نتایج جستجو برای: admissible vector
تعداد نتایج: 204780 فیلتر نتایج به سال:
IA Petri net controller method for Petri net model with uncontrollable transitions that enforces the conjunctions a set of linear inequalities on the Parikh vector or place markings is proposed. The method for constructing a Petri net feedback controller is based on part design and Petri net reduction technique. Constraints are classified into admissible and inadmissible constraints. Matrix-Tra...
Representations of spaces are the key device in Type-2 Theory of Effectivity (TTE) for defining computability on non-countable spaces. Almost-compact representations permit a simple measurement of the time complexity of functions using discrete parameters, namely the desired output precision together with “size” information about the argument, rather than continuous ones. We present some intere...
where the inf is taken over all admissible sequences. We also let dX(T ) denote the diameter of T with respect to norm ‖·‖X . For the remainder of this section we make the definitions πrx = argminy∈Tr‖y − x‖X and ∆rx = πrx− πr−1x. Throughout this section we let ‖ · ‖ denote the `2→2 operator norm in the case of matrix arguments, and the `2 norm in the case of vector arguments. Krahmer, Mendelso...
We calculate fusion rules for the admissible representations of the superalgebra ŝl(2|1;C)k at fractional level k = −1/2 in the Ramond sector. By representing 3point correlation functions involving a singular vector as the action of differential operators on the sl(2|1;C) invariant 3-point function, we obtain conditions on permitted quantum numbers involved. We find that in this case the primar...
We study a class of quadratic stochastic programs where the distribution of random variables has unknown parameters. A traditional approach is to estimate the parameters using a maximum likelihood estimator (MLE) and to use this as input in the optimization problem. For the unconstrained case, we show that an estimator that shrinks the MLE towards an arbitrary vector yields a uniformly better r...
Let F be a finite extension of Q p , p > 2. We construct admissible unitary completions of certain representations of GL 2 (F) on L-vector spaces, where L is a finite extension of F. When F = Q p using the results of Berger, Breuil and Colmez we obtain some results about lifting 2-dimensional mod p representations of the absolute Galois group of Q p to crystabelline representations with given H...
We calculate fusion rules for the admissible representations of the superalgebra ŝl(2|1;C)k at fractional level k = −1/2 in the Ramond sector. By representing 3point correlation functions involving a singular vector as the action of differential operators on the sl(2|1;C) invariant 3-point function, we obtain conditions on permitted quantum numbers involved. We find that in this case the primar...
A pinnacle of a permutation is value that larger than its immediate neighbors when written in one-line notation. In this paper, we build on previous work characterized admissible sets permutations. For these sets, there can be specific orderings the pinnacles are not admissible, meaning they realized by any permutation. Here characterize orderings, using relationship between x and rank set to b...
Digital audio has been ubiquitous over the past decade. Since it can be easily modified by editing tools, there has been a strong need to protect its content for secure multimedia applications. Previous audio authentication algorithms are mainly focused on either human speech or general audio with music as part of the test data, while special research on music authentication has been somewhat n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید