Showing 1,041 - 1,060 results of 2,667 for search '"Topology"', query time: 0.06s Refine Results
  1. 1041

    Weakly compactly generated Frechet spaces by Surjit Singh Khurana

    Published 1979-01-01
    “…It is proved that a weakly compact generated Frechet space is Lindelöf in the weak topology. As a corollary it is proved that for a finite measure space every weakly measurable function into a weakly compactly generated Frechet space is weakly equivalent to a strongly measurable function.…”
    Get full text
    Article
  2. 1042

    Periodic Boehmians by Dennis Nemzer

    Published 1989-01-01
    “…It is shown that the Boehmians, with a given complete metric topological vector space topology, is not locally bounded.…”
    Get full text
    Article
  3. 1043

    On the Equivalence of B-Rigidity and C-Rigidity for Quasitoric Manifolds by Jin Hong Kim

    Published 2014-01-01
    “…For quasitoric manifolds and moment-angle complexes which are central objects recently much studied in toric topology, there are several important notions of rigidity formulated in terms of cohomology rings. …”
    Get full text
    Article
  4. 1044

    Evaluation method for node importance in communication networks by CHEN Yong, HU Ai-qun, HU Xiao

    Published 2004-01-01
    “…Experimental results show that the method is simple and can reflect node importance determined by the network topology more precisely.…”
    Get full text
    Article
  5. 1045

    Minimizing energy among homotopic maps by Pengzi Miao

    Published 2004-01-01
    “…After deriving an approximate monotonicity property for {ui} and a continuous version of the Luckhaus lemma (Simon, 1996) on S2, we show that, passing to a subsequence, {ui} converges strongly in W1,2 topology wherever there is small energy concentration.…”
    Get full text
    Article
  6. 1046

    Intuitionistic fuzzy proximity spaces by Seok Jong Lee, Eun Pyo Lee

    Published 2004-01-01
    “…Also we investigate the relationship among intuitionistic fuzzy proximity and fuzzy proximity, and intuitionistic fuzzy topology.…”
    Get full text
    Article
  7. 1047

    On the Covariance of Moore-Penrose Inverses in Rings with Involution by Hesam Mahzoon

    Published 2014-01-01
    “…We will show that if a is a regular element in a C∗-algebra, then the covariance set of a is closed in the set of invertible elements (with relative topology) of C∗-algebra and is a cone in the C∗-algebra.…”
    Get full text
    Article
  8. 1048

    On Intuitionistic Fuzzy Filters of Intuitionistic Fuzzy Coframes by Rajesh K. Thumbakara

    Published 2013-01-01
    “…Frame theory is the study of topology based on its open set lattice, and it was studied extensively by various authors. …”
    Get full text
    Article
  9. 1049

    Homotopy Characterization of ANR Function Spaces by Jaka Smrekar

    Published 2013-01-01
    “…Let Y be an absolute neighbourhood retract (ANR) for the class of metric spaces and let X be a topological space. Let YX denote the space of continuous maps from X to Y equipped with the compact open topology. …”
    Get full text
    Article
  10. 1050

    A note on weakly θ-continuous functions by M. Mrševic, I. L. Reilly

    Published 1989-01-01
    “…Recently a new class of functions between topological spaces, called weakly θ-continuous functions, has been introduced and studied. …”
    Get full text
    Article
  11. 1051

    A characterization of singular endomorphisms of a barrelled Pták space by Damir Franekić

    Published 1982-01-01
    “…The concept of topological divisor of zero has been extended to endomorphisms of a locally convex topological vector space (LCTVS). …”
    Get full text
    Article
  12. 1052

    Slightly β-continuous functions by Takashi Noiri

    Published 2001-01-01
    “…Especially, we define the notion of ultra-regularizations of a topology and obtain interesting characterizations of slightly β-continuous functions by using it.…”
    Get full text
    Article
  13. 1053

    A note on nonfragmentability of Banach spaces by S. Alireza Kamel Mirmostafaee

    Published 2001-01-01
    “…We use Kenderov-Moors characterization of fragmentability to show that if a compact Hausdorff space X with the tree-completeness property contains a disjoint sequences of clopen sets, then (C(X), weak) is not fragmented by any metric which is stronger than weak topology. In particular, C(X) does not admit any equivalent locally uniformly convex renorming.…”
    Get full text
    Article
  14. 1054

    Study on event routing algorithms for publish/subscribe communication systems by XUE Xiao-ping 1, WANG Xiao-ping 2, ZHANG Si-dong1, ZHANG Hong-ke1

    Published 2008-01-01
    “…The architectures of publish/subscribe communication systems and various routing mechanisms and algorithms were discussed and reviewed,including the basic methods of finding communication objects,routes optimization and routes for supporting topology change and client mobile,etc; The routing methods of famous P/S systems were compared and analyzed; On the perspective of the system scalability,the direction of further research was proposed finally.…”
    Get full text
    Article
  15. 1055

    Gravitational higher-form symmetries and the origin of hidden symmetries in Kaluza-Klein compactifications by Carmen Gómez-Fayrén, Tomás Ortín, Matteo Zatti

    Published 2025-01-01
    “…We show that, in presence of isometries and non-trivial topology, the Einstein–Hilbert action is invariant under certain transformations of the metric which are not diffeomorphisms. …”
    Get full text
    Article
  16. 1056

    Comparison of the evolutionary patterns of DNA repeats in ancient and young invertebrate species flocks of Lake Baikal by Wang Yuxiang, T. E. Peretolchina, E. V. Romanova, D. Y. Sherbakov

    Published 2023-07-01
    “…In order to do so, a neighbor joining tree was inferred for each quartet of species (amphipods and mollusks) based on the ratio of repeat classes shared in each pair of species. The topology of this tree was compared to the phylogenies inferred for the same species from the concatenated protein-coding mitochondrial nucleotide sequences. …”
    Get full text
    Article
  17. 1057

    Trusted fuzzy routing scheme in flying ad-hoc network by Sahabul Alam, Joydeep Kundu, Shivnath Ghosh, Arindam Dey

    Published 2024-03-01
    “…Therefore, building routing protocols for FANETs is difficult due to flight restrictions and changing topology. To solve these problems, a bio-inspired route selection technique is proposed for FANET. …”
    Get full text
    Article
  18. 1058

    AC Fault Mechanism and Impact Analysis of Offshore Wind Power Connected to Flexible and Direct Systems by Wanli JIANG, Ruoyu WANG, Jiajing LI, Jingyi LIANG

    Published 2025-01-01
    “…[Objective] In order to better understand the fault characteristics of offshore wind power access system, the impact analysis of AC fault characteristics of offshore wind power access system is carried out. [Method] The topology analysis of grid-connected transmission system of offshore wind power and the work control principle analysis of offshore wind power electrical structure were presented, including the work control principle analysis of PMSG, the topology and principle analysis of flexible and direct transmission system, the work control principle analysis of offshore converter station, the work control principle analysis of onshore converter station, and the work control principle analysis of offshore converter station. …”
    Get full text
    Article
  19. 1059

    Access control relationship prediction method based on GNN dual source learning by Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG

    Published 2022-10-01
    “…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
    Get full text
    Article
  20. 1060

    Continuous and Discrete Similarity Coefficient for Identifying Essential Proteins Using Gene Expression Data by Jiancheng Zhong, Zuohang Qu, Ying Zhong, Chao Tang, Yi Pan

    Published 2023-06-01
    “…Using the graph theory as the basis, we fused the newly proposed similarity coefficient with the existing network topology prediction algorithm at each protein node to recognize essential proteins. …”
    Get full text
    Article