首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 953 毫秒
1.
This paper is a study of Proposition IX of Book I of Newton's Principia, the problem of determining the centripetal force for an equiangular spiral. In Newton's main proof of this proposition there is an error concerning his reason for the figure SPRQT being “given in kind,” and a very interesting technique of varying things in the neighborhood of a limit. This main proof utilized Newton's formula for the limit of SP2QT2/QR given in Corollary I to Proposition VI of the Principia. Newton also gave an alternate proof which utilized his formula for SY2PV given in Corollary III to Proposition VI. The “given” of Proposition IX was “a spiral PQS, cutting all the radii SP, SQ, &c., in a given angle.” Both the main proof and the alternate proof implicitly depend on the property of the equiangular spiral that the radius of curvature at any point is proportional to the pole distance SP. We here offer a new proof of Newton's proposition which does not depend on this implicit assumption.  相似文献   

2.
During the past 30 years there has been controversy regarding the adequacy of Newton's proof of Prop. 1 in Book 1 of the Principia. This proposition is of central importance because its proof of Kepler's area law allowed Newton to introduce a geometric measure for time to solve problems in orbital dynamics in the Principia. It is shown here that the critics of Prop. 1 have misunderstood Newton's continuum limit argument by neglecting to consider the justification for this limit which he gave in Lemma 3. We clarify the proof of Prop. 1 by filling in some details left out by Newton which show that his proof of this proposition was adequate and well-grounded.  相似文献   

3.
We study the computational problem “find the value of the quantified formula obtained by quantifying the variables in a sum of terms.” The “sum” can be based on any commutative monoid, the “quantifiers” need only satisfy two simple conditions, and the variables can have any finite domain. This problem is a generalization of the problem “given a sum-of-products of terms, find the value of the sum” studied in [R.E. Stearns and H.B. Hunt III, SIAM J. Comput. 25 (1996) 448–476]. A data structure called a “structure tree” is defined which displays information about “subproblems” that can be solved independently during the process of evaluating the formula. Some formulas have “good” structure trees which enable certain generic algorithms to evaluate the formulas in significantly less time than by brute force evaluation. By “generic algorithm,” we mean an algorithm constructed from uninterpreted function symbols, quantifier symbols, and monoid operations. The algebraic nature of the model facilitates a formal treatment of “local reductions” based on the “local replacement” of terms. Such local reductions “preserve formula structure” in the sense that structure trees with nice properties transform into structure trees with similar properties. These local reductions can also be used to transform hierarchical specified problems with useful structure into hierarchically specified problems having similar structure.  相似文献   

4.
Medieval Arabic algebra books intended for practical training generally have in common a first “book” which is divided into two sections: one on the methods of solving simplified equations and manipulating expressions, followed by one consisting of worked-out problems. By paying close attention to the wording of the problems in the books of al-Khwārizmī, Abū Kāmil, and Ibn Badr, we reveal the different ways the word māl was used. In the enunciation of a problem it is a common noun meaning “quantity,” while in the solution it is the proper noun naming the square of “thing” (shay '). We then look into the differences between the wording of enunciations and equations, which clarify certain problems solved without “thing,” and help explain the development of algebra before the time of al-Khwārizmī.  相似文献   

5.
The limit laws of three cost measures are derived of two algorithms for finding the maximum in a single-channel broadcast communication model. Both algorithms use coin flips and comparisons. Besides the ubiquitous normal limit law, the Dickman distribution also appears in a natural way. The method of proof proceeds along the line via the method of moments and the “asymptotic transfers,” which roughly bridges the asymptotics of the “conquering cost of the subproblems” and that of the total cost. Such a general approach has proved very fruitful for a number of problems in the analysis of recursive algorithms.  相似文献   

6.
We consider the parameterized problem, whether for a given set  of n disks (of bounded radius ratio) in the Euclidean plane there exists a set of k non-intersecting disks. For this problem, we expose an algorithm running in time that is—to our knowledge—the first algorithm with running time bounded by an exponential with a sublinear exponent. For λ-precision disk graphs of bounded radius ratio, we show that the problem is fixed parameter tractable with a running time  . The results are based on problem kernelization and a new “geometric ( -separator) theorem” which holds for all disk graphs of bounded radius ratio. The presented algorithm then performs, in a first step, a “geometric problem kernelization” and, in a second step, uses divide-and-conquer based on our new “geometric separator theorem.”  相似文献   

7.
We study the attractors γ of a finite system of contraction similarities S j (j = 1,..., m) in ℝd which are Jordan arcs. We prove that if a system possesses a structure parametrization (ℐ,ϕ) and ℱ(ℐ) is the associated family of ℐ then we have one of the following cases:1. The identity mapping Id does not belong to the closure of ℱ(ℐ). Then (if properly rearranged) is a Jordan zipper.2. The identity mapping Id is a limit point of ℱ(ℐ). Then the arc γ is a straight line segment.3. The identity mapping Id is an isolated point of .We construct an example of a self-similar Jordan curve which implements the third case.Original Russian Text Copyright © 2005 Aseev V. V. and Tetenov A. V.The authors were supported by the Program “Universities of Russia” (Grant UR.04.01.456).__________Translated from Sibirskii Matematicheskii Zhurnal, Vol. 46, No. 4, pp. 733–748, July–August, 2005.  相似文献   

8.
In the Type-2 Theory of Effectivity, one considers representations of topological spaces in which infinite words are used as “names” for the elements they represent. Given such a representation, we show that probabilistic processes on infinite words, under which each successive symbol is determined by a finite probabilistic choice, generate Borel probability measures on the represented space. Conversely, for several well-behaved types of space, every Borel probability measure is represented by a corresponding probabilistic process. Accordingly, we consider probabilistic processes as providing “probabilistic names” for Borel probability measures. We show that integration is computable with respect to the induced representation of measures.  相似文献   

9.
In his somewhat informal derivation, Akaike (in “Proceedings of the 2nd International Symposium Information Theory” (C. B. Petrov and F. Csaki, Eds.), pp. 610–624, Academici Kiado, Budapest, 1973) obtained AIC's parameter-count adjustment to the log-likelihood as a bias correction: it yields an asymptotically unbiased estimate of the quantity that measures the average fit of the estimated model to an independent replicate of the data used for estimation. We present the first mathematically complete derivation of an analogous property of AIC for comparing vector autoregressions fit to weakly stationary series. As a preparatory result, we derive a very general “overfitting principle,” first formulated in a more limited context in Findley (Ann. Inst. Statist. Math.43, 509–514, 1991), asserting that a natural measure of an estimated model's overfit due to parameter estimation is equal, asymptotically, to a measure of its accuracy loss with independent replicates. A formal principle of parsimony for fitted models is obtained from this, which for nested models, covers the situation in which all models considered are misspecified. To prove these results, we establish a set of general conditions under which, for each τ1, the absolute τth moments of the entries of the inverse matrices associated with least squares estimation are bounded for sufficiently large sample sizes.  相似文献   

10.
In this work, we establish new coincidence and common fixed point theorems for hybrid strict contraction maps by dropping the assumption “f is T-weakly commuting” for a hybrid pair (f,T) of multivalued maps in Theorem 3.10 of T. Kamran (2004) [8]. As an application, an invariant approximation result is derived.  相似文献   

11.
We initiate a general approach for the fast enumeration of permutations with a prescribed number of occurrences of “forbidden” patterns that seems to indicate that the enumerating sequence is always P-recursive. We illustrate the method completely in terms of the patterns “abc,” “cab,” and “abcd.”  相似文献   

12.
The n-dimensional analogues of Wiener's “s-function” and difference operator associated to rectangular limit processes are defined. The Wiener-Plancherel formula is proved in this context for functions having bounded quadratic means.  相似文献   

13.
Polynomial identity rings as rings of functions   总被引:2,自引:1,他引:1  
We generalize the usual relationship between irreducible Zariski closed subsets of the affine space, their defining ideals, coordinate rings, and function fields, to a non-commutative setting, where “varieties” carry a PGLn-action, regular and rational “functions” on them are matrix-valued, “coordinate rings” are prime polynomial identity algebras, and “function fields” are central simple algebras of degree n. In particular, a prime polynomial identity algebra of degree n is finitely generated if and only if it arises as the “coordinate ring” of a “variety” in this setting. For n=1 our definitions and results reduce to those of classical affine algebraic geometry.  相似文献   

14.
We study a one-dimensional infinite system of particles driven by a constant positive force F which acts only on the leftmost particle which is regarded as the tracer particle (t.p.). All other particles are field neutral, do not interact among themselves, and independently of each other with probability 0<p≤1 are either perfectly inelastic and “stick” to the t.p. after the first collision, or with probability 1−p are perfectly elastic, mechanically identical and have the same mass m. At initial time all particles are at rest, and the initial measure is such that the interparticle distances ξi's are i.i.d. r.v.'s. with absolutely continuous density. We show that for any value of the field F>0, the velocity of the t.p. converges to a limit value, which we compute.  相似文献   

15.
The trigonometric functions entered “analysis” when Isaac Newton derived the power series for the sine in his De Analysi of 1669. On the other hand, no textbook until 1748 dealt with the calculus of these functions. That is, in none of the dozen or so calculus texts written in England and the continent during the first half of the 18th century was there a treatment of the derivative and integral of the sine or cosine or any discussion of the periodicity or addition properties of these functions. This contrasts sharply with what occurred in the case of the exponential and logarithmic functions. We attempt here to explain why the trigonometric functions did not enter calculus until about 1739. In that year, however, Leonhard Euler invented this calculus. He was led to this invention by the need for the trigonometric functions as solutions of linear differential equations. In addition, his discovery of a general method for solving linear differential equations with constant coefficients was influenced by his knowledge that these functions must provide part of that solution.  相似文献   

16.
It may seem odd that Abel, a protagonist of Cauchy's new rigor, spoke of “exceptions” when he criticized Cauchy's theorem on the continuity of sums of continuous functions. However, when interpreted contextually, exceptions appear as both valid and viable entities in the early 19th century. First, Abel's use of the term “exception” and the role of the exception in his binomial paper is documented and analyzed. Second, it is suggested how Abel may have acquainted himself with the exception and his use of it in a process denoted critical revision is discussed. Finally, an interpretation of Abel's exception is given that identifies it as a representative example of a more general transition in the understanding of mathematical objects that took place during the period. With this interpretation, exceptions find their place in a fundamental transition during the early 19th century from a formal approach to analysis toward a more conceptual one.  相似文献   

17.
We study a variational problem arising from a generalization of an economic model introduced by Rochet and Choné in [5]. In this model a monopolist proposes a set Y of products with price list . Each rational consumer chooses which product to buy by solving a personal minimum problem, taking into account his/her tastes and economic possibilities. The monopolist looks for the optimal price list which minimizes costs, hence maximizes the profit. This leads to a minimum problem for functionals (the “pessimistic cost expectation”) and (the “optimistic cost expectation”), which are in turn defined through two nested variational problems. We prove that the minimum of exists and coincides with the infimum of . We also provide a variational approximation of by smooth functionals defined in finite dimensional Euclidean spaces.Received: 2 March 2004, Accepted: 19 October 2004, Published online: 22 December 2004Mathematics Subject Classification (2000): 49J45, 91B  相似文献   

18.
Let X=(M(nm), ·), where · fulfills Condition 0.3 and W=M(n, 1)+M(1, m). A formula for a minimal projection from X onto W is given in (E. W. Cheney and W. A. Light, 1985, “Approximation Theory in Tensor Product Spaces,” Lecture Notes in Mathematics, Springer-Verlag, Berlin; E. J. Halton and W. A. Light, 1985, Math. Proc. Cambridge Philos. Soc.97, 127–136; and W. A. Light, 1986, Math. Z.191, 633–643). We will show that this projection is the unique minimal projection (see Theorem 2.1).  相似文献   

19.
Several properties of the generation and evolution of phase separating patterns for binary material studied by CDS model are proposed. The main conclusions are (1) for alloys spinodal decomposition, the conceptions of “macro-pattern” and “micropattern” are posed by “black-and- white graph” and “gray-scale graph” respectively. We find that though the four forms of map f that represent the self-evolution of order parameter in a cell (lattice) are similar to each other in “macro-pattern”, there are evident differences in their micro-pattern, e.g., some different fine netted structures in the black domain and the white domain are found by the micro-pattern, so that distinct mechanical and physical behaviors shall be obtained. (2) If the two constitutions of block copolymers are not symmetric (i.e. r ≠ 0.5), a pattern called “grain-strip cross pattern” is discovered, in the 0.43 <r <0.45.  相似文献   

20.
We consider the problem of enumerating the permutations containing exactly k occurrences of a pattern of length 3. This enumeration has received a lot of interest recently, and there are a lot of known results. This paper presents an alternative approach to the problem, which yields a proof for a formula which so far only was conjectured (by Noonan and Zeilberger). This approach is based on bijections from permutations to certain lattice paths with “jumps,” which were first considered by Krattenthaler.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号