首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
By constructing a Gray map, a class of constacyclic codes over ring R = R+vR is studied. Using cyclic codes and negacyclic codes of length p s over ring R, the structure of (1?2v)-constacyclic codes and dual codes of length p s over ring R are given, the Gray images of (1 ? 2v)-constacyclic codes in a particular case are also studied. It is shown that linear codes of length p s over ring R are (1?2v)-constacyclic codes if and only if their Gray images are distance-invariant cyclic codes of length 2p s over ring R.  相似文献   

2.
This paper considers the Rosenau equation with a moving control?t u + ?_t?_x~4 u + ?_xu + u?x u = a(x + ct)h(x, t), c = 0, x ∈ T = R/(2πZ), t 0.The authors prove that the Rosenau equation with a moving control is locally exact controllable in Hs(T) with s ≥ 0 and globally exponential stable in H~s(T) with s ≥ 2. The two results nontrivially extend the work of(Rosier L and Zhang B Y, 2013) from the BBM equation to the Rosenau equation.  相似文献   

3.
The authors establish weighted L2-estimates of solutions for the damped wave equations with variable coefficients u tt ? divA(x)?u+au t = 0 in ? n under the assumption a(x) ≥ a0[1+ρ(x)]?l, where a0 > 0, l < 1, ρ(x) is the distance function of the metric g = A?1(x) on ? n . The authors show that these weighted L2-estimates are closely related to the geometrical properties of the metric g = A?1(x).  相似文献   

4.
The weight hierarchy of a linear [n; k; q] code C over GF(q) is the sequence (d 1, d 2, ···, d k ) where d r is the smallest support of any r-dimensional subcode of C. “Determining all possible weight hierarchies of general linear codes” is a basic theoretical issue and has important scientific significance in communication system. However, it is impossible for q-ary linear codes of dimension k when q and k are slightly larger, then a reasonable formulation of the problem is modified as: “Determine almost all weight hierarchies of general q-ary linear codes of dimension k”. In this paper, based on the finite projective geometry method, the authors study q-ary linear codes of dimension 5 in class IV, and find new necessary conditions of their weight hierarchies, and classify their weight hierarchies into 6 subclasses. The authors also develop and improve the method of the subspace set, thus determine almost all weight hierarchies of 5-dimensional linear codes in class IV. It opens the way to determine the weight hierarchies of the rest two of 5-dimensional codes (classes III and VI), and break through the difficulties. Furthermore, the new necessary conditions show that original necessary conditions of the weight hierarchies of k-dimensional codes were not enough (not most tight nor best), so, it is important to excogitate further new necessary conditions for attacking and solving the k-dimensional problem.  相似文献   

5.
In many auctions, buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper, two objects are sold sequentially and each buyer’s valuation for the second object is k times that for the first one, and the true value of k is sellers’ private information. The authors identify three factors which affect sellers’ revelation strategies: The market’s competition intensity which is characterized by the number of buyers, buyers’ prior information about the second object, and the difference degree between two objects which is characterized by k. The authors give not only conditions under which revealing information about the second object in advance benefits the seller, but also the optimal releasing amount of information in the market with two sellers and one seller, respectively.  相似文献   

6.
This paper presents a new algorithm for computing the extended Hensel construction(EHC) of multivariate polynomials in main variable x and sub-variables u_1, u_2, ···, u_m over a number field K. This algorithm first constructs a set by using the resultant of two initial coprime factors w.r.t. x, and then obtains the Hensel factors by comparing the coefficients of x~i on both sides of an equation. Since the Hensel factors are polynomials of the main variable with coefficients in fraction field K(u_1, u_2, ···, u_m), the computation cost of handling rational functions can be high. Therefore,the authors use a method which multiplies resultant and removes the denominators of the rational functions. Unlike previously-developed algorithms that use interpolation functions or Gr?bner basis, the algorithm relies little on polynomial division, and avoids multiplying by different factors when removing the denominators of Hensel factors. All algorithms are implemented using Magma, a computational algebra system and experiments indicate that our algorithm is more efficient.  相似文献   

7.
This paper considers two parallel machine scheduling problems,where the objectives of both problems are to minimize the makespan,and the jobs arrive over time,on two uniform machines with speeds 1 and s(s≥1),and on m identical machines,respectively.For the first problem,the authors show that the on-line LPT algorithm has a competitive ratio of(1 +5~(1/2))/2≈1.6180 and the bound is tight.Furthermore,the authors prove that the on-line LPT algorithm has the best possible competitive ratio if s≥1.8020.For the second problem,the authors present a lower bound of(15-(17)~(1/2))/8≈1.3596 on the competitive ratio of any deterministic on-line algorithm.This improves a previous result of 1.3473.  相似文献   

8.
This paper is devoted to the construction of one-Lee weight codes and two-Lee weight codes over F p + vF p (v 2 = v) with type \({p^{2{k_1}}}{p^{{k_2}}}{p^{{k_3}}}\) based on two different distance-preserving Gray maps from ((F p + vF p ) n , Lee weight) to (F p 2n , Hamming weight), where p is a prime. Moreover, the authors prove that the obtained two-Lee weight codes are projective only when p = 2.  相似文献   

9.
Generalized B-splines have been employed as geometric modeling and numerical simulation tools for isogeometric analysis(IGA for short). However, the previous models used in IGA,such as trigonometric generalized B-splines or hyperbolic generalized B-splines, are not the unified mathematical representation of conics and polynomial parametric curves/surfaces. In this paper,a unified approach to construct the generalized non-uniform B-splines over the space spanned by{α(t), β(t), ξ(t), η(t), 1, t, ···, t~(n-4)} is proposed, and the corresponding isogeometric analysis framework for PDE solving is also studied. Compared with the NURBS-IGA method, the proposed frameworks have several advantages such as high accuracy, easy-to-compute derivatives and integrals due to the non-rational form. Furthermore, with the proposed spline models, isogeometric analysis can be performed on the computational domain bounded by transcendental curves/surfaces, such as the involute of circle, the helix/helicoid, the catenary/catenoid and the cycloid. Several numerical examples for isogeometric heat conduction problems are presented to show the effectiveness of the proposed methods.  相似文献   

10.
This paper addresses a dynamic lot sizing problem with bounded inventory and stockout where both no backlogging and backlogging allowed cases are considered. The stockout option means that there is outsourcing in a period only when the inventory level at that period is non-positive. The production capacity is unlimited and production cost functions are linear but with fixed charges. The problem is that of satisfying all demands in the planning horizon at minimal total cost. We show that the no backlogging case can be solved in ) O(T 2) time with general concave inventory holding and outsourcing cost functions where T is the length of the planning horizon. The complexity can be reduced to O(T) when the inventory holding cost functions are also linear and have some realistic properties, even if the outsourcing cost functions remain general concave functions. When the inventory holding and outsourcing cost functions are linear, the backlogging case can be solved in O(T 3logT) time whether the outsourcing level at each period is bounded by the sum of the demand of that period and backlogging level from previous periods, or only by the demand of that period.  相似文献   

11.
The paper focused on how a system dynamics modeler could reduce model development and testing time by using “Generic Structures” as an interim benchmark between causal loop diagram and stock flow diagram. Using generic structures as a benchmark could prevent the modeler from including redundant structures to the model and getting affected by personal biases that in turn could reduce repetitive amendments to the model during model testing. Indian Shrimp Industry, during 1990–2010, sequentially showed an early growth, a hasty decline, a combative rejuvenation, and an inexorable re-decline behavior in terms of the annual shrimp production and production capacity. Average Yield continuously fluctuated throughout the Industry’s life cycle during 1990–2010. Breaking such progressive behavior into temporal units, we found that the unit behaviors resemble with the behaviors of generic structures like, exponential growth, goal-seeking, S-shaped growth, limits to success, and overshoot-and-collapse. We, using the related generic structures as the interim benchmarks, illustrated a step-by-step modeling exercise for studying the dynamic behavior of Indian Shrimp Industry during 1990–2010. The paper concluded that using generic structures as the benchmark during system dynamics modeling improved the efficiency and the effectiveness of model building due to reduction in model building and testing time.  相似文献   

12.
This paper considers the departure process and the optimal control strategy for a discretetime Geo/G/1 queueing model in which the system operates under the control of multiple server vacations and Min(N, V)-policy. Using the law of total probability decomposition, the renewal theory and the probability generating function technique, the transient and the steady-state probabilities that the server is busy at any epoch n+ are derived. The authors also obtain the explicit expression of the probability generating function for the expected number of departures occurring in the time interval (0+, n+] from any initial state. Meanwhile, the relationship among departure process, server’s state process and service renewal process in server busy period is found, which shows the special structure of departure process. Especially, some corresponding results of departure process for special discrete-time queues are directly gained by our results. Furthermore, the approximate expansion for calculating the expected number of departures is presented. In addition, some other important performance measures, including the expected length of server busy period, server’s actual vacation period and busy cycle period etc., are analyzed. Finally, some numerical results are provided to determine the optimum value N* for minimizing the system cost under a given cost structure.  相似文献   

13.
The trace inverse functions Tr(λx~(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx~(-1)).However,currently only some bounds on algebraic immunity of Tr(λx~(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx~(-1)) over F_(2~n),that is,AI(Tr(λx~(-1))) =[2n~(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx~(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx~(-1)) against fast algebraic attacks.  相似文献   

14.
For the two-parameter inverse Gaussian distribution denoted by I G(μ,λ),the authors employ a linear Bayes procedure to estimate the parameters μ and λ.The superiority of the proposed linear Bayes estimator(LBE) over both the classical UMVUE and the maximum likelihood estimator(MLE) is established in terms of the mean squared error matrix(MSEM) criterion.Compared with the usual Bayes estimator,which is obtained by an MCMC method,the proposed LBE is simple and easy to use.Some numerical results are presented to verify that the LBE performs well.  相似文献   

15.
This paper considers partial function linear models of the form Y =∫X(t)β(t)dt + g(T)with Y measured with error. The authors propose an estimation procedure when the basis functions are data driven, such as with functional principal components. Estimators of β(t) and g(t) with the primary data and validation data are presented and some asymptotic results are given. Finite sample properties are investigated through some simulation study and a real data application.  相似文献   

16.
This paper considers a discrete-time Geo/G/1 queue under the Min(N,D)-policy in which the idle server resumes its service if either N customers accumulate in the system or the total backlog of the service times of the waiting customers exceeds D, whichever occurs first (Min(N,D)-policy). By using renewal process theory and total probability decomposition technique, the authors study the transient and equilibrium properties of the queue length from the beginning of the arbitrary initial state, and obtain both the recursive expression of the z-transformation of the transient queue length distribution and the recursive formula for calculating the steady state queue length at arbitrary time epoch n +. Meanwhile, the authors obtain the explicit expressions of the additional queue length distribution. Furthermore, the important relations between the steady state queue length distributions at different time epochs n -, n and n + are also reported. Finally, the authors give numerical examples to illustrate the effect of system parameters on the steady state queue length distribution, and also show from numerical results that the expressions of the steady state queue length distribution is important in the system capacity design.  相似文献   

17.
This paper deduces the structure of LCD negacyclic codes over the finite field Fq, where q is an odd prime power. Based on the study of q-cyclotomic cosets modulo 2 n, the authors obtain the parameters of LCD negacyclic codes of lengths n =(q+1)/2,(q~m-1)/2(q-1)and q~(t·2~τ)-1/2(q~t +1), respectively. And many optimal codes are given. Moreover, the authors research two special classes of MDS LCD negacyclic codes of length n |(q-1)/2 and n |(q+1)2, respectively.  相似文献   

18.
This paper studies an M/M/1 queueing-inventory system with batch demands. Customers arrive in the system according to a compound Poisson process, where the size of the batch demands for each arrival is a random variable that follows a geometric distribution. The inventory is replenished according to the standard (s,S) policy. The replenishment time follows an exponential distribution. Two models are considered. In the first model, if the on-hand inventory is less than the size of the batch demands of an arrived customer, the customer takes away all the items in the inventory, and a part of the customer’s batch demands is lost. In the second model, if the on-hand inventory is less than the size of the batch demands of an arrived customer, the customer leaves without taking any item from the inventory, and all of the customer’s batch demands are lost. For these two models, the authors derive the stationary conditions of the system. Then, the authors derive the stationary distributions of the product-form of the joint queue length and the on-hand inventory process. Besides this, the authors obtain some important performance measures and the average cost functions by using these stationary distributions. The results are illustrated by numerical examples.  相似文献   

19.
In this paper, adaptive event-based consensus of multi-agent systems with general linear dynamics is considered. A novel adaptive event-based controller and a state-dependent triggering function are proposed for each agent. The consensus can be achieved without the assumption that (A,B) is stabilizable. Furthermore, the Zeno-behavior of the concerned closed-loop system is also excluded under certain conditions. Finally, a numerical simulation example is presented to show the effectiveness of the theoretical results.  相似文献   

20.
On the axioms of revealed preference in fuzzy consumer theory   总被引:5,自引:0,他引:5  
The revealed preference is a central subject in classical consumer theory.Authors likeSamuelson,Arrow,Richter,Sen,Uzawa and others have proposed an axiomatic setting of revealedpreference theory.Consequently revealed preference axioms WARP and SARP and congruence axioms WCA andSCA have been considered.An important theorem of Sen establishes the equivalence between these axioms provided thefamily of budgets includes all non-empty finite sets of bundles.Fuzzy consumer theory(=fuzzy choice functions)is a topic that appears in a lot of papers.Particularly,Banerjee studies in fuzzy context axioms of revealed preference and congruenceextending some results of Arrow and Sen.In this paper we modify the Banerjee definition of a fuzzy choice function(=fuzzy consumer)and we study some fuzzy versions of the axioms of revealed preference and congruence.Banerjeefuzzifies only the range of a consumer;we use a fuzzification of both the domain and the range of aconsumer.The axioms WAFRP,SAFRP,WFCA,SFCA generalize to fu  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号