نتایج جستجو برای: pseudo scaling function

تعداد نتایج: 1319921  

Journal: :bulletin of the iranian mathematical society 0
l. lan xi'an university of arts and science c. zhengxing xi'an jiaotong university h. yongdong the northwest secondly national college

we present a method for  the construction of compactlysupported $left (begin{array}{lll}1 & 0 & -11 & 1 & 0 1 &  0 & 1end{array}right )$-wavelets  under a mild condition. wavelets inherit thesymmetry of the corresponding scaling function and satisfies thevanishing moment condition originating in the symbols of the scalingfunction. as an application, an  example is  provided.

Journal: :The Journal of Chemical Physics 2004

2009
Arkadiusz K. Kuczaj Bernard J. Geurts

Rotation modulates turbulence causing columnar structuring of a turbulent flow in case of sufficiently strong rotation. This yields significant changes in the flow characteristics and dispersion properties, which makes rotational turbulence modulation particularly relevant in the context of atmospheric and oceanic flows. Here we investigate the canonical flow of turbulence in a periodic box, su...

Journal: :Discrete Applied Mathematics 2012
Miguel Couceiro Erkko Lehtonen Tamás Waldhauser

The aim of this paper is to classify order-preserving functions according to their arity gap. Noteworthy examples of order-preserving functions are the so-called aggregation functions.We first explicitly classify the Lovász extensions of pseudo-Boolean functions according to their arity gap. Then we consider the class of order-preserving functions between partially ordered sets, and establish a...

Background: One of the challenges of PET/MRI combined systems is to derive an attenuation map to correct the PET image. For that, the pseudo-CT image could be used to correct the attenuation. Until now, most existing scientific researches construct this pseudo-CT image using the registration techniques. However, these techniques suffer from the local minima of the non-rigid deformation energy f...

Journal: :Applicable Algebra in Engineering, Communication and Computing 2016

2010
Lei Wang Yu Sasaki

This paper evaluates the preimage resistance of the Tiger hash function. We will propose a pseudo-preimage attack on its compression function up to 23 steps with a complexity of 2, which can be converted to a preimage attack on 23-step Tiger hash function with a complexity of 2. The memory requirement of these attacks is 2 words. Our pseudo-preimage attack on the Tiger compression function adop...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید