首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 873 毫秒
1.
We give a combinatorial proof of the skew version of the K-saturation theorem. More precisely, for any positive integer kk, we give an explicit injection from the set of skew semistandard Young tableaux with skew shape kλ/kμkλ/kμ and type kνkν, to the set of skew semistandard Young tableaux of shape λ/μλ/μ and type νν.  相似文献   

2.
A semicomplete multipartite or semicomplete cc-partite digraph DD is a biorientation of a cc-partite graph. A semicomplete multipartite digraph DD is called strongly quasi-Hamiltonian-connected, if for any two distinct vertices xx and yy of DD, there is a path PP from xx to yy such that PP contains at least one vertex from each partite set of DD.  相似文献   

3.
We study second and fourth order semilinear elliptic equations with a power-type nonlinearity depending on a power pp and a parameter λ>0λ>0. For both equations we consider Dirichlet boundary conditions in the unit ball B⊂RnBRn. Regularity of solutions strictly depends on the power pp and the parameter λλ. We are particularly interested in the radial solutions of these two problems and many of our proofs are based on an ordinary differential equation approach.  相似文献   

4.
In the present paper we consider the Volterra integration operator V   on the Wiener algebra W(D)W(D) of analytic functions on the unit disc DD of the complex plane CC. A complex number λλ is called an extended eigenvalue of V if there exists a nonzero operator A   satisfying the equation AVVAAV=λVA. We prove that the set of all extended eigenvalues of V   is precisely the set C?{0}C?{0}, and describe in terms of Duhamel operators and composition operators the set of corresponding extended eigenvectors of VV. The similar result for some weighted shift operator on ?p?p spaces is also obtained.  相似文献   

5.
We consider the finite capacity M/M/1−KM/M/1K queue with a time dependent arrival rate λ(t)λ(t). Assuming that the capacity KK is large and that the arrival rate varies slowly with time (as t/Kt/K), we construct asymptotic approximations to the probability of finding nn customers in the system at time tt, as well as the mean number. We consider various time ranges, where the system is nearly empty, nearly full, or is filled to a fraction of its capacity. Extensive numerical studies are used to back up the asymptotic analysis.  相似文献   

6.
In image restoration, the so-called edge-preserving regularization method is used to solve an optimization problem whose objective function has a data fidelity term and a regularization term, the two terms are balanced by a parameter λλ. In some aspect, the value of λλ determines the quality of images. In this paper, we establish a new model to estimate the parameter and propose an algorithm to solve the problem. In order to improve the quality of images, in our algorithm, an image is divided into some blocks. On each block, a corresponding value of λλ has to be determined. Numerical experiments are reported which show efficiency of our method.  相似文献   

7.
Let GG be a group. Any GG-module MM has an algebraic structure called a GG-family of Alexander quandles. Given a 2-cocycle of a cohomology associated with this GG-family, topological invariants of (handlebody) knots in the 3-sphere are defined. We develop a simple algorithm to algebraically construct nn-cocycles of this GG-family from GG-invariant group nn-cocycles of the abelian group MM. We present many examples of 2-cocycles of these GG-families using facts from (modular) invariant theory.  相似文献   

8.
In this paper, we establish an oscillation estimate of nonnegative harmonic functions for a pure-jump subordinate Brownian motion. The infinitesimal generator of such subordinate Brownian motion is an integro-differential operator. As an application, we give a probabilistic proof of the following form of relative Fatou theorem for such subordinate Brownian motion XX in a bounded κκ-fat open set; if uu is a positive harmonic function with respect to XX in a bounded κκ-fat open set DD and hh is a positive harmonic function in DD vanishing on DcDc, then the non-tangential limit of u/hu/h exists almost everywhere with respect to the Martin-representing measure of hh.  相似文献   

9.
We extend some known results on radicals and prime ideals from polynomial rings and Laurent polynomial rings to ZZ-graded rings, i.e, rings graded by the additive group of integers. The main of them concerns the Brown–McCoy radical GG and the radical SS, which for a given ring AA is defined as the intersection of prime ideals II of AA such that A/IA/I is a ring with a large center. The studies are related to some open problems on the radicals GG and SS of polynomial rings and situated in the context of Koethe’s problem.  相似文献   

10.
A tournament of order nn is usually considered as an orientation of the complete graph KnKn. In this note, we consider a more general definition of a tournament that we call aCC-tournament, where CC is the adjacency matrix of a multigraph GG, and a CC-tournament is an orientation of GG. The score vector of a CC-tournament is the vector of outdegrees of its vertices. In 1965 Hakimi obtained necessary and sufficient conditions for the existence of a CC-tournament with a prescribed score vector RR and gave an algorithm to construct such a CC-tournament which required, however, some backtracking. We give a simpler and more transparent proof of Hakimi’s theorem, and then provide a direct construction of such a CC-tournament which works even for weighted graphs.  相似文献   

11.
We show that, for any compact Alexandrov surface SS (without boundary) and any point yy in SS, there exists a point xx in SS for which yy is a critical point. Moreover, we prove that uniqueness characterizes the surfaces homeomorphic to the sphere among smooth orientable surfaces.  相似文献   

12.
The sensitivity set of a Boolean function at a particular input is the set of input positions where changing that one bit changes the output. Analogously we define the sensitivity set of a Boolean formula in a conjunctive normal form at a particular truth assignment, it is the set of positions where changing that one bit of the truth assignment changes the evaluation of at least one of the conjunct in the formula. We consider Boolean formulas in a generalized conjunctive normal form. Given a set ?? of Boolean functions, an ??-constraint is an application of a function from ?? to a tuple of literals built upon distinct variables, an ??-formula is then a conjunction of ??-constraints. In this framework, given a truth assignment II and a set of positions SS, we are able to enumerate all ??-formulas that are satisfied by II and that have SS as the sensitivity set at II. We prove that this number depends on the cardinality of SS only, and can be expressed according to the sensitivity of the Boolean functions in ??.  相似文献   

13.
Let RR be a commutative ring with identity. We will say that an RR-module MM satisfies the weak Nakayama property, if IM=MIM=M, where II is an ideal of RR, implies that for any x∈MxM there exists a∈IaI such that (a−1)x=0(a1)x=0. In this paper, we will study modules satisfying the weak Nakayama property. It is proved that if RR is a local ring, then RR is a Max ring if and only if J(R)J(R), the Jacobson radical of RR, is TT-nilpotent if and only if every RR-module satisfies the weak Nakayama property.  相似文献   

14.
Let G=(V,E)G=(V,E) be a graph. A subset D⊆VDV is a dominating set if every vertex not in DD is adjacent to a vertex in DD. A dominating set DD is called a total dominating set if every vertex in DD is adjacent to a vertex in DD. The domination (resp. total domination) number of GG is the smallest cardinality of a dominating (resp. total dominating) set of GG. The bondage (resp. total bondage) number of a nonempty graph GG is the smallest number of edges whose removal from GG results in a graph with larger domination (resp. total domination) number of GG. The reinforcement (resp. total reinforcement) number of GG is the smallest number of edges whose addition to GG results in a graph with smaller domination (resp. total domination) number. This paper shows that the decision problems for the bondage, total bondage, reinforcement and total reinforcement numbers are all NP-hard.  相似文献   

15.
Let EE be a real Banach space, CC be a nonempty closed convex subset of EE and T:C→CT:CC be a continuous generalized ΦΦ-pseudocontractive mapping. It is proved that TT has a unique fixed point in CC.  相似文献   

16.
17.
A hidden Markov model (HMM) is said to have path-mergeable states   if for any two states i,ji,j there exist a word ww and state kk such that it is possible to transition from both ii and jj to kk while emitting ww. We show that for a finite HMM with path-mergeable states the block estimates of the entropy rate converge exponentially fast. We also show that the path-mergeability property is asymptotically typical in the space of HMM topologies and easily testable.  相似文献   

18.
We introduce the notion of the (one-parameter subgroup) γγ-condition for a map ff from a Lie group to its Lie algebra and establish αα-theory and γγ-theory for Newton’s method for a map ff satisfying this condition. Applications to analytic maps are provided, and Smale’s αα-theory and γγ-theory are extended and developed. Examples arising from initial value problems on Lie group are presented to illustrate applications of our results.  相似文献   

19.
In many applications it has been observed that hybrid-Monte Carlo sequences perform better than Monte Carlo and quasi-Monte Carlo sequences, especially in difficult problems. For a mixed ss-dimensional sequence mm, whose elements are vectors obtained by concatenating dd-dimensional vectors from a low-discrepancy sequence qq with (s−d)(sd)-dimensional random vectors, probabilistic upper bounds for its star discrepancy have been provided. In a paper of G. Ökten, B. Tuffin and V. Burago [G. Ökten, B. Tuffin, V. Burago, J. Complexity 22 (2006), 435–458] it was shown that for arbitrary ε>0ε>0 the difference of the star discrepancies of the first NN points of mm and qq is bounded by εε with probability at least 1−2exp(−ε2N/2)12exp(ε2N/2) for NN sufficiently large. The authors did not study how large NN actually has to be and if and how this actually depends on the parameters ss and εε. In this note we derive a lower bound for NN, which significantly depends on ss and εε. Furthermore, we provide a probabilistic bound for the difference of the star discrepancies of the first NN points of mm and qq, which holds without any restrictions on NN. In this sense it improves on the bound of Ökten, Tuffin and Burago and is more helpful in practice, especially for small sample sizes NN. We compare this bound to other known bounds.  相似文献   

20.
It is shown that if a sequence of open nn-sets DkDk increases to an open nn-set DD then reflected stable processes in DkDk converge weakly to the reflected stable process in DD for every starting point xx in DD. The same result holds for censored αα-stable processes for every xx in DD if DD and DkDk satisfy the uniform Hardy inequality. Using the method in the proof of the above results, we also prove the weak convergence of reflected Brownian motions in unbounded domains.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号