首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
We describe the basic notions of versal deformation theory of algebraic structures and compare it with the analytic theory. As a special case, we consider the notion of versal deformation used by Arnold. With the help of versal deformation we get a stratification of the moduli space into projective orbifolds. We compare this with Arnold’s stratification in the case of similarity of matrices. The other notion we discuss is the opposite notion of contraction.  相似文献   

3.
4.
5.
We study symplectic structures on filiform Lie algebras, which are niplotent Lie algebras with the maximal length of the descending central sequence. Let g be a symplectic filiform Lie algebra and dim g = 2k ≥ 12. Then g is isomorphic to some ℕ-filtered deformation either of m0(2k) (defined by the structure relations [e 1, e i ] = e i+1, i = 2,…, 2k − 1) or of V 2k , the quotient of the positive part of the Witt algebra W + by the ideal of elements of degree greater than 2k. We classify ℕ-filtered deformations of V n : [e i , e j ] = (ji)e i+1 + Σ l≥1 c ij l e i+j+l . For dim g = n ≥ 16, the moduli space ℳn of these deformations is the weighted projective space . For even n, the subspace of symplectic Lie algebras is determined by a single linear equation. Published in Russian in Trudy Matematicheskogo Instituta imeni V.A. Steklova, 2006, Vol. 252, pp. 194–216.  相似文献   

6.
7.
8.
9.
Annals of Global Analysis and Geometry - In this paper, we study deformations of complex structures on Lie algebras and its associated deformations of Dolbeault cohomology classes. A complete...  相似文献   

10.
LetG be a connected complex semisimple Lie group. Let Γ be a cocompact lattice inG. In this paper, we show that whenG isSL 2(C), nontrivial deformations of the canonical complex structure onX exist if and only if the first Betti number of the lattice Γ is non-zero. It may be remarked that for a wide class of arithmetic groups Γ, one can find a subgroup Γ′ of finite index in Γ, such that Γ′/[Γ′,Γ′] is finite (it is a conjecture of Thurston that this is true for all cocompact lattices inSL(2, C)). We also show thatG acts trivially on the coherent cohomology groupsH i(Γ/G, O) for anyi≥0.  相似文献   

11.
We introduce a procedure which transforms a given incidence structure into another one, provided certain conditions are met.Work performed under the auspices of GNSAGA of CNR supported by the 40% and 60% grants of MURST.  相似文献   

12.
In this paper, we consider algebras over a field of characteristic p, which are generated by adjacency algebras of Johnson schemes. If the algebra is semisimple, the structure is the same as that of the well-known Bose-Mesner algebras. We determine the structure of the algebra when it is not semisimple.  相似文献   

13.
The problem of imputing missing observations under the linear regression model is considered. It is assumed that observations are missing at random and all the observations on the auxiliary or independent variables are available. Estimates of the regression parameters based on singly and multiply imputed values are given. Jackknife as well as bootstrap estimates of the variance of the singly imputed estimator of the regression parameters are given. These estimators are shown to be consistent estimators. The asymptotic distributions of the imputed estimators are also given to obtain interval estimates of the parameters of interest. These interval estimates are then compared with the interval estimates obtained from multiple imputation. It is shown that singly imputed estimators perform at least as good as multiply imputed estimators. A new nonparametric multiply imputed estimator is proposed and shown to perform as good as a multiply imputed estimator under normality. The singly imputed estimator, however, still remains at least as good as a multiply imputed estimator.  相似文献   

14.
Firstly, the definitions of the secret sharing schemes (SSS), i.e. perfect SSS, statistical SSS and computational SSS are given in an uniform way, then some new schemes for several familiar rearrangements of access structures with respect to the above three types of SSS are constructed from the old schemes. It proves that the new schemes and the old schemes are of the same security. A method of constructing the SSS which realizes the general access structure by rearranging some basic access structures is developed. The results of this paper can be used to key managements and access controls.  相似文献   

15.
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret sharing scheme is measured by means of the complexity a and the randomness . Informally, the com- plexity a is the ratio between the maximum of information received by each participant and the minimum of information corresponding to every key. The randomness is the ratio between the amount of information distributed to the set of users U = {1, …, n} and the minimum of information corresponding to every key. In this paper, we discuss a and of any linear multi-secret sharing schemes realized by linear codes with non-threshold structures, and provide two algorithms to make a and to be the minimum, respectively. That is, they are optimal.  相似文献   

16.
17.
Suppose and are block algebras of finite groups over a complete local commutative Noetherian ring whose residue field is a field of positive characteristic. We prove that a split-endomorphism two-sided tilting complex (as introduced by Rickard) for the derived categories of bounded complexes of finitely generated modules over , resp. , preserves the versal deformation rings of bounded complexes of finitely generated modules over , resp. .

  相似文献   


18.
19.
We generalize the deformation theory of representations of profinite groups developed by Mazur and Schlessinger to complexes of modules for such groups. As an example, we determine the universal deformation ring of the compact étale hypercohomology of μp on certain affine CM elliptic curves studied by Boston and Ullom. To cite this article: F.M. Bleher, T. Chinburg, C. R. Acad. Sci. Paris, Ser. I 334 (2002) 97–100  相似文献   

20.
While there is a general consensus in the business community regarding the importance of quality service surveys in improving the company's business results, relatively little attention was devoted to the theoretical aspects of data analysis and modelling which can increase substantially the effectiveness of those surveys. Using the data from a real‐life project, we present here the developments and improvements achieved in the three stages that ultimately yield the conclusions from the survey: the analysis of the historical data, the design of the sampling method for the current survey and the development of specific indices for differentiating among the units of the financial institution. The statistical techniques fitted to historical data helped both in assessing the relative contributions of the various aspects of service, the overall perceived quality of service, as well as in providing the theoretical grounds for reducing the size of the questionnaire and thus increasing the reliability of the received replies. The sequential sampling scheme designed for this survey was particularly suitable to address the managements concerns. Finally, the classes of quality service based on the quality indices developed in the project contributed substantially to the ability of the management to rank and reward differentially the branches of the financial institution. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号