Open Hengguanglidissertation.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Open Hengguanglidissertation.Pdf The Pennsylvania State University The Graduate School ELLIPTIC EQUATIONS WITH SINGULARITIES: A PRIORI ANALYSIS AND NUMERICAL APPROACHES A Dissertation in Mathematics by Hengguang Li c 2008 Hengguang Li Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2008 The dissertation of Hengguang Li was reviewed and approved∗ by the following: Victor Nistor Professor of Mathematics Dissertation Advisor, Chair of Committee Ludmil T. Zikatanov Professor of Mathematics Dissertation Advisor Jinchao Xu Distinguished Professor of Mathematics Anna L. Mazzucato Professor of Mathematics Corina S. Drapaca Professor of Engineering John Roe Professor of Mathematics Head of the Department of Mathematics ∗Signatures are on file in the Graduate School. Abstract Elliptic equations in a two- or three-dimensional bounded domain may have singu- lar solutions from the non-smoothness of the domain, changes of boundary condi- tions, and discontinuities, singularities of the coefficients. These singularities give rise to various difficulties in the theoretical analysis and in the development of nu- merical algorithms for these equations. On the other hand, most of the problems arising from physics, engineering, and other applications have singularities of this form. In addition, the study on these elliptic equations leads to good understand- ings of other types of PDEs and systems of PDEs. This research, therefore, is not only of theoretical interest, but also of practical importance. This dissertation includes a priori estimates (well-posedness, regularity, and Fredholm property) for these singular solutions of general elliptic equations in weighted Sobolev spaces, as well as effective finite element schemes and correspond- ing multigrid estimates. Applications of this theory to equations from physics and engineering will be mentioned at the end. This self-contained work develops systematic a priori estimates in weighted Sobolev spaces in detail. It establishes the well-posedness of these equations and proves the full regularity of singular solutions between suitable weighted spaces. Besides, the Fredholm property is discussed carefully with a calculation of the index. For the numerical methods for singular solutions, based on a priori analysis, this work constructs a sequence of finite element subspaces that recovers the optimal rate of convergence for the finite element solution. In order to efficiently solve the algebraic system of equations resulting from the finite element discretization on these finite subspaces, the method of subspace corrections and properties of weighted Sobolev spaces are used to prove the uniform convergence of the multigrid method for these singular solutions. To illustrate wide extensions of this theory, a Schr¨odinger operator with singular iii potentials and a degenerate operate from physics and engineering are studied in Chapter 6 and Chapter 7. It shows that similar a priori estimates and finite element algorithms work well for equations with a class of singular coefficients. The last chapter contains a brief summary of the dissertation and plans for possible work in the future. iv Table of Contents List of Figures viii List of Tables x List of Symbols xi Acknowledgments xii Chapter 1 Introduction 1 1.1 A Brief Review . 2 1.1.1 Singular Solutions of EBVPs . 2 1.1.2 Numerical Methods for Singular Solutions . 4 1.2 Contents . 5 1.3 Preliminaries and Notations . 7 1.3.1 Sobolev Spaces and the Weak Solution . 8 1.3.2 The Finite Element Method . 10 1.3.3 Multigrid (MG) Methods . 12 1.3.4 Corner Singularities . 15 Chapter 2 A Priori Estimates for Elliptic Operators on the Infinite Domain 18 2.1 The Mellin Transform . 18 2.2 A Priori Estimates . 20 2.2.1 The Infinite Domain . 20 2.2.2 The Weighted Sobolev Space . 29 2.3 Some Lemmas for Weighted Sobolev Spaces . 36 2.3.1 Notation . 36 v 2.3.2 Lemmas . 38 Chapter 3 A Priori Analysis in Weighted Sobolev Spaces 43 3.1 Formulation of the Problem and Main Results . 47 3.1.1 The Domain . 47 3.1.2 The Equation . 50 3.1.3 Estimates for Smooth Interfaces . 54 3.2 Estimates of Neumann Problems and Singular Transmission Problems 57 3.2.1 The Laplace Operator . 57 3.2.2 Transmission Problems . 62 3.3 Domains with a Polygonal Structure . 64 3.3.1 The Unfolded Boundary and Closure . 65 3.3.2 Domains with a Polygonal Structure . 66 3.3.3 Smooth Functions . 68 3.3.4 The Canonical Weight Function . 69 3.4 Properties of Sobolev Spaces with Weights . 71 3.4.1 Differential Operators . 72 3.4.2 Inhomogeneous Weighted Sobolev Spaces . 72 3.5 Proofs of the Three Main Theorems . 77 Chapter 4 The Finite Element Method for Singular Solutions 80 4.1 Analysis of the FEM . 80 4.1.1 Approximation Away from the Vertices . 81 4.1.2 Approximation Near the Vertices . 84 4.2 Numerical Tests . 89 4.2.1 Domains with Cracks and Neumann-Neumann Vertices . 91 4.2.2 Domains with Artificial Vertices . 93 4.2.3 Transmission Problems . 94 Chapter 5 The Multigrid Method on Graded Meshes 97 5.1 Preliminaries and Notation . 99 5.2 Weighted Sobolev Spaces and the Method of Subspace Corrections . 100 5.2.1 Weighted Sobolev Spaces and Graded Meshes . 100 5.2.2 The Method of Subspace Corrections . 101 5.3 Uniform Convergence of the MG Method on Graded Meshes . 106 5.4 Numerical Illustration . 113 vi Chapter 6 Application I: a Schr¨odingerType Operator 115 6.1 Weighted Sobolev Spaces . 120 6.2 The Well-posedness and Regularity of the Solution . 123 6.3 Estimates for the Finite Element Method . 128 6.3.1 Approximation Away from the Singular Set V . 129 6.3.2 Construction of the Finite Element Spaces . 131 6.4 Numerical Results . 137 Chapter 7 Application II: an Operator Degenerate on a Segment 142 m 7.1 Weighted Sobolev Spaces Ka . 145 7.1.1 Notation . 145 7.1.2 Lemmas . 147 7.2 The Well-posedness and Regularity of the Solution . 155 7.3 The Finite Element Method . 159 7.3.1 Estimate for the Interpolation . 160 7.3.2 Construction of the Mesh . 162 7.4 Numerical Results . 167 Chapter 8 Conclusions 172 8.1 Summary . 172 8.2 Future Work . 174 Bibliography 176 vii List of Figures 1.1 Domain Ω with a re-entrant vertex Q. 15 2.1 The infinite conical domain C with the vertex O at the origin. 19 2.2 The resulting domain D from the Mellin transform on the t-θ plane. 20 3.1 The domain Ω and the interface Γ . 44 3.2 Domain with two vertices touching a side. 48 3.3 Domain with ramified crack. 50 3.4 A vertex touching a smooth side. The picture actually represents uΩ. The map κ identifies X and Y ................... 68 4.1 One refinement of the triangle T with vertex Q, κ = l1=l2 . 85 4.2 Domain with crack: initial triangles (left); triangulation after one refinement, κ = 0:2 (right) . 91 4.3 Initial triangles for a Neumann-Neumann vertex Q (left); the tri- angulation after one refinement, κ = 0:2 (right). 92 4.4 The numerical solution for the mixed problem and a Neumann- Neumann vertex. 92 4.5 Domain with artificial vertex: initial triangles (left); triangulation after four refinements, κ = 0:2 (right). 94 4.6 The transmission problem: initial triangles (left); triangulation af- ter four refinements, κ = 0:2 (right). 95 4.7 The numerical solution for the transmission problem. 96 5.1 Initial triangles with vertex Q0 (left); layer D0 and D1 after one refinement (right), κ = 0:2. 107 5.2 Crack: initial triangulation (left) and the triangulation after one refinement (right), κ = 0:2. 113 6.1 One refinement of triangle T with vertex QI 2 M, κ = l1=l2. 133 6.2 Initial triangles for Ω^ (left); the mesh after four refinements , κ = 0:2 (right). 138 viii ^ 6.3 Initial triangles for Ω1 and boundary conditions (left); the mesh after one refinement , κ = 0:2 (right) . 139 7.1 Domain Ω and the position of X. 146 7.2 Initial mesh with three triangles(left); Triangulation after one re- finement N = 1; κ = 0:5 (right). 163 7.3 Initial mesh with three triangles (left); the mesh after one refine- ment κ = 0:2 (right). 169 7.4 The mesh after 5 levels of refinement for κ = 0:2. 169 ix List of Tables 4.1 Convergence history in the case of a crack domain. 92 4.2 Convergence history in the case of a Neumann-Neumann vertex. 93 4.3 Convergence history in the case of an artificial vertex. 94 4.4 Convergence history for the transmission problem . 96 5.1 Asymptotic convergence factors (rΩMG) for the MG V(1,1)-cycle applied to problem (5.6) with Gauss Seidel smoother . 114 6.1 Interior singularities . 141 6.2 Boundary singularities . 141 7.1 Convergence history. 170 x List of Symbols Ω A bounded polygonal domain in R2, possible with curved boundaries V The set of \vertices", containing geometric vertices and possible artificial vertices Qi The i-th \vertex" of the domain, Qi 2 V Si A small neighborhood of Qi, Si ⊂ Ω Hm The usual Sobolev spaces with square-integratable weak derivatives up to order m m Ka The weighted Sobolev space of order m and index a m K! The inhomogeneous weighted Sobolev space a @uΩ The unfolded boundary of Ω uΩ The unfolded closure of Ω T The triangulation of Ω Γ The interface of in the transmission problem where the coefficients jump xi Acknowledgments I am very grateful to those, in particular, my dissertation committee members, who once helped me during my Ph.D.
Recommended publications
  • Snake Lemma - Wikipedia, the Free Encyclopedia
    Snake lemma - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Snake_lemma Snake lemma From Wikipedia, the free encyclopedia The snake lemma is a tool used in mathematics, particularly homological algebra, to construct long exact sequences. The snake lemma is valid in every abelian category and is a crucial tool in homological algebra and its applications, for instance in algebraic topology. Homomorphisms constructed with its help are generally called connecting homomorphisms. Contents 1 Statement 2 Explanation of the name 3 Construction of the maps 4 Naturality 5 In popular culture 6 See also 7 References 8 External links Statement In an abelian category (such as the category of abelian groups or the category of vector spaces over a given field), consider a commutative diagram: where the rows are exact sequences and 0 is the zero object. Then there is an exact sequence relating the kernels and cokernels of a, b, and c: Furthermore, if the morphism f is a monomorphism, then so is the morphism ker a → ker b, and if g' is an epimorphism, then so is coker b → coker c. Explanation of the name To see where the snake lemma gets its name, expand the diagram above as follows: 1 of 4 28/11/2012 01:58 Snake lemma - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Snake_lemma and then note that the exact sequence that is the conclusion of the lemma can be drawn on this expanded diagram in the reversed "S" shape of a slithering snake. Construction of the maps The maps between the kernels and the maps between the cokernels are induced in a natural manner by the given (horizontal) maps because of the diagram's commutativity.
    [Show full text]
  • Central Schemes for the Modified Buckley-Leverett Equation
    CENTRAL SCHEMES FOR THE MODIFIED BUCKLEY-LEVERETT EQUATION DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of the Ohio State University By Ying Wang, B.Sc., M.Sc., M.A.S. Graduate Program in Mathematics The Ohio State University 2010 Dissertation Committee: Professor Chiu-Yen Kao, Advisor Professor Avner Friedman Professor Fei-Ran Tian c Copyright by Ying Wang July, 2010 ABSTRACT In fluid dynamics, the Buckley-Leverett (BL) equation is a transport equation used to model two-phase flow in porous media. One application is secondary recovery by water-drive in oil reservoir simulation. The modified Buckley-Leverett (MBL) equation differs from the classical BL equation by including a balanced diffusive- dispersive combination. The dispersive term is a third order mixed derivatives term, which models the dynamic effects in the pressure difference between the two phases. The classical BL equation gives a monotone water saturation profile for any Rie- mann problem; on the contrast, when the dispersive parameter is large enough, the MBL equation delivers non-monotone water saturation profile for certain Riemann problems as suggested by the experimental observations. In this thesis, we first show that the solution of the finite interval [0,L] boundary value problem converges to that of the half-line [0, +∞) problem for the MBL equation as L → +∞. This result provides a justification for the use of the finite interval boundary value problem in numerical studies for the half line problem. Furthermore, we extend the classical central schemes for the hyperbolic conserva- tion laws to solve the MBL equation which is of pseudo-parabolic type.
    [Show full text]
  • A Proof-Theoretic Approach to Hierarchical Math Library Organization
    A Proof-Theoretic Approach to Hierarchical Math Library Organization Kamal Aboul-Hosn and Terese Damhøj Andersen Department of Computer Science, Cornell University, Ithaca, New York, USA [email protected] [email protected] Abstract. The relationship between theorems and lemmas in mathe- matical reasoning is often vague. No system exists that formalizes the structure of theorems in a mathematical library. Nevertheless, the deci- sions we make in creating lemmas provide an inherent hierarchical struc- ture to the statements we prove. In this paper, we develop a formal system that organizes theorems based on scope. Lemmas are simply the- orems with a local scope. We develop a representation of proofs that captures scope and present a set of proof rules to create and reorganize the scopes of theorems and lemmas. The representation and rules al- low systems for formalized mathematics to more accurately reflect the natural structure of mathematical knowledge. 1 Introduction The relationship between theorems and lemmas in mathematical reasoning is often vague. What makes a statement a lemma, but not a theorem? One might say that a theorem is “more important,” but what does it mean for one statement to be “more important” than another? When writing a proof for a theorem, we often create lemmas as a way to break down the complex proof, so perhaps we expect the proofs of lemmas to be shorter than the proofs of theorems. We also create lemmas when we have a statement that we do not expect to last in readers’ minds, i.e., it is not the primary result of our work.
    [Show full text]
  • On the Topology of Discrete Strategies∗
    The final version of this paper was published in The International Journal of Robotics Research, 29(7), June 2010, pp. 855–896, by SAGE Publications Ltd, http://online.sagepub.com. c Michael Erdmann On the Topology of Discrete Strategies∗ Michael Erdmann School of Computer Science Carnegie Mellon University [email protected] December 2009 Abstract This paper explores a topological perspective of planning in the presence of uncertainty, focusing on tasks specified by goal states in discrete spaces. The paper introduces strategy complexes. A strategy complex is the collection of all plans for attaining all goals in a given space. Plans are like jigsaw pieces. Understanding how the pieces fit together in a strategy complex reveals structure. That structure characterizes the inherent capabilities of an uncertain system. By adjusting the jigsaw pieces in a design loop, one can build systems with desired competencies. The paper draws on representations from combinatorial topology, Markov chains, and polyhedral cones. Triangulating between these three perspectives produces a topological language for describing concisely the capabilities of uncertain systems, analogous to concepts of reachability and controllability in other disciplines. The major nouns in this language are topological spaces. Three key theorems (numbered 1, 11, 20 in the paper) illustrate the sentences in this language: (a) Goal Attainability: There exists a strategy for attaining a particular goal from anywhere in a system if and only if the strategy complex of a slightly modified system is homotopic to a sphere. (b) Full Controllability: A system can move between any two states despite control uncertainty precisely when its strategy complex is homotopic to a sphere of dimension two less than the number of states.
    [Show full text]
  • Lemmas in Olympiad Geometry
    Lemmas In Olympiad Geometry Navneel Singhal July 14, 2016 Geometry is the art of correct reasoning from incorrectly drawn figures. - Henri Poincar´e 1 Introduction Here is a collection of some useful lemmas in geometry, some of them well known, some obscure and some by the author himself. This list of lemmas is also intended to be a list of some easier problems and also as some configurations that frequently appear on contests. Usually these lemmas will be intermediate results that will help you reach the solution in many cases, and maybe even trivialize the problem. These will help you write some really elegant solutions (and will also help you to simplify your bashes in cases of some problems that don't yield easily to synthetic solutions.) So have fun proving these lemmas and using them to the fullest advantage in your Olympiad journey! 2 Some Notations • By (XYZ) we denote the circumcircle of ∆XYZ, by (XY ) the circle with XY as diameter, and by (M; r) the circle with centre M and radius r, the radius being dropped when the context is clear. • We denote H as the orthocentre, O as the circumcentre, G as the centroid, N as the nine-point centre, I as the incentre, Na as the Nagel point and Ge as the Gergonne point of ∆ABC 3 Orthocenter related properties • O and H are isogonal conjugates. • Reflections of the orthocenter over the sides and the midpoints of the sides lie on (ABC). 1 • The O is the orthocenter of the medial triangle. a consequence is that AH=2OM.
    [Show full text]
  • Coquelicot: a User-Friendly Library of Real Analysis for Coq
    Coquelicot: A User-Friendly Library of Real Analysis for Coq Sylvie Boldo, Catherine Lelay and Guillaume Melquiond Abstract. Real analysis is pervasive to many applications, if only because it is a suitable tool for modeling physical or socio-economical systems. As such, its support is warranted in proof assis- tants, so that the users have a way to formally verify mathematical theorems and correctness of critical systems. The Coq system comes with an axiomatization of standard real numbers and a li- brary of theorems on real analysis. Unfortunately, this standard library is lacking some widely used results. For instance, power series are not developed further than their definition. Moreover, the definitions of integrals and derivatives are based on dependent types, which make them especially cumbersome to use in practice. To palliate these inadequacies, we have designed a user-friendly library: Coquelicot. An easier way of writing formulas and theorem statements is achieved by re- lying on total functions in place of dependent types for limits, derivatives, integrals, power series, and so on. To help with the proof process, the library comes with a comprehensive set of theorems that cover not only these notions, but also some extensions such as parametric integrals, two- dimensional differentiability, asymptotic behaviors. It also offers some automation for performing differentiability proofs. Moreover, Coquelicot is a conservative extension of Coq’s standard library and we provide correspondence theorems between the two libraries. We have exercised the library on several use cases: in an exam at university entry level, for the definitions and properties of Bessel functions, and for the solution of the one-dimensional wave equation.
    [Show full text]
  • Detailed Proofs of Lemmas, Theorems, and Corollaries
    Detailed Proofs of Lemmas, Theorems, and Corollaries Dahua Lin John Fisher CSAIL, MIT CSAIL, MIT A List of Lemmas, Theorems, and Theorem 4. The hierarchically bridging Markov Corollaries chain with bk < 1 for k = 0;:::;K − 1, and fk < 1 for k = 1;:::;K is ergodic. If we write the equilibrium For being self-contained, we list here all the lemmas, distribution in form of (αµ0; β1µ1; : : : ; βK µK ), then theorems, and corollaries in the main paper. (S1) µ0 equals the target distribution µ; (S2) for each k ≥ 1, and y 2 Y , µ (y) is proportional to the total Lemma 1. The joint transition matrix P given by k k + probability of its descendant target states (the target Eq.(1) in the main paper has a stationary distribution states derived by filling all its placeholders); (S3) α, in form of (αµ ; βµ ), if and only if X Y the probability of being at the target level, is given by α−1 = 1 + PK (b ··· b )=(f ··· f ). µX QB = µY ; and µY QF = µX : (1) k=1 0 k−1 1 k Corollary 2. If bk=fk+1 ≤ κ < 1 for each k = Under this condition, we have αb = βf. Further, if 1;:::;K, then α > 1 − κ. both PX and PY are both reversible, then P+ is also reversible, if and only if B Proofs µX (x)QB(x; y) = µY (y)QF (y; x); (2) Here, we provide the proofs of the lemmas and theo- for all x 2 X and y 2 Y . rems presented in the paper.
    [Show full text]
  • Coquelicot: a User-Friendly Library of Real Analysis for Coq Sylvie Boldo, Catherine Lelay, Guillaume Melquiond
    Coquelicot: A User-Friendly Library of Real Analysis for Coq Sylvie Boldo, Catherine Lelay, Guillaume Melquiond To cite this version: Sylvie Boldo, Catherine Lelay, Guillaume Melquiond. Coquelicot: A User-Friendly Library of Real Analysis for Coq. Mathematics in Computer Science, Springer, 2015, 9 (1), pp.41-62. 10.1007/s11786- 014-0181-1. hal-00860648v2 HAL Id: hal-00860648 https://hal.inria.fr/hal-00860648v2 Submitted on 18 Feb 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Coquelicot: A User-Friendly Library of Real Analysis for Coq Sylvie Boldo, Catherine Lelay and Guillaume Melquiond Abstract. Real analysis is pervasive to many applications, if only because it is a suitable tool for modeling physical or socio-economical systems. As such, its support is warranted in proof assis- tants, so that the users have a way to formally verify mathematical theorems and correctness of critical systems. The Coq system comes with an axiomatization of standard real numbers and a li- brary of theorems on real analysis. Unfortunately, this standard library is lacking some widely used results. For instance, power series are not developed further than their definition.
    [Show full text]
  • On Vertex Identifying Codes for Infinite Lattices Brendon Stanton Iowa State University
    Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 On Vertex Identifying Codes For Infinite Lattices Brendon Stanton Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd Part of the Mathematics Commons Recommended Citation Stanton, Brendon, "On Vertex Identifying Codes For Infinite Lattices" (2011). Graduate Theses and Dissertations. Paper 12019. This Dissertation is brought to you for free and open access by the Graduate College at Digital Repository @ Iowa State University. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Digital Repository @ Iowa State University. For more information, please contact [email protected]. On Vertex Identifying Codes For Infinite Lattices by Brendon Michael Stanton A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Program of Study Committee: Ryan Martin, Major Professor Maria Axenovich Clifford Bergman Leslie Hogben Chong Wang Iowa State University Ames, Iowa 2011 ii DEDICATION I would like to dedicate this thesis to my parents. Without their love and support, I never would have made it this far. I would also like to thank all of my friends, family, teachers and professors who have helped me through my many years of education. iii TABLE OF CONTENTS LIST OF FIGURES . v CHAPTER 1. GENERAL INTRODUCTION . 1 1.1 Thesis Organization . .1 1.2 Definitions . .2 1.3 Literature Review . .3 1.3.1 General Bounds and Constructions . .3 1.3.2 Codes and Infinite Graphs . .7 1.3.3 Variants of r-Identifying Codes .
    [Show full text]
  • Automated Generation of Machine Verifiable and Readable Proofs: a Case Study of Tarski’S Geometry Sana Stojanovic Durdevic, Julien Narboux, Predrag Janicic
    Automated Generation of Machine Verifiable and Readable Proofs: A Case Study of Tarski’s Geometry Sana Stojanovic Durdevic, Julien Narboux, Predrag Janicic To cite this version: Sana Stojanovic Durdevic, Julien Narboux, Predrag Janicic. Automated Generation of Machine Veri- fiable and Readable Proofs: A Case Study of Tarski’s Geometry. Annals of Mathematics and Artificial Intelligence, Springer Verlag, 2015, pp.25. 10.1007/s10472-014-9443-5. hal-01091011v1 HAL Id: hal-01091011 https://hal.inria.fr/hal-01091011v1 Submitted on 4 Dec 2014 (v1), last revised 5 Nov 2015 (v2) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Automated Generation of Machine Verifiable and Readable Proofs: A Case Study of Tarski’s Geometry ⋆ Sana Stojanovi´c Ður➒evi´c, Julien Narboux, and Predrag Janiˇci´c Faculty of Mathematics, University of Belgrade Studentski trg 16, 11000 Belgrade, Serbia ICube, UMR 7357 CNRS, University of Strasbourg Pˆole API, Bd S´ebastien Brant, BP 10413, 67412 Illkirch, France [email protected],[email protected],[email protected] Abstract. The power of state-of-the-art automated and interactive the- orem provers has reached the level at which a significant portion of non- trivial mathematical contents can be formalized almost fully automat- ically.
    [Show full text]
  • Classification of Coxeter Groups with Finitely Many Elements of A-Value 2
    Classification of Coxeter groups with finitely many elements of a-value 2 R. M. Green & Tianyuan Xu Abstract. We consider Lusztig’s a-function on Coxeter groups (in the equal parameter case) and classify all Coxeter groups with finitely many elements of a-value 2 in terms of Coxeter diagrams. 1. Introduction This paper concerns Lusztig’s a-function on Coxeter groups. The a-function was first defined for finite Weyl groups via their Hecke algebras by Lusztig in [20]; subsequently, the definition was extended to affine Weyl groups in [21] and to arbitrary Coxeter groups in [22]. The a-function is intimately related to the study of Kazhdan–Lusztig cells in Coxeter groups, the construction of Lusztig’s asymptotic Hecke algebras, and the representation theory of Hecke algebras; see, for example, [20],[21],[22], [12] and [11]. For any Coxeter group W and w ∈ W , a(w) is a non-negative integer obtained from the structure constants of the Kazhdan–Lusztig basis of the Hecke algebra of W . While a-values are often difficult to compute directly, it is known that a(w)=0 if and only if w is the identity element and that a(w) = 1 if and only if w is a non- identity element with a unique reduced word (see Proposition 2.2). If we define W to be a(n)-finite for n ∈ Z>0 if W contains finitely many elements of a-value n and a(n)-infinite otherwise, then it is also known that W is a(1)-finite if and only if each connected component of the Coxeter diagram of W is a tree and contains at most one edge of weight higher than 3 (see Proposition 2.3).
    [Show full text]
  • Merging Data Resources for Inflectional and Derivational
    Merging Data Resources for Inflectional and Derivational Morphology in Czech Zdenekˇ Zabokrtskˇ y,´ Magda Sevˇ cˇ´ıkova,´ Milan Straka, Jona´sˇ Vidra, Adela´ Limburska´ Charles University in Prague, Faculty of Mathematics and Physics, Institute of Formal and Applied Linguistics fzabokrtsky,sevcikova,straka,[email protected], [email protected] Abstract The paper deals with merging two complementary resources of morphological data previously existing for Czech, namely the inflectional dictionary MorfFlex CZ and the recently developed lexical network DeriNet. The MorfFlex CZ dictionary has been used by a morphological analyzer capable of analyzing/generating several million Czech word forms according to the rules of Czech inflection. The DeriNet network contains several hundred thousand Czech lemmas interconnected with links corresponding to derivational relations (relations between base words and words derived from them). After summarizing basic characteristics of both resources, the process of merging is described, focusing on both rather technical aspects (growth of the data, measuring the quality of newly added derivational relations) and linguistic issues (treating lexical homonymy and vowel/consonant alternations). The resulting resource contains 970 thousand lemmas connected with 715 thousand derivational relations and is publicly available on the web under the CC-BY-NC-SA license. The data were incorporated in the MorphoDiTa library version 2.0 (which provides morphological analysis, generation, tagging and lemmatization for Czech) and can be browsed and searched by two web tools (DeriNet Viewer and DeriNet Search tool). Keywords: derivation, inflection, morphology 1. Introduction proached inflection and derivation in different ways, some The present paper deals with merging two complemen- attempts to merge inflectional morphology with derivations tary resources of morphological data previously exist- have been already done.
    [Show full text]