scholarly journals Simple eigenvalues and bifurcation for a multiparameter problem

1988 ◽  
Vol 31 (1) ◽  
pp. 77-88 ◽  
Author(s):  
D. F. McGhee ◽  
M. H. Sallam

We are concerned with the problem of bifurcation of solutions of a non-linear multiparameter problem at a simple eigenvalue of the linearised problem.Let X and Y be real Banach spaces, and let A, Bi, i = 1, …, n∈B(X, Y). Let : Rn × X → Y be a non-linear mapping. We consider the equationwhereand λ=(λ1, λ2,…,λn) ∈ Rn is an n-tuple of spectral parameters.

2014 ◽  
Vol 57 (3) ◽  
pp. 709-718 ◽  
Author(s):  
ABDELLATIF BOURHIM ◽  
JAVAD MASHREGHI

AbstractLet X and Y be infinite-dimensional complex Banach spaces, and ${\mathcal B}$(X) (resp. ${\mathcal B}$(Y)) be the algebra of all bounded linear operators on X (resp. on Y). For an operator T ∈ ${\mathcal B}$(X) and a vector x ∈ X, let σT(x) denote the local spectrum of T at x. For two nonzero vectors x0 ∈X and y0 ∈ Y, we show that a map ϕ from ${\mathcal B}$(X) onto ${\mathcal B}$(Y) satisfies $ \sigma_{\varphi(T)\varphi(S)}(y_0)~=~\sigma_{TS}(x_0),~(T,~S\in{\mathcal B}(X)), $ if and only if there exists a bijective bounded linear mapping A from X into Y such that Ax0 = y0 and either ϕ(T) = ATA−1 or ϕ(T) = -ATA−1 for all T ∈ ${\mathcal B}$(X).


Author(s):  
Dongni Tan ◽  
Xujian Huang

Abstract We say that a map $f$ from a Banach space $X$ to another Banach space $Y$ is a phase-isometry if the equality \[ \{\|f(x)+f(y)\|, \|f(x)-f(y)\|\}=\{\|x+y\|, \|x-y\|\} \] holds for all $x,\,y\in X$ . A Banach space $X$ is said to have the Wigner property if for any Banach space $Y$ and every surjective phase-isometry $f : X\rightarrow Y$ , there exists a phase function $\varepsilon : X \rightarrow \{-1,\,1\}$ such that $\varepsilon \cdot f$ is a linear isometry. We present some basic properties of phase-isometries between two real Banach spaces. These enable us to show that all finite-dimensional polyhedral Banach spaces and CL-spaces possess the Wigner property.


2014 ◽  
Vol 44 (5) ◽  
pp. 1529-1583 ◽  
Author(s):  
G. Godefroy ◽  
G. Lancien ◽  
V. Zizler

Filomat ◽  
2020 ◽  
Vol 34 (13) ◽  
pp. 4311-4328
Author(s):  
A.R. Sharifi ◽  
Azadi Kenary ◽  
B. Yousefi ◽  
R. Soltani

The main goal of this paper is study of the Hyers-Ulam-Rassias stability (briefly HUR-approximation) of the following Euler-Lagrange type additive(briefly ELTA) functional equation ?nj=1f (1/2 ?1?i?n,i?j rixi- 1/2 rjxj) + ?ni=1 rif(xi)=nf (1/2 ?ni=1 rixi) where r1,..., rn ? R, ?ni=k rk?0, and ri,rj?0 for some 1? i < j ? n, in fuzzy normed spaces. The concept of HUR-approximation originated from Th. M. Rassias stability theorem that appeared in his paper: On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297-300.


1963 ◽  
Vol 14 (1) ◽  
pp. 75-104 ◽  
Author(s):  
G. J. Hancock

SummaryThe validity and applicability of the static margin (stick fixed) Kn,where as defined by Gates and Lyon is shown to be restricted to the conventional flexible aircraft. Alternative suggestions for the definition of static margin are put forward which can be equally applied to the conventional flexible aircraft of the past and the integrated flexible aircraft of the future. Calculations have been carried out on simple slender plate models with both linear and non-linear aerodynamic forces to assess their static stability characteristics.


2018 ◽  
Vol 12 (4) ◽  
pp. 241-259
Author(s):  
Avik Chakraborti ◽  
Nilanjan Datta ◽  
Mridul Nandi

Abstract A block is an n-bit string, and a (possibly keyed) block-function is a non-linear mapping that maps one block to another, e.g., a block-cipher. In this paper, we consider various symmetric key primitives with {\ell} block inputs and raise the following question: what is the minimum number of block-function invocations required for a mode to be secure? We begin with encryption modes that generate {\ell^{\prime}} block outputs and show that at least {(\ell+\ell^{\prime}-1)} block-function invocations are necessary to achieve the PRF security. In presence of a nonce, the requirement of block-functions reduces to {\ell^{\prime}} blocks only. If {\ell=\ell^{\prime}} , in order to achieve SPRP security, the mode requires at least {2\ell} many block-function invocations. We next consider length preserving r-block (called chunk) online encryption modes and show that, to achieve online PRP security, each chunk should have at least {2r-1} many and overall at least {2r\ell-1} many block-functions for {\ell} many chunks. Moreover, we show that it can achieve online SPRP security if each chunk contains at least {2r} non-linear block-functions. We next analyze affine MAC modes and show that an integrity-secure affine MAC mode requires at least {\ell} many block-function invocations to process an {\ell} block message. Finally, we consider affine mode authenticated encryption and show that in order to achieve INT-RUP security or integrity security under a nonce-misuse scenario, either (i) the number of non-linear block-functions required to generate the ciphertext is more than {\ell} or (ii) the number of extra non-linear block-functions required to generate the tag depends on {\ell} .


1980 ◽  
Vol 32 (4) ◽  
pp. 957-968 ◽  
Author(s):  
G. H. Chan ◽  
M. H. Lim

Let U be a k-dimensional vector space over the complex numbers. Let ⊗m U denote the mth tensor power of U where m ≧ 2. For each permutation σ in the symmetric group Sm, there exists a linear mapping P(σ) on ⊗mU such thatfor all x1, …, xm in U.Let G be a subgroup of Sm and λ an irreducible (complex) character on G. The symmetrizeris a projection of ⊗ mU. Its range is denoted by Uλm(G) or simply Uλ(G) and is called the symmetry class of tensors corresponding to G and λ.


1969 ◽  
Vol 16 (3) ◽  
pp. 227-232 ◽  
Author(s):  
J. C. Alexander

In (4) Vala proves a generalization of Schauder's theorem (3) on the compactness of the adjoint of a compact linear operator. The particular case of Vala's result that we shall be concerned with is as follows. Let t1 and t2 be non-zero bounded linear operators on the Banach spaces Y and X respectively, and denote by 1T2 the operator on B(X, Y) defined by


1986 ◽  
Vol 29 (3) ◽  
pp. 309-327 ◽  
Author(s):  
W. Lamb

In [8], Rooney defines a class of complex-valued functions ζ each of which is analytic in a vertical strip α(ζ)< Res < β(ζ) in the complex s-plane and satisfies certain growth conditions as |Im s| →∞ along fixed lines Re s = c lying within this strip. These conditions mean that the functionsfulfil the requirements of the one-dimensional Mihlin-Hörmander theorem (see [6, p. 417]) and so can be regarded as Fourier multipliers for the Banach spaces . Consequently, each function gives rise to a family of bounded operators W[ζ,σ] σ ∈(α(ζ),β(ζ)), on , 1<p<∞.


1899 ◽  
Vol 22 ◽  
pp. 539-542
Author(s):  
Thomas Muir

(1) As is well known, the simplest form of alternant isand the problem of multiplying it by any symmetric function of a, b, c, d, … has been in a manner fully solved.(2) When the symmetric function is linear in each of the variables—that is to say, when it takes any of the forms Σa, Σab, Σabc, ….—the result is an alternant got from the multiplicand by increasing the last index, the last two indices, the last three indices, …. respectively by 1. Thus, writing for shortness' sake five variables only, we haveThis was first established in 1825 by Schweins in his Theorie der Differenzen und Differentiale, p. 378; but it is also barely possible that it was known to Prony in 1795 (see Journ. de l'Ec. Polyt., i. pp. 264, 265), and Cauchy in 1812 (see Journ. de l'Ec. Polyt., x. pp. 49, 50).(3) When the symmetric function is non-linear, the result takes the form not of one alternant, but of an aggregate of alternants. These cannot be so readily specified, but the mode of obtaining them can be made clear without any difficulty. Let us take the case of the function Σa3b the multiplicand being ∣a0b1c2d3∣.


Sign in / Sign up

Export Citation Format

Share Document