نتایج جستجو برای: value map

تعداد نتایج: 912900  

1998
Stefan Waldmann

In this paper we construct non-equivalent star products on CP by phase space reduction. It turns out that the non-equivalent star products occur very natural in the context of phase space reduction by deforming the momentum map of the U(1)-action on C \ {0} into a quantum momentum map and the corresponding momentum value into a quantum momentum value such that the level set, i. e. the ‘constrai...

Purpose: The aim of this research is to identify the  main criteria used for selecting the locations of public libraries based on an optimized model, Topsis-Fuzzy technique and using geographic information systems. The research also aims to investigate the identified criteria in the geographic space of Tabriz city. The research will be used to produce a map of convenient sites for public librar...

2016
Bilal Hani Hawashin BILAL HAWASHIN Farshad Fotouhi Chandan Reddy

s, while we got results when applying diffusion maps with the same number of Abstracts. This showed that Diffusion Maps is the best candidate method for semantically joining attributes containing huge number of long string values. 3.4 Long string Vs Short string Evaluation In this phase, we compared Diffusion Maps Method on the Abstract Field with the SoftTFIDF short string method with the Titl...

2011
Benson C. Sherrouse Jessica M. Clement Darius J. Semmens

As human pressures on ecosystems continue to increase, research involving the effective incorporation of social values information into the context of comprehensive ecosystem services assessments is becoming more important. Including quantified, spatially explicit social value metrics in such assessments will improve the analysis of relative tradeoffs among ecosystem services. This paper descri...

2011
ZHENYANG LI PEYMAN ESLAMI

Keller [9] introduced families of W–shaped maps that can have a great variety of behavior. As a family approaches a limit W map, he observed behavior that was either described by a probabilty density function (pdf) or by a singular point measure. Based on this, Keller conjectured that instability of the absolutely continuous invariant measure (acim) can result only from the existence of small i...

2015
Jennifer Shelton Cassondra Coleman Nic Herndon Nanyan Lu Ernest Lam Thomas Anantharaman Palak Sheth Sue Brown

Assembly and super scaffolding with multiple genera. We examined experiments from 16 different genera to determine if the results seen for the Tribolium castaneum genome are typical for other genomes as well. The T. castaneum genome map N50 was found to be in the high end of the probability density distribution (Additional file 6; Figure 1). The same is true for the Tcas5.0 draft sequence assem...

The aim of current research is to assess of landslide susceptibility in the Khalkhal Township, southern Ardabil using an ensemble and new method namely Bayesian and logistic regression (BT-LR) models. At first, landslide inventory map was prepared and then effective factors on landslide occurrence were identified. These factors are slope degree, plan curvature, slope aspect, elevation, landuse,...

, ,

Geographical information systems (GIS)-based soil erosion risk assessment models continue to play an important role in soil conservation planning. In the present study, soil erosion risk of Tange Bostanak watershed was determined within GIS-based Coordination of Information on the Environment (CORINE) soil erosion risk assessment method. The initially soil texture, soil depth and surface stonin...

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید