0
  1. Trang chủ >
  2. Khoa Học Tự Nhiên >
  3. Toán học >

RESEARCH ARTICLE An ergodic approach to the Ky Fan inequality over the fixed point set

An innovative approach to the aesthetic design pdf

An innovative approach to the aesthetic design pdf

... implies to have tools able to preserve the aesthetic design intent during the required model modifications and able to extract the aesthetic character from CAD models and compare it to others and/or ... by designers on the selected entities, and on the other hand to measure some shape properties to provide the interpretation of the object character Due to their first usage, these modelling tools ... In the following the activities carried out to achieve the above objectives, are illustrated The langua ge of aesthetic design To explore the possible relationships between product shape and aesthetic...
  • 12
  • 348
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets" pot

... the total number of normal data The false negative rate is defined as the total number of attack data that were incorrectly classified as normal traffic divided by the total number of attack data 7.1 ... Udpstorm, ICMP flood, Teardrop attacks, Peer-topeer attacks, Permanent denial-of-service attacks, Application level floods, Nuke, Distributed attack, Reflected attack, Degradation-of-service attacks, ... because each data value is too small or too few points are assigned to a cluster center due to a bad initialization of the means In case of internet traffic, this problem can also occur because each...
  • 14
  • 499
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A New Approach to q-Bernoulli Numbers and q-Bernoulli Polynomials Related to q-Bernstein Polynomials" pdf

... present a new generating function related to the q-Bernoulli numbers and q-Bernoulli polynomials and give a new construction of these numbers and polynomials related to the second kind Stirling numbers ... are associated with q-Bernstein polynomials New Approach to q-Bernoulli Numbers and Polynomials Let N be the set of natural numbers and N∗ q-Bernoulli polynomials Bn,q x as follows, ∞ −t Dq t, ... relations for the q-Bernoulli polynomials and have some identities involving q-Bernoulli numbers and polynomials related to the second kind Stirling numbers and q-Bernstein polynomials Finally, we derive...
  • 9
  • 442
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article An Alternative Method to Compute the Bit Error Probability of Modulation Schemes Subject to Nakagami-m Fading" pdf

... for the BEP of M-QAM subject to Nakagami-m fading Section is devoted to the derivation of an exact expression for the BEP of an M-PAM subject to Nakagami-m fading, while Section deals with the ... symbol error probability for the 16-Star QAM subject to fading Concerning the performance evaluation of communication systems for Nakagami fading channels, the bit error rate performance of multiple-input ... method to obtain the BEP of modulation schemes subject to Nakagami-m fading In the approach, the Nakagami-m fading channel is seen as an additive noise channel whose noise is modeled as the ratio between...
  • 12
  • 404
  • 0
Báo cáo sinh học:

Báo cáo sinh học: " Research Article An Upper Bound on the Critical Value β∗ Involved in the Blasius Problem" pot

... and Computation, vol 202, no 1, pp 406–412, 2008 13 K Q Lan and G C Yang, “Positive solutions of the Falkner-Skan equation arising in the boundary layer theory,” Canadian Mathematical Bulletin, ... historical study on the Blasius problem and analyzed the case β < in details, in which the shape and the number of solutions were determined We may refer to 14 and the references therein for more ... arising in boundary layer theory,” Journal of Mathematical Analysis and Applications, vol 233, no 1, pp 246–256, 1999 10 R P Agarwal and D O’Regan, “Singular integral equations arising in Homann...
  • 6
  • 348
  • 0
Báo cáo hóa học:

Báo cáo hóa học: "Research Article A Novel Approach to the Design of Oversampling Low-Delay Complex-Modulated Filter Bank Pairs" doc

... notice that this time the tolerance mask is always touched by the magnitude response This can be traced back to the fact that, for the SFB, the steps of the tolerance mask are much smaller, not ... in the passband and the transition bands As the objective function to be minimised we adopt a particular representation of the group delay [20], while the stopband magnitude specifications of the ... properties are designed and their performances are compared Moreover, the effect of the number of subbands, the oversampling factors, and the length of the prototype filter are also studied Using the...
  • 13
  • 623
  • 0
Báo cáo hoa học:

Báo cáo hoa học: " Research Article An Approximation Approach to Eigenvalue Intervals for Singular Boundary Value Problems with Sign Changing and Superlinear " doc

... Mathematical Analysis and Applications, vol 181, no 3, pp 684–700, 1994 H Lu, D O’Regan, and R P Agarwal, An approximation approach to eigenvalue intervals for ¨ singular boundary value problems with sign ... sign changing nonlinearities,” Mathematical Inequalities and Applications, vol 11, no 1, pp 81–98, 2007 H Lu, D O’Regan, and R P Agarwal, “Existence to singular boundary value problems with sign ... Netherlands, 2003 R P Agarwal and D O’Regan, “Twin solutions to singular Dirichlet problems, ” Journal of Mathematical Analysis and Applications, vol 240, no 2, pp 433–445, 1999 D O’Regan, Theory...
  • 34
  • 348
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A Generalized Approach to Linear Transform Approximations with Applications to the Discrete Cosine Transform" pptx

... specific transform (say DCT) approximation and distortion, there is no framework that enables us to systematically change the approximation in real-time to take advantage of additional computational ... set that adapts to the available computational resources We will show how to compute and embed metadata in the image as well as show a decoding algorithm to allow for adaptive approximation The ... evaluate the approximation candidate set Φ Then the optimal approximation candidate set Φ∗ (T) for an input set X for the linear X transform T is defined as the approximation candidate set with...
  • 17
  • 367
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article An Adaptive Approach to Granular Real-Time Anomaly Detection" pot

... Protocol,” RFC 792, September 1981 [28] V Paxson and M Allman, “Computing TCP’s Retransmission Timer,” RFC 2988, November 2000 [29] J Janies and C.-T Huang, “Fates: a granular approach to real-time ... begins to drop packets Combined, these two reasons suggest that a granular approach with lightweight computation loads is an appropriate next step in advancing anomaly- based intrusion detection to ... of the network topology and event management to initialize the system This is similar to an approach discussed by Jung et al [20] to aid in distinguishing between flash crowds and DDoS attacks...
  • 13
  • 340
  • 0
Báo cáo hóa học:

Báo cáo hóa học: "Research Article An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel" ppt

... secrecy capacity of the general MIMO Gaussian wiretap channel (1) can be reduced to characterizing the secrecy capacity of the canonical version (7) For full details the reader is referred to [7], and ... first consider the degraded MIMO Gaussian wiretap channel, that is, Kr Ke Theorem The secrecy capacity of the degraded MIMO Ke , under the powerGaussian wiretap channel (7), Kr covariance constraint ... leads to an − invertible matrix C, which is I + S1/2 Ke S1/2 -orthonormal Using these definitions we turn to the main theorem of this paper Theorem The secrecy capacity of the MIMO Gaussian wiretap...
  • 8
  • 326
  • 0
Báo cáo hóa học:

Báo cáo hóa học: "Research Article Metamodeling Techniques Applied to the Design of Reconfigurable Control Applications" doc

... include the definition of a more formal methodology to develop specific plant model, the development of tools supporting the configuration phase of the model, the study of how to model the scheduling ... manipulation General criteria to find entities and relations put into the metamodel pass through the analysis of the level of configurability and reconfigurability of the set of the addressed manufacturing ... thus allowing to react more rapidly to market changes and needs In addition, it focuses mainly on the design of the MES functionalities of the control system For these reasons, the main entities,...
  • 9
  • 326
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A Variational Approach to the Modeling of MIMO Systems" docx

... clever way to extract information from this matrix without going into involved mathematical analysis The idea is to optimize the above scattering equation using a variation approach (11) together ... difference |rab ≡ |ra − |rb with a = b To make contact with the variational analysis given above, this difference can also be read as |rab = |ra + |δra Then compute the minimum of the distance |rab in ... is mapped onto one of the multiple NT antennas After filtering and amplification, the signals are launched into the wireless channel At the receiver, the signals are captured by NR antennas and...
  • 10
  • 548
  • 0
Báo cáo hóa học:

Báo cáo hóa học: " Research Article A Systematic Approach to Design Low-Power Video Codec Cores" doc

... vector q for the EURASIP Journal on Embedded Systems Full Op mode Addr Data in Data out Block Block ··· Block n − Data Data Data Data Data Data Data Data ··· ··· ··· ··· Data k − Data k − Data ... edges are relaxed: partial releases are added to the typically random accessible data in the container of a token These partial releases enable releasing only a part of the acquired tokes to support ... Yokohama, Japan, January 2006 F Haim, M Sen, D.-I Ko, S S Bhattacharyya, and W Wolf, “Mapping multimedia applications onto configurable hardware with parameterized cyclo-static dataflow graphs,”...
  • 14
  • 441
  • 0
RESEARCH ARTICLE An ergodic approach to the Ky Fan inequality over the fixed point set

RESEARCH ARTICLE An ergodic approach to the Ky Fan inequality over the fixed point set

... problem V I(F, C), the sequence {xk } may not be convergent In this paper, we propose new and simple algorithms for solving the Ky Fan inequality over the fixed point set of nonexpansive mappings ... that the iterative sequence globally converges to a solution of Problem KF (f, F ix(T )) The paper is organized as follows Section recalls some concepts related to the Ky Fan inequality over the ... converged to a point in Problem KF (f, F ix(T )) without the metric projection onto a closed convex set The ergodic iteration technique is known to be a powerful tool for analyzing, solving monotone...
  • 7
  • 201
  • 0

Xem thêm

Từ khóa: Báo cáo quy trình mua hàng CT CP Công Nghệ NPVchuyên đề điện xoay chiều theo dạngNghiên cứu tổ chức pha chế, đánh giá chất lượng thuốc tiêm truyền trong điều kiện dã ngoạiNghiên cứu vật liệu biến hóa (metamaterials) hấp thụ sóng điện tử ở vùng tần số THzđề thi thử THPTQG 2019 toán THPT chuyên thái bình lần 2 có lời giảiBiện pháp quản lý hoạt động dạy hát xoan trong trường trung học cơ sở huyện lâm thao, phú thọGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitPhát triển mạng lưới kinh doanh nước sạch tại công ty TNHH một thành viên kinh doanh nước sạch quảng ninhPhát hiện xâm nhập dựa trên thuật toán k meansKiểm sát việc giải quyết tố giác, tin báo về tội phạm và kiến nghị khởi tố theo pháp luật tố tụng hình sự Việt Nam từ thực tiễn tỉnh Bình Định (Luận văn thạc sĩ)Quản lý nợ xấu tại Agribank chi nhánh huyện Phù Yên, tỉnh Sơn La (Luận văn thạc sĩ)BT Tieng anh 6 UNIT 2Tăng trưởng tín dụng hộ sản xuất nông nghiệp tại Ngân hàng Nông nghiệp và Phát triển nông thôn Việt Nam chi nhánh tỉnh Bắc Giang (Luận văn thạc sĩ)Tranh tụng tại phiên tòa hình sự sơ thẩm theo pháp luật tố tụng hình sự Việt Nam từ thực tiễn xét xử của các Tòa án quân sự Quân khu (Luận văn thạc sĩ)Nguyên tắc phân hóa trách nhiệm hình sự đối với người dưới 18 tuổi phạm tội trong pháp luật hình sự Việt Nam (Luận văn thạc sĩ)BÀI HOÀN CHỈNH TỔNG QUAN VỀ MẠNG XÃ HỘIĐổi mới quản lý tài chính trong hoạt động khoa học xã hội trường hợp viện hàn lâm khoa học xã hội việt namHIỆU QUẢ CỦA MÔ HÌNH XỬ LÝ BÙN HOẠT TÍNH BẰNG KIỀMTÁI CHẾ NHỰA VÀ QUẢN LÝ CHẤT THẢI Ở HOA KỲ