نتایج جستجو برای: positive proper efficient solution
تعداد نتایج: 1580969 فیلتر نتایج به سال:
In this paper, we prove the existence of the solution for boundary value prob-lem(BVP) of fractional dierential equations of order q 2 (2; 3]. The Kras-noselskii's xed point theorem is applied to establish the results. In addition,we give an detailed example to demonstrate the main result.
In this paper, we prove the existence of the solution for boundary value prob-lem(BVP) of fractional dierential equations of order q 2 (2; 3]. The Kras-noselskii's xed point theorem is applied to establish the results. In addition,we give an detailed example to demonstrate the main result.
A new approach for computationally efficient estimation of stability factors for parametric partial differential equations is presented. The general parametric bilinear form of the problem is approximated by two affinely parametrized bilinear forms at different levels of accuracy (after an empirical interpolation procedure). The successive constraint method is applied on the coarse level to obt...
A lot of work has been done on routing protocols for mobile ad hoc networks, but still standardization of them requires some more issues less addressed by the existing routing protocols. In this paper a new paradigm of maintaining multiple connections in adhoc routing protocols has been highlighted which may be crucial for efficient routing in mobile ad hoc networks. The problem of multiple con...
Let Ω be a domain in RN , N ≥ 1, and 2∗ = ∞ if N = 1, 2, 2∗ = 2N N−2 if N > 2, 2 < p < 2 ∗. Consider the semilinear elliptic problem −∆u+ u = |u|p−2u in Ω; u ∈ H 0 (Ω). Let H1 0 (Ω) be the Sobolev space in Ω. The existence, the nonexistence, and the multiplicity of positive solutions are affected by the geometry and the topology of the domain Ω. The existence, the nonexistence, and the multipli...
National Statistical Agencies (NSAs) routinely release large amounts of tabular information. Prior to dissemination, tabular data need to be processed to avoid the disclosure of individual confidential information. Cell suppression is one of the most widely used techniques by NSAs. Optimal procedures for cell suppression are computationally expensive with large real-world data, and heuristic pr...
in this work, by employing the krasnosel'skii fixed point theorem, we study the existence of positive solutions of a three-point boundary value problem for the following fourth-order differential equation begin{eqnarray*} left { begin{array}{ll} u^{(4)}(t) -f(t,u(t),u^{prime prime }(t))=0 hspace{1cm} 0 leq t leq 1, & u(0) = u(1)=0, hspace{1cm} alpha u^{prime prime }(0) - beta u^{prime prim...
Currently more and more agents are involved in human routine activities and a mixed human-agent society is thus formed by the humans and the agents involved. The relationship between humans and agents in this mixed society is subtle and it is vital to explore the influence that agents bring into the society. In this paper, we try to investigate a few questions: will humans act differently towar...
Let X1,X2, . . . , be independent random variables with EXi = 0 and write Sn = ∑ n i=1 Xi and V 2 n = ∑ n i=1 X i . This paper provides an overview of current developments on the functional central limit theorems (invariance principles), absolute and relative errors in the central limit theorems, moderate and large deviation theorems and saddle-point approximations for the self-normalized sum S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید