2,789 research outputs found

    Existence and uniqueness of solutions for systems of fractional differential equations with Riemann–Stieltjes integral boundary condition

    Get PDF
    In this article, we first establish an existence and uniqueness result for a class of systems of nonlinear operator equations under more general conditions by means of the cone theory and monotone iterative technique. Furthermore, the iterative sequence of the solution and the error estimation of the system are given. Then we use this new result to study the existence and uniqueness of the solution for boundary value problems of systems of fractional differential equations with a Riemann–Stieltjes integral boundary condition in real Banach spaces. The results obtained in this paper are more general than many previous results and complement them

    An Algorithm for Probabilistic Alternating Simulation

    Get PDF
    In probabilistic game structures, probabilistic alternating simulation (PA-simulation) relations preserve formulas defined in probabilistic alternating-time temporal logic with respect to the behaviour of a subset of players. We propose a partition based algorithm for computing the largest PA-simulation, which is to our knowledge the first such algorithm that works in polynomial time, by extending the generalised coarsest partition problem (GCPP) in a game-based setting with mixed strategies. The algorithm has higher complexities than those in the literature for non-probabilistic simulation and probabilistic simulation without mixed actions, but slightly improves the existing result for computing probabilistic simulation with respect to mixed actions.Comment: We've fixed a problem in the SOFSEM'12 conference versio

    Is Schr\"{o}dinger's Conjecture for the Hydrogen Atom Coherent States Attainable

    Full text link
    We construct the most general SO(4,2) hydrogen atom coherent states which are the counterpart of Schr\"{o}dinger's harmonic oscillator coherent states. We show that these states cannot be localized and cannot follow the classical orbits. Thus, Schr\"{o}dinger's conjecture for the hydrogen atom coherent states is unattainable.Comment: 10 pages, report

    Crosstalk between MSH2–MSH3 and polβ promotes trinucleotide repeat expansion during base excision repair

    Get PDF
    Studies in knockout mice provide evidence that MSH2–MSH3 and the BER machinery promote trinucleotide repeat (TNR) expansion, yet how these two different repair pathways cause the mutation is unknown. Here we report the first molecular crosstalk mechanism, in which MSH2–MSH3 is used as a component of the BER machinery to cause expansion. On its own, pol β fails to copy TNRs during DNA synthesis, and bypasses them on the template strand to cause deletion. Remarkably, MSH2–MSH3 not only stimulates pol β to copy through the repeats but also enhances formation of the flap precursor for expansion. Our results provide direct evidence that MMR and BER, operating together, form a novel hybrid pathway that changes the outcome of TNR instability from deletion to expansion during the removal of oxidized bases. We propose that cells implement crosstalk strategies and share machinery when a canonical pathway is ineffective in removing a difficult lesion

    Scalar Glueball Decay Into Pions In Effective Theory

    Get PDF
    We discuss the mixing between the sigma meson sigma and the "pure" glueball field H and study the decays of the scalar glueball candidates f_0(1370), f_0(1500) and f_0(1710) (a linear combination of sigma and H) into two pions in an effective linear sigma model.Comment: 10 pages and 3 figures (an extended version of hep-ph/9805412), to appear in Phys. Rev.

    Direct Measurements of the Branching Fractions for D0→K−e+νeD^0 \to K^-e^+\nu_e and D0→π−e+νeD^0 \to \pi^-e^+\nu_e and Determinations of the Form Factors f+K(0)f_{+}^{K}(0) and f+π(0)f^{\pi}_{+}(0)

    Get PDF
    The absolute branching fractions for the decays D0→K−e+νeD^0 \to K^-e ^+\nu_e and D0→π−e+νeD^0 \to \pi^-e^+\nu_e are determined using 7584±198±3417584\pm 198 \pm 341 singly tagged Dˉ0\bar D^0 sample from the data collected around 3.773 GeV with the BES-II detector at the BEPC. In the system recoiling against the singly tagged Dˉ0\bar D^0 meson, 104.0±10.9104.0\pm 10.9 events for D0→K−e+νeD^0 \to K^-e ^+\nu_e and 9.0±3.69.0 \pm 3.6 events for D0→π−e+νeD^0 \to \pi^-e^+\nu_e decays are observed. Those yield the absolute branching fractions to be BF(D0→K−e+νe)=(3.82±0.40±0.27)BF(D^0 \to K^-e^+\nu_e)=(3.82 \pm 0.40\pm 0.27)% and BF(D0→π−e+νe)=(0.33±0.13±0.03)BF(D^0 \to \pi^-e^+\nu_e)=(0.33 \pm 0.13\pm 0.03)%. The vector form factors are determined to be ∣f+K(0)∣=0.78±0.04±0.03|f^K_+(0)| = 0.78 \pm 0.04 \pm 0.03 and ∣f+π(0)∣=0.73±0.14±0.06|f^{\pi}_+(0)| = 0.73 \pm 0.14 \pm 0.06. The ratio of the two form factors is measured to be ∣f+π(0)/f+K(0)∣=0.93±0.19±0.07|f^{\pi}_+(0)/f^K_+(0)|= 0.93 \pm 0.19 \pm 0.07.Comment: 6 pages, 5 figure

    A Bezier curve-based generic shape encoder

    Get PDF
    Existing Bezier curve based shape description techniques primarily focus upon determining a set of pertinent Control Points (CP) to represent a particular shape contour. While many different approaches have been proposed, none adequately consider domain specific information about the shape contour like its gradualness and sharpness, in the CP generation process which can potentially result in large distortions in the object’s shape representation. This paper introduces a novel Bezier Curve-based Generic Shape Encoder (BCGSE) that partitions an object contour into contiguous segments based upon its cornerity, before generating the CP for each segment using relevant shape curvature information. In addition, while CP encoding has generally been ignored, BCGSE embeds an efficient vertex-based encoding strategy exploiting the latent equidistance between consecutive CP. A nonlinear optimisation technique is also presented to enable the encoder is automatically adapt to bit-rate constraints. The performance of the BCGSE framework has been rigorously tested on a variety of diverse arbitrary shapes from both a distortion and requisite bit-rate perspective, with qualitative and quantitative results corroborating its superiority over existing shape descriptors

    Search for the Lepton Flavor Violation Processes J/ψ→J/\psi \to μτ\mu\tau and eτe\tau

    Full text link
    The lepton flavor violation processes J/ψ→μτJ/\psi \to \mu\tau and eτe\tau are searched for using a sample of 5.8×107\times 10^7 J/ψJ/\psi events collected with the BESII detector. Zero and one candidate events, consistent with the estimated background, are observed in J/ψ→μτ,τ→eνˉeντJ/\psi \to \mu\tau, \tau\to e\bar\nu_e\nu_{\tau} and J/ψ→eτ,τ→μνˉμντJ/\psi\to e\tau, \tau\to\mu\bar\nu_{\mu}\nu_{\tau} decays, respectively. Upper limits on the branching ratios are determined to be Br(J/ψ→μτ)<2.0×10−6Br(J/\psi\to\mu\tau)<2.0 \times 10^{-6} and Br(J/ψ→eτ)<8.3×10−6Br(J/\psi \to e\tau) < 8.3 \times10^{-6} at the 90% confidence level (C.L.).Comment: 9 pages, 2 figure
    • …
    corecore