نتایج جستجو برای: pseudo addition
تعداد نتایج: 760525 فیلتر نتایج به سال:
to control the nonlinear numerical instability, throughout the time evolution of the eulerian form of the nonlinear rotating shallow water equations, it is necessary to add numerical diffusion to the solution. it is clear that, this extra numerical diffusion degrades the accuracy of the numerical solution and should be kept as small as possible. in a conventional approach a hyper-diffusion is u...
The RC4 stream cipher has been designed by Ron Rivest for RSA Data Security in 1987, and was a propriety algorithm until 1994. Currently, RC4 is extremely popular in commercial domain and widely used in network protocols such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) etc. RC4 uses an S-Box S = (S[0], . . . , S[N −...
commutative properties of four-dimensional generalized symmetric pseudo-riemannian manifolds were considered. specially, in this paper, we studied skew-tsankov and jacobi-tsankov conditions in 4-dimensional pseudo-riemannian generalized symmetric manifolds.
In this paper, we introduce the notion of hyper pseudo B C K - algebras, which is a generalization of pseudo BCK -algebras and hyper BCK -algebras and we investigates some related properties. In follow, we de ne some kinds of hyper pseudo BCK -ideals of a hyper pseudo BCK - algebra and we find the relations among them. Finally, we characterize the hyper pseudo BCK -ideals of type 4 generated by...
In this paper we study particular classes of pseudo-BCK algebras, bounded or not bounded, as pseudo-BCK(pP) algebras, pseudo-BCK(pP) lattices, pseudo-Hájek(pP) algebras and pseudo-Wajsberg algebras. We introduce new classes of pseudo-BCK(pP) lattices, we establish hierarchies and we give some examples. We work with left-defined algebras and we work with → and ; as primitive operations, not with...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید