-
1301
A Formula for Eigenvalues of Jacobi Matrices with a Reflection Symmetry
Published 2018-01-01“…For the first class represented by the 2M-dimensional real Jacobi matrices whose entries are symmetric with respect to the secondary diagonal, a new polynomial identity relating the eigenvalues of such matrices with their matrix entries is obtained. …”
Get full text
Article -
1302
TEI Lex-0 Etym: Toward Terse Recommendations for the Encoding of Etymological Information
Published 2022-09-01“…In particular, given that all the potential contents of etymons are highly analogous to those of dictionary entries in general, the contents presented herein heavily reuse many of the corresponding features and constraints introduced in other components of TEI Lex-0 for the encoding of etymologies and etymons. …”
Get full text
Article -
1303
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
1304
Vieta's triangular array and a related family of polynomials
Published 1991-01-01“…If n≥1, let the nth row of an infinite triangular array consist of entries B(n,j)=nn−j(jn−j), where 0≤j≤[12n].…”
Get full text
Article -
1305
Scots and France As Seen through Alba Amicorum, 1540s-1720s
Published 2022-06-01“…Actually, the issue of relating within alba seems to be too restrictively construed and needs to be opened up. These album entries firmly ground these Scots within France and its various milieus, whether student, professional, clerical, diplomatic, or scientific and highlight their relations with these environments and activities or professions.…”
Get full text
Article -
1306
Dark Side of the Career: Reflections from an Online Discussion Platform
Published 2024-04-01“…The research data were the entries of the platform under the title of "working life" from 2000 to 2022. …”
Get full text
Article -
1307
Soutenir le choix de ressources pour des usages du numérique favorisant l’autonomie des élèves : mise en regard d’une grille d’analyse dans deux disciplines
Published 2024-03-01“…The analysis grid has five entries, three of which are transversal and two specific for each discipline. …”
Get full text
Article -
1308
The Content Form of the Lexeme “Average”: Synchrony and Diachrony
Published 2015-06-01“…The practical part covers the synchronic and diachronic contexts in which the lexeme average operates - data from the British National Corpus, entries from monolingual dictionaries, materials from coursebooks, entries from etymological dictionaries. …”
Get full text
Article -
1309
An Investigation of the Glossary of Khaghani Sherwani’s Book of Poems
Published 2020-06-01“…Moreover, it was found that the reliability of the work under study was significantly decreased due to disregard for new research findings, the lack of consideration of some punctuation marks, incorrect entries, inconsistencies of entries and descriptions, the lack of use of primary sources, and mistakes as a result of the hasty publication process. …”
Get full text
Article -
1310
On the Determinants of the Square-Type Stirling Matrix and Bell Matrix
Published 2021-01-01“…For this purpose, we prove that S∗ and B∗ have LU factorizations S∗=LSUS and B∗=LBUB where the diagonal entries of US are kk−1, while those of UB are k! (k≥1).…”
Get full text
Article -
1311
Music of Festive Days in 18th Century Český Krumlov. Depiction of Festivities in an 18th Century Monastic Chronicle
Published 2020-12-01“…On this basis, the content and settings of Schwarzenberg birthdays, magnificent triumphal entries, or municipal pilgrimage feasts can be reconstructed. …”
Get full text
Article -
1312
Fachwörterbuch, Autorenwörterbuch und Wörterbuchhybride. Zu einem Problem der Fachlexikographie
Published 2024-12-01“…Even an analysis of the lemma list provides information on whether a specialized dictionary hybrid is useful for all targeted user groups. This is the case if entries that can be assigned to the author dictionary and entries that can be assigned to the specialized dictionary correspond approximately to the same needs and subject-specific competences of the users. …”
Get full text
Article -
1313
Operation and Economic Analysis for Ring Road: Baqubah City as Case Study
Published 2022-01-01“…The planned road is divided into three segments linking the three major entries to the city. The first segment is already existing, while the second and third segments are following a predetermined orbital route that has not been utilized yet. …”
Get full text
Article -
1314
SECONDARY FEEDBACK RIDGE ESTIMATION METHOD FOR STRUCTURAL DAMAGE DETECTION
Published 2024-08-01“…To overcome the ill⁃posed least square problem in sensitivity equations,a secondary feedback ridge estimation method was proposed to detect structural damages based on modal flexibility changes.Modal eigenvalues and mode shapes were utilized to assemble the modal flexibility matrix,which was used to establish linear equations for detecting elemental damage severities by modal flexibility changes.During the damage localization stage,damage sites were primarily assessed using the non⁃negative least square method and the feedback ridge technique.Since the damage localization results obtained by the two methods were typically disturbed by different undamaged elements,suspicious damaged elements were comprehensively determined by taking the intersection of the two sets of damage localization results.At the damage quantification stage,the diagonal entries of the regularization matrix corresponding to suspicious elements were decreased and the diagonal entries associated with other elements were augmented.Then the second feedback ridge estimation was conducted to accomplish damage quantification.The numerical analysis of a simply supported beam indicates that the proposed method is more robust in resisting noise,compared with the non⁃negative least square method and feedback ridge estimation technique.Regardless of whether it is damage localization or damage quantification,the proposed method demonstrates higher reliability in detecting accuracy.…”
Get full text
Article -
1315
تیسیر المرام لأدعیة خیر الکلام : کشاف موضوعى هجائى للأدعیة الواردة فى القران الکریم
Published 2019-04-01“…This research is concerned with enumeration and recording of theinvocations in the Holy Quran, the determination of its topics and the formulationof its indexing entries. This is done in order to prepare an alphabetical subjectindex for invocations in Holy Ouran, So that the index in the end is a tool tofacilitate the use and access to these invocations on the hand, and an objectivecollection on the other hand.the study Problem:The problem of the study is concentrated in two aspects:1- The difficulty of reaching a specific invocation in certain subject ofinvocations in the Holy Quran. …”
Get full text
Article -
1316
The Contributions of Cataloguing Towards the Perfomance of Academic Libraries.
Published 2020“…It helps to relate and display to getter the editions which the library has of a given author. It arranges entries of complex material in library under headings of personal authors. …”
Get full text
Thesis -
1317
Euclid meets Popeye: The Euclidean Algorithm for $2\times 2$ Matrices
Published 2023-07-01“…An analogue of the Euclidean algorithm for square matrices of size $2$ with integral non-negative entries and positive determinant $n$ defines a finite set $\mathcal{R}(n)$ of Euclid-reduced matrices corresponding to elements of $\lbrace (a,b,c,d)\in \mathbb{N}^4\ \vert \ n=ab-cd,\ 0\le c,d…”
Get full text
Article -
1318
Antroponimy w nowoczesnym rosyjsko-polskim słowniku przekładowym
Published 2018-06-01“…Inaccuracies found in dictionary entries allow us to formulate some conclusions about suitable methods to present anthroponyms in a modern electronic Russian-Polish translation dictionary.…”
Get full text
Article -
1319
On the matrix equation Xn=B over finite fields
Published 1993-01-01“…Let M denote the ring of m×m matrices with entries in GF(q). In this paper, we consider the problem of determining the number N=N(n,m,B) of the n-th roots in M of a given matrix B∈M.…”
Get full text
Article -
1320
Filtered dataset of Irish energy performance certificates: A data-driven approach for enhanced building stock modellingMendeley DataGithubSEAI NBER
Published 2025-04-01“…The raw EPC database for Ireland is publicly accessible but contains over 1 million unfiltered entries with inconsistent and erroneous values that can skew analysis. …”
Get full text
Article