首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We find several new congruences for \(\ell \)-regular partitions for \(\ell \in \{5,6,7,49\}\) and also find alternative proofs of the congruences for 10- and 20-regular partitions which were proved earlier by Carlson and Webb (Ramanujan J 33:329–337, 2014) by using the theory of modular forms. We use certain p-dissections of \((q;q)_{\infty }\), \(\psi (q)\), \((q;q)_{\infty }^3\) and \(\psi (q^2)(q;q)_{\infty }^2\).  相似文献   

2.
Computational Optimization and Applications - There has been much research about regularizing optimal portfolio selections through $$\ell _1$$ norm and/or $$\ell _2$$ -norm squared. The common...  相似文献   

3.
In this paper we study the approximation of stable linear time-invariant systems for the Paley–Wiener space \(\mathcal {PW}_{\pi }^2\), i.e., the set of bandlimited functions with finite \(L^2\)-norm, by convolution sums. It is possible to use either, the convolution sum where the time variable is in the argument of the bandlimited impulse response, or the convolution sum where the time variable is in the argument of the function, as an approximation process. In addition to the pointwise and uniform convergence behavior, the convergence behavior in the norm of the considered function space, i.e. the \(L^2\)-norm in our case, is important. While it is well-known that both convolution sums converge uniformly on the whole real axis, the \(L^2\)-norm of the second convolution sum can be divergent for certain functions and systems. We show that the there exist an infinite dimensional closed subspace of functions and an infinite dimensional closed subspace of systems, such that for any pair of function and system from these two sets, we have norm divergence.  相似文献   

4.
5.
In [1], Anderson and Badawi conjectured that \(\mathrm{rad}(I)^n \subseteq I\) for every n-absorbing ideal I of a commutative ring. In this article, we prove their conjecture. We also prove related conjectures for radical ideals.  相似文献   

6.
A singular rank one perturbation of a self-adjoint operator A in a Hilbert space is considered, where and but with the usual A–scale of Hilbert spaces. A modified version of the Aronszajn-Krein formula is given. It has the form where F denotes the regularized Borel transform of the scalar spectral measure of A associated with . Using this formula we develop a variant of the well known Aronszajn–Donoghue spectral theory for a general rank one perturbation of the class.Submitted: March 14, 2002 Revised: December 15, 2002  相似文献   

7.
Periodica Mathematica Hungarica - Let $$\mathbb N$$ be the set of positive integers, and denote by $$\begin{aligned} \lambda (A)=\inf \{t>0:\sum _{a\in A} a^{-t}<\infty \}...  相似文献   

8.
We give Fourier spectrum characterizations of functions in the Hardy \(H^p\) spaces on tubes for \(1\le p \le \infty .\) For \(F\in L^p(\mathbb {R}^n), \) we show that F is the non-tangential boundary limit of a function in a Hardy space, \(H^{p}(T_\Gamma ),\) where \(\Gamma \) is an open cone of \(\mathbb {R}^n\) and \(T_\Gamma \) is the related tube in \(\mathbb {C}^n,\) if and only if the classical or the distributional Fourier transform of F is supported in \(\Gamma ^*,\) where \(\Gamma ^*\) is the dual cone of \(\Gamma .\) This generalizes the results of Stein and Weiss for \(p=2\) in the same context, as well as those of Qian et al. in one complex variable for \(1\le p\le \infty .\) Furthermore, we extend the Poisson and Cauchy integral representation formulas to the \(H^p\) spaces on tubes for \(p\in [1, \infty ]\) and \(p\in [1,\infty ),\) with, respectively, the two types of representations.  相似文献   

9.
S. Bauer and M. Furuta defined a stable cohomotopy refinement of the Seiberg–Witten invariants. In this paper, we prove a vanishing theorem of Bauer–Furuta invariants for 4-manifolds with smooth -actions. As an application, we give a constraint on smooth -actions on homotopy K3#K3, and construct a nonsmoothable locally linear -action on K3#K3. We also construct a nonsmoothable locally linear -action on K3.   相似文献   

10.
Let Q be a tame quiver of type $\widetilde{\mathbb{A}}_n$ and Rep(Q) the category of finite dimensional representations over an algebraically closed field. A representation is simply called a module. It will be shown that a regular string module has, up to isomorphism, at most two Gabriel–Roiter submodules. The quivers Q with sink-source orientations will be characterized as those, whose central parts do not contain preinjective modules. It will also be shown that there are only finitely many (central) Gabriel–Roiter measures admitting no direct predecessors. This fact will be generalized for all tame quivers.  相似文献   

11.
We show that for every sequence \({(p_n)_{n\in\mathbb{N}}}\) with 1 ≤ p n  ≤ 2 there exists an \({\mathcal{L}_1}\) -space with the Radon-Nikodým containing an isomorphic copy of \({\ell_1(\ell_{p_n})}\) .  相似文献   

12.
In this paper, we provide a new proof for the Dedekind \(\eta \)-function identities discovered by Somos. During this process, we found two new Dedekind \(\eta \)-function identities. Furthermore, we extract interesting partition identities from some of the \(\eta \)-function identities.  相似文献   

13.
Field inversion in \(\mathbb {F}_{2^{m}}\) dominates the cost of modern software implementations of certain elliptic curve cryptographic operations, such as point encoding/hashing into elliptic curves (Brown et al. in: Submission to NIST, 2008; Brown in: IACR Cryptology ePrint Archive 2008:12, 2008; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014) Itoh–Tsujii inversion using a polynomial basis and precomputed table-based multi-squaring has been demonstrated to be highly effective for software implementations (Taverne et al. in: CHES 2011, 2011; Oliveira et al. in: J Cryptogr Eng 4(1):3–17, 2014; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014), but the performance and memory use depend critically on the choice of addition chain and multi-squaring tables, which in prior work have been determined only by suboptimal ad-hoc methods and manual selection. We thoroughly investigated the performance/memory tradeoff for table-based linear transforms used for efficient multi-squaring. Based upon the results of that investigation, we devised a comprehensive cost model for Itoh–Tsujii inversion and a corresponding optimization procedure that is empirically fast and provably finds globally-optimal solutions. We tested this method on eight binary fields commonly used for elliptic curve cryptography; our method found lower-cost solutions than the ad-hoc methods used previously, and for the first time enables a principled exploration of the time/memory tradeoff of inversion implementations.  相似文献   

14.
EL Mahi  A.  Ziane  M. 《Acta Mathematica Hungarica》2021,165(1):146-155
Acta Mathematica Hungarica - For a real biquadratic field, we denote by $$\lambda$$ , $$\mu$$ and $$\nu$$ the Iwasawa invariants of cyclotomic $$\mathbb{Z}_{2}$$ -extension of $$k$$ . We give...  相似文献   

15.
Monatshefte für Mathematik - Let $$\Omega $$ be a $$C^2$$ -smooth bounded pseudoconvex domain in $$\mathbb {C}^n$$ for $$n\ge 2$$ and let $$\varphi $$ be a holomorphic function on $$\Omega $$...  相似文献   

16.
Using Dumnicki’s approach to showing non-specialty of linear systems consisting of plane curves with prescribed multiplicities in sufficiently general points on we develop an asymptotic method to determine lower bounds for Seshadri constants of general points on . With this method we prove the lower bound for 10 general points on .   相似文献   

17.
Journal of Theoretical Probability - It is well known that, on a purely algebraic level, a simplified version of the central limit theorem (CLT) can be proved in the framework of a non-commutative...  相似文献   

18.
Ukrainian Mathematical Journal - Over an arbitrary ring, a module M is said to be $$ {\mathcal{Z}}^{\ast } $$-semilocal if every submodule U of M has a $$ {\mathcal{Z}}^{\ast } $$ -supplement V in...  相似文献   

19.
Let ζ be a primitive q′-root of unity. We prove that the series $ \sum\nolimits_{n = 1}^\infty {{{\zeta ^{ \llcorner n\theta \lrcorner } } \mathord{\left/ {\vphantom {{\zeta ^{ \llcorner n\theta \lrcorner } } n}} \right. \kern-0em} n}} $ for θQ converges if and only if θ = p/q with (p,q) = 1 and q′ ? p, and that there exists an uncountable set S of Liouville’s numbers such that the series does not converge when θS.  相似文献   

20.
Feldman  G. M. 《Doklady Mathematics》2020,102(1):296-300
Doklady Mathematics - According to the well-knows Heyde theorem the Gaussian distribution on the real line is characterized by the symmetry of the conditional distribution of one linear form of...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号