SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Mathematics and Statistics Invention (IJMSI)
E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759
www.ijmsi.org Volume 2 Issue 6 || June. 2014 || PP-09-13
www.ijmsi.org 9 | P a g e
Relationship between cores of targets and Euclidean
controllability for single-delay neutral control systems
Ukwu Chukwunenye
Department of Mathematics, University of Jos,
P.M.B 2084 Jos, Nigeria.
ABSTRACT : This article established necessary and sufficient conditions for the compactness of cores of
Euclidean targets and Euclidean controllability of single-delay linear neutral control systems.
The proofs relied on the notion of asymptotic directions and other convex set properties as well as the
independent results on cores of targets and Euclidean controllability in Ukwu [1, 2,3] respectively.
KEYWORDS: Asymptotic, Core, Controllability, Euclidean, Targets.
I. INTRODUCTION
The relationship between cores of targets and Euclidean controllability was introduced by Hajek [4],
who examined the system , ( ) , (end) ,x Ax p p t P x T    where Ais an n n coefficient matrix, ,P the
constraint set a compact convex non-void subset of the real n-dimensional Euclidean space ,n
R the target set,
,T a closed convex non-void subset of ,n
R and : ,p I P admissible controls on ,I a subset of [0, ).
 R
By exploiting the analyticity and non-singularity of the fundamental matrices of the associated homogeneous
system ,x Ax and using the notion of asymptotic directions and other convex set properties, he established
that core( )T is bounded if and only if  
1
rank , , , ,
nT T T T T
M A M A M n

 
 
 for some m n constant matrix,
.M He indicated that the closedness of core( )T could be achieved by using a weak compactness argument.
[5]Extended Hajek’s results to a delay control system, with the major contribution being the varying of the
technique for the boundedness of core( )T due to the singularity of the solution matrices and certain other
properties of such matrices.This paper extends further the relationship between cores of targets and Euclidean
controllability to single-delay linear neutral systems by leaveraging on the results in [1, 2, 3].
Consider the autonomous linear differential – difference control system of neutral type:
         
     
1 0 1
; 0 (1)
, , 0 , 0 (2)
x t A x t h A x t A x t h B u t t
x t t t h h

      
   
 
where 1 0 1
, ,A A A are n n constant matrices with real entries and B is an n m constant matrix with the
real entries. The initial function  is in   , 0 ,
n
C h R equipped with sup norm. The control u is in
  1
0, ,
n
L t
R . Such controls will be called admissible controls.      1
for, 0,n
x t x t h t t  R . If
  1
, , n
x C h t  R , then for  t t 0 1, we define   , 0 , n
t C hx   R by
.      x s x t s s ht    , , 0
II. EXISTENCE, UNIQUENESS AND REPRESENTATION OF SOLUTIONS
If A 1 0 and  is continuously differentiable on  , 0h , then there exists a unique function  : ,x h 
which coincides with  on  , 0h , is continuously differentiable and satisfies (1) except possibly at the points
; 0,1, 2,...jh j  . This solution x can have no more derivatives than  and continuously differentiable if and
only if the relation:
       1 0 1
0 (0) 0 (3)A h A A h Bu   
      
Relationship Between Cores Of Targets…
www.ijmsi.org 10 | P a g e
is satisfied. See Bellman and Cooke [6] and theorem 7.1 in Dauer and Gahl [7] for complete discussion on
existence, uniqueness and representations of solutions of (1).
2.1 Preliminaries on the Partial Derivatives
( , )
, 0,1,
k
k
X t
k






Let  1
, 0,t t  for fixed t, let  ,X t  be the unique function satisfying the matrix differential equation:
       
 
1 0 1
, , , ,
subject to:
;
, =
0,
0 , ; 0,1,...,
(4)
(5)n
t h t A X t A X h t A
I t
t
t
X X
t t jh j
X
 
   
   



 

    


    



By Tadmore ([8], p. 80),  ,X t  is analytic on    .1 , , 0,1,...t j h t jh j    and hence
 , isX t C 

 on these intervals.
The left and right-hand limits of  ,X t  exist at   t jh , so that  ,tX  is of bounded variation on
each compact interval. Cf. Banks and Jacobs [9], Banks and Kent [10] and Hale [11]. We maintain the notation
 
   
 , , ,
k k
X t X t  as in [1].
III. THEOREM RELATING CORES OF TARGETS AND EUCLIDEAN
CONTROLLABILITY FOR SYSTEM (1)
Consider the control system (1) with its standing hypotheses. Let the target set H be of the
form ,H L D  where { : 0}n
L x M x   for some m n matrix ,M and some bounded, convex
subset D of
n
 with 0 D . Assume that 0 ,U and that 0  H . Then core ( )H is compact if and only if the
system:
1 0 1( ) ( ) ( ) ( ) ( ) (6)T T T T
x t A x t h A x t A x t h M u t      
is Euclidean controllable.
Proof
Let a be an asymptotic direction of core ( )H . Let ( , ) ( )t Y t Y t    be a solution matrix of the free part
of (1) such that (0) ,n
Y I the identity matrix of order .n Then by lemma 4.2 of [1], we deduce that ( )Y t a is
an asymptotic direction of H for 0.t  By lemma 2.6 of [1],
( ) ,Y t a L for all 0.t  It follows from the definition of L in the hypotheses of theorem 4.4 that:
( ) 0 (7)MY t a 
for each   coreO Ha 
 and where ( )0, O Kt 
 is the set of asymptotic directions of the convex set ,K as
defined in [1]. Take the transpose of both sides of (7) to get ( ) 0.T T T
a Y t M  By lemma 4and theorem 4.1 of
[1], core ( )H is a nonvoid convex subset of
n
R . By lemma 2.5 of [1], core ( )H is bounded if and only if 0 is its
only asymptotic direction.
Claim: ( , )Y t  satisfies        1 0 1
, , , ,
T T T T T T
Y t Y t h A Y t A Y t h A
 
   
 

    
Proof of the claim: Since ( , )t Y t  is a solution matrix of the free part of (1), it follows that
       1 0 1
, , , ,Y t A Y t h A Y t AY t h
t t
 
   
 

     , from which transposition yields
Relationship Between Cores Of Targets…
www.ijmsi.org 11 | P a g e
       1 0 1
(i) , , , ,
T T T T T T T
Y t Y t h A Y t A Y t h A
t t
 
   
 

    
ˆ ˆ ˆ ˆSet ( , ) ( , ). Then ( , ) ( ) and ( , ) ( ). Consequently,
T T
X t Y t X t X t Y t X t         
     
( )ˆ ˆ,
( ) ( )
T t
Y t X t X t
t t t t
    
  
     

    
 
     
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
t h t t h t
    
  
     
 
       
   
     
( )ˆ ˆClearly, ,
( ) ( )
T t
Y t X t X t
t t
    
  
     

   
 
   
ˆ ( , )
(ii) , , .
T TX t
Y t Y t
t
   
 
  
   
     
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
h t h t
    
  
     
 
      
   
   
ˆ ( , )
(iii) , , .
T TX h t
Y t h Y t h
t
   
 
  

     
(i), (ii), and (iii) yield
       1 0 1
ˆ ˆ ˆ ˆ, , , ,T T T
X t X h t A X t A X h t A
 
   
 

    
       1 0 1
proving the claim, , , , .,T T T T T T T
Y t Y t h A Y t A Y t h A
 
   
 

    
Let 1 0 1
( ) ( ) ( ) ( ) ( )
T T T T
x t A x t h A x t A x t h M u t
       be Euclidean controllable on 1[0, ],t for some 1 0.t  By
the above claim and the proof of theorem 2 of [2], this is equivalent to requiring that the
relation 1
.( , ) 0, implies 0, for [max{0, }, ]
T T T
a Y t M t ta    Therefore the relation ( ) 0
T T T
a Y t M 
1
.implies 0, for [0, ]a t t  But a is an arbitrary asymptotic direction of the nonvoid convex set, core ( )H .
Hence (core( )) {0}.O H

 We invoke lemma 2.5 to conclude that core ( )H is bounded, since O is its only
asymptotic direction.
It is already established in theorem 4.1 of [1], that core ( )H is closed. Therefore core ( )H is compact.
Conversely let core ( )H be compact. Then (core( )) {0},O H

 by lemma 2.5. Suppose (6) is not Euclidean
controllable. Then by theorem 2 of [2], there exists 0,,n
c c R such that ( ) 0,T TT
Y t Mc  1
[0, ].t t 
Hence by transposition, ( ) 0MY t c  . Consequently, ( ) ( )Y t c L O H
  . We appeal to lemma 4.2 of [1] to
deduce that .(core( )), 0c O H c

  . This contradicts the compactness of core , by lemma 2.5 of [1]. Hence the
supposition is false. Therefore (6) is Euclidean controllable given that core ( )H is compact. This concludes the
proof of the theorem.
Remarks:
If 1 1 0,A A  then the system (6) reduces to 0
( ) ( ) ( )T T
x t A x t M u t  , in which case the fundamental
matrix ( )T
Y t of 0
( ) ( )T
x t A x t is analytic, nonsingular and equals 0
T
A t
e . This particular case
1 1
( 0)A A
  forces 0j  in the formula for ( )k
Q jh and (0),for 0.k
Q s  0
But 0 (0)k
k
k Q A   , by
lemma 2.4 of [3]. We then conclude from theorem 4.4of [1] that core ( )H is compact if and if only
rank
1
0 0, , ( )T T T T n T
M A M A M n
    . This coincides with Hajek’s result.
Relationship Between Cores Of Targets…
www.ijmsi.org 12 | P a g e
IV. ANALYSIS OF SYSTEM (1) AND AN ECONOMIC INTERPRETATION OF
THEOREM IN 3.
The target H could represent the prescribed and desired level of stock of capital assets. The lag h
represents the lead times or periods of gestation for investment in capital stock and  P Bu u :  denotes
the investment capacity of the given firm. Given  u u u u um 

, , ,...,1 2 , it is clear that
1 2, , , mu u u are investment strategies. Strategies could be at positive, negative or zero levels. In other words
strategies are unsigned or unrestricted in sign. Write  1 2
, , , ,m
B b b b  where i
b is a column n-vector and
{1,2, , }.i m  Then B is a matrix of fixed stock and
1
,
m
i i
i
Bu b u

  , where i i
b u denotes the availability of
stock ib to be invested at a level iu ; in other words, iu units of stock ib are available for investment. Thus,
for a given strategy  
T
1 2
, , , m
u u u u  the elements 1 2
, , , m
u u u represent investment coefficients of the
stock 1 2
, , , m
b b b respectively. Hence the definition of P as the power of investment available to the firm is
justified.
The values , ( )t x t denote respectively the current time and the current stock of capital assets, given an
initial endowment. The values ( )x t h denotes respectively available stock of capital assets h time units time
units before, while ( ) and ( )x t x t h  denote respectively the current rate of change of capital stock and the rate
of change of capital stock htime- period before. 0A is the matrix of coefficients of stock currently available,
1A is the matrix of coefficients of stock available .h time units; 1A is the matrix of coefficients of investments
an htime- period before.
Therefore system (1) could be a dynamic model of the fluctuations of capital stock, where the current rate of
change of stock depends partly on the following:
[1] Currently available capital stock,
[2] Capital stock available h time units before
[3] Rate of change of capital stock htime units before and
[4] The investment capacity of the firm.
Theorem 3 says that the prescribed target, H is achievable if and only if
rank  Q t nn 1  ,
for some t1 0 , where
1 0 1 1 1
( ) ( ) ( ) ( ); {0,1, }, {0, , },T T T
k k k k
Q s A Q s h A Q s A Q s h k s h  
       
with initial conditions.
0
(0) , ( ) 0,for min{ , } 0, andn k
Q I Q s k s  
1 0 1 1 1
.ˆ ( ) ( ) , ( ) , , ( ) , [0, ) {0, , }
T T T
nn
Q t Q s M Q s M Q s M s t h
    
In other words, it is possible to control any initial endowment  to a prescribed level of growth of capital stock,
subject to its constraints by a careful implementation of investment strategies. However, the achieved growth
level can only be sustained for small (compact) levels of initial values; otherwise there is no guarantee that the
growth will not be reversed. Compactness of core ( )H means that the initial capital assets need not be too big.
V. CONCLUSION
This paper relied on the results in [1], [2] and [3] to establish necessary and sufficient conditions for the
Euclidean controllability of system (1) in terms of the compactness of cores of targets of a corresponding
transposed system. The result exploited the specified structure of the target set amenable to the application of
the notion of asymptotic directions and other convex set properties, as well as the special relationship between
the solution matrices of the uncontrolled part of system (1) and the associated control index matrices defined in
system (3). In the sequel the paper provided an analysis of system (1) and an economic interpretation of theorem
Relationship Between Cores Of Targets…
www.ijmsi.org 13 | P a g e
3.1. The ideas exposed in this paper can be tapped to extend the result and economic interpretations to
associated perturbed and more general systems.
REFERENCES
[1] Ukwu, C. (2014n). Cores of Euclidean targets for single-delay autonomous linear neutral control systems. International Journal of
Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, April 2014.
[2] Ukwu, C. (2014r). Necessary and sufficient conditions for the Euclidean controllability of single-delay autonomous linear neutral
control systems and applications. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, May 2014
[3] Ukwu, C. (2014h). The structure of determining matrices for single-delay autonomous linear neutral control systems. International
Journal of Mathematics and Statistics Invention (IJMSI). Vol. 2, Issue 3, March 2014.
[4] Hajek, O. (1974). Cores of targets in Linear Control systems. Math. Systems theory. Vol. 8, No.3, 203 – 206, Springer-Verlag,
New York.
[5] Ukwu, C. (1992). Euclidean Controllability and Cores of Euclidean Targets for Differential difference systems Master of Science
Thesis in Applied Math. with O.R. (Unpublished), North Carolina State University, Raleigh, N. C. U.S.A.
[6] Bellman, R. and Cooke, K.(1963). Differential-difference equations. Acad. Press, New York.
[7] Dauer, J. P. and Gahl, R. D.Controllability of nonlinear delay systems. J.O.T.A. Vol. 21, No. 1, January1977.
[8] Tadmore, G. (1984). Functional differential equations of retarded and neutral types: Analytical solutions and piecewise continuous
controls. J. Differential equations, Vol. 51, No. 2, Pp. 151-181.
[9] Banks, H. T. and Jacobs, M. (1973). An attainable sets approach to optimal control offunctional differential equations with function
space terminal conditions. J. diff. equations, Vol 13, pp. 121- 149.
[10] Banks, H. T. and Kent G. A.(1972). Control of functional differential equations of retarded and neutral type to targets in function
space, SIAM J. Control, Vol. 10. No. 4.
[11] Hale, J. K. (1977). Theory of functional differential equations. Applied Mathematical Science,Vol. 3, Springer-Verlag, New York.

Mais conteúdo relacionado

Mais procurados

On fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spacesOn fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spacesAlexander Decker
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
 
Comparison Theorems for SDEs
Comparison Theorems for SDEs Comparison Theorems for SDEs
Comparison Theorems for SDEs Ilya Gikhman
 
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsOn New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
 
Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...Editor IJCATR
 
On fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral typeOn fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral typeAlexander Decker
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...BRNSS Publication Hub
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansijsc
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...ijfls
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Existence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value ProblemsExistence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value Problemsijtsrd
 
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...IOSR Journals
 

Mais procurados (19)

A02402001011
A02402001011A02402001011
A02402001011
 
On fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spacesOn fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spaces
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
Comparison Theorems for SDEs
Comparison Theorems for SDEs Comparison Theorems for SDEs
Comparison Theorems for SDEs
 
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsOn New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
 
Iu3515201523
Iu3515201523Iu3515201523
Iu3515201523
 
Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...
 
On fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral typeOn fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral type
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
50120140504018
5012014050401850120140504018
50120140504018
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-means
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
 
C023014030
C023014030C023014030
C023014030
 
C023014030
C023014030C023014030
C023014030
 
Mathematics
MathematicsMathematics
Mathematics
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Existence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value ProblemsExistence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value Problems
 
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
 

Destaque

Centre de ressources français et anglais
Centre de ressources français et anglaisCentre de ressources français et anglais
Centre de ressources français et anglaisGabriel BREZOIU
 
Memovisage
MemovisageMemovisage
Memovisageslatefr
 
French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]FrenchLeaveVillage
 
Document
DocumentDocument
DocumentViewOn
 
Economie resu sylla
Economie resu syllaEconomie resu sylla
Economie resu syllaClaireISE
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesGeneva Declaration
 
Relancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaRelancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaInstitut-idec
 

Destaque (8)

Centre de ressources français et anglais
Centre de ressources français et anglaisCentre de ressources français et anglais
Centre de ressources français et anglais
 
Memovisage
MemovisageMemovisage
Memovisage
 
French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]
 
Document
DocumentDocument
Document
 
Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013
 
Economie resu sylla
Economie resu syllaEconomie resu sylla
Economie resu sylla
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
 
Relancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaRelancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisia
 

Semelhante a B02609013

Stability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problemsStability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problemsAI Publications
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...inventionjournals
 
applied mathematics methods.pdf
applied mathematics methods.pdfapplied mathematics methods.pdf
applied mathematics methods.pdfCyprianObota
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemesinventy
 
International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2IJEMM
 
Redundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systemsRedundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systemsSpringer
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...Wireilla
 
Existance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential EquartionExistance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential Equartioninventionjournals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Common fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via anCommon fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via anAlexander Decker
 
On Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceOn Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceBRNSS Publication Hub
 
An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.IJERA Editor
 

Semelhante a B02609013 (20)

C02402023032
C02402023032C02402023032
C02402023032
 
Stability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problemsStability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problems
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
 
F023064072
F023064072F023064072
F023064072
 
D021018022
D021018022D021018022
D021018022
 
applied mathematics methods.pdf
applied mathematics methods.pdfapplied mathematics methods.pdf
applied mathematics methods.pdf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemes
 
International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2
 
D023031047
D023031047D023031047
D023031047
 
D023031047
D023031047D023031047
D023031047
 
Redundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systemsRedundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systems
 
D025030035
D025030035D025030035
D025030035
 
01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
 
Existance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential EquartionExistance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential Equartion
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Common fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via anCommon fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via an
 
On Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceOn Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach Space
 
An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

B02609013

  • 1. International Journal of Mathematics and Statistics Invention (IJMSI) E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759 www.ijmsi.org Volume 2 Issue 6 || June. 2014 || PP-09-13 www.ijmsi.org 9 | P a g e Relationship between cores of targets and Euclidean controllability for single-delay neutral control systems Ukwu Chukwunenye Department of Mathematics, University of Jos, P.M.B 2084 Jos, Nigeria. ABSTRACT : This article established necessary and sufficient conditions for the compactness of cores of Euclidean targets and Euclidean controllability of single-delay linear neutral control systems. The proofs relied on the notion of asymptotic directions and other convex set properties as well as the independent results on cores of targets and Euclidean controllability in Ukwu [1, 2,3] respectively. KEYWORDS: Asymptotic, Core, Controllability, Euclidean, Targets. I. INTRODUCTION The relationship between cores of targets and Euclidean controllability was introduced by Hajek [4], who examined the system , ( ) , (end) ,x Ax p p t P x T    where Ais an n n coefficient matrix, ,P the constraint set a compact convex non-void subset of the real n-dimensional Euclidean space ,n R the target set, ,T a closed convex non-void subset of ,n R and : ,p I P admissible controls on ,I a subset of [0, ).  R By exploiting the analyticity and non-singularity of the fundamental matrices of the associated homogeneous system ,x Ax and using the notion of asymptotic directions and other convex set properties, he established that core( )T is bounded if and only if   1 rank , , , , nT T T T T M A M A M n       for some m n constant matrix, .M He indicated that the closedness of core( )T could be achieved by using a weak compactness argument. [5]Extended Hajek’s results to a delay control system, with the major contribution being the varying of the technique for the boundedness of core( )T due to the singularity of the solution matrices and certain other properties of such matrices.This paper extends further the relationship between cores of targets and Euclidean controllability to single-delay linear neutral systems by leaveraging on the results in [1, 2, 3]. Consider the autonomous linear differential – difference control system of neutral type:                 1 0 1 ; 0 (1) , , 0 , 0 (2) x t A x t h A x t A x t h B u t t x t t t h h               where 1 0 1 , ,A A A are n n constant matrices with real entries and B is an n m constant matrix with the real entries. The initial function  is in   , 0 , n C h R equipped with sup norm. The control u is in   1 0, , n L t R . Such controls will be called admissible controls.      1 for, 0,n x t x t h t t  R . If   1 , , n x C h t  R , then for  t t 0 1, we define   , 0 , n t C hx   R by .      x s x t s s ht    , , 0 II. EXISTENCE, UNIQUENESS AND REPRESENTATION OF SOLUTIONS If A 1 0 and  is continuously differentiable on  , 0h , then there exists a unique function  : ,x h  which coincides with  on  , 0h , is continuously differentiable and satisfies (1) except possibly at the points ; 0,1, 2,...jh j  . This solution x can have no more derivatives than  and continuously differentiable if and only if the relation:        1 0 1 0 (0) 0 (3)A h A A h Bu          
  • 2. Relationship Between Cores Of Targets… www.ijmsi.org 10 | P a g e is satisfied. See Bellman and Cooke [6] and theorem 7.1 in Dauer and Gahl [7] for complete discussion on existence, uniqueness and representations of solutions of (1). 2.1 Preliminaries on the Partial Derivatives ( , ) , 0,1, k k X t k       Let  1 , 0,t t  for fixed t, let  ,X t  be the unique function satisfying the matrix differential equation:           1 0 1 , , , , subject to: ; , = 0, 0 , ; 0,1,..., (4) (5)n t h t A X t A X h t A I t t t X X t t jh j X                                By Tadmore ([8], p. 80),  ,X t  is analytic on    .1 , , 0,1,...t j h t jh j    and hence  , isX t C    on these intervals. The left and right-hand limits of  ,X t  exist at   t jh , so that  ,tX  is of bounded variation on each compact interval. Cf. Banks and Jacobs [9], Banks and Kent [10] and Hale [11]. We maintain the notation        , , , k k X t X t  as in [1]. III. THEOREM RELATING CORES OF TARGETS AND EUCLIDEAN CONTROLLABILITY FOR SYSTEM (1) Consider the control system (1) with its standing hypotheses. Let the target set H be of the form ,H L D  where { : 0}n L x M x   for some m n matrix ,M and some bounded, convex subset D of n  with 0 D . Assume that 0 ,U and that 0  H . Then core ( )H is compact if and only if the system: 1 0 1( ) ( ) ( ) ( ) ( ) (6)T T T T x t A x t h A x t A x t h M u t       is Euclidean controllable. Proof Let a be an asymptotic direction of core ( )H . Let ( , ) ( )t Y t Y t    be a solution matrix of the free part of (1) such that (0) ,n Y I the identity matrix of order .n Then by lemma 4.2 of [1], we deduce that ( )Y t a is an asymptotic direction of H for 0.t  By lemma 2.6 of [1], ( ) ,Y t a L for all 0.t  It follows from the definition of L in the hypotheses of theorem 4.4 that: ( ) 0 (7)MY t a  for each   coreO Ha   and where ( )0, O Kt   is the set of asymptotic directions of the convex set ,K as defined in [1]. Take the transpose of both sides of (7) to get ( ) 0.T T T a Y t M  By lemma 4and theorem 4.1 of [1], core ( )H is a nonvoid convex subset of n R . By lemma 2.5 of [1], core ( )H is bounded if and only if 0 is its only asymptotic direction. Claim: ( , )Y t  satisfies        1 0 1 , , , , T T T T T T Y t Y t h A Y t A Y t h A               Proof of the claim: Since ( , )t Y t  is a solution matrix of the free part of (1), it follows that        1 0 1 , , , ,Y t A Y t h A Y t AY t h t t               , from which transposition yields
  • 3. Relationship Between Cores Of Targets… www.ijmsi.org 11 | P a g e        1 0 1 (i) , , , , T T T T T T T Y t Y t h A Y t A Y t h A t t               ˆ ˆ ˆ ˆSet ( , ) ( , ). Then ( , ) ( ) and ( , ) ( ). Consequently, T T X t Y t X t X t Y t X t                ( )ˆ ˆ, ( ) ( ) T t Y t X t X t t t t t                             ( )ˆ ˆ, ( ) ( ) T h t Y t h X h t X h t t h t t h t                                   ( )ˆ ˆClearly, , ( ) ( ) T t Y t X t X t t t                          ˆ ( , ) (ii) , , . T TX t Y t Y t t                    ( )ˆ ˆ, ( ) ( ) T h t Y t h X h t X h t h t h t                                ˆ ( , ) (iii) , , . T TX h t Y t h Y t h t                 (i), (ii), and (iii) yield        1 0 1 ˆ ˆ ˆ ˆ, , , ,T T T X t X h t A X t A X h t A                      1 0 1 proving the claim, , , , .,T T T T T T T Y t Y t h A Y t A Y t h A               Let 1 0 1 ( ) ( ) ( ) ( ) ( ) T T T T x t A x t h A x t A x t h M u t        be Euclidean controllable on 1[0, ],t for some 1 0.t  By the above claim and the proof of theorem 2 of [2], this is equivalent to requiring that the relation 1 .( , ) 0, implies 0, for [max{0, }, ] T T T a Y t M t ta    Therefore the relation ( ) 0 T T T a Y t M  1 .implies 0, for [0, ]a t t  But a is an arbitrary asymptotic direction of the nonvoid convex set, core ( )H . Hence (core( )) {0}.O H   We invoke lemma 2.5 to conclude that core ( )H is bounded, since O is its only asymptotic direction. It is already established in theorem 4.1 of [1], that core ( )H is closed. Therefore core ( )H is compact. Conversely let core ( )H be compact. Then (core( )) {0},O H   by lemma 2.5. Suppose (6) is not Euclidean controllable. Then by theorem 2 of [2], there exists 0,,n c c R such that ( ) 0,T TT Y t Mc  1 [0, ].t t  Hence by transposition, ( ) 0MY t c  . Consequently, ( ) ( )Y t c L O H   . We appeal to lemma 4.2 of [1] to deduce that .(core( )), 0c O H c    . This contradicts the compactness of core , by lemma 2.5 of [1]. Hence the supposition is false. Therefore (6) is Euclidean controllable given that core ( )H is compact. This concludes the proof of the theorem. Remarks: If 1 1 0,A A  then the system (6) reduces to 0 ( ) ( ) ( )T T x t A x t M u t  , in which case the fundamental matrix ( )T Y t of 0 ( ) ( )T x t A x t is analytic, nonsingular and equals 0 T A t e . This particular case 1 1 ( 0)A A   forces 0j  in the formula for ( )k Q jh and (0),for 0.k Q s  0 But 0 (0)k k k Q A   , by lemma 2.4 of [3]. We then conclude from theorem 4.4of [1] that core ( )H is compact if and if only rank 1 0 0, , ( )T T T T n T M A M A M n     . This coincides with Hajek’s result.
  • 4. Relationship Between Cores Of Targets… www.ijmsi.org 12 | P a g e IV. ANALYSIS OF SYSTEM (1) AND AN ECONOMIC INTERPRETATION OF THEOREM IN 3. The target H could represent the prescribed and desired level of stock of capital assets. The lag h represents the lead times or periods of gestation for investment in capital stock and  P Bu u :  denotes the investment capacity of the given firm. Given  u u u u um   , , ,...,1 2 , it is clear that 1 2, , , mu u u are investment strategies. Strategies could be at positive, negative or zero levels. In other words strategies are unsigned or unrestricted in sign. Write  1 2 , , , ,m B b b b  where i b is a column n-vector and {1,2, , }.i m  Then B is a matrix of fixed stock and 1 , m i i i Bu b u    , where i i b u denotes the availability of stock ib to be invested at a level iu ; in other words, iu units of stock ib are available for investment. Thus, for a given strategy   T 1 2 , , , m u u u u  the elements 1 2 , , , m u u u represent investment coefficients of the stock 1 2 , , , m b b b respectively. Hence the definition of P as the power of investment available to the firm is justified. The values , ( )t x t denote respectively the current time and the current stock of capital assets, given an initial endowment. The values ( )x t h denotes respectively available stock of capital assets h time units time units before, while ( ) and ( )x t x t h  denote respectively the current rate of change of capital stock and the rate of change of capital stock htime- period before. 0A is the matrix of coefficients of stock currently available, 1A is the matrix of coefficients of stock available .h time units; 1A is the matrix of coefficients of investments an htime- period before. Therefore system (1) could be a dynamic model of the fluctuations of capital stock, where the current rate of change of stock depends partly on the following: [1] Currently available capital stock, [2] Capital stock available h time units before [3] Rate of change of capital stock htime units before and [4] The investment capacity of the firm. Theorem 3 says that the prescribed target, H is achievable if and only if rank  Q t nn 1  , for some t1 0 , where 1 0 1 1 1 ( ) ( ) ( ) ( ); {0,1, }, {0, , },T T T k k k k Q s A Q s h A Q s A Q s h k s h           with initial conditions. 0 (0) , ( ) 0,for min{ , } 0, andn k Q I Q s k s   1 0 1 1 1 .ˆ ( ) ( ) , ( ) , , ( ) , [0, ) {0, , } T T T nn Q t Q s M Q s M Q s M s t h      In other words, it is possible to control any initial endowment  to a prescribed level of growth of capital stock, subject to its constraints by a careful implementation of investment strategies. However, the achieved growth level can only be sustained for small (compact) levels of initial values; otherwise there is no guarantee that the growth will not be reversed. Compactness of core ( )H means that the initial capital assets need not be too big. V. CONCLUSION This paper relied on the results in [1], [2] and [3] to establish necessary and sufficient conditions for the Euclidean controllability of system (1) in terms of the compactness of cores of targets of a corresponding transposed system. The result exploited the specified structure of the target set amenable to the application of the notion of asymptotic directions and other convex set properties, as well as the special relationship between the solution matrices of the uncontrolled part of system (1) and the associated control index matrices defined in system (3). In the sequel the paper provided an analysis of system (1) and an economic interpretation of theorem
  • 5. Relationship Between Cores Of Targets… www.ijmsi.org 13 | P a g e 3.1. The ideas exposed in this paper can be tapped to extend the result and economic interpretations to associated perturbed and more general systems. REFERENCES [1] Ukwu, C. (2014n). Cores of Euclidean targets for single-delay autonomous linear neutral control systems. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, April 2014. [2] Ukwu, C. (2014r). Necessary and sufficient conditions for the Euclidean controllability of single-delay autonomous linear neutral control systems and applications. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, May 2014 [3] Ukwu, C. (2014h). The structure of determining matrices for single-delay autonomous linear neutral control systems. International Journal of Mathematics and Statistics Invention (IJMSI). Vol. 2, Issue 3, March 2014. [4] Hajek, O. (1974). Cores of targets in Linear Control systems. Math. Systems theory. Vol. 8, No.3, 203 – 206, Springer-Verlag, New York. [5] Ukwu, C. (1992). Euclidean Controllability and Cores of Euclidean Targets for Differential difference systems Master of Science Thesis in Applied Math. with O.R. (Unpublished), North Carolina State University, Raleigh, N. C. U.S.A. [6] Bellman, R. and Cooke, K.(1963). Differential-difference equations. Acad. Press, New York. [7] Dauer, J. P. and Gahl, R. D.Controllability of nonlinear delay systems. J.O.T.A. Vol. 21, No. 1, January1977. [8] Tadmore, G. (1984). Functional differential equations of retarded and neutral types: Analytical solutions and piecewise continuous controls. J. Differential equations, Vol. 51, No. 2, Pp. 151-181. [9] Banks, H. T. and Jacobs, M. (1973). An attainable sets approach to optimal control offunctional differential equations with function space terminal conditions. J. diff. equations, Vol 13, pp. 121- 149. [10] Banks, H. T. and Kent G. A.(1972). Control of functional differential equations of retarded and neutral type to targets in function space, SIAM J. Control, Vol. 10. No. 4. [11] Hale, J. K. (1977). Theory of functional differential equations. Applied Mathematical Science,Vol. 3, Springer-Verlag, New York.