نتایج جستجو برای: bogus metric
تعداد نتایج: 82175 فیلتر نتایج به سال:
the main objective of this paper is to find the necessary and sufficient condition of a given finslermetric to be einstein in order to classify the einstein finsler metrics on a compact manifold. the consideredeinstein finsler metric in the study describes all different kinds of einstein metrics which are pointwiseprojective to the given one. this study has resulted in the following theorem tha...
in this paper, we are going to study the g-natural metrics on the tangent bundle of finslermanifolds. we concentrate on the complex and kählerian and hermitian structures associated with finslermanifolds via g-natural metrics. we prove that the almost complex structure induced by this metric is acomplex structure on tangent bundle if and only if the finsler metric is of scalar flag curvature. t...
Rural areas of developing countries often lack effective legal enforcement. However, villagers who know each other well and interact repeatedly may use implicit contracts to minimize crime. I construct a dynamic limited-commitment model, in which a thief cannot credibly commit to forego stealing from his fellow villagers, but may be induced to limit his stealing by the promise of future gifts f...
The main contribution of this work is to provide solutions for component identification in composite technical systems such as automobiles or airplanes. We focused on the following three goals: (1) piracy protection to identify original parts and detect bogus parts; (2) system protection to monitor a system in order to ensure system integrity; and (3) theft protection to prevent the usage of st...
The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms for the case where insiders attempt to exfiltrate and use sensitive in...
We provide a comprehensive characterization of Band Codes (BC) as a resilient-by-design solution to pollution attacks in Network Coding (NC) based peer-to-peer live video streaming. Consider one malicious node injecting bogus coded packets into the network: the recombinations at the nodes generate an avalanche of novel coded bogus packets. Therefore, the malicious node can cripple the communica...
we prove a related fixed point theorem for n mappings which arenot necessarily continuous in n fuzzy metric spaces using an implicit relationone of them is a sequentially compact fuzzy metric space which generalizeresults of aliouche, et al. [2], rao et al. [14] and [15].
the time-optimal trajectory for an airplane from some starting point to some final point is studied by many authors. here, we consider the extension of robot planer motion of dubins model in three dimensional spaces. in this model, the system has independent bounded control over both the altitude velocity and the turning rate of airplane movement in a non-obstacle space. here, in this paper a g...
in this paper, we shall introduce the fuzzyw-distance, then prove a common fixed point theorem with respectto fuzzy w-distance for two mappings under the condition ofweakly compatible in complete fuzzy metric spaces.
we provide fuzzy quasi-metric versions of a fixed point theorem ofgregori and sapena for fuzzy contractive mappings in g-complete fuzzy metricspaces and apply the results to obtain fixed points for contractive mappingsin the domain of words.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید