoed results on convergence analysis of nonlinear systems, e.g., the LaSalle Invariance Princile for set-valued mas, on a network of visually-guided agents in a nonconvex environment. More exlicitly, we constrain the motion of agents to sets that (i) ensure that the visibility between two agents is reserved, and (ii) changes continuously as a function of the osition of the agents. We call such sets convex continuous constraint sets and characterize their roerties. Second, based on a discussion on visibility grahs, we define a new roximity grah, called the locallycliueless visibility grah, which contains fewer edges than the visibility grah, and has the same connected comonents. This construction can be, in general, useful for any roblem where the connectivity of the visibility grah is imortant and fewer constraints on the agents, in terms of number of neighbors, is beneficial. Examles of such roblems might include line-of-sight wireless routing and consensus roblems over line-of-sight wireless communication networks. Third, we roose a coordination algorithm to solve the rendezvous roblem and rovide a convergence roof. II. CONVEX CONTINUOUS CONSTRAINT SETS Here we design motion constraint sets for air of agents mutually visible to one another. By constraining the motion of agents, we aim to reserve the connectivity of the network. Additionally, we reuire that motion constraint sets change continuously as a function of the osition of the agents. This turns out to be a critical roerty for the convergence analysis of algorithms based on these sets. We emhasize that the construction roosed here may be alied to any distributed algorithm for a network of visually-guided agents. We begin by reviewing some notation for standard geometric objects. For R 2, let B(,r) denote the closed ball centered at of radius r R +. We let R + and R + denote the

2 ositive and the nonnegative real numbers, resectively. For a bounded set X R 2, we let co(x) denote the convex hull of X. For, R 2, we let ],[= {λ+(1 λ) 0 < λ < 1} and [,] = co({,}) denote the oen and closed segment with extreme oints and, resectively. For a closed convex set X R 2 and R 2, let roj X () denote the orthogonal rojection of onto X. For a bounded set X R 2, we let CC(X) denote the circumcenter of X, i.e., the center of the smallest-radius circle enclosing X. The comutation of the circumcenter is a strictly convex roblem. Let X denote the cardinality of a finite set X in R 2. Next, we define continuous set-valued mas; see [7]. Definition II.1 Let X and Y be toological vector saces (real and Hausdorff). A set-valued ma f : X 2 Y with non-emty and comact values is continuous at a oint x 0 X if given any ɛ > 0, there exists a δ > 0 such that for all x B(x 0,δ), we have f(x) B(y,ɛ) and f(x 0 ) B(y, ɛ) y f(x 0) y f(x) Now let us turn our attention to the environment. A olygon is simle if its vertices are the only oints in the lane common to two olygon edges and every vertex belongs to at most two olygon edges. Such a olygon has a well defined interior and exterior. Note that a simle olygon can contain holes. Let Q denote the set of all simle olygons. Let Q Q and let Ve(Q) = (v 1,...,v n ) be the list of vertices of Q ordered counterclockwise. The interior angle of a vertex v of Q is the angle formed inside Q by the two edges of the boundary of Q incident at v. The oint v Ve(Q) is a reflex vertex if its interior angle is strictly greater than π radians. Let Ve r (Q) denote the list of reflex vertices of Q ordered counterclockwise. If X is a finite set of oints in Q n, let MPP(X,Q) be the minimal erimeter olygon containing X which is a subset of Q (see Fig. 2 for an examle). Note that Q does not necessarily have to be Definition II.2 Let v be a reflex vertex of Q, and let w Ve(Q) be visible from v. The (v, w)-generalized inflection segment I(v,w) is the set I(v,w) = { S(v) = λv + (1 λ)w,λ 1}. If w Ve r (Q), then we call I(v,w) a bitangent of Q. Let {I α } α A be the set of bitangents of Q. A reflex vertex v of Q is an anchor of Q if it is visible from and { S(v) = λv + (1 λ),λ > 1}. In other words, a reflex vertex is an anchor of if it occludes a ortion of the environment from. Next we define and characterize certain useful convex sets deicted in Fig. 3. Definition II.3 Given Q Q, let, Q such that [,] Q. Let v Ve r (Q). Let e v and e v be the edges of Q determining v. Then we define H v (,) R 2 as follows: (i) if v / [,], then H v (,) is the half-lane with the following roerties: (a) the boundary of H v (,) contains v and is erendicular to the line assing through v and roj [,] v, and (b) and belong to the interior of H v (,); (ii) if v = with, then H v (,) is the halflane with the following roerties: (a) the boundary of H v (,) contains v and is erendicular to the line assing through and, and (b) belongs to the interior of H v (,) (Note: a similar definition holds when we interchange and ); (iii) if v ],[ with, then H v (,) is the halflane with the following roerties: (a) the boundary of H v (,) contains the line assing through and, and (b) the interior of H v (,) intersected with e v or with e v is emty; (iv) if v = =, then H v (,) is the set H v H v. H v is a half-lane with the following roerties: (a) the boundary of H v contains the edge e v, and (b) the interior of H v intersected with e v is emty. We define H v similarly with e v interchanged with e v. roj [,] v v = v Fig. 2. Minimal erimeter olygon of a set of oints inside nonconvex olygonal environments. The environments are reresented by dashed lines, while the olygons reresented by the solid lines are the minimal erimeter olygons of the oints reresented by the solid circles. On the left, the environment is a simle olygon whereas on the right the environment is olygonal, not simle, and still has a well-defined interior and exterior. simle for the minimal erimeter olygon to be defined; it only needs to have a well defined interior and exterior. A oint Q is visible from Q if [,] Q. The visibility olygon S() Q from a oint Q is the set of oints in Q visible from. We can also think of S() as a ma from Q to the set of olygons contained in Q. v e v v = = e v Fig. 3. Definition of the sets H v(, )

3 Remark II.4 With the above definition, wherever defined, H v (,) is a closed and convex set containing and. Also, if V Q is convex and comact, then H v (,) is welldefined everywhere in (V) 2 and (,) H v (,) is a setvalued ma over the domain (V) 2 with range 2 (R2). Lemma II.5 Given any v Ve r (Q) and a convex and comact subset V of Q, the set-valued ma (,) H v (,) Q restricted to (V \ Ve r (Q)) 2 is continuous. v V Lemma II.6 Let V Ve r (Q) and V be a convex and comact subset of Q. The following statements are true: (i) the set-valued ma (,) S() H v (,) restricted to (V \ (Ve r (Q) ( α A I α ))) 2 is continuous; (ii) the set-valued ma S() H v (,) re- v V stricted to V \ (Ve r (Q) ( α A I α )) is continuous. Definition II.7 (Convex Continuous Constraint Sets) Let, Q have the roerty that [, ] Q and let I Q (,) = Ve r (Q) S() S(). The convex continuous constraint set between and is C Q (,) = S() H v (,). v I Q(,) Fig. 4 illustrates the constraint set. v k1 v k2 v k3 Fig. 4. The figure on the left is an examle of the constraint set C Q (, ) where I Q (, ) = {v k1, v k2, v k3 }. The figure on the right is an examle of C Q (, ) where I Q (, ) = Ve r(q). In addition, we show that this grah can be comuted based on the information obtained only from the visibility grah. We begin by introducing some concets regarding roximity grahs for oint sets in R 2. We assume the reader is familiar with the standard notions of grah theory. We recall that a cliue of a grah is a comlete subgrah of it. A maximal cliue of an edge is a cliue of the grah that (i) contains the edge and (ii) is not a strict subgrah of any other cliue of the grah that also contains the edge. Given a vector sace V, let F(V) be the collection of finite subsets of V. Accordingly, F(R 2 ) is the collection of finite oint sets in R 2 ; we shall denote an element of F(R 2 ) by P = { 1,..., n } R 2, where 1,..., n are distinct oints in R 2. Let G(R 2 ) be the set of undirected grahs whose vertex set is an element of F(R 2 ). A roximity grah function G : F(R 2 ) G(R 2 ) associates to a oint set P an undirected grah with vertex set P and edge set E G (P), with E G : F(R 2 ) F(R 2 R 2 ) such that E G (P) P P \ diag(p P) for any P. Here, diag(p P) = {(,) P P P}. In other words, the edge set of a roximity grah deends on the location of its vertices. General roerties of roximity grahs are defined in [8], [9]. Here, we define: (i) a Euclidean Minimum Sanning Tree of a roximity grah G, denoted G EMST,G, assigns to each P a minimum-length sanning tree of G(P) whose edge ( i, j ) is assigned a length i j. If G(P) is not connected, then G EMST,G (P) is simly the union of Euclidean Minimum Sanning Trees of its connected comonents. For simlicity, when G is the comlete grah (P, P P \ diag(p P)), we denote the Euclidean Minimum Sanning Tree by G EMST ; (ii) the visibility grah G vis,q, for Q Q, with ( i, j ) E Gvis,Q (P) if the line segment [ i, j ] Q; (iii) the locally-cliueless visibility grah G lc-vis,q, for Q Q, with ( i, j ) E Glc-vis,Q (P) if ( i, j ) E Gvis,Q (P) and ( i, j ) belongs to a set E GEMST (P ) for any maximal cliue P of the edge ( i, j ) in G vis,q. Fig. 5 contains some examles of roximity grahs in a nonconvex olygon Q shaed like a tyical floor lan. Theorem II.8 Let V Q be convex and comact. For any two oints, V, the following statements are true: (i) C Q (,) is convex, C Q (,) = C Q (,), and (ii) the set-valued ma (,) C Q (,) C Q (,) restricted to (V \ Ve r (Q)) 2 is continuous. III. THE LOCALLY-CLIQUELESS VISIBILITY GRAPH In Section II we roosed the construction of motion constraint sets to reserve the connectivity of the network. The number of such constraints for an agent is the number of the agents visible to it. It is intuitively clear that the lesser the number of such constraints, the faster will be the convergence of the algorithm. Here we introduce the notion of locally-cliueless visibility grah, which is a subgrah of the visibility grah. In general, it contains fewer edges than the visibility grah but has the same connected comonents. Fig. 5. From left to right, visibility grah, Euclidean Minimum Sanning Tree for the five agents in the center, and locally-cliueless visibility grah. To each roximity grah function G, we associate the set of neighbors ma N G : R 2 F(R 2 ) F(R 2 ), defined by N G (, P) = { P (,) E G (P {})}. Also, for R 2, define N G, : F(R 2 ) F(R 2 ) by N G, (P) = N G (, P). Let G 1 and G 2 be two roximity grah functions. G 1 is satially distributed over G 2 if, for all P, N G1,(P) = N G1,( NG2,(P) ).

4 It is straightforward to deduce that if G 1 is satially distributed over G 2, then G 1 is a subgrah of G 2, that is, G 1 (P) G 2 (P) for all P F(R 2 ). Two roximity grah functions G 1 and G 2 have the same connected comonents if, for any P F(R 2 ), G 1 (P) and G 2 (P) have the same number of connected comonents consisting of the same vertices. Theorem III.1 For Q Q, the following statements hold: (i) G EMST,Gvis,Q G lc-vis,q G vis,q ; (ii) G lc-vis,q is satially distributed over G vis,q, for the case when Q does not contain any hole; (iii) G lc-vis,q, G vis,q have the same connected comonents. In general, the inclusions in Theorem III.1(i) are strict. Fig. 6 shows an examle where G EMST,Gvis,Q G lc-vis,q G vis,q. Fig. 6. From left to right, visibility grah, locally-cliueless visibility grah and Euclidean Minimum Sanning Tree of the visibility grah. IV. RENDEZVOUS VIA PROXIMITY GRAPHS Here we state the model, the control objective, the coordination algorithm, and the closed-loo system roerties. A. A synchronous network of visually-guided agents By a visually-guided agent, we refer to any agent, occuying a location in Q Q, and caable of measuring the relative osition of every other agent visible to it, i.e., within line-of-sight. In addition to this, it can also sense the boundary of Q. Each agent has a rocessor with the ability of allocating continuous and discrete states and erforming oerations on them. A collection of finite number, say n, of such agents form a network. Note that as a conseuence of the above, whenever Q contains no hole, the rocessor on any agent has the caability to answer the uery as to whether two agents visible to it are mutually visible to one another. The ith agent in such a network is caable of moving at any time m N, for any unit eriod of time, according to the synchronized discrete-time control system i (m + 1) = i (m) + u i. (1) We also assume that there is a maximum ste size s max R + for all agents, that is, u i s max, for i {1,...,n}. B. The rendezvous motion coordination roblem We now state the control design roblem for the network of visually-guided agents. The rendezvous objective is to steer each agent to a common location. This objective is to be achieved with the limited information flow described in the model above. Tyically, it will be imossible to solve the rendezvous roblem if the agents are laced in such a way that they do not form a connected grah. Arguably, a good roerty of any algorithm to rendezvous is that of maintaining some form of connectivity between agents. C. The Circumcenter Algorithm Here is an informal descrition of what we shall refer to as the Circumcenter Algorithm over a roximity grah G: Each agent erforms the following tasks: (i) it detects its neighbors according to G; (ii) it comutes the circumcenter of the oint set comrised of its neighbors and of itself, and (iii) it moves toward this circumcenter while maintaining connectivity with its neighbors. This algorithm is insired by the one introduced in [1]. Let us clarify which roximity grahs are allowable and how connectivity is maintained. Firstly, we are allowed to design over any roximity grah G that is satially distributed over G vis,q. This is a direct conseuence of our modeling assumtion that each agent can acuire the location of every other agent visible to it. Secondly, we maintain connectivity by restricting the allowable motion of each agent. In articular, if agents i and j are neighbors in the roximity grah G, then their subseuent ositions are reuired to belong to C Q ( i, j ) as defined in Theorem II.8. If an agent i has its neighbors at locations { 1,..., l }, then define M i = { 1,..., l } { i }. We define the constraint set C i,q(m i ) by C i,q(m i ) = C Q ( i,). M i Remark IV.1 C i,q(m i ) is a convex subset of Q containing i. This follows from the definition of C i,q(m i ) and Theorem II.8 (i). If M i Ve r (Q) is emty and the set of neighbors of i is fixed, then C i,q(m i ) changes continuously as a function of i and of the ositions of its neighbors. This follows from the fact that for each j M i, i is constrained to remain in C Q ( i, j ) which is a convex and comact subset of Q. The statement is then a conseuence of Theorem II.8 (iii) and the fact that C i,q(m i ) is an intersection of continuous mas. With this, we are ready to formally describe the algorithm. Name: Circumcenter Algorithm over G Assumes: (i) s max R + is maximum ste size (ii) Q Q (iii) G is a satially distributed roximity grah over G vis,q For i {1,...,n}, agent i executes the following at each time instant in N: 1: acuire { 1,..., k } := N Gvis,Q, i (P) 2: comute M i := N G,i ({ 1,..., k }) { i } 3: comute X i := C i,q(m i ) co(m i ) 4: comute i := roj Xi (CC(M i )) 5: u i := min(smax, i i ) i i ( i i)

5 See Fig. 7 for examles of the constraint sets C i,q(m i ). Fig. 7. Constraint sets C i,q(m i ) generated by the algorithm encoded as described in Section V In what follows we shall refer to the Circumcenter Algorithm over the roximity grah G as the ma T G : Q n Q n. D. Asymtotic correctness of the Circumcenter Algorithm Henceforth, P shall refer to tules of elements in Q of the form ( 1,..., n ). With a slight abuse of notation, we shall use P interchangeably with a oint set P of the form { 1,..., n }. Before roceeding to analyze the convergence roerties of the Circumcenter Algorithm, let us first define a candidate Lyaunov function V erim,q : Q n R +, by V erim,q (P) = erimeter(mpp(p,q)). Lemma IV.2 For any olygon Q with a well-defined interior and exterior, we have the following: (i) for P Q n, MPP(P,Q) contains all the visibility edges of G vis,q (P); (ii) for P 1 Q n and P 2 Q m, we have that MPP(P 1,Q) MPP(P 1 P 2,Q); (iii) for any olygon X Q with a well-defined interior and exterior and P X n, we have that MPP(P,X) MPP(P,Q); (iv) C i,q(m i ) MPP(M i,s( i )) = C i,q(m i ) co(m i ), where i and M i are as in the descrition of the Circumcenter Algorithm in Section IV-C; (v) C i,q(m i ) MPP(M i,s( i )) is convex; (vi) if MPP(P,Q) is a strict subset of MPP(P,Q), then V erim,q (P ) < V erim,q (P ). Finally, we state an imortant lemma that is crucial in characterizing the set to which the seuence of the ositions of the agents converges. Lemma IV.3 Let P (Q \ Ve r (Q)) n. Let G(P) be any grah satially distributed over G vis,q (P). There exists at least one agent i with i Ve(MPP(P,Q)) \ Ve r (MPP(P,Q)) such that the following are true: (i) there exists X i such that i and [ i,] X i ; (ii) i roj Xi CC(M i ) > 0. We shall also reuire, at some times, to make the following assumtion on a seuence {P m } m N {0} Q n : (A) There exists a comact set X (Q \ Ve r (Q)) such that {P m } m N {0} X n. We are now ready to state the following convergence result. Theorem IV.4 Let 1,..., n be a network of visuallyguided agents in Q Q, with maximum ste size s max R +. Assume that Q does not contain any holes, and that the roximity grah G is satially distributed over G vis,q and has the same connected comonents as G vis,q. Then, any trajectory {P m } m N {0} of T G has the following roerties: (i) if the locations of two agents belong to the same connected comonent of G vis,q (P k ) for some k N {0}, then they remain in the same connected comonent of G vis,q (P m ) for all m k, (ii) V erim,q (P m+1 ) V erim,q (P m ), for all m N {0}, (iii) if {P m } m N {0} satisfies (A), then {P m } m N {0} converges to a oint P X n such that either i = j or [ i, j ] Q for all i,j {1,...,n}. The roof for Theorem IV.4 is based on the following useful results. The technical aroach in what follows is similar to the one in [9]. To a roximity grah function G that is satially distributed over G vis,q, and a configuration P Q n, one may associate a grah G G(P) = ({1,...,n},E) by defining (i,j) E if ( i, j ) is an edge of G(P). Clearly, for each P Q n, N GG(P) (i) is eual to the set of neighbors of i with resect to the grah G(P). Given an undirected grah G = ({1,...,n},E), define the Circumcenter Algorithm at Fixed Toology T G : Q n Q n whose ith comonent is (T G ) i ( 1,..., n ) = (T G ) i ( 1,..., n ). Lemma IV.5 For G = ({1,...,n},E), the ma T G : Q n Q n has the following roerties: (i) The ma P T G (P) restricted to (Q \ Ve r (Q)) n is continuous, and (ii) MPP(T G (P),Q) MPP(P,Q), for P Q n. Given Q Q, define the Circumcenter Algorithm at All Connected Toologies T : Q n 2 (Qn) by T(P) = {T G (P) Q n G = ({1,...,n},E) is connected}. Proosition IV.6 For Q Q, the ma T : Q n 2 (Qn) has the following roerties: (i) the ma P T(P) restricted to X, a comact subset of (Q \ Ve r (Q)) n, is uer semicontinuous, and (ii) MPP(T(P),Q) MPP(P,Q), for P Q n if there exists i, j P such that. i j. Now that we have analyzed the smoothness of T, let us study the roerties of the function V erim,: Q n R +. Lemma IV.7 The function V erim,: Q n R + has the following roerties: (i) V erim,q is continuous, and is invariant under ermutations of its arguments; (ii) V erim,q (P) = 0 if and only if i = j for all i P,i {1,...,n}; (iii) V erim,q is strictly decreasing along T as long as V erim,q (P) > 0.

6 We now resent the asymtotic convergence roerties of the algorithm T. The roof of this relies on a discrete-time LaSalle Invariance Princile for set-valued mas; see [9]. Initial osition of the agents Evolution of the network Final osition of the agents Lemma IV.8 Let Q Q. Assume that Q does not contain any holes, and that the roximity grah G is satially distributed over G vis,q and has the same connected comonents as G vis,q. Then, any seuence {P m } m N {0}, defined by P m+1 T(P m ) and satisfying Assumtion (A), converges to a oint P X n such that i = j for all i,j {1,...,n}. E. A variant of the Circumcenter Algorithm In Section IV-D, we conjecture that the Circumcenter Algorithm solves the rendezvous roblem for visually-guided agents if the network evolves in a comact subset of Q \ Ve r (Q). In what follows we describe an algorithm that we conjecture guarantees convergence without this assumtion. Name: Modified Circumcenter Algorithm over G Assumes: (i) s max R + is maximum ste size (ii) Q Q (iii) G is a satially distributed roximity grah over G vis,q with the roerty that two agents at the same location have identical sets of neighbors. For i {1,...,n}, agent i executes the following at each time instant in N: 1: acuire { 1,..., k } := N Gvis,Q, i (P) 2: comute W i := { j j = i, j {1,...,n}} 3: comute B i := (N G,i ({ 1,..., k }) \ W i ) 4: comute M i := B i { i } 5: if B i = {v}, for v Ve r (Q), and i / Ve r (Q) then 6: comute i := v 7: else 8: comute X i := C i,q(m i ) MPP(M i ) 9: comute i := roj Xi (CC(M i )) 10: end if 11: u i := min(smax, i i ) i i ( i i) Remark IV.9 The grah G lc-vis,q fulfills assumtion (iii) in the statement of the Modified Circumcenter Algorithm. V. SIMULATION RESULTS To conduct exeriments, a two-layer simulation environment has been develoed in Matlab R. Figs. 1, 8 and 9 illustrate the erformance of the Circumcenter Algorithm in Section IV-C. VI. CONCLUSIONS This aer focuses on the distributed control of synchronous networks of visually-guided robotic agents. We have defined some useful geometric uantities, such as continuous constraint sets and generalized visibility grahs, and studied circumcenter algorithms for rendezvous. We have rovided a convergence roof as well as successful numerical simulations. Possible future work involves coordination algorithms for deloyment and search for visuall-guided agents. Fig. 8. Simulation results of the Circumcenter Algorithm on a network of agents distributed in a siral olygon. The locations of the agents, at all times, do not belong to reflex vertices. However, at some instants, reflex vertices are aroached very closely. The algorithm is run over G vis,q. Initial osition of the agents Evolution of the network Final osition of the agents Fig. 9. Simulation results of the Circumcenter Algorithm on a network of agents distributed in a olygon shaed like a tyical floor lan. The algorithm is run over G lc-vis,q. Acknowledgments: This material is based uon work suorted in art by AFOSR through Award F , by ONR through YIP Award N , and by faculty research funds granted by the University of California, Santa Cruz. The authors thank Prof. Jana Kosěcká for an early insiring discussion on the subject of this aer. REFERENCES [1] H. Ando, Y. Oasa, I. Suzuki, and M. Yamashita, Distributed memoryless oint convergence algorithm for mobile robots with limited visibility, IEEE Transactions on Robotics and Automation, vol. 15, no. 5, , [2] J. Lin, A. S. Morse, and B. D. O. Anderson, The multi-agent rendezvous roblem: An extended summary, in Proceedings of the 2003 Block Island Worksho on Cooerative Control, ser. Lecture Notes in Control and Information Sciences, V. Kumar, N. E. Leonard, and A. S. Morse, Eds. New York: Sringer Verlag, 2004, vol. 309, [3] P. Flocchini, G. Prencie, N. Santoro, and P. Widmayer, Gathering of asynchronous oblivious robots with limited visibility, in STACS 2001, 18th Annual Symosium on Theoretical Asects of Comuter Science (Dresden, Germany), ser. Lecture Notes in Comuter Science, A. Ferreira and H. Reichel, Eds. New York: Sringer Verlag, 2001, vol. 2010, [4] Z. Lin, M. Broucke, and B. Francis, Local control strategies for grous of mobile autonomous agents, IEEE Transactions on Automatic Control, vol. 49, no. 4, , [5] C. Geyer and K. Daniilidis, Mirrors in motion: Eiolar geometry and motion estimation, in IEEE International Conference on Comuter Vision, Nice, France, Oct. 2003, [6] J. Hayes, M. McJunkin, and J. Kosěcká, Communication enhanced navigation strategies for teams of mobile agents, in IEEE/RSJ Int. Conf. on Intelligent Robots & Systems, Las Vegas, NV, Oct. 2003, [7] A. F. Filiov, Differential Euations with Discontinuous Righthand Sides, ser. Mathematics and Its Alications. Dordrecht, The Netherlands: Kluwer Academic Publishers, 1988, vol. 18. [8] J. W. Jaromczyk and G. T. Toussaint, Relative neighborhood grahs and their relatives, Proceedings of the IEEE, vol. 80, no. 9, , [9] J. Cortés, S. Martínez, and F. Bullo, Robust rendezvous for mobile autonomous agents via roximity grahs in arbitrary dimensions, IEEE Transactions on Automatic Control, vol. 51, no. 6, 2006, to aear.

Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions

Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions ACCEPTED AS A REGULAR PAPER TO IEEE TRANSACTIONS ON AUTOMATIC CONTROL 1 Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions Jorge Cortés, Sonia Martínez, Francesco

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

Network Configuration Control Via Connectivity Graph Processes

Network Configuration Control Via Connectivity Graph Processes Network Configuration Control Via Connectivity Grah Processes Abubakr Muhammad Deartment of Electrical and Systems Engineering University of Pennsylvania Philadelhia, PA 90 abubakr@seas.uenn.edu Magnus

More information

SECTION 5: FIBRATIONS AND HOMOTOPY FIBERS

SECTION 5: FIBRATIONS AND HOMOTOPY FIBERS SECTION 5: FIBRATIONS AND HOMOTOPY FIBERS In this section we will introduce two imortant classes of mas of saces, namely the Hurewicz fibrations and the more general Serre fibrations, which are both obtained

More information

Opposite-quadrant depth in the plane

Opposite-quadrant depth in the plane Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,

More information

On the Toppling of a Sand Pile

On the Toppling of a Sand Pile Discrete Mathematics and Theoretical Comuter Science Proceedings AA (DM-CCG), 2001, 275 286 On the Toling of a Sand Pile Jean-Christohe Novelli 1 and Dominique Rossin 2 1 CNRS, LIFL, Bâtiment M3, Université

More information

Summary Introduction. Lecture #3: Rendezvous and connectivity maintenance algorithms. But we have to be careful... Rendezvous objective

Summary Introduction. Lecture #3: Rendezvous and connectivity maintenance algorithms. But we have to be careful... Rendezvous objective Lecture #3: Rendezvous and connectivity maintenance algorithms Francesco Bullo 1 Jorge Cortés 2 Sonia Martínez 2 1 Department of Mechanical Engineering University of California Santa Barbara bullo@engineering.ucsb.edu

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important CHAPTER 2: SMOOTH MAPS DAVID GLICKENSTEIN 1. Introduction In this chater we introduce smooth mas between manifolds, and some imortant concets. De nition 1. A function f : M! R k is a smooth function if

More information

Maximizing visibility in nonconvex polygons: nonsmooth analysis and gradient algorithm design

Maximizing visibility in nonconvex polygons: nonsmooth analysis and gradient algorithm design Maximizing visibility in nonconvex polygons: nonsmooth analysis and gradient algorithm design Anurag Ganguli Coordinated Science Lab University of Illinois aganguli@uiuc.edu Jorge Cortés School of Engineering

More information

Stable Delaunay Graphs

Stable Delaunay Graphs Stable Delaunay Grahs Pankaj K. Agarwal Jie Gao Leonidas Guibas Haim Kalan Natan Rubin Micha Sharir Aril 29, 2014 Abstract Let P be a set of n oints in R 2, and let DT(P) denote its Euclidean Delaunay

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. III Stability Theory - Peter C. Müller

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. III Stability Theory - Peter C. Müller STABILITY THEORY Peter C. Müller University of Wuertal, Germany Keywords: Asymtotic stability, Eonential stability, Linearization, Linear systems, Lyaunov equation, Lyaunov function, Lyaunov stability,

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Mollifiers and its applications in L p (Ω) space

Mollifiers and its applications in L p (Ω) space Mollifiers and its alications in L () sace MA Shiqi Deartment of Mathematics, Hong Kong Batist University November 19, 2016 Abstract This note gives definition of mollifier and mollification. We illustrate

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type Nonlinear Analysis 7 29 536 546 www.elsevier.com/locate/na Multilicity of weak solutions for a class of nonuniformly ellitic equations of -Lalacian tye Hoang Quoc Toan, Quô c-anh Ngô Deartment of Mathematics,

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

arxiv:math/ v4 [math.gn] 25 Nov 2006

arxiv:math/ v4 [math.gn] 25 Nov 2006 arxiv:math/0607751v4 [math.gn] 25 Nov 2006 On the uniqueness of the coincidence index on orientable differentiable manifolds P. Christoher Staecker October 12, 2006 Abstract The fixed oint index of toological

More information

Maintaining limited-range connectivity among second-order agents

Maintaining limited-range connectivity among second-order agents ACC 006, To appear Maintaining limited-range connectivity among second-order agents Giuseppe Notarstefano Ketan Savla Francesco Bullo Ali Jadbabaie Abstract In this paper we consider ad-hoc networks of

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Analysis and design tools for distributed motion coordination

Analysis and design tools for distributed motion coordination 005 American Control Conference June 8-10, 005. Portland, OR, USA WeC16. Analysis and design tools for distributed motion coordination Jorge Cortés School of Engineering University of California at Santa

More information

CR extensions with a classical Several Complex Variables point of view. August Peter Brådalen Sonne Master s Thesis, Spring 2018

CR extensions with a classical Several Complex Variables point of view. August Peter Brådalen Sonne Master s Thesis, Spring 2018 CR extensions with a classical Several Comlex Variables oint of view August Peter Brådalen Sonne Master s Thesis, Sring 2018 This master s thesis is submitted under the master s rogramme Mathematics, with

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

Matching Transversal Edge Domination in Graphs

Matching Transversal Edge Domination in Graphs Available at htt://vamuedu/aam Al Al Math ISSN: 19-9466 Vol 11, Issue (December 016), 919-99 Alications and Alied Mathematics: An International Journal (AAM) Matching Transversal Edge Domination in Grahs

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS

MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS Dan-Cristian POPA, Vasile IANCU, Loránd SZABÓ, Deartment of Electrical Machines, Technical University of Cluj-Naoca RO-400020 Cluj-Naoca, Romania; e-mail:

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY FEDERICA PASQUOTTO 1. Descrition of the roosed research 1.1. Introduction. Symlectic structures made their first aearance in

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

NOTES. Hyperplane Sections of the n-dimensional Cube

NOTES. Hyperplane Sections of the n-dimensional Cube NOTES Edited by Sergei Tabachnikov Hyerlane Sections of the n-dimensional Cube Rolfdieter Frank and Harald Riede Abstract. We deduce an elementary formula for the volume of arbitrary hyerlane sections

More information

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition ISSN 1 746-7233 England UK World Journal of Modelling and Simulation Vol. 3 (2007) No. 2. 83-89 On the minimax inequality and its alication to existence of three solutions for ellitic equations with Dirichlet

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

The Multi-Agent Rendezvous Problem - The Asynchronous Case

The Multi-Agent Rendezvous Problem - The Asynchronous Case 43rd IEEE Conference on Decision and Control December 14-17, 2004 Atlantis, Paradise Island, Bahamas WeB03.3 The Multi-Agent Rendezvous Problem - The Asynchronous Case J. Lin and A.S. Morse Yale University

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

On synchronous robotic networks Part II: Time complexity of rendezvous and deployment algorithms

On synchronous robotic networks Part II: Time complexity of rendezvous and deployment algorithms On synchronous robotic networks Part II: Time complexity of rendezvous and deployment algorithms Sonia Martínez Francesco Bullo Jorge Cortés Emilio Frazzoli Abstract This paper analyzes a number of basic

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

The Value of Even Distribution for Temporal Resource Partitions

The Value of Even Distribution for Temporal Resource Partitions The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH

BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH DORIN BUCUR, ALESSANDRO GIACOMINI, AND PAOLA TREBESCHI Abstract For Ω R N oen bounded and with a Lischitz boundary, and

More information

Spin as Dynamic Variable or Why Parity is Broken

Spin as Dynamic Variable or Why Parity is Broken Sin as Dynamic Variable or Why Parity is Broken G. N. Golub golubgn@meta.ua There suggested a modification of the Dirac electron theory, eliminating its mathematical incomleteness. The modified Dirac electron,

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Location of solutions for quasi-linear elliptic equations with general gradient dependence

Location of solutions for quasi-linear elliptic equations with general gradient dependence Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations

More information

CHAPTER 3: TANGENT SPACE

CHAPTER 3: TANGENT SPACE CHAPTER 3: TANGENT SPACE DAVID GLICKENSTEIN 1. Tangent sace We shall de ne the tangent sace in several ways. We rst try gluing them together. We know vectors in a Euclidean sace require a baseoint x 2

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

Dialectical Theory for Multi-Agent Assumption-based Planning

Dialectical Theory for Multi-Agent Assumption-based Planning Dialectical Theory for Multi-Agent Assumtion-based Planning Damien Pellier, Humbert Fiorino Laboratoire Leibniz, 46 avenue Félix Viallet F-38000 Grenboble, France {Damien.Pellier,Humbert.Fiorino}.imag.fr

More information

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices Coyright 202 Tech Science Press CMES, vol.86, no.4,.30-39, 202 An Inverse Problem for Two Sectra of Comlex Finite Jacobi Matrices Gusein Sh. Guseinov Abstract: This aer deals with the inverse sectral roblem

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

Kinetic Voronoi Diagrams and Delaunay Triangulations under Polygonal Distance Functions

Kinetic Voronoi Diagrams and Delaunay Triangulations under Polygonal Distance Functions Kinetic Voronoi Diagrams and Delaunay Triangulations under Polygonal Distance Functions Pankaj K. Agarwal Haim Kalan Natan Rubin Micha Sharir May 13, 2015 Abstract Let P be a set of n oints and Q a convex

More information

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA) Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Commutators on l. D. Dosev and W. B. Johnson

Commutators on l. D. Dosev and W. B. Johnson Submitted exclusively to the London Mathematical Society doi:10.1112/0000/000000 Commutators on l D. Dosev and W. B. Johnson Abstract The oerators on l which are commutators are those not of the form λi

More information

Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180

Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180 Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180 Wei Chen, Fangyue Chen, Yunfeng Bian, Jing Chen School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang, P. R.

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

LECTURE 6: FIBER BUNDLES

LECTURE 6: FIBER BUNDLES LECTURE 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann

More information

HARMONIC EXTENSION ON NETWORKS

HARMONIC EXTENSION ON NETWORKS HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN

THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN INTERNATIONAL JOURNAL OF GEOMETRY Vol. 5 (2016), No. 1, 31-38 THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN PETER WALKER Abstract. We show that in the Erd½os-Mordell theorem, the art of the region

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

A Note on Massless Quantum Free Scalar Fields. with Negative Energy Density

A Note on Massless Quantum Free Scalar Fields. with Negative Energy Density Adv. Studies Theor. Phys., Vol. 7, 13, no. 1, 549 554 HIKARI Ltd, www.m-hikari.com A Note on Massless Quantum Free Scalar Fields with Negative Energy Density M. A. Grado-Caffaro and M. Grado-Caffaro Scientific

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform

Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform Chaoquan Chen and Guoing Qiu School of Comuter Science and IT Jubilee Camus, University of Nottingham Nottingham

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

On Two-Finger Grasping of Deformable Planar Objects

On Two-Finger Grasping of Deformable Planar Objects 2011 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-13, 2011, Shanghai, China On Two-Finger Grasing of Deformable Planar Objects Yan-Bin Jia Feng

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Global Behavior of a Higher Order Rational Difference Equation

Global Behavior of a Higher Order Rational Difference Equation International Journal of Difference Euations ISSN 0973-6069, Volume 10, Number 1,. 1 11 (2015) htt://camus.mst.edu/ijde Global Behavior of a Higher Order Rational Difference Euation Raafat Abo-Zeid The

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

SCHUR m-power CONVEXITY OF GEOMETRIC BONFERRONI MEAN

SCHUR m-power CONVEXITY OF GEOMETRIC BONFERRONI MEAN ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 207 (769 776 769 SCHUR m-power CONVEXITY OF GEOMETRIC BONFERRONI MEAN Huan-Nan Shi Deartment of Mathematics Longyan University Longyan Fujian 36402

More information

Advanced Calculus I. Part A, for both Section 200 and Section 501

Advanced Calculus I. Part A, for both Section 200 and Section 501 Sring 2 Instructions Please write your solutions on your own aer. These roblems should be treated as essay questions. A roblem that says give an examle requires a suorting exlanation. In all roblems, you

More information

B8.1 Martingales Through Measure Theory. Concept of independence

B8.1 Martingales Through Measure Theory. Concept of independence B8.1 Martingales Through Measure Theory Concet of indeendence Motivated by the notion of indeendent events in relims robability, we have generalized the concet of indeendence to families of σ-algebras.

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

A Graph-Theoretic Characterization of Controllability for Multi-agent Systems

A Graph-Theoretic Characterization of Controllability for Multi-agent Systems A Graph-Theoretic Characterization of Controllability for Multi-agent Systems Meng Ji and Magnus Egerstedt Abstract In this paper we continue our pursuit of conditions that render a multi-agent networked

More information