نتایج جستجو برای: s note

تعداد نتایج: 844559  

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2011
Andris Ambainis Xiaoming Sun

In this note we give a new separation between sensitivity and block sensitivity of Boolean functions: bs(f) = 2 3 s(f) − 1 3 s(f).

2002

Burn-in (BI) for programmed Field Programmable Gate Arrays (FPGAs) is a growing concern in the space community. This application note addresses these concerns with regard to the Actel RT54SX-S and SX-A FPGA device families in an unprogrammed versus a programmed mode. This application note discusses the main differences between the architecture of the RT54SX-S and SX-A families and it describes ...

Chemical recovery of methyl acetoacetate from the amoxicillin plant’s waste stream was investigated. In process of amoxicillin production for activation of amoxicillin molecule, hydrolysis takes place at final stage. As a result methyl acetoacetate is formed. Liquid-liquid extraction was employed for the recovery of methyl acetoacetate from the waste stream. Diluted alkaline solution was used a...

Journal: :categories and general algebraic structures with applications 2013
victoria gould rida-e- zenab

the aim of this paper is to study semigroups possessing $e$-regular elements, where an element $a$ of a semigroup $s$ is {em $e$-regular} if $a$ has an inverse $a^circ$ such that $aa^circ,a^circ a$ lie in $ esubseteq e(s)$. where $s$ possesses `enough' (in a precisely defined way) $e$-regular elements, analogues of green's lemmas and even of green's theorem hold, where green's relations $mbox{$...

Journal: :acta medica iranica 0
m.a.rashed-mohassel ali m.hessabi

in a r etrospective s t udy on the c ancer o f the gal l bladder, done in iran, it s e ems tha t it compr ises 0 . 36% o f a ll the malignant tumors . 1 .7 5% of the patients were fema les and the maximum incidenc e wa s in t he s i x th decade of l i f e. it was interesting t o note that the age ratio bet ween t he males and f ema le s reverses with t he advance o f a ge, s o at the 7th and 8t...

Journal: :Automatica 1994
Soura Dasgupta Brian D. O. Anderson R. John Kaye

Abstmct-This note derives persistence of excitation The format of this note is the following. Section 2 stater conditions on the input for systems with partially known two excitation conditions involving both u(r) and y(t). stated transfer functions. The assumed transfer function model is i n Dasgupta n a1. (1985. 1988) and shows how they are [p,(s) + KIP(r)]/[q,,(s) + KrQ(s)]. where K is the u...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده علوم پایه 1393

در این رساله، ابتدا مفهوم *c- جبر را بیان می کنیم، سپس با تجزیه و تحلیل دقیق مقاله های dr. alexander a. katz, a note on two-sided ideals in locally c?-algebras, apr 2013. dr. a. a. katz,dr. o. friedman, on projective limits of real c?- and jordan operator algebras, oct 2005. مفهوم *c- جبرموضعی و قیاس های ژوردان و حقیقی از *c- جبرهای موضعی مختلط بیان می شود. در نهایت نشان می دهیم که اگر a یک ...

2016
Philipp Norton Constance Scharff

The human capacity for speech and vocal music depends on vocal imitation. Songbirds, in contrast to non-human primates, share this vocal production learning with humans. The process through which birds and humans learn many of their vocalizations as well as the underlying neural system exhibit a number of striking parallels and have been widely researched. In contrast, rhythm, a key feature of ...

2010
Peter Radchenko Gareth M. James

Note that νj([2S−1]) = 1 and νj(ρ) is a strictly increasing function for ρ < [S−1]−1. The proof of Theorem 2 in Wainwright (2009) establishes that for each value of the tuning parameter λ the necessary condition for the signed support recovery is |νj + Z̃j| ≤ 1 with Z̃j = λ−1XT j ΠX⊥ K ( ). Note that Zj follows a non-degenerate zeromean gaussian distribution for S < n, thus the probability of the...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon&apos;s protocol suffers from secret disclosure attack. the success probabilit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید