Search alternatives:
semantics » semantic (Expand Search)
Showing 221 - 240 results of 2,704 for search '(functional OR function) semantics', query time: 0.15s Refine Results
  1. 221
  2. 222
  3. 223

    Sufficient and Necessary Conditions for Generalized Distribution Series on Comprehensive Subclass of Analytic Functions by Tariq Al-Hawary, Basem Frasin, Ibtisam Aldawish

    Published 2025-06-01
    “…In this paper, we demonstrate a relationship between a generalized distribution series and a comprehensive subclass of analytic functions. The primary aim of this study is to determine a necessary and sufficient condition for the generalized distribution series <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msubsup><mi>E</mi><mrow><mi>ϕ</mi></mrow><mo>∗</mo></msubsup><mrow><mo>(</mo><mi>ς</mi><mo>,</mo><mi>z</mi><mo>)</mo></mrow></mrow></semantics></math></inline-formula> to belong to the inclusive subclass <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi mathvariant="normal">Π</mi><mi>η</mi></msub><mrow><mo>(</mo><msub><mi>Q</mi><mn>3</mn></msub><mo>,</mo><msub><mi>Q</mi><mn>2</mn></msub><mo>,</mo><msub><mi>Q</mi><mn>1</mn></msub><mo>,</mo><msub><mi>Q</mi><mn>0</mn></msub><mo>)</mo></mrow></mrow></semantics></math></inline-formula>. …”
    Get full text
    Article
  4. 224

    Graph-Theoretic Characterization of Separation Conditions in Self-Affine Iterated Function Systems by Ming-Qi Bai, Jun Luo, Yi Wu

    Published 2025-05-01
    “…For a self-affine iterated function system (IFS) <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msubsup><mrow><mo>{</mo><msub><mi>f</mi><mi>j</mi></msub><mo>}</mo></mrow><mrow><mi>j</mi><mo>=</mo><mn>1</mn></mrow><mi>N</mi></msubsup></semantics></math></inline-formula> on <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mi mathvariant="double-struck">R</mi><mi>d</mi></msup></semantics></math></inline-formula> defined by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>f</mi><mi>j</mi></msub><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mo>=</mo><msup><mi>A</mi><mrow><mo>−</mo><mn>1</mn></mrow></msup><mrow><mo>(</mo><mi>x</mi><mo>+</mo><msub><mi>d</mi><mi>j</mi></msub><mo>)</mo></mrow></mrow></semantics></math></inline-formula>, where <i>A</i> is an expansive matrix and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>d</mi><mi>j</mi></msub><mo>∈</mo><msup><mi mathvariant="double-struck">R</mi><mi>d</mi></msup></mrow></semantics></math></inline-formula>, we reveal a novel characterization of the open set and weak separation conditions through the bounded degree of the augmented tree induced by the IFS. …”
    Get full text
    Article
  5. 225

    On Qi’s Normalized Remainder of Maclaurin Power Series Expansion of Logarithm of Secant Function by Hong-Chao Zhang, Bai-Ni Guo, Wei-Shih Du

    Published 2024-12-01
    “…In the study, the authors introduce Qi’s normalized remainder of the Maclaurin power series expansion of the function <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>ln</mi><mi>sec</mi><mi>x</mi><mo>=</mo><mo>−</mo><mi>ln</mi><mi>cos</mi><mi>x</mi></mrow></semantics></math></inline-formula>; in view of a monotonicity rule for the ratio of two Maclaurin power series and by virtue of the logarithmic convexity of the function <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mo>(</mo><msup><mn>2</mn><mi>x</mi></msup><mo>−</mo><mn>1</mn><mo>)</mo></mrow><mi>ζ</mi><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow></mrow></semantics></math></inline-formula> on <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mn>1</mn><mo>,</mo><mo>∞</mo><mo>)</mo></mrow></semantics></math></inline-formula>, they prove the logarithmic convexity of Qi’s normalized remainder; with the aid of a monotonicity rule for the ratio of two Maclaurin power series, the authors present the monotonic property of the ratio between two Qi’s normalized remainders.…”
    Get full text
    Article
  6. 226

    Some Evaluations About Coefficients Boundaries for Specific Classes of Bi-Univalent Functions by Suliman M. Sowileh, Gangadharan Murugusundaramoorthy, Borhen Halouani, Ibrahim S. Elshazly, Mohamed A. Mamon, Alaa H. El-Qadeem

    Published 2024-11-01
    “…New subclasses of bi-univalent functions with bounded boundary rotation are presented in this study. …”
    Get full text
    Article
  7. 227

    Subjectivity and Perspective in Truth-Theoretic Semantics / by Lasersohn, Peter

    Published 2017
    Table of Contents: “…goal: a truth-theoretic semantics for sentences expressing subjective judgment --…”
    View in OPAC
    Book
  8. 228

    The Value Semantics in “Intelligent Travel” Discourse by O. V. Ramantova

    Published 2021-09-01
    “…The present paper aims at describing the results of researching the axiological aspect of the category “intelligent travel” functioning in the English language travel discourse. …”
    Get full text
    Article
  9. 229

    Operational Semantics of Annotated Reflex Programs by Igor S. Anureev

    Published 2019-12-01
    “…Types of annotations that specify restrictions on the values of the variables at program launch, restrictions on the environment (in particular, on the control object), invariants of the control cycle, pre- and postconditions of external functions used in Reflex programs are defined. Annotated Reflex also uses standard annotations assume, assert and havoc. …”
    Get full text
    Article
  10. 230

    On the Convergence of Normal and Curvature Calculations with the Height Function Method for Two-Phase Flow by Antonio Cervone, Sandro Manservisi, Jieyun Pan, Ruben Scardovelli, Stéphane Zaleski

    Published 2025-06-01
    “…The volume-of-fluid (VOF) method is widely used for multiphase flow simulations, where the VOF function implicitly represents the interface through the volume fraction field. …”
    Get full text
    Article
  11. 231

    Improving Physically Unclonable Functions’ Performance Using Second-Order Compensated Measurement by Jorge Fernández-Aragón, Guillermo Diez-Señorans, Miguel Garcia-Bosque, Raúl Aparicio-Téllez, Gabriel López-Pinar, Santiago Celma

    Published 2025-02-01
    “…In this paper, we study the performance of second-order compensated measurement to generate a multi-bit response in physically unclonable functions (PUFs). The proposed technique is based on a novel second-order compensated measurement generating multiple bits instead of a single bit provided by the conventional compensated measurement. …”
    Get full text
    Article
  12. 232

    From Inequality to Extremes and Back: A Lorenz Representation of the Pickands Dependence Function by Pasquale Cirillo, Andrea Fontanari

    Published 2025-06-01
    “…We establish a correspondence between Lorenz curves and Pickands dependence functions, thereby reframing the construction of any bivariate extreme-value copula as an inequality problem. …”
    Get full text
    Article
  13. 233

    Finite Element Method for Solving the Screened Poisson Equation with a Delta Function by Liang Tang, Yuhao Tang

    Published 2025-04-01
    “…To address this, we employ integrated Legendre basis functions, which yield sparse and structured system matrices characterized by a Banded-Block-Banded-Arrowhead (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mi>B</mi><mn>3</mn></msup></semantics></math></inline-formula>-Arrowhead) form. …”
    Get full text
    Article
  14. 234

    Banach Limit and Fixed Point Approach in the Ulam Stability of the Quadratic Functional Equation by El-sayed El-hady, Janusz Brzdęk

    Published 2025-03-01
    “…We show how to obtain new results on the Ulam stability of the quadratic equation <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>q</mi><mo>(</mo><mi>a</mi><mo>+</mo><mi>b</mi><mo>)</mo><mo>+</mo><mi>q</mi><mo>(</mo><mi>a</mi><mo>−</mo><mi>b</mi><mo>)</mo><mo>=</mo><mn>2</mn><mi>q</mi><mo>(</mo><mi>a</mi><mo>)</mo><mo>+</mo><mn>2</mn><mi>q</mi><mo>(</mo><mi>b</mi><mo>)</mo></mrow></semantics></math></inline-formula> using the Banach limit and the fixed point theorem obtained quite recently for some function spaces. …”
    Get full text
    Article
  15. 235

    Realizing the Calculation of a Fully Normalized Associated Legendre Function Based on an FPGA by Yuxiang Fang, Qingbin Wang, Yichao Yang

    Published 2024-11-01
    “…A large number of fully normalized associated Legendre function (fnALF) calculations are required to compute Earth’s gravity field elements using ultra high-order gravity field coefficient models. …”
    Get full text
    Article
  16. 236
  17. 237
  18. 238

    Functional potential of English cognitive verbs in narrative (on the material of the works by M. Atwood) by Iryna Dilai

    Published 2024-11-01
    “…The research is theoretically framed by the works on lexical and functional semantics of (cognitive) verbs (K. Aijmer, D. …”
    Get full text
    Article
  19. 239

    Differences in cognitive deficits and brain functional impairments between patients with first-episode and recurrent depression by Lianzi Guan, Yifei Li, Hui Kong, Jie Fang, Jiakuai Yu, Ting Wang, Jiajia Zhu, Daomin Zhu

    Published 2025-04-01
    “…All the patients underwent examinations of resting-state functional magnetic resonance imaging (fMRI), event-related potential (ERP) measurements, and a series of standardised neuropsychological tests, including event-based (EBPM) and time-based (TBPM) prospective memory tasks, the Semantic Fluency Test (SFT), and the Continuous Performance Task–Identical Pairs (CPT-IP). …”
    Get full text
    Article
  20. 240

    Semantic ECG hash similarity graph by Yixian Fang, Shilin Zhang, Yuwei Ren

    Published 2025-07-01
    “…Subsequently, a lightweight linear hash function is utilized to produce a hash representation for the unseen signal. …”
    Get full text
    Article