behaves as tT like a nontrivial self-similar profile.  相似文献   

5.
The formula of the solution for some classes of initial boundary value problems for the hyperbolic equation with two independent variables     
V. L. Pryadiev  A. V. Pryadiev 《Automation and Remote Control》2007,68(2):337-350
A new representation is proved of the solutions of initial boundary value problems for the equation of the form u xx (x, t) + r(x)u x (x, t) ? q(x)u(x, t) = u tt (x, t) + μ(x)u t (x, t) in the section (under boundary conditions of the 1st, 2nd, or 3rd type in any combination). This representation has the form of the Riemann integral dependent on the x and t over the given section.  相似文献   

6.
Some remarks on a conjecture in parameter adaptive control     
Roger D. Nussbaum 《Systems & Control Letters》1983,3(5):243-246
A.S. Morse has raised the following question: Do there exist differentiable functions
f:R2 → R and g:R2 → R
with the property that for every nonzero real number λ and every (x0, y0) ∈ R2 the solution (x(t),y(t)) of
x?(t) = x(t) + λf(x(t),y(t))
,
y?(t) = g(x(t),y(t))
,
x(0) = x0, y(0) = y0
, is defined for all t ? 0 and satisfies
limt → + ∞
and y(t) is bounded on [0,∞)? We prove that the answer is yes, and we give explicit real analytic functions f and g which work. However, we prove that if f and g are restricted to be rational functions, the answer is no.  相似文献   

7.
On the lower bounds of the second order nonlinearities of some Boolean functions   总被引:1,自引:0,他引:1  
Sugata Gangopadhyay  Sumanta Sarkar 《Information Sciences》2010,180(2):266-273
The rth order nonlinearity of a Boolean function is an important cryptographic criterion in analyzing the security of stream as well as block ciphers. It is also important in coding theory as it is related to the covering radius of the Reed-Muller code R(r,n). In this paper we deduce the lower bounds of the second order nonlinearities of the following two types of Boolean functions:
1.
with d=22r+2r+1 and , where n=6r.
2.
, where x,yF2t,n=2t,n?6 and i is an integer such that 1?i<t,gcd(2t-1,2i+1)=1.
For some λ, the functions of the first type are bent functions, whereas Boolean functions of the second type are all bent functions, i.e., they possess the maximum first order nonlinearity. It is demonstrated that in some cases our bounds are better than the previously obtained bounds.  相似文献   

8.
Asymptotic and oscillatory behavior of solutions of general nonlinear difference equations of second order     
E. Thandapani  S. Pandian 《Computers & Mathematics with Applications》1998,36(10-12)
The asymptotic and oscillatory behavior of solutions of some general second-order nonlinear difference equations of the form
δ(anh(yn+1yn)+pnδyn+qn+1f(yσ(n+1))=0 nZ,
is studied. Oscillation criteria for their solutions, when “pn” is of constant sign, are established. Results are also presented for the damped-forced equation
δ(anh(yn+1yn)+pnδyn+qn+1f(yσ(n+1))=en nZ.
Examples are inserted in the text for illustrative purposes.  相似文献   

9.
Clique Numbers of Random Subgraphs of Some Distance Graphs     
A.?S.?GusevEmail author 《Problems of Information Transmission》2018,54(2):165-175
We consider a class of graphs G(n, r, s) = (V (n, r),E(n, r, s)) defined as follows:
$$V(n,r) = \{ x = ({x_{1,}},{x_2}...{x_n}):{x_i} \in \{ 0,1\} ,{x_{1,}} + {x_2} + ... + {x_n} = r\} ,E(n,r,s) = \{ \{ x,y\} :(x,y) = s\} $$
where (x, y) is the Euclidean scalar product. We study random subgraphs G(G(n, r, s), p) with edges independently chosen from the set E(n, r, s) with probability p each. We find nontrivial lower and upper bounds on the clique number of such graphs.
  相似文献   

10.
A further result on the oscillation of delay difference equations     
X. H. Tang  J. S. Yu 《Computers & Mathematics with Applications》1999,38(11-12)
In this paper, we are concerned with the delay difference equations of the form
(*)
yn+1yn + pnynk = 0, N = 0, 1, 2, …,
(*)where pn ≥ 0 and k is a positive integer. We prove by using a new technique that
guarantees that all solutions of equation (*) oscillate, which improves many previous well-known results. In particular, our theorems also fit the case where Σn−1i=nkpikk+1/(k + 1)k+1. In addition, we present a nonoscillation sufficient condition for equation (*).  相似文献   

11.
Oscillation criteria of certain nonlinear partial difference equations     
B. G. Zhang  B. M. Liu 《Computers & Mathematics with Applications》1999,38(11-12)
This paper is concerned with the nonlinear partial difference equation with continuous variables
,where a, σi, τi are positive numbers, hi(x, y, u) ε C(R+ × R+ × R, R), uhi(x, y, u) > 0 for u ≠ 0, hi is nondecreasing in u, i = 1, …, m. Some oscillation criteria of this equation are obtained.  相似文献   

12.
Fuzzy approximately cubic mappings   总被引:1,自引:0,他引:1  
Alireza Kamel Mirmostafaee 《Information Sciences》2008,178(19):3791-3798
We establish some stability results concerning the cubic functional equation
f(2x+y)+f(2x-y)=2f(x+y)+2f(x-y)+12f(x)  相似文献   

13.
Parabolic equations with double variable nonlinearities     
S. Antontsev  S. Shmarev 《Mathematics and computers in simulation》2011,81(10):2018-2032
The paper is devoted to the study of the homogeneous Dirichlet problem for the doubly nonlinear parabolic equation with nonstandard growth conditions:
ut=div(a(x,t,u)|u|α(x,t)|∇u|p(x,t)−2∇u)+f(x,t)  相似文献   

14.
The (s + t + 1)-dimensional exchanged crossed cube, denoted as ECQ(s, t), combines the strong points of the exchanged hypercube and the crossed cube. It has been proven that ECQ(s, t) has more attractive properties than other variations of the fundamental hypercube in terms of fewer edges, lower cost factor and smaller diameter. In this paper, we study the embedding of paths of distinct lengths between any two different vertices in ECQ(s, t). We prove the result in ECQ(s, t): if s ≥ 3, t ≥ 3, for any two different vertices, all paths whose lengths are between \( \max \left\{9,\left\lceil \frac{s+1}{2}\right\rceil +\left\lceil \frac{t+1}{2}\right\rceil +4\right\} \) and 2 s+t+1 ? 1 can be embedded between the two vertices with dilation 1. Note that the diameter of ECQ(s, t) is \( \left\lceil \frac{s+1}{2}\right\rceil +\left\lceil \frac{t+1}{2}\right\rceil +2 \). The obtained result is optimal in the sense that the dilations of path embeddings are all 1. The result reveals the fact that ECQ(s, t) preserves the path embedding capability to a large extent, while it only has about one half edges of CQ n .  相似文献   

15.
We address the problem of minimizing power consumption when broadcasting a message from one node to all the other nodes in a radio network. To enable power savings for such a problem, we introduce a compelling new data streaming problem which we call the Bad Santa problem. Our results on this problem apply for any situation where: (1) a node can listen to a set of n nodes, out of which at least half are non-faulty and know the correct message; and (2) each of these n nodes sends according to some predetermined schedule which assigns each of them its own unique time slot. In this situation, we show that in order to receive the correct message with probability 1, it is necessary and sufficient for the listening node to listen to a \(\Theta(\sqrt{n})\) expected number of time slots. Moreover, if we allow for repetitions of transmissions so that each sending node sends the message O(log?? n) times (i.e. in O(log?? n) rounds each consisting of the n time slots), then listening to O(log?? n) expected number of time slots suffices. We show that this is near optimal.We describe an application of our result to the popular grid model for a radio network. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message m, all awake nodes within L distance r receive m. In this model, up to \(t<\frac{r}{2}(2r+1)\) nodes within any 2r+1 by 2r+1 square in the grid can suffer Byzantine faults. Moreover, we assume that the nodes that suffer Byzantine faults are chosen and controlled by an adversary that knows everything except for the random bits of each non-faulty node. This type of adversary models worst-case behavior due to malicious attacks on the network; mobile nodes moving around in the network; or static nodes losing power or ceasing to function. Let n=r(2r+1). We show how to solve the broadcast problem in this model with each node sending and receiving an expected \(O(n\log^{2}{|m|}+\sqrt{n}|m|)\) bits where |m| is the number of bits in m, and, after broadcasting a fingerprint of m, each node is awake only an expected \(O(\sqrt{n})\) time slots. Moreover, for t≤(1?ε)(r/2)(2r+1), for any constant ε>0, we can achieve an even better energy savings. In particular, if we allow each node to send O(log?? n) times, we achieve reliable broadcast with each node sending O(nlog?2|m|+(log?? n)|m|) bits and receiving an expected O(nlog?2|m|+(log?? n)|m|) bits and, after broadcasting a fingerprint of m, each node is awake for only an expected O(log?? n) time slots. Our results compare favorably with previous protocols that required each node to send Θ(|m|) bits, receive Θ(n|m|) bits and be awake for Θ(n) time slots.  相似文献   

16.
Abstract—In the projective plane PG(2, q), a subset S of a conic C is said to be almost complete if it can be extended to a larger arc in PG(2, q) only by the points of C \ S and by the nucleus of C when q is even. We obtain new upper bounds on the smallest size t(q) of an almost complete subset of a conic, in particular,
$$t(q) < \sqrt {q(3lnq + lnlnq + ln3)} + \sqrt {\frac{q}{{3\ln q}}} + 4 \sim \sqrt {3q\ln q} ,t(q) < 1.835\sqrt {q\ln q.} $$
The new bounds are used to extend the set of pairs (N, q) for which it is proved that every normal rational curve in the projective space PG(N, q) is a complete (q+1)-arc, or equivalently, that no [q+1,N+1, q?N+1]q generalized doubly-extended Reed–Solomon code can be extended to a [q + 2,N + 1, q ? N + 2]q maximum distance separable code.
  相似文献   

17.
Two codes C 1 and C 2 are said to be weakly isometric if there exists a mapping J: C 1C 2 such that for all x, y in C 1 the equality d(x, y) = d holds if and only if d(J(x), J(y)) = d, where d is the code distance of C 1. We prove that Preparata codes of length n ≥ 212 are weakly isometric if and only if the codes are equivalent. A similar result is proved for punctured Preparata codes of length at least 210 ? 1.  相似文献   

18.
Let G be a graph, x,yV(G), and ?:V(G)→[k] a k-colouring of G such that ?(x)=?(y). If then the following question is NP-complete: Does there exist a k-colouring ? of G such that ?(x)≠?(y)? Conversely, if then the problem is polynomial time.  相似文献   

19.
Recall that Lebesgue’s singular function L(t) is defined as the unique solution to the equation L(t) = qL(2t) + pL(2t ? 1), where p, q > 0, q = 1 ? p, pq. The variables M n = ∫01t n dL(t), n = 0,1,… are called the moments of the function The principal result of this work is \({M_n} = {n^{{{\log }_2}p}}{e^{ - \tau (n)}}(1 + O({n^{ - 0.99}}))\), where the function τ(x) is periodic in log2x with the period 1 and is given as \(\tau (x) = \frac{1}{2}1np + \Gamma '(1)lo{g_2}p + \frac{1}{{1n2}}\frac{\partial }{{\partial z}}L{i_z}( - \frac{q}{p}){|_{z = 1}} + \frac{1}{{1n2}}\sum\nolimits_{k \ne 0} {\Gamma ({z_k})L{i_{{z_k} + 1}}( - \frac{q}{p})} {x^{ - {z_k}}}\), \({z_k} = \frac{{2\pi ik}}{{1n2}}\), k ≠ 0. The proof is based on poissonization and the Mellin transform.  相似文献   

20.
This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions \( \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} \) as a tweak and key schedule, and defined as y = HPHK((t1, t2), x) = P(xHK(t1)) ⊕ HK(t2), where K is a key randomly chosen from a key space \( \mathcal{K} \), (t1, t2) is a tweak chosen from a valid tweak space \( \mathcal{T} \), x is a plaintext, and y is a ciphertext. We prove that HPH is a secure strong tweakable pseudorandom permutation (STPRP) by using H-coefficients technique. Then we focus on the security of HPH against multi-key and related-key attacks. We prove that HPH achieves both multi-key STPRP security and related-key STPRP security. HPH can be extended to wide applications. It can be directly applied to authentication and authenticated encryption modes. We apply HPH to PMAC1 and OPP, provide an improved authentication mode HPMAC and a new authenticated encryption mode OPH, and prove that the two modes achieve single-key security, multi-key security, and related-key security.  相似文献   

  首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The purpose of this paper is to study the oscillation of the second-order neutral differential equations of the form
(a(t)[z(t)]γ)+q(t)xβ(σ(t))=0,  相似文献   

2.
In this paper, we consider the second-order quasilinear neutral dynamic equation
(r(t)|ZΔ(t)|α−1ZΔ(t))Δ+q(t)|x(δ(t))|β−1x(δ(t))=0,  相似文献   

3.
Using a recently proved equivalence between disconjugacy of the 2nth-order difference equation
and solvability of the corresponding Riccati matrix difference equation, it is shown that the equation L(y) = 0 is disconjugate on a given interval if and only if the operator L admits the factorization of the form
L(y)k+n=M*(ckM(y)k)k+n,
where M and its adjoint M* are certain nth-order difference operators and ck is a sequence of positive numbers.  相似文献   

4.
In this paper the quasilinear heat equation with the nonlinear boundary condition is studied. The blow-up rate and existence of a self-similar solution are obtained. It is proved that the rescaled function
v(y,t)=(Tt)1/(2p+α−2)u((Tt)(p−1)/(2p+α−2)y,t),
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号