نتایج جستجو برای: pseudo multiplication
تعداد نتایج: 75195 فیلتر نتایج به سال:
Weakly median graphs, being defined by interval conditions and forbidden induced subgraphs, generalize quasi-median graphs as well as pseudo-median graphs. It is shown that finite weakly median graphs can be decomposed with respect to gated amalgamation and Cartesian multiplication into 5-wheels, induced subgraphs of hyperoctahedra (alias cocktail party graphs), and 2-connected bridged graphs n...
Abstract-The one-speed critical problem is solved for a two-region sphere, where the total cross section is common, but different multiplication parameters in the two zones are permitted. A transform procedure is used to reduce the integral transport equation to a pseudo problem in slab geometry. This, in turn, is solved by Case’s method of normal modes. The analysis leads to a Fredholm integra...
We present a method to increase the dynamical range of a Residue Number System (RNS) by adding virtual RNS layers on top of the original RNS, where the required modular arithmetic for a modulus on any non-bottom layer is implemented by means of an RNS Montgomery multiplication algorithm that uses the RNS on the layer below. As a result, the actual arithmetic is deferred to the bottom layer. The...
In this paper, a renewable, multi-use, multi-secret sharing scheme for general access structure based on one-way collision resistant hash function is presented in which each participant has to carry only one share. By applying collision-resistant one-way hash function, the proposed scheme is secure against conspiracy attacks even if the pseudo-secret shares are compromised. Moreover, high compl...
In this paper, some results of the Chebyshev type integral inequality for the pseudo-integral are proven. The obtained results, are related to the measure of a level set of the maximum and the sum of two non-negative integrable functions. Finally, we applied our results to the case of comonotone functions.
The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement all cryptographic primitives from scratch. However, most existing implementations o...
the aim of this paper is to generalize thenotion of pseudo-almost valuation domains to arbitrary commutative rings. it is shown that the classes of chained rings and pseudo-valuation rings are properly contained in the class of pseudo-almost valuation rings; also the class of pseudo-almost valuation rings is properly contained in the class of quasi-local rings with linearly ordere...
The concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules was recently introduced by Omar A. Abdullah and Haibat K. Mohammadali in 2022, where he studies this it is relationship to previous generalizationsm especially 2-Absorbing submodule submodule, addition studying most important Propositions, charactarizations Examples. Now research, which considered a continuation definition tha...
Three equivalence relations are considered on the set of n x n matrices with elements in Fo' an · abelian group with absorbing zero adjoined. They are the relations of diagonal similarity, diagonal equivalence, and restricted diagonal equivalence. These relations are usually considered for matrices with elements in a field, but only multiplication is involved. Thus our formulation in terms of a...
Quantum chaotic states over a noncommutative monoid, a unitalization of a noncommutative Ito algebra parametrizing a quantum stochastic Levy process, are described in terms of their infinitely divisible generating functionals over the simple monoid-valued fields on an atomless ‘space-time’ set. A canonical decomposition of the logarithmic conditionally posive-definite generating functional is c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید