نتایج جستجو برای: computer operator
تعداد نتایج: 661921 فیلتر نتایج به سال:
With the ever increasing use of computers for critical systems, computer security, the protection of data and computer systems from intentional, malicious intervention, is attracting much attention. Among the methods for defence, intrusion detection, i.e. the application of a tool to help the operator identify ongoing or already perpetrated attacks has been the subject of considerable research ...
Geometric properties of evolutionary graph states spin systems generated by the operator evolution with Ising Hamiltonian are examined, using their relationship fluctuations energy. We find that geometric characteristics depend on corresponding graphs. Namely, it is obtained energy in and therefore velocity quantum evolution, curvature, torsion related to total number edges, triangles, squares ...
A recent trend in distributed computer-controlled systems (DCCS) is to interconnect the distributed elements by means of a multi-point broadcast network. As the network bus is shared between a number of network nodes, there is an access contention, which must be solved by the medium access control (MAC) protocol. Usually, DCCS impose real-time constraints. In essence, by real-time constraints w...
language learning courseware has been receiving growing attention by english educators since its advent. a variety of softwares have been designed by software designers and resorted to by language educators to supplement language textbooks. this experimental study investigated how the application of computerized version of language textbooks and the reception of the entire course through comput...
we consider the transitive linear maps on the operator algebra $b(x)$for a separable banach space $x$. we show if a bounded linear map is norm transitive on $b(x)$,then it must be hypercyclic with strong operator topology. also we provide a sot-transitivelinear map without being hypercyclic in the strong operator topology.
Handheld sensors are commonly used to assist in landmine location and removal. A number of computer systems aimed at assisting humans in discriminating between buried mines and other objects have been developed. Each such system requires some protocol that involves sweeping the sensor over a region of ground using some set of patterns to search for objects (detection) and determine the nature o...
In this paper, we state some results on product of operators with closed ranges and we solve the operator equation $TXS^*-SX^*T^*= A$ in the general setting of the adjointable operators between Hilbert $C^*$-modules, when $TS = 1$. Furthermore, by using some block operator matrix techniques, we nd explicit solution of the operator equation $TXS^*-SX^*T^*= A$.
A volume angiography system for on-line computation of left ventricular angiograms has been developed utilizing a video disc recorder, a light-pen unit, and a digital computer. The video disc recorder allows for immediate replay and stop-motion of ventricular angiograms on a video monitor. The light-pen is used by a technician/physician operator to define the margins of the ventricular chamber ...
in this paper we try to extend geometric concepts in the context of operator valued tensors. to this end, we aim to replace the field of scalars $ mathbb{r} $ by self-adjoint elements of a commutative $ c^star $-algebra, and reach an appropriate generalization of geometrical concepts on manifolds. first, we put forward the concept of operator-valued tensors and extend semi-riemannian...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید