On Mersenne's number $M_{227}$ and cognate data
نویسندگان
چکیده
منابع مشابه
on semihypergroups and hypergroups
in this thesis, first the notion of weak mutual associativity (w.m.a.) and the necessary and sufficient condition for a $(l,gamma)$-associated hypersemigroup $(h, ast)$ derived from some family of $lesssim$-preordered semigroups to be a hypergroup, are given. second, by proving the fact that the concrete categories, semihypergroups and hypergroups have not free objects we will introduce t...
15 صفحه اولcompactifications and function spaces on weighted semigruops
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
15 صفحه اولCustomer Retention Based on the Number of Purchase: A Data Mining Approach
Purpose: this study wants to find any relationship between the numbers of purchase and the income the customer brings to the company. The attempt is to find those customers who buy more than one life insurance policy and represent the signs of good payments at the same time by the help of data mining tools. Design/ methodology/ approach: the approach of this research is to use data mining tools...
متن کاملOn clustering large number of data streams
Data streams and their applications appear in several fields such as physics, finance, medicine, environmental science, etc. As sensor technology improves, sensor data rates continue to increase. Consequently, analyzing data streams becomes ever more challenging. Fast online response is a must for applications that involve multiple data streams, especially when the number of data streams is lar...
متن کاملdata steganography on voip through combination of residue number system and dna sequences
today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when there is a connection between user a and b, user a shoul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the American Mathematical Society
سال: 1948
ISSN: 0002-9904
DOI: 10.1090/s0002-9904-1948-09012-7