-
1041
Weakly compactly generated Frechet spaces
Published 1979-01-01“…It is proved that a weakly compact generated Frechet space is Lindelöf in the weak topology. As a corollary it is proved that for a finite measure space every weakly measurable function into a weakly compactly generated Frechet space is weakly equivalent to a strongly measurable function.…”
Get full text
Article -
1042
Periodic Boehmians
Published 1989-01-01“…It is shown that the Boehmians, with a given complete metric topological vector space topology, is not locally bounded.…”
Get full text
Article -
1043
On the Equivalence of B-Rigidity and C-Rigidity for Quasitoric Manifolds
Published 2014-01-01“…For quasitoric manifolds and moment-angle complexes which are central objects recently much studied in toric topology, there are several important notions of rigidity formulated in terms of cohomology rings. …”
Get full text
Article -
1044
Evaluation method for node importance in communication networks
Published 2004-01-01“…Experimental results show that the method is simple and can reflect node importance determined by the network topology more precisely.…”
Get full text
Article -
1045
Minimizing energy among homotopic maps
Published 2004-01-01“…After deriving an approximate monotonicity property for {ui} and a continuous version of the Luckhaus lemma (Simon, 1996) on S2, we show that, passing to a subsequence, {ui} converges strongly in W1,2 topology wherever there is small energy concentration.…”
Get full text
Article -
1046
Intuitionistic fuzzy proximity spaces
Published 2004-01-01“…Also we investigate the relationship among intuitionistic fuzzy proximity and fuzzy proximity, and intuitionistic fuzzy topology.…”
Get full text
Article -
1047
On the Covariance of Moore-Penrose Inverses in Rings with Involution
Published 2014-01-01“…We will show that if a is a regular element in a C∗-algebra, then the covariance set of a is closed in the set of invertible elements (with relative topology) of C∗-algebra and is a cone in the C∗-algebra.…”
Get full text
Article -
1048
On Intuitionistic Fuzzy Filters of Intuitionistic Fuzzy Coframes
Published 2013-01-01“…Frame theory is the study of topology based on its open set lattice, and it was studied extensively by various authors. …”
Get full text
Article -
1049
Homotopy Characterization of ANR Function Spaces
Published 2013-01-01“…Let Y be an absolute neighbourhood retract (ANR) for the class of metric spaces and let X be a topological space. Let YX denote the space of continuous maps from X to Y equipped with the compact open topology. …”
Get full text
Article -
1050
A note on weakly θ-continuous functions
Published 1989-01-01“…Recently a new class of functions between topological spaces, called weakly θ-continuous functions, has been introduced and studied. …”
Get full text
Article -
1051
A characterization of singular endomorphisms of a barrelled Pták space
Published 1982-01-01“…The concept of topological divisor of zero has been extended to endomorphisms of a locally convex topological vector space (LCTVS). …”
Get full text
Article -
1052
Slightly β-continuous functions
Published 2001-01-01“…Especially, we define the notion of ultra-regularizations of a topology and obtain interesting characterizations of slightly β-continuous functions by using it.…”
Get full text
Article -
1053
A note on nonfragmentability of Banach spaces
Published 2001-01-01“…We use Kenderov-Moors characterization of fragmentability to show that if a compact Hausdorff space X with the tree-completeness property contains a disjoint sequences of clopen sets, then (C(X), weak) is not fragmented by any metric which is stronger than weak topology. In particular, C(X) does not admit any equivalent locally uniformly convex renorming.…”
Get full text
Article -
1054
Study on event routing algorithms for publish/subscribe communication systems
Published 2008-01-01“…The architectures of publish/subscribe communication systems and various routing mechanisms and algorithms were discussed and reviewed,including the basic methods of finding communication objects,routes optimization and routes for supporting topology change and client mobile,etc; The routing methods of famous P/S systems were compared and analyzed; On the perspective of the system scalability,the direction of further research was proposed finally.…”
Get full text
Article -
1055
Gravitational higher-form symmetries and the origin of hidden symmetries in Kaluza-Klein compactifications
Published 2025-01-01“…We show that, in presence of isometries and non-trivial topology, the Einstein–Hilbert action is invariant under certain transformations of the metric which are not diffeomorphisms. …”
Get full text
Article -
1056
Comparison of the evolutionary patterns of DNA repeats in ancient and young invertebrate species flocks of Lake Baikal
Published 2023-07-01“…In order to do so, a neighbor joining tree was inferred for each quartet of species (amphipods and mollusks) based on the ratio of repeat classes shared in each pair of species. The topology of this tree was compared to the phylogenies inferred for the same species from the concatenated protein-coding mitochondrial nucleotide sequences. …”
Get full text
Article -
1057
Trusted fuzzy routing scheme in flying ad-hoc network
Published 2024-03-01“…Therefore, building routing protocols for FANETs is difficult due to flight restrictions and changing topology. To solve these problems, a bio-inspired route selection technique is proposed for FANET. …”
Get full text
Article -
1058
AC Fault Mechanism and Impact Analysis of Offshore Wind Power Connected to Flexible and Direct Systems
Published 2025-01-01“…[Objective] In order to better understand the fault characteristics of offshore wind power access system, the impact analysis of AC fault characteristics of offshore wind power access system is carried out. [Method] The topology analysis of grid-connected transmission system of offshore wind power and the work control principle analysis of offshore wind power electrical structure were presented, including the work control principle analysis of PMSG, the topology and principle analysis of flexible and direct transmission system, the work control principle analysis of offshore converter station, the work control principle analysis of onshore converter station, and the work control principle analysis of offshore converter station. …”
Get full text
Article -
1059
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01“…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
Get full text
Article -
1060
Continuous and Discrete Similarity Coefficient for Identifying Essential Proteins Using Gene Expression Data
Published 2023-06-01“…Using the graph theory as the basis, we fused the newly proposed similarity coefficient with the existing network topology prediction algorithm at each protein node to recognize essential proteins. …”
Get full text
Article