首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  国内免费   1篇
  完全免费   3篇
  数学   36篇
  2015年   2篇
  2014年   4篇
  2013年   4篇
  2012年   6篇
  2011年   9篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2004年   2篇
  2003年   1篇
  1999年   1篇
排序方式: 共有36条查询结果,搜索用时 62 毫秒
1.
Cooley-Tukey FFT在高维的算法   总被引:5,自引:0,他引:5       下载免费PDF全文
A new fast algorithm is presented for multidimensional DFT in this paper. This algorithm is derived based on an interesting coding technique for multidimensional integral point, named the technique vector coding. And called the algorithm VCFFT (vector coding fast Fourier transform). Since the VC-FFT is the extension of Cooley-Tukey algorithm from one-dimensional to multidimensional, its structure of program is simple as Cooley-Tukey FFT, and significantly reduces multiplications and recursive stages.  相似文献
2.
将动态递归的可计算一般均衡方法应用于碳关税征收影响的研究,建立了测算美国征收碳关税对中国经济与环境影响的动态递归可计算一般均衡模型,并在模型中引入技术进步参数以刻画能源节约型技术进步.模型以2007年作为基年,包含37个生产部门和7个国内国外账户.应用该模型模拟了2020年起美国征收碳关税,在税率从20美元每吨碳排放到80美元每吨碳排放的13种情景下,到2030年期间对我国碳排放和经济发展的不同影响,进而测算在不同的能源节约型技术进步条件下,碳关税对我国经济与环境影响的变动.  相似文献
3.
We investigate the dynamics of a class of multi-species predator-prey interaction models with Holling type III functional responses based on systems of nonautonomous differential equations with impulsive perturbations. Sufficient conditions for existence of a positive periodic solution are investigated by using a continuation theorem in coincidence degree theory, which have been extensively applied in studying existence problems in differential equations and difference equations. In addition, sufficient criteria are established for the global stability and the globally exponential stability of the system by using the comparison principle and the Lyapunov method.  相似文献
4.
由n次幂等矩阵确定的交换幺半群   总被引:1,自引:0,他引:1  
设R是含幺结合环,n≥2为自然数.对所有的k≥1,本文给出了n次幂等矩阵集Pk^n(R)={P|P^n=P∈Mk(R)}上的一种等价关系,证明了P^n(R)=∪k=1^∞Pk^n(R)中的等价类在给定的加法运算下构成一个交换幺半群.  相似文献
5.
In Numer. Funct. Anal. Optim. 22 (2001) 641-656, we obtained an effective quantitative analysis of a theorem due to Borwein, Reich, and Shafrir on the asymptotic behavior of general Krasnoselski-Mann iterations for nonexpansive self-mappings of convex sets C in arbitrary normed spaces. We used this result to obtain a new strong uniform version of Ishikawa's theorem for bounded C. In this paper we give a qualitative improvement of our result in the unbounded case and prove the uniformity result for the bounded case under the weaker assumption that C contains a point x whose Krasnoselski-Mann iteration (xk) is bounded. We also consider more general iterations for which asymptotic regularity is known only for uniformly convex spaces (Groetsch). We give uniform effective bounds for (an extension of) Groetsch's theorem which generalize previous results by Kirk, Martinez-Yanez, and the author.  相似文献
6.
We give tight upper bounds on the number of maximal independent sets of size k (and at least k and at most k) in graphs with n vertices. As an application of the proof, we construct improved algorithms for graph colouring and computing the chromatic number of a graph.  相似文献
7.
For a site & (with enough points), we construct a topological space X(&) and a full embedding * of the category of sheaves on & into those on X (&) (i.e., a morphism of toposes :Sh (X(&)) Sh(&)). The embedding will be shown to induce a full embedding of derived categories, hence isomorphisms H*(&,A) = H*(X(&), *A) for any Abelian sheaf A on &. As a particular case, this will give for any scheme Y a topological space X (Y) and a functorial isomorphism between the étale cohomology H*(Y ét,A) and the ordinary sheaf cohomology H*(X((Y),),*A), for any sheaf A for the étale topology on Y.  相似文献
8.
Authentication codes with arbitration protect against deceptions from the transmitter and the receiver as well as that from the opponent. An authentication code with arbitration is t-fold perfect if the numbers of decoding rules and encoding rules meet the information-theoretic lower bounds. Pei (Message authentication codes (in Chinese). USCT, Hefei, 2009) pointed out that there has not yet been able to construct t-fold perfect authentication codes with arbitration for \(t > 2\) . In this paper, we define a new design, perfect strong strict restricted partially balanced t-design, and prove that the existence of perfect strong strict restricted partially balanced t-designs implies the existence of t-fold perfect authentication codes with arbitration. Further, we obtain some new infinite classes of t-fold perfect authentication codes with arbitration.  相似文献
9.
For a dependent risk model with constant interest rate, in which the claim sizes form a sequence of upper tail asymptotically independent and identically distributed random variables, and their inter-arrival times are another sequence of widely lower orthant dependent and identically distributed random variables, we will give an asymptotically equivalent formula for the finite-time ruin probability. The obtained asymptotics holds uniformly in an arbitrarily finite-time interval.  相似文献
10.
This paper studies large and moderate deviation properties of a realized volatility statistic of high frequency financial data. We establish a large deviation principle for the realized volatility when the number of high frequency observations in a fixed time interval increases to infinity. Our large deviation result can be used to evaluate tail probabilities of the realized volatility. We also derive a moderate deviation rate function for a standardized realized volatility statistic. The moderate deviation result is useful for assessing the validity of normal approximations based on the central limit theorem. In particular, it clarifies that there exists a trade-off between the accuracy of the normal approximations and the path regularity of an underlying volatility process. Our large and moderate deviation results complement the existing asymptotic theory on high frequency data. In addition, the paper contributes to the literature of large deviation theory in that the theory is extended to a high frequency data environment.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号