首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
In this paper, we introduce “approximate solutions" to solve the following problem: given a polynomial F(x, y) over Q, where x represents an n -tuple of variables, can we find all the polynomials G(x) such that F(x, G(x)) is identically equal to a constant c in Q ? We have the following: let F(x, y) be a polynomial over Q and the degree of y in F(x, y) be n. Either there is a unique polynomial g(x)   Q [ x ], with its constant term equal to 0, such that F(x, y)  = j = 0ncj(y  g(x))jfor some rational numbers cj, hence, F(x, g(x)  + a)   Q for all a  Q, or there are at most t distinct polynomials g1(x),⋯ , gt(x), t  n, such that F(x, gi(x))   Q for 1   i  t. Suppose that F(x, y) is a polynomial of two variables. The polynomial g(x) for the first case, or g1(x),⋯ , gt(x) for the second case, are approximate solutions of F(x, y), respectively. There is also a polynomial time algorithm to find all of these approximate solutions. We then use Kronecker’s substitution to solve the case of F(x, y).  相似文献   

3.
Fix a finite commutative ringR. Letuandvbe power series overR, withv(0) = 0. This paper presents an algorithm that computes the firstnterms of the compositionu(v), given the firstnterms ofuandv, inn1 + o(1)ring operations. The algorithm is very fast in practice whenRhas small characteristic.  相似文献   

4.
The well-known Goldbach Conjecture (GC) states that any sufficiently large even number can be represented as a sum of two odd primes. Although not yet demonstrated, it has been checked for integers up to 1014. Using two stronger versions of the conjecture, we offer a simple and fast method for recognition of a gray box group G known to be isomorphic to Sn(or An) with knownn   20, i.e. for construction1of an isomorphism from G toSn (or An). Correctness and rigorous worst case complexity estimates rely heavily on the conjectures, and yield times of O([ρ + ν + μ ] n log2n) or O([ ρ + ν + μ ] n logn / loglog n) depending on which of the stronger versions of the GC is assumed to hold. Here,ρ is the complexity of generating a uniform random element of G, ν is the complexity of finding the order of a group element in G, and μ is the time necessary for group multiplication in G. Rigorous lower bound and probabilistic approach to the time complexity of the algorithm are discussed in the Appendix.  相似文献   

5.
Let V be a finite dimensional representation of a p -group, G, over a field,k , of characteristic p. We show that there exists a choice of basis and monomial order for which the ring of invariants, k [ V ]G, has a finite SAGBI basis. We describe two algorithms for constructing a generating set for k [ V ] G. We use these methods to analyse k [2V3 ]U3where U3is the p -Sylow subgroup ofGL3 (Fp) and 2 V3is the sum of two copies of the canonical representation. We give a generating set for k [2 V3]U3forp =  3 and prove that the invariants fail to be Cohen–Macaulay forp >  2. We also give a minimal generating set for k [mV2 ]Z / pwere V2is the two-dimensional indecomposable representation of the cyclic group Z / p.  相似文献   

6.
A polynomial P(X)  = Xd + ad  1Xd  1 + ⋯ is called lacunary when ad  1 =  0. We give bounds for the roots of such polynomials with complex coefficients. These bounds are much smaller than for general polynomials.  相似文献   

7.
8.
Let f(X, Y) be an absolutely irreducible polynomial with integer coefficients such that the curve defined by the equation f(X, Y)  =  0 is of genus 0 having at least three infinite valuations. This paper describes a practical general method for the explicit determination of all integer solutions of the diophantine equation f(X, Y)  =  0. Some elaborated examples are given.  相似文献   

9.
Analysis of networks of queues under repetitive service blocking mechanism has been presented in this paper. Nodes are connected according to an arbitrary configuration and each node in the networks employs an active queue management (AQM) based queueing policy to guarantee certain quality of service for multiple class external traffic. This buffer management scheme has been implemented using queue thresholds. The use of queue thresholds is a well known technique for network traffic congestion control. The analysis is based on a queue-by-queue decomposition technique where each queue is modelled as a GE/GE/1/N queue with single server, R (R  2) distinct traffic classes and {N = N1, N2,  , NR} buffer threshold values per class under first-come-first-serve (FCFS) service rule. The external traffic is modelled using the generalised exponential (GE) distribution which can capture the bursty property of network traffic. The analytical solution is obtained using the maximum entropy (ME) principle. The forms of the state and blocking probabilities are analytically established at equilibrium via appropriate mean value constraints. The initial numerical results demonstrate the credibility of the proposed analytical solution.  相似文献   

10.
Let C be a curve of genus 2 and ψ1: C    E 1  a map of degree n, from C to an elliptic curveE1 , both curves defined over C. This map induces a degree n map φ1:P1    P 1  which we call a Frey–Kani covering. We determine all possible ramifications for φ1. If ψ1:C    E 1  is maximal then there exists a maximal map ψ2: C    E 2  , of degree n, to some elliptic curveE2 such that there is an isogeny of degree n2from the JacobianJC to E1 × E2. We say thatJC is (n, n)-decomposable. If the degree n is odd the pair (ψ2, E2) is canonically determined. For n =  3, 5, and 7, we give arithmetic examples of curves whose Jacobians are (n, n)-decomposable.  相似文献   

11.
Let f(X, Y) be an absolutely irreducible polynomial with integer coefficients such that the curve defined by the equation f(X, Y)  =  0 is of genus 0 having at most two infinite valuations. This paper describes a practical general method for the explicit determination of all integer solutions of the diophantine equation f(X, Y)  =  0. Several elaborated examples are given. Furthermore, a necessary and sufficient condition for a curve of genus 0 to have infinitely many integer points is obtained.  相似文献   

12.
A fundamental result of Büchi states that the set of monadic second-order formulas true in the structure (Nat,  <) is decidable. A natural question is: what monadic predicates (sets) can be added to (Nat,  <) while preserving decidability? Elgot and Rabin found many interesting predicates P for which the monadic theory of 〈Nat, <,  P〉 is decidable. The Elgot and Rabin automata theoretical method has been generalized and sharpened over the years and their results were extended to a variety of unary predicates. We give a sufficient and necessary model-theoretical condition for the decidability of the monadic theory of (Nat, <, P1,  , Pn).We reformulate this condition in an algebraic framework and show that a sufficient condition proposed previously by O. Carton and W.Thomas is actually necessary. A crucial argument in the proof is that monadic second-order logic has the selection and the uniformization properties over the extensions of (Nat, <) by monadic predicates. We provide a self-contained proof of this result.  相似文献   

13.
A graph G(VE) (|V|⩾2k) satisfies property Ak if, given k pairs of distinct nodes (s1t1), …, (sktk) of V(G), there are k mutually node-disjoint paths, one connecting si and ti for each i, 1⩽ik. A necessary condition for any graph to satisfy Ak is that it is (2k−1)-connected. Hypercubes are important interconnection topologies for parallel computation and communication networks. It has been known that hypercubes of dimension n (which are n-connected) satisfy An/2⌉. In this paper we give an algorithm which, given k=⌈n/2⌉ pairs of distinct nodes (s1t1), …, (sktk) in the n-dimensional hypercube, finds the k disjoint paths of length at most n+⌈log n⌉+1 in O(n2 log* n) time.  相似文献   

14.
We describe a deterministic finite element (FE) solution algorithm for a stochastic elliptic boundary value problem (sbvp), whose coefficients are assumed to be random fields with finite second moments and known, piecewise smooth two-point spatial correlation function. Separation of random and deterministic variables (parametrization of the uncertainty) is achieved via a Karhunen–Loève (KL) expansion. An O(N log N) algorithm for the computation of the KL eigenvalues is presented, based on a kernel independent fast multipole method (FMM). Truncation of the KL expansion gives an (M, 1) Wiener polynomial chaos (PC) expansion of the stochastic coefficient and is shown to lead to a high dimensional, deterministic boundary value problem (dbvp). Analyticity of its solution in the stochastic variables with sharp bounds for the domain of analyticity are used to prescribe variable stochastic polynomial degree r = (r1, …, rM) in an (M, r) Wiener PC expansion for the approximate solution. Pointwise error bounds for the FEM approximations of KL eigenpairs, the truncation of the KL expansion and the FE solution to the dbvp are given. Numerical examples show that M depends on the spatial correlation length of the random diffusion coefficient. The variable polynomial degree r in PC-stochastic Galerkin FEM allows to handle KL expansions with M up to 30 and r1 up to 10 in moderate time.  相似文献   

15.
A multivariate polynomialP(x1, …,xn) with real coefficients is said to beabsolutely positivefrom a real numberBiff it and all of its non-zero partial derivatives of every order are positive forx1,…,xn  B. We call suchBaboundfor the absolute positiveness ofP. This paper provides a simple formula for computing such bounds. We also prove that the resulting bounds are guaranteed to be close to the optimal ones.  相似文献   

16.
《Information and Computation》2007,205(7):1078-1095
Assume that G = (V, E) is an undirected graph, and C  V. For every v  V, denote Ir(G; v) = {u  C: d(u,v)  r}, where d(u,v) denotes the number of edges on any shortest path from u to v in G. If all the sets Ir(G; v) for v  V are pairwise different, and none of them is the empty set, the code C is called r-identifying. The motivation for identifying codes comes, for instance, from finding faulty processors in multiprocessor systems or from location detection in emergency sensor networks. The underlying architecture is modelled by a graph. We study various types of identifying codes that are robust against six natural changes in the graph; known or unknown edge deletions, additions or both. Our focus is on the radius r = 1. We show that in the infinite square grid the optimal density of a 1-identifying code that is robust against one unknown edge deletion is 1/2 and the optimal density of a 1-identifying code that is robust against one unknown edge addition equals 3/4 in the infinite hexagonal mesh. Moreover, although it is shown that all six problems are in general different, we prove that in the binary hypercube there are cases where five of the six problems coincide.  相似文献   

17.
This paper presents an algorithm for the Quillen–Suslin Theorem for quotients of polynomial rings by monomial ideals, that is, quotients of the form A = k [ x0, . . . ,xn ] / I, with I a monomial ideal and k a field. Vorst proved that finitely generated projective modules over such algebras are free. Given a finitely generated module P, described by generators and relations, the algorithm tests whether P is projective, in which case it computes a free basis forP .  相似文献   

18.
《Information Sciences》2007,177(8):1782-1788
In this paper, we explore the 2-extra connectivity and 2-extra-edge-connectivity of the folded hypercube FQn. We show that κ2(FQn) = 3n  2 for n  8; and λ2(FQn) = 3n  1 for n  5. That is, for n  8 (resp. n  5), at least 3n  2 vertices (resp. 3n  1 edges) of FQn are removed to get a disconnected graph that contains no isolated vertices (resp. edges). When the folded hypercube is used to model the topological structure of a large-scale parallel processing system, these results can provide more accurate measurements for reliability and fault tolerance of the system.  相似文献   

19.
The absolute free energy difference of binding (ΔG) between neuraminidase and its inhibitor was evaluated using fast pulling of ligand (FPL) method over steered molecular dynamics (SMD) simulations. The metric was computed through linear interaction approximation. Binding nature was described by free energy differences of electrostatic and van der Waals (vdW) interactions. The finding indicates that vdW metric is dominant over electrostatics in binding process. The computed values are in good agreement with experimental data with a correlation coefficient of R = 0.82 and error of σΔGexp = 2.2 kcal/mol. The results were observed using Amber99SB-ILDN force field in comparison with CHARMM27 and GROMOS96 43a1 force fields. Obtained results may stimulate the search for an Influenza therapy.  相似文献   

20.
《Information and Computation》2007,205(11):1575-1607
We propose a new approximation technique for Hybrid Automata. Given any Hybrid Automaton H, we call Approx(H, k) the Polynomial Hybrid Automaton obtained by approximating each formula ϕ in H with the formulae ϕk obtained by replacing the functions in ϕ with their Taylor polynomial of degree k. We prove that Approx(H, k) is an over-approximation of H. We study the conditions ensuring that, given any ϵ > 0, some k0 exists such that, for all k > k0, the “distance” between any vector satisfying ϕk and at least one vector satisfying ϕ is less than ϵ. We study also conditions ensuring that, given any ϵ > 0, some k0 exists such that, for all k > k0, the “distance” between any configuration reached by Approx(H, k) in n steps and at least one configuration reached by H in n steps is less than ϵ.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号