SlideShare a Scribd company logo
International Journal of Mathematics and Statistics Invention (IJMSI)
E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759
www.ijmsi.org Volume 2 Issue 6 || June. 2014 || PP-09-13
www.ijmsi.org 9 | P a g e
Relationship between cores of targets and Euclidean
controllability for single-delay neutral control systems
Ukwu Chukwunenye
Department of Mathematics, University of Jos,
P.M.B 2084 Jos, Nigeria.
ABSTRACT : This article established necessary and sufficient conditions for the compactness of cores of
Euclidean targets and Euclidean controllability of single-delay linear neutral control systems.
The proofs relied on the notion of asymptotic directions and other convex set properties as well as the
independent results on cores of targets and Euclidean controllability in Ukwu [1, 2,3] respectively.
KEYWORDS: Asymptotic, Core, Controllability, Euclidean, Targets.
I. INTRODUCTION
The relationship between cores of targets and Euclidean controllability was introduced by Hajek [4],
who examined the system , ( ) , (end) ,x Ax p p t P x T    where Ais an n n coefficient matrix, ,P the
constraint set a compact convex non-void subset of the real n-dimensional Euclidean space ,n
R the target set,
,T a closed convex non-void subset of ,n
R and : ,p I P admissible controls on ,I a subset of [0, ).
 R
By exploiting the analyticity and non-singularity of the fundamental matrices of the associated homogeneous
system ,x Ax and using the notion of asymptotic directions and other convex set properties, he established
that core( )T is bounded if and only if  
1
rank , , , ,
nT T T T T
M A M A M n

 
 
 for some m n constant matrix,
.M He indicated that the closedness of core( )T could be achieved by using a weak compactness argument.
[5]Extended Hajek’s results to a delay control system, with the major contribution being the varying of the
technique for the boundedness of core( )T due to the singularity of the solution matrices and certain other
properties of such matrices.This paper extends further the relationship between cores of targets and Euclidean
controllability to single-delay linear neutral systems by leaveraging on the results in [1, 2, 3].
Consider the autonomous linear differential – difference control system of neutral type:
         
     
1 0 1
; 0 (1)
, , 0 , 0 (2)
x t A x t h A x t A x t h B u t t
x t t t h h

      
   
 
where 1 0 1
, ,A A A are n n constant matrices with real entries and B is an n m constant matrix with the
real entries. The initial function  is in   , 0 ,
n
C h R equipped with sup norm. The control u is in
  1
0, ,
n
L t
R . Such controls will be called admissible controls.      1
for, 0,n
x t x t h t t  R . If
  1
, , n
x C h t  R , then for  t t 0 1, we define   , 0 , n
t C hx   R by
.      x s x t s s ht    , , 0
II. EXISTENCE, UNIQUENESS AND REPRESENTATION OF SOLUTIONS
If A 1 0 and  is continuously differentiable on  , 0h , then there exists a unique function  : ,x h 
which coincides with  on  , 0h , is continuously differentiable and satisfies (1) except possibly at the points
; 0,1, 2,...jh j  . This solution x can have no more derivatives than  and continuously differentiable if and
only if the relation:
       1 0 1
0 (0) 0 (3)A h A A h Bu   
      
Relationship Between Cores Of Targets…
www.ijmsi.org 10 | P a g e
is satisfied. See Bellman and Cooke [6] and theorem 7.1 in Dauer and Gahl [7] for complete discussion on
existence, uniqueness and representations of solutions of (1).
2.1 Preliminaries on the Partial Derivatives
( , )
, 0,1,
k
k
X t
k






Let  1
, 0,t t  for fixed t, let  ,X t  be the unique function satisfying the matrix differential equation:
       
 
1 0 1
, , , ,
subject to:
;
, =
0,
0 , ; 0,1,...,
(4)
(5)n
t h t A X t A X h t A
I t
t
t
X X
t t jh j
X
 
   
   



 

    


    



By Tadmore ([8], p. 80),  ,X t  is analytic on    .1 , , 0,1,...t j h t jh j    and hence
 , isX t C 

 on these intervals.
The left and right-hand limits of  ,X t  exist at   t jh , so that  ,tX  is of bounded variation on
each compact interval. Cf. Banks and Jacobs [9], Banks and Kent [10] and Hale [11]. We maintain the notation
 
   
 , , ,
k k
X t X t  as in [1].
III. THEOREM RELATING CORES OF TARGETS AND EUCLIDEAN
CONTROLLABILITY FOR SYSTEM (1)
Consider the control system (1) with its standing hypotheses. Let the target set H be of the
form ,H L D  where { : 0}n
L x M x   for some m n matrix ,M and some bounded, convex
subset D of
n
 with 0 D . Assume that 0 ,U and that 0  H . Then core ( )H is compact if and only if the
system:
1 0 1( ) ( ) ( ) ( ) ( ) (6)T T T T
x t A x t h A x t A x t h M u t      
is Euclidean controllable.
Proof
Let a be an asymptotic direction of core ( )H . Let ( , ) ( )t Y t Y t    be a solution matrix of the free part
of (1) such that (0) ,n
Y I the identity matrix of order .n Then by lemma 4.2 of [1], we deduce that ( )Y t a is
an asymptotic direction of H for 0.t  By lemma 2.6 of [1],
( ) ,Y t a L for all 0.t  It follows from the definition of L in the hypotheses of theorem 4.4 that:
( ) 0 (7)MY t a 
for each   coreO Ha 
 and where ( )0, O Kt 
 is the set of asymptotic directions of the convex set ,K as
defined in [1]. Take the transpose of both sides of (7) to get ( ) 0.T T T
a Y t M  By lemma 4and theorem 4.1 of
[1], core ( )H is a nonvoid convex subset of
n
R . By lemma 2.5 of [1], core ( )H is bounded if and only if 0 is its
only asymptotic direction.
Claim: ( , )Y t  satisfies        1 0 1
, , , ,
T T T T T T
Y t Y t h A Y t A Y t h A
 
   
 

    
Proof of the claim: Since ( , )t Y t  is a solution matrix of the free part of (1), it follows that
       1 0 1
, , , ,Y t A Y t h A Y t AY t h
t t
 
   
 

     , from which transposition yields
Relationship Between Cores Of Targets…
www.ijmsi.org 11 | P a g e
       1 0 1
(i) , , , ,
T T T T T T T
Y t Y t h A Y t A Y t h A
t t
 
   
 

    
ˆ ˆ ˆ ˆSet ( , ) ( , ). Then ( , ) ( ) and ( , ) ( ). Consequently,
T T
X t Y t X t X t Y t X t         
     
( )ˆ ˆ,
( ) ( )
T t
Y t X t X t
t t t t
    
  
     

    
 
     
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
t h t t h t
    
  
     
 
       
   
     
( )ˆ ˆClearly, ,
( ) ( )
T t
Y t X t X t
t t
    
  
     

   
 
   
ˆ ( , )
(ii) , , .
T TX t
Y t Y t
t
   
 
  
   
     
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
h t h t
    
  
     
 
      
   
   
ˆ ( , )
(iii) , , .
T TX h t
Y t h Y t h
t
   
 
  

     
(i), (ii), and (iii) yield
       1 0 1
ˆ ˆ ˆ ˆ, , , ,T T T
X t X h t A X t A X h t A
 
   
 

    
       1 0 1
proving the claim, , , , .,T T T T T T T
Y t Y t h A Y t A Y t h A
 
   
 

    
Let 1 0 1
( ) ( ) ( ) ( ) ( )
T T T T
x t A x t h A x t A x t h M u t
       be Euclidean controllable on 1[0, ],t for some 1 0.t  By
the above claim and the proof of theorem 2 of [2], this is equivalent to requiring that the
relation 1
.( , ) 0, implies 0, for [max{0, }, ]
T T T
a Y t M t ta    Therefore the relation ( ) 0
T T T
a Y t M 
1
.implies 0, for [0, ]a t t  But a is an arbitrary asymptotic direction of the nonvoid convex set, core ( )H .
Hence (core( )) {0}.O H

 We invoke lemma 2.5 to conclude that core ( )H is bounded, since O is its only
asymptotic direction.
It is already established in theorem 4.1 of [1], that core ( )H is closed. Therefore core ( )H is compact.
Conversely let core ( )H be compact. Then (core( )) {0},O H

 by lemma 2.5. Suppose (6) is not Euclidean
controllable. Then by theorem 2 of [2], there exists 0,,n
c c R such that ( ) 0,T TT
Y t Mc  1
[0, ].t t 
Hence by transposition, ( ) 0MY t c  . Consequently, ( ) ( )Y t c L O H
  . We appeal to lemma 4.2 of [1] to
deduce that .(core( )), 0c O H c

  . This contradicts the compactness of core , by lemma 2.5 of [1]. Hence the
supposition is false. Therefore (6) is Euclidean controllable given that core ( )H is compact. This concludes the
proof of the theorem.
Remarks:
If 1 1 0,A A  then the system (6) reduces to 0
( ) ( ) ( )T T
x t A x t M u t  , in which case the fundamental
matrix ( )T
Y t of 0
( ) ( )T
x t A x t is analytic, nonsingular and equals 0
T
A t
e . This particular case
1 1
( 0)A A
  forces 0j  in the formula for ( )k
Q jh and (0),for 0.k
Q s  0
But 0 (0)k
k
k Q A   , by
lemma 2.4 of [3]. We then conclude from theorem 4.4of [1] that core ( )H is compact if and if only
rank
1
0 0, , ( )T T T T n T
M A M A M n
    . This coincides with Hajek’s result.
Relationship Between Cores Of Targets…
www.ijmsi.org 12 | P a g e
IV. ANALYSIS OF SYSTEM (1) AND AN ECONOMIC INTERPRETATION OF
THEOREM IN 3.
The target H could represent the prescribed and desired level of stock of capital assets. The lag h
represents the lead times or periods of gestation for investment in capital stock and  P Bu u :  denotes
the investment capacity of the given firm. Given  u u u u um 

, , ,...,1 2 , it is clear that
1 2, , , mu u u are investment strategies. Strategies could be at positive, negative or zero levels. In other words
strategies are unsigned or unrestricted in sign. Write  1 2
, , , ,m
B b b b  where i
b is a column n-vector and
{1,2, , }.i m  Then B is a matrix of fixed stock and
1
,
m
i i
i
Bu b u

  , where i i
b u denotes the availability of
stock ib to be invested at a level iu ; in other words, iu units of stock ib are available for investment. Thus,
for a given strategy  
T
1 2
, , , m
u u u u  the elements 1 2
, , , m
u u u represent investment coefficients of the
stock 1 2
, , , m
b b b respectively. Hence the definition of P as the power of investment available to the firm is
justified.
The values , ( )t x t denote respectively the current time and the current stock of capital assets, given an
initial endowment. The values ( )x t h denotes respectively available stock of capital assets h time units time
units before, while ( ) and ( )x t x t h  denote respectively the current rate of change of capital stock and the rate
of change of capital stock htime- period before. 0A is the matrix of coefficients of stock currently available,
1A is the matrix of coefficients of stock available .h time units; 1A is the matrix of coefficients of investments
an htime- period before.
Therefore system (1) could be a dynamic model of the fluctuations of capital stock, where the current rate of
change of stock depends partly on the following:
[1] Currently available capital stock,
[2] Capital stock available h time units before
[3] Rate of change of capital stock htime units before and
[4] The investment capacity of the firm.
Theorem 3 says that the prescribed target, H is achievable if and only if
rank  Q t nn 1  ,
for some t1 0 , where
1 0 1 1 1
( ) ( ) ( ) ( ); {0,1, }, {0, , },T T T
k k k k
Q s A Q s h A Q s A Q s h k s h  
       
with initial conditions.
0
(0) , ( ) 0,for min{ , } 0, andn k
Q I Q s k s  
1 0 1 1 1
.ˆ ( ) ( ) , ( ) , , ( ) , [0, ) {0, , }
T T T
nn
Q t Q s M Q s M Q s M s t h
    
In other words, it is possible to control any initial endowment  to a prescribed level of growth of capital stock,
subject to its constraints by a careful implementation of investment strategies. However, the achieved growth
level can only be sustained for small (compact) levels of initial values; otherwise there is no guarantee that the
growth will not be reversed. Compactness of core ( )H means that the initial capital assets need not be too big.
V. CONCLUSION
This paper relied on the results in [1], [2] and [3] to establish necessary and sufficient conditions for the
Euclidean controllability of system (1) in terms of the compactness of cores of targets of a corresponding
transposed system. The result exploited the specified structure of the target set amenable to the application of
the notion of asymptotic directions and other convex set properties, as well as the special relationship between
the solution matrices of the uncontrolled part of system (1) and the associated control index matrices defined in
system (3). In the sequel the paper provided an analysis of system (1) and an economic interpretation of theorem
Relationship Between Cores Of Targets…
www.ijmsi.org 13 | P a g e
3.1. The ideas exposed in this paper can be tapped to extend the result and economic interpretations to
associated perturbed and more general systems.
REFERENCES
[1] Ukwu, C. (2014n). Cores of Euclidean targets for single-delay autonomous linear neutral control systems. International Journal of
Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, April 2014.
[2] Ukwu, C. (2014r). Necessary and sufficient conditions for the Euclidean controllability of single-delay autonomous linear neutral
control systems and applications. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, May 2014
[3] Ukwu, C. (2014h). The structure of determining matrices for single-delay autonomous linear neutral control systems. International
Journal of Mathematics and Statistics Invention (IJMSI). Vol. 2, Issue 3, March 2014.
[4] Hajek, O. (1974). Cores of targets in Linear Control systems. Math. Systems theory. Vol. 8, No.3, 203 – 206, Springer-Verlag,
New York.
[5] Ukwu, C. (1992). Euclidean Controllability and Cores of Euclidean Targets for Differential difference systems Master of Science
Thesis in Applied Math. with O.R. (Unpublished), North Carolina State University, Raleigh, N. C. U.S.A.
[6] Bellman, R. and Cooke, K.(1963). Differential-difference equations. Acad. Press, New York.
[7] Dauer, J. P. and Gahl, R. D.Controllability of nonlinear delay systems. J.O.T.A. Vol. 21, No. 1, January1977.
[8] Tadmore, G. (1984). Functional differential equations of retarded and neutral types: Analytical solutions and piecewise continuous
controls. J. Differential equations, Vol. 51, No. 2, Pp. 151-181.
[9] Banks, H. T. and Jacobs, M. (1973). An attainable sets approach to optimal control offunctional differential equations with function
space terminal conditions. J. diff. equations, Vol 13, pp. 121- 149.
[10] Banks, H. T. and Kent G. A.(1972). Control of functional differential equations of retarded and neutral type to targets in function
space, SIAM J. Control, Vol. 10. No. 4.
[11] Hale, J. K. (1977). Theory of functional differential equations. Applied Mathematical Science,Vol. 3, Springer-Verlag, New York.

More Related Content

What's hot

A02402001011
A02402001011A02402001011
A02402001011
inventionjournals
 
On fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spacesOn fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spaces
Alexander Decker
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
inventionjournals
 
Comparison Theorems for SDEs
Comparison Theorems for SDEs Comparison Theorems for SDEs
Comparison Theorems for SDEs
Ilya Gikhman
 
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsOn New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
AI Publications
 
Iu3515201523
Iu3515201523Iu3515201523
Iu3515201523
IJERA Editor
 
Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...
Editor IJCATR
 
On fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral typeOn fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral type
Alexander Decker
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
BRNSS Publication Hub
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
inventionjournals
 
50120140504018
5012014050401850120140504018
50120140504018
IAEME Publication
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-means
ijsc
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
ijfls
 
C023014030
C023014030C023014030
C023014030
inventionjournals
 
C023014030
C023014030C023014030
C023014030
inventionjournals
 
Mathematics
MathematicsMathematics
Mathematics
IITIANS FOR YOUTH
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Existence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value ProblemsExistence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value Problems
ijtsrd
 
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
IOSR Journals
 

What's hot (19)

A02402001011
A02402001011A02402001011
A02402001011
 
On fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spacesOn fixed point theorems in fuzzy metric spaces
On fixed point theorems in fuzzy metric spaces
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
Comparison Theorems for SDEs
Comparison Theorems for SDEs Comparison Theorems for SDEs
Comparison Theorems for SDEs
 
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsOn New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
On New Root Finding Algorithms for Solving Nonlinear Transcendental Equations
 
Iu3515201523
Iu3515201523Iu3515201523
Iu3515201523
 
Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...Successive approximation of neutral stochastic functional differential equati...
Successive approximation of neutral stochastic functional differential equati...
 
On fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral typeOn fixed point theorems in fuzzy metric spaces in integral type
On fixed point theorems in fuzzy metric spaces in integral type
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI) International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
50120140504018
5012014050401850120140504018
50120140504018
 
An approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-meansAn approach to Fuzzy clustering of the iris petals by using Ac-means
An approach to Fuzzy clustering of the iris petals by using Ac-means
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
 
C023014030
C023014030C023014030
C023014030
 
C023014030
C023014030C023014030
C023014030
 
Mathematics
MathematicsMathematics
Mathematics
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Existence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value ProblemsExistence of Extremal Solutions of Second Order Initial Value Problems
Existence of Extremal Solutions of Second Order Initial Value Problems
 
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
On Fuzzy  - Semi Open Sets and Fuzzy  - Semi Closed Sets in Fuzzy Topologic...
 

Viewers also liked

Centre de ressources français et anglais
Centre de ressources français et anglaisCentre de ressources français et anglais
Centre de ressources français et anglaisGabriel BREZOIU
 
Memovisage
MemovisageMemovisage
Memovisageslatefr
 
French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]
FrenchLeaveVillage
 
Document
DocumentDocument
DocumentViewOn
 
Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013
Miguel Yasuyuki Hirota
 
Economie resu sylla
Economie resu syllaEconomie resu sylla
Economie resu syllaClaireISE
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
Geneva Declaration
 
Relancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaRelancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaInstitut-idec
 

Viewers also liked (8)

Centre de ressources français et anglais
Centre de ressources français et anglaisCentre de ressources français et anglais
Centre de ressources français et anglais
 
Memovisage
MemovisageMemovisage
Memovisage
 
French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]French leave.oceanhome.7.00.13[2]
French leave.oceanhome.7.00.13[2]
 
Document
DocumentDocument
Document
 
Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013Viçosa, 13 de dezembro de 2013
Viçosa, 13 de dezembro de 2013
 
Economie resu sylla
Economie resu syllaEconomie resu sylla
Economie resu sylla
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
 
Relancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisiaRelancement du programme more social champions in tunisia
Relancement du programme more social champions in tunisia
 

Similar to B02609013

C02402023032
C02402023032C02402023032
C02402023032
inventionjournals
 
Stability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problemsStability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problems
AI Publications
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
inventionjournals
 
F023064072
F023064072F023064072
F023064072
inventionjournals
 
D021018022
D021018022D021018022
D021018022
researchinventy
 
applied mathematics methods.pdf
applied mathematics methods.pdfapplied mathematics methods.pdf
applied mathematics methods.pdf
CyprianObota
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemes
inventy
 
International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2
IJEMM
 
D023031047
D023031047D023031047
D023031047
inventionjournals
 
D023031047
D023031047D023031047
D023031047
inventionjournals
 
Redundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systemsRedundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systems
Springer
 
D025030035
D025030035D025030035
D025030035
inventionjournals
 
01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf
BRNSS Publication Hub
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
Wireilla
 
Existance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential EquartionExistance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential Equartion
inventionjournals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Common fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via anCommon fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via an
Alexander Decker
 
On Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceOn Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach Space
BRNSS Publication Hub
 
An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.
IJERA Editor
 

Similar to B02609013 (20)

C02402023032
C02402023032C02402023032
C02402023032
 
Stability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problemsStability analysis for nonlinear impulsive optimal control problems
Stability analysis for nonlinear impulsive optimal control problems
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
 
F023064072
F023064072F023064072
F023064072
 
D021018022
D021018022D021018022
D021018022
 
applied mathematics methods.pdf
applied mathematics methods.pdfapplied mathematics methods.pdf
applied mathematics methods.pdf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Common Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative SchemesCommon Fixed Theorems Using Random Implicit Iterative Schemes
Common Fixed Theorems Using Random Implicit Iterative Schemes
 
International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2International journal of engineering and mathematical modelling vol2 no3_2015_2
International journal of engineering and mathematical modelling vol2 no3_2015_2
 
D023031047
D023031047D023031047
D023031047
 
D023031047
D023031047D023031047
D023031047
 
Redundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systemsRedundancy in robot manipulators and multi robot systems
Redundancy in robot manipulators and multi robot systems
 
D025030035
D025030035D025030035
D025030035
 
01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf01_AJMS_277_20_20210128_V1.pdf
01_AJMS_277_20_20210128_V1.pdf
 
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...
 
Existance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential EquartionExistance Theory for First Order Nonlinear Random Dfferential Equartion
Existance Theory for First Order Nonlinear Random Dfferential Equartion
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Common fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via anCommon fixed theorems for weakly compatible mappings via an
Common fixed theorems for weakly compatible mappings via an
 
On Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceOn Generalized Classical Fréchet Derivatives in the Real Banach Space
On Generalized Classical Fréchet Derivatives in the Real Banach Space
 
An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.An Overview of Separation Axioms by Nearly Open Sets in Topology.
An Overview of Separation Axioms by Nearly Open Sets in Topology.
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

B02609013

  • 1. International Journal of Mathematics and Statistics Invention (IJMSI) E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759 www.ijmsi.org Volume 2 Issue 6 || June. 2014 || PP-09-13 www.ijmsi.org 9 | P a g e Relationship between cores of targets and Euclidean controllability for single-delay neutral control systems Ukwu Chukwunenye Department of Mathematics, University of Jos, P.M.B 2084 Jos, Nigeria. ABSTRACT : This article established necessary and sufficient conditions for the compactness of cores of Euclidean targets and Euclidean controllability of single-delay linear neutral control systems. The proofs relied on the notion of asymptotic directions and other convex set properties as well as the independent results on cores of targets and Euclidean controllability in Ukwu [1, 2,3] respectively. KEYWORDS: Asymptotic, Core, Controllability, Euclidean, Targets. I. INTRODUCTION The relationship between cores of targets and Euclidean controllability was introduced by Hajek [4], who examined the system , ( ) , (end) ,x Ax p p t P x T    where Ais an n n coefficient matrix, ,P the constraint set a compact convex non-void subset of the real n-dimensional Euclidean space ,n R the target set, ,T a closed convex non-void subset of ,n R and : ,p I P admissible controls on ,I a subset of [0, ).  R By exploiting the analyticity and non-singularity of the fundamental matrices of the associated homogeneous system ,x Ax and using the notion of asymptotic directions and other convex set properties, he established that core( )T is bounded if and only if   1 rank , , , , nT T T T T M A M A M n       for some m n constant matrix, .M He indicated that the closedness of core( )T could be achieved by using a weak compactness argument. [5]Extended Hajek’s results to a delay control system, with the major contribution being the varying of the technique for the boundedness of core( )T due to the singularity of the solution matrices and certain other properties of such matrices.This paper extends further the relationship between cores of targets and Euclidean controllability to single-delay linear neutral systems by leaveraging on the results in [1, 2, 3]. Consider the autonomous linear differential – difference control system of neutral type:                 1 0 1 ; 0 (1) , , 0 , 0 (2) x t A x t h A x t A x t h B u t t x t t t h h               where 1 0 1 , ,A A A are n n constant matrices with real entries and B is an n m constant matrix with the real entries. The initial function  is in   , 0 , n C h R equipped with sup norm. The control u is in   1 0, , n L t R . Such controls will be called admissible controls.      1 for, 0,n x t x t h t t  R . If   1 , , n x C h t  R , then for  t t 0 1, we define   , 0 , n t C hx   R by .      x s x t s s ht    , , 0 II. EXISTENCE, UNIQUENESS AND REPRESENTATION OF SOLUTIONS If A 1 0 and  is continuously differentiable on  , 0h , then there exists a unique function  : ,x h  which coincides with  on  , 0h , is continuously differentiable and satisfies (1) except possibly at the points ; 0,1, 2,...jh j  . This solution x can have no more derivatives than  and continuously differentiable if and only if the relation:        1 0 1 0 (0) 0 (3)A h A A h Bu          
  • 2. Relationship Between Cores Of Targets… www.ijmsi.org 10 | P a g e is satisfied. See Bellman and Cooke [6] and theorem 7.1 in Dauer and Gahl [7] for complete discussion on existence, uniqueness and representations of solutions of (1). 2.1 Preliminaries on the Partial Derivatives ( , ) , 0,1, k k X t k       Let  1 , 0,t t  for fixed t, let  ,X t  be the unique function satisfying the matrix differential equation:           1 0 1 , , , , subject to: ; , = 0, 0 , ; 0,1,..., (4) (5)n t h t A X t A X h t A I t t t X X t t jh j X                                By Tadmore ([8], p. 80),  ,X t  is analytic on    .1 , , 0,1,...t j h t jh j    and hence  , isX t C    on these intervals. The left and right-hand limits of  ,X t  exist at   t jh , so that  ,tX  is of bounded variation on each compact interval. Cf. Banks and Jacobs [9], Banks and Kent [10] and Hale [11]. We maintain the notation        , , , k k X t X t  as in [1]. III. THEOREM RELATING CORES OF TARGETS AND EUCLIDEAN CONTROLLABILITY FOR SYSTEM (1) Consider the control system (1) with its standing hypotheses. Let the target set H be of the form ,H L D  where { : 0}n L x M x   for some m n matrix ,M and some bounded, convex subset D of n  with 0 D . Assume that 0 ,U and that 0  H . Then core ( )H is compact if and only if the system: 1 0 1( ) ( ) ( ) ( ) ( ) (6)T T T T x t A x t h A x t A x t h M u t       is Euclidean controllable. Proof Let a be an asymptotic direction of core ( )H . Let ( , ) ( )t Y t Y t    be a solution matrix of the free part of (1) such that (0) ,n Y I the identity matrix of order .n Then by lemma 4.2 of [1], we deduce that ( )Y t a is an asymptotic direction of H for 0.t  By lemma 2.6 of [1], ( ) ,Y t a L for all 0.t  It follows from the definition of L in the hypotheses of theorem 4.4 that: ( ) 0 (7)MY t a  for each   coreO Ha   and where ( )0, O Kt   is the set of asymptotic directions of the convex set ,K as defined in [1]. Take the transpose of both sides of (7) to get ( ) 0.T T T a Y t M  By lemma 4and theorem 4.1 of [1], core ( )H is a nonvoid convex subset of n R . By lemma 2.5 of [1], core ( )H is bounded if and only if 0 is its only asymptotic direction. Claim: ( , )Y t  satisfies        1 0 1 , , , , T T T T T T Y t Y t h A Y t A Y t h A               Proof of the claim: Since ( , )t Y t  is a solution matrix of the free part of (1), it follows that        1 0 1 , , , ,Y t A Y t h A Y t AY t h t t               , from which transposition yields
  • 3. Relationship Between Cores Of Targets… www.ijmsi.org 11 | P a g e        1 0 1 (i) , , , , T T T T T T T Y t Y t h A Y t A Y t h A t t               ˆ ˆ ˆ ˆSet ( , ) ( , ). Then ( , ) ( ) and ( , ) ( ). Consequently, T T X t Y t X t X t Y t X t                ( )ˆ ˆ, ( ) ( ) T t Y t X t X t t t t t                             ( )ˆ ˆ, ( ) ( ) T h t Y t h X h t X h t t h t t h t                                   ( )ˆ ˆClearly, , ( ) ( ) T t Y t X t X t t t                          ˆ ( , ) (ii) , , . T TX t Y t Y t t                    ( )ˆ ˆ, ( ) ( ) T h t Y t h X h t X h t h t h t                                ˆ ( , ) (iii) , , . T TX h t Y t h Y t h t                 (i), (ii), and (iii) yield        1 0 1 ˆ ˆ ˆ ˆ, , , ,T T T X t X h t A X t A X h t A                      1 0 1 proving the claim, , , , .,T T T T T T T Y t Y t h A Y t A Y t h A               Let 1 0 1 ( ) ( ) ( ) ( ) ( ) T T T T x t A x t h A x t A x t h M u t        be Euclidean controllable on 1[0, ],t for some 1 0.t  By the above claim and the proof of theorem 2 of [2], this is equivalent to requiring that the relation 1 .( , ) 0, implies 0, for [max{0, }, ] T T T a Y t M t ta    Therefore the relation ( ) 0 T T T a Y t M  1 .implies 0, for [0, ]a t t  But a is an arbitrary asymptotic direction of the nonvoid convex set, core ( )H . Hence (core( )) {0}.O H   We invoke lemma 2.5 to conclude that core ( )H is bounded, since O is its only asymptotic direction. It is already established in theorem 4.1 of [1], that core ( )H is closed. Therefore core ( )H is compact. Conversely let core ( )H be compact. Then (core( )) {0},O H   by lemma 2.5. Suppose (6) is not Euclidean controllable. Then by theorem 2 of [2], there exists 0,,n c c R such that ( ) 0,T TT Y t Mc  1 [0, ].t t  Hence by transposition, ( ) 0MY t c  . Consequently, ( ) ( )Y t c L O H   . We appeal to lemma 4.2 of [1] to deduce that .(core( )), 0c O H c    . This contradicts the compactness of core , by lemma 2.5 of [1]. Hence the supposition is false. Therefore (6) is Euclidean controllable given that core ( )H is compact. This concludes the proof of the theorem. Remarks: If 1 1 0,A A  then the system (6) reduces to 0 ( ) ( ) ( )T T x t A x t M u t  , in which case the fundamental matrix ( )T Y t of 0 ( ) ( )T x t A x t is analytic, nonsingular and equals 0 T A t e . This particular case 1 1 ( 0)A A   forces 0j  in the formula for ( )k Q jh and (0),for 0.k Q s  0 But 0 (0)k k k Q A   , by lemma 2.4 of [3]. We then conclude from theorem 4.4of [1] that core ( )H is compact if and if only rank 1 0 0, , ( )T T T T n T M A M A M n     . This coincides with Hajek’s result.
  • 4. Relationship Between Cores Of Targets… www.ijmsi.org 12 | P a g e IV. ANALYSIS OF SYSTEM (1) AND AN ECONOMIC INTERPRETATION OF THEOREM IN 3. The target H could represent the prescribed and desired level of stock of capital assets. The lag h represents the lead times or periods of gestation for investment in capital stock and  P Bu u :  denotes the investment capacity of the given firm. Given  u u u u um   , , ,...,1 2 , it is clear that 1 2, , , mu u u are investment strategies. Strategies could be at positive, negative or zero levels. In other words strategies are unsigned or unrestricted in sign. Write  1 2 , , , ,m B b b b  where i b is a column n-vector and {1,2, , }.i m  Then B is a matrix of fixed stock and 1 , m i i i Bu b u    , where i i b u denotes the availability of stock ib to be invested at a level iu ; in other words, iu units of stock ib are available for investment. Thus, for a given strategy   T 1 2 , , , m u u u u  the elements 1 2 , , , m u u u represent investment coefficients of the stock 1 2 , , , m b b b respectively. Hence the definition of P as the power of investment available to the firm is justified. The values , ( )t x t denote respectively the current time and the current stock of capital assets, given an initial endowment. The values ( )x t h denotes respectively available stock of capital assets h time units time units before, while ( ) and ( )x t x t h  denote respectively the current rate of change of capital stock and the rate of change of capital stock htime- period before. 0A is the matrix of coefficients of stock currently available, 1A is the matrix of coefficients of stock available .h time units; 1A is the matrix of coefficients of investments an htime- period before. Therefore system (1) could be a dynamic model of the fluctuations of capital stock, where the current rate of change of stock depends partly on the following: [1] Currently available capital stock, [2] Capital stock available h time units before [3] Rate of change of capital stock htime units before and [4] The investment capacity of the firm. Theorem 3 says that the prescribed target, H is achievable if and only if rank  Q t nn 1  , for some t1 0 , where 1 0 1 1 1 ( ) ( ) ( ) ( ); {0,1, }, {0, , },T T T k k k k Q s A Q s h A Q s A Q s h k s h           with initial conditions. 0 (0) , ( ) 0,for min{ , } 0, andn k Q I Q s k s   1 0 1 1 1 .ˆ ( ) ( ) , ( ) , , ( ) , [0, ) {0, , } T T T nn Q t Q s M Q s M Q s M s t h      In other words, it is possible to control any initial endowment  to a prescribed level of growth of capital stock, subject to its constraints by a careful implementation of investment strategies. However, the achieved growth level can only be sustained for small (compact) levels of initial values; otherwise there is no guarantee that the growth will not be reversed. Compactness of core ( )H means that the initial capital assets need not be too big. V. CONCLUSION This paper relied on the results in [1], [2] and [3] to establish necessary and sufficient conditions for the Euclidean controllability of system (1) in terms of the compactness of cores of targets of a corresponding transposed system. The result exploited the specified structure of the target set amenable to the application of the notion of asymptotic directions and other convex set properties, as well as the special relationship between the solution matrices of the uncontrolled part of system (1) and the associated control index matrices defined in system (3). In the sequel the paper provided an analysis of system (1) and an economic interpretation of theorem
  • 5. Relationship Between Cores Of Targets… www.ijmsi.org 13 | P a g e 3.1. The ideas exposed in this paper can be tapped to extend the result and economic interpretations to associated perturbed and more general systems. REFERENCES [1] Ukwu, C. (2014n). Cores of Euclidean targets for single-delay autonomous linear neutral control systems. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, April 2014. [2] Ukwu, C. (2014r). Necessary and sufficient conditions for the Euclidean controllability of single-delay autonomous linear neutral control systems and applications. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, May 2014 [3] Ukwu, C. (2014h). The structure of determining matrices for single-delay autonomous linear neutral control systems. International Journal of Mathematics and Statistics Invention (IJMSI). Vol. 2, Issue 3, March 2014. [4] Hajek, O. (1974). Cores of targets in Linear Control systems. Math. Systems theory. Vol. 8, No.3, 203 – 206, Springer-Verlag, New York. [5] Ukwu, C. (1992). Euclidean Controllability and Cores of Euclidean Targets for Differential difference systems Master of Science Thesis in Applied Math. with O.R. (Unpublished), North Carolina State University, Raleigh, N. C. U.S.A. [6] Bellman, R. and Cooke, K.(1963). Differential-difference equations. Acad. Press, New York. [7] Dauer, J. P. and Gahl, R. D.Controllability of nonlinear delay systems. J.O.T.A. Vol. 21, No. 1, January1977. [8] Tadmore, G. (1984). Functional differential equations of retarded and neutral types: Analytical solutions and piecewise continuous controls. J. Differential equations, Vol. 51, No. 2, Pp. 151-181. [9] Banks, H. T. and Jacobs, M. (1973). An attainable sets approach to optimal control offunctional differential equations with function space terminal conditions. J. diff. equations, Vol 13, pp. 121- 149. [10] Banks, H. T. and Kent G. A.(1972). Control of functional differential equations of retarded and neutral type to targets in function space, SIAM J. Control, Vol. 10. No. 4. [11] Hale, J. K. (1977). Theory of functional differential equations. Applied Mathematical Science,Vol. 3, Springer-Verlag, New York.