共查询到20条相似文献,搜索用时 15 毫秒
1.
Suthep Suantai 《Southeast Asian Bulletin of Mathematics》2000,24(2):297-303
In this paper, we give necessary and sufficient conditions for infinite matrices mapping from the Nakano vector-valued sequence space (X, p) into any BK-space, and by using this result, we obtain the matrix characterizations from (X, p) into the sequence spaces (Y), c0(Y, q), c(Y), s(Y), Er(Y), and Fr(Y), where p = (pk) and q = (qk) are bounded sequences of positive real numbers such that pk 1 for all k N, r 0, and s 1.AMS Subject Classification (2000): 46A45 相似文献
2.
Jan De Beule Patrick Govaerts Anja Hallez Leo Storme 《Designs, Codes and Cryptography》2009,50(2):187-201
Minihypers are substructures of projective spaces introduced to study linear codes meeting the Griesmer bound. Recently, many
results in finite geometry were obtained by applying characterization results on minihypers (De Beule et al. 16:342–349, 2008;
Govaerts and Storme 4:279–286, 2004; Govaerts et al. 28:659–672, 2002). In this paper, using characterization results on certain
minihypers, we present new results on tight sets in classical finite polar spaces and weighted m-covers, and on weighted m-ovoids of classical finite generalized quadrangles. The link with minihypers gives us characterization results of i-tight sets in terms of generators and Baer subgeometries contained in the Hermitian and symplectic polar spaces, and in terms
of generators for the quadratic polar spaces. We also present extendability results on partial weighted m-ovoids and partial weighted m-covers, having small deficiency, to weighted m-covers and weighted m-ovoids of classical finite generalized quadrangles. As a particular application, we prove in an alternative way the extendability
of 53-, 54-, and 55-caps of PG(5,3), contained in a non-singular elliptic quadric Q−(5,3), to 56-caps contained in this elliptic quadric Q−(5,3).
相似文献
3.
A normal subgroup N of a finite group G is called n-decomposable in G if N is the union of n distinct G-conjugacy classes. We study the structure of nonperfect groups in which every proper nontrivial normal subgroup is m-decomposable, m+1-decomposable, or m+2-decomposable for some positive integer m. Furthermore, we give classification for the soluble case. 相似文献
4.
The theory of overpartitions is applied to determine formulas for the number of partitions of n where (1) the mth largest part is k and (2) the mth smallest part is k. 相似文献
5.
The purpose of this paper is to investigate central elements in distribution algebras D i s t(G) of general linear supergroups G = G L(m|n). As an application, we compute explicitly the center of D i s t(G L(1|1)) and its image under Harish-Chandra homomorphism. 相似文献
6.
The Existence of LHMTS(<Emphasis Type="Italic">m</Emphasis><Superscript><Emphasis Type="Italic">v</Emphasis></Superscript>) and LHDTS(<Emphasis Type="Italic">m</Emphasis><Superscript><Emphasis Type="Italic">v</Emphasis></Superscript>) 下载免费PDF全文
In this article, we establish the existence of an LHMTS(mv) for v ≡ 2 (mod 6) and m≡ 3 (mod 6). Thus there exists an LHMTS(mv) if and only if v(v-1)m2 ≡ 0 (mod 3) except possibly for v=6, m≡ 1, 5 (mod 6) and m≠1. In the similar way, the existence of LHDTS(mv) is completely determined, i.e., there exists an LHDTS(mv) if and only if v(v-1)m2 ≡ 0 (mod 3). 相似文献
7.
We generalize Green’s lemma and Green’s theorem for usual binary semigroups to (n,m)-semigroups, define and describe the regularity for an element of an (n,m)-semigroup, give some criteria for an element of an (n,m)-semigroup to be invertible, and further apply the invertibility for (n,m)-semigroups to (n,m)-groups and give some equivalent characterizations for (n,m)-groups. We establish Hosszú-Gluskin theorems for (n,m)-semigroups in two cases, as generalizations of the corresponding theorems for n-groups. 相似文献
8.
Benjamin Bond 《Graphs and Combinatorics》2016,32(2):495-510
Let \(\mathcal {A}\subset \left( {\begin{array}{c}[n]\\ r\end{array}}\right) \) be a compressed, intersecting family and let \(X\subset [n]\). Let \(\mathcal {A}(X)=\{A\in \mathcal {A}:A\cap X\ne \emptyset \}\) and \(\mathcal {S}_{n,r}=\left( {\begin{array}{c}[n]\\ r\end{array}}\right) (\{1\})\). Motivated by the Erd?s–Ko–Rado theorem, Borg asked for which \(X\subset [2,n]\) do we have \(|\mathcal {A}(X)|\le |\mathcal {S}_{n,r}(X)|\) for all compressed, intersecting families \(\mathcal {A}\)? We call X that satisfy this property EKR. Borg classified EKR sets X such that \(|X|\ge r\). Barber classified X, with \(|X|\le r\), such that X is EKR for sufficiently large n, and asked how large n must be. We prove n is sufficiently large when n grows quadratically in r. In the case where \(\mathcal {A}\) has a maximal element, we sharpen this bound to \(n>\varphi ^{2}r\) implies \(|\mathcal {A}(X)|\le |\mathcal {S}_{n,r}(X)|\). We conclude by giving a generating function that speeds up computation of \(|\mathcal {A}(X)|\) in comparison with the naïve methods. 相似文献
9.
Let A be a compact set in of Hausdorff dimension d. For s ∈ (0,d) the Riesz s-equilibrium measure μ
s
is the unique Borel probability measure with support in A that minimizes
over all such probability measures. If A is strongly -rectifiable, then μ
s
converges in the weak-star topology to normalized d-dimensional Hausdorff measure restricted to A as s approaches d from below.
This research was supported, in part, by the U. S. National Science Foundation under grants DMS-0505756 and DMS-0808093. 相似文献
10.
(t,m,s)-Nets were defined by Niederreiter [Monatshefte fur Mathematik, Vol. 104 (1987) pp. 273–337], based on earlier work by Sobol’ [Zh. Vychisl Mat. i mat. Fiz, Vol. 7 (1967) pp. 784–802], in the context of quasi-Monte Carlo methods of numerical integration. Formulated in combinatorial/coding theoretic terms a binary linear (m−k,m,s)2-net is a family of ks vectors in F2m satisfying certain linear independence conditions (s is the length, m the dimension and k the strength: certain subsets of k vectors must be linearly independent). Helleseth et al. [5] recently constructed (2r−3,2r+2,2r−1)2-nets for every r. In this paper, we give a direct and elementary construction for (2r−3,2r+2,2r+1)2-nets based on a family of binary linear codes of minimum distance 6.Communicated by: T. Helleseth 相似文献
11.
Erik A. van Doorn 《TOP》2011,19(2):336-350
We consider the M/M/N/N+R service system, characterized by N servers, R waiting positions, Poisson arrivals and exponential service times. We discuss representations and bounds for the rate of
convergence to stationarity of the number of customers in the system, and study its behaviour as a function of R, N and the arrival rate λ, allowing λ to be a function of N. 相似文献
12.
Recently the first author presented exact formulas for the number of 2
n
-periodic binary sequences with given 1-error linear complexity, and an exact formula for the expected 1-error linear complexity
and upper and lower bounds for the expected k-error linear complexity, k ≥ 2, of a random 2
n
-periodic binary sequence. A crucial role for the analysis played the Chan–Games algorithm. We use a more sophisticated generalization
of the Chan–Games algorithm by Ding et al. to obtain exact formulas for the counting function and the expected value for the
1-error linear complexity for p
n
-periodic sequences over prime. Additionally we discuss the calculation of lower and upper bounds on the k-error linear complexity of p
n
-periodic sequences over .
相似文献
13.
We study the geometry of m-regular domains within the Caffarelli–Nirenberg–Spruck model in terms of barrier functions, envelopes, exhaustion functions, and Jensen measures. We prove among other things that every m-hyperconvex domain admits an exhaustion function that is negative, smooth, strictly m-subharmonic, and has bounded m-Hessian measure. 相似文献
14.
We consider an M/G/1 queue with the following form of customer impatience: an arriving customer balks or reneges when its virtual waiting time,
i.e., the amount of work seen upon arrival, is larger than a certain random patience time. We consider the number of customers
in the system, the maximum workload during a busy period, and the length of a busy period. We also briefly treat the analogous
model in which any customer enters the system and leaves at the end of his patience time or at the end of his virtual sojourn
time, whichever occurs first. 相似文献
15.
Mikhail V. Dolgopolov Alexander P. Zubarev 《P-Adic Numbers, Ultrametric Analysis, and Applications》2011,3(1):39-51
In this paper we consider a generalization of analysis on p-adic numbers field to the m case of m-adic numbers ring. The basic statements, theorems and formulas of p-adic analysis can be used for the case of m-adic analysis without changing. We discuss basic properties of m-adic numbers and consider some properties of m-adic integration and m-adic Fourier analysis. The class of infinitely divisible m-adic distributions and the class of m-adic stochastic Levi processes were introduced. The special class of m-adic CTRW process and fractional-time m-adic random walk as the diffusive limit of it is considered. We found the asymptotic behavior of the probability measure
of initial distribution support for fractional-time m-adic random walk. 相似文献
16.
In this work the classification of filiform Leibniz superalgebras of nilindex n + m, where n and m (m≠0) are dimensions of even and odd parts, respectively, is obtained. 相似文献
17.
JinYun Guo 《中国科学A辑(英文版)》2009,52(3):511-516
In this paper, we introduce the m-Cartan matrix and observe that some properties of the quadratic form associated to the Cartan matrix of an Euclidean diagram
can be generalized to the m-Cartan matrix of a McKay quiver. We also describe the McKay quiver for a finite abelian subgroup of a special linear group.
This work was supported by National Natural Science Foundation of China (Grant No. 10671061) and the Research Foundation for
Doctor Programme (Grant No. 200505042004) 相似文献
18.
Horst Trinker 《Designs, Codes and Cryptography》2011,60(2):101-121
The Plotkin bound and the quadratic bound for codes and (t, m, s)-nets can be obtained from the linear programming bound using certain linear and quadratic polynomials, respectively. We
extend this approach by considering cubic and higher degree polynomials to find new explicit bounds as well as new non-existence
results for codes and (t, m, s)-nets. 相似文献
19.
Yan QU 《数学学报(英文版)》2007,23(10):1903-1908
Let π be an irreducible unitary cuspidal representation of GLm(AQ) with m ≥ 2, and L(s, Tr) the L-function attached to π. Under the Generalized Riemann Hypothesis for L(s,π), we estimate the normal density of primes in short intervals for the automorphic L-function L(s, π). Our result generalizes the corresponding theorem of Selberg for the Riemann zeta-function. 相似文献
20.
For integers m > r ≥ 0, Brietzke (2008) defined the (m, r)-central coefficients of an infinite lower triangular matrix G = (d, h) = (dn,k)n,k∈N as dmn+r,(m?1)n+r, with n = 0, 1, 2,..., and the (m, r)-central coefficient triangle of G as It is known that the (m, r)-central coefficient triangles of any Riordan array are also Riordan arrays. In this paper, for a Riordan array G = (d, h) with h(0) = 0 and d(0), h′(0) ≠ 0, we obtain the generating function of its (m, r)-central coefficients and give an explicit representation for the (m, r)-central Riordan array G(m,r) in terms of the Riordan array G. Meanwhile, the algebraic structures of the (m, r)-central Riordan arrays are also investigated, such as their decompositions, their inverses, and their recessive expressions in terms of m and r. As applications, we determine the (m, r)-central Riordan arrays of the Pascal matrix and other Riordan arrays, from which numerous identities are constructed by a uniform approach.
相似文献
$${G^{\left( {m,r} \right)}} = {\left( {{d_{mn + r,\left( {m - 1} \right)n + k + r}}} \right)_{n,k \in \mathbb{N}}}.$$