Factorization相关论文
In this work,we calculate the sub-leading power contributions to radiative leptonic D → γlv decay.For the first time,w......
Although J/ψ weak decays are rare,they are possible within the standard model of elementary particles.Inspired by the p......
In this work,we calculate the sub-leading power contributions to radiative leptonic D→γνdecay.For the first time,we p......
Estimating Functional Brain Network with Low-Rank Structure via Matrix Factorization for MCI/ASD Ide
Functional brain networks (FBNs) provide a potential way for understanding the brain organizational patterns and diagnos......
Iterative ILU factorizations are constructed,analyzed and applied as preconditioners to solve both linear systems and ei......
This paper extends the notion of μ-bases to arbitrary univariate polynomial matrices and present an efficient algorithm......
Least-squares reverse time migration (LSRTM) can eliminate imaging artifacts in an iterative way based on the concept of......
Let b】1 be an integer. Aurifeuille et al. discovered a special factorization for a class of numbers in the form of b<su......
A local algorithm is proposed for unconstrained optimization problem. Compared with the traditional Newton method with C......
We consider a mathematical problem modelling some characteristics of near field optical microscope.We take a monofrequen......
简单的图被考虑。让 G 是珍视整数的功能为 everyxV (G) 在 V (G) withg (x) f (x) 上定义的图 andg (x) andf (x) 。为 subgraphH......
An efficient algorithm is proposed for factoring polynomials over an algebraic extension field defined by a polynomial r......
We calculate the exclusive charmonium photo-production in the framework of color glass condensate.To obtain a good descr......
According to the least square criterion of minimizing the misfit between modeled and observed data,this paper provides a......
ANALYSIS OF WAVEGUIDE PROBLEMS USING A RELAXED ITERATIVE DOMAIN DECOMPOSITION METHOD COMBINED WITH M
In this paper, an absorbing Fictitious Doundary Condition (FBC) is presented togenerate an iterative Domain Decompositi......
MOLECULAR ORBITAL THEORY ON CHAIN CONJUGATE POLYMERS(Ⅲ)——THE FACTORIZATION OF EIGENEQUATION OF TWO-D
The factorization of eigenequation of two-dimensional conjugated systems which consistof repeated units is given with n......
Constrained spectral non-negative matrix factorization(NMF)analysis of perturbed oscillatory process control loop variab......
Overlapped time division multiplexing (OvTDM) is a new type of transmission scheme with high spectrum efficiency and low......
This study was on superiority of the non- negative matrix factorization(NMF) algorithm for application of information ex......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
Barut-Girardello and Gilmore-Perelomov coherent states for pseudoharmonic oscillators and their nonc
In this paper we try to introduce the ladder operators associated with the pseudoharmonic oscillator, after solving the ......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
A method is introduced for handiing-large linear system whose characteristic is that given the values of the nontheic va......
Let Fq be a finite field of odd characteristic containing q elements,and n be a positive integer.An important problem in......
The turbulent large eddy simulation (LES) technique and the finite element method (FEM) of computational fluid dynamic......
Modern fluid machinery is developing towards higher efficiency, and the aviation engine, industrial gas turbine, steam ......
In this paper we study the algorithms and their parallel implementation for solving large-scale generalized eigenvalue p......
Recent advances in the data analysis method of functional magnetic resonance imaging and its applica
Functional magnetic resonance imaging (fMRI) has opened a new area to explore the human brain. The fMRI can reveal the d......
对于‘■’关系满足插入性的locale,我们给出了Banaschewski-Mulvey式紧正则反射的构造性描述。进一步,证明了正规locale满足插入......
Frequency-domain waveform seismic tomography includes modeling of wave propagation and full waveform inversion of correc......
运用单粒子交换方法研究D→PV衰变中的D→κρ,πκ~*,πρ过程,考虑了强相位及非因子化贡献,能得到与实验数据很吻合的结果,结果......
介绍一种求解瞬态两群多维中子扩散方程的动力学节块方法。这种方法是基于非线性解析节块方法而建立的,这里主要介绍时间域近似方......
Within the heavy quark limit and the hierarchy approximation λQCD mD mB, we analyze the B → D00 and Bs → D00 deca......
It is interesting to investigate the OZI-forbidden decays of orthoquarkoknium, J/ψ→γπ~0(γη, γη’), J/ψ→π~+π......
Based on the assumption of a two-quark structure of the scalar meson f0(980) ,we calculate the branching ratios and CP-v......
We study J/ψ inclusive production in the decays of P-wave bottomonium χbJ(1P,2P) for J=0,1,2. Within the framework of ......
We calculate the inclusive decay rates of ηb into charmonium via double c pairs for S-and P-wave states ηc,J/ψ and ......
In this paper,we calculate the branching ratios and the direct CP-violating asymmetries for decays B0 →a00(980)π0,a0+(......
A Modified Hybrid Element Method (MHEM) for computing wave loads on arbitrary geometric bodies is presented in this pap......
The 4-channel smooth wavelets with linear phase and orthogonality are designed from the 2-channel orthogonal wavelets wi......
Crossing the Growth Threshold:Service-Based Economy,Knowledge Process and Reshaping of Efficiency Mo
The transition from middle-income to high-income stage is fraught with risks of growth divergence.Economic transition is......
We demonstrate that the recently proposed soft gluon factorization(SGF)is equivalent to the nonrelativ-istic QCD(NRQCD)f......
Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorit......
Reversible integer mapping (or integer transform) is a useful way to realize lossless coding, and this technique has bee......
F distribution F分布facility interchange key 装置交换密钥facsimile cipher set 传真密码机facsimile ciphering system 传真......
Using the fact that the factorization of xN-1 over GF(2) is especially explicit, we completely establish the distribut......
The k-error linear complexity and the linear complexity of the keystream of a stream cipher are two important standards ......
a complete algorithm to design 4-band orthogonal wavelets with beautiful structure from 2-band orthogonal wavelets is pr......
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SE......