31,919 research outputs found
Sparse domination via the helicoidal method
Using exclusively the localized estimates upon which the helicoidal method
was built, we show how sparse estimates can also be obtained. This approach
yields a sparse domination for multiple vector-valued extensions of operators
as well. We illustrate these ideas for an -linear Fourier multiplier whose
symbol is singular along a -dimensional subspace of , where , and for the
variational Carleson operator.Comment: 60 page
Small-scale Effects of Thermal Inflation on Halo Abundance at High-, Galaxy Substructure Abundance and 21-cm Power Spectrum
We study the impact of thermal inflation on the formation of cosmological
structures and present astrophysical observables which can be used to constrain
and possibly probe the thermal inflation scenario. These are dark matter halo
abundance at high redshifts, satellite galaxy abundance in the Milky Way, and
fluctuation in the 21-cm radiation background before the epoch of reionization.
The thermal inflation scenario leaves a characteristic signature on the matter
power spectrum by boosting the amplitude at a specific wavenumber determined by
the number of e-foldings during thermal inflation (), and strongly
suppressing the amplitude for modes at smaller scales. For a reasonable range
of parameter space, one of the consequences is the suppression of minihalo
formation at high redshifts and that of satellite galaxies in the Milky Way.
While this effect is substantial, it is degenerate with other cosmological or
astrophysical effects. The power spectrum of the 21-cm background probes this
impact more directly, and its observation may be the best way to constrain the
thermal inflation scenario due to the characteristic signature in the power
spectrum. The Square Kilometre Array (SKA) in phase 1 (SKA1) has sensitivity
large enough to achieve this goal for models with if a
10000-hr observation is performed. The final phase SKA, with anticipated
sensitivity about an order of magnitude higher, seems more promising and will
cover a wider parameter space.Comment: 28 pages, 8 figure
Revolutionaries and spies: Spy-good and spy-bad graphs
We study a game on a graph played by {\it revolutionaries} and
{\it spies}. Initially, revolutionaries and then spies occupy vertices. In each
subsequent round, each revolutionary may move to a neighboring vertex or not
move, and then each spy has the same option. The revolutionaries win if of
them meet at some vertex having no spy (at the end of a round); the spies win
if they can avoid this forever.
Let denote the minimum number of spies needed to win. To
avoid degenerate cases, assume |V(G)|\ge r-m+1\ge\floor{r/m}\ge 1. The easy
bounds are then \floor{r/m}\le \sigma(G,m,r)\le r-m+1. We prove that the
lower bound is sharp when has a rooted spanning tree such that every
edge of not in joins two vertices having the same parent in . As a
consequence, \sigma(G,m,r)\le\gamma(G)\floor{r/m}, where is the
domination number; this bound is nearly sharp when .
For the random graph with constant edge-probability , we obtain constants
and (depending on and ) such that is near the
trivial upper bound when and at most times the trivial lower
bound when . For the hypercube with , we have
when , and for at least spies are
needed.
For complete -partite graphs with partite sets of size at least , the
leading term in is approximately
when . For , we have
\sigma(G,2,r)=\bigl\lceil{\frac{\floor{7r/2}-3}5}\bigr\rceil and
\sigma(G,3,r)=\floor{r/2}, and in general .Comment: 34 pages, 2 figures. The most important changes in this revision are
improvements of the results on hypercubes and random graphs. The proof of the
previous hypercube result has been deleted, but the statement remains because
it is stronger for m<52. In the random graph section we added a spy-strategy
resul
From constructive field theory to fractional stochastic calculus. (II) Constructive proof of convergence for the L\'evy area of fractional Brownian motion with Hurst index
{Let be a -dimensional fractional Brownian motion
with Hurst index , or more generally a Gaussian process whose paths
have the same local regularity. Defining properly iterated integrals of is
a difficult task because of the low H\"older regularity index of its paths. Yet
rough path theory shows it is the key to the construction of a stochastic
calculus with respect to , or to solving differential equations driven by
.
We intend to show in a series of papers how to desingularize iterated
integrals by a weak, singular non-Gaussian perturbation of the Gaussian measure
defined by a limit in law procedure. Convergence is proved by using "standard"
tools of constructive field theory, in particular cluster expansions and
renormalization. These powerful tools allow optimal estimates, and call for an
extension of Gaussian tools such as for instance the Malliavin calculus.
After a first introductory paper \cite{MagUnt1}, this one concentrates on the
details of the constructive proof of convergence for second-order iterated
integrals, also known as L\'evy area
A quantitative analysis of secondary RNA structure using domination based parameters on trees
BACKGROUND: It has become increasingly apparent that a comprehensive database of RNA motifs is essential in order to achieve new goals in genomic and proteomic research. Secondary RNA structures have frequently been represented by various modeling methods as graph-theoretic trees. Using graph theory as a modeling tool allows the vast resources of graphical invariants to be utilized to numerically identify secondary RNA motifs. The domination number of a graph is a graphical invariant that is sensitive to even a slight change in the structure of a tree. The invariants selected in this study are variations of the domination number of a graph. These graphical invariants are partitioned into two classes, and we define two parameters based on each of these classes. These parameters are calculated for all small order trees and a statistical analysis of the resulting data is conducted to determine if the values of these parameters can be utilized to identify which trees of orders seven and eight are RNA-like in structure. RESULTS: The statistical analysis shows that the domination based parameters correctly distinguish between the trees that represent native structures and those that are not likely candidates to represent RNA. Some of the trees previously identified as candidate structures are found to be "very" RNA like, while others are not, thereby refining the space of structures likely to be found as representing secondary RNA structure. CONCLUSION: Search algorithms are available that mine nucleotide sequence databases. However, the number of motifs identified can be quite large, making a further search for similar motif computationally difficult. Much of the work in the bioinformatics arena is toward the development of better algorithms to address the computational problem. This work, on the other hand, uses mathematical descriptors to more clearly characterize the RNA motifs and thereby reduce the corresponding search space. These preliminary findings demonstrate that graph-theoretic quantifiers utilized in fields such as computer network design hold significant promise as an added tool for genomics and proteomics
Global Domination Stable Graphs
A set of vertices S in a graph G is a global dominating set (GDS) of G if S is a dominating set for both G and its complement G. The minimum cardinality of a global dominating set of G is the global domination number of G. We explore the effects of graph modifications on the global domination number. In particular, we explore edge removal, edge addition, and vertex removal
- …