نتایج جستجو برای: k skew centralizing maps
تعداد نتایج: 487859 فیلتر نتایج به سال:
Endobronchial brachytherapy (EBB) is an effective treatment for endobronchial tumors. However, bronchial toxicity caused by over-irradiation remains problematic. To decrease bronchial toxicity, we developed a source-centralizing applicator for EBB. The purpose of the present study was to assess the efficacy and safety of EBB with varying reference dose points according to the bronchial diameter...
We study the ”Lie Algebra” of the group of Gauge Transformations of Space-time. We obtain topological invariants arising from this Lie Algebra. Our methods give us fresh mathematical points of view on Lorentz Transformations, orientation conventions, the Doppler shift, Pauli matrices , Electro-Magnetic Duality Rotation, Poynting vectors, and the Energy Momentum Tensor T .
Multidimensional similarity join finds pairs of multidimensional points that are within some small distance of each other: The 6-k-d-B tree has been proposed as a data structure that scales better as the number of dimensions increases compared to previous data structures. We present a cost model of the E-k-d-B tree and use it to optimize the leaf size. We present novel parallel algorithms for t...
A Wedderburn polynomial over a division ring K is a minimal polynomial of an algebraic subset of K. Special cases of such polynomials include, for instance, the minimal polynomials (over the center F = Z(K)) of elements of K that are algebraic over F . In this note, we give a survey on some of our ongoing work on the structure theory of Wedderburn polynomials. Throughout the note, we work in th...
of the residue field K ∼= A/A+ as an A-module. Here ∂0 : A → K is the natural augmentation, the Fi are considered graded left free A-modules whose basis elements have degree 0, and that the resolution is linear means the boundary maps ∂n, n ≥ 1, are graded of degree 1 (unless ∂n = 0). The examples we will discuss in Section 1 are variants of the polytopal semigroup rings considered in Bruns, Gu...
Chaos-based communication can be applied advantageously only if the property of chaotic systems is suitably exploited. In this paper a simple non-coherent detection method for chaos-shiftkeying (CSK) modulation is proposed. Unlike the bit-energy-based detection which makes no specific use of any chaotic system property, the method proposed here exploits some distinguishable property of the two ...
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth. Typicall...
As computer clusters are found to be highly effective for handling massive datasets, the design of efficient parallel algorithms for such a computing model is of great interest. We consider (α, k)-minimal algorithms for such a purpose, where α is the number of rounds in the algorithm, and k is a bound on the deviation from perfect workload balance. We focus on new (α, k)-minimal algorithms for ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید