A pseudoinverse deformation vector field generator and its applications
نویسندگان
چکیده
منابع مشابه
Fan-KKM Theorem in Minimal Vector Spaces and its Applications
In this paper, after reviewing some results in minimal space, some new results in this setting are given. We prove a generalized form of the Fan-KKM typetheorem in minimal vector spaces. As some applications, the open type of matching theorem and generalized form of the classical KKM theorem in minimal vector spaces are given.
متن کاملSiderophore and Its Applications in the Field of Bioenvironmental Researches
Iron, one of the essential micronutrients, is needed for electron transport and metabolic processes in almost all living organisms. The ferric form (Fe3+) of iron is insoluble in nature and inaccessible at physiological pH (7.35–7.40). Under iron-limited conditions, metal-chelating agents such as siderophores are synthesized by many bacteria and a few fungi. Siderophores have a high affinity fo...
متن کاملA New Monodisperse Droplet Generator and its Applications
Monodisperse droplet standards are valuable for calibrating spray diagnostics instrumentation and for investigating the effect of drop diameter on the spray phenomena, such as droplet combustion and droplet-film interaction. There is a growing interest in finer monodisperse droplets. To address this need, a new instrument for generating a wide range of monodisperse droplets is introduced, which...
متن کاملfan-kkm theorem in minimal vector spaces and its applications
in this paper, after reviewing some results in minimal space, some new results in this setting are given. we prove a generalized form of the fan-kkm typetheorem in minimal vector spaces. as some applications, the open type of matching theorem and generalized form of the classical kkm theorem in minimal vector spaces are given.
متن کاملEfficient Hidden Vector Encryptions and Its Applications
Predicate encryption is a new paradigm of public key encryption that enables searches on encrypted data. Using the predicate encryption, we can search keywords or attributes on encrypted data without decrypting the ciphertexts. In predicate encryption, a ciphertext is associated with attributes and a token corresponds to a predicate. The token that corresponds to a predicate f can decrypt the c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Medical Physics
سال: 2010
ISSN: 0094-2405
DOI: 10.1118/1.3301594