首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Skew Dyck paths     
In this paper we study the class SS of skew Dyck paths, i.e. of those lattice paths that are in the first quadrant, begin at the origin, end on the x-axis, consist of up steps  U=(1,1)U=(1,1), down steps  D=(1,-1)D=(1,-1), and left steps  L=(−1,-1)L=(1,-1), and such that up steps never overlap with left steps. In particular, we show that these paths are equinumerous with several other combinatorial objects, we describe some involutions on this class, and finally we consider several statistics on SS.  相似文献   

2.
Skew Dyck paths are a generalization of ordinary Dyck paths, defined as paths using up steps  U=(1,1)U=(1,1), down steps  D=(1,-1)D=(1,-1), and left steps  L=(−1,-1)L=(1,-1), starting and ending on the x-axis, never going below it, and so that up and left steps never overlap. In this paper we study the class of these paths according to their area, extending several results holding for Dyck paths. Then we study the class of superdiagonal bargraphs, which can be naturally defined starting from skew Dyck paths.  相似文献   

3.
4.
Using special iterated function systems (IFS) Fredricks et al. (2005) constructed two-dimensional copulas with fractal supports and showed that for every s∈(1,2)s(1,2) there exists a copula A whose support has Hausdorff dimension s. In the current paper we present a stronger version and prove that the same result holds for the subclass of idempotent copulas. Additionally we show that every doubly stochastic idempotent matrix N (having neither minimum nor maximum rank) induces a family of idempotent copulas such that, firstly, the corresponding Markov kernels transform according to N   and, secondly, the set of Hausdorff dimensions of the supports of elements of the family covers (1,2). Furthermore we generalize the IFS approach to arbitrary dimensions d≥2d2 and show that for every s∈(1,d)s(1,d) we can find a d-dimensional copula whose support has Hausdorff dimension s.  相似文献   

5.
In Hedayat and Pesotan [1992, Two-level factorial designs for main effects and selected two-factor interactions. Statist. Sinica 2, 453–464.] the concepts of a g(n,e)g(n,e)-design and a g(n,e)g(n,e)-matrix are introduced to study designs of nn factor two-level experiments which can unbiasedly estimate the mean, the nn main effects and ee specified two-factor interactions appearing in an orthogonal polynomial model and it is observed that the construction of a g-design is equivalent to the construction of a g  -matrix. This paper deals with the construction of D-optimal g(n,1)g(n,1)-matrices. A standard form for a g(n,1)g(n,1)-matrix is introduced and some lower and upper bounds on the absolute determinant value of a D-optimal g(n,1)g(n,1)-matrix in the class of all g(n,1)g(n,1)-matrices are obtained and an approach to construct D-optimal g(n,1)g(n,1)-matrices is given for 2?n?82?n?8. For two specific subclasses, namely a certain class of g(n,1)g(n,1)-matrices within the class of g(n,1)g(n,1)-matrices of index one and the class C(H)C(H) of g(8t+2,1)g(8t+2,1)-matrices constructed from a normalized Hadamard matrix H   of order 8t+4(t?1)8t+4(t?1) two techniques for the construction of the restricted D-optimal matrices are given.  相似文献   

6.
7.
8.
In this paper, we investigate the estimation problem of the mixture proportion λλ in a nonparametric mixture model of the form λF(x)+(1-λ)G(x)λF(x)+(1-λ)G(x) using the minimum Hellinger distance approach, where F and G are two unknown distributions. We assume that data from the distributions F and G   as well as from the mixture distribution λF+(1-λ)GλF+(1-λ)G are available. We construct a minimum Hellinger distance estimator of λλ and study its asymptotic properties. The proposed estimator is chosen to minimize the Hellinger distance between a parametric mixture model and a nonparametric density estimator. We also develop a maximum likelihood estimator of λλ. Theoretical properties such as the existence, strong consistency, asymptotic normality and asymptotic efficiency of the proposed estimators are investigated. Robustness properties of the proposed estimator are studied using a Monte Carlo study. Two real data examples are also analyzed.  相似文献   

9.
In the course of studying the moment sequence {nn:n=0,1,…}{nn:n=0,1,}, Eaton et al. [1971. On extreme stable laws and some applications. J. Appl. Probab. 8, 794–801] have shown that this sequence, which is, indeed, the moment sequence of a log-extreme stable law with characteristic exponent γ=1γ=1, corresponds to a scale mixture of exponential distributions and hence to a distribution with decreasing failure rate. Following essentially the approach of Shanbhag et al. [1977. Some further results in infinite divisibility. Math. Proc. Cambridge Philos. Soc. 82, 289–295] we show that, under certain conditions, log-extreme stable laws with characteristic exponent γ∈[1,2)γ[1,2) are scale mixtures of exponential distributions and hence are infinitely divisible and have decreasing failure rates. In addition, we study the moment problem associated with the log-extreme stable laws with characteristic exponent γ∈(0,2]γ(0,2] and throw further light on the existing literature on the subject. As a by-product, we show that generalized Poisson and generalized negative binomial distributions are mixed Poisson distributions. Finally, we address some relevant questions on structural aspects of infinitely divisible distributions, and make new observations, including in particular that certain results appearing in Steutel and van Harn [2004. Infinite Divisibility of Probability Distributions on the Real Line. Marcel Dekker, New York] have links with the Wiener–Hopf factorization met in the theory of random walk.  相似文献   

10.
The problem of classifying all isomorphism classes of OA(N,k,s,t)OA(N,k,s,t)'s is shown to be equivalent to finding all isomorphism classes of non-negative integer solutions to a system of linear equations under the symmetry group of the system of equations. A branch-and-cut algorithm developed by Margot [2002. Pruning by isomorphism in branch-and-cut. Math. Programming Ser. A 94, 71–90; 2003a. Exploiting orbits in symmetric ILP. Math. Programming Ser. B 98, 3–21; 2003b. Small covering designs by branch-and-cut. Math. Programming Ser. B 94, 207–220; 2007. Symmetric ILP: coloring and small integers. Discrete Optim., 4, 40–62] for solving integer programming problems with large symmetry groups is used to find all non-isomorphic OA(24,7,2,2)OA(24,7,2,2)'s, OA(24,k,2,3)OA(24,k,2,3)'s for 6?k?116?k?11, OA(32,k,2,3)OA(32,k,2,3)'s for 6?k?116?k?11, OA(40,k,2,3)OA(40,k,2,3)'s for 6?k?106?k?10, OA(48,k,2,3)OA(48,k,2,3)'s for 6?k?86?k?8, OA(56,k,2,3)OA(56,k,2,3)'s, OA(80,k,2,4)OA(80,k,2,4)'s, OA(112,k,2,4)OA(112,k,2,4)'s, for k=6,7k=6,7, OA(64,k,2,4)OA(64,k,2,4)'s, OA(96,k,2,4)OA(96,k,2,4)'s for k=7,8k=7,8, and OA(144,k,2,4)OA(144,k,2,4)'s for k=8,9k=8,9. Further applications to classifying covering arrays with the minimum number of runs and packing arrays with the maximum number of runs are presented.  相似文献   

11.
12.
In this paper, we study Lebesgue densities on (0,∞)d(0,)d that are non-increasing in each coordinate, while keeping all other coordinates fixed, from the perspective of local asymptotic minimax lower bound theory. In particular, we establish a local optimal rate of convergence of the order n−1/(d+2)n1/(d+2).  相似文献   

13.
We consider the problem of estimating the mean θθ of an Np(θ,Ip)Np(θ,Ip) distribution with squared error loss ∥δ−θ∥2δθ2 and under the constraint ∥θ∥≤mθm, for some constant m>0m>0. Using Stein's identity to obtain unbiased estimates of risk, Karlin's sign change arguments, and conditional risk analysis, we compare the risk performance of truncated linear estimators with that of the maximum likelihood estimator δmleδmle. We obtain for fixed (m,p)(m,p) sufficient conditions for dominance. An asymptotic framework is developed, where we demonstrate that the truncated linear minimax estimator dominates δmleδmle, and where we obtain simple and accurate measures of relative improvement in risk. Numerical evaluations illustrate the effectiveness of the asymptotic framework for approximating the risks for moderate or large values of p.  相似文献   

14.
Super-simple cyclic designs are useful on constructing codes and designs such as superimposed codes, perfect hash families and optical orthogonal codes with index two. In this paper, we show that there exists a super-simple cyclic (v,4,λ)(v,4,λ) for 7?v?417?v?41 and all admissible λλ with two definite exceptions of (v,λ)=(9,3),(13,5)(v,λ)=(9,3),(13,5) and one possible exception of (v,λ)=(39,18)(v,λ)=(39,18). Some useful algorithms are explained for computer search and new designs are displayed.  相似文献   

15.
16.
Let (X, Y  ) be a Rd×R-valuedRd×R-valued random vector. In regression analysis one wants to estimate the regression function m(x)?E(Y|X=x)m(x)?E(Y|X=x) from a data set. In this paper we consider the rate of convergence for the k-nearest neighbor estimators in case that X   is uniformly distributed on [0,1]d[0,1]d, Var(Y|X=x)Var(Y|X=x) is bounded, and m is (p, C)-smooth. It is an open problem whether the optimal rate can be achieved by a k  -nearest neighbor estimator for 1<p≤1.51<p1.5. We solve the problem affirmatively. This is the main result of this paper. Throughout this paper, we assume that the data is independent and identically distributed and as an error criterion we use the expected L2 error.  相似文献   

17.
A ridge function with shape function g   in the horizontal direction is a function of the form g(x)h(y,0)g(x)h(y,0). Along each horizontal line it has the shape g(x)g(x), multiplied by a function h(y,0)h(y,0) which depends on the y-value of the horizontal line. Similarly a ridge function with shape function g   in the vertical direction has the form g(y)h(x,π/2)g(y)h(x,π/2). For a given shape function g it may or may not be possible to represent an arbitrary   function f(x,y)f(x,y) as a superposition over all angles of a ridge function with shape g   in each direction, where h=hf=hf,gh=hf=hf,g depends on the functions f and g   and also on the direction, θ:h=hf,g(·,θ)θ:h=hf,g(·,θ). We show that if g   is Gaussian centered at zero then this is always possible and we give the function hf,ghf,g for a given f(x,y)f(x,y). For highpass or for odd shapes g  , we show it is impossible to represent an arbitrary f(x,y)f(x,y), i.e. in general there is no hf,ghf,g. Note that our problem is similar to tomography, where the problem is to invert the Radon transform, except that the use of the word inversion is here somewhat “inverted”: in tomography f(x,y)f(x,y) is unknown and we find it by inverting the projections of f  ; here, f(x,y)f(x,y) is known, g(z)g(z) is known, and hf(·,θ)=hf,g(·,θ)hf(·,θ)=hf,g(·,θ) is the unknown.  相似文献   

18.
EE-optimal designs for comparing three treatments in blocks of size three are identified, where intrablock observations are correlated according to a first order autoregressive error process with parameter ρ∈(0,1)ρ(0,1). For number of blocks b   of the form b=3n+1b=3n+1, there are two distinct optimal designs depending on the value of ρρ, with the best design being unequally replicated for large ρρ. For other values of bb, binary, equireplicate designs with specified within-block assignment patterns are best. In many cases, the stronger majorization optimality is established.  相似文献   

19.
20.
We present a combinatorial proof of two fundamental composition identities associated with Chebyshev polynomials. Namely, for all m,n?0m,n?0, Tm(Tn(x))=Tmn(x)Tm(Tn(x))=Tmn(x) and Um1(Tn(x))Un1(x)=Umn1(x).Um1(Tn(x))Un1(x)=Umn1(x).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号