نتایج جستجو برای: multi cubic mapping

تعداد نتایج: 684418  

Journal: :international journal of nonlinear analysis and applications 2015
sattar alizadeh fridoun moradlou

begin{abstract}using the fixed point method, we prove the generalized hyers--ulam--rassiasstability of the following functional equation in multi-banach spaces:begin{equation} sum_{ j = 1}^{n}fbig(-2 x_{j} + sum_{ i = 1, ineq j}^{n} x_{i}big) =(n-6) fbig(sum_{ i = 1}^{n} x_{i}big) + 9 sum_{ i = 1}^{n}f(x_{i}).end{equation}end{abstract}

Journal: :Perform. Eval. 2016
Sudheer Poojary Vinod Sharma

We develop analytical tools for performance analysis of multiple TCP flows (which could be using TCP CUBIC, TCP Compound, TCP New Reno) passing through a multi-hop network. We first compute average window size for a single TCP connection (using CUBIC or Compound TCP) under random losses. We then consider two techniques to compute steady state throughput for different TCP flows in a multi-hop ne...

Journal: :Sustainability 2023

This paper aims to address the combination of distributed generation placement and dynamic distribution network reconfiguration. Herein, a multi-strategy multi-objective improved black widow algorithm is proposed. A model established, which considers objectives minimizing active power loss, voltage deviation, carbon emission. The proposed significantly enhances traversal capability search speed...

ژورنال: علوم آب و خاک 2019

Exploring the homogenous regions for site specific management is important, especially in the areas under different anthropogenic activities. This was investigated using multi-way analysis including Factor Analysis, Hierarchical Clustering Analysis and k means in the areas under long-term wastewater irrigation over a period of more than 40 years, in Shahre Rey, south of Tehran. By using Factor ...

Journal: :Appl. Math. Lett. 2012
Wutiphol Sintunavarat Poom Kumam

In this paper, we extend a multi-valued contraction mapping to a cyclic multi-valued contraction mapping. We also establish the existence of common fixed point theorem for a cyclic multi-valued contraction mapping. Our results extend, generalize and unify Nadler’s multi-valued contraction mapping and many fixed point theorems for multivalued mappings. © 2012 Elsevier Ltd. All rights reserved.

Journal: :Journal of the Royal Society, Interface 2008
Zakaria Almsherqi Stephen Hyde Malarmathy Ramachandran Yuru Deng

Cubic membranes are soft three-dimensional crystals found within cell organelles in a variety of living systems, despite the aphorism of Fedorov: 'crystallization is death'. They consist of multi-bilayer lipid-protein stacks, folded onto anticlastic surfaces that resemble triply periodic minimal surfaces, forming highly swollen crystalline sponges. Although cubic membranes have been observed in...

1999
Michaël AUPETIT Pierre MASSOTTE Pierre COUTURIER Georges Besse

We propose a new method called C-SOM for function approximation. C-SOM extends the standard Self-Organizing Map (SOM) with a combination of Local Linear Mapping (LLM) and cubic spline based interpolation techniques to improve standard SOMs' generalization capabilities. CSOM uses the gradient information provided by the LLM technique to compute a cubic spline interpolation in the input space bet...

Journal: :Nano letters 2008
Benjamin Harke Chaitanya K Ullal Jan Keller Stefan W Hell

We demonstrate the direct three-dimensional imaging of densely packed colloidal nanostructures using stimulated emission depletion microscopy. A combination of two de-excitation patterns yields a resolution of 43 nm in the lateral and 125 nm in the axial direction and an effective focal volume that is by 126-fold smaller than that of a corresponding confocal microscope. The mapping of a model s...

Journal: :IEICE Transactions 2003
Hisayoshi Sato Tsuyoshi Takagi Satoru Tezuka Kazuo Takaragi

This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayness is secure under the factoring assumption. The previously reported encryption schemes using a powering function are variants of either the 4-to-1 mapping or higher n-to-1 mapping, where n > 4. In this paper, we pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید