Let g be a Lie algebra all of whose regular subalgebras of rank 2 are type A1×A1, A2, or C2, and let B be a crystal graph corresponding to a representation of g. We explicitly describe the local structure of B, confirming a conjecture of Stembridge. 相似文献
We study Pauli-Fierz Hamiltonians-self-adjoint operators describing a small quantum system interacting with a bosonic field. Using quadratic form techniques, we extend the results of Dereziński-Gérard and Gérard about the self-adjointness, the location of the essential spectrum and the existence of a ground state to a large class of Pauli-Fierz Hamiltonians. 相似文献
The non-commutative (NC) CP(1) model is studied from field theory perspective. Our formalism and definition of the NC CP(1) model differs crucially from the existing one [Phys. Lett. B 498 (2001) 277, hep-th/0203125, hep-th/0303090].
Due to the U(1) gauge invariance, the Seiberg–Witten map is used to convert the NC action to an action in terms of ordinary spacetime degrees of freedom and the subsequent theory is studied. The NC effects appear as (NC parameter) θ-dependent interaction terms. The expressions for static energy, obtained from both the symmetric and canonical forms of the energy momentum tensor, are identical, when only spatial noncommutativity is present. Bogomolny analysis reveals a lower bound in the energy in an unambiguous way, suggesting the presence of a new soliton. However, the BPS equations saturating the bound are not compatible to the full variational equation of motion. This indicates that the definitions of the energy momentum tensor for this particular NC theory (the NC theory is otherwise consistent and well defined), are inadequate, thus leading to the “energy crisis”.
A collective coordinate analysis corroborates the above observations. It also shows that the above mentioned mismatch between the BPS equations and the variational equation of motion is small. 相似文献
We study in this paper the active control of a driven class of Van der Pol oscillator which exhibits three limit cycles. We begin by investigating the dynamics and stability analysis of the system under active control. We also analyze the effects of a time periodic perturbation included in the control process. In all these cases the domain of control gain parameters leading to a good control is obtained and verified numerically. 相似文献
In this paper we apply linear control theory to study the effect of various inventory policies on order and inventory variability, which are key drivers of supply chain performance. In particular, we study a two-echelon supply chain with a stationary demand pattern under the influence of three inventory policies: an inventory-on-hand policy that bases orders on the visible inventory at an installation, an installation-stock policy that bases orders on the inventory position (on-hand plus on-order inventory) at an installation, and an echelon-stock policy that bases orders on the inventory position at that installation and all downstream installations. We prove analytically that the inventory-on-hand policy is unstable in practical settings, confirming analytically what has been observed in experimental settings and in practice. We also prove that the installation-stock and echelon-stock policies are stable and analyze their effect on order and inventory fluctuation. Specifically, we show the general superiority of the echelon-stock in our setting and demonstrate analytically the effect of forecasting parameters on order and inventory fluctuations, confirming the results in other research. 相似文献
We study a leader follower game with two players: a terrorist and a state where the later one installs facilities that provide support in case of a terrorist attack. While the Terrorist attacks one of the metropolitan areas to maximize his utility, the State, which acts as a leader, installs the facilities such that the metropolitan area attacked is the one that minimizes her disutility (i.e., minimizes ‘loss’). We solve the problem efficiently for one facility and we formulate it as a mathematical programming problem for a general number of facilities. We demonstrate the problem via a case study of the 20 largest metropolitan areas in the United States. 相似文献
In apparel industry, manufacturers developed standard allowed minutes (SAMs) databases on various manufacturing operations in order to facilitate better scheduling, while effective production schedules ensure smoothness of downstream operations. As apparel manufacturing environment is fuzzy and dynamic, rigid production schedules based on SAMs become futile in the presence of any uncertainty. In this paper, a fuzzification scheme is proposed to fuzzify the static standard time so as to incorporate some uncertainties, in terms of both job-specific and human related factors, into the fabric-cutting scheduling problem. A genetic optimisation procedure is also proposed to search for fault-tolerant schedules using genetic algorithms, such that makespan and scheduling uncertainties are minimised. Two sets of real production data were collected to validate the proposed method. Experimental results indicate that the genetically optimised fault-tolerant schedules not only improve the operation performance but also minimise the scheduling risks. 相似文献
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular,
we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject
to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first
to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed
arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of
this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality
on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action:
an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits
obtained from transmitting flows. 相似文献