نتایج جستجو برای: bounded central approximate identity

تعداد نتایج: 714018  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده ادبیات و علوم انسانی 1392

in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ولی عصر (عج) - رفسنجان - دانشکده ریاضی و کامپیوتر 1389

in this thesis we will present three topics. we define approximate fixed points in fuzzy normed spaces. also we obtain some necessary and sufficient conditions on the existence of? -fixed points for ? > 0. at the continue some results about approximate fixed points for a class of non-expansive maps on g-metric spaces are obtained and we define approximate fixed points in partial metric spa...

2010
F. T. BIRTEL

Introduction. Let A be a commutative semi-simple Banach algebra and let A(.4) be the set of nonzero multiplicative functionals on A. Denote by A' the strongly closed span of A(^4) and by A" the Banach space adjoint of A'. Modifying a construction of R. Arens [l] we introduce a multiplication in A" under which A" becomes a commutative Banach algebra. A is algebraically isomorphic to a subalgebra...

2018
Eduard Eiben Mithilesh Kumar Amer E. Mouawad Fahad Panolan Sebastian Siebertz

In standard kernelization algorithms, the usual goal is to reduce, in polynomial time, an instance (I, k) of a parameterized problem to an equivalent instance (I ′, k′) of size bounded by a function in k. One of the central problems in this area, whose investigation has led to the development of many kernelization techniques, is the Dominating Set problem. Given a graph G and k ∈ N, Dominating ...

Journal: :Journal of Mathematical Analysis and Applications 2013

Journal: :J. Symb. Log. 2009
Emil Jerábek

We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the bounded arithmetic hierarchy to the collapse of the polynomial-time hierarchy.

Journal: :Bulletin of the Belgian Mathematical Society - Simon Stevin 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید