首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper gives a theoretical analysis for the algorithms to compute functional decomposition for multivariate polynomials based on differentiation and homogenization which were proposed by Ye,Dai,and Lam(1999) and were developed by Faugere,Perret(2006,2008,2009).The authors show that a degree proper functional decomposition for a set of randomly decomposable quartic homogenous polynomials can be computed using the algorithm with high probability.This solves a conjecture proposed by Ye,Dai,and Lam(1999).The authors also propose a conjecture which asserts that the decomposition for a set of polynomials can be computed from that of its homogenization and show that the conjecture is valid with high probability for quartic polynomials.Finally,the authors prove that the right decomposition factors for a set of polynomials can be computed from its right decomposition factor space.  相似文献   

2.
This paper investigates a non-Bayesian social learning model, in which each individual updates her beliefs based on private signals as well as her neighbors' beliefs. The private signM is involved in the updating process through Bayes' rule, and the neighbors' beliefs are embodied in through a weighted average form, where the weights are time-varying. The authors prove that agents eventually have correct forecasts for upcoming signals, and all the beliefs of agents reach a consensus. In addition, if there exists no state that is observationally equivalent to the true state from the point of view of all agents, the authors show that the consensus belief of the whole group eventually reflects the true state.  相似文献   

3.
Almost perfect sequences based on cyclic difference sets   总被引:1,自引:0,他引:1       下载免费PDF全文
The perfect sequences are so ideal that all out-of-phase autocorrelation coefficients are zero, and if the sequences are used as the coding modulating signal for the phase-modulated radar, there will be no interference of side lobes theoretically. However, it has been proved that there are no binary perfect sequences of period 4 < n≤ 12100. Hence, the almost perfect sequences with all out-of-phase autocorrelation coefficients as zero except one are of great practice in engineering. Currently, the cyclic difference set is one of most effective tools to analyze the binary sequences with perfect periodic autocorrelation function. In this article, two characteristic formulas corresponding to the autocorrelation and symmetric structure of almost perfect sequences are calculated respectively. All almost perfect sequences with period n, which is a multiple of 4, can be figured out by the two formulas. Several almost perfect sequences with different periods have been hunted by the program based on the two formulas and then applied to the simulation program and practical application for ionospheric sounding.  相似文献   

4.
This paper studies the sensor selection problem for random field estimation in wireless sensor networks.The authors first prove that selecting a set of l sensors that minimize the estimation error under the D-optimal criterion is NP-complete.The authors propose an iterative algorithm to pursue a suboptimal solution.Furthermore,in order to improve the bandwidth and energy efficiency of the wireless sensor networks,the authors propose a best linear unbiased estimator for a Gaussian random field with quantized measurements and study the corresponding sensor selection problem.In the case of unknown covariance matrix,the authors propose an estimator for the covariance matrix using measurements and also analyze the sensitivity of this estimator.Simulation results show the good performance of the proposed algorithms.  相似文献   

5.
In this paper,the Josephson equation and its autonomous case are considered.It isshown that for |α|<1 and β>γ>1 or β<γ<-1,there is no periodic solution of the autonomousJosephson equation,For the nonautonomous case,some suffcient conditions for the existence ofperiodic solutions are given.  相似文献   

6.
Elias, et al.(2016) conjectured that the Kazhdan-Lusztig polynomial of any matroid is logconcave. Inspired by a computer proof of Moll’s log-concavity conjecture given by Kauers and Paule,the authors use a computer algebra system to prove the conjecture for arbitrary uniform matroids.  相似文献   

7.
In the literature(Tan and Wang,2010),Tan and Wang investigated the convergence of the split-step backward Euler(SSBE) method for linear stochastic delay integro-differential equations (SDIDEs) and proved the mean-square stability of SSBE method under some condition.Unfortunately, the main result of stability derived by the condition is somewhat restrictive to be applied for practical application.This paper improves the corresponding results.The authors not only prove the mean-square stability of the numerical method but also prove the general mean-square stability of the numerical method.Furthermore,an example is given to illustrate the theory.  相似文献   

8.
Hilbert problem 15 requires to understand Schubert's book. In this book, there is a theorem in §23, about the relation of the tangent lines from a point and the singular points of cubed curves with cusp near a 3-multiple straight line, which was obtained by the so called main trunk numbers, while for these numbers, Schubert said that he obtained them by experiences. So essentially Schubert even did not give any hint for the proof of this theorem. In this paper, by using the concept of generic point in the framework of Van der Waerden and Weil on algebraic geometry, and realizing Ritt-Wu method on computer, the authors prove that this theorem of Schubert is completely right.  相似文献   

9.
THE LINEAR ARBORICITY OF COMPOSITION GRAPHS   总被引:1,自引:0,他引:1  
The linear arboricity la(G) of a graph G is the minimum number of linear forests which partition the edges of G. Akiyama, Exoo and Harary conjectured that la(G) = [△(G) 1/2] for any regular graph G. In this paper, we prove the conjecture for some composition graphs, in particular, for complete multipartite graphs.  相似文献   

10.
Recurrent events data with a terminal event(e.g.,death) often arise in clinical and observational studies.Variable selection is an important issue in all regression analysis.In this paper, the authors first propose the estimation methods to select the significant variables,and then prove the asymptotic behavior of the proposed estimator.Furthermore,the authors discuss the computing algorithm to assess the proposed estimator via the linear function approximation and generalized cross validation method for determination of the tuning parameters.Finally,the finite sample estimation for the asymptotical covariance matrix is also proposed.  相似文献   

11.
Hajos' conjecture asserts that a simple eulerian graph on n vertices can be decomposed into at most n-1/2 circuits. In this paper, we propose a new conjecture which is equivalent to Hajos' conjecture, and show that to prove Hajos' conjecture, it is sufficient to prove this new conjecture for 3-connected graphs. Furthermore, a special 3-cut is considered also.  相似文献   

12.
This paper presents a characteristic more efficient and has better properties than the set method for solving Boolean equations, which is general characteristic set method. In particular, the authors give a disjoint and monic zero decomposition algorithm for the zero set of a Boolean equation system and an explicit formula for the number of solutions of a Boolean equation system. The authors also prove that a characteristic set can be computed with a polynomial number of multiplications of Boolean polynomials in terms of the number of variables. As experiments, the proposed method is used to solve equations from cryptanalysis of a class of stream ciphers based on nonlinear filter generators. Extensive experiments show that the method is quite effective.  相似文献   

13.
This paper considers the convergence rate of an asymmetric Deffuant-Weisbuch model.The model is composed by finite n interacting agents.In this model,agent i’s opinion is updated at each time,by first selecting one randomly from n agents,and then combining the selected agent j’s opinion if the distance between j’s opinion and i’s opinion is not larger than the confidence radiusε0.This yields the endogenously changing inter-agent topologies.Based on the previous result that all agents opinions will converge almost surely for any initial states,the authors prove that the expected potential function of the convergence rate is upper bounded by a negative exponential function of time t when opinions reach consensus finally and is upper bounded by a negative power function of time t when opinions converge to several different limits.  相似文献   

14.
Let F be a field of characteristic zero. W_n =is the Witt algebra over F, W_n~ =is Lie subalgebra of W_n. It is well known both W_n and W_n~ are simple infinite dimensional Lie algebra. In Zhao's paper, it was conjectured thatEnd(W_n~ ) - {0} = Aut(W_n~ ) and it was proved that the validity of this conjecture im-plies the validity of the well-known Jacobian conjecture. In this short note, we check theconjecture above for n = 1. We show End(W_1~ ) - {0} = Aut(W_1~ ).  相似文献   

15.
AN ADAPTIVE TRUST REGION METHOD FOR EQUALITY CONSTRAINED OPTIMIZATION   总被引:1,自引:0,他引:1  
In this paper, a trust region method for equality constrained optlmization based on nondiferentiable exact penalty is proposed. In this algorithin, the trail step is characterized by computation of its normal component being separated from computation of its tangential component, i.e., only the tangential component of the trail step is constrained by trust radius while the normal component and trail step itself have no constraints. The other main characteristic of the algorithm is the decision of trust region radius. Here, the decision of trust region radius uses the information of the gradient of objective function and reduced Hessian. However, Maratos effect will occur when we use the nondifferentiable exact penalty function as the merit function. In order to obtain the superlinear convergence of the algorithm, we use the twice order correction technique. Because of the speciality of the adaptive trust region method, we use twice order correction when p= 0 (the definition is as in Section 2) and this is different from the traditional trust region methods for equality constrained opthnization. So the computation of the algorithm in this paper is reduced. What is more, we can prove that the algorithm is globally and superlinearly convergent.  相似文献   

16.
Jin  Kai  Cheng  Jinsan 《系统科学与复杂性》2020,33(1):230-260
This paper presents a symbolic algorithm to compute the topology of a plane curve. This is a full version of the authors' CASC15 paper. The algorithm mainly involves resultant computations and real root isolation for univariate polynomials. Compared to other symbolic methods based on elimination techniques, the novelty of the proposed method is that the authors use a technique of interval polynomials to solve the system f(α, y),?f/?y(α, y)and simultaneously obtain numerous simple roots of f(α, y) = 0 on the α fiber. This significantly improves the efficiency of the lifting step because the authors are no longer required to compute the simple roots of f(α, y) = 0. After the topology is computed, a revised Newton's method is presented to compute an isotopic meshing of the plane algebraic curve. Though the approximation method is numerical, the authors can ensure that the proposed method is a certified one, and the meshing is topologically correct. Several nontrivial examples confirm that the proposed algorithm performs well.  相似文献   

17.
Hajos‘ conjecture asserts that a simple eulerian graph on n vertices can be decomposed into at most n-1/2 circuits,In this paper,we propose a new conjecture which is equivalent to Hajos‘ conjecture.and show that to prove Hajos‘ conjecture,it is sufficent to prove this new conjecture for 3-connected graphs.Furthermore,a special 3-cut is considered also.  相似文献   

18.
This paper formulates a robust stage-structured SI eco-epidemiological model with periodic constant pulse releasing of infectious pests with pathogens. The authors show that the conditions for global attractivity of the 'pest-eradication' periodic solution and permanence of the system depend on time delay, hence, the authors call it "profitless". Further, the authors present a pest management strategy in which the pest population is kept under the economic threshold level (ETL) when the pest population is uniformly persistent. By numerical analysis, the authors also show that constant maturation time delay for the susceptible pests and pulse releasing of the infectious pests can bring obvious effects on the dynamics of system.  相似文献   

19.
<正> In this paper,Scheffé and Simplified Scheffé simultaneous confidence intervals are firstconstructed for mean difference of several multivariate normal distributions.Then the authors theoreticallyprove that when there are only two populations,Bonferroni bounds and Simplified Scheffébounds are the same and they are shorter than Scheffé bounds for p10.In the case for 3k10and 2p10,there exists n(p,k)such that Bonferroni method is better than Simplified Schefféprocedure for nn(p,k),otherwise Simplified Scheffé procedure is better.Finally,the authors findout that neither of Scheffé critical values nor Simplified Scheffé critical values are always larger thananother through numerical calculation.  相似文献   

20.
The soliton resolution conjecture proposes that the initial value problem can evolve into a dispersion part and a soliton part. However, the problem of determining the number of solitons that form in a given initial profile remains unsolved, except for a few specific cases. In this paper, the authors use the deep learning method to predict the number of solitons in a given initial value of the Korteweg-de Vries(Kd V) equation. By leveraging the analytical relationship between Asech2(x) initial v...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号