共查询到20条相似文献,搜索用时 873 毫秒
1.
We give a combinatorial proof of the skew version of the K-saturation theorem. More precisely, for any positive integer k, we give an explicit injection from the set of skew semistandard Young tableaux with skew shape kλ/kμ and type kν, to the set of skew semistandard Young tableaux of shape λ/μ and type ν. 相似文献
2.
A semicomplete multipartite or semicomplete c-partite digraph D is a biorientation of a c-partite graph. A semicomplete multipartite digraph D is called strongly quasi-Hamiltonian-connected, if for any two distinct vertices x and y of D, there is a path P from x to y such that P contains at least one vertex from each partite set of D. 相似文献
3.
We study second and fourth order semilinear elliptic equations with a power-type nonlinearity depending on a power p and a parameter λ>0. For both equations we consider Dirichlet boundary conditions in the unit ball B⊂Rn. Regularity of solutions strictly depends on the power p and the parameter λ. We are particularly interested in the radial solutions of these two problems and many of our proofs are based on an ordinary differential equation approach. 相似文献
4.
M. Gürdal 《Expositiones Mathematicae》2009,27(2):153-160
In the present paper we consider the Volterra integration operator V on the Wiener algebra W(D) of analytic functions on the unit disc D of the complex plane C. A complex number λ is called an extended eigenvalue of V if there exists a nonzero operator A satisfying the equation AV=λVA. We prove that the set of all extended eigenvalues of V is precisely the set C?{0}, and describe in terms of Duhamel operators and composition operators the set of corresponding extended eigenvectors of V. The similar result for some weighted shift operator on ?p spaces is also obtained. 相似文献
5.
We consider the finite capacity M/M/1−K queue with a time dependent arrival rate λ(t). Assuming that the capacity K is large and that the arrival rate varies slowly with time (as t/K), we construct asymptotic approximations to the probability of finding n customers in the system at time t, as well as the mean number. We consider various time ranges, where the system is nearly empty, nearly full, or is filled to a fraction of its capacity. Extensive numerical studies are used to back up the asymptotic analysis. 相似文献
6.
In image restoration, the so-called edge-preserving regularization method is used to solve an optimization problem whose objective function has a data fidelity term and a regularization term, the two terms are balanced by a parameter λ. In some aspect, the value of λ determines the quality of images. In this paper, we establish a new model to estimate the parameter and propose an algorithm to solve the problem. In order to improve the quality of images, in our algorithm, an image is divided into some blocks. On each block, a corresponding value of λ has to be determined. Numerical experiments are reported which show efficiency of our method. 相似文献
7.
Let G be a group. Any G-module M has an algebraic structure called a G-family of Alexander quandles. Given a 2-cocycle of a cohomology associated with this G-family, topological invariants of (handlebody) knots in the 3-sphere are defined. We develop a simple algorithm to algebraically construct n-cocycles of this G-family from G-invariant group n-cocycles of the abelian group M. We present many examples of 2-cocycles of these G-families using facts from (modular) invariant theory. 相似文献
8.
In this paper, we establish an oscillation estimate of nonnegative harmonic functions for a pure-jump subordinate Brownian motion. The infinitesimal generator of such subordinate Brownian motion is an integro-differential operator. As an application, we give a probabilistic proof of the following form of relative Fatou theorem for such subordinate Brownian motion X in a bounded κ-fat open set; if u is a positive harmonic function with respect to X in a bounded κ-fat open set D and h is a positive harmonic function in D vanishing on Dc, then the non-tangential limit of u/h exists almost everywhere with respect to the Martin-representing measure of h. 相似文献
9.
We extend some known results on radicals and prime ideals from polynomial rings and Laurent polynomial rings to Z-graded rings, i.e, rings graded by the additive group of integers. The main of them concerns the Brown–McCoy radical G and the radical S, which for a given ring A is defined as the intersection of prime ideals I of A such that A/I is a ring with a large center. The studies are related to some open problems on the radicals G and S of polynomial rings and situated in the context of Koethe’s problem. 相似文献
10.
A tournament of order n is usually considered as an orientation of the complete graph Kn. In this note, we consider a more general definition of a tournament that we call aC-tournament, where C is the adjacency matrix of a multigraph G, and a C-tournament is an orientation of G. The score vector of a C-tournament is the vector of outdegrees of its vertices. In 1965 Hakimi obtained necessary and sufficient conditions for the existence of a C-tournament with a prescribed score vector R and gave an algorithm to construct such a C-tournament which required, however, some backtracking. We give a simpler and more transparent proof of Hakimi’s theorem, and then provide a direct construction of such a C-tournament which works even for weighted graphs. 相似文献
11.
We show that, for any compact Alexandrov surface S (without boundary) and any point y in S, there exists a point x in S for which y is a critical point. Moreover, we prove that uniqueness characterizes the surfaces homeomorphic to the sphere among smooth orientable surfaces. 相似文献
12.
The sensitivity set of a Boolean function at a particular input is the set of input positions where changing that one bit changes the output. Analogously we define the sensitivity set of a Boolean formula in a conjunctive normal form at a particular truth assignment, it is the set of positions where changing that one bit of the truth assignment changes the evaluation of at least one of the conjunct in the formula. We consider Boolean formulas in a generalized conjunctive normal form. Given a set ? of Boolean functions, an ?-constraint is an application of a function from ? to a tuple of literals built upon distinct variables, an ?-formula is then a conjunction of ?-constraints. In this framework, given a truth assignment I and a set of positions S, we are able to enumerate all ?-formulas that are satisfied by I and that have S as the sensitivity set at I. We prove that this number depends on the cardinality of S only, and can be expressed according to the sensitivity of the Boolean functions in ?. 相似文献
13.
Let R be a commutative ring with identity. We will say that an R-module M satisfies the weak Nakayama property, if IM=M, where I is an ideal of R, implies that for any x∈M there exists a∈I such that (a−1)x=0. In this paper, we will study modules satisfying the weak Nakayama property. It is proved that if R is a local ring, then R is a Max ring if and only if J(R), the Jacobson radical of R, is T-nilpotent if and only if every R-module satisfies the weak Nakayama property. 相似文献
14.
Let G=(V,E) be a graph. A subset D⊆V is a dominating set if every vertex not in D is adjacent to a vertex in D. A dominating set D is called a total dominating set if every vertex in D is adjacent to a vertex in D. The domination (resp. total domination) number of G is the smallest cardinality of a dominating (resp. total dominating) set of G. The bondage (resp. total bondage) number of a nonempty graph G is the smallest number of edges whose removal from G results in a graph with larger domination (resp. total domination) number of G. The reinforcement (resp. total reinforcement) number of G is the smallest number of edges whose addition to G results in a graph with smaller domination (resp. total domination) number. This paper shows that the decision problems for the bondage, total bondage, reinforcement and total reinforcement numbers are all NP-hard. 相似文献
15.
Let E be a real Banach space, C be a nonempty closed convex subset of E and T:C→C be a continuous generalized Φ-pseudocontractive mapping. It is proved that T has a unique fixed point in C. 相似文献
16.
17.
A hidden Markov model (HMM) is said to have path-mergeable states if for any two states i,j there exist a word w and state k such that it is possible to transition from both i and j to k while emitting w. We show that for a finite HMM with path-mergeable states the block estimates of the entropy rate converge exponentially fast. We also show that the path-mergeability property is asymptotically typical in the space of HMM topologies and easily testable. 相似文献
18.
We introduce the notion of the (one-parameter subgroup) γ-condition for a map f from a Lie group to its Lie algebra and establish α-theory and γ-theory for Newton’s method for a map f satisfying this condition. Applications to analytic maps are provided, and Smale’s α-theory and γ-theory are extended and developed. Examples arising from initial value problems on Lie group are presented to illustrate applications of our results. 相似文献
19.
In many applications it has been observed that hybrid-Monte Carlo sequences perform better than Monte Carlo and quasi-Monte Carlo sequences, especially in difficult problems. For a mixed s-dimensional sequence m, whose elements are vectors obtained by concatenating d-dimensional vectors from a low-discrepancy sequence q with (s−d)-dimensional random vectors, probabilistic upper bounds for its star discrepancy have been provided. In a paper of G. Ökten, B. Tuffin and V. Burago [G. Ökten, B. Tuffin, V. Burago, J. Complexity 22 (2006), 435–458] it was shown that for arbitrary ε>0 the difference of the star discrepancies of the first N points of m and q is bounded by ε with probability at least 1−2exp(−ε2N/2) for N sufficiently large. The authors did not study how large N actually has to be and if and how this actually depends on the parameters s and ε. In this note we derive a lower bound for N, which significantly depends on s and ε. Furthermore, we provide a probabilistic bound for the difference of the star discrepancies of the first N points of m and q, which holds without any restrictions on N. In this sense it improves on the bound of Ökten, Tuffin and Burago and is more helpful in practice, especially for small sample sizes N. We compare this bound to other known bounds. 相似文献
20.
It is shown that if a sequence of open n-sets Dk increases to an open n-set D then reflected stable processes in Dk converge weakly to the reflected stable process in D for every starting point x in D. The same result holds for censored α-stable processes for every x in D if D and Dk satisfy the uniform Hardy inequality. Using the method in the proof of the above results, we also prove the weak convergence of reflected Brownian motions in unbounded domains. 相似文献