Results 71 to 80 of about 123,245 (174)

Application of a Randomized Algorithm for Extracting a Shallow Low-Rank Structure in Low-Frequency Reverberation

open access: yesRemote Sensing, 2023
The detection performance of active sonar is often hindered by the presence of seabed reverberation in shallow water. Separating the reverberations from the target echo and noise in the received signal is a crucial challenge in the field of underwater ...
Jie Pang, Bo Gao
doaj   +1 more source

Invariant subspace method for (m + 1)-dimensional non-linear time-fractional partial differential equations

open access: yes, 2022
In this paper, we generalize the theory of the invariant subspace method to (m + 1)-dimensional non-linear time-fractional partial differential equations for the first time. More specifically, the applicability and efficacy of the method have been systematically investigated through the (3 + 1)-dimensional generalized non-linear time-fractional ...
Prakash, P.   +2 more
openaire   +3 more sources

Covariants,joint invariants and the problem of equivalence in the invariant theory of Killing tensors defined in pseudo-Riemannian spaces of constant curvature

open access: yes, 2004
The invariant theory of Killing tensors (ITKT) is extended by introducing the new concepts of covariants and joint invariants of (product) vector spaces of Killing tensors defined in pseudo-Riemannian spaces of constant curvature.
Eisenhart L. P.   +13 more
core   +3 more sources

LQ decomposition based subspace identification under deterministic type disturbance

open access: yesSystems Science & Control Engineering, 2017
To overcome the influence from deterministic type load disturbance with unknown dynamics, a bias-eliminated subspace identification method is proposed for consistent estimation.
Shengnan Zhang   +3 more
doaj   +1 more source

Baxter operators for the quantum sl(3) invariant spin chain

open access: yes, 2006
The noncompact homogeneous sl(3) invariant spin chains are considered. We show that the transfer matrix with generic auxiliary space is factorized into the product of three sl(3) invariant commuting operators.
A N Manashov   +21 more
core   +3 more sources

Discovering Domain-Invariant Subspace for Depression Recognition by Jointly Exploiting Appearance and Dynamics Feature Representations

open access: yesIEEE Access, 2019
Focusing on cross-dataset Automated Depression Recognition (ADR) by jointly exploring facial appearance and dynamics feature representations, we explore to propose a novel Latent Domain Adaptation Depression Recognition (latDADR) framework via ...
Jianwen Tao, Haote Xu
doaj   +1 more source

On quasinilpotent operators and the invariant subspace problem

open access: yes, 2019
We show that a bounded quasinilpotent operator $T$ acting on an infinite dimensional Banach space has an invariant subspace if and only if there exists a rank one operator $F$ and a scalar $\alpha\in\mathbb{C}$, $\alpha\neq 0$, $\alpha\neq 1$, such that $
Tcaciuc, Adi
core   +1 more source

On Some Applications of a Special Integrodifferential Operators

open access: yesJournal of Function Spaces and Applications, 2012
Let 𝐢(𝑛)(𝔻×𝔻) be a Banach space of complex-valued functions 𝑓(π‘₯,𝑦) that are continuous on 𝔻×𝔻, where 𝔻={π‘§βˆˆβ„‚βˆΆ|𝑧|
Suna Saltan, Yasemin Γ–zel
doaj   +1 more source

Parameter Estimation for Two-Dimensional Incoherently Distributed Source with Double Cross Arrays

open access: yesSensors, 2020
A direction of arrival (DOA) estimator for two-dimensional (2D) incoherently distributed (ID) sources is presented under proposed double cross arrays, satisfying both the small interval of parallel linear arrays and the aperture equalization in the ...
Tao Wu   +4 more
doaj   +1 more source

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy