نتایج جستجو برای: Dual Methods
تعداد نتایج: 2008891 فیلتر نتایج به سال:
large amounts of hydrocarbon reserves are trapped in naturally fractured reservoirs which arechallenging in terms of accurate recovery prediction because of their joint fabric complexity andlithological heterogeneity. canada, for example, has over 400 billion barrels of crude oil in fracturedcarbonates in alberta, most of this being bitumen of viscosity greater than 106 cp in the grosmontformat...
We consider the construction of multiplier spaces for use with the mortar finite element method in three spatial dimensions. Abstract conditions are given for the multiplier spaces which are sufficient to guarantee a stable and convergent mortar approximation. Three examples of multipliers satisfying these conditions are given. The first one is a dual basis example while the remaining two are b...
As far as we know, there is no decoding algorithm of any binary self-dual [40, 20, 8] code except for the syndrome decoding applied to the code directly. This syndrome decoding for a binary self-dual [40, 20, 8] code is not efficient in the sense that it cannot be done by hand due to a large syndrome table. The purpose of this paper is to give two new efficient decoding algorithms for an extrem...
in this paper, we consider convex quadratic semidefinite optimization problems and provide a primal-dual interior point method (ipm) based on a new kernel function with a trigonometric barrier term. iteration complexity of the algorithm is analyzed using some easy to check and mild conditions. although our proposed kernel function is neither a self-regular (sr) function nor logarithmic barrier ...
چکیده: بررسی ادبیات مربوطه در کشور در زمینه یادگیری زبان انگلیسی نشان میدهد که علیرغم اهمیت املا در فرآیند یادگیری به طور عام و یادگیری زبان انگلیسی به طور خاص، این مولفه از جایگاهی متناسب با اهمیت آن برخوردار نیست و عمدتاً نادیده گرفته شده است. تحقیقات گستردهای در خارج از کشور در مورد ماهیت این مولفه صورت گرفته است، در حالی که به جرأت میتوان گفت در داخل کشور گامی در مورد درک ماهیت آن و فرآی...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید