نتایج جستجو برای: large set
تعداد نتایج: 1587353 فیلتر نتایج به سال:
We present a characterization of Arens regular semigroup algebras $ell^1(S)$, for a large class of semigroups. Mainly, we show that if the set of idempotents of an inverse semigroup $S$ is finite, then $ell^1(S)$ is Arens regular if and only if $S$ is finite.
paracobitis rhadinaea , a member of the family nemacheiliidae, originally described by regan in 1906 from sistan basin, is poorely known by the rare materials. the inadequately studied species is redescribed on the base of freshly collected materials. the species differs from all other paracobitis species by combination of the following characters: stout and elongated body; large size, up to 28...
The β-carboline derivatives are a large group of naturally-occurring and synthetic alkaloids which have awide spectrum of biological and pharmaceutical properties. The newly developed procedure called VolSurfhas been used to explore a significant correlation between the 3D molecular interaction fields (MIF) andphysicochemical and pharmacokinetic properties of a set of 30 β-carboline compounds a...
we present a characterization of arens regular semigroup algebras $ell^1(s)$, for a large class of semigroups. mainly, we show that if the set of idempotents of an inverse semigroup $s$ is finite, then $ell^1(s)$ is arens regular if and only if $s$ is finite.
The purpose of this note is to prove the following.
Utility mining is an extension of pattern mining. Utility means weight, profit, cost, quantity or any useful entity on which business environment can depend on. Utility mining is an important technique for mining patterns through utility. Utility mining provides sufficient information about the product. Several algorithms have been developed for mining high utility itemsets. Efficiency is a big...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
Nowadays in order to increase the reliability and other special aims, the power networks are exchanged to the large and interconnected networks. In such networks, the relays setting and coordination is complicated and needs to determine break points. Break points are the initial points in coordination process and in pervious works, different methods are proposed to finding them in interconnecte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید