نتایج جستجو برای: fountain theorem
تعداد نتایج: 145524 فیلتر نتایج به سال:
یکی از کانال های مخابراتی پرکاربرد، کانال پاک شوندگی باینری (bec) است که برای مدل سازی انتقال داده ها روی اینترنت نیز مورد استفاده قرار می گیرد. در اینترنت معمولاً قابلیت اطمینان در انتقال داده ها با استفاده از پروتکل ها تضمین می گردد که در برخی کاربردها از جمله انتقال داده روی لینک های ماهواره ای یا بدون سیم، عملکرد چندان مطلوبی ندارند. راه حل دیگر برای ایجاد اطمینان در انتقال داده ها استفاده ا...
در این پایان نامه، هدف ارائه برخی خواص فضای عملگرهای خطی ضعیفا کراندار فازی باعملگر نرم بگ و سامانتا (samanta and bag) روی فضاهای نرمدار فازی فلبین است. در ادامه کامل بودن این فضا مورد مطالعه قرار خواهد گرفت. با مثالهای نقض، نشان داده خواهد شد که قضیه نگاشت معکوس و قضیه باناخ- استین هاوس (theorem "steinhaus s –banach) برای این حالت فازی برقرار نیست. همچنین به طور خلاصه فضاهای فازی نرمدار با بعد...
The exponential increase in mobile IP data usage causes a shortage in the mobile bandwidth. Traffic offloading is regarded as a solution to the exploding growth of mobile broadband data traffic in the mobile networks. In this paper, a content aware traffic offload scheme is proposed to implement using multiple access paths simultaneously. Moreover, the process flow based-on the scheme in Long T...
This work investigates reliable wireless broadcast with asynchronous data access. A wireless broadcast system based on LT-codes, a realization of the recently introduced Fountain codes, is introduced. We review the traditional problem formalization for Fountain codes operating on erasure channels and generalize the framework to arbitrary types of channels coining the terminology and the concept...
pushkin is an extraordinary phenomenon in russian and also the world literature with works on which the global ideas shine in. nobody is able, just like pushkin, to demonstrate a man of other nations and to speak on behalf of him so authentically. his ability in describing iranian culture and also iranian genius poet, saadi, was so that prince shalikov, the publisher of “damskii zhurnal”, call...
A new aspect for erasure coding is considered, namely, the possibility that some portion of the arriving packets are corrupted in an undetectable fashion. In practice, the corrupted packets may be attributed to a portion of the communication paths that are leading to the receiver and are controlled by an adversary. Alternatively, in case packets are collected from several sources, the corruptio...
Fountains (negatively buoyant jets) are commonly used in numerous engineering applications, such as the natural ventilation buildings and smoke spread compartment fires. In this study, long-term behavior of weak round fountains homogeneous ambient confined a cylindrical container was analyzed using three-dimensional direct numerical simulation over range Froude number ( Fr ), Reynolds (Re), dim...
Aims. Nonlinear behaviour of galactic dynamos is studied, allowing for magnetic helicity removal by the galactic fountain flow. Methods. A suitable advection speed is estimated, and a one-dimensional mean-field dynamo model with dynamic α-effect is explored. Results. It is shown that the galactic fountain flow is efficient in removing magnetic helicity from galactic discs. This alleviates the c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید