首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
It is shown that ifA andB are non-empty subsets of {0, 1} n (for somenεN) then |A+B|≧(|A||B|)α where α=(1/2) log2 3 here and in what follows. In particular if |A|=2 n-1 then |A+A|≧3 n-1 which anwers a question of Brown and Moran. It is also shown that if |A| = 2 n-1 then |A+A|=3 n-1 if and only if the points ofA lie on a hyperplane inn-dimensions. Necessary and sufficient conditions are also given for |A +B|=(|A||B|)α. The above results imply the following improvement of a result of Talagrand [7]: ifX andY are compact subsets ofK (the Cantor set) withm(X),m(Y)>0 then λ(X+Y)≧2(m(X)m(Y))α wherem is the usual measure onK and λ is Lebesgue measure. This also answers a question of Moran (in more precise terms) showing thatm is not concentrated on any proper Raikov system.  相似文献   

2.
It is known that, unlike the one dimensional case it is not possible to find an upper bound for the zeros of an entire map fromC n toC n ,n≥2, in terms of the growth of the map. However, if we only consider the “non-degenerate” zeros, that is, the zeros where the jacobian is not “too small”, it becomes possible. We give a new proof of this fact.   相似文献   

3.
We prove that every set of n ≥ 3 points in \mathbbR2{\mathbb{R}^2} can be slightly perturbed to a set of n points in \mathbbQ2{\mathbb{Q}^2} so that at least 3(n − 2) of mutual distances between those new points are rational numbers. Some special rational triangles that are arbitrarily close to a given triangle are also considered. Given a triangle ABC, we show that for each ε > 0 there is a triangle ABC′ with rational sides and at least one rational median such that |AA′|, |BB′|, |CC′| < ε and a Heronian triangle A′′B′′C′′ with three rational internal angle bisectors such that A¢¢, B¢¢, C¢¢ ? \mathbbQ2{A^{\prime\prime}, B^{\prime\prime}, C^{\prime\prime} \in \mathbb{Q}^2} and |AA′′|, |BB′′|, |CC′′| < ε.  相似文献   

4.
In 1989, Kalai stated three conjectures A, B, C of increasing strength concerning face numbers of centrally symmetric convex polytopes. The weakest conjecture, A, became known as the “3 d -conjecture.” It is well known that the three conjectures hold in dimensions d≤3. We show that in dimension 4 only conjectures A and B are valid, while conjecture C fails. Furthermore, we show that both conjectures B and C fail in all dimensions d≥5.  相似文献   

5.
The main aim of this work is to look for the periodic solutions of the nonintegrable Hamiltonian system of Ollongren in the neighborhood of the origin. We apply a functional algorithm derived from the method of Lindstedt-Poincaré. We first show that the system admits six main periodic families and then, by means of the computer algebra system “Mathematica”, compute the series corresponding to these families up to O(ε14A29) as well as to their periods up to O(ε15A30), where A is the zeroth-order amplitude and έ is a perturbative parameter. Reducing the system to one degree of freedom we also prove that the period of the two “oblique” periodic families is rigorously equal to a Gauss hypergeometric series. Moreover, we study numerically the convergence of the L-P series and test the validity of these series using a numerical integration technique. Finally, we compare our results with those of a geometrical method and a Lie series method. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

6.
We study the Bloch constant for Κ-quasiconformal holomorphic mappings of the unit ball B of C n . The final result we prove in this paper is: If f is a Κ-quasiconformal holomorphic mappig of B into C n such that det(f′(0)) = 1, then f(B) contains a schlicht ball of radius at least where C n > 1 is a constant depending on n only, and as n→∞. Received June 24, 1998, Accepted January 14, 1999  相似文献   

7.
In [Rong, F., Quasi-parabolic analytic transformations of C n , J. Math. Anal. Appl. 343 (2008), 99–109], we showed the existence of “parabolic curves” for certain quasi-parabolic analytic transformations of C n . Under some extra assumptions, we show the existence of “parabolic manifolds” for such transformations.  相似文献   

8.
Let A, B be two archimedean ℓ-algebras and let U,V be two positive linear maps from A to B. We call that the couple (U,V) is separating with respect to A and B if |a||b| = 0 in A implies |U (a)||V (b)| = 0 in B. In this paper, we prove that if A is an f-algebra with unit elment e, if B is an ℓ-algebra and if (U,V) is a separating couple with respect to A and B then (U ∼∼,V ∼∼), where U ∼∼ (resp V ∼∼) is the bi-adjoint of U (resp of V), is again a separating couple with respect to the order continuous order biduals (A′)′ n and (B′)′ n of A and B respectively furnished with their Arens products respectively. Moreover, in the case where B′ separates the points of B, we give a characterization of any separating couple with respect to A and B.   相似文献   

9.
D. M. Riley proved in [3] that, if A and B are either Lie nilpotent or Lie metabelian algebras, then their tensor product AB is Lie soluble and obtained bounds on the Lie derived length of AB. The aim of the present note is to improve Riley’s bounds; moreover we consider also the cases in which A and B are either strongly Lie soluble or strongly Lie nilpotent algebras. Received: 5 April 2006 The first two authors partially supported by MIUR-Italy via PRIN “Group theory and applications”.  相似文献   

10.
LetA=(A 1,...,A n ),B=(B 1,...,B n L(ℓ p ) n be arbitraryn-tuples of bounded linear operators on (ℓ p ), with 1<p<∞. The paper establishes strong rigidity properties of the corresponding elementary operators ε a,b on the Calkin algebraC(ℓ p )≡L(ℓ p )/K(ℓ p ); , where quotient elements are denoted bys=S+K(ℓ p ) forSεL(ℓ p ). It is shown among other results that the kernel Ker(ε a,b ) is a non-separable subspace ofC(ℓ p ) whenever ε a,b fails to be one-one, while the quotient is non-separable whenever ε a,b fails to be onto. These results extend earlier ones in several directions: neither of the subsets {A 1,...,A n }, {B 1,...,B n } needs to consist of commuting operators, and the results apply to other spaces apart from Hilbert spaces. Supported by the Academy of Finland, Project 32837.  相似文献   

11.
We unify the cancellation property of rings with stable range one and the principal ideal domain by introducing a new notion which is called “cancellable range”. It is proved that if a ring R has cancellable range n for some positive integer n, then for any n-generated module B and any module implies BC; if R is a Noetherian ring and R has cancellable range n for any n ≧ 1, then R has the cancellation property. Received: 16 November 2004  相似文献   

12.
 Let A be a central simple algebra of degree n over a field of characteristic different from 2 and let B ? A be a maximal commutative subalgebra. We show that if there is an involution on A that preserves B and such that the socle of each local component of B is a homogeneous C 2 -module for this action, then B is a Frobenius algebra. For a fixed commutative Frobenius algebra B of finite dimension n equipped with an involution σ, we characterize the central simple algebras A of degree n that contain B and carry involutions extending σ. Received: 29 October 2001 / Revised version: 2 February 2002  相似文献   

13.
For an essentially normal operatorT, it is shown that there exists a unilateral shift of multiplicitym inC * (T) if and only if γ(T)≠0 and γ(T)/m. As application, we prove that the essential commutant of a unilateral shift and that of a bilateral shift are not isomorphic asC * -algebras. Finally, we construct a naturalC * -algebra ε + ε* on the Bergman spaceL a 2 (B n ), and show that its essential commutant is generated by Toeplitz operators with symmetric continuous symbols and all compact operators. Supported by NSFC and Laboratory of Mathematics for Nonlinear Science at Fudan University.  相似文献   

14.
M. Deza  P. Frankl 《Combinatorica》1982,2(4):341-345
Let α be a rational-valued set-function on then-element sexX i.e. α(B) εQ for everyBX. We say that α defines a 0-configuration with respect toA⫅2 x if for everyA εA we have α(B)=0. The 0-configurations form a vector space of dimension 2 n − |A| (Theorem 1). Let 0 ≦t<kn and letA={AX: |A| ≦t}. We show that in this case the 0-configurations satisfying α(B)=0 for |B|>k form a vector space of dimension , we exhibit a basis for this space (Theorem 4). Also a result of Frankl, Wilson [3] is strengthened (Theorem 6).  相似文献   

15.
We show that, whenA generates aC-semigroup, then there existsY such that [M(C)] →YX, andA| Y , the restriction ofA toY, generates a strongly continuous semigroup, where ↪ means “is continuously embedded in” and ‖x[Im(C)]≡‖C −1 x‖. There also existsW such that [C(W)] →XW, and an operatorB such thatA=B| X andB generates a strongly continuous semigroup onW. If theC-semigroup is exponentially bounded, thenY andW may be chosen to be Banach spaces; in general,Y andW are Frechet spaces. If ρ(A) is nonempty, the converse is also true. We construct fractional powers of generators of boundedC-semigroups. We would like to thank R. Bürger for sending preprints, and the referee for pointing out reference [37]. This research was supported by an Ohio University Research Grant.  相似文献   

16.
A Fuzzy Vault Scheme   总被引:2,自引:0,他引:2  
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U. If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.  相似文献   

17.
In this paper, a theoretical method is presented to select fuzzy implication operators for the fuzzy inference sentence “if x is A, then y is B”. By applying representation theorems, thirty-two fuzzy implication operators are obtained. It is shown that the obtained operators are generalizations of classical inference rule AB, A c B, AB c and A c B c respectively and can be divided into four classes. By discussion, it is found that thirty of them among 420 fuzzy implication operators presented by Li can be derived by applying representation theorems and another two new ones are obtained by the use of our methods.  相似文献   

18.
We show that Hausdorff measures of different dimensions are not Borel isomorphic; that is, the measure spaces (ℝ, B, H s ) and (ℝ, B, H t ) are not isomorphic if st, s, t ∈ [0, 1], where B is the σ-algebra of Borel subsets of ℝ and H d is the d-dimensional Hausdorff measure. This answers a question of B. Weiss and D. Preiss. To prove our result, we apply a random construction and show that for every Borel function ƒ: ℝ → ℝ and for every d ∈ [0, 1] there exists a compact set C of Hausdorff dimension d such that ƒ(C) has Hausdorff dimension ≤ d. We also prove this statement in a more general form: If A ⊂ ℝn is Borel and ƒ: A → ℝm is Borel measurable, then for every d ∈ [0, 1] there exists a Borel set BA such that dim B = d·dim A and dim ƒ(B) ≤ d·dim ƒ (A). Partially supported by the Hungarian Scientific Research Fund grant no. T 49786.  相似文献   

19.
LetA be aC*-algebra with second dualA″. Let (φ n)(n=1,...) be a sequence in the dual ofA such that limφ n(a) exists for eacha εA. In general, this does not imply that limφ n(x) exists for eachx εA″. But if limφ n(p) exists whenever p is the range projection of a positive self-adjoint element of the unit ball ofA, then it is shown that limφ n(x) does exist for eachx inA″. This is a non-commutative generalisation of a celebrated theorem of Dieudonné. A new proof of Dieudonné’s theorem, for positive measures, is given here. The proof of the main result makes use of Dieudonné’s original theorem.  相似文献   

20.
We study random subgraphs of the n-cube {0,1}n, where nearest-neighbor edges are occupied with probability p. Let pc(n) be the value of p for which the expected size of the component containing a fixed vertex attains the value λ2n/3, where λ is a small positive constant. Let ε=n(ppc(n)). In two previous papers, we showed that the largest component inside a scaling window given by |ε|=Θ(2n/3) is of size Θ(22n/3), below this scaling window it is at most 2(log 2)−2, and above this scaling window it is at most O(ε2n). In this paper, we prove that for the size of the largest component is at least Θ(ε2n), which is of the same order as the upper bound. The proof is based on a method that has come to be known as “sprinkling,” and relies heavily on the specific geometry of the n-cube.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号