نتایج جستجو برای: irresolute maps

تعداد نتایج: 106854  

2007
Christo Dichev Darina Dicheva Jan Fischer

The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a subject is involved when one wants to say something about that subject or when he or she tries to comprehend what was said by others about it. An example of this type of duality can be seen in the information world where ...

1999
J. S. CANOVAS Shihai Li

The aim of this paper is to prove the following results: a continuous map f : [0, 1]→ [0, 1] is chaotic iff the shift map σf : lim ← ([0, 1], f)→ lim ← ([0, 1], f) is chaotic. However, this result fails, in general, for arbitrary compact metric spaces. σf : lim ← ([0, 1], f) → lim ← ([0, 1], f) is chaotic iff there exists an increasing sequence of positive integers A such that the topological s...

2014
Christian Koops

Houston Anglos of all ages show advanced degrees of /u/-fronting. However, a close acoustic analysis of the fronted /u/ of younger and older Anglo Houstonians reveals two distinct types: a more monophthongal type, consistent with prior descriptions of fronted /u/ in the rural South, and a more diphthongal type, consistent with descriptions of /u/-fronting in non-Southern speakers. The two types...

Journal: :Earth Science Informatics 2009
Odilon Corrêa da Silva Jugurta Lisboa Filho José Luís Braga Karla A. V. Borges

Concern for environmental issues has become a reality in all sectors of society, mainly among researchers and professionals who work directly with environmental status. In this context, several studies have been undertaken on sustainable development of the Brazilian Amazon, generating a large amount of data and information. Environmental area characterization involves the knowledge about their ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1390

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

2004
Jonathan Yu James A. Thom Leila Alem

A group memory of a project is an information space storing the documents produced and exchanged by members of the group, which may include the electronic discussions that took place during the life of the project. Accessing the information in the group memory using a traditional text search method is not always effective as the relationship between the documents and emails (for example the con...

2002
Bénédicte Le Grand Michel Soto

Topic maps are very powerful as they allow to organize information, but they may be very large. Intuitive visual user interfaces may significantly reduce the cognitive load of the user when working with these complex structures. Visualization is a promis ing technique for both enhancing users' perception of structure in large information spaces and providing navigation facilities. It also enabl...

Journal: :iJOE 2007
Sebastian J. F. Fudickar Klaus Rebensburg

Since the Topic Map standard describes a prospective knowledge-structuring model that can be used in a huge variety of knowledge domains the amount of applications utilizing this standard grew enormously. Anyhow, as far as we know, there is no distributed editor of Topic Maps available on the market, that supports an intuitive possibility to manipulate or visualize Topic Maps in the World Wide ...

Journal: :Signal Processing 2014
Yicong Zhou Long Bao C. L. Philip Chen

This paper introduces a simple and effective chaotic system using a combination of two existing one-dimension (1D) chaotic maps (seed maps). Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps. To investigate its applications in multimedia security, a n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید