首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In the last decade the subordinated processes have become popular and have found many practical applications. Therefore in this paper we examine two processes related to time-changed (subordinated) classical Brownian motion with drift (called arithmetic Brownian motion). The first one, so called normal tempered stable, is related to the tempered stable subordinator, while the second one–to the inverse tempered stable process. We compare the main properties (such as probability density functions, Laplace transforms, ensemble averaged mean squared displacements) of such two subordinated processes and propose the parameters’ estimation procedures. Moreover we calibrate the analyzed systems to real data related to indoor air quality.  相似文献   

2.
3.
We revisit the expansion recently proposed by Pulvirenti and Tsagkarogiannis for a system of N continuous particles in the Canonical Ensemble. Under the sole assumption that the particles interact via a tempered and stable pair potential and are subjected to the usual free boundary conditions, we show the analyticity of the Helmholtz free energy at low densities and, using the Penrose tree graph identity, we establish a lower bound for the convergence radius which happens to be identical to the lower bound of the convergence radius of the virial series in the Grand Canonical ensemble established by Lebowitz and Penrose in 1964. We also show that the free energy can be written as a series in powers of the density whose k-th order coefficient coincides, modulo terms o(N)/N, with the k-th order virial coefficient divided by k+1, according to its expression in terms of the m-th order (with mk+1) simply connected cluster integrals first given by Mayer in 1942. We finally give an upper bound for the k-th order virial coefficient which slightly improves, at high temperatures, the bound obtained by Lebowitz and Penrose.  相似文献   

4.
5.
We discuss the conditions under which an anomaly occurs in conductance and localization length of Anderson model on a lattice. Using the ladder Hamiltonian and analytical calculation of average conductance we find the set of resonance conditions which complements the π-coupling rule for anomalies. We identify those anomalies that might vanish due to the symmetry of the lattice or the distribution of the disorder. In terms of the dispersion relation it is known from strictly one-dimensional model that the lowest order (i.e., the most strong) anomalies satisfy the equation E(k)=E(3k). We show that the anomalies of the generalized model studied here are also the solutions of the same equation with modified dispersion relation.  相似文献   

6.
7.
Estimating the number n of unseen species from a k-sample displaying only pk distinct sampled species has received attention for long. It requires a model of species abundance together with a sampling model. We start with a discrete model of iid stochastic species abundances, each with Gibbs-Poisson distribution. A k-sample drawn from the n-species abundances vector is the one obtained while conditioning it on summing to k. We discuss the sampling formulae (species occupancy distributions, frequency of frequencies) in this context. We then develop some aspects of the estimation of n problem from the size k of the sample and the observed value of P n,k , the number of distinct sampled species. It is shown that it always makes sense to study these occupancy problems from a Gibbs-Poisson abundance model in the context of a population with infinitely many species. From this extension, a parameter γ naturally appears, which is a measure of richness or diversity of species. We rederive the sampling formulae for a population with infinitely many species, together with the distribution of the number P k of distinct sampled species. We investigate the estimation of γ problem from the sample size k and the observed value of P k . We then exhibit a large special class of Gibbs-Poisson distributions having the property that sampling from a discrete abundance model may equivalently be viewed as a sampling problem from a random partition of unity, now in the continuum. When n is finite, this partition may be built upon normalizing n infinitely divisible iid positive random variables by its partial sum. It is shown that the sampling process in the continuum should generically be biased on the total length appearing in the latter normalization. A construction with size-biased sampling from the ranked normalized jumps of a subordinator is also supplied, would the problem under study present infinitely many species. We illustrate our point of view with many examples, some of which being new ones.  相似文献   

8.
H. Moraal 《Physica A》1975,79(1):75-82
It is shown, that the configurational partition function for a classical system of molecules interacting with nonspherical pair potential is proportionals to the configurational partition function for a system of particles interacting with temperature-dependent spherical k-body potentials (k ?2). Therefore, the thermodynamic limit for nonspherical molecules exists if the effective k-body interaction is stable and tempered. A number of criteria for the nonspherical potential are developed which ensure these properties. In case the nonsphericity is small in a certain sense, stability and temperedness of the angle-averaged nonspherical potential are sufficient to ensure thermodynamic behaviour.  相似文献   

9.
H. Hooyberghs  J.O. Indekeu 《Physica A》2010,389(15):2920-2929
Recent studies introduced biased (degree-dependent) edge percolation as a model for failures in real-life systems. In this work, such process is applied to networks consisting of two types of nodes with edges running only between nodes of unlike type. Such bipartite graphs appear in many social networks, for instance in affiliation networks and in sexual-contact networks in which both types of nodes show the scale-free characteristic for the degree distribution. During the depreciation process, an edge between nodes with degrees k and q is retained with a probability proportional to (kq)α, where α is positive so that links between hubs are more prone to failure. The removal process is studied analytically by introducing a generating functions theory. We deduce exact self-consistent equations describing the system at a macroscopic level and discuss the percolation transition. Critical exponents are obtained by exploiting the Fortuin-Kasteleyn construction which provides a link between our model and a limit of the Potts model.  相似文献   

10.
The magnetization curves of randomly oriented nanoparticles with combined symmetry of magnetic anisotropy were studied. The composite mode of the Stoner–Wolfarth model has been used. In terms of this model each nanoparticle is characterized by random cubic crystalline magnetic anisotropy and by random uniaxial magnetic anisotropy. The series of simulated magnetization curves have been obtained. Each curve corresponds to different contributions of cubic and uniaxial magnetic anisotropy energy to the full energy of an individual nanoparticle ku. Within this series we discuss the values of remnant magnetization, coercive force, both initial and maximal susceptibilities as the function of ku. It is found that the magnetic properties are not monotonous functions of ku. We discuss the possibility of comparing the calculated magnetization curves with the experimental curves in order to obtain new information on the magnetic constant.  相似文献   

11.
张红  李国华  罗懋康 《中国物理 B》2012,21(6):60201-060201
This paper derives the fractional backward Kolmogorov equations in fractal space-time based on the construction of a model for dynamic trajectories. It shows that for the type of fractional backward Kolmogorov equation in the fractal time whose coefficient functions are independent of time, its solution is equal to the transfer probability density function of the subordinated process X(Sα(t)), the subordinator Sα(t) is termed as the inverse-time α-stable subordinator and the process X(τ) satisfies the corresponding time homogeneous Ito stochastic differential equation.  相似文献   

12.
We discuss a rotation number α(λ) for second order finite difference operators. Ifk(λ) denotes the integrated density of states, thenk(λ)=2α(λ). For almost periodic operators,k(λ) is proved to lie in the frequency-module whenever λ is outside the spectrum; this yields a labelling of the gaps of the spectrum.  相似文献   

13.
We analyze data on the transverse momentum distribution of dimuons produced by 22 GeV and 16 GeV π? incident on a Cu target. We evaluate the quantum chromodynamic lowest order perturbation contributions and also introduce an intrinsic transverse momentum kT on the partons relative to their parent hadrons. The analysis of our data leads to 〈kT〉=0.30?0.35 GeV. We discuss our result in comparison with analyses of data at higher energies.  相似文献   

14.
R. Sartor 《Nuclear Physics A》1977,289(2):329-345
We critically discuss the choice of the auxiliary potential U which is introduced in the low density expansion of the mass operator M(k, w). This choice is related to the analytical properties of M(k, w) in the complex w-plane and we take due account of momentum conservation in the intermediate states appearing in the diagrams associated with M(k, w). We also provide a computation of the one-hole line, rearrangement and renormalization contributions to the optical potential, of the hole state spectral function and of the momentum distribution in nuclear matter. We use a real auxiliary potential which is self-consistent up to the order considered here, i.e. which takes into account the rearrangement and the renormalization corrections. Rearrangement is treated rigorously. The dependence of the obtained results on the choice of the nucleon-nucleon interaction, namely the Hamman-Ho Kim one in our calculation, is discussed.  相似文献   

15.
A general multi-secret visual cryptography scheme   总被引:1,自引:0,他引:1  
In a (k, n) visual cryptography scheme (VCS), a secret image is encoded into n shadow images that are distributed to n participants. Any k participants can reveal the secret image by stacking their shadow images, and less than k participants have no information about the secret image. In this paper we consider the case when the secret image is more than one, and this is a so-called multi-secret VCS (MVCS). The previous works on MVCS are all the simple 2-out-of-2 cases. In this paper, we discuss a general (k, n)-MVCS for any k and n. This paper has three main contributions: (1) our scheme is the first general (k, n)-MVCS, which can be applied on any k and n, (2) we give the formal security and contrast conditions of (k, n)-MVCS and (3) we theoretically prove that the proposed (k, n)-MVCS satisfies the security and contrast conditions.  相似文献   

16.
Jian-Wei Wang  Li-Li Rong 《Physica A》2009,388(8):1731-1737
Most previous existing works on cascading failures only focused on attacks on nodes rather than on edges. In this paper, we discuss the response of scale-free networks subject to two different attacks on edges during cascading propagation, i.e., edge removal by either the descending or ascending order of the loads. Adopting a cascading model with a breakdown probability p of an overload edge and the initial load (kikj)α of an edge ij, where ki and kj are the degrees of the nodes connected by the edge ij and α is a tunable parameter, we investigate the effects of two attacks for the robustness of Barabási-Albert (BA) scale-free networks against cascading failures. In the case of α<1, our investigation by the numerical simulations leads to a counterintuitive finding that BA scale-free networks are more sensitive to attacks on the edges with the lowest loads than the ones with the highest loads, not relating to the breakdown probability. In addition, the same effect of two attacks in the case of α=1 may be useful in furthering studies on the control and defense of cascading failures in many real-life networks. We then confirm by the theoretical analysis these results observed in simulations.  相似文献   

17.
Lian Tang 《Physica A》2010,389(10):2147-2154
We propose and analyze a random graph model which explains a phenomena in the economic company network in which company may not expand its business at some time due to the limiting of money and capacity. The random graph process is defined as follows: at any time-step t, (i) with probability α(k) and independently of other time-step, each vertex is inactive which means it cannot be connected by more edges, where k is the degree of vi at the time-step t; (ii) a new vertex vt is added along with m edges incident with vt at one time and its neighbors are chosen in the manner of preferential attachment. We prove that the degree distribution P(k) of this random graph process satisfies if α(⋅) is a constant α0; and P(k)∝C2k−3 if α(?)0 as ?, where C1,C2 are two positive constants. The analytical result is found to be in good agreement with that obtained by numerical simulations. Furthermore, we get the degree distributions in this model with m-varying functions by simulation.  相似文献   

18.
We study string models on a group manifold with Kac-Moody symmetry where the critical dimensiond is integer. In particular the possibility of fourdimensional models is investigated. We find that only nine group manifolds with a relevant level can have four as the critical dimension among an infinite number of compact Lee groups. They re all listed. The models with minimal conformal sectors adding to the Kac-Moody sector are investigated. In the cases with one minimal conformal sector, there are only two groups,SU (5) andSO (43), that can gived=4. Among the cases with some tensoring products of minimal conformal sectors we discuss a few special cases withk=0 andk=1. The cases based onN=1 super Kac-Moody algebra are also studied. Finally we discuss the possibility of the enlargement of gauge symmetry.  相似文献   

19.
Attack vulnerability of scale-free networks due to cascading failures   总被引:2,自引:0,他引:2  
In this paper, adopting the initial load of a node i to be with ki being the degree of the node i, we propose a cascading model based on a load local redistribution rule and examine cascading failures on the typical network, i.e., the BA network with the scale-free property. We find that the BA scale-free network reaches the strongest robustness level in the case of α=1 and the robustness of the network has a positive correlation with the average degree 〈k〉, where the robustness is quantified by a transition from normal state to collapse. In addition, we further discuss the effects of two different attacks for the robustness against cascading failures on our cascading model and find an interesting result, i.e., the effects of two different attacks, strongly depending to the value α. These results may be very helpful for real-life networks to avoid cascading-failure-induced disasters.  相似文献   

20.
We study three-dimensional conformal field theories described by U(N) Chern?CSimons theory at level k coupled to massless fermions in the fundamental representation. By solving a Schwinger?CDyson equation in light-cone gauge, we compute the exact planar free energy of the theory at finite temperature on ?2 as a function of the ??t?Hooft coupling ??=N/k. Employing a dimensional reduction regularization scheme, we find that the free energy vanishes at |??|=1; the conformal theory does not exist for |??|>1. We analyze the operator spectrum via the anomalous conservation relation for higher spin currents, and in particular show that the higher spin currents do not develop anomalous dimensions at leading order in 1/N. We present an integral equation whose solution in principle determines all correlators of these currents at leading order in 1/N and present explicit perturbative results for all three-point functions up to two loops. We also discuss a light-cone Hamiltonian formulation of this theory where a W ?? algebra arises. The maximally supersymmetric version of our theory is ABJ model with one gauge group taken to be U(1), demonstrating that a pure higher spin gauge theory arises as a limit of string theory.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号