نتایج جستجو برای: we choose a suitable scheme
تعداد نتایج: 13743735 فیلتر نتایج به سال:
The principal function of a control chart is to help management distinguish different sources of variation in a process. Control charts are widely used as a graphical tool to monitor a process in order to improve the quality of the product. Chen and Hsieh (2007) have designed a T2 control chart using a Variable Sampling Size and Control limits (V SSC) scheme. They have shown that using the V SSC...
In this paper, a numerical efficient method is proposed for the solution of time fractional mobile/immobile equation. The fractional derivative of equation is described in the Caputo sense. The proposed method is based on a finite difference scheme in time and Legendre spectral method in space. In this approach the time fractional derivative of mentioned equation is approximated by a scheme of ord...
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
background: determining the optimal and effective scheme for administrating the chemotherapy agents in breast cancer is the main goal of this scientific research. the most important issue here is the amount of drug or radiation administrated in chemotherapy and radiotherapy for increasing patient's survival. this is because in these cases, the therapy not only kills the tumor cells, but also ki...
the space now known as complete erdos space ec was introduced by paul erdos in 1940 as the closed subspace of the hilbert space ?2 consisting of all vectors such that every coordinate is in the convergent sequence {0} ? { 1 n : n ? n}. in a solution to a problem posed by lex g. oversteegen we present simple and useful topological characterizations of ec. as an application we determine the ...
Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and performance of Islam and Biswas’s scheme and showed that their scheme has some pitfalls. In order to solve these problems, we have constructed an enhanced ECC remote mutual authentication with key agreement scheme and proven that the prop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید