首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
We study the functional codes Ch(X) defined by Lachaud in [G. Lachaud, Number of points of plane sections and linear codes defined on algebraic varieties, in: Arithmetic, Geometry, and Coding Theory, Luminy, France, 1993, de Gruyter, Berlin, 1996, pp. 77–104] where XPN is an algebraic projective variety of degree d and dimension m. When X is a Hermitian surface in PG(3,q), Sørensen in [A.B. Sørensen, Rational points on hypersurfaces, Reed–Muller codes and algebraic-geometric codes, PhD thesis, Aarhus, Denmark, 1991], has conjectured for ht (where q=t2) the following result:#XZ(f)(Fq)h(t3+t2t)+t+1 which should give the exact value of the minimum distance of the functional code Ch(X). In this paper we resolve the conjecture of Sørensen in the case of quadrics (i.e. h=2), we show the geometrical structure of the minimum weight codewords and their number; we also estimate the second weight and the geometrical structure of the codewords reaching this second weight.  相似文献   

3.
Suppose that (Xt)t0 is a one-dimensional Brownian motion with negative drift ?μ. It is possible to make sense of conditioning this process to be in the state 0 at an independent exponential random time and if we kill the conditioned process at the exponential time the resulting process is Markov. If we let the rate parameter of the random time go to 0, then the limit of the killed Markov process evolves like X conditioned to hit 0, after which time it behaves as X killed at the last time X visits 0. Equivalently, the limit process has the dynamics of the killed “bang–bang” Brownian motion that evolves like Brownian motion with positive drift +μ when it is negative, like Brownian motion with negative drift ?μ when it is positive, and is killed according to the local time spent at 0.An extension of this result holds in great generality for a Borel right process conditioned to be in some state a at an exponential random time, at which time it is killed. Our proofs involve understanding the Campbell measures associated with local times, the use of excursion theory, and the development of a suitable analogue of the “bang–bang” construction for a general Markov process.As examples, we consider the special case when the transient Borel right process is a one-dimensional diffusion. Characterizing the limiting conditioned and killed process via its infinitesimal generator leads to an investigation of the h-transforms of transient one-dimensional diffusion processes that goes beyond what is known and is of independent interest.  相似文献   

4.
5.
《Discrete Mathematics》2024,347(1):113658
Bent partitions are partitions of an elementary abelian group, which have similarities to partitions from spreads. In fact, a spread partition is a special case of a bent partition. In particular, bent partitions give rise to a large number of (vectorial) bent functions. Examples of bent partitions, which generalize the Desarguesian spread, have been presented by Anbar, Meidl and Pirsic, 2021, 2022. Bent partitions, which generalize some other classes of (pre)semifield spreads, have been presented by Anbar, Kalaycı, Meidl 2023. In this article, it is shown that these bent partitions induce (pk+1)-class amorphic associations schemes on Fpm×Fpm, where k is a divisor of m with special properties. This implies a construction of amorphic association schemes from some classes of (pre)semifields.  相似文献   

6.
In this paper, we formulate the compact determinant representation of the formula of nth-order breather solution for the Kundu–Eckhaus (KE) equation. Then, we obtain the formula of the nth-order degenerate breather solution (breather-positon, b-positon for short) for the KE equation by using the Taylor expansion with respect to degenerate eigenvalues λ2k1λ1(k=1,2,,n+1). B-positon, which is a special kind of breather solution, is recently recognized as a key role being responsible for generating rogue wave. According to the related formula, the exact expression of first-order b-positon is constructed. Furthermore, the dynamics of the first-, second- and third-order b-positons of the KE equation are discussed in detail, and the approximate trajectories and space-dependent ‘phase shift’ of the collision of b-positons are depicted by explicit expressions, respectively, which may be used to predict where rogue wave occurs.  相似文献   

7.
Two equivariant problems of the form εΔu=Fu are considered, where F is a real function which is invariant under the action of a group G, and, using Morse theory, for each problem an arbitrarily great number of orbits of solutions is founded, choosing ε suitably small.The first problem is a O2-equivariant system of two equations, which can be seen as a complex Ginzburg-Landau equation, while the second one is a system of m equations which is equivariant for the action of a finite group of real orthogonal matrices m×m.  相似文献   

8.
In this paper, we are concerned with the Cauchy problem of the generalized Camassa–Holm equation. Using a Galerkin-type approximation scheme, it is shown that this equation is well-posed in Sobolev spaces Hs, s>3/2 for both the periodic and the nonperiodic case in the sense of Hadamard. That is, the data-to-solution map is continuous. Furthermore, it is proved that this dependence is sharp by showing that the solution map is not uniformly continuous. The nonuniform dependence is proved using the method of approximate solutions and well-posedness estimates. Moreover, it is shown that the solution map for the generalized Camassa–Holm equation is Hölder continuous in Hr-topology. Finally, with analytic initial data, we show that its solutions are analytic in both variables, globally in space and locally in time.  相似文献   

9.
We consider the Griffith fracture model in two spatial dimensions, and prove existence of strong minimizers, with closed jump set and continuously differentiable deformation fields. One key ingredient, which is the object of the present paper, is a generalization to the vectorial situation of the decay estimate by De Giorgi, Carriero, and Leaci. This is based on replacing the coarea formula by a method to approximate SBDp functions with small jump set by Sobolev functions, and is restricted to two dimensions. The other two ingredients will appear in companion papers and consist respectively in regularity results for vectorial elliptic problems of the elasticity type and in a method to approximate in energy GSBDp functions by SBVp ones.  相似文献   

10.
《Discrete Mathematics》2019,342(1):233-249
A Weyl arrangement is the hyperplane arrangement defined by a root system. Saito proved that every Weyl arrangement is free. The Weyl subarrangements of type A are represented by simple graphs. Stanley gave a characterization of freeness for this type of arrangements in terms of their graph. In addition, the Weyl subarrangements of type B can be represented by signed graphs. A characterization of freeness for them is not known. However, characterizations of freeness for a few restricted classes are known. For instance, Edelman and Reiner characterized the freeness of the arrangements between type A1 and type B. In this paper, we give a characterization of the freeness and supersolvability of the Weyl subarrangements of type B under certain assumption.  相似文献   

11.
Given two coprime polynomials P and Q in Z[x,y] of degree bounded by d and bitsize bounded by τ, we address the problem of solving the system {P,Q}. We are interested in certified numerical approximations or, more precisely, isolating boxes of the solutions. We are also interested in computing, as intermediate symbolic objects, rational parameterizations of the solutions, and in particular Rational Univariate Representations (RURs), which can easily turn many queries on the system into queries on univariate polynomials. Such representations require the computation of a separating form for the system, that is a linear combination of the variables that takes different values when evaluated at the distinct solutions of the system.We present new algorithms for computing linear separating forms, RUR decompositions and isolating boxes of the solutions. We show that these three algorithms have worst-case bit complexity O˜B(d6+d5τ), where O˜ refers to the complexity where polylogarithmic factors are omitted and OB refers to the bit complexity. We also present probabilistic Las Vegas variants of our two first algorithms, which have expected bit complexity O˜B(d5+d4τ). A key ingredient of our proofs of complexity is an amortized analysis of the triangular decomposition algorithm via subresultants, which is of independent interest.  相似文献   

12.
13.
14.
A permutation of the multiset {1,1,2,2,,n,n} is called a Stirling permutation of order n if every entry between the two occurrences of i is greater than i for each i{1,2,,n}. In this paper, we introduce the definitions of block, even indexed entry, odd indexed entry, Stirling derangement, marked permutation and bicolored increasing binary tree. We first study the joint distribution of ascent plateaux, even indexed entries and left-to-right minima over the set of Stirling permutations of order n. We then present an involution on Stirling derangements.  相似文献   

15.
We conjecture that the set of all Hilbert functions of (artinian) level algebras enjoys a very natural form of regularity, which we call the Interval Conjecture (IC): If, for some positive integer α, (1,h1,,hi,,he) and (1,h1,,hi+α,,he) are both level h-vectors, then (1,h1,,hi+β,,he) is also level for each integer β=0,1,,α. In the Gorenstein case, i.e. when he=1, we also supply the Gorenstein Interval Conjecture (GIC), which naturally generalizes the IC, and basically states that the same property simultaneously holds for any two symmetric entries, say hi and he?i, of a Gorenstein h-vector.These conjectures are inspired by the research performed in this area over the last few years. A series of recent results seems to indicate that it will be nearly impossible to characterize explicitly the sets of all Gorenstein or of all level Hilbert functions. Therefore, our conjectures would at least provide the existence of a very strong — and natural — form of order in the structure of such important and complicated sets.We are still far from proving the conjectures at this point. However, we will already solve a few interesting cases, especially when it comes to the IC, in this paper. Among them, that of Gorenstein h-vectors of socle degree 4, that of level h-vectors of socle degree 2, and that of non-unimodal level h-vectors of socle degree 3 and any given codimension.  相似文献   

16.
17.
This paper focuses on realistic hybrid SIR models that take into account stochasticity. The proposed systems are applicable to most incidence rates that are used in the literature including the bilinear incidence rate, the Beddington–DeAngelis incidence rate, and a Holling type II functional response. Given that many diseases can lead to asymptomatic infections, this paper looks at a system of stochastic differential equations that also includes a class of hidden state individuals, for which the infection status is unknown. Assuming that the direct observation of the percentage of hidden state individuals being infected, α(t), is not given and only a noise-corrupted observation process is available. Using nonlinear filtering techniques in conjunction with an invasion type analysis, this paper shows that the long-term behavior of the disease is governed by a threshold λR that depends on the model parameters. It turns out that if λ<0 the number I(t) of infected individuals converges to zero exponentially fast (extinction). However, if λ>0, the infection is endemic and the system is persistent. We showcase our theorems by applying them in some illuminating examples.  相似文献   

18.
19.
The paper considers a process Zt=(Xt,Yt) where Xt is the position of a particle and Yt its velocity, driven by a hypoelliptic bi-dimensional stochastic differential equation. Under adequate conditions, the process is stationary and geometrically β-mixing. In this context, we propose an adaptive non-parametric kernel estimator of the stationary density p of Z, based on n discrete time observations with time step δ. Two observation schemes are considered: in the first one, Z is the observed process, in the second one, only X is measured. Estimators are proposed in both settings and upper risk bounds of the mean integrated squared error (MISE) are proved and discussed in each case, the second one being more difficult than the first one. We propose a data driven bandwidth selection procedure based on the Goldenshluger and Lespki (2011) method. In both cases of complete and partial observations, we can prove a bound on the MISE asserting the adaptivity of the estimator. In practice, we take advantage of a very recent improvement of the Goldenshluger and Lespki (2011) method provided by Lacour et al. (2016), which is computationally efficient and easy to calibrate. We obtain convincing simulation results in both observation contexts.  相似文献   

20.
It is known that each positive definite quasi-Cartan matrix A is Z-equivalent to a Cartan matrix AΔ called Dynkin type of A, the matrix AΔ is uniquely determined up to conjugation by permutation matrices. However, in most of the cases, it is not possible to determine the Dynkin type of a given connected quasi-Cartan matrix by simple inspection. In this paper, we give a graph theoretical characterization of non-symmetric connected quasi-Cartan matrices. For this purpose, a special assemblage of blocks is introduced. This result complements the approach proposed by Barot (1999, 2001), for An, Dn and Em with m=6,7,8.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号