نتایج جستجو برای: point methods
تعداد نتایج: 2296532 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Set against the context of the debate over the profitability of Information Technology (IT), this article is focused on the impact of IT use within support departments. It serves to introduce an efficiency variable of the support system with respect to operating departments. A formal model helps explain how to select the single-best method for these support departments. Reliance on IT leads to ...
Point source localisation is generally modelled as a Lasso-type problem on measures. However, optimisation methods in non-Hilbert spaces, such the space of Radon measures, are much less developed than Hilbert spaces. Most numerical algorithms for point based Frank-Wolfe conditional gradient method, which ad hoc convergence theory developed. We develop extensions proximal-type to spaces This inc...
Infiltration is one of the most important hydraulic parameters affecting surface irrigation and one ofthe most difficult parameters in practical field determinations. The infiltration equations are used todescribe water flow hydraulics and surface irrigation systems design. But determination of theparameters in these equations are costly and time consuming. Therefore, some estimating methods ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید