首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, the authors study the existence and non-existence of positive solutions for singular p-Laplacian equation −∆ p u = f(x)u −α + λg(x)u β in R N ; where N ≥ 3, 1 < p < N, λ > 0, 0 < α < 1, max(p, 2) < β + 1 < p* = \fracNpN - p \frac{{{N_p}}}{{N - p}} . We prove that there exists a critical value ¤ such that the problem has at least two solutions if 0 < λ < Λ; at least one solution if λ = Λ; and no solutions if λ > Λ.  相似文献   

2.
The purpose of this paper is to present a general iterative scheme as below:
and to prove that, if {α n } and {r n } satisfy appropriate conditions, then iteration sequences {x n } and {u n } converge strongly to a common element of the set of solutions of an equilibrium problem and the set of fixed points of a nonexpansive mapping and the set of solution of a variational inequality, too. Furthermore, by using the above result, we can also obtain an iterative algorithm for solution of an optimization problem , where h(x) is a convex and lower semicontinuous functional defined on a closed convex subset C of a Hilbert space H. The results presented in this paper extend, generalize and improve the results of Combettes and Hirstoaga, Wittmann, S.Takahashi, Giuseppe Marino, Hong-Kun Xu, and some others. This research is supported by the National Natural Science Foundation of China under Grant No. 10771050.  相似文献   

3.
Consider heteroscedastic regression model Y ni = g(x ni ) + σ ni ɛ ni (1 ≤ in), where σ ni 2 = f(u ni ), the design points (x ni , u ni ) are known and nonrandom, g(·) and f(·) are unknown functions defined on closed interval [0, 1], and the random errors {ɛ ni , 1 ≤ in} are assumed to have the same distribution as {ξ i , 1 ≤ in}, which is a stationary and α-mixing time series with i = 0. Under appropriate conditions, we study asymptotic normality of wavelet estimators of g(·) and f(·). Finite sample behavior of the estimators is investigated via simulations, too.  相似文献   

4.
In generalized linear models with fixed design, under the assumption λ↑_n→∞ and other regularity conditions, the asymptotic normality of maximum quasi-likelihood estimator ^↑βn, which is the root of the quasi-likelihood equation with natural link function ∑i=1^n Xi(yi -μ(Xi′β)) = 0, is obtained, where λ↑_n denotes the minimum eigenvalue of ∑i=1^nXiXi′, Xi are bounded p × q regressors, and yi are q × 1 responses.  相似文献   

5.
We propose a new family of interconnection networks (WGn^m) with regular degree three. When the generator set is chosen properly, they are isomorphic to Cayley graphs on the wreath product Zm ~ Sn. In the case of m ≥ 3 and n ≥3, we investigate their different algebraic properties and give a routing algorithm with the diameter upper bounded by [m/2](3n^2- 8n + 4) - 2n + 1. The connectivity and the optimal fault tolerance of the proposed networks are also derived. In conclusion, we present comparisons of some familiar networks with constant degree 3.  相似文献   

6.
The authors establish weighted L2-estimates of solutions for the damped wave equations with variable coefficients u tt ? divA(x)?u+au t = 0 in ? n under the assumption a(x) ≥ a0[1+ρ(x)]?l, where a0 > 0, l < 1, ρ(x) is the distance function of the metric g = A?1(x) on ? n . The authors show that these weighted L2-estimates are closely related to the geometrical properties of the metric g = A?1(x).  相似文献   

7.
Wireless sensor networks promise a new paradigm for gathering data via collaboration among sensors spreading over a large geometrical region. Many applications impose delay requirements for data gathering and ask for time-efficient schedules for aggregating sensed data and sending to the data sink. In this paper, the authors study the minimum data aggregation time problem under collision-free transmission model. In each time round, data sent by a sensor reaches all sensors within its transmission range, but a sensor can receive data only when it is the only data that reaches the sensor. The goal is to find the method that schedules data transmission and aggregation at sensors so that the time for all requested data to be sent to the data sink is minimal. The authors propose a 7△/log2|s|+c, new approximation algorithm for this NP-hard problem with guaranteed performance ratio which significantly reduces the current best ratio of △- 1, where S is the set of sensors containing source data, A is the maximal number of sensors within the transmission range of any sensor, and e is a constant. The authors also conduct extensive simulation, the obtained results justify the improvement of proposed algorithm over the existing one.  相似文献   

8.
It has been observed in laboratory experiments that when nonlinear dispersive waves are forced periodically from one end of undisturbed stretch of the medium of propagation, the signal eventually becomes temporally periodic at each spatial point. The observation has been confirmed mathematically in the context of the damped Korteweg-de Vries (KdV) equation and the damped Benjamin-Bona-Mahony (BBM) equation. In this paper we intend to show the same results hold for the pure KdV equation (without the damping terms) posed on a finite domain. Consideration is given to the initial-boundary-value problem {ut+ux+uux+uxxx=0, u(x,0)=φ(x), 0〈x〈1, t〉0,u(0,t)=h(t), u(1,t) = 0, ux(1,t) = 0, t〉0.It is shown that if the boundary forcing h is periodic with small ampitude, then the small amplitude solution u of (*) becomes eventually time-periodic. Viewing (*) (without the initial condition) as an infinite-dimensional dynamical system in the Hilbert space L^2(0, 1), we also demonstrate that for a given periodic boundary forcing with small amplitude, the system (*) admits a (locally) unique limit cycle, or forced oscillation, which is locally exponentially stable. A list of open problems are included for the interested readers to conduct further investigations.  相似文献   

9.
Ia this paper, we consider a semi on-line version on two uniform machines Mi, i = 1, 2, where the processing time of the largest job is known in advance. A speed si(s1 = 1, 1 ≤s2 = s) is associated with machine Mi. Our goal is to maximize the Cmin. We give a Cmin 2 algorithm and prove its competitive ratio is at most 2s+1/s+1 We also claim the Cmin 2 algorithm is tight and the gap between the competitive ratio of Cmin2 algorithm and the optimal value is not greater than 0.555. It is obvious that our result coincides with that given by He for s =1.  相似文献   

10.
This paper discusses the inverse center location problem restricted on a tree with different costs and bound constraints. The authors first show that the problem can be formulated as a series of combinatorial linear programs, then an O(|V|^2 log |V|) time algorithm to solve the problem is presented. For the equal cost case, the authors further give an O(|V|) time algorithm.  相似文献   

11.
The trace inverse functions Tr(λx~(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx~(-1)).However,currently only some bounds on algebraic immunity of Tr(λx~(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx~(-1)) over F_(2~n),that is,AI(Tr(λx~(-1))) =[2n~(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx~(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx~(-1)) against fast algebraic attacks.  相似文献   

12.
ON (∈, ∈ ∨q)-FUZZY FILTERS OF BL-ALGEBRAS   总被引:1,自引:0,他引:1  
The authors introduce the notions of (∈, ∈ ∨q)-fuzzy Boolean (implicative, positive implicative, and fantastic) filters in BL-algebras, present some characterizations on these generalized fuzzy filters, and describe the relations among these generalized fuzzy filters. It is proved that an (∈, ∈ ∨q)fuzzy filter in a BL-algebra is Boolean (implicative) if and only if it is both positive implicative and fantastic.  相似文献   

13.
This paper considers the semiparametric regression model j/j= Xif3+g(U)+Vi(1 < i < n), where(xi,ti) are known design points,/3 is an unknown slope parameter,g(·) is an unknown function, the correlated errors Vi=∑j=-∞cjei-jwith∑j=-∞|cj|<∞,and ei negatively associated random variables.Under appropriate conditions,the authors study the asymptotic normality for wavelet estimators ofβand g(·).A simulation study is undertaken to investigate finite sample behavior of the estimators.  相似文献   

14.
This paper considers two estimators of θ = g (x) in a nonparametric regression model Y = g (x) + ɛ (x ∈ (0, 1) p ) with missing responses: Imputation and inverse probability weighted estimators. Asymptotic normality of the two estimators is established, which is used to construct normal approximation based confidence intervals on θ.  相似文献   

15.
This paper presents an algorithm that tests whether a given degree-bounded digraph is k-edge-connected or ɛ-far from k-edge-connectivity. This is the first testing algorithm for k-edgeconnectivity of digraphs whose running time is independent of the number of vertices and edges. A digraph of n vertices with degree bound d is ɛ-far from k-edge-connectivity if at least ɛdn edges have to be added or deleted to make the digraph k-edge-connected, preserving the degree bound. Given a constant error parameter ɛ and a degree bound d, our algorithm always accepts all k-edge-connected digraphs and rejects all digraphs that is ɛ-far from k-edge-connectivity with probability at least 2/3. It runs in $ O\left( {d\left( {\frac{c} {{\varepsilon d}}} \right)^k log\frac{1} {{\varepsilon d}}O} \right) $ O\left( {d\left( {\frac{c} {{\varepsilon d}}} \right)^k log\frac{1} {{\varepsilon d}}O} \right) (c > 1 is a constant) time when input digraphs are restricted to be (k-1)-edge connected and runs in $ O\left( {d\left( {\frac{{ck}} {{\varepsilon d}}} \right)^k log\frac{k} {{\varepsilon d}}O} \right) $ O\left( {d\left( {\frac{{ck}} {{\varepsilon d}}} \right)^k log\frac{k} {{\varepsilon d}}O} \right) (c > 1 is a constant) time for general digraphs.  相似文献   

16.
This paper considers the Rosenau equation with a moving control?t u + ?_t?_x~4 u + ?_xu + u?x u = a(x + ct)h(x, t), c = 0, x ∈ T = R/(2πZ), t 0.The authors prove that the Rosenau equation with a moving control is locally exact controllable in Hs(T) with s ≥ 0 and globally exponential stable in H~s(T) with s ≥ 2. The two results nontrivially extend the work of(Rosier L and Zhang B Y, 2013) from the BBM equation to the Rosenau equation.  相似文献   

17.
Let F=C(x1,x2,…,xe,xe+1,…,xm), where x1, x2,… , xe are differential variables, and xe+1,…,xm are shift variables. We show that a hyperexponential function, which is algebraic over F,is of form g(x1, x2, …,xm)q(x1,x2,…,xe)^1/lwe+1^xe+1…wm^xm, where g∈ F, q ∈ C(x1,x2,…,xe),t∈Z^+ and we+1,…,wm are roots of unity. Furthermore,we present an algorithm for determining whether a hyperexponential function is algebraic over F.  相似文献   

18.
In this paper, sequence unique reconstruction refers to the property that a sequence is uniquely reconstructable from all its K-tuples. We propose and study the phase transition behavior of the probability P(K) of unique reconstruction with regard to tuple size K in random sequences (iid model). Based on Monte Carlo experiments, artificial proteins generated from lid model exhibit a phase transition when P(K) abruptly jumps from a low value phase (e.g. 〈 0.1) to a high value phase (e.g. 〉 0.9). With a generalization to any alphabet, we prove that for a random sequence of length L, as L is large enough, P(K) undergoes a sharp phase transition when p ≤ 0.1015 where p = P (two random letters match). Besides, formulas are derived to estimate the transition points, which may be of practical use in sequencing DNA by hybridization. Concluded from our study, most proteins do not deviate greatly from random sequences in the sense of sequence unique reconstruction, while there are some "stubborn" proteins which only become uniquely reconstructable at a very large K and probably have biological implications.  相似文献   

19.
Given a real-valued separable M-type 2 Banach space X with the p-th power of the norm of C2-class, the almost sure asymptotic upper bounds of the solutions of the Ornstein-Uhlenbeck Processes described by the following equations {dz(t)=A(t,z(t))dt+σ(t,z(t))dW(t),z(0)=z0∈X,are investigated. This study generalizes the corresponding well-known finite dimensional results of Lapeyre (1989) and Mao (1992).  相似文献   

20.
Let be the set of trees on 2k+1 vertices with nearly perfect matchings, and let be the set of trees on 2k + 2 vertices with perfect matchings. The largest Laplacian spectral radii of trees in and and the corresponding trees were given by Guo (2003). In this paper, the authors determine the second to the sixth largest Laplacian spectral radii among all trees in and give the corresponding trees. This research is supported by the National Natural Science Foundation of China under Grant No. 10331020.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号