On the growth of entire functions of bounded index
نویسندگان
چکیده
منابع مشابه
Entire Functions of Bounded Index
Since this series is absolutely convergent everywhere in the plane, the terms \an\ must approach 0. Consequently, there exists for each a, an index n0 = n(a) ior which \an\ is a maximal coefficient. B. Lepson [2] raised the problem of characterizing entire functions for which n(a) is bounded. The latter are called functions of bounded index. In what follows, we shall give a partial solution to ...
متن کاملGrowth analysis of entire functions of two complex variables
In this paper, we introduce the idea of generalized relative order (respectively generalized relative lower order) of entire functions of two complex variables. Hence, we study some growth properties of entire functions of two complex variables on the basis of the definition of generalized relative order and generalized relative lower order of entire functions of two complex variables.
متن کاملthe effect of taftan pozzolan on the compressive strength of concrete in the environmental conditions of oman sea (chabahar port)
cement is an essential ingredient in the concrete buildings. for production of cement considerable amount of fossil fuel and electrical energy is consumed. on the other hand for generating one tone of portland cement, nearly one ton of carbon dioxide is released. it shows that 7 percent of the total released carbon dioxide in the world relates to the cement industry. considering ecological issu...
The Geometry of Bounded Type Entire Functions
We construct functions in the Eremenko-Lyubich class (transcendental entire functions with bounded singular set) whose level-sets have prescribed geometry. We also give a related result for the Speiser class (finite singular set) and discuss some differences between these two classes. The construction may be considered as an approximation result using functions in class B that complements recen...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pacific Journal of Mathematics
سال: 1970
ISSN: 0030-8730,0030-8730
DOI: 10.2140/pjm.1970.33.191