13 resultados para Elementary Algebra
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
The elementary surface excitations are studied by spin-polarized electron energy loss spectroscopy on a prototype oxide surface [an oxygen passivated Fe(001)-p(1 x 1) surface], where the various excitations coexist. For the first time, the surface phonons and magnons are measured simultaneously and are distinguished based on their different spin nature. The dispersion relation of all excitations is probed over the entire Brillouin zone. The different phonon modes observed in our experiment are described by means of ab initio calculations.
Resumo:
Given a separable unital C*-algebra C with norm parallel to center dot parallel to, let E-n denote the Banach-space completion of the C-valued Schwartz space on R-n with norm parallel to f parallel to(2)=parallel to < f, f >parallel to(1/2), < f, g >=integral f(x)* g(x)dx. The assignment of the pseudodifferential operator A=a(x,D) with C-valued symbol a(x,xi) to each smooth function with bounded derivatives a is an element of B-C(R-2n) defines an injective mapping O, from B-C(R-2n) to the set H of all operators with smooth orbit under the canonical action of the Heisenberg group on the algebra of all adjointable operators on the Hilbert module E-n. In this paper, we construct a left-inverse S for O and prove that S is injective if C is commutative. This generalizes Cordes' description of H in the scalar case. Combined with previous results of the second author, our main theorem implies that, given a skew-symmetric n x n matrix J and if C is commutative, then any A is an element of H which commutes with every pseudodifferential operator with symbol F(x+J xi), F is an element of B-C(R-n), is a pseudodifferential operator with symbol G(x - J xi), for some G is an element of B-C(R-n). That was conjectured by Rieffel.
Resumo:
A matricial method to solve the decay chain differential equations system is presented. The quantity of each nuclide in the chain at a time t may be evaluated by analytical expressions obtained in a simple way using recurrence relations. This method may be applied to problems of radioactive buildup and decay and can be easily implemented computationally. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
In this paper, we consider solutions to the three-dimensional Schrodinger equation of the form psi(r) = u(r)/r, where u(0) not equal 0. The expectation value of the kinetic energy operator for such wavefunctions diverges. We show that it is possible to introduce a potential energy with an expectation value that also diverges, exactly cancelling the kinetic energy divergence. This renormalization procedure produces a self-adjoint Hamiltonian. We solve some problems with this new Hamiltonian to illustrate its usefulness.
Resumo:
The sigma model describing the dynamics of the superstring in the AdS(5) x S(5) background can be constructed using the coset PSU(2, 2 vertical bar 4)/SO(4, 1) x SO(5). A basic set of operators in this two dimensional conformal field theory is composed by the left invariant currents. Since these currents are not (anti) holomorphic, their OPE`s is not determined by symmetry principles and its computation should be performed perturbatively. Using the pure spinor sigma model for this background, we compute the one-loop correction to these OPE`s. We also compute the OPE`s of the left invariant currents with the energy momentum tensor at tree level and one loop.
Resumo:
We study the exact solution of an N-state vertex model based on the representation of the U(q)[SU(2)] algebra at roots of unity with diagonal open boundaries. We find that the respective reflection equation provides us one general class of diagonal K-matrices having one free-parameter. We determine the eigenvalues of the double-row transfer matrix and the respective Bethe ansatz equation within the algebraic Bethe ansatz framework. The structure of the Bethe ansatz equation combine a pseudomomenta function depending on a free-parameter with scattering phase-shifts that are fixed by the roots of unity and boundary variables. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Under the assumption that c is a regular cardinal, we prove the existence and uniqueness of a Boolean algebra B of size c defined by sharing the main structural properties that P(omega)/fin has under CH and in the N(2)-Cohen model. We prove a similar result in the category of Banach spaces. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Approximate Lie symmetries of the Navier-Stokes equations are used for the applications to scaling phenomenon arising in turbulence. In particular, we show that the Lie symmetries of the Euler equations are inherited by the Navier-Stokes equations in the form of approximate symmetries that allows to involve the Reynolds number dependence into scaling laws. Moreover, the optimal systems of all finite-dimensional Lie subalgebras of the approximate symmetry transformations of the Navier-Stokes are constructed. We show how the scaling groups obtained can be used to introduce the Reynolds number dependence into scaling laws explicitly for stationary parallel turbulent shear flows. This is demonstrated in the framework of a new approach to derive scaling laws based on symmetry analysis [11]-[13].
Resumo:
We classify groups G such that the unit group U-1 (ZG) is hypercentral. In the second part, we classify groups G whose modular group algebra has hyperbolic unit groups U-1 (KG).
Resumo:
We construct five new elements of degree 6 in the nucleus of the free alternative algebra. We use the representation theory of the symmetric group to locate the elements. We use the computer algebra system ALBERT and an extension of ALBERT to express the elements in compact form and to show that these new elements are not a consequence of the known clegree-5 elements in the nucleus. We prove that these five new elements and four known elements form a basis for the subspace of nuclear elements of degree 6. Our calculations are done using modular arithmetic to save memory and time. The calculations can be done in characteristic zero or any prime greater than 6, and similar results are expected. We generated the nuclear elements using prime 103. We check our answer using five other primes.
Resumo:
We classify all unital subalgebras of the Cayley algebra O(q) over the finite field F(q), q = p(n). We obtain the number of subalgebras of each type and prove that all isomorphic subalgebras are conjugate with respect to the automorphism group of O(q). We also determine the structure of the Moufang loops associated with each subalgebra of O(q).
Resumo:
In this paper we construct two free field realizations of the elliptic affine Lie algebra sl(2, R) circle plus Omega(R)/dR where R = C[t. t(-1), u vertical bar u(2) = t(3) - 2bt(2) + t]. The first realization provides an analogue of Wakimoto`s construction for Affine Kac-Moody algebras, but in the setting of the elliptic affine Lie algebra. The second realization gives new types of representations analogous to Imaginary Verma modules in the Affine setting. (c) 2009 Elsevier B.V. All rights reserved.
Resumo:
Usually, a Petri net is applied as an RFID model tool. This paper, otherwise, presents another approach to the Petri net concerning RFID systems. This approach, called elementary Petri net inside an RFID distributed database, or PNRD, is the first step to improve RFID and control systems integration, based on a formal data structure to identify and update the product state in real-time process execution, allowing automatic discovery of unexpected events during tag data capture. There are two main features in this approach: to use RFID tags as the object process expected database and last product state identification; and to apply Petri net analysis to automatically update the last product state registry during reader data capture. RFID reader data capture can be viewed, in Petri nets, as a direct analysis of locality for a specific transition that holds in a specific workflow. Following this direction, RFID readers storage Petri net control vector list related to each tag id is expected to be perceived. This paper presents PNRD cornerstones and a PNRD implementation example in software called DEMIS Distributed Environment in Manufacturing Information Systems.