首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
For integers nr, we treat the rth largest of a sample of size n as an \(\mathbb {R}^{\infty }\)-valued stochastic process in r which we denote as M(r). We show that the sequence regarded in this way satisfies the Markov property. We go on to study the asymptotic behavior of M(r) as r, and, borrowing from classical extreme value theory, show that left-tail domain of attraction conditions on the underlying distribution of the sample guarantee weak limits for both the range of M(r) and M(r) itself, after norming and centering. In continuous time, an analogous process Y(r) based on a two-dimensional Poisson process on \(\mathbb {R}_{+}\times \mathbb {R}\) is treated similarly, but we note that the continuous time problems have a distinctive additional feature: there are always infinitely many points below the rth highest point up to time t for any t >?0. This necessitates a different approach to the asymptotics in this case.  相似文献   

2.
The problem to establish the asymptotic distribution of statistical estimators as well as the moment convergence of such estimators has been recognized as an important issue in advanced theories of statistics. This problem has been deeply studied for M-estimators for a wide range of models by many authors. The purpose of this paper is to present an alternative and apparently simple theory to derive the moment convergence of Z-estimators. In the proposed approach the cases of parameters with different rate of convergence can be treated easily and smoothly and any large deviation type inequalities necessary for the same result for M-estimators do not appear in this approach. Applications to the model of i.i.d. observation, Cox’s regression model as well as some diffusion process are discussed.  相似文献   

3.
We study extensions of N-wave systems with PT symmetry and describe the types of (nonlocal) reductions leading to integrable equations invariant under the P (spatial reflection) and T (time reversal) symmetries. We derive the corresponding constraints on the fundamental analytic solutions and the scattering data. Based on examples of three-wave and four-wave systems (related to the respective algebras sl(3,C) and so(5,C)), we discuss the properties of different types of one- and two-soliton solutions. We show that the PT-symmetric three-wave equations can have regular multisoliton solutions for some specific choices of their parameters.  相似文献   

4.
For the multi-channel bulk-arrival queue, M x /M/c, Abol'nikov and Kabak independently obtained steady state results. In this paper the results of these authors are extended, corrected and simplified. A number of measures of efficiency are calculated for three cases where the arrival group size has: (i) a constant value, (ii) a geometric distribution, or (iii) a positive Poisson distribution. The paper also shows how to calculate fractiles for both the queue length and the waiting time distribution. Examples of extensive numerical results for certain measures of efficiency are presented in tabular and chart form.  相似文献   

5.
In this paper we show that if \({S\in L(X,Y)}\) and \({R\in L(Y,X),}\) X and Y complex Banach spaces, then the products RS and SR share the Dunford property (C). We also study property (C) for R, S, RS and \({SR \in L(X)}\) in the case that R and S satisfies the operator equations RSR = R 2 and SRS = S 2.  相似文献   

6.
We consider an M X /M/c queue with catastrophes and state-dependent control at idle time. Properties of the queues which terminate when the servers become idle are first studied. Recurrence, equilibrium distribution, and equilibrium queue-size structure are studied for the case of resurrection and no catastrophes. All of these properties and the first effective catastrophe occurrence time are then investigated for the case of resurrection and catastrophes. In particular, we obtain the Laplace transform of the transition probability for the absorbing M X /M/c queue.  相似文献   

7.
The purpose of this paper is to investigate central elements in distribution algebras D i s t(G) of general linear supergroups G = G L(m|n). As an application, we compute explicitly the center of D i s t(G L(1|1)) and its image under Harish-Chandra homomorphism.  相似文献   

8.
The computations involving the noncentral-F distribution are notoriously difficult to implement properly in floating-point arithmetic: Catastrophic loss of precision, floating-point underflow and overflow, drastically increasing computation time and program hang-ups, and instability due to numerical cancellation have all been reported. It is therefore recommended that existing statistical packages are cross-checked, and the present paper proposes a numerical algorithm precisely for this purpose. To the best of our knowledge, the proposed method is the first method that can compute the noncentrality parameter of the noncentral-F distribution with guaranteed accuracy over a wide parameter range that spans the range relevant for practical applications. Although the proposed method is limited to cases where the the degree of freedom of the denominator of the F test statistic is even, it does not affect its usefulness significantly: All of those algorithmic failures and inaccuracies that we can still reproduce today could have been prevented by simply cross-checking against the proposed method. Two numerical examples are presented where the intermediate computations went wrong silently, but the final result of the computations seemed nevertheless plausible, and eventually erroneous results were published. Cross-checking against the proposed method would have caught the numerical errors in both cases. The source code of the algorithm is available on GitHub, together with self-contained command-line executables. These executables can read the data to be cross-checked from plain text files, making it easy to cross-check any statistical software in an automated fashion.  相似文献   

9.
The main result of this paper is a bi-parameter Tb theorem for Littlewood–Paley g-function, where b is a tensor product of two pseudo-accretive function. Instead of the doubling measure, we work with a product measure μ = μn × μm, where the measures μn and μm are only assumed to be upper doubling. The main techniques of the proof include a bi-parameter b-adapted Haar function decomposition and an averaging identity over good double Whitney regions. Moreover, the non-homogeneous analysis and probabilistic methods are used again.  相似文献   

10.
A normal subgroup N of a finite group G is called n-decomposable in G if N is the union of n distinct G-conjugacy classes. We study the structure of nonperfect groups in which every proper nontrivial normal subgroup is m-decomposable, m+1-decomposable, or m+2-decomposable for some positive integer m. Furthermore, we give classification for the soluble case.  相似文献   

11.
We introduce n-abelian and n-exact categories, these are analogs of abelian and exact categories from the point of view of higher homological algebra. We show that n-cluster-tilting subcategories of abelian (resp. exact) categories are n-abelian (resp. n-exact). These results allow to construct several examples of n-abelian and n-exact categories. Conversely, we prove that n-abelian categories satisfying certain mild assumptions can be realized as n-cluster-tilting subcategories of abelian categories. In analogy with a classical result of Happel, we show that the stable category of a Frobenius n-exact category has a natural \((n+2)\)-angulated structure in the sense of Geiß–Keller–Oppermann. We give several examples of n-abelian and n-exact categories which have appeared in representation theory, commutative algebra, commutative and non-commutative algebraic geometry.  相似文献   

12.
Let k, n, and r be positive integers with k < n and \({r \leq \lfloor \frac{n}{k} \rfloor}\). We determine the facets of the r-stable n, k-hypersimplex. As a result, it turns out that the r-stable n, k-hypersimplex has exactly 2n facets for every \({r < \lfloor \frac{n}{k} \rfloor}\). We then utilize the equations of the facets to study when the r-stable hypersimplex is Gorenstein. For every k > 0 we identify an infinite collection of Gorenstein r-stable hypersimplices, consequently expanding the collection of r-stable hypersimplices known to have unimodal Ehrhart \({\delta}\)-vectors.  相似文献   

13.
In this paper we consider n-poised planar node sets, as well as more special ones, called G C n sets. For the latter sets each n-fundamental polynomial is a product of n linear factors as it always holds in the univariate case. A line ? is called k-node line for a node set \(\mathcal X\) if it passes through exactly k nodes. An (n + 1)-node line is called maximal line. In 1982 M. Gasca and J. I. Maeztu conjectured that every G C n set possesses necessarily a maximal line. Till now the conjecture is confirmed to be true for n ≤ 5. It is well-known that any maximal line M of \(\mathcal X\) is used by each node in \(\mathcal X\setminus M, \)meaning that it is a factor of the fundamental polynomial. In this paper we prove, in particular, that if the Gasca-Maeztu conjecture is true then any n-node line of G C n set \(\mathcal {X}\) is used either by exactly \(\binom {n}{2}\) nodes or by exactly \(\binom {n-1}{2}\) nodes. We prove also similar statements concerning n-node or (n ? 1)-node lines in more general n-poised sets. This is a new phenomenon in n-poised and G C n sets. At the end we present a conjecture concerning any k-node line.  相似文献   

14.
Let (F k,n ) n and (L k,n )n be the k-Fibonacci and k-Lucas sequence, respectively, which satisfies the same recursive relation a n+1 = ka n + a n?1 with initial values F k,0 = 0, F k,1 = 1, L k,0 = 2 and L k,1 = k. In this paper, we characterize the p-adic orders ν p (F k,n ) and ν p (L k,n ) for all primes p and all positive integers k.  相似文献   

15.
We show that viscosity solutions to the normalized p(x)-Laplace equation coincide with distributional weak solutions to the strong p(x)-Laplace equation when p is Lipschitz and \(\inf p>1\). This yields \(\smash {C^{1,\alpha }}\) regularity for the viscosity solutions of the normalized p(x)-Laplace equation. As an additional application, we prove a Radó-type removability theorem.  相似文献   

16.
Call a sequence of k Boolean variables or their negations a k-tuple. For a set V of n Boolean variables, let T k (V) denote the set of all 2 k n k possible k-tuples on V. Randomly generate a set C of k-tuples by including every k-tuple in T k (V) independently with probability p, and let Q be a given set of q “bad” tuple assignments. An instance I = (C,Q) is called satisfiable if there exists an assignment that does not set any of the k-tuples in C to a bad tuple assignment in Q. Suppose that θ, q > 0 are fixed and ε = ε(n) > 0 be such that εlnn/lnlnn→∞. Let k ≥ (1 + θ) log2 n and let \({p_0} = \frac{{\ln 2}}{{q{n^{k - 1}}}}\). We prove that
$$\mathop {\lim }\limits_{n \to \infty } P\left[ {I is satisfiable} \right] = \left\{ {\begin{array}{*{20}c} {1,} & {p \leqslant (1 - \varepsilon )p_0 ,} \\ {0,} & {p \geqslant (1 + \varepsilon )p_0 .} \\ \end{array} } \right.$$
  相似文献   

17.
In this paper we construct the multi-dimensional p-adic approximation lattices by using simultaneous approximation problems (SAP) of p-adic numbers and we estimate the l norm of the p-adic SAP solutions theoretically by applying Dirichlet’s principle and numerically by using the LLL algorithm. By using the SAP solutions as private keys, the security of which depends on NP-hardness of SAP or the shortest vector problems (SVP) of p-adic lattices, we propose a p-adic knapsack cryptosystem with commitment schemes, in which the sender Alice prepares ciphertexts and the verification keys in her p-adic numberland.  相似文献   

18.
This paper deals with the GI x /G/c queueing system in a steady state. We refine a diffusion approximation method incorporating the constraint of traffic conservation for general queueing systems. An approximate expression for the distribution of the number of customers is obtained. Numerical results are presented to show that the refined model provides improved performance.  相似文献   

19.
This paper deals with a periodic review inventory system. Methods are discussed for determining the re-order point s of an (s, S) order policy, when a certain service level is required. The results differ from those presented for a (Q, s) model which is usually considered in literature and implemented in practice. Methods are discussed for determining the re-order point of an (s, S) policy when demand is normal or gamma distributed. A numerical investigation demonstrates the applicability of the described methods. In particular, it is shown that these methods are superior to a formula that is implemented in many inventory control systems.  相似文献   

20.
We use modular symbols to construct p-adic L-functions for cohomological cuspidal automorphic representations on GL(2n), which admit a Shalika model. Our construction differs from former ones in that it systematically makes use of the representation theory of p-adic groups.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号