共查询到20条相似文献,搜索用时 15 毫秒
1.
The exact bounds are obtained for the norm of the singular integral operator S on the family of rays originating at the same point. These bounds, with the use of the localization technique, are then extended
to the essential norm of S on piecewise smooth curves with finitely many points of self intersection.
Submitted: April 13, 2007. Accepted: September 19, 2007. 相似文献
2.
We study the operad of finite labeled tournaments. We describe the structure of suboperads of this operad generated by simple tournaments. We prove that a suboperad generated by a tournament with two vertices (i.e., the operad of finite linearly ordered sets) is isomorphic to the operad of symmetric groups, and a suboperad generated by a simple tournament with more that two vertices is isomorphic to the quotient operad of the free operad with respect to a certain congruence. We obtain this congruence explicitly. 相似文献
3.
David J. Steigmann 《Zeitschrift für Angewandte Mathematik und Physik (ZAMP)》2007,58(1):121-136
It is widely believed that classical linear elasticity theory does not conform to the Galilean frame invariance of general
(non-relativistic) field theories. This view is traced here to an interpretation of the relationship between the deformation
gradient and the displacement gradient which does not reflect the tensor character of the variables involved. Frame invariance
is shown to follow if tensor character is imposed on this relationship at the outset. 相似文献
4.
The general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material from the outer rounds of block ciphers. Thus, impossible differentials are one of the crucial factors to see how much the underlying block ciphers are resistant to impossible differential cryptanalysis. In this article, we introduce a widely applicable matrix method to find impossible differentials of block cipher structures whose round functions are bijective. Using this method, we find various impossible differentials of known block cipher structures: Nyberg’s generalized Feistel network, a generalized CAST256-like structure, a generalized MARS-like structure, a generalized RC6-like structure, Rijndael structures and generalized Skipjack-like structures. We expect that the matrix method developed in this article will be useful for evaluating the security of block ciphers against impossible differential cryptanalysis, especially when one tries to design a block cipher with a secure structure. 相似文献
5.
R. Nair 《Monatshefte für Mathematik》1998,125(3):241-253
Supposek
n denotes either (n) or (p
n) (n=1,2,...) where the polynomial maps the natural numbers to themselves andp
k denotes thek
th rationals prime. Also let
denote the sequence of convergents to a real numberx and letc
n(x))
n=1
be the corresponding sequence of partial quotients for the nearest integer continued fraction expansion. Define the sequence of approximation constants
n(x))
n=1
by
In this paper we study the behaviour of the sequences
and
for almost allx with respect to the Lebesgue measure. In the special case wherek
n=n (n=1,2,...) these results are known and due to H. Jager, G. J. Rieger and others. 相似文献
6.
J. L. García-Roig Emma Martín-Gutiérrez 《Abhandlungen aus dem Mathematischen Seminar der Universit?t Hamburg》2000,70(1):85-92
We solve the functional equationf(x
3 +y
3) =f(x)3 +f(y)3 for maps of a finite field into itself. 相似文献
7.
A note on the generalized rank reduction 总被引:1,自引:0,他引:1
A. Galántai 《Acta Mathematica Hungarica》2007,116(3):239-246
We give constructive necessary and sufficient conditions for the validity of the generalized rank reduction formula of Ouellette
[12]:
We also analyze the sufficient conditions of Takane and Yanai [16] showing that some of them are also necessary.
相似文献
8.
Jorge García-Melián 《Zeitschrift für Angewandte Mathematik und Physik (ZAMP)》2009,60(4):594-607
In this paper we consider the boundary blow-up problem Δpu = a(x)uq in a smooth bounded domain Ω of , with u = +∞ on ∂Ω. Here is the well-known p-Laplacian operator with p > 1, q > p − 1, and a(x) is a nonnegative weight function which can be singular on ∂Ω. Our results include existence, uniqueness and exact boundary
behavior of positive solutions.
相似文献
9.
Let {p
m
(w)} be the sequence of Jacobi polynomials corresponding to the weightw(x)=(1–x)(1+x), 0, <1. denote=">1.>x
k
(w)=cos
m,k
(w),k=1,...,m, the zeros ofp
m
(w). If +=0, then the estimates
相似文献
10.
A group G has finite rank r if every finitely generated subgroup of G is at most r-generator. If C is a class of groups then we let C* denote the class of groups G in which every proper subgroup of G is either of finite rank or in C. We let denote the class of soluble groups and the class of soluble groups of derived length at most d, where d is a positive integer. We let λ denote the set of closure operations
and let denote the λ-closure of the class of periodic locally graded groups. Amongst other results we prove that a soluble -group is either of finite rank or of derived length at most d and also that a group in the class is either locally soluble, or has finite rank, or is isomorphic to one of or for suitable locally finite fields .
The second author would like to thank the Department of Mathematics at Bucknell University for its hospitality while part
of this work was being done. 相似文献
11.
B. G. Gabdulkhaev 《Russian Mathematics (Iz VUZ)》2009,53(8):1-7
In the space of square integrable functions we establish effective sufficient continuity and compactness conditions for singular integral operators with Cauchy kernels on a segment of the real axis. 相似文献
12.
Recently, Chawla et al. described a second order finite difference method for the class of singular two-point boundary value problems:
|