نتایج جستجو برای: depth of unobservability

تعداد نتایج: 21170537  

Journal: :journal of algebraic systems 2015
moharram aghapournahr khadijeh ahmadi-amoli miryousef sadeghi

‎we introduce a generalization of the notion of‎ depth of an ideal on a module by applying the concept of‎ local cohomology modules with respect to a pair‎ ‎of ideals‎. ‎we also introduce the concept of $(i,j)$-cohen--macaulay modules as a generalization of concept of cohen--macaulay modules‎. ‎these kind of modules are different from cohen--macaulay modules‎, as an example shows‎. ‎also an art...

Journal: :international journal of environmental research 0

light is never being distributed homogeneously and it forms a gradient over biomass. the unidirectional nature of light gives rise to a vertical gradient of light intensity as a function of depth. the maximum depth of the light zone suitable for phytoplankton photosynthesis is designated as the euphotic depth. this study was designed to test the hypothesis of mixing depth of phytoplankton and i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract this study was carried out to compare disinfecting effects of nanosilver with other feed disinfectants on layer hen performance, immune system, gastrointestinal microflora and intestinal morphology. total of 90 layers (lsl) were divided into five groups consisting: 1-control, 2- formalin (200 ppm), 3- formaycin (200 ppm), 4- nanosilver in drinking water (7.5 ppm) and 5-nanosilver in f...

2009
Willem M. de Muynck

The EPR problem is studied both from an instrumentalistic and from a realistic point of view. Bohr’s reply to the EPR paper is analyzed and demonstrated to be not completely representative of Bohr’s general views on the possibility of defining properties of a microscopic object. A more faithful Bohrian answer would not have led Einstein to the conclusion that Bohr’s completeness claim of quantu...

2006
Liang-qun Li

For maneuvering target tracking with multiple passive sensors in clutter environment, a novel tracking algorithm based on maximum entropy fuzzy clustering is proposed. Firstly, the interacting multiple models (IMM) approach is used to solve the maneuver problem of the target, and the false alarms generated by clutter are accommodated through maximum entropy fuzzy probabilistic data association ...

2007
Maya Gadzheva

In an ambient intelligent (AmI) environment with computing capabilities embedded in potentially every object it will be difficult (if not impossible) for users to maintain control over data generation, transfer, and use and to achieve unobservability and anonymity. Obtaining consent might not be feasible for the constant need for collection and exchange of incredible amount of data. In most cas...

Journal: :IACR Cryptology ePrint Archive 2013
Nethanel Gelernter Amir Herzberg

We present DURP, a decentralized protocol for unobservable, anonymous reporting to an untrusted destination, with low latency and overhead. DURP provably ensures strong anonymity properties, as required for some applications (and not provided by existing systems and practical designs, e.g., Tor), specifically: − Provable unobservability against global eavesdropper and malicious participants. − ...

2013
Arun Kumar S A. Mary Mekala

In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn’t need to consider the mobility of the node. But in wireless network it needs to keep the mobility information in the protected way. To give a privacy protection in th...

2006
Béatrice Bérard Paul Gastin Antoine Petit

We propose in this paper a construction for a “well known” result: regular signal-event languages are closed by intersection. In fact, while this result is indeed trivial for languages defined by Alur and Dill’s timed automata (the proof is an immediate extension of the one in the untimed case), it turns out that the construction is much more tricky when considering the most involved model of s...

2000
Joachim Rosenthal

The article reviews different definitions for a convolutional code which can be found in the literature. The algebraic differences between the definitions are worked out in detail. It is shown that bi-infinite support systems are dual to finite-support systems under Pontryagin duality. In this duality the dual of a controllable system is observable and vice versa. Uncontrollability can occur on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید