首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
《Discrete Mathematics》2001,221(1-3):333-342
Simple polygons can be made convex by a finite number of flips, or of flipturns. These results are extended to very general polygons.  相似文献   

2.
Certain classes of functions are introduced which are characterized by their best-possible approximation by splines.Translated from Matematicheskie Zametki, Vol. 8, No. 2, 137–148, August, 1970.  相似文献   

3.
We show that every bounded linear operator on a separable, infinite-dimensional Hilbert space H is the sum of two operators in the norm-closure of the set of operators on H that are chaotic in the sense of Devaney. We also observe that the density of several classes of cyclic operators, with respect to the strong operator topology, may be derived from a result by Hadwin et al. (Proc Amer. Math. Soc. 76 (1979) 250-252).  相似文献   

4.
The C*-algebra generated by the Bergman and anti-Bergman projections and by the operators of multiplication by piecewise continuous functions on the Lebesgue space L2(Π) over the upper half-plane is studied. Making use of a local principle, limit operators techniques, and the Plamenevsky results on two-dimensional singular integral operators with coefficients admitting homogeneous discontinuities we reduce the study to simpler C*-algebras associated with points and pairs We construct a symbol calculus for unital C*-algebras generated by n orthogonal projections sum of which equals the unit and by m one-dimensional orthogonal projections. Such algebras are models of local algebras at points z ∈∂Π being the discontinuity points of coefficients. A symbol calculus for the C*- algebra and a Fredholm criterion for the operators are obtained. Finally, a C*-algebra isomorphism between the quotient algebra where is the ideal of compact operators, and its analogue for the unit disk is constructed.  相似文献   

5.
6.
In this paper, a family of interpolation neural network operators are introduced. Here, ramp functions as well as sigmoidal functions generated by central B-splines are considered as activation functions. The interpolation properties of these operators are proved, together with a uniform approximation theorem with order, for continuous functions defined on bounded intervals. The relations with the theory of neural networks and with the theory of the generalized sampling operators are discussed.  相似文献   

7.
Using a ``3 by 3 matrix trick' we show that multiplication (an algebraic structure) in a *-algebra is determined by the geometry of the *-algebra of the 3 by 3 matrices with entries from , . This is an example of an algebra-geometry duality which, we claim, has applications.

  相似文献   


8.
From the pentagon onwards, the area of the regular convex polygon with n sides and unit diameter is greater for each odd number n than for the next even number n + 1. Moreover, from the heptagon onwards, the difference in areas decreases as n increases. Similar properties hold for the perimeter. A new proof of a result by K. Reinhardt follows.  相似文献   

9.
An original approach to solve 2D time harmonic diffraction problems involving locally perturbed gratings is proposed. The propagation medium is composed of a periodically stratified half-space and a homogeneous half-space containing a bounded obstacle. Using Fourier and Floquet transforms and integral representations, the diffraction problem is formulated as a coupled problem of Fredholm type with two unknowns: the trace of the diffracted field on the interface separating the two half-spaces on one hand, and the restriction of the diffracted field to a bounded domain surrounding the obstacle, on the other hand.  相似文献   

10.
We study two methods for solving a univariate Fredholm integral equation of the second kind, based on (left and right) partial approximations of the kernel K by a discrete quartic spline quasi-interpolant. The principle of each method is to approximate the kernel with respect to one variable, the other remaining free. This leads to an approximation of K by a degenerate kernel. We give error estimates for smooth functions, and we show that the method based on the left (resp. right) approximation of the kernel has an approximation order O(h 5) (resp. O(h 6)). We also compare the obtained formulae with projection methods.  相似文献   

11.
In this paper, we show that every quasiorder R induces a Nelson algebra ${{\mathbb R}{\mathbb S}}$ such that the underlying rough set lattice RS is algebraic. We note that ${{\mathbb R}{\mathbb S}}$ is a three-valued ?ukasiewicz algebra if and only if R is an equivalence. Our main result says that if ${{\mathbb A}}$ is a Nelson algebra defined on an algebraic lattice, then there exists a set U and a quasiorder R on U such that ${{\mathbb A} \cong {\mathbb R}{\mathbb S}}$ .  相似文献   

12.
虞旦盛  周平 《数学学报》2016,59(5):623-638
首先,引入一种由斜坡函数激发的神经网络算子,建立了其对连续函数逼近的正、逆定理,给出了其本质逼近阶.其次,引入这种神经网络算子的线性组合以提高逼近阶,并且研究了这种组合的同时逼近问题.最后,利用Steklov函数构造了一种新的神经网络算子,建立了其在L~p[a,b]空间逼近的正、逆定理.  相似文献   

13.
For a finite poset P = (V, ≤ ), let _s(P){\cal B}_s(P) consist of all triples (x,y,z) ∈ V 3 such that either x < y < z or z < y < x. Similarly, for every finite, simple, and undirected graph G = (V,E), let Bs(G){\cal B}_s(G) consist of all triples (x,y,z) ∈ V 3 such that y is an internal vertex on an induced path in G between x and z. The ternary relations Bs(P){\cal B}_s(P) and Bs(G){\cal B}_s(G) are well-known examples of so-called strict betweennesses. We characterize the pairs (P,G) of posets P and graphs G on the same ground set V which induce the same strict betweenness relation Bs(P)=Bs(G){\cal B}_s(P)={\cal B}_s(G).  相似文献   

14.
We present an iterative algorithm (BIN) for scaling all the rows and columns of a real symmetric matrix to unit 2-norm. We study the theoretical convergence properties and its relation to optimal conditioning. Numerical experiments show that BIN requires 2–4 matrix–vector multiplications to obtain an adequate scaling, and in many cases significantly reduces the condition number, more than other scaling algorithms. We present generalizations to complex, nonsymmetric and rectangular matrices.  相似文献   

15.
In connection with an unsolved problem of Bang (1951) we give a lower bound for the sum of the base volumes of cylinders covering a d-dimensional convex body in terms of the relevant basic measures of the given convex body. As an application we establish lower bounds on the number of k-dimensional flats (i.e. translates of k-dimensional linear subspaces) needed to cover all the integer points of a given convex body in d-dimensional Euclidean space for 1≤kd−1. K. Bezdek and A.E. Litvak are partially supported by a Natural Sciences and Engineering Research Council of Canada Discovery Grant.  相似文献   

16.
Gert Tamberg 《PAMM》2008,8(1):10937-10940
In this paper we consider some generalized Shannon sampling operators, which are defined by band–limited kernels. In particular, we use dilated an averaged versions of some previously known kernels. We give also some examples of using sampling operators in imaging applications. (© 2008 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   

17.
18.
Scoring by usage     
This paper aims to discover whether the predictive accuracy of a new applicant scoring model for a credit card can be improved by estimating separate scoring models for applicants who are predicted to have high or low usage of the card. Two models are estimated. First we estimate a model to explain the desired usage of a card, and second we estimate separately two further scoring models, one for those applicants whose usage is predicted to be high, and one for those for whom it is predicted to be low. The desired usage model is a two-stage Heckman model to take into account the fact that the observed usage of accepted applicants is constrained by their credit limit. Thus a model of the determinants of the credit limit, and one of usage, are both estimated using Heckman's ML estimator. We find a large number of variables to be correlated with desired usage. We also find that the two stage scoring methodology gives only very marginal improvements over a single stage scoring model, that we are able to predict a greater percentage of bad payers for low users than for high users and a greater percentage of good payers for high users than for low users.  相似文献   

19.
20.
Dorit Bar-On aims to account for the distinctive security of avowals by appealing to expression. She officially commits herself only to a negative characterization of expression, contending that expressive behavior is not epistemically based in self-judgments. I argue that her account of avowals, if it relies exclusively on this negative account of expression, can't achieve the explanatory depth she claims for it. Bar-On does explore the possibility that expression is a kind of perception-enabling showing. If she endorsed this positive account, her argument would re-gain an explanatory advantage over its rivals. But extending this account to linguistic expressive behavior would bring Bar-On very close to constitutive accounts of first-person authority.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号