نتایج جستجو برای: bound

تعداد نتایج: 179986  

Journal: :Journal of High Energy Physics 2004

In this paper, we present a full Newton step feasible interior-pointmethod for circular cone optimization by using Euclidean Jordanalgebra. The search direction is based on the Nesterov-Todd scalingscheme, and only full-Newton step is used at each iteration.Furthermore, we derive the iteration bound that coincides with thecurrently best known iteration bound for small-update methods.

Journal: :international journal of group theory 2012
azam kaheni rasoul hatamian saeed kayvanfar

a famous theorem of schur states that for a group $g$ finiteness of $g/z(g)$‎ ‎implies the finiteness of $g'.$ the converse of schur's theorem is an interesting problem which has been considered by some‎ ‎authors‎. ‎recently‎, ‎podoski and szegedy proved the truth of the converse of schur's theorem for capable groups‎. ‎they also established an explicit bound for the index of the center of such...

Journal: :Journal of High Energy Physics 2022

Yukawa interactions of neutrinos with a new light scalar boson $\phi$ can lead to formation stable bound states and systems many ($\nu$-clusters). For allowed values the coupling $y$ mass $m_\phi$, state two would have size larger than $10^{12}$ cm. Bound sub-cm sizes are possible for keV scale sterile $y > 10^{-4}$. $\nu$-clusters we study in detail properties final configurations. If there is...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

Journal: :بین المللی مهندسی صنایع و مدیریت تولید 0
ghasem moslehi professor of industrial engineering – isfahan university of technology kamran kianfar phd student of industrial engineering – isfahan university of technology

nowadays, scheduling problems have a considerable application in production and service systems. in this paper, we consider the scheduling of n jobs on a single machine assuming no machine idleness, non-preemptive jobs and equal process times. in many of previous researches, because of the delivery dalays and holding costs, earliness and tardiness penalties emerge in the form of linear combinat...

Journal: :civil engineering infrastructures journal 0
javad mofidi rouchi m.sc student, school of civil engineering, university college of engineering, university of tehran, tehran, iran. orang farzaneh assistant professor, school of civil engineering, university college of engineering, university of tehran, tehran, iran. faradjollah askari assistant professor, international institute of earthquake engineering and seismology, tehran, iran.

stability of foundations near slopes is one of the important and complicated problems in geotechnical engineering, which has been investigated by various methods such as limit equilibrium, limit analysis, slip-line, finite element and discrete element. the complexity of this problem is resulted from the combination of two probable failures: foundation failure and overall slope failure. the curr...

Journal: :زبانشناسی کاربردی 0
davud kuhi yasaman alinejad

thanks to the development of the concept of metadiscourse, it is now widely acknowledged that academic/scientific writing is not only concerned with communicating purely propositional meanings: what is communicated through academic/scientific communication is seen to be intertwined with the negotiation of social and interpersonal meanings. while a large number of so called metadiscoursal resour...

Journal: :The Iowa Review 2007

One of the major disadvantages of using Branch and Bound algorithm to solve permutation bases problems by computer is the size of main memory required. The single Array Branch and Bound (SABB) method introduction here aims to overcome this deficiency, using only N memory locations as a vector of size N, and a single cell C with N bits.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید