首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
In this paper, we study a homogenization problem for perimeter energies in highly contrasted media; the analysis of the previous paper is carried out by removing the hypothesis that the perforated medium Rn ? E is composed of disjoint compact components. Assuming E to be the union of a finite number N of connected components E1, … ,EN, the Γ‐limit F is a multiphase energy with a ‘decoupled’ surface part, obtained by homogenization from the surface tensions in each E j, a trivial bulk term obtained as a weak limit, and a further interacting term between the phases, involving an asymptotic formula for a family minimum problems on invading an asymptotic formula for a family of minimum problems on invading domains with prescribed boundary conditions. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

3.
4.
A direct numerical method is considered, which is a generalization of the Euler method for nonlocal functionals depending on functions with differently signed deviations, and also for nonlocal functionals depending on functions of two independent variables.  相似文献   

5.
6.
A new approach is used to describe the large time behavior of the nonlocal differential equation initially studied in T.-N. Nguyen (On the \({\omega}\)-limit set of a nonlocal differential equation: application of rearrangement theory. Differ. Integr. Equ. arXiv:1601.06491, 2016). Our approach is based upon the existence of infinitely many Lyapunov functionals and allows us to extend the analysis performed in T.-N. Nguyen (On the \({\omega}\)-limit set of a nonlocal differential equation: application of rearrangement theory. Differ. Integr. Equ. arXiv:1601.06491, 2016).  相似文献   

7.
We study the asymptotic behaviour of the sequence of first order equations tu––ah(y)xu=0 by means of the related energies
  相似文献   

8.
In this paper we study the problem of patrolling a perimeter. The general situation considered here can correspond to different tactical problems and it is studied from the point of view of game theory. To put the ideas in a context we describe it as follows. An intruder seeks to carry out a sabotage on the perimeter of a protected zone. He has to perform the action along n consecutive days and has to position himself each day at one of m strategic points placed on this border. The first day he can take his place at any of the m points, but on successive days he can move only to adjacent points. Furthermore, the perimeter is protected by a patroller, who will select each day one of the m points to inspect. The strategic situation is modeled as a two-person zero-sum game, which is developed on a cyclic set of m points over n time units. We prove some interesting properties of the strategies, solve the game in closed form under certain constraints and obtain bounds for the value of the game in several non-solved cases.  相似文献   

9.
10.
We define [k]={1,2,,k} to be a (totally ordered) alphabet on k letters. A word w of length n on the alphabet [k] is an element of [k]n. A word can be represented by a bargraph (i.e., by a column-convex polyomino whose lower edges lie on the x-axis) in which the height of the ith column equals the size of the ith part of the word. Thus these bargraphs have heights which are less than or equal to k. We consider the perimeter, which is the number of edges on the boundary of the bargraph. By way of Cramer’s method and the kernel method, we obtain the generating function that counts the perimeter of words. Using these generating functions we find the average perimeter of words of length n over the alphabet [k]. We also show how the mean and variance can be obtained using a direct counting method.  相似文献   

11.
Andrija Raguž 《PAMM》2013,13(1):371-372
We consider the Ginzburg-Landau functional in one dimension, endowed with epsilon-dependent 3-well potential which degenerates as small parameter epsilon tends to zero. By using the approach in G. Alberti, S. Muller: A new approach to variational problems with multiple scales, Comm. Pure Appl. Math. 54 , 761-825 (2001), we obtain Gamma-convergence as small parameter epsilon tends to zero. We also recover the underlying geometric properties shared by all minimizing sequences. (© 2013 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   

12.
We show that the nonlinear bending theory of shells arises as a Γ-limit of three-dimensional nonlinear elasticity. To cite this article: G. Friesecke et al., C. R. Acad. Sci. Paris, Ser. I 336 (2003).  相似文献   

13.
An approach to modelling random sets with locally finite perimeter as random elements in the corresponding subspace of L1 functions is suggested. A Crofton formula for flat sections of the perimeter is shown. Finally, random processes of particles with finite perimeter are introduced and it is shown that their union sets are random sets with locally finite perimeter.  相似文献   

14.
We introduce the concept of informativeness of a continuous functional on a metric spaceX with respect to a setMX and a metric x. We pose the problem of finding the most informative functional. For some sets of continuous functions, this problem is solved by reduction to a subset of functionals given by the value of a function at a certain point.Translated from Ukrainskii Matematicheskii Zhurnal, Vol. 46, No. 9, pp. 1156–1163, September, 1994.  相似文献   

15.
In this paper we will discuss some problems of degree-theoretic nature in connection with recursion in normal objects of higher types.Harrington [2] and Loewenthal [6] have proved some results concerning Post's problem and the Minimal Pair Problem, using recursion modulo subindividuals. Our degrees will be those obtained from Kleene-recursion modulo individuals. To solve our problems we then have to put some extra strength to ZFC. We will first assume V = L, and then we restrict ourselves to the situation of a recursive well-ordering and Martin's axiom.We assume familiarity with recursion theory in higher types as presented in Kleene [3]. Further backround is found in Harrington [2], Moldestad [9] and Normann [11]. We will survey the parts of these papers that we need.In Section 1 we give the general background for the arguments used later. In Section 2 we prove some lemmas assuming V = L. In section 3, assuming V = L we solve Post's problem and another problem using the finite injury method. We will thereby describe some of the methods needed for the more complex priority argument of Section 4 where we give a solution of the minimal pair problem for extended r.e. degress of functionals.In Section 5 we will see that if Martin's Axiom holds and we have a minimal well-ordering of tp (1) recursive in 3E, we may use the same sort of arguments as in parts 3 and 4.  相似文献   

16.
Summary The well-known and widely used Laplace resp. probability generating functionals are characterized by properties of positive definiteness and continuity. The methods applied come from Harmonic Analysis on semigroups, and allow also intrinsic characterizations for the transforms of infinitely divisible random measures and point processes.  相似文献   

17.
18.
If the arguments of a function G: d 1 are taken as quadratic functional defined on a space C of continuous functions, we obtain a functional G: C 1.We give a formula for computing analytic Feynman integrals of such functionals. We also propose a method of approximate computation of sequential Feynman integrals based on replacing the kernel of an integral operator by a degenerate kernel.Translated fromMatematicheskie Metody i Fiziko-Mekhanicheskie Polya, Issue 32, 1990, pp. 58–61.  相似文献   

19.
Mathematical Programming - We examine how the subdifferentials of nonconvex integral functionals can be deduced from the subdifferentials of the corresponding integrand or at least be estimated...  相似文献   

20.
Entropy (i.e. convex integral) functionals and extensions of these functionals are minimized on convex sets. This paper is aimed at reducing as much as possible the assumptions on the constraint set. Primal attainment, dual equalities, dual attainment and characterizations of the minimizers are obtained with weak constraint qualifications. These results improve several aspects of the literature on the subject.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号