On approximation of p-adic numbers by p-adic algebraic numbers

合集下载

高精度10V参考电源AD587说明书

高精度10V参考电源AD587说明书

FUNCTIONAL BLOCK DIAGRAMREV.CInformation furnished by Analog Devices is believed to be accurate and reliable. However, no responsibility is assumed by Analog Devices for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of Analog Devices.aHigh Precision 10 V ReferenceAD587One Technology Way, P.O. Box 9106, Norwood, MA 02062-9106, U.S.A.Tel: 617/329-4700Fax: 617/326-8703FEATURESLaser Trimmed to High Accuracy:10.000 V ؎5 mV (L and U Grades)Trimmed Temperature Coefficient:5 ppm/؇C max, (L and U Grades)Noise Reduction CapabilityLow Quiescent Current: 4 mA max Output Trim CapabilityMIL-STD-883 Compliant Versions AvailablePRODUCT HIGHLIGHTSser trimming of both initial accuracy and temperature coefficients results in very low errors over temperature with-out the use of external components. The AD587L has amaximum deviation from 10.000 V of ±8.5 mV between 0°C and +70°C, and the AD587U guarantees ±14 mV maximum total error between –55°C and +125°C.2.For applications requiring higher precision, an optional fine trim connection is provided.3.Any system using an industry standard pinout 10 volt refer-ence can be upgraded instantly with the AD587.4.Output noise of the AD587 is very low, typically 4 µV p-p. A noise reduction pin is provided for additional noise filtering using an external capacitor.5.The AD587 is available in versions compliant with MIL-STD-883. Refer to the Analog Devices Military Products Databook or current AD587/883B data sheet for detailed specifications.PRODUCT DESCRIPTION The AD587 represents a major advance in the state-of-the-art in monolithic voltage references. Using a proprietary ion-implanted buried Zener diode and laser wafer trimming of high stability thin-film resistors, the AD587 provides outstanding perfor-mance at low cost.The AD587 offers much higher performance than most other 10 V references. Because the AD587 uses an industry standard pinout, many systems can be upgraded instantly with the AD587. The buried Zener approach to reference design pro-vides lower noise and drift than bandgap voltage references. The AD587 offers a noise reduction pin which can be used to further reduce the noise level generated by the buried Zener.The AD587 is recommended for use as a reference for 8-, 10-,12-, 14- or 16-bit D/A converters which require an external precision reference. The device is also ideal for successiveapproximation or integrating A/D converters with up to 14 bits of accuracy and, in general, can offer better performance than the standard on-chip references.The AD587J, K and L are specified for operation from 0°C to +70°C, and the AD587S, T and U are specified for –55°C to +125°C operation. All grades are available in 8-pin cerdip. The J and K versions are also available in an 8-pin Small Outline IC (SOIC) package for surface mount applications, while the J, K and L grades also come in an 8-pin plastic package.NOISE V OUTTRIMGNDNOTE:PINS 1,3 AND 7 ARE INTERNAL TEST POINTS.NO CONNECTIONS TO THESE POINTS.AD587–SPECIFICATIONS(T A = +25؇C, V IN = +15 V unless otherwise noted)Model AD587J/S AD587K/T AD587L/UMin Typ Max Min Typ Max Min Typ Max Units OUTPUT VOLTAGE9.99010.0109.99510.0059.99510.005VOUTPUT VOLTAGE DRIFT10°C to +70°C20105ppm/°C –55°C to +125°C20105GAIN ADJUSTMENT+3+3+3%–1–1–1LINE REGULATION113.5 V ≤ + V IN≤ 36 VT MIN to T MAX100100100±µV/VLOAD REGULATION1Sourcing 0 < I OUT < 10 mAT MIN to T MAX100100100±µV/mA Sourcing –10 < I OUT < 0 mA2T MIN to T MAX100100100QUIESCENT CURRENT242424mAPOWER DISSIPATION303030mWOUTPUT NOISE0.1 Hz to 10 Hz444µV p-pSpectral Density, 100 Hz100100100nV/√HzLONG-TERM STABILITY151515±ppm/1000 Hr. SHORT-CIRCUIT CURRENT-TO-GROUND305030503050mASHORT-CIRCUIT CURRENT-TO-V IN305030503050mA TEMPERATURE RANGESpecified Performance (J, K, L)0+700+700+70°COperating Performance (J, K, L)3–40+85–40+85–40+85Specified Performance (S, T, U)–55+125–55+125–55+125Operating Performance (S, T, U)3–55+125–55+125–55+125NOTES1Spec is guaranteed for all packages and grades. Cerdip packaged parts are 100% production test.2Load Regulation (Sinking) specification for SOIC (R) package is ±200 µV/mA.3The operating temperature ranged is defined as the temperatures extremes at which the device will still function. Parts may deviate from their specified performance outside their specified temperature range.Specifications subject to change without notice.ORDERING GUIDEInitial Temperature Temperature PackageModel1Error Coefficient Range Options2AD587JQ10 mV20 ppm/°C0°C to +70°C Q-8AD587JR10 mV20 ppm/°C0°C to +70°C SO-8AD587JN10 mV20 ppm/°C0°C to +70°C N-8AD587KQ 5 mV10 ppm/°C0°C to +70°C Q-8AD587KR 5 mV10 ppm/°C0°C to +70°C SO-8AD587KN 5 mV10 ppm/°C0°C to +70°C N-8AD587LQ 5 mV 5 ppm/°C0°C to +70°C Q-8AD587LN 5 mV 5 ppm/°C0°C to +70°C N-8AD587SQ10 mV20 ppm/°C–55°C to +125°C Q-8AD587TQ10 mV10 ppm/°C–55°C to +125°C Q-8AD587UQ 5 mV 5 ppm/°C–55°C to +125°C Q-8AD587JCHIPS10 mV20 ppm/°C0°C to +70°CNOTES1For details on grade and package offerings screened in accordance with MIL-STD-883, refer to theAnalog Devices Military Products Databook or current AD587/883B data sheet.2N = Plastic DIP; Q = Cerdip; SO = SOIC.–2–REV. CAD587REV. C –3–ABSOLUTE MAXIMUM RATINGS*V IN to Ground . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 V Power Dissipation (+25°C) . . . . . . . . . . . . . . . . . . . . .500 mW Storage Temperature . . . . . . . . . . . . . . . . . . .–65°C to +150°C Lead Temperature (Soldering, 10 sec) . . . . . . . . . . . . .+300°C Package Thermal ResistanceθJC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22°C/W θJA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110°C/W Output Protection: Output safe for indefinite short to ground and momentary short to V IN .*Stresses above those listed under “Absolute Maximum Ratings” may cause permanent damage to the device. This is a stress rating only and functional operation of the device at these or any other conditions above those indicated in the operational sections of this specification is not implied. Exposure to absolute maximum rating conditions for extended periods may affect device reliability.DIE SPECIFICATIONSThe following specifications are tested at the die level for AD587JCHIPS. These die are probed at +25°C only.(T A = +25°C, V IN = +15 V unless otherwise noted)AD587JCHIPS Parameter Min Typ Max UnitsOutput Voltage 9.99010.010V Gain Adjustment –13%Line Regulation13.5 V < + V IN < 36 V 100±µV/V Load RegulationSourcing 0 < I OUT < 10 mA 100µV/mA Sinking –10 < I OUT < 0 mA 100µV/mA Quiescent Current24mA Short-Circuit Current-to-Ground 50mA Short-Circuit Currrent-to-V OUT50mANOTES 1Both V OUT pads should be connected to the output.2Sense and force grounds must be tied together.Die Thickness:The standard thickness of Analog Devices Bipolar dice is 24 mils ± 2 mils.Die Dimensions: The dimensions given have a tolerance of ±2 mils.Backing : The standard backside surface is silicon (not plated). Analog Devices does not recommend gold-backed dice for most applications.Edges: A diamond saw is used to separate wafers into dice thus providing perpendicular edges half-way through the die.In contrast to scribed dice, this technique provides a more uniform die shape and size . The perpen-dicular edges facilitate handling (such as tweezer pick-up) while the uniform shape and size simplifies substrate design and die attach.Top Surface: The standard top surface of the die is covered by a layer of glassivation . All areas are covered except bonding pads and scribe lines.Surface Metalization: The metalization to Analog Devices bipolar dice is aluminum. Minimum thickness is 10,000Å.Bonding Pads: All bonding pads have a minimum size of 4 mils by 4 mils. The passivation windows have 3.5 mils by 3.5 mils minimum.DIE LAYOUTPIN CONFIGURATIONTP *TRIMV OUTTP *NOISEREDUCTION+V IN TP *GND *TP DENOTES FACTORY TEST POINT. NO CONNECTIONS SHOULD BE MADE TO THESE PINS.Die Size: 0.081 × 0.060 InchesAD587REV. C–4–THEORY OF OPERATIONThe AD587 consists of a proprietary buried Zener diode refer-ence, an amplifier to buffer the output and several high stability thin-film resistors as shown in the block diagram in Figure 1.This design results in a high precision monolithic 10 V output reference with initial offset of 5 mV or less. The temperature compensation circuitry provides the device with a temperature coefficient of under 5 ppm/°C.NOISE V OUTTRIM GNDNOTE:PINS 1,3 AND 7 ARE INTERNAL TEST POINTS.NO CONNECTIONS TO THESE POINTS.Figure 1.AD587 Functional Block Diagram A capacitor can be added at the NOISE REDUCTION pin (Pin 8) to form a low-pass filter with R S to reduce the noise contribu-tion of the Zener to the circuit.APPLYING THE AD587The AD587 is simple to use in virtually all precision reference applications. When power is applied to Pin 2, and Pin 4 is grounded, Pin 6 provides a 10 V output. No external compo-nents are required; the degree of desired absolute accuracy is achieved simply by selecting the required device grade. The AD587 requires less than 4 mA quiescent current from an oper-ating supply of +15 V.Fine trimming may be desired to set the output level to exactly 10.000 V (calibrated to a main system reference). System cali-bration may also require a reference voltage that is slightly differ-ent from 10.000 V, for example, 10.24 V for binary applications.In either case, the optional trim circuit shown in Figure 2 can offset the output by as much as 300 mV, if desired, with mini-mal effect on other device characteristics.OUTPUTC Figure 2.Optional Fine Trim ConfigurationNOISE PERFORMANCE AND REDUCTIONThe noise generated by the AD587 is typically less than 4 µV p-p over the 0.1 Hz to 10 Hz band. Noise in a 1 MHz band-width is approximately 200 µV p-p. The dominant source of this noise is the buried Zener which contributes approximately 100 nV/√Hz . In comparison, the op amp’s contribution is negli-gible. Figure 3 shows the 0.1 Hz to 10 Hz noise of a typical AD587. The noise measurement is made with a bandpass filter made of a 1-pole high-pass filter with a corner frequency at 0.1 Hz and a 2-pole low-pass filter with a corner frequency at 12.6 Hz to create a filter with a 9.922 Hz bandwidth.Figure 3.0.1 Hz to 10 Hz NoiseIf further noise reduction is desired, an external capacitor may be added between the NOISE REDUCTION pin and ground as shown in Figure 2. This capacitor, combined with the 4 k Ω R S and the Zener resistances, form a low-pass filter on the output of the Zener cell. A 1 µF capacitor will have a 3 dB point at 40 Hz, and it will reduce the high frequency (to 1 MHz) noise to about 160 µV p-p. Figure 4 shows the 1 MHz noise of a typi-cal AD587 both with and without a 1 µF capacitor.Figure 4.Effect of 1 µF Noise Reduction Capacitor on Broadband Noise TURN-ON TIMEUpon application of power (cold start), the time required for the output voltage to reach its final value within a specified error band is defined as the turn-on settling time. Two components normally associated with this are: the time for the active circuits to settle, and the time for the thermal gradients on the chip to stabilize. Figure 5 shows the turn-on characteristics of theAD587. It shows the settling to be about 60 µs to 0.01%. Note the absence of any thermal tails when the horizontal scale is ex-panded to 1 ms/cm in Figure 5b.AD587REV. C–5–DYNAMIC PERFORMANCEThe output buffer amplifier is designed to provide the AD587 with static and dynamic load regulation superior to less com-plete references.Many A/D and D/A converters present transient current loads to the reference, and poor reference response can degrade the converter’s performance.Figure 6 displays the characteristics of the AD587 output ampli-fier driving a 0 mA to 10 mA load.Output turn-on time is modified when an external noise reduc-tion capacitor is used. When present, this capacitor acts as an additional load to the internal Zener diode’s current source, re-sulting in a somewhat longer turn-on time. In the case of a 1 µF capacitor, the initial turn-on time is approximately 400 ms to 0.01% (see Figure 5c).a.Electrical Turn-Onb.Extended Time Scalec.Turn-On with 1 µF C N Figure 5.Turn-On CharacteristicsFigure 6a.Transient Load Test Circuit Figure rge-Scale Transient Response Figure 6c.Fine Scale Settling for Transient LoadOUTAD587REV. C–6–In some applications, a varying load may be both resistive and capacitive in nature, or the load may be connected to the AD587 by a long capacitive cable.Figure 7 displays the output amplifier characteristics driving a 1000 pF, 0 mA to 10 mA load.V OUTFigure 7a.Capacitive Load Transient /Response Test CircuitFigure 7b.Output Response with Capacitive Load LOAD REGULATIONThe AD587 has excellent load regulation characteristics. Figure 8 shows that varying the load several mA changes the output by only a few µV.Figure 8.Typical Load Regulation Characteristics TEMPERATURE PERFORMANCEThe AD587 is designed for precision reference applications where temperature performance is critical. Extensive tempera-ture testing ensures that the device’s high level of performance is maintained over the operating temperature range.Some confusion exists in the area of defining and specifying ref-erence voltage error over temperature. Historically, references have been characterized using a maximum deviation per degree Centrigrade; i.e., ppm/°C. However, because of nonlinearities in temperature characteristics which originated in standard Zener references (such as “S” type characteristics), most manufactur-ers have begun to use a maximum limit error band approach to specify devices. This technique involves the measurement of the output at three or more different temperatures to specify an out-put voltage error band.Figure 9 shows the typical output voltage drift for the AD587L and illustrates the test methodology. The box in Figure 9 is bounded on the sides by thc operating temperature extremes,and on the top and the bottom by the maximum and minimum output voltages measured over the operating temperature range.The slope of the diagonal drawn from the lower left to the upper right corner of the box determines the performance grade of the device.Figure 9.Typical AD587L Temperature DriftEach AD587J, K, L grade unit is tested at 0°C, +25°C and +70°C. Each AD587S, T, and U grade unit is tested at –55°C,+25°C and +125°C. This approach ensures that the variations of output voltage that occur as the temperature changes within the specified range will be contained within a box whose diago-nal has a slope equal to the maximum specified drift. The posi-tion of the box on the vertical scale will change from device to device as initial error and the shape of the curve vary. The maxi-mum height of the box for the appropriate temperature range and device grade is shown in Figure 10. Duplication of these results requires a combination of high accuracy and stable temperature control in a test system. Evaluation of the AD587will produce a curve similar to that in Figure 9, but output readings may vary depending on the test methods and equip-ment utilized.Figure 10.Maximum Output Change in mVAD587REV. C –7–NEGATIVE REFERENCE VOLTAGE FROM AN AD587The AD587 can be used to provide a precision –10.000 V output as shown in Figure 11. The V IN pin is tied to at least a +3.5 V supply, the output pin is grounded, and the AD587 ground pin is connected through a resistor, R S , to a –15 V supply. The –10 V output is now taken from the ground pin (Pin 4) instead of V OUT . It is essential to arrange the output load and the sup-ply resistor R S so that the net current through the AD587 is be-tween 2.5 mA and 10.0 mA. The temperature characteristics and long-term stability of the device will be essentially the same as that of a unit used in the standard +10 V output configuration.1nF–15V–10VL <10mASFigure 11.AD587 as a Negative 10 V Reference USING THE AD587 WITH CONVERTERSThe AD587 is an ideal reference for a wide variety of 8-, 12-,14- and 16-bit A/D and D/A converters. Several representative examples follow.10 V REFERENCE WITH MULTIPLYING CMOS D/A OR A/D CONVERTERSThe AD587 is ideal for applications with 10- and 12-bit multi-plying CMOS D/A converters. In the standard hookup, as shown in Figure 12, the AD587 is paired with the AD754512-bit multiplying DAC and the AD711 high-speed BiFET Op Amp. The amplifier DAC configuration produces a unipolar 0 V to –10 V output range. Bipolar output applications and other operating details can be found on the individual product data sheets.Figure 12.Low Power 12-Bit CMOS DAC ApplicationThe AD587 can also be used as a precision reference for mul-tiple DACs. Figure 13 shows the AD587, the AD7628 dual DAC and the AD712 dual op amp hooked up for single supply operation to produce 0 V to –10 V outputs. Because both DACsare on the same die and share a common reference and output op amps; the DAC outputs will exhibit similar gain TCs.Figure 13. AD587 as a 10 V Reference for a CMOS Dual DACPRECISION CURRENT SOURCEThe design of the AD587 allows it to be easily configured as a current source. By choosing the control resistor R C in Figure 14,you can vary the load current from the quiescent current (2 mA typically) to approximately 10 mA.+V I L = + I BIAS10VR CFigure 14. Precision Current SourceAD587REV. C –8–P R I N T E D I N U . S . A . C 1 1 3 6 a –1 5–1 0 / 8 8PRECISION HIGH CURRENT SUPPLYFor higher currents, the AD587 can easily be connected to a power PNP or power Darlington PNP device. The circuit in Figure 15 can deliver up to 4 amps to the load. The 0.1 µF capacitor is required only if the load has a significant capacitive component. If the load is purely resistive, improved high fre-quency supply rejection results can be obtained by removing thecapacitor.Figure 15a. Precision High-Current Current Source Figure 15b.Precision High-Current Voltage SourceCerdip (Q-8) PackageMini-DIP (N-8) Package Small Outline (R-8) PackageOUTLINE DIMENSIONSDimensions shown in inches and (mm).。

Multicamera People Tracking with a Probabilistic Occupancy Map

Multicamera People Tracking with a Probabilistic Occupancy Map

Multicamera People Tracking witha Probabilistic Occupancy MapFranc¸ois Fleuret,Je´roˆme Berclaz,Richard Lengagne,and Pascal Fua,Senior Member,IEEE Abstract—Given two to four synchronized video streams taken at eye level and from different angles,we show that we can effectively combine a generative model with dynamic programming to accurately follow up to six individuals across thousands of frames in spite of significant occlusions and lighting changes.In addition,we also derive metrically accurate trajectories for each of them.Our contribution is twofold.First,we demonstrate that our generative model can effectively handle occlusions in each time frame independently,even when the only data available comes from the output of a simple background subtraction algorithm and when the number of individuals is unknown a priori.Second,we show that multiperson tracking can be reliably achieved by processing individual trajectories separately over long sequences,provided that a reasonable heuristic is used to rank these individuals and that we avoid confusing them with one another.Index Terms—Multipeople tracking,multicamera,visual surveillance,probabilistic occupancy map,dynamic programming,Hidden Markov Model.Ç1I NTRODUCTIONI N this paper,we address the problem of keeping track of people who occlude each other using a small number of synchronized videos such as those depicted in Fig.1,which were taken at head level and from very different angles. This is important because this kind of setup is very common for applications such as video surveillance in public places.To this end,we have developed a mathematical framework that allows us to combine a robust approach to estimating the probabilities of occupancy of the ground plane at individual time steps with dynamic programming to track people over time.This results in a fully automated system that can track up to six people in a room for several minutes by using only four cameras,without producing any false positives or false negatives in spite of severe occlusions and lighting variations. As shown in Fig.2,our system also provides location estimates that are accurate to within a few tens of centimeters, and there is no measurable performance decrease if as many as20percent of the images are lost and only a small one if 30percent are.This involves two algorithmic steps:1.We estimate the probabilities of occupancy of theground plane,given the binary images obtained fromthe input images via background subtraction[7].Atthis stage,the algorithm only takes into accountimages acquired at the same time.Its basic ingredientis a generative model that represents humans assimple rectangles that it uses to create synthetic idealimages that we would observe if people were at givenlocations.Under this model of the images,given thetrue occupancy,we approximate the probabilities ofoccupancy at every location as the marginals of aproduct law minimizing the Kullback-Leibler diver-gence from the“true”conditional posterior distribu-tion.This allows us to evaluate the probabilities ofoccupancy at every location as the fixed point of alarge system of equations.2.We then combine these probabilities with a color and amotion model and use the Viterbi algorithm toaccurately follow individuals across thousands offrames[3].To avoid the combinatorial explosion thatwould result from explicitly dealing with the jointposterior distribution of the locations of individuals ineach frame over a fine discretization,we use a greedyapproach:we process trajectories individually oversequences that are long enough so that using areasonable heuristic to choose the order in which theyare processed is sufficient to avoid confusing peoplewith each other.In contrast to most state-of-the-art algorithms that recursively update estimates from frame to frame and may therefore fail catastrophically if difficult conditions persist over several consecutive frames,our algorithm can handle such situations since it computes the global optima of scores summed over many frames.This is what gives it the robustness that Fig.2demonstrates.In short,we combine a mathematically well-founded generative model that works in each frame individually with a simple approach to global optimization.This yields excellent performance by using basic color and motion models that could be further improved.Our contribution is therefore twofold.First,we demonstrate that a generative model can effectively handle occlusions at each time frame independently,even when the input data is of very poor quality,and is therefore easy to obtain.Second,we show that multiperson tracking can be reliably achieved by processing individual trajectories separately over long sequences.. F.Fleuret,J.Berclaz,and P.Fua are with the Ecole Polytechnique Fe´de´ralede Lausanne,Station14,CH-1015Lausanne,Switzerland.E-mail:{francois.fleuret,jerome.berclaz,pascal.fua}@epfl.ch..R.Lengagne is with GE Security-VisioWave,Route de la Pierre22,1024Ecublens,Switzerland.E-mail:richard.lengagne@.Manuscript received14July2006;revised19Jan.2007;accepted28Mar.2007;published online15May2007.Recommended for acceptance by S.Sclaroff.For information on obtaining reprints of this article,please send e-mail to:tpami@,and reference IEEECS Log Number TPAMI-0521-0706.Digital Object Identifier no.10.1109/TPAMI.2007.1174.0162-8828/08/$25.00ß2008IEEE Published by the IEEE Computer SocietyIn the remainder of the paper,we first briefly review related works.We then formulate our problem as estimat-ing the most probable state of a hidden Markov process and propose a model of the visible signal based on an estimate of an occupancy map in every time frame.Finally,we present our results on several long sequences.2R ELATED W ORKState-of-the-art methods can be divided into monocular and multiview approaches that we briefly review in this section.2.1Monocular ApproachesMonocular approaches rely on the input of a single camera to perform tracking.These methods provide a simple and easy-to-deploy setup but must compensate for the lack of 3D information in a single camera view.2.1.1Blob-Based MethodsMany algorithms rely on binary blobs extracted from single video[10],[5],[11].They combine shape analysis and tracking to locate people and maintain appearance models in order to track them,even in the presence of occlusions.The Bayesian Multiple-BLob tracker(BraMBLe)system[12],for example,is a multiblob tracker that generates a blob-likelihood based on a known background model and appearance models of the tracked people.It then uses a particle filter to implement the tracking for an unknown number of people.Approaches that track in a single view prior to computing correspondences across views extend this approach to multi camera setups.However,we view them as falling into the same category because they do not simultaneously exploit the information from multiple views.In[15],the limits of the field of view of each camera are computed in every other camera from motion information.When a person becomes visible in one camera,the system automatically searches for him in other views where he should be visible.In[4],a background/foreground segmentation is performed on calibrated images,followed by human shape extraction from foreground objects and feature point selection extraction. Feature points are tracked in a single view,and the system switches to another view when the current camera no longer has a good view of the person.2.1.2Color-Based MethodsTracking performance can be significantly increased by taking color into account.As shown in[6],the mean-shift pursuit technique based on a dissimilarity measure of color distributions can accurately track deformable objects in real time and in a monocular context.In[16],the images are segmented pixelwise into different classes,thus modeling people by continuously updated Gaussian mixtures.A standard tracking process is then performed using a Bayesian framework,which helps keep track of people,even when there are occlusions.In such a case,models of persons in front keep being updated, whereas the system stops updating occluded ones,which may cause trouble if their appearances have changed noticeably when they re-emerge.More recently,multiple humans have been simulta-neously detected and tracked in crowded scenes[20]by using Monte-Carlo-based methods to estimate their number and positions.In[23],multiple people are also detected and tracked in front of complex backgrounds by using mixture particle filters guided by people models learned by boosting.In[9],multicue3D object tracking is addressed by combining particle-filter-based Bayesian tracking and detection using learned spatiotemporal shapes.This ap-proach leads to impressive results but requires shape, texture,and image depth information as input.Finally, Smith et al.[25]propose a particle-filtering scheme that relies on Markov chain Monte Carlo(MCMC)optimization to handle entrances and departures.It also introduces a finer modeling of interactions between individuals as a product of pairwise potentials.2.2Multiview ApproachesDespite the effectiveness of such methods,the use of multiple cameras soon becomes necessary when one wishes to accurately detect and track multiple people and compute their precise3D locations in a complex environment. Occlusion handling is facilitated by using two sets of stereo color cameras[14].However,in most approaches that only take a set of2D views as input,occlusion is mainly handled by imposing temporal consistency in terms of a motion model,be it Kalman filtering or more general Markov models.As a result,these approaches may not always be able to recover if the process starts diverging.2.2.1Blob-Based MethodsIn[19],Kalman filtering is applied on3D points obtained by fusing in a least squares sense the image-to-world projections of points belonging to binary blobs.Similarly,in[1],a Kalman filter is used to simultaneously track in2D and3D,and objectFig.1.Images from two indoor and two outdoor multicamera video sequences that we use for our experiments.At each time step,we draw a box around people that we detect and assign to them an ID number that follows them throughout thesequence.Fig.2.Cumulative distributions of the position estimate error on a3,800-frame sequence(see Section6.4.1for details).locations are estimated through trajectory prediction during occlusion.In[8],a best hypothesis and a multiple-hypotheses approaches are compared to find people tracks from 3D locations obtained from foreground binary blobs ex-tracted from multiple calibrated views.In[21],a recursive Bayesian estimation approach is used to deal with occlusions while tracking multiple people in multiview.The algorithm tracks objects located in the intersections of2D visual angles,which are extracted from silhouettes obtained from different fixed views.When occlusion ambiguities occur,multiple occlusion hypotheses are generated,given predicted object states and previous hypotheses,and tested using a branch-and-merge strategy. The proposed framework is implemented using a customized particle filter to represent the distribution of object states.Recently,Morariu and Camps[17]proposed a method based on dimensionality reduction to learn a correspondence between the appearance of pedestrians across several views. This approach is able to cope with the severe occlusion in one view by exploiting the appearance of the same pedestrian on another view and the consistence across views.2.2.2Color-Based MethodsMittal and Davis[18]propose a system that segments,detects, and tracks multiple people in a scene by using a wide-baseline setup of up to16synchronized cameras.Intensity informa-tion is directly used to perform single-view pixel classifica-tion and match similarly labeled regions across views to derive3D people locations.Occlusion analysis is performed in two ways:First,during pixel classification,the computa-tion of prior probabilities takes occlusion into account. Second,evidence is gathered across cameras to compute a presence likelihood map on the ground plane that accounts for the visibility of each ground plane point in each view. Ground plane locations are then tracked over time by using a Kalman filter.In[13],individuals are tracked both in image planes and top view.The2D and3D positions of each individual are computed so as to maximize a joint probability defined as the product of a color-based appearance model and2D and 3D motion models derived from a Kalman filter.2.2.3Occupancy Map MethodsRecent techniques explicitly use a discretized occupancy map into which the objects detected in the camera images are back-projected.In[2],the authors rely on a standard detection of stereo disparities,which increase counters associated to square areas on the ground.A mixture of Gaussians is fitted to the resulting score map to estimate the likely location of individuals.This estimate is combined with a Kallman filter to model the motion.In[26],the occupancy map is computed with a standard visual hull procedure.One originality of the approach is to keep for each resulting connex component an upper and lower bound on the number of objects that it can contain. Based on motion consistency,the bounds on the various components are estimated at a certain time frame based on the bounds of the components at the previous time frame that spatially intersect with it.Although our own method shares many features with these techniques,it differs in two important respects that we will highlight:First,we combine the usual color and motion models with a sophisticated approach based on a generative model to estimating the probabilities of occu-pancy,which explicitly handles complex occlusion interac-tions between detected individuals,as will be discussed in Section5.Second,we rely on dynamic programming to ensure greater stability in challenging situations by simul-taneously handling multiple frames.3P ROBLEM F ORMULATIONOur goal is to track an a priori unknown number of people from a few synchronized video streams taken at head level. In this section,we formulate this problem as one of finding the most probable state of a hidden Markov process,given the set of images acquired at each time step,which we will refer to as a temporal frame.We then briefly outline the computation of the relevant probabilities by using the notations summarized in Tables1and2,which we also use in the following two sections to discuss in more details the actual computation of those probabilities.3.1Computing the Optimal TrajectoriesWe process the video sequences by batches of T¼100frames, each of which includes C images,and we compute the most likely trajectory for each individual.To achieve consistency over successive batches,we only keep the result on the first 10frames and slide our temporal window.This is illustrated in Fig.3.We discretize the visible part of the ground plane into a finite number G of regularly spaced2D locations and we introduce a virtual hidden location H that will be used to model entrances and departures from and into the visible area.For a given batch,let L t¼ðL1t;...;L NÃtÞbe the hidden stochastic processes standing for the locations of individuals, whether visible or not.The number NÃstands for the maximum allowable number of individuals in our world.It is large enough so that conditioning on the number of visible ones does not change the probability of a new individual entering the scene.The L n t variables therefore take values in f1;...;G;Hg.Given I t¼ðI1t;...;I C tÞ,the images acquired at time t for 1t T,our task is to find the values of L1;...;L T that maximizePðL1;...;L T j I1;...;I TÞ:ð1ÞAs will be discussed in Section 4.1,we compute this maximum a posteriori in a greedy way,processing one individual at a time,including the hidden ones who can move into the visible scene or not.For each one,the algorithm performs the computation,under the constraint that no individual can be at a visible location occupied by an individual already processed.In theory,this approach could lead to undesirable local minima,for example,by connecting the trajectories of two separate people.However,this does not happen often because our batches are sufficiently long.To further reduce the chances of this,we process individual trajectories in an order that depends on a reliability score so that the most reliable ones are computed first,thereby reducing the potential for confusion when processing the remaining ones. This order also ensures that if an individual remains in the hidden location,then all the other people present in the hidden location will also stay there and,therefore,do not need to be processed.FLEURET ET AL.:MULTICAMERA PEOPLE TRACKING WITH A PROBABILISTIC OCCUPANCY MAP269Our experimental results show that our method does not suffer from the usual weaknesses of greedy algorithms such as a tendency to get caught in bad local minima.We thereforebelieve that it compares very favorably to stochastic optimization techniques in general and more specifically particle filtering,which usually requires careful tuning of metaparameters.3.2Stochastic ModelingWe will show in Section 4.2that since we process individual trajectories,the whole approach only requires us to define avalid motion model P ðL n t þ1j L nt ¼k Þand a sound appearance model P ðI t j L n t ¼k Þ.The motion model P ðL n t þ1j L nt ¼k Þ,which will be intro-duced in Section 4.3,is a distribution into a disc of limited radiusandcenter k ,whichcorresponds toalooseboundonthe maximum speed of a walking human.Entrance into the scene and departure from it are naturally modeled,thanks to the270IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,VOL.30,NO.2,FEBRUARY 2008TABLE 2Notations (RandomQuantities)Fig.3.Video sequences are processed by batch of 100frames.Only the first 10percent of the optimization result is kept and the rest is discarded.The temporal window is then slid forward and the optimiza-tion is repeated on the new window.TABLE 1Notations (DeterministicQuantities)hiddenlocation H,forwhichweextendthemotionmodel.The probabilities to enter and to leave are similar to the transition probabilities between different ground plane locations.In Section4.4,we will show that the appearance model PðI t j L n t¼kÞcan be decomposed into two terms.The first, described in Section4.5,is a very generic color-histogram-based model for each individual.The second,described in Section5,approximates the marginal conditional probabil-ities of occupancy of the ground plane,given the results of a background subtractionalgorithm,in allviewsacquired atthe same time.This approximation is obtained by minimizing the Kullback-Leibler divergence between a product law and the true posterior.We show that this is equivalent to computing the marginal probabilities of occupancy so that under the product law,the images obtained by putting rectangles of human sizes at occupied locations are likely to be similar to the images actually produced by the background subtraction.This represents a departure from more classical ap-proaches to estimating probabilities of occupancy that rely on computing a visual hull[26].Such approaches tend to be pessimistic and do not exploit trade-offs between the presence of people at different locations.For instance,if due to noise in one camera,a person is not seen in a particular view,then he would be discarded,even if he were seen in all others.By contrast,in our probabilistic framework,sufficient evidence might be present to detect him.Similarly,the presence of someone at a specific location creates an occlusion that hides the presence behind,which is not accounted for by the hull techniques but is by our approach.Since these marginal probabilities are computed indepen-dently at each time step,they say nothing about identity or correspondence with past frames.The appearance similarity is entirely conveyed by the color histograms,which has experimentally proved sufficient for our purposes.4C OMPUTATION OF THE T RAJECTORIESIn Section4.1,we break the global optimization of several people’s trajectories into the estimation of optimal individual trajectories.In Section 4.2,we show how this can be performed using the classical Viterbi’s algorithm based on dynamic programming.This requires a motion model given in Section 4.3and an appearance model described in Section4.4,which combines a color model given in Section4.5 and a sophisticated estimation of the ground plane occu-pancy detailed in Section5.We partition the visible area into a regular grid of G locations,as shown in Figs.5c and6,and from the camera calibration,we define for each camera c a family of rectangular shapes A c1;...;A c G,which correspond to crude human silhouettes of height175cm and width50cm located at every position on the grid.4.1Multiple TrajectoriesRecall that we denote by L n¼ðL n1;...;L n TÞthe trajectory of individual n.Given a batch of T temporal frames I¼ðI1;...;I TÞ,we want to maximize the posterior conditional probability:PðL1¼l1;...;L Nül NÃj IÞ¼PðL1¼l1j IÞY NÃn¼2P L n¼l n j I;L1¼l1;...;L nÀ1¼l nÀ1ÀÁ:ð2ÞSimultaneous optimization of all the L i s would beintractable.Instead,we optimize one trajectory after theother,which amounts to looking for^l1¼arg maxlPðL1¼l j IÞ;ð3Þ^l2¼arg maxlPðL2¼l j I;L1¼^l1Þ;ð4Þ...^l Nüarg maxlPðL Nül j I;L1¼^l1;L2¼^l2;...Þ:ð5ÞNote that under our model,conditioning one trajectory,given other ones,simply means that it will go through noalready occupied location.In other words,PðL n¼l j I;L1¼^l1;...;L nÀ1¼^l nÀ1Þ¼PðL n¼l j I;8k<n;8t;L n t¼^l k tÞ;ð6Þwhich is PðL n¼l j IÞwith a reduced set of the admissiblegrid locations.Such a procedure is recursively correct:If all trajectoriesestimated up to step n are correct,then the conditioning onlyimproves the estimate of the optimal remaining trajectories.This would suffice if the image data were informative enoughso that locations could be unambiguously associated toindividuals.In practice,this is obviously rarely the case.Therefore,this greedy approach to optimization has un-desired side effects.For example,due to partly missinglocalization information for a given trajectory,the algorithmmight mistakenly start following another person’s trajectory.This is especially likely to happen if the tracked individualsare located close to each other.To avoid this kind of failure,we process the images bybatches of T¼100and first extend the trajectories that havebeen found with high confidence,as defined below,in theprevious batches.We then process the lower confidenceones.As a result,a trajectory that was problematic in thepast and is likely to be problematic in the current batch willbe optimized last and,thus,prevented from“stealing”somebody else’s location.Furthermore,this approachincreases the spatial constraints on such a trajectory whenwe finally get around to estimating it.We use as a confidence score the concordance of theestimated trajectories in the previous batches and thelocalization cue provided by the estimation of the probabil-istic occupancy map(POM)described in Section5.Moreprecisely,the score is the number of time frames where theestimated trajectory passes through a local maximum of theestimated probability of occupancy.When the POM does notdetect a person on a few frames,the score will naturallydecrease,indicating a deterioration of the localizationinformation.Since there is a high degree of overlappingbetween successive batches,the challenging segment of atrajectory,which is due to the failure of the backgroundsubtraction or change in illumination,for instance,is met inseveral batches before it actually happens during the10keptframes.Thus,the heuristic would have ranked the corre-sponding individual in the last ones to be processed whensuch problem occurs.FLEURET ET AL.:MULTICAMERA PEOPLE TRACKING WITH A PROBABILISTIC OCCUPANCY MAP2714.2Single TrajectoryLet us now consider only the trajectory L n ¼ðL n 1;...;L nT Þof individual n over T temporal frames.We are looking for thevalues ðl n 1;...;l nT Þin the subset of free locations of f 1;...;G;Hg .The initial location l n 1is either a known visible location if the individual is visible in the first frame of the batch or H if he is not.We therefore seek to maximizeP ðL n 1¼l n 1;...;L n T ¼l nt j I 1;...;I T Þ¼P ðI 1;L n 1¼l n 1;...;I T ;L n T ¼l nT ÞP ðI 1;...;I T Þ:ð7ÞSince the denominator is constant with respect to l n ,we simply maximize the numerator,that is,the probability of both the trajectories and the images.Let us introduce the maximum of the probability of both the observations and the trajectory ending up at location k at time t :Èt ðk Þ¼max l n 1;...;l nt À1P ðI 1;L n 1¼l n 1;...;I t ;L nt ¼k Þ:ð8ÞWe model jointly the processes L n t and I t with a hidden Markov model,that isP ðL n t þ1j L n t ;L n t À1;...Þ¼P ðL n t þ1j L nt Þð9ÞandP ðI t ;I t À1;...j L n t ;L nt À1;...Þ¼YtP ðI t j L n t Þ:ð10ÞUnder such a model,we have the classical recursive expressionÈt ðk Þ¼P ðI t j L n t ¼k Þ|fflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl}Appearance modelmax P ðL n t ¼k j L nt À1¼ Þ|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}Motion modelÈt À1ð Þð11Þto perform a global search with dynamic programming,which yields the classic Viterbi algorithm.This is straight-forward,since the L n t s are in a finite set of cardinality G þ1.4.3Motion ModelWe chose a very simple and unconstrained motion model:P ðL n t ¼k j L nt À1¼ Þ¼1=Z Áe À k k À k if k k À k c 0otherwise ;&ð12Þwhere the constant tunes the average human walkingspeed,and c limits the maximum allowable speed.This probability is isotropic,decreases with the distance from location k ,and is zero for k k À k greater than a constantmaximum distance.We use a very loose maximum distance cof one square of the grid per frame,which corresponds to a speed of almost 12mph.We also define explicitly the probabilities of transitions to the parts of the scene that are connected to the hidden location H .This is a single door in the indoor sequences and all the contours of the visible area in the outdoor sequences in Fig.1.Thus,entrance and departure of individuals are taken care of naturally by the estimation of the maximum a posteriori trajectories.If there are enough evidence from the images that somebody enters or leaves the room,then this procedure will estimate that the optimal trajectory does so,and a person will be added to or removed from the visible area.4.4Appearance ModelFrom the input images I t ,we use background subtraction to produce binary masks B t such as those in Fig.4.We denote as T t the colors of the pixels inside the blobs and treat the rest of the images as background,which is ignored.Let X tk be a Boolean random variable standing for the presence of an individual at location k of the grid at time t .In Appendix B,we show thatP ðI t j L n t ¼k Þzfflfflfflfflfflfflfflfflffl}|fflfflfflfflfflfflfflfflffl{Appearance model/P ðL n t ¼k j X kt ¼1;T t Þ|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}Color modelP ðX kt ¼1j B t Þ|fflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflffl}Ground plane occupancy:ð13ÞThe ground plane occupancy term will be discussed in Section 5,and the color model term is computed as follows.4.5Color ModelWe assume that if someone is present at a certain location k ,then his presence influences the color of the pixels located at the intersection of the moving blobs and the rectangle A c k corresponding to the location k .We model that dependency as if the pixels were independent and identically distributed and followed a density in the red,green,and blue (RGB)space associated to the individual.This is far simpler than the color models used in either [18]or [13],which split the body area in several subparts with dedicated color distributions,but has proved sufficient in practice.If an individual n was present in the frames preceding the current batch,then we have an estimation for any camera c of his color distribution c n ,since we have previously collected the pixels in all frames at the locations272IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,VOL.30,NO.2,FEBRUARY2008Fig.4.The color model relies on a stochastic modeling of the color of the pixels T c t ðk Þsampled in the intersection of the binary image B c t produced bythe background subtraction and the rectangle A ck corresponding to the location k .。

A Comprehensive Survey of Multiagent Reinforcement Learning

A Comprehensive Survey of Multiagent Reinforcement Learning
156
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 38, NO. 2, MARCH 2008
A Comprehensive Survey of Multiagent ReinfoN
A
MULTIAGENT system [1] can be defined as a group of autonomous, interacting entities sharing a common environment, which they perceive with sensors and upon which they act with actuators [2]. Multiagent systems are finding applications in a wide variety of domains including robotic teams, distributed control, resource management, collaborative decision support systems, data mining, etc. [3], [4]. They may arise as the most natural way of looking at the system, or may provide an alternative perspective on systems that are originally regarded as centralized. For instance, in robotic teams, the control authority is naturally distributed among the robots [4]. In resource management, while resources can be managed by a central authority, identifying each resource with an agent may provide a helpful, distributed perspective on the system [5].

Exact solution of linear equation systems over rational number by parallel p-adic arithmeti

Exact solution of linear equation systems over rational number by parallel p-adic arithmeti

system based on oating point numbers attempts a division of a large dividend by a small divisor, the oating point result could be far from the exact result. The use of exact arithmetic overcomes this problem. We will apply p-adic arithmetic to perform exact computations and we will compare this approach with the one based on modular arithmetic. There exist mainly two possibilities to compute exact solutions for (1): either one rst transforms the problem to the solution of a system over the integers, or one computes with rational numbers. One can compute a matrix A0 and a vector b0 with integer entries, such that the system A0 x = b0 has the same solutions as (1). To A0 x = b0 one can for instance apply Cramer's rule and obtain a solution avoiding rational arithmetic. This approach has the disadvantage that the entries in A0 are in general considerably larger than the entries in A. On the other hand, working directly with system (1) needs an error-free representation of rational numbers and algorithms for error-free computations with them. In this work we present a parallel implementation for solving linear systems, based on Gaussian elimination algorithm and the p-adic representation of rational numbers via truncated power series w.r.t. a prime basis p. The order of truncation r, as well as the number p, is chosen in accordance with an a priori estimation of the magnitude of the solution of the problem. This allows us to do error-free computations directly with rational numbers. For a detailed treatment of p-adic arithmetic in the context of symbolic computation, refer to 7] and 5]. Our goal is to show that p-adic arithmetic provides an e cient tool for solving linear systems over the rational numbers. For this reason, we compared our implementation with one using modular arithmetic and with a sequential implementation in the computer algebra system Maple 2]. Our parallelization consists of applying the well known Gaussian elimination method (see for instance 1]) for di erent prime bases, and recovering the result by the Chinese Remainder Algorithm (CRA). The implementation was done in Paclib, a C-language library for parallel symbolic computation 6], on a Sequent parallel machine with a MIMD architecture. In the following section we give some basics about p-adic arithmetic. In the third section the application of Gaussian elimination algorithm using p-adic arithmetic will be outlined. Fourth section will be devoted to describing the features of the parallel implementation. Concluding remarks are made in the fth section.

最新maple函数大全资料

最新maple函数大全资料

EllipticCPi
EllipticE
EllipticF
EllipticK
ElliptticNome
EllipticPi
Eval
Expand
FFT
Factor
Factlrs
FresneLC
FresnelS
Fresnelf/Frensnelg
GAMMA
GaussAGM附录 1 Maple 函数库列表
函数库名称 DEtools Domains GF
Gausslnt
对应英文全称 differential equations tools create domains of comqutarton Gaoois Fieldc
Gaussian Integers
函数库内容 微积分工具 创建计算域 伽罗瓦迪场
tensor
graqh networks numerical approximation number theory orthogonal polynomials p-adic numbers 对应英文全称 graphics package basic graphical objects polynomial tools formal power series (Unix)-multi-processing linear optimization statistics student calculus indefinite and definite sums Tensor computations and General Relation
函数名称
基本功能
Afsctor
绝对因式分解
Afsctors
另一种返回形式的绝对因式分解

量子限域效应英文

量子限域效应英文

量子限域效应英文Quantum Confinement EffectIntroduction:The quantum confinement effect is a phenomenon that occurs when the size of a material becomes comparable to or smaller than the characteristic length scale of quantum mechanical phenomena. This effect leads to unique physical properties and has significant implications in various scientific and technological fields. In this article, we will explore the concept of quantum confinement and its impact on nanoscale materials.Overview of Quantum Confinement:Quantum confinement refers to the restriction of electron or hole motion in a material due to the spatial confinement of their wave functions. When the dimensions of a material are reduced to a scale comparable to the de Broglie wavelength of the charge carriers, their behavior becomes subject to quantum mechanical laws. As a result, the energy levels and properties of the material change, giving rise to quantum confinement effects.Quantum Dots:One manifestation of quantum confinement is seen in quantum dots. Quantum dots are nanoscale semiconductor particles with a diameter ranging from a few nanometers to tens of nanometers. At this size scale, electrons and holes are confined within the dot, leading to discrete energy levels, often referred to as energy "bands." These energy bands are determined by the sizeand shape of the quantum dot, offering control over the electronic properties of the material.The discrete energy levels of quantum dots impart them with unique optical and electrical characteristics. Due to quantum confinement, they exhibit a phenomenon called size-dependent light emission. This property arises from the direct relationship between the bandgap energy and the size of the quantum dot. As the size decreases, the bandgap increases, resulting in a shift towards higher energy emission wavelengths. This tunability has led to significant advancements in optoelectronics and photonics.Nanowires and Nanotubes:Another example of quantum confinement can be observed in nanowires and nanotubes. These one-dimensional nanostructures exhibit quantum confinement effects along their longitudinal axis. The confinement of electrons and holes within the nanowire or nanotube results in discrete energy levels, providing possibilities for tailoring their electrical conductivity and optical properties.Nanowires and nanotubes are widely investigated for their potential applications in nanoelectronics and nanophotonics. Their size-dependent electrical conductivity and enhanced charge transport properties make them promising candidates for future electronic devices. Moreover, their large aspect ratios and unique optical properties enable them to be utilized in sensors, solar cells, and other optoelectronic devices.Quantum Well Structures:Quantum confinement effects are also observed in quantum well structures. These are thin semiconductor layers sandwiched between materials with larger bandgaps. The confinement of charge carriers in the quantum well layer leads to quantization of energy levels perpendicular to the layers, resulting in discrete energy bands.Quantum well structures find applications in various optoelectronic devices, such as lasers and light-emitting diodes (LEDs). By tailoring the width of the quantum well layer, the emitted wavelength of the device can be precisely controlled. This ability to engineer the properties of devices based on the quantum confinement effect has revolutionized the field of semiconductor optoelectronics.Conclusion:In conclusion, the quantum confinement effect plays a crucial role in determining the physical properties of nanoscale materials. Understanding and utilizing this phenomenon has opened up new opportunities for the design and development of innovative technologies. From quantum dots to nanowires and quantum well structures, the ability to manipulate the behavior of charge carriers at the nanoscale has revolutionized various fields of science and engineering. As researchers continue to explore and harness the advantages of quantum confinement, it is expected that further advancements and breakthroughs will emerge, leading to exciting applications in the future.。

On Computing the Vertex Centroid of a Polyhedron

On Computing the Vertex Centroid of a Polyhedron

1
the centroid stems from the fact that the centroid encodes the number of vertices of a polytope. As we will see, this also makes computing the centroid hard. The parallels between centroid and the center of gravity of a polytope mimic the parallels between the volume and the number of vertices of a polytope. Computing the volume and the number of vertices are both #P-complete ([2, 3, 6]) and so are the problems of computing the corresponding centroids ([7], Theorem 1). The volume can be approximated quite well but approximating the number of vertices of a polytope is an interesting open problem. Similarly, the center of gravity can be approximated quite well but (as we will see in this paper) obtaining a polynomial algorithm for approximating the centroid would be a very interesting achievement. The problem of enumerating vertices of an H-polytope has been studied for a long time. However, in spite of years of research it is neither known to be hard nor is there an output sensitive polynomial algorithm for it. A problem that is polynomially equivalent to the Vertex Enumeration problem is to decide if a given list of vertices of an H-polytope is complete [1]. In this paper we show that any algorithm that approximates the centroid of an arbitrary polytope to any “sufficiently” non-trivial distance can be used to obtain an output sensitive polynomial algorithm for the Vertex Enumeration problem. The main results of this paper are the following: • Computing the centroid of an H-polytope is #P-hard. • Even just deciding whether the centroid of an H-polytope lies in a halfspace remains #P-hard. • Approximating the centroid of an H-polytope is #P-easy. • Any algorithm approximating the centroid of an arbitrary polytope within a distance 1 d 2 −δ can be used to obtain a fully polynomial approximation scheme for the centroid approximation problem and also an output sensitive polynomial algorithm for the Vertex Enumeration problem. • There is no polynomial algorithm that approximates the vertex centroid of arbitrary H1 polyhedron within a distance d 2 −δ for any fixed constant δ > 0, unless P = N P . We should remark that for the approximation of centroid, we only consider polytopes (and polyhedra) whose vertices lie inside a unit hypercube. To see how this assumption can easily be satisfied, notice that a halfspace h can be added to a polyhedron P such that P ∩ h is bounded and the vertices of P are preserved in P ∩ h. Also, such a halfspace can be found in polynomial time from the inequalities defining P . Once we have a polytope in Rd , solving 2d linear programs gives us the width along each coordinate axis. The polytope can be scaled by a factor depending on the width along each axis to obtain a polytope all whose vertices lie inside a unit hypercube. In case we started with a polyhedron P , the scaled counterpart of the halfspace h that was added can be thrown to get back a polyhedron that is a scaled version of P and all whose vertices lie inside the unit hypercube. In subsection 2.2 we provide further motivation for this assumption. Since all the vertices of the polytope (or polyhedron) lie inside a unit hypercube, picking 1 any arbitrary point from inside this hypercube yield a d 2 -approximation of the vertex centroid. Thus, the last result should be contrasted to the fact that approximating the vertex centroid 1 within a distance of d 2 is trivial. Also, even though we discuss only polytopes i.e. bounded polyhedra in subsections 2.1 and 2.2, the results and the proofs are valid for the unbounded case as well. We discuss the unbounded case explicitly only in subsection 2.3.

A New Supersymmetric Index

A New Supersymmetric Index

Lyman Laboratory of Physics
Harvard University, Cambridge, MA 02138, USA
dimensions, ependent of almost all deformations of the theory. This index is related to the geometry of the vacua (Berry’s curvature) and satisfies an exact differential equation as a function of β . For integrable theories we can also compute the index thermodynamically, using the exact S -matrix. The equivalence of these two results implies a highly non-trivial equivalence of a set of coupled integral equations with these differential equations, among them Painleve III and the affine Toda equations.
HUTP-92/A021 SISSA 68/92/EP BUHEP-92-14
arXiv:hep-th/9204102v1 30 Apr 1992
A New Supersymmetric Index
Sergio Cecotti† , Paul Fendley⋆ , Ken Intriligator∞ and Cumrun Vafa∞
partition function Tr e−βH . This powerful method is known as the thermodynamic Bethe ansatz (TBA)[10]. In particular, the TBA analysis for a large class of N =2 integrable theories in two dimensions was carried out in [11,12], confirming the conjectured S -matrices as in particular reproducing the correct central charges in the UV limit. One can extend the usual TBA analysis by allowing arbitrary chemical potentials, and in particular one can compute objects such as TreiαF e−βH . This allows us, as a special case, to compute Tr(−1)F F e−βH in these theories in terms of integral equations. Thus for integrable theories we seem to have two inequivalent methods to compute the

maple函数大全

maple函数大全

rtable data structures
序包
Matlab
Matlab Link
与 Matlab 的接口函数
Ore_algebra
Bacic calculations in algebras of 线性算的基本代数运算
linear onerators
PDEtools
tools for solveing partial differential 偏微分方程相关函数
雅可比椭圆函数
雅可比椭圆函数雅
雅可比θ函数
JacobiZeta KelvinBei KelvinBer KelvinHei KelvinHer
雅可比ζ函数 开尔文 Bei 函数 开尔文 Her 函数 开尔文 Hei 函数 开尔文 Her 函数
KelvinKei KelvinHer KummerM KummerU LanbertW Lcm LegendreP LegendreQ Lerchphi Li Linsolve Lommels1 Lommels2 MOLS Maple_floats MatlabMatrix MeijerG 函数名称 Normal Nullspace Power Powmod Prem Primitive Primpart 函数名称
多项式可分解为同阶因式的可能性 Product(乘)函数的简化形式 双γ函数与多γ函数 Quo(求多项式的商)函数的简化形式 一种递归方程解的数据结构 有限域的随机多项式 有限域的随机 monic prime 多项式 Ratrecon(重组有理函数)的简化形式 取复数的实部 rem(求多项式相除余项)函数的简化形式 Resultant(合成多项式)函数简化形式 求方程的根 多项式求模后的根 Sperm(异伪余式)函数的简化形式 查找文本 双曲正弦函数 正弦积分 矩阵的 Smith 正交化 非平方因式分解 转移正弦积分 StruveH 函数 StruveL 函数 sum(求和)和函数的简化形式 基本功能 计算矩阵的奇异数/向量 显示文本

Reducing Carbon Emissions The Relative Effectiveness of Different Types of Environmental Ta

Reducing Carbon Emissions The Relative Effectiveness of Different Types of Environmental Ta

Reducing Carbon Emissions? The Relative Effectiveness of Different Types of Environmental Tax: The Case of New ZealandFrank G. Scrimgeour a , Les Oxley b,c and Koli Fatai aa Department of Economics, University of Waikato,b Department of Economics, University of Canterburyc Adjunct Professor, Department of Economics, University of Western Australia Abstract: Although countries experiences on environmental taxation differ, discussions in New Zealand coincide with the recent announcement by the government of a new carbon tax and a new energy tax to be introduced before the first phase of the Kyoto protocol. This paper provides preliminary simulation results that may help answer some policy-related questions including the relative micro- and macro-level impacts of energy taxes or carbon taxes and the likely impacts of the carbon taxes on the competitiveness of energy intensive industries.Keywords: Carbon tax, greenhouse gas emissions, CGE model1.IntroductionRecent debates in the literature (Parry, 1995, Parry et.al., 1999; Bovenberg and Goulder, 1996) on the likely economic and social impacts of alternative types of environmental taxation have highlighted the importance of issues including externalities, environmental concerns, double dividend, revenue neutrality and equity. The recent Kyoto Protocol (henceforth, KP), has further reinforced the importance of these issues. The issues also raise the need for empirical-based analysis to guide policy makers. Indeed, it is partly this need that has generated a vast amount of literature studying some of the environmental and economic issues relating to international agreements such as the Kyoto Protocol. A challenge for many of the studies is to find options that ‘maximize society welfare’ and at the same time reduce greenhouse gas emissions (henceforth, GHG) and its likely costs.In the New Zealand context, some of the recent discussion has focused on conceptual issues relating to for example, revenue recycling, double dividends. Furthermore, there has been discussion of the likely impact of the KP on the environment, economic performance (eg. economic growth, competitiveness, employment, investment etc.) and income distribution. To date the New Zealand government seems to favour a combination of energy taxes, fuel taxes and carbon taxes. Additionally, there is on-going discussion related to the alignment of the government’s favoured policies with their implementation and governance, and the economic and social instruments that may be used to pursue those policies. Introducing a carbon tax may result in welfare losses. Does this imply that a policy committed to their introduction means that the macro and micro-economic impacts of an energy tax or fuel tax are more acceptable to New Zealanders? Are all sectors in the New Zealand economy likely to bear, equally, the adjustment costs as New Zealand ratifies the KP? What is the likely impact on economic growth, employment, investment and other macro-economic variables? What are the likely impacts on firms? This paper attempts to answer some of these questions using a CGE model of the New Zealand economy. The model is specifically designed to focus on the energy sector and can simulate the effects of, in particular, three types of GHG taxes: an energy tax on all fossil fuels, a carbon tax and finally a fuel tax on petroleum products.The paper is constructed as follows. Section 2 discusses the economics of carbon taxes and some international experiences. Section 3 briefly outlines the structure of the CGE model used and Section 4 discusses the simulation results. The final section concludes and summarizes the findings.2.The economics of carbon taxes and related issuesThe fundamental theoretical basis of environmental taxes have been well documented (early discussions include Baumol, 1972; Baumol and Oates, 1971, 1988) and will only bebriefly discussed in this section. TheThTT This early literature showed that society’s welfare would be improved if there were a tax on a good whose consumption or production resulted in a negative externality. Baumol and Oates (1971) further argue that an environmental tax would minimize the costs to society and at the same time achieve an ‘environmental greening’ objective when a negative externality to society existed. However, there is still no general consensus on the effectiveness of alternative instruments available to policy makers where they include, energy taxes, carbon taxes, subsidies and transfers. The main issue here is ‘which instrument or combination of instruments would be optimal?’ A carbon tax may be regressive as it may affect poorer households disproportionaly (Ekins and Parker, 2001). With any regressive tax, however, this may be resolved by reducing other taxes or the introduction of transfers, which may offset the negative impact of carbon taxes on poor households. Poor households may have the tendency to buy cheaper and perhaps less energy-efficient appliances than richer households. A carbon tax may also be advantageous to the economy if it lowered other taxes that are perceived to be more distortionary. This may include labour income taxes see for example, (Barker, 1995). On the other hand, Goulder (1995) argues that a carbon tax is more distortionary than labour tax because of too narrow tax base, the possibility of double taxation (i.e. on both intermediate input and final output) and its non-uniform content in energy products. Furthermore, Gaskins and Weyant (1993) have argued that the introduction of a carbon tax may create more distortions because of the extent to which a carbon tax or environmental change affects the prices faced by both consumers and producers. Thus, the debate on the effectiveness of a carbon tax remains active and ongoing.A recent survey by Ekins and Barker (2001) on carbon tax and carbon emission trading concluded that “market based instruments of carbon control will achieve a given level of emissions reduction at lower cost than regulations.” (p.368). Studies on the effectiveness of a carbon tax have generally concluded, however, that it generally achieves its objective of reducing GHG emissions.2.1.Carbon Taxes and InternationalExperienceAlthough a carbon tax is a relatively new option for to New Zealand, many other countries for example, The Netherlands, Norway, Sweden, Denmark, Finland and Switzerland introduced such taxes in the early 1990s. In fact, the majority of EU member states have used carbon taxes at some stage to reduce GHG emissions. The literature on this is extensive see Ekins and Barker (2001) for a review and will not be discussed in detail here.The experiences of European countries, however, may have important lessons for New Zealand where special importance may be attached to the so called “eco-leaders,” Denmark, Netherlands, Norway and Sweden. Other countries for example, Austria, Belgium, Finland, Germany and Switzerland have made small, but continuing steps towards a greater role to be played by CO2taxes in their economy. These countries may also offer important lessons, but currently they are typically less important than those from the “eco-leaders” on which we will now concentrate.The introduction of the carbon taxes by the “eco-leaders” generally involves three components. First, subsidies and taxes that may be distortionary are either modified or removed. Secondly, taxes are restructured including legislation to align them with environmental objectives. Thirdly, the new green taxes are introduced (Ekins and Barker, 2001). With these three main aspects identifies, a few observations and lessons may bee drawn from the literature.Bruce et. al.(1996) and Barker and Kohler (1998) have shown that eco-taxes can be regressive using data for OECD countries. Especially vulnerable are poorer households who may be hard hit by eco-taxes. However, the experience of the eco-leaders is that it is possible for the regressive tendency of eco-taxes to be moderated. In addition, eco-taxes may have trade-offs that are absent in other forms of taxation. In some European countries (eg. Norway, Finland, Austria and Denmark) for example, there is no leaded gasoline as high taxes have eliminated it from their respective markets (Ekins and Parker, 2001). This results in a change in consumption patterns where consumers substitute leaded gasoline for high GHG products, but at the same time keeping a large tax base (i.e. unleaded gasoline).From the literature discussed above, one can perhaps conclude that the experiences of the European eco-leaders seem to show that countries like New Zealand should not expect the eco-taxes to yield significant revenues, but should be encouraged by the fact that eco-taxes are likely to achieve environmental goals rather than fiscal objectives. However, one can argue that environmental taxes to reduce GHG can be used to reduce labour costs and, with revenues recycled back to industries and households, this is possible to cut energy consumption, create jobs and at the same time remain competitive.2.2New Zealand Government’s PreferredPolicyThe New Zealand government seems to prefer a combination of energy taxes, fuel taxes, carbon taxes and other measures. Other measures may include the new waste strategy announced in March 2002 introduced specifically to reduce the GHG emissions from the waste sector. In addition, other measures may also include an announcement that the government intends to fund measures to save electricity in the public sector by about 15%. Current policies as outlined in the government’s Energy Efficiency and Conservation Strategy, are estimated to cut GHG emissions by 25 million tonnes.The target for New Zealand, however, is to reduce emissions by about 365 million tonnes of CO2 equivalent in the first phase. This may be achieved by a range of measures including sink credits and environmental taxation. The government seems to support carbon taxes as in May 2002 they announced a new carbon tax to be introduced by 2007. The revenue from the carbon tax is expected to be recycled back through the tax system. The government does not plan to use the revenue to improve its own fiscal position. The introduction of the new carbon tax may result in an increase in the price for fuels. For example, if the price of carbon dioxide is NZ$25 a tonne tax, then this would raise retail petrol prices by around six percent, diesel by around 12 percent, electricity by around nine percent, gas by around eight percent and coal by around 19 percent.In addition to the new carbon tax, the government is also planning to introduce a new energy tax, which might be introduced by 2007.3The ModelThe model used here follows Dixon et.al. (1982) with the extensions by McDougall (1999), Truong (1999) and Hamasaki and Truong (1999) where there is an emphasis on modelling an energy sector which allows inter-fuel and capital-energy substitution possibilities. Furthermore, the model has structures that support both long-run and short-run analysis following McDougall (1999). The model also has various enhancements that enable it to be more detailed than the standard CGE model. We will concentrate on the comparative static side of the model to shed light on some of the issues raised above. The model represents an energy version of ORANI (Dixon et.al. 1982; McDougall, 1999), where investment is modelled in a way such that its initial value is proportional to the size of investments at the end of the simulation period. In turn, the size of the capital stock at the end of the period may be affected by exogenous shocks. The change in the size of the capital stock at the end of a simulated period causes changes in the growth rate of the capital stock. This treatment of investment follows closely with the suggestions by Horridge (1985).The main sectors in the model are the government, households and industries. The government sector is modelled as a collector of taxes, which are partially transferred to households. There is a constraint in the government such that its expenditure, including transfers, is equated with tax revenue. This is achieved by using two variables to model the government’s budget balance following McDougall (1999). The introduction of these two variables constrain the government’s expenditure to not only equal tax revenue but also, constrain the choice of tax rate should to achieve a certain tax revenue to balance the government’s account.The household sector is modelled such that it is the sole owner of all the factors including land and capital which means the sector has several sources of income. In addition to the standard household disposable income, households also receive income from other factors and non-labour income. The net wealth of the household is therefore determined by the value of income from labour, land and capital as well as their savings rate at the end of a simulation period. The values of the land and capital are given (exogenous) in the model. The balance between these three items represents the household’s net debt. This formulation determines how domestic physical capital is financed where it can either be financed internally by household’s net wealth or financed externally. In the second case, household’s net debt might increase.The household sector also has a consumption function, which is simply the value of the product of the household’s total labour income and the household’s propensity to consume. The household labour income is assumed to be net disposable income where income tax is deducted from the household’s gross disposable income. Household’s total income, however, is the sum of the income from land, capital and labour and transfers from government.The other main sector in the model is the industry sector. Here we follow closely the structure of production presented in McDougall (1999) and Abayasirisilva and Horridge (1996). Industries are modelled so that they can use the given factors to produce either a single or multi products. As each industry can either produce multi- or a single product with a number of different inputs, the modelling task is to allowfor the separation of these products and inputs(Abayasirisilva and Horridge, 1996). The separability assumption allows flexibility in the production sector and also makes it easier to estimate the parameters as it reduces the number of parameters to be estimated. In this model, the separable function of the output is derived from a constant elasticity of transformation aggregation function. The input separable function is divided into a number of nests. At the top of the nests for the input function, there is a composite commodity, which is a combination of the primary factor and ‘other’ costs. The composite commodities are combined using a Leontief production function. This implies that all inputs are used in proportion to Y, an index of the activity in that industry. Like many other CGE models, the Armington (1969) assumption is used. This means that the composite commodity produced is a constant elasticity of substitution function of either a domestic good or its imported equivalent.The composite input of the primary factor is a constant elasticity of substitution combination of land, capital and composite labour. The composite labour is a constant elasticity of substitution of skilled and unskilled labour. This combination of composite primary input is the same across all the industries, (in our case 22). However, this does not imply the same composite input and labour combination for every product produced because the input combination and the behavioural parameters are not the same across the 22 industries.Production and consumption in the household and industrial sector are affected by ‘bad commodities’, which are oil, gas, coal and electricity through the environmental taxes imposed on these ‘bad commodities.’ This is achieved by the introduction of three environmental taxes: carbon taxation, energy taxation and petroleum taxation. These taxes form part of the ad valorem commodity tax.The impact of these ‘bad’ taxes depends on the value of the intensity coefficients. The intensity coefficients for each of the taxes are the proportion of the ‘bad contents’ to the market value of the commodities. The ‘bad content’ is the energy content of the three types of taxes discussed. It is possible that the ‘bad content’ can be disaggregated into different types of fuels. For example, electricity can be disaggregated into steam turbine, hydroelectricity, gas turbine, coal generators and so forth. Coal, a fossil fuel, can also be disaggregated into lignite (brown coal) and briquettes. In this model, however, disaggregation of fossil fuels is left to a later study and not discussed further here.4Simulation and Results The simulations undertaken included the introduction of an energy tax, a carbon tax and a petroleum tax and measure the impact of each on the economy when the rate of taxation is set so that each type tax collects revenue equivalent to 0.6 percent of GDP in the base-case. Table 1 presents the tax rate set for each of the taxes. As the table shows, the tax rates for both the energy and carbon tax are not very different.The tax rate is highest for the energy commodity with the high energy intensity as well as high emission coefficients. The highest ad valorem tax rates are for coal while the lowest tax rates are for petroleum, oil and gas products. The simulation results were constructed to consider, in particular, the existence of likely significant differences in the micro and macro impacts of an energy tax, a carbon tax and a petroleum tax. The emphasis was particularly on understanding both the greenhouse impact and the non-greenhouse impact of the various environmental taxes.Table 1: Ad valorem tax rates on fossil fuels (%)Energytax Carbon taxPetroleumproducts tax Coal 131 123 0Gas 56 51 0Oil 14 18 0 Petroleumproducts 8 9 15The results of the impact of each of the environmental taxes on the carbon emissions and fossil fuel consumption shows that both the volume of carbon emissions and fossil fuel consumed declined (Table 2). The carbon tax, for example, leads to a reduction in energy consumption and carbon emission of about 14 and 18 percent respectively. The impact of the energy tax and carbon tax in reducing energy consumption and carbon emission are almost the same. An energy tax reduces energy consumption by 13 percent compared to 14 percent for the carbon tax. It also reduces carbon emissions by approximately 16 percent compared with 18 percent for the carbon tax. On the other hand, a petroleum tax is less effective in reducing energy consumption and carbon emissions as it reduces carbon emission and energy consumption by approximately 0.9 and 1.9 percent, respectively.Table 2: Estimated effects of each of the three taxes on fossil fuel energy consumption and carbon emissionsEnergy tax CarbontaxPetroleumproducts taxCarbonDioxideEmissions -14 -18 -0.9Fossil fuelenergy use -13 -16 -1.9 Turning to the macro effects of the three types of taxes, the impact of both the carbon and the energy taxes on some macro variables are similar, as shown by Table 4. Real household consumption falls by 0.1percent for the carbon tax and 0.09 percent of the energy tax. However, for the petroleum tax, consumption falls by 0.2 percent. Additional tax will incur a high penalty for the economy, with little effect on the environment.Table 3: Estimated effects of energy,carbon and petroleum products taxeson selected macro variablesPetroleum product tax Energytax Carbon taxIncome tax rate -0.82 -0.62 -0.68 Householdconsumption -0.2 -0.09 -0.1 Capital(working) -0.82 -1.12 -1.26 Volume ofexports -1.62 -1.54 -1.7Capital (fixed) -0.75 -1.58 -1.62 Investment -0.32 -0.51 -0.54 GDP -0.29 -0.38 -0.39 Volume ofimports -0.91 -0.78 -0.89 Like many CGE models that model the impact of energy and carbon emission reduction programmes, the impact of both the energy tax and the carbon tax is to reduce GDP by approximately 0.385 percent. The impact of the petroleum tax is slightly less, at 0.29 percent. The fall in GDP is associated with the fall in capital stock. As the capital stock is reduced investment also falls. The impact of the energy tax and the carbon tax on investment is approximately 0.51 and 0.54 respectively with the carbon tax having a slightly higher effect than the carbon tax.In addition, we can consider the impact in selected sectors, as shown in Table 4. The sectoral effects presented here relate to the energy intensive industries, mining, metal products, electricity and gas sectors. The impact on these energy intensive sectors exceeds, on average, 2 percent.For example, for mining there is a reduction of 4.1 and 4.5 percent with the energyand carbon tax respectively. The impact of the petroleum tax on mining is slightly less at approximately 2 percent. The impact on the metals’ sector and the electricity, gas and water sectors is also a decline of, an average, 3.8 percent for the metal sector and an average reduction of about 2.7 for the electricity, gas andwater sector. The slightly less than average impact on the electricity, gas and water sector isdue to the 1.2 percent increase in electricity, gasand water sector usage with a corresponding reduction in usage for the energy and carbon taxes. The other sectors are slightly less energy intensive than the previous three sectors discussed so the impacts of the three taxes areless than those of the energy intensive sectors. Generally, the impact of the energy taxes and the carbon taxes are greater than the petroleum taxes.Table 4: Estimated effects of energy, carbon and petroleum products on activity of selected sectorsPetroleumproduct taxEnergytax Carbon tax Services -0.26 0 0 Petroleum prod. -1.62 -1.52 -1.34 Construction -0.62 -0.93 -0.8 Mining -2 -4.12 -4.51 Transport -0.71 -0.55 -0.5 Wood products -0.41 -0.43 -0.52 Transport equip. -0.64 -0.52 -0.43 Electricity 1.27 -3.21 -3.62 Textiles 0 0 0 Non-metal products -0.81 -0.72 -0.91 Agriculture -0.4 -0.31 -0.42 Metal products -3.12 -3.66 -3.92 Food Products -0.11 0 0In addition to the output impacts on the above selected sectors, there are also employment effects. Table 5 shows the impact of the threetaxes on employment broadly divided into skilled an unskilled. The impact of the taxes iffelt most heavily on the unskilled workers with a reduction of 0.23 percent for the energy tax and0.28 for carbon tax.Table 5: Estimated effects of energy, carbonand petroleum products on employmentEnergytaxCarbontaxPetroleumproduct taxSkilled Workers 0.15 0.16 0.02 Unskilled Workers -0.23 -0.28 -0.06 OverallEmployment 0.00 0.00 0.00On the other hand, there is an increase in the level of employment of skilled workers. This may signal a change in the structure of the economy where firms prefer to substitute labour for less energy intensive capital.5ConclusionsThis paper attempts to assess the relative effectiveness of an energy tax, a carbon tax and a petroleum tax on the New Zealand economy. From the European experience we have learned that targeting carbon dioxide can be an efficient way to achieve environmental goals although efforts should be made to reduce the emissions of other harmful GHG such as sulphur dioxide, nitrogen oxide and methane as they are more effective in trapping heat in the earth’s atmosphere.This exercise has demonstrated that an energy tax based on the energy content of fossil fuel might be an effective instrument to reduce carbon emissions although the energy tax is not as effective as a carbon tax. Policy instruments such as a carbon tax might reduce the stock of both fixed and working capital. The reduction in the economy’s stock of capital might lead to reductions in GDP, household consumption (an indicator of welfare change) exports and investment. Therefore, some important trade-offs exist and require consideration.6. AcknowledgementsAll three authors wish to thank the New Zealand Public Good Science Fund, grant number UOWX:0010, Energy Resources and Energy Resource Economics, for supporting this research. The usual disclaimer applies.7.ReferencesAbayasiri-Silva, K. and Horridge, M. (1996) Economies of Scale and ImperfectCompetition in an Applied GeneralEquilibrium Model of the AustralianEconomy. Working Paper No. OP-84,March 1996.Armington (1969) A Theory of Demand for Products Distinguished by Place ofProduction, International Monetary FundStaff Paper Vol. 16, pp. 159-176. Barker, T. (1995). Taxing pollution instead of employment: greenhouse gas abatementthrough fiscal policy in the UK. Energyand Environment, 6,1,1-28. Barker, T. and J. Kohler (1998), Equity and Ecotax reform in the EU: Achieving a10% reduction in CO2emissions usingExcise Duties. Environmental FiscalReform. Working Paper No.10,University of Cambridge, Cambridge. Baumol, W. (1972) On taxation and the control of externalities, American EconomicReview 62, 3, 307-321.Baumol, W. and W. Oates (1971) The use of standards and prices for the protection ofthe environment. Swedish Journal ofEconomics, March, 73 , 42-54. Baumol, W. and W. Oates (1988) The Theory of Environmental Policy,Cambridge,University Press, Cambridge. Bovenberg, L. and L. Goulder. (1996). Optimal environmental taxation in the presence ofother taxes, general equilibrium analysis,American Economic Review, 86, 985-1000.Bruce, J.H., H. Lee and E. Haites, (eds.) (1996).Climate Change 1995: Economic andSocial Dimensions of Climate Change.Contribution to Working Group III to theSecond Assessment Report of theIntergovernmental Panel on ClimateChange (IPCC). Cambridge: CambridgeUniversity Press.Dixon, B., B.R. Parmenter, J. Sutton and D.P.Vincent. ORANI: A Multisectoral Modelof the Australian Economy.North-Holland, Amsterdam.Ekins, P. and T. Barker (2001). Carbon taxes and carbon emissions trading. Journal ofEconomic Surveys 15, 3, 325-52. Gaskins, D. W. and J. P. Weyant (1993) Model comparisons of the costs of reducing CO2emissions, American Economic Review83, 2, 318-323.Goulder, L.H. (1995) Effects of carbon taxes in an economy with prior tax distortions: anintertemporal general equilibriumanalysis. Journal of EnvironmentalEconomics and Management.29, 271-297.Hamasaki, H. and Truong, T.P. (1999) The cost of green house gas emission reductions inthe Japanese economy – an investigationusing the GTAP-E model, WorkingPaper, GTAP Resource #599 , GTAPCentre, Purdue University.Horridge, M. (1985) Long-run Closure of ORANI: First Implementation, Universityof Melbourne, Impact Project PreliminaryWorking Paper No. OP-50. McDougall, R.A. (1999) Energy taxes and greenhouse gas emissions in Australia,General Paper No. G-104. December1993 and December 1999. Centre ofPolicy Studies, Monash University.Parry, I. (1995) Pollution taxes and revenue recycling Journal of EnvironmentalEconomics and Management, 29, S64-S77. Parry, I. R. Williams and L. Goulder (1999) When can carbon abatement policiesincrease welfare? The fundamental role offactor markets. Journal of EnvironmentalEconomics and Management., 37, 52-84. Truong, T. P. (1999) GTAP-E: Incorporating Energy Substitution into GTAP Model,GTAP Technical Paper No. 16, PurdueUniversity, United States.。

On rational approximation of algebraic functions

On rational approximation of algebraic functions
ON RATIONAL APPROXIMATION OF ALGEBRAIC FUNCTIONS
JULIUS BORCEA∗ , RIKARD BØGVAD, AND BORIS SHAPIRO
arXiv:math/0409353v2 [math.CA] 17 Jun 2005
Abstract. We construct a new scheme of approximation of any multivalued algebraic function f (z ) by a sequence {rn (z )}n∈N of rational functions. The latter sequence is generated by a recurrence relation which is completely determined by the algebraic equation satisfied by f (z ). Compared to the usual Pad´ e approximation our scheme has a number of advantages, such as simple computational procedures that allow us to prove natural analogs of the Pad´ e Conjecture and Nuttall’s Conjecture for the sequence {rn (z )}n∈N in the complement CP1 \ Df , where Df is the union of a finite number of segments of real algebraic curves and finitely many isolated points. In particular, our construction makes it possible to control the behavior of spurious poles and to describe the asymptotic ratio distribution of the family {rn (z )}n∈N . As an application we settle the so-called 3-conjecture of Egecioglu et al dealing with a 4-term recursion related to a polynomial Riemann Hypothesis.

棣莫弗-拉普拉斯中心极限定理的英文

棣莫弗-拉普拉斯中心极限定理的英文

棣莫弗-拉普拉斯中心极限定理的英文全文共四篇示例,供读者参考第一篇示例:The Central Limit Theorem (CLT) is a fundamental concept in the field of statistics that was first formulated by Pierre-Simon Laplace in the late 18th century. The theorem states that the distribution of the sum (or average) of a large number of independent and identically distributed random variables approaches a normal distribution regardless of the shape of the original distribution.第二篇示例:The Central Limit Theorem (CLT) is a fundamental concept in statistics and probability theory. It states that the distribution of the sum (or average) of a large number of independent, identically distributed random variables approaches a normal distribution, regardless of the original distribution of the variables. One of the most famous versions of this theorem is the De Moivre-Laplace Central Limit Theorem, named after two prominent mathematicians, Abraham de Moivre andPierre-Simon Laplace.第三篇示例:The central limit theorem (CLT) is a fundamental theorem in probability theory and statistics that states that the distribution of the sum (or average) of a large number of independent, identically distributed random variables approaches a normal distribution, regardless of the shape of the original distribution. This theorem has profound implications in various fields such as finance, engineering, and biology, where it allows researchers to make reliable predictions even when they have limited information about the underlying data.第四篇示例:The Central Limit Theorem, also known as the DeMoivre-Laplace Theorem, is a fundamental concept in probability theory and statistics. It states that the sum of a large number of independent and identically distributed random variables will be approximately normally distributed, regardless of the distribution of the original variables.。

Power series everywhere convergent on R and all Q_p

Power series everywhere convergent on R and all Q_p

a r X i v :m a t h -p h /0402037v 1 14 F eb 2004Power series everywhere convergent on R and all Q pBranko G.DragovichInstitute of Physics,P.O.Box 57,11001Belgrade,Yugoslavia Abstract.Power series are introduced that are simultaneously convergent for all real and p -adic numbers.Our expansions are in some aspects similar to those of exponential,trigonometric,and hyperbolic functions.Starting from these series and using their factorial structure new and summable series with rational sums are obtained.For arguments x ∈Q adeles of series are constructed.Possible applications at the Planck scale are also considered.1.INTRODUCTION The field of rational numbers is of central importance in physics and mathematics.It is well known that all results of measurements belong to Q ,i.e.that the irrational numbers cannot be measured.From a mathematical point of view Q is the simplest infinite number fipletion of Q with respect to the absolute value gives the field of real numbers R .Algebraic closure of R leads to the field of complex numbers C .Although experimental results are given in Q ,theoretical models are usually constructed over R or C .Comparison between theory and experimental results performs within Q .However,it is interesting that in addition to the standard absolute value there exist p -adic norms (valuations)on Q .Completions of Q with respect to p -adic norms give usthe fields of p -adic numbers Q p (p =a prime number).There is also a p -adic analog of the complex numbers.According to this similarity between p -adic and real numbers,it is natural to expect that p -adic numbers should also play a significant role in theoretical and mathematical physics.Since 1987,p -adic numbers have been successfully considered in string theory[1],quantum mechanics [2],quantum field theory [3],and in some other branches of theoretical [4,5]and mathematical [6]physics.Such new theoretical constructions are p -adic analogs of some models on real (or complex)numbers.There has been also a research on various p -adic aspects of the perturbation series[7].It is shown that the usual perturbation series,which are divergent in the real case,are p -adic convergent.Summability of a given series in all but a finite number of Q p may be used for summation of a divergent counterpart at the rational points.In order to make a direct connection of p -adic models with the real one it seems to be necessary to have convergence in R and all Q p within the common domain of rational numbers.However,the standard power series of theoretical physics do not satisfy thisproperty.For example,expansions of functions exp x,sin x,cos x,sinh x,and cosh x are convergent in the p-adic case for|x|p<1if p=2and|x|2<1(µn+ν)!(2) contains the following functions:exp x(ǫ=1,µ=1,ν=0),cos x(ǫ=−1,µ=2,ν= 0),sin x(ǫ=1,µ=2,ν=1),cosh x(ǫ=1,µ=2,ν=0),and sinh x(ǫ=1,µ= 2,ν=1).It is well known from classical analysis that series(2)is everywhere convergent on R.Theorem1:Power seriesΦǫ,qµ,ν(x)=∞n=0ǫn I(q)µn+νxµn+νq+((µn+ν)!)µn+ν(4) converges for all x∈R and all x∈Q p for every p.Proof:In a real case the above theorem follows from the fact that for large enough n parameter q can be neglected in comparison to the factorial term and I(q)µn+νmay be approximated by1.Hence series(3)asymptotically behaves like(2)which is convergentat all real x.Recall[8]that,in p-adic case,a necessary and sufficient condition for a convergence of(1)is|A n x n|p→0,as n→∞.(5) As a consequence of(5)it is enough to consider the p-adic norm of the general term in (3),i.e.,ǫn I(q)µn+νxµn+ν|q+((µn+ν)!)µn+ν|p|x|µn+νp.(6) Since the p-adic norm satisfies the strong triangle inequality,one has|q+((µn+ν)!)µn+ν|p=|q|p(7) for large enough n.Note that|n!|p=p−(n−n′)/(p−1),(8) where n′is the sum of digits in the canonical expansion of n over p.According to(8), one has,for the numerator of(6),|(µn+ν)!|µn+ν−1p |x|µn+νp=(p−{[µn+ν−(µn+ν)′]/(p−1)}[(µn+ν−1)/(µn+ν)]|x|p)µn+νn→∞→0,(9)which is valid for any p and all x∈Q p.On the basis of(7)and(9)it follows everywhere convergence on Q p for any p.Thus Theorem1is proved.Among all possible examples of analytic functions contained in power series(3)we want to point out the following ones:exp q x=∞n=0(n!)n n!(10a)cos q x=∞n=0(−1)n((2n)!)2n(2n)!(10b)sin q x=∞n=0(−1)n((2n+1)!)2n+1(2n+1)!(10c)cosh q x=∞n=0((2n)!)2n(2n)!(10d)sinh q x=∞n=0((2n+1)!)2n+1(2n+1)!(10e)Inverse functions of(10a)-(10e)can be defined in the usual way,where coefficients in the power expansions are appropriately modified.For example,y=ln q x=∞n=1(−1)n+1a(q)n(x−I(q)0)n3.ADELIC ASPECTSRecall[10]that an adele is an infinite sequencea=(a∞,a2,···,a p,···),(10)where a∞∈Q∞=R,a p∈Q p with the restriction that all but afinite number of a p∈Z p={x∈Q p||x|p≤1}.The set of adeles A is a ring under componentwise addition and componentwise multiplication.It is an additive group A+with respect to addition.The subset of A withλ∞=0,λp=0for all p,and|λp|p=1for all but afinite number of p is a multiplicative group of ideles A∗.One has a principal adele(idele)ifr=(r,r,···,r,···),(11)where r∈Q(r∈Q∗=Q\{0}).One can define a product of norms on ideles|λ|=|λ∞|∞ p|λp|p,(12) where|·|∞denotes the usual absolute value.For a principal idele it yields|r|=|r|∞ p|r|p=1.(13) Equation(13)is a well-known product formula for nonzero rational numbers.An additive character on A+isχb(a)=exp2πi(−a∞b∞+a2b2+···+a p b p+···)=exp(−2πi a∞b∞) p exp2πi{a p b p}p,(14) where a,b∈A+,and{x p}p denotes a fractional part of x p.On an idele,λ=(λ∞,λ2,···,λp,···),(15)there exists multiplicative characterπ(λ)=π∞(λ∞)π2(λ2)···πp(λp)···=|λ∞|c∞∞ p|λp|c p p,(16) where c∞and c p are complex numbers.Note that in(14)and(16)onlyfinitely many factors are different from unity.It may be of physical interest to construct adeles from series(3)while their arguments x belong to the principal adeles(11).Theorem2:Let us have a sequence,Φǫµ,ν(x)=(ϕǫµ,ν(x),Φǫ,1/2µ,ν(x),···,Φǫ,1/pµ,ν(x),···),(17)whereϕǫµ,ν(x)is a real series defined by(2),andΦǫ,1/pµ,ν(x)is a p-adic series defined by (3)If x=r∈Q then(17)is an adele.Proof:There is no problem with real functionϕǫµ,ν(x)for any x∈Q.The general term of the p-adic series(3)for q=1/p isǫn ((µn+ν)!)µn+ν−11+p((µn+ν)!)µn+νxµn+ν.(18)It is obvious that|1+p((µn+ν)!)µn+ν|p=1.Hence the p-adic norm of(18)is1q+1,ν=0.(20)We shall show that starting from series(3)one can obtain a sum of the corresponding functional series.Theorem3:The summation formula,∞n=0((µn+ν)!)µn+ν−1xµn [(µ(n+1)+ν)!]µ(µn+ν+1)µn+ν−1µq+((µn+ν)!)µn+ν =−(ν!)ν−1q+(ν!)νxν+((µ+ν)!)µ+ν−1xµ+ν ((2µ+ν)!)µ(µ+ν+1)µ+ν−1µq+((µ+ν)!)µ+ν +···,(22)−Φ−1,qµ,ν(x)=(ν!)ν−1xν ((µ+ν)!)µ(ν+1)ν−1µq+(ν!)ν +((2µ+ν)!)2µ+ν−1×x2µ+ν ((3µ+ν)!)µ(2µ+ν+1)2µ+ν−1µq+((2µ+ν)!)2µ+ν + (23)Addition of(22)and(23)with division by xνfor x=0leads to formula(21).In the particular case(µ=1,ν=0,x=−1,q=1),we have∞n=0(−1)n((n+1)!)n[1+(2+n)(n!)n]+(n!)n−12,(24) which is the result valid in R and all Q P.5.DISCUSSION AND CONCLUDING REMARKSThefirst question that we want to discuss is related to the possible applications of the power series(3).Recall that the interest in p-adic models is mainly motivated by some indications[1]that space-time at the Planck scale should be analyzed using p-adic mathematics.According to this point of view,let us consider classical cosmological solutions of the Einstein gravitational equations.These equations for the scale factor R(t)of the homogeneous and isotropic universe are¨R(t), ˙R R2=κρ6κ dd2κΛ/3.An analogous situation is for k=1with R(t)=H−1cosh q Ht and k=−1with R(t)=H−1sinh q Ht.Ifκ∈Q all theses models may be treated either real or p-adic.By decreasing parameter q,expansion of the universe given by(26)can be done arbitrary close to the de Sitter ly,when q→0:ρq→Λ/κ,p q→−Λ/κ, and R q(t)→R(t)= Λ/3t,whereΛis the cosmological constant.It would be interesting tofind a scalar-field model that leads toρq(t)and p q(t).A classical cosmological solution for k=+1and R q(t)= Λ/3t can be further used in p-adic quantum cosmology[5],which is a generalization of the Hartle-Hawking approach to the wave function of the universe.Let us suppose that the parameter q is a quotient(q=l P l/l)of the Planck length (l P l∼10−33cm)and a length that characterizes the given scale.For example,the unification length in the electroweak theory is about10−17cm and for the GUT one gets l∼10−29cm.In such a way only at the Planck scale parameter q(q=1)cannot be neglected.So,q=1in the real case and q=1/p in the p-adic case should be natural values in the high-energy limit(E∼1019GeV).TakingΦǫ,1µ,ν(x)instead ofϕǫµ,ν(x)in (17),one has a unification at the Planck scale of real and p-adic functions(3)in the form of adeles.Parameter q regularizes(2)to enlarge the region of convergence from|x|p<1,p=2 (and|x|2<1[1]I.V.Volovich,Class.Quantum Grav.4L83(1987);B.Grossman,Phys.Lett.B197,101(1987):P.G.O.Freund and M.Olson,Phys.Lett.B199,186(1987);P.G.O.Freund and E.Witten, ibid199,191(1987);P.H.Frampton,Y.Okada,and M.R.Ubriaco,ibid213,260(1988);I.Ya Aref’eva,B.G.Dragovich and I.V.Volovich,ibid209,445(1988):212,283(1988);214339 (1988);L.O.Chekhov and A.Yu.Zinoviev,Commun.Math.Phys.130,623(1990);P.G.O.Freund,J.Math.Phys.33,1148(1992).[2]C.Alacoque,P.Ruelle,E.Thiran,D.Verstegen,and J.Weyers,Phys.Lett.B211,59(1988);V.S.Vladimirov and I.V.Volovich,Commun.Math.Phys.123,659(1989);B.L.Spokoiny, Phys.Lett.B221,120(1989);Y.Meurice,Int.J.Mod.Phys.A4,5133(1989);E.I.Zelenov, J.Math.Phys.32,147(1991);A.Yu.Khrennikov,ibid32,932(1991).[3]B.D.B.Roth,Phys.Lett.B213,263(1988);E.Melzer,Int.J.Mod.Phys.A4,4877(1989);V.A.Smirnov,Mod.Phys.Lett.A6,1421(1991);M.D.Missarov,Phys.Lett.B272,36(1991). [4]B.G.Dragovich,P.H.Frampton,and B.V.Urosevic,Mod.Phys.Lett.A5,1521(1990);B.G.Dragovich,ibid6,2301(1991).[5]I.Ya.Aref’eva,B.G.Dragovich,P.H.Frampton,and I.V.Volovich,Int.J.Mod.Phys.A6,4341(1991).[6]E.I.Zelenov,J.Math.Phys.33,178(1992);A.Yu.Khrennikov,J.Math.Phys.33,1636(1992).[7]I.Ya.Aref’eva,B.G.Dragovich,and I.V.Volovich,Phys.Lett.B200,512(1988);B.G.Dragovich,Phys.Lett.B256,392(1991);On factorial perturbation series,preprint No.If-91-011.[8]W.H.Schikhof,Ultrametric Calculus(Cambridge U.P.,Cambridge,1984).[9]K.Mahler,p-Adic Numbers and Their Functions(Cambridge U.P.,Cambridge,1981).[10]I.M.Gel’fand,M.I.Graev,and I.I.Piatetskii-Shapiro,Representation Theory and AutomorphicFunctions(Nauka,Moscow,1966).。

丘成桐数学竞赛2021年决赛笔试真题2021+YCMC+Algebra+problems(S)

丘成桐数学竞赛2021年决赛笔试真题2021+YCMC+Algebra+problems(S)

Algebra,Number Theory and Combinatorics(2021)Problem1.(Individual round.)Let p be a prime number and Q p thefield of p-adic numbers.Let n≥1be an integer and L=Q p(ζp n),whereζp n denotes a primitivep n-th roots of unity.Determine the image of the norm map N L/Qp :L×→Q×p.Youmay use the inequality[L:Q p]≤(Q×p :N L/Qp(L×))without proof in the case n≥2.Problem2.(Individual round.)Let k be afield and V a k-vector space of dimension n.Consider the group homomorphism:φ:GL(V)→GL(∧2V),f→∧2f.(1)Determine the kernel ofφ.(2)Show thatφinduces a group homomorphismψ:SL(V)→SL(∧2V).Express det(∧2f)in terms of det(f).Problem3.(Individual round.)Let A be a rank2integer matrix of size5×3. Classify all possible groups of the form Z5/A Z3.Solution to Problem 1.We will show that N L/Q p (L ×)=p Z (1+p n Z p ),where Z p denotes the ring of p -adic integers.Let Φ(X )=(X p n −1)/(X p n −1−1)be the p n -th cyclotomic polynomial.Then Φ(X +1)is an Eisenstein polynomial.Thus Φ(X )is the minimal polynomial of ζp n ,so thatN L/Q p (1−ζp n )=Φ(1)=p.We have [L :Q p ]=φ(p n )=p n −p n −1.For p odd,the φ(p n )-th power map on 1+p Z p is the composition1+p Z p log −→∼p Z p φ(p n )−−−→∼p n Z p exp−−→∼1+p n Z p .ThusN L/Q p (L ×)⊇N L/Q p (1+p Z p )=1+p n Z p .For p =2,we may assume n ≥2.The φ(2n )-th power map on 1+4Z 2is the composition1+4Z 2log −→∼4Z 2φ(2n )−−−→∼2n +1Z 2exp −−→∼1+2n +1Z 2.ThusN L/Q 2(L ×)⊇N L/Q 2(1+4Z 2)=1+2n +1Z 2.It is easy to see that1+2n Z 2=(1+2n +1Z 2) 52n −2(1+2n +1Z 2)and52n −2=N L/Q 2(2+ζ4).This finishes the proof of N L/Q p (L ×)⊇p Z (1+p n Z p )in all cases.Let O L denote the integral closure of Z p in L .The residue field of L is F p ,so that N L/Q p |O ×L is compatible with the φ(p n )-th power map on F ×p ,which carries every element to 1.In other words,N L/Q p (L ×)∩Z ×p =N L/Q p (O ×L )⊆1+p Z p .This finishes the proof in the case n =1.For n ≥2,it suffices to apply the giveninequality (Q ×p :N L/Q p (L ×))≥φ(p n )=(Q ×p :p Z (1+p n Z p )).Solution to Problem 2.(1)If n =2,then ∧2V k and φ(f )∈GL(k )is just the multiplication by det (f ),hence the kernel is just SL(V )=SL 2.Now assume n ≥3.By definition,f ∈Ker(φ)if and only if f (x )∧f (y )=x ∧y for all x,y ∈V .We claim x and f (x )are proportional:otherwise expand to a basis e 1=x,e 2=f (x ),e 3,...,e n ,then we have e 2∧f (e 3)=e 1∧e 3which is not possible as e i ∧e j is a basis of ∧2V .Hence x and f (x )are proportional for all x ∈V .This implies that f (x )=ax for some a ∈k .Then f (x )∧f (y )=a 2x ∧y =x ∧y ,thus a =±1.So the kernel is just ±Id .(2)First we show the case for elementary matrices:Take a basis e 1,···,e n of V and consider the endomorphism f ∈GL(V )defined by f (e i )=e i +bδ1,i e 2for all i ,where b is a constant.We have (∧2f )(e 1∧e j )=e 1∧e j +be 2∧e j for all j ≥2,and for 2≤i <j ,(∧2f )(e i ∧e j )=e i ∧e j .Thus ∧2f is lower triangular in the basis of e i ∧e j with 1on the diagonal,which gives det (∧2f )=1.Recall that any matrix of determinant1is a product of elementary matrices, hence by(ii)φsends SL(V)to SL(∧2V).Take t in an extension of k,such that t n det(f)=1.Then det(tf)=1and1=det(∧2(tf))=det(t2∧2f)=(t2)(n2)det(∧2f),which gives det(∧2f)=t−n(n−1)=det(f)n−1.Solution to Problem3.We can change Z bases of Z5and Z3to turn A in to a "canonical form".Equivalently,we can do the usual row-column reduction on A. Since A rank2means that AZ3is a rank2subgroup of Z5,which means the free part of G is Z3.So,in the reduced form A has3zero rows,and2positive diagonal entries of all possibilities.We can arrange so thatG Z/a⊕Z/b⊕Z3with a≥b>0.Finally list all possible non-isomorphic torsion part Z/a⊕Z/b,by factorizing a,b.Possible follow up:Generalize this as follows:A is rank k of size m×n with m>n>k.Classify all possible abelian groups of the form G=Z m/A Z n.The same method would likewise yield G Z/a1⊕···⊕Z/a n−k⊕Z m−k with a1≥a2≥···≥a>0.。

computational complexity ON THE COMPLEXITY OF COMPUTING DETERMINANTS

computational complexity ON THE COMPLEXITY OF COMPUTING DETERMINANTS
comput. complex. 13 (2004), 91 – 130 1016-3328/04/030091–40 DOI 10.1007/s00037-004-0185-3
c Birkh¨ auser Verlag, Basel 2004
computational complexity
ON THE COMPLEXITY OF COMPUTING DETERMINANTS
Erich Kaltofen and Gilles Villard
To B. David Saunders on the occasion of his 60th birthday
Abstract. We present new baby steps/giant steps algorithms of asymptotically fast running time for dense matrix problems. Our algorithms compute the determinant, characteristic polynomial, Frobenius normal form and Smith normal form of a dense n × n matrix A with integer entries in (n3.2 log A )1+o(1) and (n2.697263 log A )1+o(1) bit operations; here A denotes the largest entry in absolute value and the exponent adjustment by “+o(1)” captures additional factors C1 (log n)C2 (loglog A )C3 for positive real constants C1 , C2 , C3 . The bit complexity (n3.2 log A )1+o(1) results from using the classical cubic matrix multiplication algorithm. Our algorithms are randomized, and we can certify that the output is the determinant of A in a Las Vegas fashion. The second category of problems deals with the setting where the matrix A has elements from an abstract commutative ring, that is, when no divisions in the domain of entries are possible. We present algorithms that deterministically compute the determinant, characteristic polynomial and adjoint of A with n3.2+o(1) and O(n2.697263 ) ring additions, subtractions and multiplications. Keywords. integer matrix, matrix determinant, characteristic polynomial, Smith normal form, bit complexity, division-free complexity, randomized algorithm, multivariable control theory, realization, matrix sequence, block Wiedemann algorithm, block Lanczos algorithm Subject classification. 68W30 symbolic computation and algebraic computation, 15A35 matrices of integers

专八英语阅读

专八英语阅读

英语专业八级考试TEM-8阅读理解练习册(1)(英语专业2012级)UNIT 1Text AEvery minute of every day, what ecologist生态学家James Carlton calls a global ―conveyor belt‖, redistributes ocean organisms生物.It’s planetwide biological disruption生物的破坏that scientists have barely begun to understand.Dr. Carlton —an oceanographer at Williams College in Williamstown,Mass.—explains that, at any given moment, ―There are several thousand marine species traveling… in the ballast water of ships.‖ These creatures move from coastal waters where they fit into the local web of life to places where some of them could tear that web apart. This is the larger dimension of the infamous无耻的,邪恶的invasion of fish-destroying, pipe-clogging zebra mussels有斑马纹的贻贝.Such voracious贪婪的invaders at least make their presence known. What concerns Carlton and his fellow marine ecologists is the lack of knowledge about the hundreds of alien invaders that quietly enter coastal waters around the world every day. Many of them probably just die out. Some benignly亲切地,仁慈地—or even beneficially — join the local scene. But some will make trouble.In one sense, this is an old story. Organisms have ridden ships for centuries. They have clung to hulls and come along with cargo. What’s new is the scale and speed of the migrations made possible by the massive volume of ship-ballast water压载水— taken in to provide ship stability—continuously moving around the world…Ships load up with ballast water and its inhabitants in coastal waters of one port and dump the ballast in another port that may be thousands of kilometers away. A single load can run to hundreds of gallons. Some larger ships take on as much as 40 million gallons. The creatures that come along tend to be in their larva free-floating stage. When discharged排出in alien waters they can mature into crabs, jellyfish水母, slugs鼻涕虫,蛞蝓, and many other forms.Since the problem involves coastal species, simply banning ballast dumps in coastal waters would, in theory, solve it. Coastal organisms in ballast water that is flushed into midocean would not survive. Such a ban has worked for North American Inland Waterway. But it would be hard to enforce it worldwide. Heating ballast water or straining it should also halt the species spread. But before any such worldwide regulations were imposed, scientists would need a clearer view of what is going on.The continuous shuffling洗牌of marine organisms has changed the biology of the sea on a global scale. It can have devastating effects as in the case of the American comb jellyfish that recently invaded the Black Sea. It has destroyed that sea’s anchovy鳀鱼fishery by eating anchovy eggs. It may soon spread to western and northern European waters.The maritime nations that created the biological ―conveyor belt‖ should support a coordinated international effort to find out what is going on and what should be done about it. (456 words)1.According to Dr. Carlton, ocean organism‟s are_______.A.being moved to new environmentsB.destroying the planetC.succumbing to the zebra musselD.developing alien characteristics2.Oceanographers海洋学家are concerned because_________.A.their knowledge of this phenomenon is limitedB.they believe the oceans are dyingC.they fear an invasion from outer-spaceD.they have identified thousands of alien webs3.According to marine ecologists, transplanted marinespecies____________.A.may upset the ecosystems of coastal watersB.are all compatible with one anotherC.can only survive in their home watersD.sometimes disrupt shipping lanes4.The identified cause of the problem is_______.A.the rapidity with which larvae matureB. a common practice of the shipping industryC. a centuries old speciesD.the world wide movement of ocean currents5.The article suggests that a solution to the problem__________.A.is unlikely to be identifiedB.must precede further researchC.is hypothetically假设地,假想地easyD.will limit global shippingText BNew …Endangered‟ List Targets Many US RiversIt is hard to think of a major natural resource or pollution issue in North America today that does not affect rivers.Farm chemical runoff残渣, industrial waste, urban storm sewers, sewage treatment, mining, logging, grazing放牧,military bases, residential and business development, hydropower水力发电,loss of wetlands. The list goes on.Legislation like the Clean Water Act and Wild and Scenic Rivers Act have provided some protection, but threats continue.The Environmental Protection Agency (EPA) reported yesterday that an assessment of 642,000 miles of rivers and streams showed 34 percent in less than good condition. In a major study of the Clean Water Act, the Natural Resources Defense Council last fall reported that poison runoff impairs损害more than 125,000 miles of rivers.More recently, the NRDC and Izaak Walton League warned that pollution and loss of wetlands—made worse by last year’s flooding—is degrading恶化the Mississippi River ecosystem.On Tuesday, the conservation group保护组织American Rivers issued its annual list of 10 ―endangered‖ and 20 ―threatened‖ rivers in 32 states, the District of Colombia, and Canada.At the top of the list is the Clarks Fork of the Yellowstone River, whereCanadian mining firms plan to build a 74-acre英亩reservoir水库,蓄水池as part of a gold mine less than three miles from Yellowstone National Park. The reservoir would hold the runoff from the sulfuric acid 硫酸used to extract gold from crushed rock.―In the event this tailings pond failed, the impact to th e greater Yellowstone ecosystem would be cataclysmic大变动的,灾难性的and the damage irreversible不可逆转的.‖ Sen. Max Baucus of Montana, chairman of the Environment and Public Works Committee, wrote to Noranda Minerals Inc., an owner of the ― New World Mine‖.Last fall, an EPA official expressed concern about the mine and its potential impact, especially the plastic-lined storage reservoir. ― I am unaware of any studies evaluating how a tailings pond尾矿池,残渣池could be maintained to ensure its structural integrity forev er,‖ said Stephen Hoffman, chief of the EPA’s Mining Waste Section. ―It is my opinion that underwater disposal of tailings at New World may present a potentially significant threat to human health and the environment.‖The results of an environmental-impact statement, now being drafted by the Forest Service and Montana Department of State Lands, could determine the mine’s future…In its recent proposal to reauthorize the Clean Water Act, the Clinton administration noted ―dramatically improved water quality since 1972,‖ when the act was passed. But it also reported that 30 percent of riverscontinue to be degraded, mainly by silt泥沙and nutrients from farm and urban runoff, combined sewer overflows, and municipal sewage城市污水. Bottom sediments沉积物are contaminated污染in more than 1,000 waterways, the administration reported in releasing its proposal in January. Between 60 and 80 percent of riparian corridors (riverbank lands) have been degraded.As with endangered species and their habitats in forests and deserts, the complexity of ecosystems is seen in rivers and the effects of development----beyond the obvious threats of industrial pollution, municipal waste, and in-stream diversions改道to slake消除the thirst of new communities in dry regions like the Southwes t…While there are many political hurdles障碍ahead, reauthorization of the Clean Water Act this year holds promise for US rivers. Rep. Norm Mineta of California, who chairs the House Committee overseeing the bill, calls it ―probably the most important env ironmental legislation this Congress will enact.‖ (553 words)6.According to the passage, the Clean Water Act______.A.has been ineffectiveB.will definitely be renewedC.has never been evaluatedD.was enacted some 30 years ago7.“Endangered” rivers are _________.A.catalogued annuallyB.less polluted than ―threatened rivers‖C.caused by floodingD.adjacent to large cities8.The “cataclysmic” event referred to in paragraph eight would be__________.A. fortuitous偶然的,意外的B. adventitious外加的,偶然的C. catastrophicD. precarious不稳定的,危险的9. The owners of the New World Mine appear to be______.A. ecologically aware of the impact of miningB. determined to construct a safe tailings pondC. indifferent to the concerns voiced by the EPAD. willing to relocate operations10. The passage conveys the impression that_______.A. Canadians are disinterested in natural resourcesB. private and public environmental groups aboundC. river banks are erodingD. the majority of US rivers are in poor conditionText CA classic series of experiments to determine the effects ofoverpopulation on communities of rats was reported in February of 1962 in an article in Scientific American. The experiments were conducted by a psychologist, John B. Calhoun and his associates. In each of these experiments, an equal number of male and female adult rats were placed in an enclosure and given an adequate supply of food, water, and other necessities. The rat populations were allowed to increase. Calhoun knew from experience approximately how many rats could live in the enclosures without experiencing stress due to overcrowding. He allowed the population to increase to approximately twice this number. Then he stabilized the population by removing offspring that were not dependent on their mothers. He and his associates then carefully observed and recorded behavior in these overpopulated communities. At the end of their experiments, Calhoun and his associates were able to conclude that overcrowding causes a breakdown in the normal social relationships among rats, a kind of social disease. The rats in the experiments did not follow the same patterns of behavior as rats would in a community without overcrowding.The females in the rat population were the most seriously affected by the high population density: They showed deviant异常的maternal behavior; they did not behave as mother rats normally do. In fact, many of the pups幼兽,幼崽, as rat babies are called, died as a result of poor maternal care. For example, mothers sometimes abandoned their pups,and, without their mothers' care, the pups died. Under normal conditions, a mother rat would not leave her pups alone to die. However, the experiments verified that in overpopulated communities, mother rats do not behave normally. Their behavior may be considered pathologically 病理上,病理学地diseased.The dominant males in the rat population were the least affected by overpopulation. Each of these strong males claimed an area of the enclosure as his own. Therefore, these individuals did not experience the overcrowding in the same way as the other rats did. The fact that the dominant males had adequate space in which to live may explain why they were not as seriously affected by overpopulation as the other rats. However, dominant males did behave pathologically at times. Their antisocial behavior consisted of attacks on weaker male,female, and immature rats. This deviant behavior showed that even though the dominant males had enough living space, they too were affected by the general overcrowding in the enclosure.Non-dominant males in the experimental rat communities also exhibited deviant social behavior. Some withdrew completely; they moved very little and ate and drank at times when the other rats were sleeping in order to avoid contact with them. Other non-dominant males were hyperactive; they were much more active than is normal, chasing other rats and fighting each other. This segment of the rat population, likeall the other parts, was affected by the overpopulation.The behavior of the non-dominant males and of the other components of the rat population has parallels in human behavior. People in densely populated areas exhibit deviant behavior similar to that of the rats in Calhoun's experiments. In large urban areas such as New York City, London, Mexican City, and Cairo, there are abandoned children. There are cruel, powerful individuals, both men and women. There are also people who withdraw and people who become hyperactive. The quantity of other forms of social pathology such as murder, rape, and robbery also frequently occur in densely populated human communities. Is the principal cause of these disorders overpopulation? Calhoun’s experiments suggest that it might be. In any case, social scientists and city planners have been influenced by the results of this series of experiments.11. Paragraph l is organized according to__________.A. reasonsB. descriptionC. examplesD. definition12.Calhoun stabilized the rat population_________.A. when it was double the number that could live in the enclosure without stressB. by removing young ratsC. at a constant number of adult rats in the enclosureD. all of the above are correct13.W hich of the following inferences CANNOT be made from theinformation inPara. 1?A. Calhoun's experiment is still considered important today.B. Overpopulation causes pathological behavior in rat populations.C. Stress does not occur in rat communities unless there is overcrowding.D. Calhoun had experimented with rats before.14. Which of the following behavior didn‟t happen in this experiment?A. All the male rats exhibited pathological behavior.B. Mother rats abandoned their pups.C. Female rats showed deviant maternal behavior.D. Mother rats left their rat babies alone.15. The main idea of the paragraph three is that __________.A. dominant males had adequate living spaceB. dominant males were not as seriously affected by overcrowding as the otherratsC. dominant males attacked weaker ratsD. the strongest males are always able to adapt to bad conditionsText DThe first mention of slavery in the statutes法令,法规of the English colonies of North America does not occur until after 1660—some forty years after the importation of the first Black people. Lest we think that existed in fact before it did in law, Oscar and Mary Handlin assure us, that the status of B lack people down to the 1660’s was that of servants. A critique批判of the Handlins’ interpretation of why legal slavery did not appear until the 1660’s suggests that assumptions about the relation between slavery and racial prejudice should be reexamined, and that explanation for the different treatment of Black slaves in North and South America should be expanded.The Handlins explain the appearance of legal slavery by arguing that, during the 1660’s, the position of white servants was improving relative to that of black servants. Thus, the Handlins contend, Black and White servants, heretofore treated alike, each attained a different status. There are, however, important objections to this argument. First, the Handlins cannot adequately demonstrate that t he White servant’s position was improving, during and after the 1660’s; several acts of the Maryland and Virginia legislatures indicate otherwise. Another flaw in the Handlins’ interpretation is their assumption that prior to the establishment of legal slavery there was no discrimination against Black people. It is true that before the 1660’s Black people were rarely called slaves. But this shouldnot overshadow evidence from the 1630’s on that points to racial discrimination without using the term slavery. Such discrimination sometimes stopped short of lifetime servitude or inherited status—the two attributes of true slavery—yet in other cases it included both. The Handlins’ argument excludes the real possibility that Black people in the English colonies were never treated as the equals of White people.The possibility has important ramifications后果,影响.If from the outset Black people were discriminated against, then legal slavery should be viewed as a reflection and an extension of racial prejudice rather than, as many historians including the Handlins have argued, the cause of prejudice. In addition, the existence of discrimination before the advent of legal slavery offers a further explanation for the harsher treatment of Black slaves in North than in South America. Freyre and Tannenbaum have rightly argued that the lack of certain traditions in North America—such as a Roman conception of slavery and a Roman Catholic emphasis on equality— explains why the treatment of Black slaves was more severe there than in the Spanish and Portuguese colonies of South America. But this cannot be the whole explanation since it is merely negative, based only on a lack of something. A more compelling令人信服的explanation is that the early and sometimes extreme racial discrimination in the English colonies helped determine the particular nature of the slavery that followed. (462 words)16. Which of the following is the most logical inference to be drawn from the passage about the effects of “several acts of the Maryland and Virginia legislatures” (Para.2) passed during and after the 1660‟s?A. The acts negatively affected the pre-1660’s position of Black as wellas of White servants.B. The acts had the effect of impairing rather than improving theposition of White servants relative to what it had been before the 1660’s.C. The acts had a different effect on the position of white servants thandid many of the acts passed during this time by the legislatures of other colonies.D. The acts, at the very least, caused the position of White servants toremain no better than it had been before the 1660’s.17. With which of the following statements regarding the status ofBlack people in the English colonies of North America before the 1660‟s would the author be LEAST likely to agree?A. Although black people were not legally considered to be slaves,they were often called slaves.B. Although subject to some discrimination, black people had a higherlegal status than they did after the 1660’s.C. Although sometimes subject to lifetime servitude, black peoplewere not legally considered to be slaves.D. Although often not treated the same as White people, black people,like many white people, possessed the legal status of servants.18. According to the passage, the Handlins have argued which of thefollowing about the relationship between racial prejudice and the institution of legal slavery in the English colonies of North America?A. Racial prejudice and the institution of slavery arose simultaneously.B. Racial prejudice most often the form of the imposition of inheritedstatus, one of the attributes of slavery.C. The source of racial prejudice was the institution of slavery.D. Because of the influence of the Roman Catholic Church, racialprejudice sometimes did not result in slavery.19. The passage suggests that the existence of a Roman conception ofslavery in Spanish and Portuguese colonies had the effect of _________.A. extending rather than causing racial prejudice in these coloniesB. hastening the legalization of slavery in these colonies.C. mitigating some of the conditions of slavery for black people in these coloniesD. delaying the introduction of slavery into the English colonies20. The author considers the explanation put forward by Freyre andTannenbaum for the treatment accorded B lack slaves in the English colonies of North America to be _____________.A. ambitious but misguidedB. valid有根据的but limitedC. popular but suspectD. anachronistic过时的,时代错误的and controversialUNIT 2Text AThe sea lay like an unbroken mirror all around the pine-girt, lonely shores of Orr’s Island. Tall, kingly spruce s wore their regal王室的crowns of cones high in air, sparkling with diamonds of clear exuded gum流出的树胶; vast old hemlocks铁杉of primeval原始的growth stood darkling in their forest shadows, their branches hung with long hoary moss久远的青苔;while feathery larches羽毛般的落叶松,turned to brilliant gold by autumn frosts, lighted up the darker shadows of the evergreens. It was one of those hazy朦胧的, calm, dissolving days of Indian summer, when everything is so quiet that the fainest kiss of the wave on the beach can be heard, and white clouds seem to faint into the blue of the sky, and soft swathing一长条bands of violet vapor make all earth look dreamy, and give to the sharp, clear-cut outlines of the northern landscape all those mysteries of light and shade which impart such tenderness to Italian scenery.The funeral was over,--- the tread鞋底的花纹/ 踏of many feet, bearing the heavy burden of two broken lives, had been to the lonely graveyard, and had come back again,--- each footstep lighter and more unconstrained不受拘束的as each one went his way from the great old tragedy of Death to the common cheerful of Life.The solemn black clock stood swaying with its eternal ―tick-tock, tick-tock,‖ in the kitchen of the brown house on Orr’s Island. There was there that sense of a stillness that can be felt,---such as settles down on a dwelling住处when any of its inmates have passed through its doors for the last time, to go whence they shall not return. The best room was shut up and darkened, with only so much light as could fall through a little heart-shaped hole in the window-shutter,---for except on solemn visits, or prayer-meetings or weddings, or funerals, that room formed no part of the daily family scenery.The kitchen was clean and ample, hearth灶台, and oven on one side, and rows of old-fashioned splint-bottomed chairs against the wall. A table scoured to snowy whiteness, and a little work-stand whereon lay the Bible, the Missionary Herald, and the Weekly Christian Mirror, before named, formed the principal furniture. One feature, however, must not be forgotten, ---a great sea-chest水手用的储物箱,which had been the companion of Zephaniah through all the countries of the earth. Old, and battered破旧的,磨损的, and unsightly难看的it looked, yet report said that there was good store within which men for the most part respect more than anything else; and, indeed it proved often when a deed of grace was to be done--- when a woman was suddenly made a widow in a coast gale大风,狂风, or a fishing-smack小渔船was run down in the fogs off the banks, leaving in some neighboring cottage a family of orphans,---in all such cases, the opening of this sea-chest was an event of good omen 预兆to the bereaved丧亲者;for Zephaniah had a large heart and a large hand, and was apt有…的倾向to take it out full of silver dollars when once it went in. So the ark of the covenant约柜could not have been looked on with more reverence崇敬than the neighbours usually showed to Captain Pennel’s sea-chest.1. The author describes Orr‟s Island in a(n)______way.A.emotionally appealing, imaginativeB.rational, logically preciseC.factually detailed, objectiveD.vague, uncertain2.According to the passage, the “best room”_____.A.has its many windows boarded upB.has had the furniture removedC.is used only on formal and ceremonious occasionsD.is the busiest room in the house3.From the description of the kitchen we can infer that thehouse belongs to people who_____.A.never have guestsB.like modern appliancesC.are probably religiousD.dislike housework4.The passage implies that_______.A.few people attended the funeralB.fishing is a secure vocationC.the island is densely populatedD.the house belonged to the deceased5.From the description of Zephaniah we can see thathe_________.A.was physically a very big manB.preferred the lonely life of a sailorC.always stayed at homeD.was frugal and saved a lotText BBasic to any understanding of Canada in the 20 years after the Second World War is the country' s impressive population growth. For every three Canadians in 1945, there were over five in 1966. In September 1966 Canada's population passed the 20 million mark. Most of this surging growth came from natural increase. The depression of the 1930s and the war had held back marriages, and the catching-up process began after 1945. The baby boom continued through the decade of the 1950s, producing a population increase of nearly fifteen percent in the five years from 1951 to 1956. This rate of increase had been exceeded only once before in Canada's history, in the decade before 1911 when the prairies were being settled. Undoubtedly, the good economic conditions of the 1950s supported a growth in the population, but the expansion also derived from a trend toward earlier marriages and an increase in the average size of families; In 1957 the Canadian birth rate stood at 28 per thousand, one of the highest in the world. After the peak year of 1957, thebirth rate in Canada began to decline. It continued falling until in 1966 it stood at the lowest level in 25 years. Partly this decline reflected the low level of births during the depression and the war, but it was also caused by changes in Canadian society. Young people were staying at school longer, more women were working; young married couples were buying automobiles or houses before starting families; rising living standards were cutting down the size of families. It appeared that Canada was once more falling in step with the trend toward smaller families that had occurred all through theWestern world since the time of the Industrial Revolution. Although the growth in Canada’s population had slowed down by 1966 (the cent), another increase in the first half of the 1960s was only nine percent), another large population wave was coming over the horizon. It would be composed of the children of the children who were born during the period of the high birth rate prior to 1957.6. What does the passage mainly discuss?A. Educational changes in Canadian society.B. Canada during the Second World War.C. Population trends in postwar Canada.D. Standards of living in Canada.7. According to the passage, when did Canada's baby boom begin?A. In the decade after 1911.B. After 1945.C. During the depression of the 1930s.D. In 1966.8. The author suggests that in Canada during the 1950s____________.A. the urban population decreased rapidlyB. fewer people marriedC. economic conditions were poorD. the birth rate was very high9. When was the birth rate in Canada at its lowest postwar level?A. 1966.B. 1957.C. 1956.D. 1951.10. The author mentions all of the following as causes of declines inpopulation growth after 1957 EXCEPT_________________.A. people being better educatedB. people getting married earlierC. better standards of livingD. couples buying houses11.I t can be inferred from the passage that before the IndustrialRevolution_______________.A. families were largerB. population statistics were unreliableC. the population grew steadilyD. economic conditions were badText CI was just a boy when my father brought me to Harlem for the first time, almost 50 years ago. We stayed at the hotel Theresa, a grand brick structure at 125th Street and Seventh avenue. Once, in the hotel restaurant, my father pointed out Joe Louis. He even got Mr. Brown, the hotel manager, to introduce me to him, a bit punchy强力的but still champ焦急as fast as I was concerned.Much has changed since then. Business and real estate are booming. Some say a new renaissance is under way. Others decry责难what they see as outside forces running roughshod肆意践踏over the old Harlem. New York meant Harlem to me, and as a young man I visited it whenever I could. But many of my old haunts are gone. The Theresa shut down in 1966. National chains that once ignored Harlem now anticipate yuppie money and want pieces of this prime Manhattan real estate. So here I am on a hot August afternoon, sitting in a Starbucks that two years ago opened a block away from the Theresa, snatching抓取,攫取at memories between sips of high-priced coffee. I am about to open up a piece of the old Harlem---the New York Amsterdam News---when a tourist。

hensel引理数论英文

hensel引理数论英文

hensel引理数论英文Hensel's lemma is a fundamental result in number theory that provides a way to lift solutions of equations modulo prime powers to solutions modulo higher powers. It is named after the German mathematician Kurt Hensel, who developed this powerful tool in the early 20th century. In this essay, I will explore Hensel's lemma from multiple perspectives, highlighting its significance, applications, and theintuition behind its proof.Hensel's lemma is a powerful tool in number theory that allows us to find solutions to equations by liftingsolutions modulo prime powers. This is particularly useful when dealing with equations that are difficult to solve directly, such as polynomial equations with coefficients in a finite field. By lifting solutions, we can obtainsolutions modulo higher powers, which can provide valuable information about the original equation.One key application of Hensel's lemma is in the studyof p-adic numbers. The p-adic numbers are an extension of the rational numbers that provide a way to analyze numbers in terms of their divisibility by prime powers. Hensel's lemma plays a crucial role in the construction and analysis of p-adic numbers, allowing us to lift solutions of equations modulo prime powers to solutions modulo higher powers in the p-adic number system.Another important application of Hensel's lemma is in the study of Diophantine equations. Diophantine equations are polynomial equations that seek integer solutions. Hensel's lemma can be used to find solutions to Diophantine equations by lifting solutions modulo prime powers. This allows us to explore the behavior of solutions in a systematic way, providing insights into the structure and properties of Diophantine equations.The proof of Hensel's lemma is based on the idea of Newton's method, which is a numerical method for finding roots of equations. Intuitively, the lemma works by iteratively improving an approximate solution modulo a prime power until we obtain a solution modulo a higherpower. This process involves computing derivatives of the equation and using them to refine the approximation. The proof is elegant and relies on the fact that the derivative of a polynomial captures information about its local behavior.Hensel's lemma has deep connections to other areas of mathematics, such as algebraic number theory and algebraic geometry. It provides a bridge between the arithmetic properties of numbers and the geometric properties of curves and surfaces. By lifting solutions modulo prime powers, we can study the behavior of equations in a local neighborhood, which can have far-reaching consequences for the global structure of the equation.In conclusion, Hensel's lemma is a powerful tool in number theory that allows us to lift solutions of equations modulo prime powers to solutions modulo higher powers. Its applications range from the study of p-adic numbers to Diophantine equations, and its proof is based on the idea of Newton's method. Hensel's lemma has deep connections to other areas of mathematics and provides valuable insightsinto the behavior and structure of equations. Its significance lies not only in its practical applications but also in its role in connecting different branches of mathematics.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

arXiv:0802.1925v1 [math.NT] 13 Feb 2008
1. Introduction Throughout p 2 is a fixed prime number, Qp is the field of p-adic numbers, |ω |p is the p-adic valuation of ω ∈ Qp , µ(S ) is the Haar measure of a measurable set S ⊂ Qp , Ap,n is the set of algebraic numbers of degree n lying in Qp , Ap is the set of all algebraic numbers, Q∗ p is the extension of Qp containing Ap . There is a natural extension of p-adic valuation from Qp to Q∗ p [Cas86, Lut55]. This valuation will also be denoted by | · |p . The disc in Qp of radius r centered at α is the set of solutions of the inequality |x − α|p < r . Throughout, R>a = {x ∈ R : x > a}, R+ = R>0 and Ψ : N → R+ is monotonic. Given a polynomial P (x) = an xn + an−1 xn−1 + . . . + a1 x + a0 ∈ Z[x] with an = 0, deg P = n is the degree of P , H (P ) = max0 i n |ai | is the usual height of P . Also H (α) will stand for the usual height of α ∈ Ap , i.e. the height of the minimal polynomial for α. The notation X ≪ Y will mean X = O (Y ) and the one of X ≍ Y will stand for X ≪ Y ≪ X. In 1989 V. Bernik [Ber89] proved A. Baker’s conjecture by showing that for almost all x ∈ R the inequality |P (x)| < H (P )−n+1Ψ(H (P )) has only finitely many solutions in P ∈ Z[x] with deg P n whenever and the sum
n satisfying
(8)
(9)
where t = t(P ) with 2t H (P ) < 2t+1 , which means that ω ∈ E1 (2n+1 2t Ψ(2t ), 2t+1 , K, ξ ). The system (9) holds for infinitely many t whenever (8) holds for infinitely many P . Therefore, E1 (ξ, Ψ) ⊂ lim sup E1 (2n+12t Ψ(2t ), 2t+1 , K, ξ ). By Proposition 1, µ(E1 (2 2 Ψ(2 ), 2 , K, ξ )) ≪ 2t Ψ(2t ). Taking into account (6), the Borel-Cantelli lemma completes the proof. Next, we are going to show that the divergence part of Theorem 1 is a consequence of Theorem 2. Proof of the divergence part of Theorem 1 modulo Theorem 2. Fix any finite disc K in Qp . Then there is a positive constant C > 0 such that |ω |p C for all ω ∈ K . Let Ψ : R+ → R+ be a given monotonic function such that the sum (1) diverges. Then the ˜ h) = |n!|p C 1−n Ψ(h) is also monotonic and the sum ∞ Ψ( ˜ h) diverges. By function Ψ( h=1 Theorem 2, for almost every ω ∈ K there are infinitely many α ∈ Ap,n satisfying ˜ H (α)). |ω − α|p < H (α)−n Ψ( (10)
Journal of Number Theory 111, no.1 (2005) 33-56 ON APPROXIMATION OF P-ADIC NUMBERS BY P-ADIC ALGEBRAIC NUMBERS
V.V. BERESNEVICH, V.I. BERNIK, AND E.I. KOVALEVSKAYA
2. Reduction of Theorem 1 We are now going to show that the convergence part of Theorem 1 follows from the following two theorems. Also we show that the divergence part of Theorem 1 follows from Theorem 2. Proposition 1. Let δ, ξ ∈ R+ , ξ < 1/2, Q ∈ R>1 and K0 be a finite disc in Qp . Given a disc K ⊂ K0 , let E1 (δ, Q, K, ξ ) be the set of ω ∈ K such that there is a non-zero polynomial P ∈ Z[x], deg P n, H (P ) Q satisfying the system of inequalities |P (ω )|p < δQ−n−1 , |P ′(αω,P )|p H (P )− ξ , (4)
ON APPROXIMATION OF P-ADIC NUMBERS BY P-ADIC ALGEBRAIC NUMBERS
3
of ω ∈ Qp such that there are infinitely many polynomials P ∈ Z[x], deg P the system of inequalities |P (ω )|p < H (P )−nΨ(H (P )), |P ′(αω,P )|p has zero measure. The system (8) implies |P (ω )|p < (2t )−n−1 2t Ψ(2t ), |P ′(αω,P )|p H (P )− ξ , H (P )− ξ
where αω,P ∈ Ap is the root of P nearest to ω (if there are more than one root nearest to ω then we choose any of them). Then there is a positive constant c1 such that for any finite disc K ⊂ K0 there is a sufficiently large number Q0 such that µ(E1 (δ, Q, K, ξ )) c1 δµ(K ) for all Q Q0 and all δ > 0. Proposition 2. Let ξ, C ∈ R+ , K0 be a finite disc in Qp and let E2 (ξ, C, K0) be the set of ω ∈ Qp such that there are infinitely many polynomials P ∈ Z[x], deg P n satisfying the system of inequalities |P (ω )|p < CH (P )−n−1, (5) |P ′ (αω,P )|p < H (P )−ξ . Then µ(E2 (ξ, C, K0)) = 0. Proof of the convergence part of Theorem 1 modulo Propositions 1 and 2. Let the sum (1) converges. Then it is readily verified that
1
ON APPROXIMATION OF P-ADIC NUMBERS BY P-ADIC ALGEBRAIC NUMBERS
2
The following is a p-adic analogue of Theorem 2 in [Ber99]. Theorem 2. Let Ψ : R+ → R+ be monotonically decreasing and Ap,n (Ψ) be the set of ω ∈ Qp such that the inequality |ω − α|p < H (α)−nΨ(H (α)) (3) has infinitely many solutions in α ∈ Ap,n . Then µ(Ap,n (Ψ)) = 0 whenever the sum (1) converges and Ap,n (Ψ) has full Haar measure whenever the sum (1) diverges.
相关文档
最新文档