scholarly journals Scaling limits of the three-dimensional uniform spanning tree and associated random walk

2021 ◽  
Vol 49 (6) ◽  
Author(s):  
O. Angel ◽  
D. A. Croydon ◽  
S. Hernandez-Torres ◽  
D. Shiraishi
2007 ◽  
Vol 42 (4) ◽  
pp. 303-310 ◽  
Author(s):  
Zhi Chen ◽  
Lin Zhao ◽  
Kenneth Lee ◽  
Charles Hannath

Abstract There has been a growing interest in assessing the risks to the marine environment from produced water discharges. This study describes the development of a numerical approach, POM-RW, based on an integration of the Princeton Ocean Model (POM) and a Random Walk (RW) simulation of pollutant transport. Specifically, the POM is employed to simulate local ocean currents. It provides three-dimensional hydrodynamic input to a Random Walk model focused on the dispersion of toxic components within the produced water stream on a regional spatial scale. Model development and field validation of the predicted current field and pollutant concentrations were conducted in conjunction with a water quality and ecological monitoring program for an offshore facility located on the Grand Banks of Canada. Results indicate that the POM-RW approach is useful to address environmental risks associated with the produced water discharges.


2011 ◽  
Vol 90-93 ◽  
pp. 3277-3282 ◽  
Author(s):  
Bai Chao Wu ◽  
Ai Ping Tang ◽  
Lian Fa Wang

The foundation ofdelaunay triangulationandconstrained delaunay triangulationis the basis of three dimensional geographical information system which is one of hot issues of the contemporary era; moreover it is widely applied in finite element methods, terrain modeling and object reconstruction, euclidean minimum spanning tree and other applications. An algorithm for generatingconstrained delaunay triangulationin two dimensional planes is presented. The algorithm permits constrained edges and polygons (possibly with holes) to be specified in the triangulations, and describes some data structures related to constrained edges and polygons. In order to maintain the delaunay criterion largely,some new incremental points are added onto the constrained ones. After the data set is preprocessed, the foundation ofconstrained delaunay triangulationis showed as follows: firstly, the constrained edges and polygons generate initial triangulations,then the remained points completes the triangulation . Some pseudo-codes involved in the algorithm are provided. Finally, some conclusions and further studies are given.


2018 ◽  
Vol 173 (3-4) ◽  
pp. 502-545
Author(s):  
Jan Hladký ◽  
Asaf Nachmias ◽  
Tuan Tran

2006 ◽  
Vol 59 (12) ◽  
pp. 869 ◽  
Author(s):  
Hideaki Suzuki

Network artificial chemistry (NAC) uses a mathematical graph to emulate molecular interaction in a solvent. To emulate molecules' movement in a three-dimensional space, rewiring rules for NAC graphs’ edges must be designed to enable the edges to imitate the relations between molecules or atomic clusters. Our research formulated the ‘network energy’ representing this constraint and rewired the NAC graph to minimize the required energy. Experimental results for the NAC rewiring are compared with a hard-sphere random walk simulation.


1999 ◽  
Vol 42 (3) ◽  
pp. 611-620
Author(s):  
Steven N. Evans

A sequential construction of a random spanning tree for the Cayley graph of a finitely generated, countably infinite subsemigroup V of a group G is considered. At stage n, the spanning tree T isapproximated by a finite tree Tn rooted at the identity.The approximation Tn+1 is obtained by connecting edges to the points of V that are not already vertices of Tn but can be obtained from vertices of Tn via multiplication by a random walk step taking values in the generating set of V. This construction leads to a compactification of the semigroup V inwhich a sequence of elements of V that is not eventually constant is convergent if the random geodesic through the spanning tree T that joins the identity to the nth element of the sequence converges in distribution as n→∞. The compactification is identified in a number of examples. Also, it is shown that if h(Tn) and #(Tn) denote, respectively, the height and size of the approximating tree Tn, then there are constants 0<ch≤1 and 0≥c# ≤log2 such that limn→∞ n–1 h(Tn)= ch and limn→∞n–1 log# (Tn)= c# almost surely.


Sign in / Sign up

Export Citation Format

Share Document