نتایج جستجو برای: algebraic generation

تعداد نتایج: 411247  

Journal: :iranian journal of fuzzy systems 2011
qi-ye zhang

in this paper, let $l$ be a completeresiduated lattice, and let {bf set} denote the category of setsand mappings, $lf$-{bf pos} denote the category of $lf$-posets and$lf$-monotone mappings, and $lf$-{bf cslat}$(sqcup)$, $lf$-{bfcslat}$(sqcap)$ denote the category of $lf$-completelattices and $lf$-join-preserving mappings and the category of$lf$-complete lattices and $lf$-meet-preserving mapping...

Journal: :Computers & Mathematics with Applications 1994

2005
I. A. Ismail E. H. Ali

Tok tekutiny ostro lomeným potrubím v tvare V In this paper we study a viscous fluid flow over a V-shaped body for a range of Reynold's number from Re = 5 up to Re = 500. We solved the unsteady Naveir-stokes equations in the stream function vorticity formulation. The irregular physical domain is transformed into a rectangular shape using the elliptic grid generation. We applied the Finite difer...

A numerical method for solving linear integral equations of the second kind is formulated. Based on a special representation of vector forms of triangular functions and the related operational matrix of integration, the integral equation reduces to a linear system of algebraic equations. Generation of this system needs no integration, so all calculations can easily be implemented. Numerical res...

1999
Pascal Poizat Christine Choppy Jean-Claude Royer

Methods are needed to help using formal speciications in a practical way. We herein present a method for the development of mixed systems, i.e. systems with both a static and a dynamic part. Our method helps the speciier providing means to structure the system in terms of communicating subcomponents and to give the sequential components using a semi-automatic concurrent automata generation with...

2010
Mingqiang Wang Haifeng Zhang

We provide a new method of constructing an optimal lattice. Applying our method to the cryptanalysis of the short exponent RSA, we obtain our results which extend Boneh and Durfee’s work. Our attack methods are based on a generalization to multivariate modular polynomial equation. The results illustrate the fact that one should be careful when using RSA key generation process with special param...

Journal: :Science of Computer Programming 1988

Journal: :algebraic structures and their applications 2014
habib sharif

let $k$ be a field of characteristic$p>0$, $k[[x]]$, the ring of formal power series over $ k$,$k((x))$, the quotient field of $ k[[x]]$, and $ k(x)$ the fieldof rational functions over $k$. we shall give somecharacterizations of an algebraic function $fin k((x))$ over $k$.let $l$ be a field of characteristic zero. the power series $finl[[x]]$ is called differentially algebraic, if it satisfies...

Journal: :Journal of Pure and Applied Algebra 2004

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید