首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
《Journal of Algebra》2002,247(2):577-615
For coherent families of crystals of affine Lie algebras of type B(1)n, D(1)n, A(2)2n, and D(2)n + 1 we describe the combinatorial R matrix using column insertion algorithms for B, C, D Young tableaux. This is a continuation of previous work by the authors (2000, in “Physical Combinatorics” (M. Kashiwara and T. Miwa, Eds.), Birkhäuser, Boston).  相似文献   

2.
Let n  1 be a fixed integer and let R be an (n + 1)!-torsion free 1-ring with identity element e. If F, d:R  R are two additive mappings satisfying F(xn+1) = F(x)(x1)n + xd(x)(x1)n−1 + x2d(x)(x1)n−2+  +xnd(x) for all x  R, then d is a Jordan 1-derivation and F is a generalized Jordan 1-derivation on R.  相似文献   

3.
In this paper, we study the nonlinear dispersive K(m, n) equations: ut + (um)x  (un)xxx = 0 which exhibit solutions with solitary patterns. New exact solitary solutions are found. The two special cases, K(2, 2) and K(3, 3), are chosen to illustrate the concrete features of the decomposition method in K(m, n) equations. The nonlinear equations K(m, n) are studied for two different cases, namely when m = n being odd and even integers. General formulas for the solutions of K(m, n) equations are established.  相似文献   

4.
The largest finite subgroup of O(4) is the non-crystallographic Coxeter group W(H4) of order 14,400. Its derived subgroup is the largest finite subgroup W(H4)/Z2 of SO(4) of order 7200. Moreover, up to conjugacy, it has five non-normal maximal subgroups of orders 144, two 240, 400 and 576. Two groups [W(H2) × W(H2)]  Z4 and W(H3) × Z2 possess non-crystallographic structures with orders 400 and 240 respectively. The groups of orders 144, 240 and 576 are the extensions of the Weyl groups of the root systems of SU(3) × SU(3), SU(5) and SO(8) respectively. We represent the maximal subgroups of W(H4) with sets of quaternion pairs acting on the quaternionic root systems.  相似文献   

5.
We show that the simple matroid PG(n  1, q)\PG(k  1, q), for n  4 and 1  k  n  2, is characterized by a variety of numerical and polynomial invariants. In particular, any matroid that has the same Tutte polynomial as PG(n  1, q)\PG(k  1, q) is isomorphic to PG(n  1, q)\PG(k  1, q).  相似文献   

6.
The nonlinear dispersive K(m, n) equations, ut−(um)x−(un)xxx = 0 which exhibit compactons: solitons with compact support, are studied. New exact solitary solutions with compact support are found. The two special cases, K(2, 2) and K(3, 3), are chosen to illustrate the concrete features of the decomposition method in K(m, n) equations. General formulas for the solutions of K(m, n) equations are established.  相似文献   

7.
We will give an overview on how to embed the Standard Model (SM), based on SU(3) × SU(2) × U(1), within larger groups. We will review the different chains one follows when spontaneously breaking SO(10) down to the SM. Finally, We shall discuss the question of non-universal gaugino masses in supersymmetric SO(10) theories.  相似文献   

8.
Consider the Lie group SO0(n, 1) with the left-invariant metric coming from the Killing-Cartan form. The maximal compact subgroup SO(n) of the isometry group acts from the left and right. This paper studies the geometry of the quotient space of the homogeneous submersion SO0(n, 1) → SO(n)\SO0(n, 1). It is a cohomogeneity one manifold, which can be expressed as a warped product. Its group of isometries, geodesics, and sectional curvatures are calculated.  相似文献   

9.
《Journal of Complexity》1998,14(2):257-299
First we study asymptotically fast algorithms for rectangular matrix multiplication. We begin with new algorithms for multiplication of ann×nmatrix by ann×n2matrix in arithmetic timeO(nω),ω=3.333953…, which is less by 0.041 than the previous record 3.375477…. Then we present fast multiplication algorithms for matrix pairs of arbitrary dimensions, estimate the asymptotic running time as a function of the dimensions, and optimize the exponents of the complexity estimates. For a large class of input matrix pairs, we improve the known exponents. Finally we show three applications of our results:   (a) we decrease from 2.851 to 2.837 the known exponent of the work bounds for fast deterministic (NC) parallel evaluation of the determinant, the characteristic polynomial, and the inverse of ann×nmatrix, as well as for the solution to a nonsingular linear system ofnequations,   (b) we asymptotically accelerate the known sequential algorithms for the univariate polynomial composition mod xn, yielding the complexity boundO(n1.667) versus the old record ofO(n1.688), and for the univariate polynomial factorization over a finite field, and   (c) we improve slightly the known complexity estimates for computing basic solutions to the linear programming problem withmconstraints andnvariables.  相似文献   

10.
In this paper the statistical properties of nucleotides in human chromosomes 21 and 22 are investigated. The n-tuple Zipf analysis with n = 3, 4, 5, 6, and 7 is used in our investigation. It is found that the most common n-tuples are those which consist only of adenine (A) and thymine (T), and the rarest n-tuples are those in which GC or CG pattern appears twice. With the n-tuples become more and more frequent, the double GC or CG pattern becomes a single GC or CG pattern. The percentage of four nucleotides in the rarest ten and the most common ten n-tuples are also considered in human chromosomes 21 and 22, and different behaviors are found in the percentage of four nucleotides. Frequency of appearance of n-tuple f(r) as a function of rank r is also examined. We find the n-tuple Zipf plot shows a power-law behavior for r < 4n−1 and a rapid decrease for r > 4n−1. In order to explore the interior statistical properties of human chromosomes 21 and 22 in detail, we divide the chromosome sequence into some moving windows and we discuss the percentage of ξη (ξ, η = A, C, G, T) pair in those moving windows. In some particular regions, there are some obvious changes in the percentage of ξη pair, and there maybe exist functional differences. The normalized number of repeats N0(l) can be described by a power law: N0(l)  lμ. The distance distributions P0(S) between two nucleotides in human chromosomes 21 and 22 are also discussed. A two-order polynomial fit exists in those distance distributions: log P0(S) = a + bS + cS2, and it is quite different from the random sequence.  相似文献   

11.
The support of an [n, k] linear code C over a finite field Fq is the set of all coordinate positions such that at least one codeword has a nonzero entry in each of these coordinate position. The rth generalized Hamming weight dr(C), 1  r  k, of C is defined as the minimum of the cardinalities of the supports of all [n, r] subcodes of C. The sequence (d1(C), d2(C),  , dk(C)) is called the Hamming weight hierarchy (HWH) of C. The HWH, dr(C) = n  k + r;  r = 1, 2 , …, k, characterizes maximum distance separable (MDS) codes. Therefore the matrix characterization of MDS codes is also the characterization of codes with the HWH dr(C) = n  k + r; r = 1, 2,  , k. A linear code C with systematic check matrix [IP], where I is the (n  k) × (n  k) identity matrix and P is a (n  k) × k matrix, is MDS iff every square submatrix of P is nonsingular. In this paper we extend this characterization to linear codes with arbitrary HWH. Using this result, we characterize Near-MDS codes, Near-Near-MDS (N2-MDS) codes and Aμ-MDS codes. The MDS-rank of C is the smallest integer η such that dη+1 = n  k + η + 1 and the defect vector of C with MDS-rank η is defined as the ordered set {μ1(C), μ2(C), μ3(C),  , μη(C), μη+1(C)}, where μi(C) = n  k + i  di(C). We call C a dually defective code if the defect vector of the code and its dual are the same. We also discuss matrix characterization of dually defective codes. Further, the codes meeting the generalized Greismer bound are characterized in terms of their generator matrix. The HWH of dually defective codes meeting the generalized Greismer bound are also reported.  相似文献   

12.
Let q be a pattern and let Sn, q(c) be the number of n-permutations having exactly c copies of q. We investigate when the sequence (Sn, q(c))c  0 has internal zeros. If q is a monotone pattern it turns out that, except for q = 12 or 21, the nontrivial sequences (those where n is at least the length of q) always have internal zeros. For the pattern q = 1(l + 1)l…2 there are infinitely many sequences which contain internal zeros and when l = 2 there are also infinitely many which do not. In the latter case, the only possible places for internal zeros are the next-to-last or the second-to-last positions. Note that by symmetry this completely determines the existence of internal zeros for all patterns of length at most 3.  相似文献   

13.
14.
In this paper, to understand the role of nonlinear dispersion in the coupled systems, the nonlinear dispersion Drinfel’d–Sokolov system (called D(m, n) system) is investigated. As a consequence, many types of compacton and solitary pattern solutions are obtained. Moreover, some solitary wave solutions are also deduced for differential parameters m, n. When n = 1, the D(m, 1) system with linear dispersion is shown to possess also compacton and solitary pattern solutions, which contain the known results. Moreover, some rational solutions of D(m, n) system are also deduced.  相似文献   

15.
《Journal of Algebra》2002,247(2):509-540
Let Fm be a free group of a finite rank m  2 and let Xi, Yj be elements in Fm. A non-empty word w(x1,…,xn) is called a C-test word in n letters for Fm if, whenever (X1,…,Xn) = w(Y1,…,Yn)  1, the two n-typles (X1,…,Xn) and (Y1,…,Yn) are conjugate in Fm. In this paper we construct, for each n  2, a C-test word vn(x1,…,xn) with the additional property that vn(X1,…,Xn) = 1 if and only if the subgroup of Fm generated by X1,…,Xn is cyclic. Making use of such words vm(x1,…,xm) and vm + 1(x1,…,xm + 1), we provide a positive solution to the following problem raised by Shpilrain: There exist two elements u1, u2  Fm such that every endomorphism ψ of Fm with non-cyclic image is completely determined by ψ(u1), ψ(u2).  相似文献   

16.
Let Xn denote the state of a device after n repairs. We assume that the time between two repairs is the time τ taken by a Wiener process {W(t), t ? 0}, starting from w0 and with drift μ < 0, to reach c  [0, w0). After the nth repair, the process takes on either the value Xn?1 + 1 or Xn?1 + 2. The probability that Xn = Xn?1 + j, for j = 1, 2, depends on whether τ ? t0 (a fixed constant) or τ > t0. The device is considered to be worn out when Xn ? k, where k  {1, 2, …}. This model is based on the ones proposed by Rishel (1991) [1] and Tseng and Peng (2007) [2]. We obtain an explicit expression for the mean lifetime of the device. Numerical methods are used to illustrate the analytical findings.  相似文献   

17.
We have studied the time reversal symmetry violation on the bases of the configuration mixing model and E-infinity theory. With the use of the Cabibbo angle approximation, we have presented the transformation matrix in terms of the golden ratio (?), and shown that the time reversal symmetry violation is described by the configuration mixing of the unstable and stable manifolds (Wu, Ws). The magnitude of the mixing for the weak interaction field is given by the expression sin2 θT(theor)  sin4 θC(theor)  (?)12 = 3.105 × 10?3, which is compared to the Kaon decay experiment ~2.3 × 10?3. We have also discussed the space–time symmetry violation by using the CPT theorem.  相似文献   

18.
19.
In this work we consider a simple system of piecewise linear discontinuous 1D map with two discontinuity points: X = aX if ∣X < z, X = bX if ∣X > z, where a and b can take any real value, and may have several applications. We show that its dynamic behaviors are those of a linear rotation: either periodic or quasiperiodic, and always structurally unstable. A generalization to piecewise monotone functions X = F(X) if ∣X < z, X = G(X) if ∣X > z is also given, proving the conditions leading to a homeomorphism of the circle.  相似文献   

20.
《Journal of Complexity》1999,15(1):17-29
Consider an arithmetic expression of lengthninvolving only the operations {+, ×} and non-negative constants. We prove lower bounds on the depth of any binary computation tree over the same sets of operations and constants that computes such an expression. We exhibit a family of arithmetic expressions that requires computation trees of depth at least 1.5 log2 nO(1), thus proving a conjecture of S. R. Kosaraju (1986,in“Proc. of the 18th ACM Symp. on Theory Computing,” pp. 231–239). In contrast, Kosaraju showed how to compute such expressions with computation trees of depth 2 log2 n+O(1).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号