6,992 results on '"Open problem"'
Search Results
2. Some Properties of Normalized Tails of Maclaurin Power Series Expansions of Sine and Cosine.
- Author
-
Zhang, Tao, Yang, Zhen-Hang, Qi, Feng, and Du, Wei-Shih
- Subjects
- *
SINE function , *HYPERGEOMETRIC functions , *INTEGRAL representations , *POWER series , *FRACTIONAL integrals , *COSINE function , *OPTIMISM - Abstract
In the paper, the authors introduce two notions, the normalized remainders, or say, the normalized tails, of the Maclaurin power series expansions of the sine and cosine functions, derive two integral representations of the normalized tails, prove the nonnegativity, positivity, decreasing property, and concavity of the normalized tails, compute several special values of the Young function, the Lommel function, and a generalized hypergeometric function, recover two inequalities for the tails of the Maclaurin power series expansions of the sine and cosine functions, propose three open problems about the nonnegativity, positivity, decreasing property, and concavity of a newly introduced function which is a generalization of the normalized tails of the Maclaurin power series expansions of the sine and cosine functions. These results are related to the Riemann–Liouville fractional integrals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. ON BOUNDS FOR NORMS OF SINE AND COSINE ALONG A CIRCLE ON THE COMPLEX PLANE.
- Author
-
FENG QI
- Subjects
SINE function ,CIRCLE ,COSINE function - Abstract
In the paper, the author presents lower and upper bounds for norms of the sine and cosine functions along a circle on the complex plane. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Alternative Proofs for Monotonicity of Some Functions Related to Sectional Curvature of Fisher–Rao Manifold of Beta Distributions
- Author
-
Qi, Feng, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Dutta, Hemen, editor, Ahmed, Nazibuddin, editor, and Agarwal, Ravi P., editor
- Published
- 2023
- Full Text
- View/download PDF
5. REMARKS ON THE TERMINOLOGY OF THE MAPPINGS IN FIXED POINT ITERATIVE METHODS IN METRIC SPACES.
- Author
-
BERINDE, VASILE, PETRUŞEL, ADRIAN, and RUS, IOAN A.
- Abstract
In this paper we present some suggestions for unifying the terminology of the mappings appearing in fixed point iterative methods for the case when the setting is a metric space. We consider the following concepts: contraction type mapping, contractive type mapping and nonexpansive type mapping, for which some problems are formulated. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Fixed Point Theory in Graph Metric Spaces
- Author
-
Petruşel, A., Petruşel, G., Pardalos, Panos M., Series Editor, Thai, My T., Series Editor, Du, Ding-Zhu, Honorary Editor, Belavkin, Roman V., Advisory Editor, Birge, John R., Advisory Editor, Butenko, Sergiy, Advisory Editor, Kumar, Vipin, Advisory Editor, Nagurney, Anna, Advisory Editor, Pei, Jun, Advisory Editor, Prokopyev, Oleg, Advisory Editor, Rebennack, Steffen, Advisory Editor, Resende, Mauricio, Advisory Editor, Terlaky, Tamás, Advisory Editor, Vu, Van, Advisory Editor, Vrahatis, Michael N., Associate Editor, Xue, Guoliang, Advisory Editor, Ye, Yinyu, Advisory Editor, Daras, Nicholas J., editor, and Rassias, Themistocles M., editor
- Published
- 2022
- Full Text
- View/download PDF
7. Fixed point theory of cyclic operators.
- Author
-
Păcurar, Mădălina and Rus, Ioan A.
- Abstract
In this paper, we present new variants of some known fixed point theorems and new fixed point results for cyclic operators on ordered sets, on distance spaces, and on ordered distance spaces. Some results in terms of the fixed point structures are also presented. Our results include existence, uniqueness, convergence of successive approximations, well posedness of fixed point problems and the Ostrowsky property. We also identify some of the main research directions regarding cyclic operators and formulate several open problems for each of them. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. The Relevance of a Metric Condition on a Pair of Operators in Common Fixed Point Theory
- Author
-
Petruşel, A., Rus, I. A., Cho, Yeol Je, editor, Jleli, Mohamed, editor, Mursaleen, Mohammad, editor, Samet, Bessem, editor, and Vetro, Calogero, editor
- Published
- 2021
- Full Text
- View/download PDF
9. A case study in set-mapping pair theory: the set-mapping pair bijections.
- Author
-
FILIP, A.-D. and RUS, I. A.
- Subjects
- *
FIXED point theory , *ISOMORPHISM (Mathematics) - Abstract
In a recent paper (I. A. Rus. Sets with structure, mappings and fixed point property: fixed point structures. Fixed Point Theory 23 (2022), No. 2) the author introduced, amongst others, the following notions: set-mapping pair and set-mapping pair bijection. In this paper we study the set-mapping pair bijections in connection with the isomorphisms structure, and their impact on the fixed point theory in a set-mapping pair. Some open problems are also formulated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Completely monotonic degree of a function involving trigamma and tetragamma functions
- Author
-
Feng Qi
- Subjects
completely monotonic degree ,completely monotonic function ,trigamma function ,tetragamma function ,strongly completely monotonic function ,logarithmically concave function ,convolution ,open problem ,Mathematics ,QA1-939 - Abstract
Let $\psi(x)$ be the digamma function. In the paper, the author reviews backgrounds and motivations to compute complete monotonic degree of the function $\Psi(x)=[\psi'(x)]^2+\psi''(x)$ with respect to $x\in(0,\infty)$, confirms that completely monotonic degree of the function $\Psi(x)$ is $4$, finds a relation between strongly completely monotonic functions and completely monotonic degrees, provides a proof for the relation between strongly completely monotonic functions and completely monotonic degrees, proves a property of logarithmically concave functions, and poses two open problems on lower bound for convolution of logarithmically concave functions and on completely monotonic degree of a function involving $\Psi(x)$.
- Published
- 2020
- Full Text
- View/download PDF
11. A Modified Genetic Algorithm With New Encoding and Decoding Methods for Integrated Process Planning and Scheduling Problem.
- Author
-
Liu, Qihao, Li, Xinyu, Gao, Liang, and Li, Yingli
- Abstract
Due to the complementarity of the process planning and shop scheduling, their integration can greatly facilitate the development of the intelligent manufacturing system. In the last decade, the integrated process planning and scheduling (IPPS) problem has become a research hotspot in the manufacturing system area. It is an NP-hard problem and is more complicated than the job shop scheduling problem. Although some progress has been obtained in the IPPS field, there are still many unsolved open problems. In this article, the novel integrated encoding and decoding methods are proposed by considering the OR-node of the process network graph. Moreover, a modified genetic algorithm (MGA) is designed based on the proposed coding methods. The process planning and the scheduling parts can be represented simultaneously in one individual. As for the precedence constraints between operations, the specifically designed operators are able to guarantee the feasibility of the operation sequence during the searching procedure. Then, the superiority of MGA is verified by updating nine new records on 37 well-known open problems, four of them reach their lower bounds. In addition, the proposed algorithm is also tested on a real-world case from a nonstandard equipment workshop in a Chinese machine tool company, which produces a common module of a packaging machine. The results show that the proposed MGA can solve the real-world case better than the comparative algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
12. A Marx-Strohhacker Type Result for Close-to-Convex Functions
- Author
-
Tuneski, Nikola, Nunokawa, Mamoru, Jolevska-Tuneska, Biljana, Agranovsky, Mark, editor, Golberg, Anatoly, editor, Jacobzon, Fiana, editor, Shoikhet, David, editor, and Zalcman, Lawrence, editor
- Published
- 2018
- Full Text
- View/download PDF
13. Fixed point results for decreasing convex orbital operators in Hilbert spaces.
- Author
-
Petruşel, Adrian and Petruşel, Gabriela
- Abstract
Let (X , ·) be a Hilbert space and T : X → X be a decreasing operator. Under a metric condition involving the convex combination of x and T(x), we will prove some fixed point theorems which generalize and complement several results in the theory of nonlinear operators. Our results are closely related to the admissible perturbations approach in fixed point theory. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. Classic Conjectures Allow Young Mathematicians to Commence Research
- Author
-
Soifer, Alexander, Kaiser, Gabriele, Section editor, and Soifer, Alexander, editor
- Published
- 2017
- Full Text
- View/download PDF
15. Los problemas abiertos y la tarea integradora en la enseñanza de las ciencias.
- Author
-
Falcón Alén, Hugo Manuel, Cosme, Yolanda González, Fajardo, Justa Rodríguez, and Silot Maceira, Luis Omar
- Abstract
Copyright of Roca: Revista Científico-Educacional de la Provincia de Granma is the property of Universidad de Granma, Departamento Editorial and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
16. On ideal and weakly-ideal access structures
- Author
-
Shahram Khazaei, Maghsoud Parviz, and Reza Kaboli
- Subjects
Discrete mathematics ,Class (set theory) ,Algebra and Number Theory ,Ideal (set theory) ,Computer Networks and Communications ,Statement (logic) ,Applied Mathematics ,Open problem ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Microbiology ,Secret sharing ,Matroid ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Mathematics ,Access structure - Abstract
For more than two decades, proving or refuting the following statement has remained a challenging open problem in the theory of secret sharing schemes (SSSs): every ideal access structure admits an ideal perfect multi-linear SSS. The class of group-characterizable (GC) SSSs include the multi-linear ones. Hence, if the above statement is true, then so is the following weaker statement: every ideal access structure admits an ideal perfect GC SSS. One contribution of this paper is to show that ideal SSSs are not necessarily GC. Our second contribution is to study the above two statements with respect to several variations of weakly-ideal access structures. Recently, Mejia and Montoya studied ideal access structures that admit ideal multi-linear schemes and provided a classification-like theorem for them. We additionally present some tools that are useful to extend their result.
- Published
- 2023
- Full Text
- View/download PDF
17. An explicit formula for derivative polynomials of the tangent function
- Author
-
Qi Feng and Guo Bai-Ni
- Subjects
derivative polynomial ,tangent function ,explicit formula ,tangent number ,open problem ,26c99 ,26a06 ,26a09 ,16a24 ,33b10 ,42a05 ,Mathematics ,QA1-939 - Abstract
In the paper, the authors derive an explicit formula for derivative polynomials of the tangent function, deduce an explicit formula for tangent numbers, pose an open problem about obtaining an alternative and explicit formula for derivative polynomials of the tangent function, and recommend some papers closely related to derivative polynomials of other elementary and applicable functions.
- Published
- 2017
- Full Text
- View/download PDF
18. Multiplier Spaces (
- Author
-
Jevtić, Miroljub, Vukotić, Dragan, Arsenović, Miloš, Elias Garcia, Juan, Editor-in-chief, Myers, Timothy G., Series editor, Quintela, Peregrina, Series editor, Caballero, María Emilia, Series editor, Andruskiewitsch, Nicolas, Series editor, Mira, Pablo, Series editor, Schwede, Karl, Series editor, Jevtić, Miroljub, Vukotić, Dragan, and Arsenović, Miloš
- Published
- 2016
- Full Text
- View/download PDF
19. Accelerated Log-Regularized Convolutional Transform Learning and Its Convergence Guarantee
- Author
-
Haoli Zhao, Shengli Xie, Zuyuan Yang, Yongcheng Guo, and Zhenni Li
- Subjects
Computer science ,Open problem ,Regular polygon ,Extrapolation ,02 engineering and technology ,Function (mathematics) ,Convolutional neural network ,Computer Science Applications ,Human-Computer Interaction ,CTL ,Control and Systems Engineering ,020204 information systems ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Unsupervised learning ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Algorithm ,Software ,Information Systems - Abstract
Convolutional transform learning (CTL), learning filters by minimizing the data fidelity loss function in an unsupervised way, is becoming very pervasive, resulting from keeping the best of both worlds: the benefit of unsupervised learning and the success of the convolutional neural network. There have been growing interests in developing efficient CTL algorithms. However, developing a convergent and accelerated CTL algorithm with accurate representations simultaneously with proper sparsity is an open problem. This article presents a new CTL framework with a log regularizer that can not only obtain accurate representations but also yield strong sparsity. To efficiently address our nonconvex composite optimization, we propose to employ the proximal difference of the convex algorithm (PDCA) which relies on decomposing the nonconvex regularizer into the difference of two convex parts and then optimizes the convex subproblems. Furthermore, we introduce the extrapolation technology to accelerate the algorithm, leading to a fast and efficient CTL algorithm. In particular, we provide a rigorous convergence analysis for the proposed algorithm under the accelerated PDCA. The experimental results demonstrate that the proposed algorithm can converge more stably to desirable solutions with lower approximation error and simultaneously with stronger sparsity and, thus, learn filters efficiently. Meanwhile, the convergence speed is faster than the existing CTL algorithms.
- Published
- 2022
- Full Text
- View/download PDF
20. On graphs whose eternal vertex cover number and vertex cover number coincide
- Author
-
Jasine Babu, Veena Prabhakaran, Mathew C. Francis, Deepak Rajendraprasad, Nandini J Warrier, and L. Sunil Chandran
- Subjects
Applied Mathematics ,Open problem ,0211 other engineering and technologies ,Vertex cover ,021107 urban & regional planning ,0102 computer and information sciences ,02 engineering and technology ,Characterization (mathematics) ,01 natural sciences ,Planar graph ,Combinatorics ,symbols.namesake ,Integer ,010201 computation theory & mathematics ,Chordal graph ,symbols ,Discrete Mathematics and Combinatorics ,Time complexity ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics ,PSPACE - Abstract
The eternal vertex cover problem is a variant of the classical vertex cover problem defined in terms of an infinite attacker–defender game played on a graph. In each round of the game, the defender reconfigures guards from one vertex cover to another in response to a move by the attacker. The minimum number of guards required in any winning strategy of the defender when this game is played on a graph G is the eternal vertex cover number of G , denoted by evc ( G ) . It is known that given a graph G and an integer k , checking whether evc ( G ) ≤ k is NP-hard. Further, it is known that for any graph G , mvc ( G ) ≤ evc ( G ) ≤ 2 mvc ( G ) , where mvc ( G ) is the vertex cover number of G . Though a characterization is known for graphs for which evc ( G ) = 2 mvc ( G ) , a characterization of graphs for which evc ( G ) = mvc ( G ) remained as an open problem, since 2009. We achieve such a characterization for a class of graphs that includes chordal graphs and internally triangulated planar graphs. For biconnected chordal graphs, our characterization leads to a polynomial time algorithm for precisely determining evc ( G ) and an algorithm for determining a safe strategy for guard movement in each round of the game using only evc ( G ) guards. Though the eternal vertex cover problem is only known to be in PSPACE in general, it follows from our new characterization that the problem is in NP for locally connected graphs, a graph class which includes all biconnected internally triangulated planar graphs. We also provide reductions establishing NP-completeness of the problem for biconnected internally triangulated planar graphs. As far as we know, this is the first NP-completeness result known for the problem for any graph class.
- Published
- 2022
- Full Text
- View/download PDF
21. Open Problems in Abstract Argumentation
- Author
-
Baumann, Ringo, Strass, Hannes, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Siekmann, Jörg, Series editor, Eiter, Thomas, editor, Strass, Hannes, editor, Truszczyński, Mirosław, editor, and Woltran, Stefan, editor
- Published
- 2015
- Full Text
- View/download PDF
22. A ratio of finitely many gamma functions and its properties with applications.
- Author
-
Qi, Feng, Li, Wen-Hui, Yu, Shu-Bin, Du, Xin-Yu, and Guo, Bai-Ni
- Abstract
In the paper, the authors establish an inequality involving exponential functions and sums, introduce a ratio of finitely many gamma functions, discuss properties, including monotonicity, logarithmic convexity, (logarithmically) complete monotonicity, and the Bernstein function property, of the newly introduced ratio, and construct two inequalities of multinomial coefficients and multivariate beta functions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
23. Characterization of a class of fuzzy implication solutions to the law of importation
- Author
-
Yingying Song and Hongjun Zhou
- Subjects
Algebra ,Class (set theory) ,Property (philosophy) ,Negation ,Artificial Intelligence ,Logic ,Open problem ,Norm (mathematics) ,Idempotence ,Characterization (mathematics) ,Fuzzy logic ,Mathematics - Abstract
The law of importation between fuzzy implications and conjunctions is an important property in both the theory and the application of fuzzy logic. Although many interesting results have been reported in the literature, the related open problem of finding all possible pairs of implications and conjunctions satisfying the law of importation has not been fully solved. As a continuation of two articles S. Massanet et al. (2018) [23] ; S. Massanet et al. (2018) [24] , this article aims to characterize fuzzy implication solutions with a continuous natural negation to the law of importation with respect to a fixed conjunctive uninorm having continuous underlying operators in several cases. Such solutions for the cases where the continuous underlying triangular norm and triangular conorm of a prefixed uninorm are idempotent or Archimedean are completely characterized, and the solutions for the cases where the continuous underlying operators are given by ordinal sums are characterized under some additional assumptions. Finally, some comments on relations to recent independent work W.-H. Li and F. Qin (2021) [25] are given. These two independent articles will go a further step towards answering the open problem regarding the law of importation.
- Published
- 2022
- Full Text
- View/download PDF
24. A Time-Dependent Electric Vehicle Routing Problem With Congestion Tolls
- Author
-
Junwei Wang, Ruiyou Zhang, and Jingmei Guo
- Subjects
Mathematical optimization ,business.product_category ,biology ,Computer science ,Heuristic (computer science) ,Strategy and Management ,Open problem ,05 social sciences ,Scheduling (computing) ,Traffic congestion ,Toll ,0502 economics and business ,Electric vehicle ,Benchmark (computing) ,biology.protein ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,050203 business & management - Abstract
Scheduling the recharging of electric vehicle fleets under different scenarios is an important but open problem. One important scenario is that vehicles travel at different speeds in different periods since traffic congestion is common in urban areas nowadays. Therefore, in this article, a novel time-dependent electric vehicle routing problem with congestion tolls is proposed. If a vehicle enters a peak period, a fixed congestion toll needs to be paid in this problem. A mixed integer linear programming model is established and an adaptive large neighborhood search (ALNS) heuristic is designed to solve the model. The model and solving method are validated and evaluated extensively with benchmark instances. Results indicate that a certain level of congestion tolls could prevent vehicles from entering peak periods and relieve road congestions significantly. Furthermore, the ALNS heuristic could provide much better solutions for the problem than typical optimization software, such as Gurobi, in much shorter running time.
- Published
- 2022
- Full Text
- View/download PDF
25. On union and intersection of type-2 fuzzy sets not expressible by the sup-t-norm extension principle
- Author
-
Guanrong Chen, Xinxing Wu, and Lidong Wang
- Subjects
Algebra ,Operator (computer programming) ,Artificial Intelligence ,Logic ,Intersection (set theory) ,Open problem ,Duality (mathematics) ,Fuzzy set ,T-norm ,Type (model theory) ,Unit interval ,Mathematics - Abstract
This paper constructs a conjunction and a disjunction operator for type-2 fuzzy sets that cannot be expressed by the sup-t-norm extension principle applied to conjunction and disjunction of type-1 fuzzy sets by means of t-norms and t-conorms on the unit interval. This result answers affirmatively an open problem posed by Hernandez et al. in 2015. The duality between the set-theoretic operators for type-2 fuzzy sets is obtained from the duality of set-theoretic operations on type-1 fuzzy sets.
- Published
- 2022
- Full Text
- View/download PDF
26. Lane Detection Model Based on Spatio-Temporal Network With Double Convolutional Gated Recurrent Units
- Author
-
Jiyong Zhang, Tao Deng, Fei Yan, and Wenbo Liu
- Subjects
FOS: Computer and information sciences ,050210 logistics & transportation ,Intersection (set theory) ,business.industry ,Computer science ,Computer Vision and Pattern Recognition (cs.CV) ,Mechanical Engineering ,Open problem ,05 social sciences ,Computer Science - Computer Vision and Pattern Recognition ,Process (computing) ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Advanced driver assistance systems ,Environmental perception ,Computer Science Applications ,0502 economics and business ,Automotive Engineering ,Key (cryptography) ,Computer vision ,Lane detection ,Artificial intelligence ,Layer (object-oriented design) ,business - Abstract
Lane detection is one of the indispensable and key elements of self-driving environmental perception. Many lane detection models have been proposed, solving lane detection under challenging conditions, including intersection merging and splitting, curves, boundaries, occlusions and combinations of scene types. Nevertheless, lane detection will remain an open problem for some time to come. The ability to cope well with those challenging scenes impacts greatly the applications of lane detection on advanced driver assistance systems (ADASs). In this paper, a spatio-temporal network with double Convolutional Gated Recurrent Units (ConvGRUs) is proposed to address lane detection in challenging scenes. Both of ConvGRUs have the same structures, but different locations and functions in our network. One is used to extract the information of the most likely low-level features of lane markings. The extracted features are input into the next layer of the end-to-end network after concatenating them with the outputs of some blocks. The other one takes some continuous frames as its input to process the spatio-temporal driving information. Extensive experiments on the large-scale TuSimple lane marking challenge dataset and Unsupervised LLAMAS dataset demonstrate that the proposed model can effectively detect lanes in the challenging driving scenes. Our model can outperform the state-of-the-art lane detection models., Comment: 13 pages, 9 figures, 8 tables, Accepted by IEEE Transactions on Intelligent Transportation Systems
- Published
- 2022
- Full Text
- View/download PDF
27. On generating uninorms on some special classes of bounded lattices
- Author
-
Radko Mesiar and Emel Aşıcı
- Subjects
Constraint (information theory) ,Pure mathematics ,Artificial Intelligence ,Logic ,Bounded function ,Open problem ,Bounded lattice ,Element (category theory) ,Mathematics - Abstract
This paper further develops the study of construction of uninorms on bounded lattices. First, by using the fact that triangular norms (t-norms) and triangular conorms (t-conorms) on an arbitrary bounded lattice always exist, we present two new constructions of uninorms on an arbitrary bounded lattice L with an additional constraint on the neutral element. In addition, some illustrative examples for the new constructions of uninorms on bounded lattices are provided. Then, we illustrate how our new construction methods are different from some existing methods for the construction of uninorms on bounded lattices. Finally, we provide an answer to the open problem presented by Cayli.
- Published
- 2022
- Full Text
- View/download PDF
28. On Sirakov's open problem and related topics
- Author
-
Wenming Zou, Xuexiu Zhong, and Juncheng Wei
- Subjects
Mathematics (miscellaneous) ,Computer science ,Open problem ,Data science ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
29. Sparse Bayesian learning-based mainlobe blanket jamming suppression algorithm
- Author
-
Bilei Zhou, Keqing Duan, Weijian Liu, Rongfeng Li, and Yongliang Wang
- Subjects
electronic countermeasures ,interference suppression ,learning (artificial intelligence) ,bayes methods ,jamming ,radar signal processing ,electronic counter-countermeasures field ,sparse bayesian learning-based mainlobe blanket jamming suppression algorithm ,mlj ,sbl algorithm ,mainlobe jamming ,open problem ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The suppression of mainlobe jamming (MLJ) is a hard task and an open problem in the electronic counter-countermeasures field. In this article, a sparse Bayesian learning (SBL)-based mainlobe blanket jamming suppression algorithm is proposed for solving this problem, which can effectively suppress the MLJ and estimate the target distance and direction. The proposed algorithm can be divided into two steps. First, the row (or column) spatial adaptive processing is adopted to suppress the MLJ; Second, the SBL algorithm is used to obtain the target echo parameters.
- Published
- 2019
- Full Text
- View/download PDF
30. A Class of Functional-Integral Equations with Applications to a Bilocal Problem
- Author
-
Petruşel, Adrian, Rus, Ioan A., Pardalos, Panos M., Series editor, Rassias, Themistocles M., editor, and Tóth, László, editor
- Published
- 2014
- Full Text
- View/download PDF
31. Advances in Periodic Difference Equations with Open Problems
- Author
-
AlSharawi, Ziyad, Cánovas, Jose S., Linero, Antonio, AlSharawi, Ziyad, editor, Cushing, Jim M., editor, and Elaydi, Saber, editor
- Published
- 2014
- Full Text
- View/download PDF
32. Some Open Problems about Catalytic, Numerical, and Spiking Neural P Systems : (Extended Abstract)
- Author
-
Păun, Gheorghe, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Alhazov, Artiom, editor, Cojocaru, Svetlana, editor, Gheorghe, Marian, editor, Rogozhin, Yurii, editor, Rozenberg, Grzegorz, editor, and Salomaa, Arto, editor
- Published
- 2014
- Full Text
- View/download PDF
33. About Open Problems
- Author
-
Koç, Çetin Kaya and Koç, Çetin Kaya, editor
- Published
- 2014
- Full Text
- View/download PDF
34. Transforming Images in a DGS: The Semiotic Potential of the Dragging Tool for Introducing the Notion of Conditional Statement
- Author
-
Mariotti, Maria Alessandra, Rezat, Sebastian, editor, Hattermann, Mathias, editor, and Peter-Koop, Andrea, editor
- Published
- 2014
- Full Text
- View/download PDF
35. Sparse Bayesian learning-based mainlobe blanket jamming suppression algorithm.
- Author
-
Zhou, Bilei, Duan, Keqing, Liu, Weijian, Li, Rongfeng, and Wang, Yongliang
- Subjects
RADAR interference ,ELECTRONIC counter-countermeasures ,BAYESIAN analysis ,DIRECTION of arrival estimation ,ADAPTIVE signal processing ,RADAR cross sections - Abstract
The suppression of mainlobe jamming (MLJ) is a hard task and an open problem in the electronic counter-countermeasures field. In this article, a sparse Bayesian learning (SBL)-based mainlobe blanket jamming suppression algorithm is proposed for solving this problem, which can effectively suppress the MLJ and estimate the target distance and direction. The proposed algorithm can be divided into two steps. First, the row (or column) spatial adaptive processing is adopted to suppress the MLJ; Second, the SBL algorithm is used to obtain the target echo parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
36. Packing parameters in graphs: new bounds and a solution to an open problem.
- Author
-
Mojdeh, Doost Ali and Samadi, Babak
- Abstract
In this paper, we investigate the packing parameters in graphs. By applying the Mantel's theorem, we give upper bounds on packing and open packing numbers of triangle-free graphs along with characterizing the graphs for which the equalities hold and exhibit sharp Nordhaus–Gaddum type inequalities for packing numbers. We also solve the open problem of characterizing all connected graphs with ρ o (G) = n - ω (G) posed in Hamid and Saravanakumar (Discuss Math Graph Theory 35:5–16, 2015). [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. Some generalizations involving open problems of F. Qi.
- Author
-
Halim, B. and Senouci, A.
- Subjects
GENERALIZATION ,MATHEMATICAL equivalence - Abstract
In this paper we generalize some inequalities obtained in [2] by considering two parameters and weight functions. Moreover we give a partial answer to an open problem posed in [2]. [ABSTRACT FROM AUTHOR]
- Published
- 2019
38. What is the least number of moves needed to solve the k-peg Towers of Hanoi problem?
- Author
-
Demontis, Roberto
- Subjects
- *
TELESCOPES , *MATHEMATICAL bounds , *OPTICAL disks , *TOWERS , *STOCHASTIC sequences - Abstract
We prove that the solutions to the k -peg Tower of Hanoi problem given by Frame and Stewart are minimal. The proof relies on first identifying that for any n -disk, k -peg problem, there is at least one minimal sequence is symmetric. We show that if we order the number moved required for the disks in the minimal symmetric sequence in an increasing manner and obtain the sequence x i , then x i ≥ 2 i − 1 . We also prove that the maximum number of disks that can be moved using x i steps is k − 4 + i k − 3 . We use these to lower bound the telescopic sum (2) that is a lower bound on the number of moves required for any minimal symmetric sequence. This gives us the required result. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
39. Characterization of a Class of Fuzzy Implications Satisfying the Law of Importation With Respect to Uninorms With Continuous Underlying Operators
- Author
-
Qin Feng and Wen-Huang Li
- Subjects
Class (set theory) ,Applied Mathematics ,Open problem ,Classical logic ,Fuzzy set ,Characterization (mathematics) ,Fuzzy logic ,Tautology (logic) ,Algebra ,Computational Theory and Mathematics ,Negation ,Artificial Intelligence ,Control and Systems Engineering ,Mathematics - Abstract
The law of importation, given by the equality (x^y)→z ≈ (x→(y→z)), is a tautology in classical logic and has been proved to be widely used in approximate reasoning and image processing. Some open problems of fuzzy implication dealing with the law of importation were suggested on 8th international conference on Fuzzy Set Theory and Applications (FSTA 2006). In this paper, we partially solve one open problem associated with this property. Specifically, we mainly devote ourselves to solving the general form of the law of importation I(U(x, y), z) = I(x, I(y, z)), where I is a fuzzy implication and U is a conjunctive uninorm with a continuous underlying tnorm and a continuous underlying t-conorm. Along this study, given a fixed uninorm with continuous underlying operators, all fuzzy implications that satisfy the law of importation with respect to this uninorm, and having an α-section that is a continuous negation, are characterized.
- Published
- 2022
- Full Text
- View/download PDF
40. Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection
- Author
-
Jie Wang, Min Song, Wenye Wang, and Cliff Wang
- Subjects
Computer Networks and Communications ,Computer science ,media_common.quotation_subject ,Open problem ,Spectral efficiency ,Computer security ,computer.software_genre ,Usage data ,Prime (order theory) ,System model ,Software deployment ,Graph (abstract data type) ,Electrical and Electronic Engineering ,Function (engineering) ,computer ,Software ,media_common - Abstract
Spectrum activity surveillance (SAS) is essential to dynamic spectrum access (DSA)-enabled systems with a two-fold impact: it is a primitive mechanism to collect usage data for spectrum efficiency improvement; it is also a prime widget to collect misuse forensics of unauthorized or malicious users. While realizing SAS for DSA-enabled systems appears to be intuitive and trivial, it is, however, a challenging yet open problem. On one hand, a large-scale SAS function is costly to implement in practice; on the other hand, it is not clear how to characterize the efficacy and performance of monitor deployment strategies. To address such challenges, we introduce a three-factor space, composed of spectrum, time, and geographic region, over which the SAS problem is formulated by a two-step solution: 3D-tessellation for sweep (monitoring) coverage and graph walk for detecting spectrum culprits, that is, devices responsible for unauthorized spectrum occupancy. In particular, our system model transforms SAS from a globally collective activity to localized (even distributed) actions, and strategy objectives from qualitative attributes to quantitative measures. With this model, we design low-cost deterministic strategies for dedicated monitors, which outperform strategies found by genetic algorithms, and performance-guaranteed random strategies for crowd-source monitors, which can detect adversarial spectrum culprits in bounded time.
- Published
- 2022
- Full Text
- View/download PDF
41. A Unified Approach for Finite-Time Global Stabilization of Affine, Rigid and Translational Formation
- Author
-
Yanjun Lin, Zhiyun Lin, Brian D. O. Anderson, Zhiyong Sun, Cyber-Physical Systems Center Eindhoven, Autonomous Motion Control Lab, Control Systems, and EAISI Mobility
- Subjects
Surface (mathematics) ,distributed algorithm ,affine formation ,Decentralized control ,Computer science ,Open problem ,Multi-agent systems ,Mode (statistics) ,Sun ,Shape ,Aerospace electronics ,formation control ,Topology ,Space (mathematics) ,Sliding mode control ,Computer Science Applications ,multiagent systems ,Control and Systems Engineering ,Position (vector) ,Convergence (routing) ,Affine transformation ,Electrical and Electronic Engineering ,Convergence ,Manifolds ,Force - Abstract
This paper studies the multi-agent control problem for affine, rigid, and translational formation, with the aim of developing a unified distributed control strategy for global and finite-time convergence. Global stabilization of rigid formation in arbitrary dimensional spaces still remains open and challenging. This paper provides a general solution to it based on the sliding mode control idea. The control law design consists of two parts: the main control force regulates the trajectories of all agents to reach a sliding surface defined by an affine formation space in finite time and remain in it thereafter; the extra control force governs certain chosen leader agents towards the desired formation in the sliding surface. The paper then presents in detail two approaches for designing the extra control force, one based on distance constraints and the other based on relative position constraints. For the first time, the proposed sliding mode formation control laws solve the open problem of (almost) global and finite-time stabilization of affine, rigid and translational formations in any dimensional space.
- Published
- 2022
42. Symplectic and inverse spectral geometry of integrable systems: A glimpse and open problems.
- Author
-
Pelayo, Álvaro
- Subjects
- *
HAMILTONIAN systems , *SYSTEM dynamics , *SYMPLECTIC geometry , *SYMPLECTIC manifolds , *TOPOLOGY , *SPECTRAL geometry , *GEOMETRY - Abstract
We first give a glimpse of finite dimensional classical integrable Hamiltonian systems from the point of view of symplectic geometry and briefly discuss their quantum counterparts, with an emphasis on recent progress on inverse spectral geometry. Then we propose several open problems about the geometry, topology and dynamics of these systems. The problems are largely motivated by the works of a number of authors, including Arnold, Atiyah, Colin de Verdière, Delzant, Duistermaat, Eliasson, Fomenko, Guillemin, Kolmogorov, Kostant, Moser and Sternberg. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Some notes on monotone set-valued measures and Egoroff's theorem
- Author
-
Jun Li
- Subjects
Set (abstract data type) ,Discrete mathematics ,Lemma (mathematics) ,Monotone polygon ,Artificial Intelligence ,Logic ,Open problem ,Fuzzy set ,Point (geometry) ,Topological space ,Mathematical proof ,Mathematics - Abstract
In this note, we point out that Theorem 3 (a version of Egoroff's theorem for monotone set-valued measures) shown in the paper “Lusin's theorem for monotone set-valued measures on topological spaces” (Fuzzy Sets and Systems 364 (2019) 111-123) is not valid, and we present two revised versions. We also point out that the proofs of Lemma 2 and Theorem 1 are defective, thus the truth of their conclusions cannot be affirmed. Thereby, an open problem for the characteristics of monotone measures is raised.
- Published
- 2022
- Full Text
- View/download PDF
44. The evolution of the structure of ABC-minimal trees
- Author
-
Bojan Mohar, Mohammad Ahmadi, and Seyyed Aliasghar Hosseini
- Subjects
Degree (graph theory) ,Mathematical chemistry ,Open problem ,0211 other engineering and technologies ,Structure (category theory) ,Order (ring theory) ,021107 urban & regional planning ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,FOS: Mathematics ,Mathematics - Combinatorics ,Discrete Mathematics and Combinatorics ,Combinatorics (math.CO) ,Tree (set theory) ,Mathematics - Abstract
The atom-bond connectivity (ABC) index is a degree-based molecular descriptor that found diverse chemical applications. Characterizing trees with minimum ABC-index remained an elusive open problem even after serious attempts and is considered by some as one of the most intriguing open problems in mathematical chemistry. In this paper, we describe the exact structure of the extremal trees with sufficiently many vertices and we show how their structure evolves when the number of vertices grows. An interesting fact is that their radius is at most 5 and that all vertices except for one have degree at most 54. In fact, all but at most O ( 1 ) vertices have degree 1, 2, 4, or 53. Let γ n = min { ABC ( T ) : T is a tree of order n } . It is shown that γ n = 1 365 1 53 ( 1 + 26 55 + 156 106 ) n + O ( 1 ) ≈ 0.67737178 n + O ( 1 ) .
- Published
- 2022
- Full Text
- View/download PDF
45. The power graph of a torsion-free group of nilpotency class 2
- Author
-
Samir Zahirović
- Subjects
Vertex (graph theory) ,Algebra and Number Theory ,Group (mathematics) ,Open problem ,010102 general mathematics ,0102 computer and information sciences ,01 natural sciences ,Combinatorics ,010201 computation theory & mathematics ,Simple (abstract algebra) ,Free group ,Torsion (algebra) ,Discrete Mathematics and Combinatorics ,Isomorphism ,0101 mathematics ,Nilpotent group ,Mathematics - Abstract
The directed power graph $$\vec {\mathcal {G}}( G)$$ of a group G is the simple digraph with vertex set G in which $$x\rightarrow y$$ if y is a power of x, and the power graph is the underlying simple graph $$\mathcal {G}( G)$$ . In this paper, three versions of the definition of the power graph are discussed, and it is proved that the power graph by any of the three versions of the definition determines the other two up to isomorphism. It is also proved that if G is a torsion-free group of nilpotency class 2 and if H is a group such that $$\mathcal {G}( H)\cong \mathcal {G}( G)$$ , then G and H have isomorphic directed power graphs, which was an open problem proposed by Cameron, Guerra and Jurina [9].
- Published
- 2022
46. Uninorms on bounded lattices constructed by t-norms and t-subconorms
- Author
-
Xiu-juan Hua and Wei Ji
- Subjects
0209 industrial biotechnology ,Pure mathematics ,020901 industrial engineering & automation ,Artificial Intelligence ,Logic ,Bounded function ,Open problem ,0202 electrical engineering, electronic engineering, information engineering ,Structure (category theory) ,020201 artificial intelligence & image processing ,02 engineering and technology ,Element (category theory) ,Mathematics - Abstract
The construction of uninorms on bounded lattices has been a attractive research area. In this paper, we introduce some new classes of uninorms on bounded lattices via t-subnorms and t-subconorms with a neutral element e under some constraints. We also give some illustrative examples to help understand the structure of these new uninorms. Moreover, we provide an answer to the open problem raised by Cayli in 2019. Finally, the differences between our methods and existing approaches are assessed.
- Published
- 2022
- Full Text
- View/download PDF
47. On the uniqueness and monotonicity of solutions of free boundary problems
- Author
-
Daniele Bartolucci and Aleks Jevnikar
- Subjects
Monotonicity ,Pure mathematics ,35B32, 35J20, 35J61, 35Q99, 35R35, 76X05 ,Applied Mathematics ,Open problem ,Free boundary problem ,Boundary (topology) ,Monotonic function ,Domain (mathematical analysis) ,Bifurcation analysis ,Uniqueness ,Sobolev space ,Mathematics - Analysis of PDEs ,Bounded function ,Settore MAT/05 ,Ball (mathematics) ,Analysis ,Mathematics - Abstract
For any $\Omega\subset \mathbb{R}^N$ smooth and bounded domain, we prove uniqueness of positive solutions of free boundary problems arising in plasma physics on $\Omega$ in a neat interval depending only by the best constant of the Sobolev embedding $H^{1}_0(\Omega)\hookrightarrow L^{2p}(\Omega)$, $p\in [1,\frac{N}{N-2})$ and show that the boundary density and a suitably defined energy share a universal monotonic behavior. At least to our knowledge, for $p>1$, this is the first result about the uniqueness for a domain which is not a two-dimensional ball and in particular the very first result about the monotonicity of solutions, which seems to be new even for $p=1$. The threshold, which is sharp for $p=1$, yields a new condition which guarantees that there is no free boundary inside $\Omega$. As a corollary, in the same range, we solve a long-standing open problem (dating back to the work of Berestycki-Brezis in 1980) about the uniqueness of variational solutions. Moreover, on a two-dimensional ball we describe the full branch of positive solutions, that is, we prove the monotonicity along the curve of positive solutions until the boundary density vanishes., Comment: 29 pages
- Published
- 2022
- Full Text
- View/download PDF
48. The Big Match with a Clock and a Bit of Memory
- Author
-
Hansen, Kristoffer Arnsfelt, Ibsen-Jensen, Rasmus, Neyman, Abraham, Machinery, Assoc Comp, Tardos, Éva, Elkind, Edith, and Vohra, Rakesh
- Subjects
bounded memory ,Computer science ,General Mathematics ,Open problem ,Markov strategies ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,Management Science and Operations Research ,Computer Science Applications ,Past history ,Bit (horse) ,0502 economics and business ,050206 economic theory ,Point (geometry) ,stochastic games ,050207 economics ,Arithmetic - Abstract
The Big Match is a multistage two-player game. In each stage, player 1 hides one or two pebbles in his hand, and his opponent has to guess that number. Player 1 loses a point if player 2 is correct; otherwise, he wins a point. As soon as player 1 hides one pebble, the players cannot change their choices in any future stage. The undiscounted Big Match has been much-studied. Blackwell and Ferguson (1968) give an [Formula: see text]-optimal strategy for player 1 that hides, in each stage, one pebble with a probability that depends on the entire past history. Any strategy that depends on just the clock or just a finite memory is worthless (i.e., cannot guarantee strictly more than the least reward). The long-standing natural open problem has been whether every strategy that depends on just the clock and a finite memory is worthless. The present paper proves that there is such a strategy that is [Formula: see text]-optimal. In fact, we show that just two states of memory are sufficient.
- Published
- 2023
- Full Text
- View/download PDF
49. Unary NP-hardness of preemptive scheduling to minimize total completion time with release times and deadlines
- Author
-
Rubing Chen and Jinjiang Yuan
- Subjects
Mathematical optimization ,Unary operation ,Applied Mathematics ,Open problem ,Preemption ,Discrete Mathematics and Combinatorics ,Binary number ,Completion time ,Computer Science::Operating Systems ,Mathematics - Abstract
We revisit the single-machine preemptive scheduling problem to minimize total completion time with release times and deadlines. Du and Leung (1993) showed that the problem is binary NP-hard. But the exact complexity (unary NP-hardness or pseudo-polynomial-time solvability) of the problem is a long standing open problem. We show in this paper that the problem is unary NP-hard.
- Published
- 2021
- Full Text
- View/download PDF
50. Computation of the normal form as well as the unfolding of the vector field with zero-zero-Hopf bifurcation at the origin
- Author
-
Junting Gou, Yibo Xia, Qinsheng Bi, and Miao Xue
- Subjects
Topological property ,Equilibrium point ,Hopf bifurcation ,Numerical Analysis ,General Computer Science ,Applied Mathematics ,Open problem ,Mathematical analysis ,010103 numerical & computational mathematics ,02 engineering and technology ,01 natural sciences ,Manifold ,Theoretical Computer Science ,symbols.namesake ,Bifurcation theory ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,020201 artificial intelligence & image processing ,Vector field ,0101 mathematics ,Bifurcation ,Mathematics - Abstract
The normal forms of the vector fields with local bifurcations at the equilibrium points can be employed to describe the topological structure in the neighborhood of the critical points. Furthermore, the relationship between the coefficients of the normal form and the original system is very important to understand the behaviors of the practical dynamics. Though many results related to low co-dimensional local bifurcations are presented, the normal forms as well as the computation with high co-dimensional local bifurcations still remain an open problem to be investigated. The main purpose of this paper is to derive the normal form of a vector field with codimension-3 zero-zero-Hopf bifurcation at the origin and develop an uniform program to compute the coefficients of the normal form from a general system. By employing the central manifold theory and the normal form theory, all the expressions of the coefficients of the nonlinear transformations and the normal form up to any desired order related to the local bifurcation are presented, which can be computed via a software program based on the symbolic language Maple, attached in the appendix. Perturbation of the vector field at the bifurcation point can also be derived accordingly, which can be used to explore the topological property of the bifurcation.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.