Symmetrization

We study the problem of conformally deforming a metric to a prescribed symmetric function of the eigenvalues of the Ricci tensor. We prove an existence theorem for a wide class of symmetric functions on manifolds with positive Ricci curvature, provided the conformal class admits an admissible metric. 1. Introduction Let (M n , g) be a smooth, closed Riemannian manifold of dimension n.
58p noel_noel 17012013 45 5 Download

We deﬁne and study sl2 categoriﬁcations on abelian categories. We show in particular that there is a selfderived (even homotopy) equivalence categorifying the adjoint action of the simple reﬂection. We construct categoriﬁcations for blocks of symmetric groups and deduce that two blocks are splendidly Rickard equivalent whenever they have isomorphic defect groups and we show that this implies Brou´’s abelian defect group conjecture for symmetric groups. e We give similar results for general linear groups over ﬁnite ﬁelds. ...
55p dontetvui 17012013 37 5 Download

Steiner symmetrization is known not to increase perimeter of sets in Rn . The sets whose perimeter is preserved under this symmetrization are characterized in the present paper. 1. Introduction and main results Steiner symmetrization, one of the simplest and most powerful symmetrization processes ever introduced in analysis, is a classical and very wellknown device, which has seen a number of remarkable applications to problems of geometric and functional nature.
32p noel_noel 17012013 28 4 Download

Let X = G/H be a reductive symmetric space and K a maximal compact subgroup of G. The image under the Fourier transform of the space of Kﬁnite compactly supported smooth functions on X is characterized. Contents 1. Introduction 2. Notation 3. The PaleyWiener space. Main theorem 4. Pseudo wave packets 5. Generalized Eisenstein integrals 6. Induction of ArthurCampoli relations 7. A property of the ArthurCampoli relations 8. Proof of Theorem 4.4 9.
32p noel_noel 17012013 26 4 Download

Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.
12p levuphongqn 18082015 51 2 Download

We present a novel approach for discovering word categories, sets of words sharing a signiﬁcant aspect of their meaning. We utilize metapatterns of highfrequency words and content words in order to discover pattern candidates. Symmetric patterns are then identiﬁed using graphbased measures, and word categories are created based on graph clique sets. Our method is the ﬁrst patternbased method that requires no corpus annotation or manually provided seed patterns or words.
8p hongvang_1 16042013 34 1 Download

In this paper, we introduce a new twomode (de)multiplexer based on the silicononinsulator (SOI) platform. The device is built on a symmetric Yjunction, a 2×2 multimode interference (MMI) waveguide and a phaseshifter in the form of a ridge waveguide which is designed using 3D scalar beam propagation method (BPM). The phase evolution in the structure is discussed in details.
12p thuyliebe 08102018 14 0 Download

We shortly review the metric formalism for the f(R) gravity. Based on the metric formalism, we study the spherically symmetric static empty space solutions with the gravity Lagrangian L = R+λR 2 . We found the general metric that described the static empty space with the spherically symmetry. Our result is more general than Schwarzschild solution, specially the predicted metric is perturbed Schwarzschild metric of the Einstein theory.
6p thuyliebe 09102018 18 0 Download

Thus the aim is to determine the solution of a known PDE defined throughout the domain, which satisfies the superabundant data and then identifies the missing ones. For linear symmetric operators, we propose a general method to solve the data completion problem as a Cauchy problem. Various applications are described for stationary conduction and elastostatic problems.
15p thienthanquydu 23102018 14 0 Download

The elastoplastic problem of the halfspace with a hole subjected to axially symmetric loading considered in this paper is based on the elastoplastic deformation process theory. Solution of t his problem is carried out by using the modified elastic solution method and the finite element method. Some results of numerical calculation are presented here to give the picture of plastic domains enlarging in the body and t he obtained displacements on the free boundary of the halfspace.
11p chikychiky 27102018 21 0 Download

In the present paper, we introduce a pair of second order fractional symmetric variational programs over cone constraints and derive weak, strong, and converse duality theorems under second order Fconvexity assumptions. Moreover, self duality theorem is also discussed. Our results give natural unification and extension of some previously known results in the literature.
19p danhnguyentuongvi27 19122018 12 0 Download

In this paper, we present a predictorcorrector pathfollowing interiorpoint algorithm for symmetric cone optimization based on Darvay's technique. Each iteration of the algorithm contains a predictor step and a corrector step based on a modification of the Nesterov and Todd directions.
17p vinguyentuongdanh 19122018 9 0 Download

Mixed type symmetric and self duality for multiobjective variational problems with support functions
In this paper, a pair of mixed type symmetric dual multiobjective variational problems containing support functions is formulated. This mixed formulation unifies two existing pairs Wolfe and MondWeir type symmetric dual multiobjective variational problems containing support functions.
31p vinguyentuongdanh 19122018 24 0 Download

In this work we deal with the symmetric algebra of monomial ideals that arise from graphs, the edge ideals. The notion of ssequence is explored for such ideals in order to compute standard algebraic invariants of their symmetric algebra in terms of the corresponding invariants of special quotients of the polynomial ring related to the graphs.
14p tuongvidanh 06012019 7 0 Download

In this paper it is shown that the differences found between fruits are the result of genetic variations mosaic; that is, they are different ecotypes of Norway maple, since bilaterally symmetrical fruits do not have significantly different left and right sides, which shows the developmental stability of Norway maple.
7p danhdanh11 11012019 10 0 Download

In this paper, we first give some characterizations of esymmetric rings. We prove that R is an esymmetric ring if and only if a1a2a3 = 0 implies that aσ(1)aσ(2)aσ(3)e = 0, where σ is any transformation of {1, 2, 3}. With the help of the Bott–Duffin inverse.
11p nutifooddau 21012019 6 0 Download

Locally symmetric spaces play an important part in differential geometry and arise from many different areas such as topology, number theory, representation theory, algebraic geometry,...The typical important class consists of quotients of symmetric spaces by arithmetic groups, for example, the moduli space of elliptic curves is the quotient of the upper half plane H2 by SL(2, Z).
9p thiendiadaodien_9 04032019 12 0 Download

One of the main reasons is that when we share the information (in the form of images or documents) with our known contacts then actually we are also sharing the information with the telecommunication companies and the company that provide the software. In this paper we present a symmetric key encryption based solution for information privacy and security. Our approach is based on Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) to ensure confidentiality and integrity of the encrypted information.
7p byphasse043256 23032019 9 0 Download

In this paper, a new realization of the fractional capacitor (FC) using passive symmetric networks is proposed. A general analysis of the symmetric network that is independent of the internal impedance composition is introduced. Three different internal impedances are utilized in the network to realize the required response of the FC. These three cases are based on either a series RC circuit, integer Coleimpedance circuit, or both. The network size and the values of the passive elements are optimized using the minimax and least mth optimization techniques.
13p caygaocaolon1 13112019 5 0 Download

Circularly symmetric twodimensional (2D) finite impulse response (FIR) filters find extensive use in image and medical applications, especially for isotropic filtering. Moreover, the design and implementation of 2D digital filters with variable fractional delay and variable magnitude responses without redesigning the filter has become a crucial topic of interest due to its significance in lowcost applications. Recently the design using fixed word length coefficients has gained importance due to the replacement of multipliers by shifters and adders, which reduces the hardware complexity.
12p kequaidan1 16112019 8 0 Download