首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G.  相似文献   

2.
<正> A nonconforming finite element method for the nonlinear parabolic equations is studied inthis paper.The convergence analysis is presented and the optimal error estimate in L~2(‖·‖_h)norm isobtained through Ritz projection technique,where ‖·‖_h is a norm over the finite element space.  相似文献   

3.
Consider heteroscedastic regression model Y ni = g(x ni ) + σ ni ɛ ni (1 ≤ in), where σ ni 2 = f(u ni ), the design points (x ni , u ni ) are known and nonrandom, g(·) and f(·) are unknown functions defined on closed interval [0, 1], and the random errors {ɛ ni , 1 ≤ in} are assumed to have the same distribution as {ξ i , 1 ≤ in}, which is a stationary and α-mixing time series with i = 0. Under appropriate conditions, we study asymptotic normality of wavelet estimators of g(·) and f(·). Finite sample behavior of the estimators is investigated via simulations, too.  相似文献   

4.
The clustering coefficient C of a network, which is a measure of direct connectivity between neighbors of the various nodes, ranges from 0 (for no connectivity) to 1 (for full connectivity). We define extended clustering coefficients C(h) of a small-world network based on nodes that are at distance h from a source node, thus generalizing distance-1 neighborhoods employed in computing the ordinary clustering coefficient C = C(1). Based on known results about the distance distribution Pδ(h) in a network, that is, the probability that a randomly chosen pair of vertices have distance h, we derive and experimentally validate the law Pδ(h)C(h) ≤ c log N / N, where c is a small constant that seldom exceeds 1. This result is significant because it shows that the product Pδ(h)C(h) is upper-bounded by a value that is considerably smaller than the product of maximum values for Pδ(h) and C(h). Extended clustering coefficients and laws that govern them offer new insights into the structure of small-world networks and open up avenues for further exploration of their properties.  相似文献   

5.
This paper proposes the least-squares Galerkin finite element scheme to solve second-order hyperbolic equations. The convergence analysis shows that the method yields the approximate solutions with optimal accuracy in (L 2(Ω))2 × L 2(Ω) norms. Moreover, the method gets the approximate solutions with second-order accuracy in time increment. A numerical example testifies the efficiency of the novel scheme.  相似文献   

6.
On the Convergence of a New Hybrid Projection Algorithm   总被引:1,自引:1,他引:0  
For unconstrained optimization, a new hybrid projection algorithm is presented m the paper. This algorithm has some attractive convergence properties. Convergence theory can be obtained under the condition that Δ↓f(x) is uniformly continuous. If Δ↓f(x) is continuously differentiable pseudo-convex, the whole sequence of iterates converges to a solution of the problem without any other assumptions. Furthermore, under appropriate conditions one shows that the sequence of iterates has a cluster-point if and only if Ω* ≠ θ. Numerical examples are given at the end of this paper.  相似文献   

7.
This paper discusses the inverse center location problem restricted on a tree with different costs and bound constraints. The authors first show that the problem can be formulated as a series of combinatorial linear programs, then an O(|V|^2 log |V|) time algorithm to solve the problem is presented. For the equal cost case, the authors further give an O(|V|) time algorithm.  相似文献   

8.
This paper studies the autoregression models of order one, in a general time series setting that allows for weakly dependent innovations. Let {X t } be a linear process defined by X t = Σ k=0ψ k ɛ tk , where {ψ k , k ≥ 0} is a sequence of real numbers and {ɛ k , k = 0, ±1, ±2, …} is a sequence of random variables. Two results are proved in this paper. In the first result, assuming that {ɛ k , k ≥ 1} is a sequence of asymptotically linear negative quadrant dependent (ALNQD) random variables, the authors find the limiting distributions of the least squares estimator and the associated regression t statistic. It is interesting that the limiting distributions are similar to the one found in earlier work under the assumption of i.i.d. innovations. In the second result the authors prove that the least squares estimator is not a strong consistency estimator of the autoregressive parameter α when {ɛ k , k ≥ 1} is a sequence of negatively associated (NA) random variables, and ψ 0 = 1, ψ k = 0, k ≥ 1.  相似文献   

9.
In this paper, the authors study the existence and non-existence of positive solutions for singular p-Laplacian equation −∆ p u = f(x)u −α + λg(x)u β in R N ; where N ≥ 3, 1 < p < N, λ > 0, 0 < α < 1, max(p, 2) < β + 1 < p* = \fracNpN - p \frac{{{N_p}}}{{N - p}} . We prove that there exists a critical value ¤ such that the problem has at least two solutions if 0 < λ < Λ; at least one solution if λ = Λ; and no solutions if λ > Λ.  相似文献   

10.
<正> In this paper,Scheffé and Simplified Scheffé simultaneous confidence intervals are firstconstructed for mean difference of several multivariate normal distributions.Then the authors theoreticallyprove that when there are only two populations,Bonferroni bounds and Simplified Scheffébounds are the same and they are shorter than Scheffé bounds for p10.In the case for 3k10and 2p10,there exists n(p,k)such that Bonferroni method is better than Simplified Schefféprocedure for nn(p,k),otherwise Simplified Scheffé procedure is better.Finally,the authors findout that neither of Scheffé critical values nor Simplified Scheffé critical values are always larger thananother through numerical calculation.  相似文献   

11.
In this paper, under the constraint that the average distance and the average degree (k) remain approximately constant, we studied a random scale-free network model. We found that, if the network maintains the form of its degree distribution and the maximal degree kc is N-dependent cutoff function kc(N)〈 N, the degree distribution would be approximately power-law with an exponent between 2 and 3. The distribution exponent has little relationship with the average degree, denoted by (k). The diameter constraint can be interpreted as an environmental selection pressure, which could explain the scale-free nature of networks. The numerical results indicate that, under the diameter constraint, the preferential attachment can produce the cutoff function kc(N)〈 N and power-law degree distribution.  相似文献   

12.
This paper is concerned with stability of a class of randomly switched systems of ordinary differential equations. The system under consideration can be viewed as a two-component process (X(t), α(t)), where the system is linear in X(t) and α(t) is a continuous-time Markov chain with a finite state space. Conditions for almost surely exponential stability and instability are obtained. The conditions are based on the Lyapunov exponent, which in turn, depends on the associate invariant density. Concentrating on the case that the continuous component is two dimensional, using transformation techniques, differential equations satisfied by the invariant density associated with the Lyapunov exponent are derived. Conditions for existence and uniqueness of solutions are derived. Then numerical solutions are developed to solve the associated differential equations.  相似文献   

13.
In this paper, we investigate the order of approximation by reproducing kernel spaces on (-1, 1) in weighted L^p spaces. We first restate the translation network from the view of reproducing kernel spaces and then construct a sequence of approximating operators with the help of Jacobi orthogonal polynomials, with which we establish a kind of Jackson inequality to describe the error estimate. Finally, The results are used to discuss an approximation problem arising from learning theory.  相似文献   

14.
Let Gn,d be a random d-regular graph with n vertices, where d = o(n). Given a fixed graph H, YH denotes the number of induced copies of H in Gn d In this paper, the authors determine the threshold of the event "YH 〉 0", and also obtain the induced subgraph counts inside the threshold interval.  相似文献   

15.
This paper considers two estimators of θ = g (x) in a nonparametric regression model Y = g (x) + ɛ (x ∈ (0, 1) p ) with missing responses: Imputation and inverse probability weighted estimators. Asymptotic normality of the two estimators is established, which is used to construct normal approximation based confidence intervals on θ.  相似文献   

16.
This paper investigates L~∞-estimates for the general optimal control problems governed by two-dimensional nonlinear elliptic equations with pointwise control constraints using mixed finite element methods.The state and the co-state are approximated by the lowest order Raviart-Thomas mixed finite element spaces and the control is approximated by piecewise constant functions.The authors derive L~∞-estimates for the mixed finite element approximation of nonlinear optimal control problems.Finally,the numerical examples are given.  相似文献   

17.
Σ-protocol has been proved to be a very powerful cryptographic tool and widely used in numerous important cryptographic applications. In this paper, the authors make use of Σ-protocol as a main tool to resolve the following difficult problems 1–3 and to construct three efficient cryptographic protocols 4–6:
1)  How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both ≡ 3(mod 4);
2)  How to construct a protocol for proving a secret polynomial with exact degree t − 1 in a (t, n)-threshold secret sharing scheme;
3)  How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;
4)  A publicly verifiable secret sharing scheme with information-theoretic security;
5)  A delegateable signature scheme under the existence of one-way permutations;
6)  Non-interactive universal designated verifier signature schemes.
This work was supported by the Foundation of the National Natural Science of China under Grant Nos. 90604034 (Key Project), 10726012, 10871222, 10531040, and 10471156.  相似文献   

18.
For a general second-order variable coefficient elliptic boundary value problem in three dimensions,the authors derive the weak estimate of the first type for tensor-product linear pentahedral finite elements.In addition,the estimate for the W1,1 -seminorm of the discrete derivative Green’s function is given.Finally,the authors show that the derivatives of the finite element solution uh and the corresponding interpolantΠu are superclose in the pointwise sense of the L-norm.  相似文献   

19.
Robustness analysis of leader-follower consensus   总被引:1,自引:0,他引:1  
In this paper, robustness properties of the leader-follower consensus are considered. For simplicity of presentation, the attention is focused on a group of continuous-time first-order dynamic agents with a time-invariant communication topology in the presence of communication errors. In order to evaluate the robustness of leader-follower consensus, two robustness measures are proposed: the L 2 gain of the error vector to the state of the network and the worst case L 2 gain at a node. Although the L 2 gain of the error vector to the state of the network is widely used in robust control design and analysis, the worst case L 2 gain at a node is less conservative with respect to the number of nodes in the network. It is thus suggested that the worst case L 2 gain at a node is used when the robustness of consensus is considered. Theoretical analysis and simulation results show that these two measures are sensitive to the communication topology. In general, the “optimal” communication topology that can achieve most robust performance with respect to either of the proposed robustness measures is difficult to characterize and/or obtain. When the in-degree of each follower is one, it is shown that both measures reach a minimum when the leader can communicate to each node in the network. This work is supported by the National Natural Science Foundation of China under Grant No. 60774005.  相似文献   

20.
We study a single-server queueing system with state-dependent arrivals and general service distribution, or simply M(n)/G/1/K, where the server follows an N policy and takes multiple vacations when the system is empty. We provide a recursive algorithm using the supplementary variable technique to numerically compute the stationary queue length distribution of the system. The only input requirements are the Laplace-Stieltjes transforms of the service time distribution and the vacation time distribution, and the state-dependent arrival rate. The computational complexity of the algorithm is O(K^3).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号