Dependence of tree copy functions

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dependence of tree copy functions

The graph copy function when restricted to the set of trees or of rooted trees is called the tree copy function or the rooted tree copy function, respectively. We show that both the set of tree copy functions and the set of rooted tree copy functions are strongly linearly independent. We also show that the set of all tree copy functions are algebraically independent but the set of all rooted tr...

متن کامل

Study of Cognitive Functions of Continuous Attention, Decision-Making and Response Inhibition in Subjects withMethamphetamine Dependence

Background and Objectives: Drug abuse can have long- and short-term effects on the cognitive function of individuals due to changes in brain structure and function. These effects often manifest themselves in the form of chronic and acute neuropsychological abnormalities. The purpose of this study was to investigate several cognitive functions, i.e., continuous attention, decision-making, and re...

متن کامل

Difference Functions of Dependence Spaces

Here the reduction problem is studied in an algebraic structure called dependence space. We characterize the reducts by the means of dense families of dependence spaces. Dependence spaces defined by indiscernibility relations are also considered. We show how we can determine dense families of dependence spaces induced by indiscernibility relations by applying indiscernibility matrices. We also ...

متن کامل

Evaluation of estimation methods for parameters of the probability functions in tree diameter distribution modeling

One of the most commonly used statistical models for characterizing the variations of tree diameter at breast height is Weibull distribution. The usual approach for estimating parameters of a statistical model is the maximum likelihood estimation (likelihood method). Usually, this works based on iterative algorithms such as Newton-Raphson. However, the efficiency of the likelihood method is not...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Discrete Mathematics

سال: 1985

ISSN: 0012-365X

DOI: 10.1016/s0012-365x(85)80004-2