首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The purpose of this paper is to derive a sharp energy decay estimate for a quasi-linear wave equation with localized strong dissipation of the type −⋅(a(x)ut) in a domain Ω of RN, where a(x) is a nonnegative function supported only on a part of the boundary Ω. We note that the index of algebraic decay depends on dimension N and no geometrical condition is imposed on the boundary Ω.  相似文献   

2.
The solution of the Dirichlet boundary value problem over a polyhedral domain Ω ? Rn, n ≥ 2, associated with a second-order elliptic operator, is approximated by the simplest finite element method, where the trial functions are piecewise linear. When the discrete problem satisfies a maximum principle, it is shown that the approximate solution uh converges uniformly to the exact solution u if u ? W1,p (Ω), with p > n, and that ∥u?uhL∞(Ω) = O(h) if u ? W2,p(Ω), with 2p > n. In the case of the model problem ?Δu+au = f in Ω, u = uo on δΩ, with a ? 0, a simple geometrical condition is given which insures the validity of the maximum principle for the discrete problem.  相似文献   

3.
In this paper, we investigate the large-times behavior of weak solutions to the fourth-order degenerate parabolic equation ut = −(|u|nuxxx)x modeling the evolution of thin films. In particular, for all n > 0, we prove exponential decay of u(x, t) towards its mean value (1/|Ω|) ∫Ω u dx in L1-norm for long times and we give the explicit (n-dependent) rate of decay. The result is based on classical entropy estimates, and on detailed lower bounds for the entropy production.  相似文献   

4.
One of the particularities of information encoded as DNA strands is that a string u contains basically the same information as its Watson-Crick complement, denoted here as θ(u). Thus, any expression consisting of repetitions of u and θ(u) can be considered in some sense periodic. In this paper, we give a generalization of Lyndon and Schützenberger’s classical result about equations of the form ul=vnwm, to cases where both sides involve repetitions of words as well as their complements. Our main results show that, for such extended equations, if l?5,n,m?3, then all three words involved can be expressed in terms of a common word t and its complement θ(t). Moreover, if l?5, then n=m=3 is an optimal bound. These results are established based on a complete characterization of all possible overlaps between two expressions that involve only some word u and its complement θ(u), which is also obtained in this paper.  相似文献   

5.
The basic goal in combinatorial group testing is to identify a set of up to d defective items within a large population of size n?d using a pooling strategy. Namely, the items can be grouped together in pools, and a single measurement would reveal whether there are one or more defectives in the pool. The threshold model is a generalization of this idea where a measurement returns positive if the number of defectives in the pool reaches a fixed threshold u>0, negative if this number is no more than a fixed lower threshold ?<u, and may behave arbitrarily otherwise. We study non-adaptive threshold group testing (in a possibly noisy setting) and show that, for this problem, O(d g+2(logd)log(n/d)) measurements (where g:=u???1 and u is any fixed constant) suffice to identify the defectives, and also present almost matching lower bounds. This significantly improves the previously known (non-constructive) upper bound O(d u+1log(n/d)). Moreover, we obtain a framework for explicit construction of measurement schemes using lossless condensers. The number of measurements resulting from this scheme is ideally bounded by O(d g+3(logd)logn). Using state-of-the-art constructions of lossless condensers, however, we obtain explicit testing schemes with O(d g+3(logd)quasipoly(logn)) and O(d g+3+β poly(logn)) measurements, for arbitrary constant β>0.  相似文献   

6.
In a graph G, a k-container Ck(u,v) is a set of k disjoint paths joining u and v. A k-container Ck(u,v) is k∗-container if every vertex of G is passed by some path in Ck(u,v). A graph G is k∗-connected if there exists a k∗-container between any two vertices. An m-regular graph G is super-connected if G is k∗-connected for any k with 1?k?m. In this paper, we prove that the recursive circulant graphs G(2m,4), proposed by Park and Chwa [Theoret. Comput. Sci. 244 (2000) 35-62], are super-connected if and only if m≠2.  相似文献   

7.
We apply results on extracting randomness from independent sources to “extract” Kolmogorov complexity. For any α,?>0, given a string x with K(x)>α|x|, we show how to use a constant number of advice bits to efficiently compute another string y, |y|=Ω(|x|), with K(y)>(1-?)|y|. This result holds for both unbounded and space-bounded Kolmogorov complexity.We use the extraction procedure for space-bounded complexity to establish zero-one laws for the strong dimensions of complexity classes within ESPACE. The unbounded extraction procedure yields a zero-one law for the constructive strong dimensions of Turing degrees.  相似文献   

8.
The paper is devoted to the study of the homogeneous Dirichlet problem for the doubly nonlinear parabolic equation with nonstandard growth conditions:
ut=div(a(x,t,u)|u|α(x,t)|∇u|p(x,t)−2∇u)+f(x,t)  相似文献   

9.
In this paper, we first present a hierarchical (BV,G p ,L 2) variational decomposition model and then use it to achieve multiscale texture extraction which offers a hierarchical, separated representation of image texture in different scales. The starting point is the use of the variational (BV,G p ,L 2) decomposition; a given image fL 2(Ω) is decomposed into a sum of u 0+v 0+r 0, where (u 0,v 0)∈(BV(Ω),G p (Ω)) is the minimizer of an energy functional E(f,λ 0;u,v) and r 0 is the residual (i.e. r 0=f?u 0?v 0). In this decomposition, v 0 represents the fixed scale texture of f, which is measured by the parameter λ 0. To achieve a multiscale representation, we proceed to capture essential textures of f which have been absorbed by the residuals. Such a goal can be achieved by iterating a refinement decomposition to the residual of the previous step, i.e. r i =u i+1+v i+1+r i+1, where (u i+1,v i+1) is the minimizer of E(r i ,λ 0/2 i+1;u,v). In this manner, we can obtain a hierarchical representation of f. In addition, we discuss some theoretical properties of the hierarchical (BV,G p ,L 2) decomposition and give its numerical implementation. Finally, we apply this hierarchical decomposition to the multiscale texture extraction. The performance of this method is demonstrated with both synthetic and real images.  相似文献   

10.
In this paper, we propose a simple general form of high-order approximation of O(c2+ch2+h4) to solve the two-dimensional parabolic equation αuxx+βuyy=F(x,y,t,u,ux,uy,ut), where α and β are positive constants. We apply the compact form for solving diffusion-convection equation. The results of numerical experiments are presented and compared with analytical solutions to confirm the higher accuracy of the presented scheme.  相似文献   

11.
We discuss the existence of positive solutions for the singular fractional boundary value problem Dαu+f(t,u,u,Dμu)=0, u(0)=0, u(0)=u(1)=0, where 2<α<3, 0<μ<1. Here Dα is the standard Riemann-Liouville fractional derivative of order α, f is a Carathéodory function and f(t,x,y,z) is singular at the value 0 of its arguments x,y,z.  相似文献   

12.
The following combinatorial problem is fundamental for the design of file organizations minimizing simultaneously the storage space and the access time: For a given family M of subsets of a finite set X, find a partial function S:XX (if there is one), such that every M?M can be written as M=lcubx,S(x),?,S|M|-1 (x)rcub for a suitable x?X. We study the class of families admitting such a function S, as well as some of its subclasses defined by imposing certain restrictions on S (these restrictions reflect the structure of the storage medium to be used for storing a file).  相似文献   

13.
This is the first part in a three part study of the suboptimal full information H problem for a well-posed linear system with input space U, state space H, and output space Y. We define a cost function Q(x0,u)=∫〈y(s),Jy(s)〉Yds, where yL2loc( R +; Y) is the output of the system with initial state x0H and control uL2loc( R +; U), and J is a self-adjoint operator on Y. The cost function Qis quadratic in x0 and u, and we suppose (in the stable case) that the second derivative of Q(x0, u) with respect to u is non-singular. This implies that, for each x0H, there is a unique critical control ucrit such that the derivative of Q(x0, u) with respect to u vanishes at u=ucrit. We show that ucrit can be written in feedback form whenever the input/output map of the system has a coprime factorization with a (J, S)-inner numerator; here S is a particular self-adjoint operator on U. A number of properties of this feedback representation are established, such as the equivalence of the (J, S)-losslessness of the factorization and the positivity of the Riccati operator on the reachable subspace. © 1998 John Wiley & Sons, Ltd.  相似文献   

14.
The Möbius cube MQn and the crossed cube CQn are two important variants of the hypercube Qn. This paper shows that for any two different vertices u and v in G∈{MQn,CQn} with n?3, there exists a uv-path of every length from dG(u,v)+2 to n2−1 except for a shortest uv-path, where dG(u,v) is the distance between u and v in G. This result improves some known results.  相似文献   

15.
In this paper we characterize all algorithms for obtaining the coefficients of (Σn?1i=0xiui)(Σn?1i=0yiui) mod P(u), where P(u) is an irreducible po lynomial of degree n, which use 2n ? 1 multiplications. It is shown that up to equivalence, all such algorithms are obtainable by first obtaining the coefficients of the product of two polynomials, and then reducing modulo the irreducible polynomial.  相似文献   

16.
We study distances to the first occurrence (occurrence indices) of a given element in a linear recurrence sequence over a primary residue ring \(\mathbb{Z}_{p^n } \). We give conditions on the characteristic polynomial F(x) of a linear recurrence sequence u which guarantee that all elements of the ring occur in u. For the case where F(x) is a reversible Galois polynomial over \(\mathbb{Z}_{p^n } \), we give upper bounds for occurrence indices of elements in a linear recurrence sequence u. A situation where the characteristic polynomial F(x) of a linear recurrence sequence u is a trinomial of a special form over ?4 is considered separately. In this case we give tight upper bounds for occurrence indices of elements of u.  相似文献   

17.
W. Mackens 《Computing》1989,41(3):237-260
In this note we develop a simple finite differencing device to calculate approximations of derivativesx′(0),x″(0),x (3)(0), … of regular solution curvesx: ? ?sx(s) ∈ ? n of nonlinear systems of equationsg(x)=0,g∈C k (? n + 1, ? n ) without having to compute points on the solution arcx(s). The derivative vectorsx′(0),x″(0),x (3)(0),… can be used in the numerical approximation of the solution setg ?1(0) in two ways. On one hand they can be applied to construct higher order predictors to be used in predictor-corrector branch following procedures. On the other they serve as order determining basis functions in the Reduced Basis Method. The performance of the differencing method is demonstrated by some numerical examples.  相似文献   

18.
The problem of determining the unknown coefficient k=k(x) of the Sturm–Liouville operator Au≡−(k(x)u′(x))′+q(x)u(x) from the measured data at the boundary x=0;1 is considered. It is assumed that the function u=u(x) has several singular points in (0,1) of different types. As a result different types of ill-conditioned situations (mild, moderate and severe) in (0,1) arise. We analyze all the ill-conditioned situations and then based on the analysis construct computational method for the solution of the inverse problem.  相似文献   

19.
It is a trivial observation that every decidable set has strings of length n with Kolmogorov complexity log?n+O(1) if it has any strings of length n at all. Things become much more interesting when one asks whether a similar property holds when one considers resource-bounded Kolmogorov complexity. This is the question considered here: Can a feasible set A avoid accepting strings of low resource-bounded Kolmogorov complexity, while still accepting some (or many) strings of length?n? More specifically, this paper deals with two notions of resource-bounded Kolmogorov complexity: Kt and KNt. The measure Kt was defined by Levin more than three decades ago and has been studied extensively since then. The measure KNt is a nondeterministic analog of Kt. For all strings x, Kt(x)??KNt(x); the two measures are polynomially related if and only if NEXP?EXP/poly (Allender et al. in J.?Comput. Syst. Sci. 77:14?C40, 2011). Many longstanding open questions in complexity theory boil down to the question of whether there are sets in P that avoid all strings of low Kt complexity. For example, the EXP vs ZPP question is equivalent to (one version of) the question of whether avoiding simple strings is difficult: (EXP=ZPP if and only if there exist ?>0 and a ??dense?? set in P having no strings x with Kt(x)??|x| ? (Allender et al. in SIAM J. Comput. 35:1467?C1493, 2006)). Surprisingly, we are able to show unconditionally that avoiding simple strings (in the sense of KNt complexity) is difficult. Every dense set in NP??coNP contains infinitely many strings x such that KNt(x)??|x| ? for every ?>0. The proof does not relativize. As an application, we are able to show that if E=NE, then accepting paths for nondeterministic exponential time machines can be found somewhat more quickly than the brute-force upper bound, if there are many accepting paths.  相似文献   

20.
Consider the following cascading process on a simple undirected graph G(V,E) with diameter Δ. In round zero, a set S?V of vertices, called the seeds, are active. In round i+1, i∈?, a non-isolated vertex is activated if at least a ρ∈(0,1] fraction of its neighbors are active in round i; it is deactivated otherwise. For k∈?, let min-seed(k)(G,ρ) be the minimum number of seeds needed to activate all vertices in or before round k. This paper derives upper bounds on min-seed(k)(G,ρ). In particular, if G is connected and there exist constants C>0 and γ>2 such that the fraction of degree-k vertices in G is at most C/k γ for all k∈?+, then min-seed(Δ)(G,ρ)=O(?ρ γ?1|V|?). Furthermore, for n∈?+, p=Ω((ln(e/ρ))/(ρn)) and with probability 1?exp(?n Ω(1)) over the Erd?s-Rényi random graphs G(n,p), min-seed(1)(G(n,p),ρ)=O(ρn).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号