Least square based method for obtaining one-particle spectral functions from temperature Green functions
نویسندگان
چکیده
منابع مشابه
Extracting spectral properties from Keldysh Green functions.
We investigate the possibility to assist the numerically ill-posed calculation of spectral properties of interacting quantum systems in thermal equilibrium by extending the imaginary-time simulation to a finite Schwinger-Keldysh contour. The effect of this extension is tested within the standard maximum entropy approach to analytic continuation. We find that the inclusion of real-time data impr...
متن کاملApplication of PROMETHEE method for green supplier selection: a comparative result based on preference functions
The PROMETHEE is a significant method for evaluating alternatives with respect to criteria in multi-criteria decision-making problems. It is characterized by many types of preference functions that are used for assigning the differences between alternatives in judgements. This paper proposes a preference of green suppliers using the PROMETHEE under the usual criterion preference functions. Comp...
متن کاملExact observability, square functions and spectral theory
In the first part of this article we introduce the notion of a backwardforward conditioning (BFC) system that generalises the notion of zero-class admissibiliy introduced in [21]. We can show that unless the spectum contains a halfplane, the BFC property occurs only in siutations where the underlying semigroup extends to a group. In a second part we present a sufficient condition for exact obse...
متن کاملRELIABILITY-BASED DESIGN OPTIMIZATION OF COMPLEX FUNCTIONS USING SELF-ADAPTIVE PARTICLE SWARM OPTIMIZATION METHOD
A Reliability-Based Design Optimization (RBDO) framework is presented that accounts for stochastic variations in structural parameters and operating conditions. The reliability index calculation is itself an iterative process, potentially employing an optimization technique to find the shortest distance from the origin to the limit-state boundary in a standard normal space. Monte Carlo simulati...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Physics Communications
سال: 2013
ISSN: 0010-4655
DOI: 10.1016/j.cpc.2012.09.019