نتایج جستجو برای: ZTZ factorization

تعداد نتایج: 21785  

Journal: :bulletin of the iranian mathematical society 0
effat golpar-raboky university of qom n. mahdavi-amiri sharif university of technology

classes of‎ ‎abaffy-broyden-spedicato (abs) methods have been introduced for‎ ‎solving linear systems of equations‎. ‎the algorithms are powerful methods for developing matrix‎ ‎factorizations and many fundamental numerical linear algebra processes‎. ‎here‎, ‎we show how to apply the abs algorithms to devise algorithms to compute the wz and zw‎ ‎factorizations of a nonsingular matrix as well as...

Journal: :bulletin of the iranian mathematical society 2014
effat golpar-raboky n. mahdavi-amiri

classes of‎ ‎abaffy-broyden-spedicato (abs) methods have been introduced for‎ ‎solving linear systems of equations‎. ‎the algorithms are powerful methods for developing matrix‎ ‎factorizations and many fundamental numerical linear algebra processes‎. ‎here‎, ‎we show how to apply the abs algorithms to devise algorithms to compute the wz and zw‎ ‎factorizations of a nonsingular matrix as well as...

Classes of‎ ‎Abaffy-Broyden-Spedicato (ABS) methods have been introduced for‎ ‎solving linear systems of equations‎. ‎The algorithms are powerful methods for developing matrix‎ ‎factorizations and many fundamental numerical linear algebra processes‎. ‎Here‎, ‎we show how to apply the ABS algorithms to devise algorithms to compute the WZ and ZW‎ ‎factorizations of a nonsingular matrix as well as...

2018
Sushmita Poddar Pei She Loh Zi Hao Ooi Farhana Osman Joachim Eul Volker Patzel

Received 28 July 2017; accepted 17 January 2018; https://doi.org/10.1016/j.omtn.2018.01.006. Present address: Institute for Transfusion Medicine and Gene Therapy & Center for Chronic Immunodeficiency at Center for Translational Cell Research (ZTZ), Medical Center University of Freiburg, Freiburg, Baden Württemberg 79106, Germany Present address: EIU Clearstate, Singapore 138567, Singapore Prese...

The textit{QIF}  (Quadrant Interlocking Factorization) method of Evans and Hatzopoulos solves linear equation systems using textit{WZ}  factorization. The  WZ factorization can be faster than the textit{LU} factorization  because,  it performs the simultaneous evaluation of two columns or two rows. Here, we present a  method for computing the real and integer textit{WZ} and  textit{ZW} factoriz...

In this article the notions of semi weak orthogonality and semi weak factorization structure in a category $mathcal X$ are introduced. Then the relationship between semi weak factorization structures and quasi right (left) and weak factorization structures is given. The main result is a characterization of semi weak orthogonality, factorization of morphisms, and semi weak factorization structur...

ژورنال: پژوهش های ریاضی 2019

Introduction Suppose that  is a commutative ring with identity,  is a unitary -module and  is a multiplicatively closed subset of .  Factorization theory in commutative rings, which has a long history, still gets the attention of many researchers. Although at first, the focus of this theory was factorization properties of elements in integral domains, in the late nineties the theory was gener...

In this paper, we define a new concept of factorization for a bounded bilinear mapping $f:Xtimes Yto Z$, depended on  a natural number $n$ and a cardinal number $kappa$; which is called $n$-factorization property of level $kappa$. Then we study the relation between $n$-factorization property of  level $kappa$ for $X^*$ with respect to $f$ and automatically boundedness and $w^*$-$w^*$-continuity...

Journal: :journal of sciences, islamic republic of iran 2010
h. mehraban

we used qcd factorization for the hadronic matrix elements to show that the existing data, in particular the branching ratios br ( ?j/?k) and br ( ?j/??), can be accounted for this approach. we analyzed the decay within the framework of qcd factorization. we have complete calculation of the relevant hard-scattering kernels for twist-2 and twist-3. we calculated this decays in a special scale ( ...

1991
Peter de Rooij

In this paper, it is shorn that the Schnorr scheme with preprocessing BE proposed in I41 leaks too much information. An attack based on this information leakage is presented that retrieves the secret key. The complexity of this attack is upper bounded by 2k. b3(d-2) steps, and the expected required number of signatures is lees than Zk: .(j)"-', where k is a security parameter. This complexity i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید