نتایج جستجو برای: e identity

تعداد نتایج: 1127292  

Journal: :IJIDE 2012
Ali M. Al-Khouri

Over the past decade, biometrics technology has evolved from a technology used primarily in forensics and a narrow scientific and technological field to an indispensable technology in public and private sectors expanding into areas calling for advanced security. Biometric technologies provide high levels of security and reliability to address requirements related to identification and verificat...

2008
MARCEL JACKSON MIKHAIL VOLKOV

We prove that every semigroup S whose quasivariety contains a 3-nilpotent semigroup or a semigroup of index more than 2 has no finite basis for its quasi-identities provided that one of the following properties holds: • S is finite; • S has a faithful representation by injective partial maps on a set; • S has a faithful representation by order preserving maps on a chain. As a corollary it is sh...

Journal: :Journal of bacteriology 2001
D Friedberg M Midkiff J M Calvo

Lrp (leucine-responsive regulatory protein) plays a global regulatory role in Escherichia coli, affecting expression of dozens of operons. Numerous lrp-related genes have been identified in different bacteria and archaea, including asnC, an E. coli gene that was the first reported member of this family. Pairwise comparisons of amino acid sequences of the corresponding proteins shows an average ...

2001
M. A. ALBAR S. A. HUQ

If (G,·) is a group with identity e, we call G, the group based at e. In this paper, we aim to release the present day group theory which is based at e, by replacing e by an arbitrary element of the group. 2000 Mathematics Subject Classification. 20A05, 20F12.

2008
S. S. DRAGOMIR

Bounds for the perturbed Čebyšev functionals C (f, g)− μC (e, g) and C (f, g)− μC (e, g) − νC (f, e) when μ, ν ∈ R and e is the identity function on the interval [a, b] , are given. Applications for some Grüss’ type inequalities are also provided.

Journal: :Wireless Personal Communications 2013
Zhiwei Wang Kewei Sha Wei Lv

With the popularity of cloud computing, how to securely authenticate a user while not releasing user's sensitive information becomes a challenge. In this paper, we introduce a slight homomorphic signature, which is suitable to implement an access controlling service in cloud computing. In slight homomorphic signature, each user in cloud computing who have a set of identity attributes, rstly com...

2010
D. S. LUBINSKY

Let be a positive measure on the real line, with orthogonal polynomials fpng and leading coe¢ cients f ng. The Geronimus type identity 1 jIm zj Z 1 1 P (t) jzpn (t) pn 1 (t)j dt = n 1 n Z P (t) d (t) ; valid for all polynomials P of degree 2n 2 has known analogues within the theory of orthogonal rational functions, though apparently unknown in the theory of orthogonal polynomials. We present ne...

2009
MARIA GORELIK

Weyl denominator identity for the affinization of a basic Lie superalgebra with non-zero Killing form was formulated by V. Kac and M. Wakimoto and was proven by them for the defect one case. In this paper we prove this identity. 0. Introduction Let g be a basic Lie superalgebra with a non-zero Killing form. Let ĝ be the affinization of g. Let h (resp., ĥ) be the Cartan subalgebra in g (resp., i...

2004
LAURA BURLANDO

In this paper we study the relationships among the spectra of the cosets of an element of a Banach algebra in some quotient algebras. We also characterize the spectrum of any a E M (where M is an ideal of a Banach algebra with identity and moreover has an identity) in the whole algebra in terms of the spectrum of a in M.

2006
RICARDO BIANCONI

We prove that if A is an infinite von Neumann algebra (i. e., the identity can be decomposed as a sum of a sequence of pairwise disjoint projections, all equivalent to the identity) then the cyclic cohomology of A vanishes. We show that the method of the proof applies to certain algebras of infinite matrices.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید