نتایج جستجو برای: symmetric bibd

تعداد نتایج: 81006  

Journal: :Eur. J. Comb. 2011
Allison Cuttler Curtis Greene Mark Skandera

We study Muirhead-type generalizations of families of inequalities due to Newton, Maclaurin and others. Each family is defined in terms of a commonly used basis of the ring of symmetric functions in n variables. Inequalities corresponding to elementary symmetric functions and power sum symmetric functions are characterized by the same simple poset which generalizes the majorization order. Some ...

2009
Robert A. Liebler Jianmin Ma

An association scheme is amorphous if it has as many fusion schemes as possible. Symmetric amorphous schemes were classified by A. V. Ivanov [A. V. Ivanov, Amorphous cellular rings II, in Investigations in algebraic theory of combinatorial objects, pages 39–49. VNIISI, Moscow, Institute for System Studies, 1985] and commutative amorphous schemes were classified by T. Ito, A. Munemasa and M. Yam...

A. KHANMIRZAIE M. MOSLEH M. OTADI,

In this paper, we investigate the existence of a positive solution of fully fuzzy linear equation systems. This paper mainly to discuss a new decomposition of a nonsingular fuzzy matrix, the symmetric times triangular (ST) decomposition. By this decomposition, every nonsingular fuzzy matrix can be represented as a product of a fuzzy symmetric matrix S and a fuzzy triangular matrix T.

K. Verma, Geeta, T. R. Gulati,

In this paper, we establish weak and strong duality theorems for a pair of multiobjective symmetric dual problems. This removes several omissions in the paper "Symmetric and self duality in vector optimization problem, Applied Mathematics and Computation 183 (2006) 1121-1126".

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی 1391

شبکه های حسگر بی سیم (wsns) به طور گسترده برای نظارت و کنترل محیط و سیستم هایی که خارج از دسترس انسان هستند، بکار می روند. مانند سایر شبکه های کامپیوتری و مخابراتی، شبکه های حسگر بی سیم نیز از نظر تهدیدات و حملات مخرب بسیار آسیب پذیر هستند و طراحی ساده سخت افزار این ابزارهای الکترونیکی، مانع از بکارگیری مکانیسم های دفاعی مرسوم شبکه ها می شود. استقرار کلید از اساسی ترین عملکردهای رمزگذاری در تما...

1998
Wissam Hlayhel Daniel Litaize Laurent Fesquet Jacques Henri Collet

The fast evolution of processor performance necessitates a permanent evolution of all the multi-processor components, even for small to medium-scale symmetric multiprocessors (SMP) build around shared busses. This kind of multiprocessor is especially attractive because the problem of data coherency in caches can be solved by a class of snooping protocols specific to these shared-bus architectur...

‎In this paper‎, ‎we prove some theorems related to properties of‎ ‎generalized symmetric hybrid mappings in Banach spaces‎. ‎Using Banach‎ ‎limits‎, ‎we prove a fixed point theorem for symmetric generalized‎ ‎hybrid mappings in Banach spaces‎. ‎Moreover‎, ‎we prove some weak‎ ‎convergence theorems for such mappings by using Ishikawa iteration‎ ‎method in a uniformly convex Banach space.

The object of this paper is to study $(epsilon)$-Lorentzian para-Sasakian manifolds. Some typical identities for the curvature tensor and the Ricci tensor of $(epsilon)$-Lorentzian para-Sasakian manifold are investigated. Further, we study globally $phi$-Ricci symmetric and weakly $phi$-Ricci symmetric $(epsilon)$-Lorentzian para-Sasakian manifolds and obtain interesting results.

A. Davar, H. M. Panahiha

In this paper, the nonlinear free vibrations of thin symmetric and non-symmetric cross-ply composite plates subjected to biaxial initial stresses are investigated. Because of their excellent properties such as specific strength and specific stiffness, composite plates have wide applications in aerospace and mechanical structures. Based on Von-Karman's strain-displacement relations and using Gal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید