نتایج جستجو برای: Dual Methods

تعداد نتایج: 2008891  

Journal: :int. journal of mining & geo-engineering 2012
m.r jalali m.b dusseault

large amounts of hydrocarbon reserves are trapped in naturally fractured reservoirs which arechallenging in terms of accurate recovery prediction because of their joint fabric complexity andlithological heterogeneity. canada, for example, has over 400 billion barrels of crude oil in fracturedcarbonates in alberta, most of this being bitumen of viscosity greater than 106 cp in the grosmontformat...

Journal: :SIAM J. Numerical Analysis 2001
Chisup Kim Raytcho D. Lazarov Joseph E. Pasciak Panayot S. Vassilevski

We consider the construction of multiplier spaces for use with the mortar finite element method in three spatial dimensions. Abstract conditions are given for the multiplier spaces which are sufficient to guarantee a stable and convergent mortar approximation. Three examples of multipliers satisfying these conditions are given. The first one is a dual basis example while the remaining two are b...

2001
Eri A. Wan Alex T. Nelson

Journal: :Des. Codes Cryptography 2017
Jon-Lark Kim Nari Lee

As far as we know, there is no decoding algorithm of any binary self-dual [40, 20, 8] code except for the syndrome decoding applied to the code directly. This syndrome decoding for a binary self-dual [40, 20, 8] code is not efficient in the sense that it cannot be done by hand due to a large syndrome table. The purpose of this paper is to give two new efficient decoding algorithms for an extrem...

Journal: :iranian journal of mathematical sciences and informatics 0
m. r. peyghami faculty of matematics s. fathi hafshejani faculty of matematics

in this paper, we consider convex quadratic semidefinite optimization problems and provide a primal-dual interior point method (ipm) based on a new kernel function with a trigonometric barrier term. iteration complexity of the algorithm is analyzed using some easy to check and mild conditions. although our proposed kernel function is neither a self-regular (sr) function nor logarithmic barrier ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1387

چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان می‎دهد که علی‎رغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گسترده‎ای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت می‎توان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Discrete Applied Mathematics 1987

Journal: :Communications, Faculty Of Science, University of Ankara Series A1Mathematics and Statistics 1984

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید