Results 31 to 40 of about 1,666,255 (289)
Tensor Eigenvalue and SVD from the Viewpoint of Linear Transformation
A linear transformation from vector space to another vector space can be represented as a matrix. This close relationship between the matrix and the linear transformation is helpful for the study of matrices.
Xinzhu Zhao, Bo Dong, Bo Yu, Yan Yu
doaj +1 more source
Mean spin entanglement of two massive Dirac particles under Lorentz transformations
We have studied the relativistic effects on the mean spin entanglement of two massive Dirac particles using the simultaneous eigen-spinors of the Foldy-Woutheysen mean spin operator and the Dirac Hamiltonian.
Choi, Taeseung, Hur, Jin, Kim, Jaewan
core +1 more source
Fast Radar Forward-looking Super-resolution Imaging for Abnormal Echo Data
Forward-looking imaging of airborne scanning radar is widely used in situation awareness, autonomous navigation and terrain following. When the radar is influenced by unintentional temporally sporadic electromagnetic interference or abnormal equipment ...
Weixin LI +6 more
doaj +1 more source
Matrix transformations of double convergent sequences with powers [PDF]
In 1967, I. J. Maddox generalized the spaces c0, c, ââ by adding the powers pk (k â â) in the definitions of the spaces to the terms of elements of sequences (xk). Gökhan and Ãolak in 2004â2006 defined the corresponding double sequence spaces
Maria Zeltser, Şeyda Sezgek
doaj +1 more source
Kramer--Neugebauer Transformation for Einstein--Maxwell--Dilaton--Axion Theory [PDF]
The Kramer--Neugebauer--like transformation is constructed for the stationary axisymmetric D=4 Einstein--Maxwell--dilaton--axion system. This transformation directly maps the dualized sigma--model equations of the theory into the nondualized ones.
A. Biswas +16 more
core +2 more sources
Creating Transformations for Matrix Obfuscation [PDF]
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transformations which are grouped under the term obfuscation . Obfuscation is one of a number of techniques that can be employed to protect sensitive areas of code.
Drape, S, Voiculescu, I
openaire +2 more sources
In this paper, wavelets transformation (WT) and wavelet packet transformation (WPT) are used in solving, by the method of moments, a semicircular array of parallel wires electric field integral equation.
M. Bayjja +3 more
doaj +1 more source
SO(4) Symmetry of the Transfer Matrix for the One-Dimensional Hubbard Model
The SO(4) invariance of the transfer matrix for the one-dimensional Hubbard model is clarified from the QISM (quantum inverse scattering method) point of view. We demonstrate the SO(4) symmetry by means of the fermionic R-matrix, which satisfy the graded
Affleck I +30 more
core +2 more sources
Matrix approach to the Shapley value and dual similar associated consistency [PDF]
Replacing associated consistency in Hamiache's axiom system by dual similar associated consistency, we axiomatize the Shapley value as the unique value verifying the inessential game property, continuity and dual similar associated consistency ...
G. Xuand +3 more
core +2 more sources
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source

