نتایج جستجو برای: range symmetric
تعداد نتایج: 743876 فیلتر نتایج به سال:
برد عددی ماتریس مربعی a را با w(a) نشان داده و به این صورت تعریف می کنیم w(a)={x8ax:x ?s1} ، که در آن s1 گوی واحد است. در سال 2009، راسل کاردن مساله برد عددی معکوس را به این صورت مطرح کرده است : برای نقطه z?w(a)، بردار x?s1 را به گونه ای می یابیم که z=x*ax، در این پایان نامه ، الگوریتمی برای حل مساله برد عددی معکوس ارانه می دهیم.
Pre-symmetric complex Banach spaces have been proposed as models for state spaces of physical systems. A structural projection on a pre-symmetric space A∗ represents an operation on the corresponding system, and has as its range a further pre-symmetric space which represents the state space of the resulting system and symmetries of the system are represented by elements of the group Aut(A∗) of ...
Symmetric spaces are well known in differential geometry from the study of spaces of constant curvature. The tangent space of a symmetric space forms a Lie triple system. Recently these objects have received attention in the numerical analysis community. A remarkable number of different algorithms can be understood and analyzed using the concepts of symmetric spaces and this theory unifies a ra...
Chinese Remainder Theorem (CRT) has been widely studied with its applications in frequency estimation, phase unwrapping, coding theory and distributed data storage. Since traditional CRT is greatly sensitive to the errors in residues due to noises, the problem of robustly reconstructing integers via the erroneous residues has been intensively studied in the literature. In order to robustly reco...
Power-aware systems are those that must exploit a wide range of power/performance tradeoffs in order to adapt to the power availability and application requirements. They require the integration of many novel power management techniques, ranging from voltage scaling to subsystem shutdown. However, those techniques do not always compose synergistically with each other; in fact, they can combine ...
Searchable Symmetric Encryption (SSE) has been widely applied in the design of encrypted database for exact queries or even range queries in practice. In spite of its efficiency and functionalities, it always suffers from information leakages. Some recent attacks point out that forward privacy is the desirable security goal. However, there are only a very small number of schemes achieving this ...
Statistical process control ($SPC$), an internationally recognized technique for improving product quality and productivity, has been widely employed in various industries. $SPC$ relies on the use of control charts to monitor a manufacturing process for identifying causes of process variation and signaling the necessity of corrective action for the process. Fuzzy data exist ubiquitously in the ...
the effect of symmetric (non-symmetric) foreign exchange rate shocks on iranian agricultural import and exports was explored throughout the current research.. time series of 1973-2007 along with hodrick and prescott filter method were employed. the results as obtained through vector error correction and johnson model indicated that positive (negative) shocks introduce positive (negative) effect...
Searchable encryption allows an untrusted server to search on encrypted data without knowing the underlying data contents. Traditional searchable encryption schemes focus only on single keyword or conjunctive keyword search. Several solutions have been recently proposed to design more expressive search criteria, but most of them are in the setting of symmetric key encryption. In this paper, bas...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید