Results 21 to 30 of about 418,718 (289)
Unbounded p-Convergence in Lattice-Normed Vector Lattices [PDF]
A net $x_ $ in a lattice-normed vector lattice $(X,p,E)$ is unbounded $p$-convergent to $x\in X$ if $p(|x_ -x|\wedge u)\xrightarrow{o} 0$ for every $u\in X_+$. This convergence has been investigated recently for $(X,p,E)=(X,\lvert\cdot \rvert,X)$ under the name of $uo$-convergence, for $(X,p,E)=(X,\lVert\cdot\rVert,{\mathbb R})$ under the name of $un$
Aydın A. +3 more
openaire +3 more sources
Perovskite materials have high potential for the renewable energy sources such as solar PV cells, fuel cells, etc. Different structural distortions such as crystal structure and lattice parameters have a critical impact on the determination of the ...
Sams Jarin +6 more
doaj +1 more source
Duality in Vector Lattices [PDF]
Introduction. We shall prove an abstract theorem on the duality of vector lattices. It is powerful and general enough to yield quickly the duality of both the classical examples of concrete vector lattices as well as various abstract analogs of these lattices.
openaire +1 more source
Martingale-like sequences in Banach lattices
Martingale-like sequences in vector lattice and Banach lattice frameworks are defined in the same way as martingales are defined in [Positivity 9 (2005), 437–456].
Haile Gessesse, Alexander Melnikov
doaj +1 more source
Multivariate Data Retrieval Modified by Random Noise using Lattice Autoassociative Memories with Eroded or Dilated Input Residuals [PDF]
Lattice associative memories were proposed as an alternative approach to work with a set of associated vector pairs for which the storage and retrieval stages are based in the theory of algebraic lattices. Several techniques have been established to deal
Urcid Gonzalo +2 more
doaj +1 more source
Application of hourglass matrix in Goldreich-Goldwasser-Halevi encryption scheme
Goldreich-Goldwasser-Halevi (GGH) encryption scheme is lattice-based cryptography with its security based on the shortest vector problem (SVP) and closest vector problem (CVP) with immunity to almost all attacks, including Shor's quantum algorithm and ...
Olayiwola Babarinsa +6 more
doaj +1 more source
Sublattices of lattices of convex subsets of vector spaces [PDF]
For a left vector space V over a totally ordered division ring F, let Co(V) denote the lattice of convex subsets of V. We prove that every lattice L can be embedded into Co(V) for some left F-vector space V.
Semenova, Marina V., Wehrung, Friedrich
core +3 more sources
Within a chiral quark model, we evaluate the good cross section in the Euclidean space in the vector - axial vector channel, proposed recently by Ma and Qiu as means to extract the so far elusive parton distribution functions of the pion from lattice QCD.
Wojciech Broniowski +1 more
doaj +1 more source
Component-by-component construction of good intermediate-rank lattice rules [PDF]
It is known that the generating vector of a rank-1 lattice rule can be constructed component-by-component to achieve strong tractability error bounds in both weighted Korobov spaces and weighted Sobolev spaces.
Joe, Stephen, Kuo, Frances Y.
core +1 more source
Spin-helix-driven insulating phase in two-dimensional lattice
Motivated by emergent SU(2) symmetry in the spin-orbit-coupled system, we study the spin-helix-driven insulating phase in a two-dimensional lattice. When both Rashba and Dresselhaus spin-orbit couplings are present, the perfect Fermi-surface nesting ...
HaRu K. Park +2 more
doaj +1 more source

