نتایج جستجو برای: weak and strongduality theorems
تعداد نتایج: 16849931 فیلتر نتایج به سال:
In this paper, we study a generalization of z-ideals in the ring C(X) of continuous real valued functions on a completely regular Hausdorff space X. The notion of a weak ideal and naturally a weak z-ideal and a prime weak ideal are introduced and it turns out that they behave such as z-ideals in C(X).
بررسی تطبیقی بازده حاصل از کاربرد تحلیل های تکنیکال و روش خرید و نگهداری در بورس اوراق بهادار تهران چکیده در این پژوهش بازدهی حاصل از روش های تجزیه و تحلیل تکنیکی و روش خرید و نگهداری در فرض قابل پیش بینی بودن قیمت ها و عدم وجود شکل ضعیف فرضیه بازار کارا که توسط فاما در سال 791 مطرح گردیده است ، فعالیت میکند . در این مطالعه چهار روش از پر کاربردترین و معتبر ترین روش های تحلیل تکنیکی مورد بر...
We give a relatively short and self contained proof of Ratner’s theorem in the special case of SL(2, R)-invariant measures.
This paper studies the relationship between the singular trace of a weak trace class operator and the asymptotic behaviour of its ζ-function at its leading singularity. For Dixmier measurable and universally measurable operators we describe their measurability in terms of the behaviour of the ζ-function. We use recent advances in singular trace theory and a new approach based on Tauberian theor...
In this paper algebras with identity, over ordered fields, which possess a (weak) submultiplicative positive bilinear form are studied. They are called (weak) subdecomposition algebras. It is proved that every weak subdecomposition algebra is a simple quadratic algebra with no nontrivial nilpotents or idempotents. If a weak subdecomposition algebra is also flexible, then it is a noncommutative ...
in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
Two-step Iterative Process For Common Fixed Points of Two Asymptotically Quasi-nonexpansive Mappings
In this paper, we consider an iteration process for approximating common fixed points of two asymptotically quasinonexpansive mappings and we prove some strong and weak convergence theorems for such mappings in uniformly convex Banach spaces. Keywords—Asypmtotically quasi-nonexpansive mappings, Common fixed point, Strong and weak convergence, Iteration process.
In this project, we have extended previous work on the formalization of the process algebra CCS in HOL4. We have added full supports on weak bisimulation equivalence and observation congruence (rooted weak equivalence), with related definitions, theorems and algebraic laws. Some deep lemmas were also formally proved in this project, including Deng Lemma, Hennessy Lemma and several versions of t...
* Correspondence: ming@mail. nhcue.edu.tw Department of Applied Mathematics, National Hsinchu University of Education, Hsin-Chu, Taiwan Full list of author information is available at the end of the article Abstract In this article, we introduce the notions of (j φ)-weak contraction mappings and (ψ φ)-weak contraction mappings in complete generalized metric spaces and prove two theorems which a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید