首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
2.
《Discrete Mathematics》1982,40(2-3):277-284
This cycle of papers is based on the concept of generalized Bolean functions introduced by the author in the first article of the series. Every generalized Boolean function f:BnB can be written in a manner similar to the canonical disjunctive form using some function defined on A×B, where A is a finite subset of B containing 0 and 1. The set of those functions f is denoted by GBFn[A]. In this paper the following questions are presented: (1) What is the relationship between GBFn[A1] and GBFn[A2] when A1A2. (2) What can be said about GBFn[A1A2] and GBFn[A1A2] in comparison with GBFn[A1]∩GBFn[A2] and GBFn[A1]GBFn[A2], respectively.  相似文献   

3.
We obtain an explicit expression for the Sobolev-type orthogonal polynomials {Qn} associated with the inner product
, where p(x) = (1 − x)(1 + x)β is the Jacobi weight function, ,β> − 1, A1,B1,A2,B20 and p, q P, the linear space of polynomials with real coefficients. The hypergeometric representation (6F5) and the second-order linear differential equation that such polynomials satisfy are also obtained. The asymptotic behaviour of such polynomials in [−1, 1] is studied. Furthermore, we obtain some estimates for the largest zero of Qn(x). Such a zero is located outside the interval [−1, 1]. We deduce his dependence of the masses. Finally, the WKB analysis for the distribution of zeros is presented.  相似文献   

4.
5.
A derivation for the kernel of the irreducible representation T(λ) of the general linear group GLn(C) is given. This is then applied to the problem of determining necessary and sufficient conditions under which T(λ)(A) = T(λ)(B), where A and B are linear transformations, not necessarily invertible. Finally, conditions are obtained under which normality of T(λ)(A) implies normality of A.  相似文献   

6.
Let A = A0A1 be a commutative graded ring such that (i) A0 = k a field, (ii) A = k[A1] and (iii) dimk A1 < ∞. It is well known that the formal power series ∑n = 0 (dimkAnn is of the form (h0 + h1λ + + hsλs)/(1 − λ)dimA with each hiε . We are interested in the sequence (h0, h1,…,hs), called the h-vector of A, when A is a Cohen–Macaulay integral domain. In this paper, after summarizing fundamental results (Section 1), we study h-vectors of certain Gorenstein domains (Section 2) and find some examples of h-vectors arising from integrally closed level domains (Sections 3 and 4).  相似文献   

7.
We study the number of solutions N(B,F) of the diophantine equation n_1n_2 = n_3 n_4,where 1 ≤ n_1 ≤ B,1 ≤ n_3 ≤ B,n_2,n_4 ∈ F and F[1,B] is a factor closed set.We study more particularly the case when F={m = p_1~(ε1)···p_k~(εk),ε_j∈{0,1},1 ≤ j ≤ k},p_1,...,p_k being distinct prime numbers.  相似文献   

8.
A holey Schröder design of type h1n1h2n2hknk (HSD(h1n1h2n2hknk)) is equivalent to a frame idempotent Schröder quasigroup (FISQ(h1n1h2n2hknk)) of order n with ni missing subquasigroups (holes) of order hi, (1 i k), which are disjoint and spanning, that is, Σ1 i k nihi = n. In this paper, it is shown that an HSD(hn) exists if and only if h2n(n − 1) 0 (mod 4) with expceptions (h, n) ε {{(1,5),(1,9),(2,4)}} and the possible exception of (h, n) = (6,4).  相似文献   

9.
Let a(n)be the Fourier coefficients of a holomorphic cusp form of weightκ=2n≥12 for the full modular group and A(x)=∑_(n≤x)a(n).In this paper,we establish an asymptotic formula of the fourth power moment of A(x)and prove that ∫T1A~4(x)dx=3/(64κπ~4)s_4;2()T~(2κ)+O(T~(2κ-δ_4+ε))with δ_4=1/8,which improves the previous result.  相似文献   

10.
The usual construction of (v,q+1,1)−BIBD's from vector spaces over GF(q) is generalized to the class of near vector spaces over GF(q). It is shown that every (v,q+1,1)−BIBD can be constructed from a near vector space over GF(q). Some corollaries are: Given a (v1,q+1,1)−BIBD P1,B1 and a (v2,q+1,1)−BIBD P2,B2, there is a ((q−1)v1v2+v1+v2,q+1,1)−BIBD P3,B3 containing P1,B1 and P2,B2 as disjoint subdesigns. If there is a (v,q+1,1)−BIBD then there is a ((q−1)v+1,q,1)−BIBD. Every finite partial (v,q,1)−BIBD can be embedded in a finite (v′,q+1,1)−BIBD.  相似文献   

11.
The solvability conditions of the following two linear matrix equations (i)A1X1B1+A2X2B2+A3X3B3=C,(ii) A1XB1=C1A2XB2=C2 are established using ranks and generalized inverses of matrices. In addition, the duality of the three types of matrix equations

(iii) A1X1B1+A2X2B2+A3X3B3+A4X4B4=C, (iv) A1XB1=C1A2XB2=C2A3XB3=C3A4XB4=C4, (v) AXB+CXD=E are also considered.  相似文献   

12.
We give criterions for a flat portion to exist on the boundary of the numerical range of a matrix. A special type of Teoplitz matrices with flat portions on the boundary of its numerical range are constructed. We show that there exist 2 × 2 nilpotent matrices A1,A2, an n  × n nilpotent Toeplitz matrix Nn, and an n  × n cyclic permutation matrix Sn(s) such that the numbers of flat portions on the boundaries of W(A1Nn) and W(A2Sn(s)) are, respectively, 2(n - 2) and 2n.  相似文献   

13.
Let $A \subset {{\Bbb Z}_N}$, and ${f_A}(s) = \left\{ {\begin{array}{*{20}{l}}{1 - \frac{{|A|}}{N},}&{{\rm{for}}\;s \in A,}\\{ - \frac{{|A|}}{N},}&{{\rm{for}}\;s \notin A.}\end{array}} \right.$ We define the pseudorandom measure of order k of the subset A as follows, Pk(A, N) = $\begin{array}{*{20}{c}}{\max }\\D\end{array}$|$\mathop \Sigma \limits_{n \in {\mathbb{Z}_N}}$fA(n + c1)fA(n + c2) … fA(n + ck)|, where the maximum is taken over all D = (c1, c2, . . . , ck) ∈ ${\mathbb{Z}^k}$ with 0 ≤ c1 < c2 < … < ckN - 1. The subset A ⊂ ${{\mathbb{Z}_N}}$ is considered as a pseudorandom subset of degree k if Pk(A, N) is “small” in terms of N. We establish a link between the Gowers norm and our pseudorandom measure, and show that “good” pseudorandom subsets must have “small” Gowers norm. We give an example to suggest that subsets with “small” Gowers norm may have large pseudorandom measure. Finally, we prove that the pseudorandom subset of degree L(k) contains an arithmetic progression of length k, where L(k) = 2·lcm(2, 4, . . . , 2|$\frac{k}{2}$|), for k ≥ 4, and lcm(a1, a2, . . . , al) denotes the least common multiple of a1, a2, . . . , al.  相似文献   

14.
Xiaoyun Lu 《Discrete Mathematics》1992,110(1-3):197-203
There is a so called generalized tic-tac-toe game playing on a finite set X with winning sets A1, A2,…, Am. Two players, F and S, take in turn a previous untaken vertex of X, with F going first. The one who takes all the vertices of some winning set first wins the game. Erd s and Selfridge proved that if |A1|=|A2|==|Am|=n and m<2n−1, then the game is a draw. This result is best possible in the sense that once m=2n−1, then there is a family A1, A2,…, Am so that F can win. In this paper we characterize all those sets A1,…, A2n−1 so that F can win in exactly n moves. We also get similar result in the biased games.  相似文献   

15.
Let Mn be the algebra of all n × n complex matrices. For 1 k n, the kth numerical range of A Mn is defined by Wk(A) = (1/k)jk=1xj*Axj : x1, …, xk is an orthonormal set in n]. It is known that tr A/n = Wn(A) Wn−1(A) W1(A). We study the condition on A under which Wm(A) = Wk(A) for some given 1 m < k n. It turns out that this study is closely related to a conjecture of Kippenhahn on Hermitian pencils. A new class of counterexamples to the conjecture is constructed, based on the theory of the numerical range.  相似文献   

16.
In this note, we characterize those pairs of nonzero r-by-d complex matrices that satisfy N2(AB) = N2(A)N2(B), in which N2(·) is the spectral norm and · is the Hadamard product.  相似文献   

17.
Let X be a Banach space over F(= R or C) with dimension greater than 2. Let N(X) be the set of all nilpotent operators and B_0(X) the set spanned by N(X). We give a structure result to the additive maps on FI + B_0(X) that preserve rank-1 perturbation of scalars in both directions. Based on it, a characterization of surjective additive maps on FI + B_0(X) that preserve nilpotent perturbation of scalars in both directions are obtained. Such a map Φ has the form either Φ(T) = cAT A~(-1)+ φ(T)I for all T ∈ FI + B_0(X) or Φ(T) = cAT*A~(-1)+ φ(T)I for all T ∈ FI + B_0(X), where c is a nonzero scalar,A is a τ-linear bijective transformation for some automorphism τ of F and φ is an additive functional.In addition, if dim X = ∞, then A is in fact a linear or conjugate linear invertible bounded operator.  相似文献   

18.
研究相同工件在两台机器(分别称为机器M1M2)上的混合流水作业问题,每个给定工件有两个任务,分别称之为任务A和任务B,任务B只能在任务A完工后才能开始加工,每个工件有两种加工模式供选择:模式1是将两个任务都安排在机器M2上加工;模式2是将任务A和B分别安排在机器M1M2上加工.假设在加工工件时,机器具有学习效应,即工件的实际加工时间与工件的加工位置有关.目标函数是最小化最大完工时间.分别讨论了具有无缓冲区与无限缓冲区两种加工环境情况,两种情况下都得到了最优算法.  相似文献   

19.
《Discrete Mathematics》2004,280(1-3):133-148
An infinite family of cubic edge- but not vertex-transitive graphs is constructed. The graphs are obtained as regular -covers of K3,3 where n=p1e1p2e2pkek where pi are distinct primes congruent to 1 modulo 3, and ei1. Moreover, it is proved that the Gray graph (of order 54) is the smallest cubic edge- but not vertex-transitive graph.  相似文献   

20.
A q × n array with entries from 0, 1,…,q − 1 is said to form a difference matrix if the vector difference (modulo q) of each pair of columns consists of a permutation of [0, 1,… q − 1]; this definition is inverted from the more standard one to be found, e.g., in Colbourn and de Launey (1996). The following idea generalizes this notion: Given an appropriate δ (-[−1, 1]t, a λq × n array will be said to form a (t, q, λ, Δ) sign-balanced matrix if for each choice C1, C2,…, Ct of t columns and for each choice = (1,…,t) Δ of signs, the linear combination ∑j=1t jCj contains (mod q) each entry of [0, 1,…, q − 1] exactly λ times. We consider the following extremal problem in this paper: How large does the number k = k(n, t, q, λ, δ) of rows have to be so that for each choice of t columns and for each choice (1, …, t) of signs in δ, the linear combination ∑j=1t jCj contains each entry of [0, 1,…, q t- 1] at least λ times? We use probabilistic methods, in particular the Lovász local lemma and the Stein-Chen method of Poisson approximation to obtain general (logarithmic) upper bounds on the numbers k(n, t, q, λ, δ), and to provide Poisson approximations for the probability distribution of the number W of deficient sets of t columns, given a random array. It is proved, in addition, that arithmetic modulo q yields the smallest array - in a sense to be described.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号