More On Embedding an Affine Space in a Vector Space
ثبت نشده
چکیده
for all a1 . . . , am ∈ E, all v1, . . . , vm ∈ −→E , and all λ1, . . . , λm ∈ R. Furthermore, for λi = 0, 1 ≤ i ≤ m, we have f̂(v1 +̂ λ1a1, . . . , vm +̂ λmam) = λ1 · · ·λmf(a1 + λ−1 1 v1, . . . , am + λ−1 m vm). Proof . Let us assume that f̂ exists. We first prove by induction on k, 1 ≤ k ≤ m, that f̂(a1, . . . , vi1 , . . . , vik , . . . , am) = fS(vi1 , . . . , vik), for every S ⊆ {1, . . . ,m}, such that S = {i1, . . . , ik} and k = |S|, for all a1 . . . , am ∈ E, and all v1, . . . , vm ∈ −→ E . For k = 1, assuming for simplicity of notation that i1 = 1, for any a1 ∈ E, since f̂ is m-linear, we have f̂(a1 + v1, a2, . . . , am) = f̂(a1, a2, . . . , am) + f̂(v1, a2, . . . , am),
منابع مشابه
Intrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملModel Based Method for Determining the Minimum Embedding Dimension from Solar Activity Chaotic Time Series
Predicting future behavior of chaotic time series system is a challenging area in the literature of nonlinear systems. The prediction's accuracy of chaotic time series is extremely dependent on the model and the learning algorithm. On the other hand the cyclic solar activity as one of the natural chaotic systems has significant effects on earth, climate, satellites and space missions. Several m...
متن کاملSecond dual space of little $alpha$-Lipschitz vector-valued operator algebras
Let $(X,d)$ be an infinite compact metric space, let $(B,parallel . parallel)$ be a unital Banach space, and take $alpha in (0,1).$ In this work, at first we define the big and little $alpha$-Lipschitz vector-valued (B-valued) operator algebras, and consider the little $alpha$-lipschitz $B$-valued operator algebra, $lip_{alpha}(X,B)$. Then we characterize its second dual space.
متن کاملState spaces of $K_0$ groups of some rings
Let $R$ be a ring with the Jacobson radical $J(R)$ and let $picolon Rto R/J(R)$ be the canonical map. Then $pi$ induces an order preserving group homomorphism $K_0picolon K_0(R)to K_0(R/J(R))$ and an affine continuous map $S(K_0pi)$ between the state space $St(R/J(R))$ and the state space $St(R).$ In this paper, we consider the natural affine map $S(K_0pi).$ We give a condition ...
متن کاملEmbedding of a 2D Graphene System in Non-Commutative Space
The BFT approach is used to formulate the electronic states in graphene through a non-commutative space in the presence of a constant magnetic field B for the first time. In this regard, we introduce a second class of constrained system, which is not gauge symmetric but by applying BFT method and extending phase space, the second class constraints converts to the first class constraints so th...
متن کاملs-Topological vector spaces
In this paper, we have dened and studied a generalized form of topological vector spaces called s-topological vector spaces. s-topological vector spaces are dened by using semi-open sets and semi-continuity in the sense of Levine. Along with other results, it is proved that every s-topological vector space is generalized homogeneous space. Every open subspace of an s-topological vector space is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008