949 resultados para Skew-Symmetric Torsion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, we consider local influence analysis for the skew-normal linear mixed model (SN-LMM). As the observed data log-likelihood associated with the SN-LMM is intractable, Cook`s well-known approach cannot be applied to obtain measures of local influence. Instead, we develop local influence measures following the approach of Zhu and Lee (2001). This approach is based on the use of an EM-type algorithm and is measurement invariant under reparametrizations. Four specific perturbation schemes are discussed. Results obtained for a simulated data set and a real data set are reported, illustrating the usefulness of the proposed methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of this paper is to study a logarithm extension of the bimodal skew normal model introduced by Elal-Olivero et al. [1]. The model can then be seen as an alternative to the log-normal model typically used for fitting positive data. We study some basic properties such as the distribution function and moments, and discuss maximum likelihood for parameter estimation. We report results of an application to a real data set related to nickel concentration in soil samples. Model fitting comparison with several alternative models indicates that the model proposed presents the best fit and so it can be quite useful in real applications for chemical data on substance concentration. Copyright (C) 2011 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a Bayesian approach for estimation in the skew-normal calibration model, as well as the conditional posterior distributions which are useful for implementing the Gibbs sampler. Data transformation is thus avoided by using the methodology proposed. Model fitting is implemented by proposing the asymmetric deviance information criterion, ADIC, a modification of the ordinary DIC. We also report an application of the model studied by using a real data set, related to the relationship between the resistance and the elasticity of a sample of concrete beams. Copyright (C) 2008 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Let * be an involution of a group G extended linearly to the group algebra KG. We prove that if G contains no 2-elements and K is a field of characteristic p, 0 2, then the *-symmetric elements of KG are Lie nilpotent (Lie n-Engel) if and only if KG is Lie nilpotent (Lie n-Engel). (C) 2008 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Let L be a function field over the rationals and let D denote the skew field of fractions of L[t; sigma], the skew polynomial ring in t, over L, with automorphism sigma. We prove that the multiplicative group D(x) of D contains a free noncyclic subgroup.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we show that the eigenvalues of the Dirichlet problem for the biharmonic operator are generically simple in the set Of Z(2)-symmetric regions of R-n, n >= 2, with a suitable topology. To accomplish this, we combine Baire`s lemma, a generalised version of the transversality theorem, due to Henry [Perturbation of the boundary in boundary value problems of PDEs, London Mathematical Society Lecture Note Series 318 (Cambridge University Press, 2005)], and the method of rapidly oscillating functions developed in [A. L. Pereira and M. C. Pereira, Mat. Contemp. 27 (2004) 225-241].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We begin a study of torsion theories for representations of finitely generated algebras U over a field containing a finitely generated commutative Harish-Chandra subalgebra Gamma. This is an important class of associative algebras, which includes all finite W-algebras of type A over an algebraically closed field of characteristic zero, in particular, the universal enveloping algebra of gl(n) (or sl(n)) for all n. We show that any Gamma-torsion theory defined by the coheight of the prime ideals of Gamma is liftable to U. Moreover, for any simple U-module M, all associated prime ideals of M in Spec Gamma have the same coheight. Hence, the coheight of these associated prime ideals is an invariant of a given simple U-module. This implies the stratification of the category of U-modules controlled by the coheight of the associated prime ideals of Gamma. Our approach can be viewed as a generalization of the classical paper by Block (1981) [4]; it allows, in particular, to study representations of gl(n) beyond the classical category of weight or generalized weight modules. (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analogous to *-identities in rings with involution we define *-identities in groups. Suppose that G is a torsion group with involution * and that F is an infinite field with char F not equal 2. Extend * linearly to FG. We prove that the unit group U of FG satisfies a *-identity if and only if the symmetric elements U(+) satisfy a group identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce a new class of noncommutative rings - Galois orders, realized as certain subrings of invariants in skew semigroup rings, and develop their structure theory. The class of Calms orders generalizes classical orders in noncommutative rings and contains many important examples, such as the Generalized Weyl algebras, the universal enveloping algebra of the general linear Lie algebra, associated Yangians and finite W-algebras (C) 2010 Elsevier Inc All rights reserved

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Comfort and Remus [W.W. Comfort, D. Remus, Abelian torsion groups with a pseudo-compact group topology, Forum Math. 6 (3) (1994) 323-337] characterized algebraically the Abelian torsion groups that admit a pseudocompact group topology using the Ulm-Kaplansky invariants. We show, under a condition weaker than the Generalized Continuum Hypothesis, that an Abelian torsion group (of any cardinality) admits a pseudocompact group topology if and only if it admits a countably compact group topology. Dikranjan and Tkachenko [D. Dikranjan. M. Tkachenko, Algebraic structure of small countably compact Abelian groups, Forum Math. 15 (6) (2003) 811-837], and Dikranjan and Shakhmatov [D. Dikranjan. D. Shakhmatov, Forcing hereditarily separable compact-like group topologies on Abelian groups, Topology Appl. 151 (1-3) (2005) 2-54] showed this equivalence for groups of cardinality not greater than 2(c). We also show, from the existence of a selective ultrafilter, that there are countably compact groups without non-trivial convergent sequences of cardinality kappa(omega), for any infinite cardinal kappa. In particular, it is consistent that for every cardinal kappa there are countably compact groups without non-trivial convergent sequences whose weight lambda has countable cofinality and lambda > kappa. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measurement error models often arise in epidemiological and clinical research. Usually, in this set up it is assumed that the latent variable has a normal distribution. However, the normality assumption may not be always correct. Skew-normal/independent distribution is a class of asymmetric thick-tailed distributions which includes the Skew-normal distribution as a special case. In this paper, we explore the use of skew-normal/independent distribution as a robust alternative to null intercept measurement error model under a Bayesian paradigm. We assume that the random errors and the unobserved value of the covariate (latent variable) follows jointly a skew-normal/independent distribution, providing an appealing robust alternative to the routine use of symmetric normal distribution in this type of model. Specific distributions examined include univariate and multivariate versions of the skew-normal distribution, the skew-t distributions, the skew-slash distributions and the skew contaminated normal distributions. The methods developed is illustrated using a real data set from a dental clinical trial. (C) 2008 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hålningsprocessen är det inledande bearbetningssteget vid varmvalsning av sömlösa rör. Det är en tvärvalsningsprocess i vilken ett cylindriskt ämne valsas mellan två dubbelkoniska val¬sar över en plugg. Valsarna är snedställda med en viss mat¬ningsvinkel, vilken ger upphov till en axiell drivkraft genom ver¬ket. Hela denna pro¬cess är roterande. Detta i kombination med bl.a. de koniska valsarna leder till en förvrid¬ning av röret, dvs. en tänkt rak linje på det ingå¬ende äm¬net övergår till en spiral efter genomförd valsning. Med föreliggande uppgift är målet att studera förvridningen genom teoretisk och experimen¬tell analys. Syftet med detta är dels att få fördjupad kunskap inom området och dels att ut¬veckla en modell för pre¬diktering av förvridningen.Det experimentella arbetet är utfört på ett stål av typ Ovako 280 (SS2142). Denna mjuka stål¬sort valdes i syfte att undvika värmebehandling innan provberedning. För att visuali¬sera för¬vridningen fräs¬tes ett rakt spår längs det ingående äm¬net och hål borrades mot symmetrilinjen. De praktiska undersökningarna utfördes direkt i den löpande produktionen. Genomförda beräkningar uppvisar en längsgående förvridningsvinkel som stämmer väl över¬ens med uppmätt värde. Detta är dock under antagandet att den tangentiella hastighetskoeffi¬cienten varierar linjärt utmed deformationszonen. För en mer utvecklad modell krävs en nog¬grannare analys av kontakten mellan vals/ämne eller en grundligt genomförd uppmätning av ämnets vinkelhastighet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I obtain the mixed strategy symmetric equilibria of the first-price auction for any distribution. The equilibrium is unique. The solution turns out to be a combination of absolutely continuous distributions case and the discrete distributions case.