scholarly journals On the Staircases of Gyárfás

10.37236/5697 ◽  
2016 ◽  
Vol 23 (2) ◽  
Author(s):  
János Csányi ◽  
Peter Hajnal ◽  
Gábor V. Nagy

In a 2011 paper, Gyárfás investigated a geometric Ramsey problem on convex, separated, balanced, geometric $K_{n,n}$. This led to appealing extremal problem on square 0-1 matrices. Gyárfás conjectured that any 0-1 matrix of size $n\times n$ has a staircase of size $n-1$.We introduce the non-symmetric version of Gyárfás' problem. We give upper bounds and in certain range matching lower bound on the corresponding extremal function. In the square/balanced case we improve the $(4/5+\epsilon)n$ lower bound of Cai, Gyárfás et al. to $5n/6-7/12$. We settle the problem when instead of considering maximum staircases we deal with the sum of the size of the longest $0$- and $1$-staircases.

2009 ◽  
Vol 80 (3) ◽  
pp. 430-453 ◽  
Author(s):  
JOSEF DICK

AbstractWe give upper bounds on the Walsh coefficients of functions for which the derivative of order at least one has bounded variation of fractional order. Further, we also consider the Walsh coefficients of functions in periodic and nonperiodic reproducing kernel Hilbert spaces. A lower bound which shows that our results are best possible is also shown.


Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1484
Author(s):  
Tong Zhang ◽  
Gaojie Chen ◽  
Shuai Wang ◽  
Rui Wang

In this article, the sum secure degrees-of-freedom (SDoF) of the multiple-input multiple-output (MIMO) X channel with confidential messages (XCCM) and arbitrary antenna configurations is studied, where there is no channel state information (CSI) at two transmitters and only delayed CSI at a multiple-antenna, full-duplex, and decode-and-forward relay. We aim at establishing the sum-SDoF lower and upper bounds. For the sum-SDoF lower bound, we design three relay-aided transmission schemes, namely, the relay-aided jamming scheme, the relay-aided jamming and one-receiver interference alignment scheme, and the relay-aided jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. Moreover, the security and decoding of each scheme are analyzed. The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (CSIT). As a result, the sum-SDoF lower and upper bounds are derived, and the sum-SDoF is characterized when the relay has sufficiently large antennas. Furthermore, even assuming no CSI at two transmitters, our results show that a multiple-antenna full-duplex relay with delayed CSI can elevate the sum-SDoF of the MIMO XCCM. This is corroborated by the fact that the derived sum-SDoF lower bound can be greater than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT.


Mathematics ◽  
2020 ◽  
Vol 8 (6) ◽  
pp. 1038
Author(s):  
Han-Wen Tuan ◽  
Gino K. Yang ◽  
Kuo-Chen Hung

Inventory models must consider the probability of sub-optimal manufacturing and careless shipping to prevent the delivery of defective products to retailers. Retailers seeking to preserve a reputation of quality must also perform inspections of all items prior to sale. Inventory models that include sub-lot sampling inspections provide reasonable conditions by which to establish a lower bound and a pair of upper bounds in terms of order quantity. This should make it possible to determine the conditions of an optimal solution, which includes a unique interior solution to the problem of an order quantity satisfying the first partial derivative. The approach proposed in this paper can be used to solve the boundary. These study findings provide the analytical foundation for an inventory model that accounts for defective items and sub-lot sampling inspections. The numerical examples presented in a previous paper are used to demonstrate the derivation of an optimal solution. A counter-example is constructed to illustrate how existing iterative methods do not necessarily converge to the optimal solution.


2019 ◽  
Vol 30 (06n07) ◽  
pp. 1197-1216
Author(s):  
Timothy Ng ◽  
David Rappaport ◽  
Kai Salomaa

The neighbourhood of a regular language with respect to the prefix, suffix and subword distance is always regular and a tight bound for the state complexity of prefix distance neighbourhoods is known. We give upper bounds for the state complexity of the neighbourhood of radius [Formula: see text] of an [Formula: see text]-state deterministic finite automaton language with respect to the suffix distance and the subword distance, respectively. For restricted values of [Formula: see text] and [Formula: see text] we give a matching lower bound for the state complexity of suffix distance neighbourhoods.


1993 ◽  
Vol 03 (04) ◽  
pp. 313-320 ◽  
Author(s):  
PHILIP D. MACKENZIE

In the postal model of message passing systems, the actual communication network between processors is abstracted by a single communication latency factor, which measures the inverse ratio of the time it takes for a processor to send a message and the time that passes until the recipient receives the message. In this paper we examine the problem of broadcasting multiple messages in an order-preserving fashion in the postal model. We prove lower bounds for all parameter ranges and show that these lower bounds are within a factor of seven of the best upper bounds. In some cases, our lower bounds show significant asymptotic improvements over the previous best lower bounds.


1949 ◽  
Vol 14 (1) ◽  
pp. 9-15 ◽  
Author(s):  
Frederic B. Fitch

A demonstrably consistent theory of real numbers has been outlined by the writer in An extension of basic logic1 (hereafter referred to as EBL). This theory deals with non-negative real numbers, but it could be easily modified to deal with negative real numbers also. It was shown that the theory was adequate for proving a form of the fundamental theorem on least upper bounds and greatest lower bounds. More precisely, the following results were obtained in the terminology of EBL: If С is a class of U-reals and is completely represented in Κ′ and if some U-real is an upper bound of С, then there is a U-real which is a least upper bound of С. If D is a class of (U-reals and is completely represented in Κ′, then there is a U-real which is a greatest lower bound of D.


2016 ◽  
Vol 24 (4) ◽  
pp. 719-744 ◽  
Author(s):  
Maxim Buzdalov ◽  
Benjamin Doerr ◽  
Mikhail Kever

We analyze the unrestricted black-box complexity of the Jump function classes for different jump sizes. For upper bounds, we present three algorithms for small, medium, and extreme jump sizes. We prove a matrix lower bound theorem which is capable of giving better lower bounds than the classic information theory approach. Using this theorem, we prove lower bounds that almost match the upper bounds. For the case of extreme jump functions, which apart from the optimum reveal only the middle fitness value(s), we use an additional lower bound argument to show that any black-box algorithm does not gain significant insight about the problem instance from the first [Formula: see text] fitness evaluations. This, together with our upper bound, shows that the black-box complexity of extreme jump functions is [Formula: see text].


2010 ◽  
Vol 2010 ◽  
pp. 1-11
Author(s):  
Qin Guo ◽  
Mingxing Luo ◽  
Lixiang Li ◽  
Yixian Yang

From the perspectives of graph theory and combinatorics theory we obtain some new upper bounds on the number of encoding nodes, which can characterize the coding complexity of the network coding, both in feasible acyclic and cyclic multicast networks. In contrast to previous work, during our analysis we first investigate the simple multicast network with source rateh=2, and thenh≥2. We find that for feasible acyclic multicast networks our upper bound is exactly the lower bound given by M. Langberg et al. in 2006. So the gap between their lower and upper bounds for feasible acyclic multicast networks does not exist. Based on the new upper bound, we improve the computational complexity given by M. Langberg et al. in 2009. Moreover, these results further support the feasibility of signatures for network coding.


Author(s):  
Mahir Hassan ◽  
Amir Khajepour

In this work, the application of the Dykstra’s alternating projection method to find the minimum-2-norm solution for actuator forces is discussed in the case when lower and upper bounds are imposed on the actuator forces. The lower bound is due to specified pretension desired in the cables and the upper bound is due to the maximum allowable forces in the cables. This algorithm presents a systematic numerical method to determine whether or not a solution exists to the cable forces within these bounds and, if it does exist, calculate the minimum-2-norm solution for the cable forces for a given task force. This method is applied to an example 2-DOF translational cable-driven manipulator and a geometrical demonstration is presented.


Author(s):  
Jan Feliksiak

The Brocard conjecture asserts that the number of primes, within the interval, between the squares of two subsequent primes is greater than or equal to 4. Although the number of primes within this interval varies to a great degree, there is a common ground, which makes it possible to settle this old conundrum. Three bounds are developed: the least lower bound and the lower/upper bounds. The least lower bound is implemented to prove the conjecture. The lower/upper bounds exploit the shortest such interval, namely between the twin primes. This has been done in order to establish the bounds, on the smallest number of primes within that interval. The research objective was not only to provide a true/false answer, but to clarify some aspects of the distribution of prime numbers within this interval as well.


Sign in / Sign up

Export Citation Format

Share Document